Hi [[ session.user.profile.firstName ]]

Perception Point

  • Date
  • Rating
  • Views
  • 10 Minutes on OneDrive Threat Prevention. Closing Cloud Storage Loopholes.
    10 Minutes on OneDrive Threat Prevention. Closing Cloud Storage Loopholes.
    Corie, Chief Strategy Officer - Perception Point; Michael Aminov - Co-founder & Chief Architect Recorded: May 7 2019 16 mins
    In this short webinar, understand the security loopholes in Cloud Storage, and see a real case of an attempted attack we stopped on a Fortune 500 company's OneDrive.
    The webinar will also include a Q&A session for you to ask our experts about the security loopholes in other Cloud Storage platforms.
  • Transform G Suite Email Security in less than 10 minutes - 2nd try :)
    Transform G Suite Email Security in less than 10 minutes - 2nd try :)
    Corie Chung, Chief Strategy Officer - Perception Point; Michael Aminov, Chief Architect - Perception Point Recorded: Apr 2 2019 12 mins
    The built-in security for G Suite is insufficient against the modern threat landscape. In this short webinar, join our Chief Architect Michael Aminov to learn how to dramatically improve the prevention of APTs, phishing, malware, spam and BEC attacks with no disruption to existing business processes or IT overhead.
  • Transform G Suite Email Security in less than 10 minutes
    Transform G Suite Email Security in less than 10 minutes
    Michael Aminov, Chief Architect - Perception Point Recorded: Mar 26 2019 16 mins
    The built-in security for G Suite is insufficient against the modern threat landscape. In this short webinar, join our Chief Architect Michael Aminov to learn how to dramatically improve the prevention of APTs, phishing, malware, spam and BEC attacks with no disruption to existing business processes or IT overhead.
  • Transform Office 365 Email Security in less than 10 minutes
    Transform Office 365 Email Security in less than 10 minutes
    Michael Aminov, Chief Architect - Perception Point Recorded: Mar 19 2019 15 mins
    According to Gartner, "Clients have found the email security capabilities of Office 365 to be lagging."

    In this short webinar, join our Chief Architect Michael Aminov to learn how to dramatically improve the prevention of APTs, phishing, malware, spam and BEC attacks with no disruption to existing business processes or IT overhead.
  • Addressing the Cyber Threats on the Horizon
    Addressing the Cyber Threats on the Horizon
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider Recorded: Jan 29 2019 41 mins
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Panellists
    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • Securing Digital Transformation: How to Close Major Loopholes
    Securing Digital Transformation: How to Close Major Loopholes
    Corie Chung - Chief Strategy Officer; Shlomi Levin - Co-founder and CTO; Michael Aminov Co-founder & Chief Architect Recorded: Jan 17 2019 47 mins
    Nearly 90% of businesses are pursuing a digital-first strategy as their processes become digitized as data-driven.

    However, with the promise of great leaps in growth and productivity, also come major security loopholes. From new communication channels to problematic security policies to legacy systems, there are many ways in which the digital-first business may be exposed - a risk brands simply can't afford to take.

    Join our founders to learn more about the digital transformation phenomena, its IT enablers, and how to close some of the major loopholes leaving organizations exposed.
  • OneDrive, Dropbox, Box could be your weakest security link. How to close the gap
    OneDrive, Dropbox, Box could be your weakest security link. How to close the gap
    Michael Aminov: Founder & Chief Architect - Perception Point; Corie Chung: Chief Strategy Officer - Perception Point Recorded: Nov 28 2018 33 mins
    Shared drive applications are essential productivity tools. Despite widespread adoption, OneDrive, Sharepoint, Dropbox, etc. lack the advanced security measures that have been instrumental in securing email, endpoints and networks, creating security blind spots that pose a significant cybersecurity risk. According to market research, 81% of IT decision makers consider shared drive apps to be vulnerable to cyberattacks.

    During this webinar, learn about how shared drives can be leveraged by attackers, why the built-in or CASB-provided security is not enough, and how to easily close vector of attack.
  • Email Security WTF?!: Escape the Nightmare
    Email Security WTF?!: Escape the Nightmare
    Shlomi Levin: Founder & CTO - Perception Point; Corie Chung: Chief Strategy Officer - Perception Point Recorded: Oct 31 2018 43 mins
    From the producers of Email Security WTF?!, this webinar will shed light on the email security nightmares cybersecurity teams face: excessive costs, long update cycles, increasing risks of being compromised; and how to make them all go away.

    Join us to gain insights on the advanced attacks easily breaching existing solutions, and how cloud-based email security can help you sleep better at night.
  • Malware is a red herring. The real enemy is its source.
    Malware is a red herring. The real enemy is its source.
    Shlomi Levin: Founder & CTO - Perception Point; Michael Aminov: Founder & Chief Architect - Perception Point Recorded: Sep 5 2018 64 mins
    Malware is growing exponentially. Leaping +88% to 670 MM new variants in 2017 alone,
    the time, money and resources required to stay on top of this is unsustainable. It's time to stop
    fighting an un-winnable battle and focus on the real enemy, the source of malware - the exploit.
    Learn how by targeting the ~10 known exploit techniques, you can make chasing malware a
    thing of the past.

    Join our CTO and Cheif Architect to learn more about:

    1. What is an exploit technique and why you should care about it

    2. The different techniques attackers utilize to evade current solutions

    3. How to achieve visibility at the exploit-stage of the kill chain
  • Creative Hackers - the latest 'tricky' attack trends to watch for; ft James Rutt
    Creative Hackers - the latest 'tricky' attack trends to watch for; ft James Rutt
    Michael Aminov: Founder & Chief Architect - Perception Point; James Rutt: CIO & CISO - Dana Foundation Recorded: Aug 8 2018 61 mins
    Attackers never rest. They are always inventing new ways to sneak by the current generation of security solutions. We are processing hundreds of thousands of files and URLs "in the wild" - and a significant number deemed "clean" by the leading engines on VirusTotal are actually malicious content generated by creative hackers.

    Learn about some of the latest techniques to watch out for in our monthly Creative Hackers program.

    In this session, join us and our guest, James Rutt, CIO & CISO of The Dana Foundation, to hear about a recent barrage his company received and more...

    Among the topics we will cover:

    1. The latest creative hacking themes and their means of execution

    2. Real life example of an attack escalation at the Dana Foundation

    3. How you can ensure your systems are more resilient against common tricks

Embed in website or blog