Intercept
cyberattacks
at their source.

Next gen email protection

100% threat visibility.
14x Faster.
One-click deployment.
Unlimited scale.

We stop email attacks at the earliest possible stage - pre-malware delivery - for faster, more accurate protection against zero day, n-day, and every day threats.

Full mobile site comming soon.
Learn more on our desktop site now.

Contact us.

Yes, I would like to receive email communications from Perception Point. I understand I can unsubscribe at any time.

Hardware visibility.
Software agility.

Our proprietary platform combines the best of both worlds. Fusing the high data visibility only possible at the CPU level with the flexibility of a cloud solution.

First Ever

Hardware Assisted Platform.

HAP™

Any attack always starts at the CPU level, which means access to CPU level data is a critical factor when it comes to advanced threat prevention. Our solution makes possible an entirely new layer of CPU-level visibility - exposing the core exploit techniques behind any attack to prevent sophisticated evasion methods.

Current Solutions
1 2

Software
Level.

  • Detects malware, post-delivery
  • Using data at the application/OS level
  • Limited visibility into the code
  • Increasingly easy to evade through masking techniques
  • Extended scanning times, limited in scale
  • Base analyses on statistics and behavior
PERCEPTION POINT
3

CPU
Level.

  • Prevents exploits, pre-code execution
  • Examines the entire execution flow, right from the processor
  • Access to the purest form of data
  • Very difficult to perform evasion techniques
  • Prevents attackers from accessing vulnerabilities and releasing malware

Inherent layered cyber protection.

Layered approach enhances market standard degrees of protection with our next gen advanced threat layer, for a streamlined solution.

Layers
1

Static Engines Attachments, Signatures and Spam

2

Static Engines Threat Intelligence, Static custom engines, URL reputation and Macros for Microsoft Office

3

HAP™ Engines Exploits on CPU level for any attachment or link

4

Email Server Gmail / Office 365 / Exchange

Stay a step ahead

Research & News.

Asset 5
Research

Breaking CFI: Exploiting CVE-2015-5122 using COOP

By Oshri Sela & Shlomi Levin

In this series of posts we’re going to demonstrate how modern CFI implementations can be circumvented.

Asset 5
Case Study

Case Study: The evolution of a recent attack campaign

By Perception Point Research

How hackers can make variations within one campaign - as seen in a recent customer attack we blocked.

Asset 5
Article

Attack Trend: Phishing links moving to email attachments

By Michael Aminov, Founder & CA

Typically phishing links are sent directly inside the email body, but now attackers are embedding their phishing links inside an email attachment instead.

Show More
Contact Us

Schedule a trial today.

Yes, I would like to receive email communications from Perception Point. I understand I can unsubscribe at any time.