Sealing Critical Gaps in Your Anti-Phishing
(It’s like having a phishing expert looking over your shoulder)
What Is Pixm…?
Average failure rate for today’s anti-phishing services. This means 15% of all bad emails make it into your users’ Inboxes
Legitimate emails that get caught in spam filters and end up in the Junk folder.This forces an employee behavior to take emails out of Junk folder and click on them
Employees that still click on phishing links and give away their passwords despite phishing training
Pixm Seals The Anti-Phishing Gaps
Easy Enterprise Deployment
Stopping Stealth Phishing Attacks
Stealth Phishing Attacks
Stealth attack when viewed from a device
Here Are Just A Few People Excited By Pixm
“Pixm’s computer vision phishing technology will revolutionize the phishing industry and provide targeted users with a new level of protection.”
“Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks”
“As a CPA firm, our clients hold us accountable for any unauthorized access to their accounts. Pixm’s use of computer vision not only protects us from phishing attacks but also verifies real login pages”
“The threat posed by phishing continues to be the largest security concern for almost every organization. The unique and cutting edge approach used by Pixm to leverage computer vision is truly revolutionary.”
“Really excited about Pixm. Most phishing solutions rely on user training or pattern based filtering at the e-mail gateway. Pixm utilizing computer vision sits on the users desktop and blocks phishing websites in real-time has a better chance of blocking phishing attacks than current technology.”
Try Pixm For Free:
No Obligation and no contracts
Verifies Real Login Pages
Works On Work & Personal Emails
Runs On All Devices
Blocks The Gaps In Existing Solutions
Just Some Of Our Mentions
Here Are A Few FAQ’s We Get A Lot:
Q – The product runs on the end point in real time – How big is the agent install?
A – As of this writing (15 Oct 2019), the MSI is about 250MB and installed on disk is ~550MB. Within the next few updates, we should be able to cut this down by 30-40%.
Q – A lot of organizations lock down certain browsers how much would that impact the agent browsers extension relationship?
A – Pixm’s functionality is triggered via the browser extension. Pixm cannot run without the browser extension being installed.
Q – What remote vehicles can be used to deploy the agent, (SCCM Tanium, other host active Pixm Agents)?
A – Pixm provides an MSI package for Windows and a PKG package for Mac.
MSI can be deployed using GPO, SCCM or any standard Enterprise Endpoint deployment mechanism.
As of this writing (15 Oct 2019), Mac’s PKG package does not support Enterprise-wide deployment. This is an active feature under development (since 99% of all our users are on Windows) and will be ready by Jan 2020.
Q – How much CPU/Memory resources are used by the agent at rest and during active “anti-Phishing” checks
A – Pixm processes only login pages (we have ways to find out if a webpage is a login page or not). If you are generally browsing (non-login pages), the CPU used is 0% and RAM Memory used is about 220MB during rest. When you visit a login page, CPU usage is around 80-90% for one second or so and then drops back down to 0%; Memory usage is around 500MB during that one second and then drops back down to 220MB. Within the next few releases, we will be able to cut down the “at rest” RAM footprint by 30-40%.
Q – If an agent becomes corrupt, does it have the ability to report that state or will it falsely report as active?
A – Can you help define what you mean by “corrupt”? Pixm does a “heart beat” check with the backend. If the application isn’t running or has an issue, the backend doesn’t receive the heart beat and will bubble up in the Admin Console as inactive.
Q – What browsers do you support?
A – We support Chrome, Firefox and IE. As of this writing (15 Oct 2019), Microsoft killed its own Edge browser and is working on a Chromium-based Edge that is still in Beta. Once it is officially launched, Pixm’s extension will automatically run on Chromium-based Edge. Though we don’t officially support, our customers get creative and use Pixm’s extension on other Chromium-based browsers such as Brave.
Q – Does the agent keep a history of events, for how long, how much space on the host is used?
A – Pixm keeps a rolling history of logs for the last 10 days locally on the endpoint. Each day’s log file is typically 0.5MB.
Q – Can active phishing attempts stopped be reported back to command and control piece in the enterprise?
A – All login pages, be it a safe/unknown/suspected-attack page, are reported to the backend immediately and available to view in the Admin Console.
Q – If a browser Sandbox is being used are links being opened within a sandbox hosted by the vendor or by the host pc?
A – Pixm doesn’t run any sandbox or any headless browser on the endpoint. Pixm is triggered after a user clicks on a link and opens the webpage in their browser.
Q – What actions happen past stopping a phish?
A – If a login page is detected as a suspected phishing attempt, Pixm “shuts down” the entire page and displays a red bar. This means the user can no longer click or type or do anything else on that page. The designated IT Admin of the customer is alerted with a phishing alert email right away and details are available on the Admin Console.
Q – How does agent updating occur, can it be controlled and monitored it in an Enterprise setting?
A – Pixm requires Local Admin rights to install or update. By default, if you install the MSI manually, Auto-update is enabled (and can be disabled in the UI if needed).
If you deploy the MSI via GPO/SCCM etc, auto-update is disabled since the user most likely would not have Admin rights.
When an update is available, IT Admins are notified by Pixm about the update. The update can be downloaded from the Admin Console and rolled out via GPO/SCCM etc.
Q – For Enterprise use is there a central command and control piece the agents report to?
A – Pixm’s application that runs on the endpoint communicates with our cloud backend for reporting all login activity, any attacks as well as to check if a URL (going to be visited by the user) is a safe or blacklisted one.
Pixm reports all login activity and ONLY login activity of a specific logged-in user to the backend. Pixm does not store or maintain the general browsing history of a user.
Pixm’s backend is a multi-tenant environment. Every Paid customer gets their own dedicated database in our backend and all their (employees’) login activity is stored in that customer’s specific database.
All login URLs are categorized as Green (Safe), Yellow (Unknown) or Red (Suspected Attacks).
Pixm provides an Admin Console that has a ton of features. Below is a screenshot.
Try Pixm For Free: