Select Page

Eliminating The Human Error In Phishing Attacks

Pixm: World’s first on-device phishing prevention at the point of click to eliminate human error

(It’s like having a phishing expert looking over your shoulder)

What Is Pixm…?

Pixm seals the anti-phishing gaps on all your devices.
We are the world’s first phishing prevention to run directly on devices and shut down phishing attacks at the point of click using AI computer vision.

See Pixm Stop An Attack:

Click Me To play


Average failure rate for today’s anti-phishing services. This means 15% of all bad emails make it into your users’ Inboxes


Legitimate emails that get caught in spam filters and end up in the Junk folder.This forces an employee behavior to take emails out of Junk folder and click on them


Employees that still click on phishing links and give away their passwords despite phishing training

I Already Have

Cloud Based Anti-Phishing

Thats Great, So do we!!
We use a popular cloud based solution for our own protection.
But there are still critical gaps in your anti phishing strategy.
Those gaps need sealing. 

Pixm Seals The Anti-Phishing Gaps

Runs on all your devices and
shuts down at the point of click
Verifies a login page is the real one and shows a green bar
Protects even when outside
the corporate network
Extends protection in personal emails and social accounts

Easy Enterprise Deployment

Central Management Console with unprecedented visibility
into all login activity

Stopping Stealth Phishing Attacks

Stealth Phishing Attacks

Phishing attacks are now stealth. The Attack webpage is visible only on the targeted victim’s device.
Stealth attack when viewed from the cloud

Stealth attack when viewed from a device

Here Are Just A Few People Excited By Pixm

“Pixm’s computer vision phishing technology will revolutionize the phishing industry and provide targeted users with a new level of protection.”

Ron Gula

Co-Founder & President, Gula Tech Adventures

“Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks”

Charles Bradley

Former NSA Senior Technology Executive

“As a CPA firm, our clients hold us accountable for any unauthorized access to their accounts. Pixm’s use of computer vision not only protects us from phishing attacks but also verifies real login pages”

Casey Ganer, CPA MBT

Manager, Accountant, Ganer + Ganer, PLLC

“The threat posed by phishing continues to be the largest security concern for almost every organization. The unique and cutting edge approach used by Pixm to leverage computer vision is truly revolutionary.”

James Rutt

CIO/CISO, The Dana Foundation

“Really excited about Pixm. Most phishing solutions rely on user training or pattern based filtering at the e-mail gateway. Pixm utilizing computer vision sits on the users desktop and blocks phishing websites in real-time has a better chance of blocking phishing attacks than current technology.”

Jonathan Klein


Try Pixm For Free:

No Obligation and no contracts

  Verifies Real Login Pages

  Works On Work & Personal Emails

  Runs On All Devices

  Easy Deployment

  Blocks The Gaps In Existing Solutions

Just Some Of Our Mentions

Here Are A Few FAQ’s We Get A Lot:

Q – The product runs on the end point in real time – How big is the agent install?

A – As of this writing (15 Oct 2019), the MSI is about 250MB and installed on disk is ~550MB. Within the next few updates, we should be able to cut this down by 30-40%.

Q – A lot of organizations lock down certain browsers how much would that impact the agent browsers extension relationship?

A – Pixm’s functionality is triggered via the browser extension. Pixm cannot run without the browser extension being installed.

Q – What remote vehicles can be used to deploy the agent, (SCCM Tanium, other host active Pixm Agents)?

A – Pixm provides an MSI package for Windows and a PKG package for Mac.

MSI can be deployed using GPO, SCCM or any standard Enterprise Endpoint deployment mechanism.

As of this writing (15 Oct 2019), Mac’s PKG package does not support Enterprise-wide deployment. This is an active feature under development (since 99% of all our users are on Windows) and will be ready by Jan 2020.

Q – How much CPU/Memory resources are used by the agent at rest and during active “anti-Phishing” checks

A – Pixm processes only login pages (we have ways to find out if a webpage is a login page or not). If you are generally browsing (non-login pages), the CPU used is 0% and RAM Memory used is about 220MB during rest. When you visit a login page, CPU usage is around 80-90% for one second or so and then drops back down to 0%; Memory usage is around 500MB during that one second and then drops back down to 220MB. Within the next few releases, we will be able to cut down the “at rest” RAM footprint by 30-40%.

Q – Does the agent keep a history of events, for how long, how much space on the host is used?

A – Pixm keeps a rolling history of logs for the last 10 days locally on the endpoint. Each day’s log file is typically 0.5MB.

Q – What browsers do you support?

A – We support Chrome, Firefox, Edge and IE. Though we don’t officially support it, our customers get creative and use Pixm’s extension on other Chromium-based browsers such as Brave.

Q – If a browser Sandbox is being used are links being opened within a sandbox hosted by the vendor or by the host pc?

A – Pixm doesn’t run any sandbox or any headless browser on the endpoint. Pixm is triggered after a user clicks on a link and opens the webpage in their browser.

Q – What actions happen past stopping a phish?

A – If a login page is detected as a suspected phishing attempt, Pixm “shuts down” the entire page and displays a red bar. This means the user can no longer click or type or do anything else on that page. The designated IT Admin of the customer is alerted with a phishing alert email right away and details are available on the Admin Console.

Q – How does agent updating occur, can it be controlled and monitored it in an Enterprise setting?

A – Pixm requires Local Admin rights to install or update. By default, if you install the MSI manually, Auto-update is enabled (and can be disabled in the UI if needed). 

If you deploy the MSI via GPO/SCCM etc, auto-update is disabled since the user most likely would not have Admin rights.

When an update is available, IT Admins are notified by Pixm about the update. The update can be downloaded from the Admin Console and rolled out via GPO/SCCM etc.

Q – Can active phishing attempts stopped be reported back to command and control piece in the enterprise?

A – All login pages, be it a safe/unknown/suspected-attack page, are reported to the backend immediately and available to view in the Admin Console.

Q – For Enterprise use is there a central command and control piece the agents report to?

A – Pixm’s application that runs on the endpoint communicates with our cloud backend for reporting all login activity, any attacks as well as to check if a URL (going to be visited by the user) is a safe or blacklisted one.

Pixm reports all login activity and ONLY login activity of a specific logged-in user to the backend. Pixm does not store or maintain the general browsing history of a user.

Pixm’s backend is a multi-tenant environment. Every Paid customer gets their own dedicated database in our backend and all their (employees’) login activity is stored in that customer’s specific database.

All login URLs are categorized as Green (Safe), Yellow (Unknown) or Red (Suspected Attacks).

Pixm provides an Admin Console that has a ton of features.

Try Pixm For Free:

About     |    Pricing     |     Blog  |   Support