⚡Extra 25% Coupon Code "25OFF"Over 166S$

Acronis Advanced Email Security (Perception Point)
Original price was: $76.90.$26.91Current price is: $26.91.
Acronis Advanced Email Security (Perception Point)
@import url(‘https://fonts.googleapis.com/css?family=Open+Sans:300,400,500,600,700,800,300i,400i,500i,600i,700i,800i&display=swap’);
body {
font-family:sans-serif;
font-size:10px;
line-height:1.42857143;
color:#555555;
}
* {
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
}
body {
margin: 0;
}
body {
font-family: “Helvetica Neue”,Helvetica,Arial,sans-serif;
font-size: 14px;
line-height: 1.42857143;
color: #555555;
background-color: #ffffff;
}
body {
background-color: #f5f5f5 !important;
font-family: ‘Open Sans’, sans-serif;
}
html {
font-family: sans-serif;
-ms-text-size-adjust: 100%;
-webkit-text-size-adjust: 100%;
}
html {
font-size: 10px;
-webkit-tap-highlight-color: rgba(0,0,0,0);
}
.tab-pane {
margin: 0;
padding: 0 10px;
border: 1px solid #ddd;
border-top: 0;
overflow: auto;
}
.tab-pane {
display: none;
}
.active {
display: block;
}
:before,:after {
-webkit-box-sizing: border-box;
-moz-box-sizing: border-box;
box-sizing: border-box;
}
h2 {
font-family: “Helvetica Neue”,Helvetica,Arial,sans-serif;
font-weight: 500;
line-height: 1.1;
color: #317eac;
}
h2 {
margin-top: 20px;
margin-bottom: 10px;
}
h2 {
font-size: 30px;
}
h2 {
font-family: “Open Sans”, sans-serif;
line-height: 1;
font-weight: 700;
margin: 0;
padding: 4px 0;
}
h2 {
font-size: 2.0em;
font-weight: 500;
}
h2 {
padding: 10px 0;
}
h2 {
color: #0e3d78;
}
h2 {
margin: 0;
}
h3 {
font-family: “Helvetica Neue”,Helvetica,Arial,sans-serif;
font-weight: 500;
line-height: 1.1;
color: #317eac;
}
h3 {
margin-top: 20px;
margin-bottom: 10px;
}
h3 {
font-size: 24px;
}
h3 {
font-family: “Open Sans”, sans-serif;
line-height: 1;
font-weight: 700;
margin: 0;
padding: 4px 0;
}
h3 {
font-size: 1.5em;
font-weight: 500;
color: #333;
}
h3 {
padding: 10px 0;
}
p {
margin: 0 0 10px;
}
.container-fluid {
margin-right: auto;
margin-left: auto;
padding-left: 15px;
padding-right: 15px;
}
.clearfix:before,.clearfix:after, .dl-horizontal dd::before, .dl-horizontal dd::after,.container:before,.container:after,.container-fluid:before,.container-fluid:after,.row:before,.row:after, .form-horizontal .form-group::before, .form-horizontal .form-group::after,.btn-toolbar:before,.btn-toolbar:after, .btn-group-vertical > .btn-group::before, .btn-group-vertical > .btn-group::after,.nav:before,.nav:after,.navbar:before,.navbar:after,.navbar-header:before,.navbar-header:after,.navbar-collapse:before,.navbar-collapse:after,.pager:before,.pager:after,.panel-body:before,.panel-body:after,.modal-footer:before,.modal-footer:after {
content: ” “;
display: table;
}
.clearfix::before, .clearfix::after, .dl-horizontal dd::before, .dl-horizontal dd::after, .container::before, .container::after, .container-fluid::before, .container-fluid::after, .row::before, .row::after, .form-horizontal .form-group::before, .form-horizontal .form-group::after, .btn-toolbar::before, .btn-toolbar::after, .btn-group-vertical > .btn-group::before, .btn-group-vertical > .btn-group::after, .nav::before, .nav::after, .navbar::before, .navbar::after, .navbar-header::before, .navbar-header::after, .navbar-collapse::before, .navbar-collapse::after, .pager::before, .pager::after, .panel-body::before, .panel-body::after, .modal-footer::before, .modal-footer::after {
content: ” “;
display: table;
}
.clearfix:after, .dl-horizontal dd::after,.container:after,.container-fluid:after,.row:after, .form-horizontal .form-group::after,.btn-toolbar:after, .btn-group-vertical > .btn-group::after,.nav:after,.navbar:after,.navbar-header:after,.navbar-collapse:after,.pager:after,.panel-body:after,.modal-footer:after {
clear: both;
}
hr {
