NO MORE BLINDSPOTS

Prevent the transmission of malicious files, URLs and social-engineering attacks through the content-exchange channels of your choice with one easy solution. .

Email

  • Any web-based email service
learn more

Advanced Email
Security.

Next gen cloud solution provides the most effective APT prevention on the market plus cutting-edge protection against phishing, spam, commodity malware and impersonation attacks. Blocks any malicious file or URL, pre-malware release.

Key Benefits.

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring

Easily fortify your email service simply by changing a routing rule. No MX record change required. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

OUR TECHNOLOGY

Cloud Storage

learn more

Cloud Storage.

Cloud Storage apps can be highly effective malware distribution platforms. Prevent malicious content (files & URLs) from being uploaded, downloaded or used to infect previously clean files with our next gen cloud-based solution.

Key Benefits.

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring
  • Archive santization

Easily fortify your cloud storage in literally only one click. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

OUR TECHNOLOGY

Messaging

learn more

Messaging.

As the exchange of files & URLs moves to new channels, so does the potential for malicious content. Next gen cloud-based solution scans content exchanges in real-time to block every level of threat, from APTs to phishing, without creating delays.

Key Benefits.

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring

Easily fortify your existing messaging applications with one click. Can be deployed alone or along with additional collaboration channels secured by Perception Point.

OUR TECHNOLOGY

API

Integration with any other application where files or URLs are exchanged.
Custom development per client needs.
learn more

Key Benefits.

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring

The Analyzer.

Alternatively, you can independently upload suspicious content to Perception Point’s Analyzer on a case-by-case basis.

OUR TECHNOLOGY

Email

Advanced Email Security.

  • Any web-based email service

Key Benefits.

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring

Cloud Storage

Advanced Cloud Storage Security.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring
  • Archive santization

Messaging

Advanced Messaging Security.

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring

API

Anywhere you have files or URLs, our technology can scan them.

Integrate with
other apps

Key Benefits .

  • Real-time prevention
  • X-Ray threat visibility
  • Deep scanning
  • Zero delay
  • One-click deployment
  • Unlimited scale
  • 24/7 threat monitoring
OUR TECHNOLOGY

Built for the modern enterprise.

Holistic coverage

APTs. Phishing. Malware. Impersonation. BEC attacks. Files, URLs and social-engineering driven threats. No fuss. Simply one, clear verdict on even the most advanced attacks. All in one security platform.

Real-time prevention

Block malicious content before it ever reaches the end user, taking human mistakes out of the equation.

100% threat visibility

“X-ray” any code executed by the system for cutting edge advanced threat protection, on top of the market standard protection against Everyday threats.

Zero delay

Sophisticated in-line prevention engines reduce scans to 15-30 seconds from 7-20 minutes, minimizing impact on user productivity.

One-click integration

Native cloud on top of existing servers, adapting policies, rules and quarantine with no need to change anything. No MX record change and zero on-boarding time.

Unlimited scale

Auto scale capabilities ensure 100% of email traffic is scanned, regardless of organization size.

customer quote

customer quote

“Integrating Perception Point’s platform into our Office 365 was quick and seamless with absolutely no impact to our email service levels. In less than a month they’ve already blocked a potentially damaging attack that could have easily tricked our users and caused a serious disruption. It’s rare that I see immediate returns that quickly.”

CISO, Healthcare

customer quote

Since deploying Perception Point, they have caught many advanced attacks that were getting by the Proofpoint email security we have. There is no silver bullet, but it is very reassuring to have this additional fortification.”

CISO, Financial Services
HANDS-OFF APPROACH

Smart Viewer.

We aren’t inserting any new dashboards into your day, and will call if any serious incidents occur. However, you can always access key data points and tools through our self-service viewer.

1

Get insights.

See most targeted software, file classifications, most targeted users, most common domains, and more.

2

Analyze any file or URL.

Upload any suspicious file or URL, from any software, and get an immediate analysis.

3

Conduct forensics.

Determine the scope and scale of an attempted attack. Identify current threats and prioritize response efforts.

Protection & Prevention

Our layer-based solution ensures that each and every URL is scanned by several 3rd party reputation-based vendors, threat analysis databases, and by our in-house image recognition-based engine. We offer customers two different options for re-writings URLs: URL Rewrite & Blocking Mode: This mode provides the highest level of prevention. When a user clicks on a link, we will first “hold” the session as our deep analysis engines conduct the scan, and will then transfer to the site only after there is a clean verdict. Non-blocking URL Rewrite: This mode detects malicious links while still enabling users to immediately start a session. When a user clicks on a link we will redirect to our platform. However, while we run a deep analysis of the link, we will still allow for the user to browse within destination. It is important to note that if the URL is malicious, the first user to click on it will go directly to the malicious destination.

Too many false positives can be very disruptive so we work hard to minimize the rate. We are proud to say that less than 0.0015% of all clean emails are marked as malicious. Our ultimate goal is to reach zero, so our SOC team deeply investigates each false positive to ensure continuous improvement.

We scan all .exe files, and any other similar file types, with several static engines and our threat intelligence tools. However, we recommend that all of our customers block such files types by enforcing a blocking policy. As of today, our platform blocks .exe and its likes by default. It even blocks these files if they are embedded in other files/URLs or hidden inside archived files for which we don’t have the password.

Yes. Our algorithms are able to extract all relevant documents inside archived files. Following extraction, each file is sent separately through all relevant layers. Note that we do not currently scan encrypted archived files for which we don‎‎‎’t have the password, but we are working on it.

Performance & Functionality

We recommend creating a simple quarantine rule to direct malicious email to a designated folder. However, our platform is extremely flexible, so if you want to send it to any other place or even deliver it to the end-user, we can do that as well.

We leverage your current quarantine folder. This ensures that you will not need to make any special arrangements when deploying our platform.

Absolutely. Your relevant IT personnel (usually, the system admin) can easily access the folder and release it.

Before viewing a malicious email in quarantine, it is recommended to review the verdict within our very easy-to-use Viewer.

Attachment scans take an average of 3 seconds. Every single attachment is scanned by all layers, including our advanced threat engine, the HAP, on at least three different versions of software (e.g. Word documents are scanned by all of the latest Office versions).

URL scans take an average of 3 seconds. However, the customer can decide whether to block the loading of the link or not. In cases where the Block Mode feature is not turned on, the user experiences very little delay.

Absolutely not. Our platform is seamlessly integrated into any SIEM you already have and does not require any more attention from your part. However, if you wish to analyze and learn about recent attacks on your organization, you can easily look at our Viewer. It is completely up to you.

Support & Incident Response

Our support team is available 24/7, by phone or email. In addition, a dedicated engineer is assigned to fix complex cases when needed. Our support personnel have many years’ experience and will ensure that you always receive the best service.

We don’t see any real chance of that happening. However, we commit to remediate any unexpected failures and enable normal business email flow in less than one hour.

First, you can always look at the Viewer. It includes detailed information regarding the malicious code, the CVE used, which software was used, which version, and more. In addition, Perception Point’s SOC team analyzes each and every malicious event triggered on a daily basis. They also communicate with our Research team to provide deep technical analysis on must-know and popular events.

Privacy & Compliance

We are currently in the process of getting SOC2 , HIPAA and GDPR certification and will be compliant by 2019.

Link has been copied to your clipboard!