Any organization that’s actively working on managing its cybersecurity risk can’t ignore the risk that goes with third-party vendors having access to its critical systems and customer data. “Up until today, organizations of all sizes have had to design and implement their own security baselines for vendors that align with their risk posture. Unfortunately, this…

The company describes itself as a protector against “content-based attacks” that come via collaboration channels, including email, cloud storage, CRM apps, and messaging platforms. Perception Point logoPerception Point says its solution can be rolled out in minutes with no change to enterprise infrastructure, and can help prevent the spread of malicious files, URLs, and block…