-moz-box-sizing: content-box;
-webkit-box-sizing: content-box;
box-sizing: content-box;
height: 0;
}
hr {
margin-top: 20px;
margin-bottom: 20px;
border: 0;
border-top: 1px solid #eeeeee;
}
.clearfix::after, .dl-horizontal dd::after, .container::after, .container-fluid::after, .row::after, .form-horizontal .form-group::after, .btn-toolbar::after, .btn-group-vertical > .btn-group::after, .nav::after, .navbar::after, .navbar-header::after, .navbar-collapse::after, .pager::after, .panel-body::after, .modal-footer::after {
clear: both;
}
img {
border: 0;
}
img {
vertical-align: middle;
}
.img-responsive {
display: block;
max-width: 100%;
height: auto;
}
.center-block {
display: block;
margin-left: auto;
margin-right: auto;
}
.row {
margin-left: -15px;
margin-right: -15px;
}
.col-sm-12 {
position: relative;
min-height: 1px;
padding-left: 15px;
padding-right: 15px;
}
@media (min-width: 768px){
.col-sm-12 {
float: left;
}
.col-sm-12 {
width: 100%;
}
}
.col-sm-4 {
position: relative;
min-height: 1px;
padding-left: 15px;
padding-right: 15px;
}
@media (min-width: 768px){
.col-sm-4 {
float: left;
}
.col-sm-4 {
width: 33.33333333%;
}
}
.panel-group {
margin-bottom: 20px;
}
.panel-group {
border-radius: 2px;
border: 0;
}
.well {
min-height: 20px;
padding: 19px;
margin-bottom: 20px;
background-color: #f5f5f5;
border: 1px solid #e3e3e3;
border-radius: 4px;
-webkit-box-shadow: inset 0 1px 1px rgba(0,0,0,0.05);
box-shadow: inset 0 1px 1px rgba(0,0,0,0.05);
}
.well {
background-color: white;
color: darkslategray;
}
.well:hover {
-webkit-box-shadow: 5px 5px 5px 0px lightgray;
-moz-box-shadow: 5px 5px 5px 0px lightgray;
box-shadow: 5px 5px 5px 0px lightgray;
}
.panel {
margin-bottom: 20px;
background-color: #ffffff;
border: 1px solid transparent;
border-radius: 4px;
-webkit-box-shadow: 0 1px 1px rgba(0,0,0,0.05);
box-shadow: 0 1px 1px rgba(0,0,0,0.05);
}
.panel-default {
border-color: #dddddd;
}
.panel-group .panel {
margin-bottom: 0;
border-radius: 4px;
}
.panel-group .panel {
border-radius: 2px;
border: 0;
}
.panel-group .panel {
background-color: transparent;
}
.panel-group .panel + .panel {
margin-top: 5px;
}
.panel-heading {
padding: 10px 15px;
border-bottom: 1px solid transparent;
border-top-right-radius: 3px;
border-top-left-radius: 3px;
}
.panel-heading {
font-size: 16px;
font-weight: 700;
}
.panel-heading {
background-color: #0e3d78 !important;
}
.panel-group .panel-heading {
border-bottom: 0;
}
.panel-default > .panel-heading {
color: #555555;
background-color: #f5f5f5;
border-color: #dddddd;
}
.panel-group .panel-heading {
border-radius: 2px;
border: 0;
}
.panel-group .panel-heading {
padding: 0;
}
.collapse {
display: none;
}
h4 {
font-family: “Helvetica Neue”,Helvetica,Arial,sans-serif;
font-weight: 500;
line-height: 1.1;
color: #317eac;
}
h4 {
margin-top: 10px;
margin-bottom: 10px;
}
h4 {
font-size: 18px;
}
h4 {
font-family: “Open Sans”, sans-serif;
line-height: 1;
font-weight: 700;
margin: 0;
padding: 4px 0;
}
h4 {
font-size: 1.2em;
font-weight: 500;
color: #333;
}
h4 {
padding: 10px 0;
}
.panel-title {
margin-top: 0;
margin-bottom: 0;
font-size: 16px;
color: inherit;
}
.panel-title {
padding: 0;
}
.panel-group .panel-title {
border-radius: 2px;
border: 0;
}
.panel-body {
padding: 15px;
}
.panel-body {
padding: 0;
}
.panel-body {
padding: .5em;
}
.panel-group .panel-body {
border-radius: 2px;
border: 0;
}
.panel-group .panel-body {
background: #fff;
}
.panel-group .panel-heading + .panel-collapse > .panel-body {
border-top: 1px solid #dddddd;
}
.panel-default > .panel-heading + .panel-collapse > .panel-body {
border-top-color: #dddddd;
}
.panel-group .panel-heading + .panel-collapse > .panel-body {
border: 1px solid #ddd;
}
a {
background-color: transparent;
}
a {
color: #2fa4e7;
text-decoration: none;
}
.panel-title > a {
