at their source.

Next gen email protection

100% threat visibility.
14x Faster.
One-click deployment.
Unlimited scale.

We stop email attacks at the earliest possible stage - pre-malware delivery - for faster, more accurate protection against zero day, n-day, and every day threats.

Full mobile site comming soon.
Learn more on our desktop site now.

Contact us.

Yes, I would like to receive email communications from Perception Point. I understand I can unsubscribe at any time.

Hardware visibility.
Software agility.

Our proprietary platform combines the best of both worlds. Fusing the high data visibility only possible at the CPU level with the flexibility of a cloud solution.

First Ever

Hardware Assisted Platform.


Any attack always starts at the CPU level, which means access to CPU level data is a critical factor when it comes to advanced threat prevention. Our solution makes possible an entirely new layer of CPU-level visibility - exposing the core exploit techniques behind any attack to prevent sophisticated evasion methods.

Current Solutions
1 2


  • Detects malware, post-delivery
  • Using data at the application/OS level
  • Limited visibility into the code
  • Increasingly easy to evade through masking techniques
  • Extended scanning times, limited in scale
  • Base analyses on statistics and behavior


  • Prevents exploits, pre-code execution
  • Examines the entire execution flow, right from the processor
  • Access to the purest form of data
  • Very difficult to perform evasion techniques
  • Prevents attackers from accessing vulnerabilities and releasing malware

Inherent layered cyber protection.

Layered approach enhances market standard degrees of protection with our next gen advanced threat layer, for a streamlined solution.


Static Engines Attachments, Signatures and Spam


Static Engines Threat Intelligence, Static custom engines, URL reputation and Macros for Microsoft Office


HAP™ Engines Exploits on CPU level for any attachment or link


Email Server Gmail / Office 365 / Exchange

Stay a step ahead

Research & News.

Asset 5

Hardware vs. Software-based detection

By Shlomi Levin, Founder & CTO

A brief history of software exploitation and mitigation techniques, and how defensive technologies must be approached today.

Asset 5

Perception Point closes $8m series A round

By Perception Point Marketing

Will use funding to launch US presence and expand product portfolio.

Asset 5

Analysis and Exploitation of a Linux Kernel Vulnerability

By Perception Point Research

We have identified a zero-day local privilege escalation vulnerability in the Linux kernel.

Contact Us

Schedule a trial today.

Yes, I would like to receive email communications from Perception Point. I understand I can unsubscribe at any time.