Acronis Advanced Email Security By Perception-Point

Cloud Email & Collaboration Security

Block email threats, including spam, phishing, business email compromise (BEC), account takeover (ATO), malware, advanced persistent threats (APTs), and zero-days before they reach end users’ mailboxes. Leverage this next-generation, cloud-based email security solution for holistic protection.

Business email compromise (BEC)

Impersonation-based attacks trick employees into making innocent mistakes, thinking they’re communicating with a person they know. A significant part of BEC attempts do not have a malicious payload and leverage only text-based techniques, making them especially tricky to detect and prevent.

Malware and ransomware

Malware – including viruses, ransomware, spyware, worms, and Trojans - is most commonly delivered via malicious payloads – files and URLs. Thousands of new malware variants appear each day. Legacy solutions fall short when dealing with advanced evasion techniques and defending collaboration platforms.

Phishing

Phishing attacks are the root of 91% of all cyberattacks, as reported by CSO Online. They leverage social engineering to deceive their target and gain access to sensitive information by employing files, URLs, and text-based techniques posing as legitimate sources.

AI Enhanced Threat Prevention

Natural Language Processing & GenAI Models

Developed to UNDERSTAND your organization’s unique relationships and communication patterns. These technologies go beyond mere algorithms to offer a more nuanced and effective detection of social engineering-based attacks. 

  • GenAI Decoder™​: This LLM-based model specializes in recognizing the patterns in AI-generated text and is adept at detecting social engineering attempts like BEC, impersonation and phishing.

  • Supply-Chain Recognition​​: This feature analyzes business communication to automatically identify domains of your organization’s business partners, vendors, and more.

  • Thread Hijack Protection: An anti-spoofing correlation algorithm prevents conversation hijacking and vendor impersonation attempts, adding an extra layer of security to business communications.

Behavioral and Content-Based Analysis

Crafted to RECOGNIZE anomalies, malicious sentiments, and evasion techniques. This isn’t just about flagging suspicious activities; it’s about understanding the underlying behaviors that drive them, offering a more comprehensive security net.

  • Anomaly Detection​: Identifies changes in sender’s tone and sentiment, analyzes message content, and compares metadata to find deviations. Topic modeling for subject and email body adds another layer of security.

  • Content Analysis​: LLM-based models extract sensitive content like personally identifiable information (PII), identify names of entities (NER), and analyze textual metadata.

  • Textual-Obfuscation Detection: Detects evasion attempts that conceal malicious text by replacing certain characters with other visually similar ones, invisible ones, etc.

Account Takeover (ATO)

Perception Point’s solution enables complete protection for Account Takeover – preventing attackers from infiltrating the organization, detecting anomalies that could suggest an account has been compromised, stopping attackers from spreading malicious content onto other users, and providing incident management, remediation and reporting.

Image Recognition Algorithms

Designed to SEE through advanced phishing attacks and brand spoofing attempts. These algorithms are not just about identifying images; they’re about understanding the context in which they appear, offering a robust defense against visual-based threats.

  • Two-Step Phishing​: This proprietary object detection model examines webpages to recognize clickable elements for further scanning, protecting against hidden malicious payloads. 

  • Brand Recognition​​​: Compares email, URL, file screenshots, images, and URL favicons to known brand assets to detect spoofing. Data is analyzed against both known ‘clean’ and ‘malicious’ images.

  • Quishing Protection: Utilizing real-time image recognition, this feature scans QR codes embedded in emails or attachments. A proprietary anti-evasion algorithm follows the URLs to dynamically scan them for phishing or malware delivery attempts.

Next-Gen Sandbox Technology

The HAP™ excels in speed and precision and unlike traditional sandboxes that often take few minutes to complete an analysis, it has an average of 15 seconds. The HAP™ is composed of proprietary algorithms that leverage CPU-level data to access the entire execution flow direct from the processor to deterministically intercept exploit techniques of pre-malware release. 

Perception Point’s patented engine includes:

  1. CFG algorithm – detects zero-day & N-day memory corruption exploits

  2. FFG algorithm – detects advanced exploitation techniques

  3. Dropper algorithm – detects logical bugs & droppers in apps, as well as malicious codes in scripts

Zero-day & N-day Attacks

Rather than detecting malware, the HAP works at the exploit stage. If a vulnerability is unknown, it simply doesn’t matter – exploitation is a deterministic act; if there is an exploit there is an attack. By targeting attacks at this stage, the HAP cannot be bypassed by zero‑days and performs its magic in seconds not minutes.

Gatewayless Inline API Solutions for Effortless Deployments and Efficiency

2 Methods of Operation

1.Detect & Remediate Mode (API)

Detect & Remediate scans the emails after delivery of email to the user and performs remediation if necessary

2.Prevent (inline) Mode

Prevent (inline) scans the emails prior to delivery to the user and blocks malicious emails.

Benefits of Our Solution

We do not just recommend products—we do the work, evaluate them in our own environment first, perform detailed analysis and then recommend them to our clients. If you have an existing IT team or cybersecurity program in place and are looking for specific tools to compliment or improve security, we can help.

Reduce Operating Costs

A security incident can stop you from being 100% productive at work. This costs the company a lot of money in lost productivity and in opportunity costs. A virus can hit many machines and take weeks to eradicate. Removing this risk will save you money.

Protect Your Company’s Critical Assets and Information

Proactive technologies ensure an additional protection layer against all types of unknown malware, targeted attacks and Internet threats.

A Flexible Security Solution

Our advanced security features offer the appropriate security for any size of company and network.

Discover How Palantir MSP Can Help Your Business