color: inherit;
}
a:link {
text-decoration: none;
}
a:link {
color: #0e3d78;
}
.panel-group .panel-heading a ,.panel-group .panel-title a {
border-radius: 2px;
border: 0;
}
.panel-group .panel-heading a {
display: block;
color: #fff;
padding: 15px;
text-decoration: none;
position: relative;
}
.panel-group .panel-heading a.collapsed {
background: #666;
color: inherit;
}
.panel-group .panel-heading a.collapsed {
background: #0e3d78;
color: #FFF;
}
.panel-group .panel-heading a::after {
content: ‘-‘;
position: absolute;
right: 20px;
top: 10px;
font-size: 24px;
}
.panel-group .panel-heading a.collapsed::after {
content: ‘+’;
}
a:active,a:hover {
outline: 0;
}
a:hover {
color: #157ab5;
text-decoration: underline;
}
a:hover {
color: #059ae8;
}
ul {
margin-top: 0;
margin-bottom: 10px;
}
.panel-group .panel-body ul:last-child {
margin-bottom: 0;
}
.panel-group .panel-body p:last-child {
margin-bottom: 0;
}
a:visited {
text-decoration: none;
}
a:visited {
color: #0e3d78;
}
button {
color: inherit;
font: inherit;
margin: 0;
}
button {
overflow: visible;
}
button {
text-transform: none;
}
button {
-webkit-appearance: button;
cursor: pointer;
}
button {
font-family: inherit;
font-size: inherit;
line-height: inherit;
}
.btn {
display: inline-block;
margin-bottom: 0;
font-weight: normal;
text-align: center;
vertical-align: middle;
-ms-touch-action: manipulation;
touch-action: manipulation;
cursor: pointer;
background-image: none;
border: 1px solid transparent;
white-space: nowrap;
padding: 8px 12px;
font-size: 14px;
line-height: 1.42857143;
border-radius: 4px;
-webkit-user-select: none;
-moz-user-select: none;
-ms-user-select: none;
user-select: none;
}
.btn-primary {
color: #ffffff;
background-color: #2fa4e7;
border-color: #2fa4e7;
}
.btn {
text-shadow: 0 1px 0 rgba(0,0,0,0.1);
}
.btn-primary {
background-image: -webkit-linear-gradient(#54b4eb, #2fa4e7 60%, #1d9ce5);
background-image: -o-linear-gradient(#54b4eb, #2fa4e7 60%, #1d9ce5);
background-image: -webkit-gradient(linear, left top, left bottom, from(#54b4eb), color-stop(60%, #2fa4e7), to(#1d9ce5));
background-image: linear-gradient(#54b4eb, #2fa4e7 60%, #1d9ce5);
background-repeat: no-repeat;
filter: none;
-webkit-filter: none;
border-bottom: 1px solid #178acc;
background-repeat-x: no-repeat;
background-repeat-y: no-repeat;
}
.btn {
font-family: “Open Sans”, sans-serif;
font-weight: normal;
border-radius: 0;
}
.btn-primary {
color: #fff;
background-image: none;
vertical-align: middle;
}
.btn-primary {
background-color: #0e3d78;
border-color: #0e3d78;
}
.btn:hover {
color: #555555;
text-decoration: none;
}
.btn-primary:hover,.btn-primary:active {
color: #ffffff;
background-color: #178acc;
border-color: #1684c2;
}
.btn-primary:hover,.btn-primary:active {
color: #ffffff;
}
.btn-primary:hover,.btn-primary:active {
background-color: #059ae8;
border-color: #059ae8;
}
/* These were inline style tags. Uses id+class to override almost everything */
#style-FPjs4.style-FPjs4 {
min-height:220px;
}
#style-bpoW5.style-bpoW5 {
min-height:220px;
}
#style-Ne3po.style-Ne3po {
min-height:220px;
}
#collapse1.style-6UqWC {
height: 0px;
}
#collapse2.style-K6Yft {
height: 0px;
}
#collapse3.style-ZvZcl {
height: 0px;
}
Overview:
Intercept any email-borne attack within seconds
Block email threats, including spam, phishing, business email compromise (BEC), malware, advanced persistent threats (APTs), and zero-days before they reach end-users’ Microsoft 365, Google Workspace, or Open-Xchange mailboxes. Leverage next-generation cloud-based email security solution.
Stop phishing and spoofing attempts
Minimize email risk for clients with powerful threat intelligence, signature-based detection, URL reputation checks, unique image-recognition algorithms, and machine learning with DMARC record checks.
