Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Perception Point

Perception Point is a Prevention-as-a-Service company, offering fast interception of any content-based attack across all cloud collaboration channels, including email, cloud storage, CRM apps, and messaging platforms. The company prevents phishing, BEC, spam, malware, Zero-days, and N-days well before they reach enterprise users. Deployed in minutes with no change to the enterprise's infrastructure, the Perception Point solution conforms with any policy and requires zero fuss from IT teams. The company's Incident Response team serves as a force multiplier to the enterprise's SOC team. To learn more about Perception Point, visit our website, or follow us on LinkedIn, Facebook, and Twitter.

Our Website:

Latest Content From Perception Point

Research Report: Advanced Security for Microsoft 365 Cloud Applications

by Perception PointFeb 08, 2022

As Microsoft continues to improve organizational agility and simplify the management of corporate applications, the adoption of Microsoft cloud products continues to grow. However, leveraging cloud-based applications comes with its share of challenges. Employees, customers and suppliers are now accessing the organization's resources remotely and perimeter security offers little to no protection. This is why you need advanced security for Microsoft 365.

It is crucial to protect any entry point into the organization through which attacks can penetrate. While Microsoft cloud products do come with native built-in security features, they do have inherent limitations and are not sufficient to protect against today's and tomorrow's evolving threats.

Download this Advanced Security for Microsoft 365 Solution Brief and learn more about:
• 360 degree Advanced Threat Protection for content-based attacks that target Microsoft cloud application users
• How your organization could save thousands if not millions of dollars in SOC expenses
• Why Perception Point was able to catch 6,488K incidents in just one week deployed on top of Microsoft Defender for Microsoft 365
• Plug-n-play deployment, all-included incident response, zero management overhead and reduction of resources, all at the speed & scale of your business

  • Details
  • Research Report

Whitepaper: New Uses for Amazon S3 are Creating Security Risks for Your Business. This is Why.

by Perception PointNov 22, 2021

As the usage of AWS S3 increases so have the content types that are stored and shared on it. With this significant shift to the cloud, new security concerns have emerged for organizations that must protect their data. The days of siloed data centers are over. More connectivity means more risk, and the greater the risk, the more protection needed.

Modern enterprises and business application providers must be vigilant about their security and at the same time avoid being held back by slow, complex, and outdated security solutions.

In this paper, we discuss Amazon S3 service security risks and provide data-driven, best practices for ensuring that malicious artifacts will never infiltrate your S3 Buckets. Guidelines are presented on how to effectively detect advanced threats without hindering your business operations and the level of service that your customers expect.

Whitepaper: The Definitive Guide to BEC — Business Email Compromise Attacks

by Perception PointNov 22, 2021

Impersonation-based attacks are one of the oldest tricks in the book. In fact, a recent FBI report, highlights a 136% increase in losses from BEC attacks in the last two years, resulting in $12.5 billion in losses over the course of 5 years.

Gartner denies BEC (Business Email Compromise) as "phishing emails that do not have a payload such as a URL or attachment. Instead they use impersonation and knowledge of the company structure or common transactions to convince employees to wire money or data, or to change bank account information for pending payments."

Impersonation-based attacks are a growing challenge as threat actors are relying on the fact that in the fast-paced modern enterprise, employees are the weakest link in the security chain. Distracted and easily accessible, attackers are capitalizing on their weaknesses to trick them into making mistakes.

Download your copy of this guide to BEC Attacks, and learn about:
• The two main mechanisms in which attackers launch BEC campaigns: Account Takeover & Email Spoofing
• A deep dive into the BEC attack chain
• How to prevent BEC attacks within your organization
• A real life case study

Whitepaper: Security Blind Spots in the Era of Cloud Communication & Collaboration. Are You Protected?

by Perception PointNov 16, 2021

The need to communicate, collaborate and do business on a global level has created a proliferation of cloud based applications and services. Email. Cloud Storage. Messaging platforms. CRM. Digital Apps and Services. Organizations continue to add new cloud channels to support their business needs. But with new channels come new security blind spots that must be addressed. This whitepaper highlights the risks and proposes solutions for today's digital-first enterprises who are looking to holistically protect themselves against advanced threats.

Read this whitepaper to learn about:
• Cyber attack trends in the collaboration channel ecosystem
• The (yet) unsolved challenges of email security — the main channel of targeted attacks
• The rising threat of cloud collaboration and the growing risk of content-borne attacks
• Proposed requirements and solutions to protect against all threats across all channels

E-Book: AWS S3 Usage & Cybersecurity Landscape

by Perception PointNov 16, 2021

Amazon S3 is being leveraged in a growing number of products and modern services amid the rapid adoption of cloud native services.

Perception Point engaged with a 3rd party research company to conduct an independent, comprehensive analysis of IT and cybersecurity professionals from different sectors & industries across North America in order to provide security professionals essential information to help them gain visibility into current S3 bucket usage and security vulnerabilities

Download this ebook to get the survey results and learn:
• How organizations are using S3 buckets?
• What are current usage patterns and the organizations' future plans?
• What file types do organizations store on S3 buckets, and do they originate from external parties?
• What is the level of exposure to cyberattacks through S3 buckets, and what threat types are organizations exposed to?
• What are the pain points of organizations when managing their S3 bucket security solutions?
• What are organizations' future objectives and plans to improve their S3 bucket security?