Catch advanced evasion techniques
Detect hidden malicious content by recursively unpacking embedded files and URLs and separately analyzing them with dynamic and static detection engines.
Prevent APTs and zero-day attacks
Prevent advanced email threats that evade conventional defenses with a unique CPU-level technology able to act earlier in the attack chain to block exploits before malware is released, delivering a clear verdict within seconds.
Stop email-borne threats before they reach end-users
Malware and ransomware
Malware – including viruses, ransomware, spyware, worms, and Trojans – is most commonly delivered via malicious payloads – files and URLs. Thousands of new malware variants appear each day. Legacy solutions fall short when dealing with advanced evasion techniques and defending collaboration platforms.
Advanced Email Security helps you stop malware with multi-layered defenses, including:
- Anti-evasion – Detect hidden malicious content
- Threat intelligence – Stay ahead of emerging threats
- Anti-phishing filters – Detect malicious URLs
- Antivirus engines – Stop known malware
- Next-generation dynamic engine – Catch zero-days and APTs that evade conventional defenses
Phishing
Phishing attacks are the root of 91% of all cyberattacks, as reported by CSO Online. They leverage social engineering to deceive their target and gain access to sensitive information by employing files, URLs, and text-based techniques posing as legitimate sources.
Advanced Email Security helps prevent phishing before it reaches end-users with:
- Anti-evasion – Unpack deeply embedded, hidden phishing attempts
- URL reputation – Block known, malicious URLs based on four leading URL reputation engines
- Image recognition engine – Block unknown malicious URLs based on the images and logos used on webpages
- Threat intelligence – Combine six market-leading sources and Perception Point’s unique engine
Business email compromise (BEC)
Impersonation-based attacks trick employees into making innocent mistakes, thinking they’re communicating with a person they know. A significant part of BEC attempts do not have a malicious payload and leverage only text-based techniques, making them especially tricky to detect and prevent.
- Anti-spoofing – Prevent payload-less attacks through machine-learning algorithms with IP reputation, SPF, DKIM, and DMARC record checks
- Anti-evasion – Deep scan to detect malicious hidden content
- Payload-based protection – Reduce “further along the line” BEC attacks with threat intelligence, phishing, and antivirus engines
Internal phishing
Internal phishing can result from account takeovers, malicious employees, or even human error. Legacy technologies commonly neglect internal emails, as scanning 100% of traffic results in delays in email delivery or damages files and URLs.
The Advanced Email Security prevents account takeover attempts and internal phishing with:
- Scan 100% of traffic – Unique speed allows scanning all internal and inbound emails
- URL reputation engines – Block known, malicious URLs
- Image recognition engine – Block unknown malicious URLs based on the images and logos used on web pages
- Anti-evasion – Detect malicious hidden content
- Next-generation dynamic engine – Catch zero-days and APTs that evade conventional defenses
Zero-days and APTs
Zero-days and APTs are especially hard to catch and prevent. They can lie in wait and strike months before they’re discovered by leveraging unknown software vulnerabilities. Standard APT modules, such as sandboxes or content disarm and reconstruction solutions (CDRs), rely on known data and behaviors that evasion techniques can mask when in a sandbox.
Advanced Email Security’s market-leading technology helps you prevent zero-days and APTs:
- Next-generation dynamic scan – Stop zero-days and APTs with a unique CPU-level technology that detects and blocks advanced attacks at the exploit stage, before malware release, based on the assembly code
Evasion techniques
GEmail-borne attacks are getting trickier to detect. Attackers use evasion techniques such as new file types, link chains, malicious content hidden within clean files, stalling mechanisms that sandboxes can’t observe, ensuring the malicious payload takes action only when facing actual end-users. For conventional defenses, preventing such techniques is almost impossible as it takes too much time, money, and technological resources.
The Advanced Email Security uses unique technology to prevent evasion techniques that conventional defenses miss:
- Anti-evasion – Recursively unpack the content into smaller units which are then dynamically checked by multiple engines in under 30 seconds, compared to 20+ minutes for legacy sandboxing solutions.
Advanced Management
Streamline and automate your routine tasks via scripting and promptly close security gaps in clients’ infrastructure through patch management. Gain visibility into your clients’ software assets and data protection to ease daily tracking and planning tasks, and improve clients’ uptime by monitoring disk drives health.
- Cyber scripting
- Automated patch management
- Disk drive health monitor
Protect not just emails, but clients’ riskiest collaboration tools
Protect clients’ collaboration apps, increasingly exploited in attacks with prioritized patching and exploit prevention. Leverage Acronis Cyber Protect Cloud, integrating backup and disaster recovery, next-generation anti-malware, and cyber protection management.
| Subscription Length | 1 Year, 2 Year, 3 Year |
|---|




