CAL Defense - Lifetime deal is out . Click Here

Welcome To Cyber Aeronautycs Ltd.


We are an aerospace and defense company in Bangladesh and engaged in research, design , development, manufacture, integration and sustainment of advanced technology systems, products and services.

Next Generation Cloud Email Security

Intercept Modern Email Borne Attacks Within Seconds .

Stop Phishing & Spoofing

Minimize email risks for clients with powerful

threat intelligence, signature-based detection,

URL reputation checks, unique image

recognition algorithms, and machine learning

with DMARC, DKIM, and SPF record checks.

Catch Advanced Evasion Techniques

Detect hidden malicious content by recursively

unpacking attached or embedded files and

URLs, separately analyzing each with dynamic

and static detection engines - performing

deep scanning of 100% the content.

Prevent APTs & zero day Attacks

Prevent advanced threats that evade

conventional defenses with Perception Point’s

unique CPU-level technology, which blocks

exploits before the malware is released and

delivers a clear verdict in seconds.

Solving the email security in an unique way

Gain Increased Visibility Over All Email Security Alerts & Incidents

Spam Filter

Block malicious communications

with anti-spam and reputation based filters, leveraging the combined data of several market leading technologies.

Anti Evasion

Detect malicious hidden content by

recursively unpacking the content into

smaller units (files and URLs) which

are then dynamically checked by

multiple engines in under 30 seconds

– much faster than the 20+ minutes of

legacy sandboxing solutions.

Threat Intelligence

Stay ahead of emerging threats with

the combined threat intelligence

of six market-leading sources and

Perception Point’s unique engine

that scans URLs and files in the wild.

Anti Spoofing

Prevent payload-less attacks such

as spoofing, look-alike domains,

and display name deception with

unmatched precision through

machine-learning algorithms with IP reputation, SPF, DKIM, and DMARC record checks.

Next Generation Dynamic Detection

Stop advanced attacks such as

APTs and zero-days with Perception

Point’s unique, CPU-level analysis

that detects and blocks them at

the exploit stage by identifying

deviations from normal execution

flow during runtime.

Static Signature Based Analysis

Identify known threats with best of-breed signature-based antivirus

engines enhanced with a unique tool

by Perception Point to identify highly

complex signatures.

Anti Phishing Engine

Detect malicious URLs based on

four leading URL reputation engines

in combination with Perception

Point’s advanced image recognition

technology to validate the legitimacy

of URLs.

Incident Response Service

Gain direct access to cyber analysts

who act as an extension of your

service delivery team. Monitor

all customer traffic and analyze

malicious intent with ongoing

reporting and support, including

handling false positives, remediating,

and releasing when required.

X-ray Insights

Leverage a holistic view of the threat landscape across organizations with forensics data for each email, proactive insights on threats seen in the wild, and analysis of any file or URL on which the SOC team needs forensics.

  • Malware
  • Phishing
  • BEC
  • Internal Phishing
  • Zero-days and APTs
  • Evasion Techniques
  • Account Takeover (ATO)

Malware and ransomware

Malware – including viruses, ransomware, spyware, worms, and Trojans - is most commonly delivered via malicious payloads – files and URLs. Thousands of new malware variants appear each day. Legacy solutions fall short when dealing with advanced evasion techniques and defending collaboration platforms.

Advanced Email Security helps you stop malware with multi-layered defenses, including:

  • Anti-evasion – Detect hidden malicious content
  • Threat intelligence – Stay ahead of emerging threats
  • Anti-phishing filters – Detect malicious URLs
  • Antivirus engines – Stop known malware
  • Next-generation dynamic engine – Catch zero-days and APTs that evade conventional defenses



Phishing attacks are the root of 91% of all cyberattacks, as reported by CSO Online. They leverage social engineering to deceive their target and gain access to sensitive information by employing files, URLs, and text-based techniques posing as legitimate sources.

Advanced Email Security helps prevent phishing before it reaches end-users with:

  • Anti-evasion – Unpack deeply embedded, hidden phishing attempts
  • URL reputation – Block known, malicious URLs based on four leading URL reputation engines
  • Image recognition engine – Block unknown malicious URLs based on the images and logos used on webpages
  • Threat intelligence – Combine six market-leading sources and Perception Point’s unique engine

Business email compromise (BEC)

Impersonation-based attacks trick employees into making innocent mistakes, thinking they’re communicating with a person they know. A significant part of BEC attempts do not have a malicious payload and leverage only text-based techniques, making them especially tricky to detect and prevent.

Our Email Security helps prevent impersonation attempts with:

  • Anti-spoofing - Prevent payload-less attacks through machine-learning algorithms with IP reputation, SPF, DKIM, and DMARC record checks
  • Anti-evasion – Deep scan to detect malicious hidden content
  • Payload-based protection – Reduce “further along the line” BEC attacks with threat intelligence, phishing, and antivirus engines
Internal Phishing

Internal phishing

Internal phishing can result from account takeovers, malicious employees, or even human error. Legacy technologies commonly neglect internal emails, as scanning 100% of traffic results in delays in email delivery or damages files and URLs.

Our Email Security prevents account takeover attempts and internal phishing with:

  • Scan 100% of traffic – Unique speed allows scanning all internal and inbound emails
  • URL reputation engines - Block known, malicious URLs
  • Image recognition engine – Block unknown malicious URLs based on the images and logos used on web pages
  • Anti-evasion – Detect malicious hidden content
  • Next-generation dynamic engine – Catch zero-days and APTs that evade conventional defenses
Zero-days and APTs

Zero-days and APTs

Zero-days and APTs are especially hard to catch and prevent. They can lie in wait and strike months before they’re discovered by leveraging unknown software vulnerabilities. Standard APT modules, such as sandboxes or content disarm and reconstruction solutions (CDRs), rely on known data and behaviors that evasion techniques can mask when in a sandbox.

Our Email Security's market-leading technology helps you prevent zero-days and APTs:

  • Next-generation dynamic scan – Stop zero-days and APTs with a unique CPU-level technology that detects and blocks advanced attacks at the exploit stage, before malware release, based on the assembly code
Evasion Techniques

Evasion techniques

Email-borne attacks are getting trickier to detect. Attackers use evasion techniques such as new file types, link chains, malicious content hidden within clean files, stalling mechanisms that sandboxes can’t observe, ensuring the malicious payload takes action only when facing actual end-users. For conventional defenses, preventing such techniques is almost impossible as it takes too much time, money, and technological resources.

Our Email Security uses unique technology to prevent evasion techniques that conventional defenses miss:

  • Anti-evasion - Recursively unpack the content into smaller units which are then dynamically checked by multiple engines in under 30 seconds, compared to 20+ minutes for legacy sandboxing solutions.
Account Takeover (ATO)

Account takeover (ATO)

Account takeover (ATO) has been increasingly commoditized through the cybercriminal ecosystem — whether the target is business email or a company’s bank accounts. Known also as account compromise, ATO occurs when a cyber attacker gains control of a legitimate account. Once they have control of an account, attackers can launch a variety of attacks, such as supply-chain phishing, BEC attacks, data exfiltration, financial fraud, etc. There are no preliminary signs of such an attack; in most cases, once the signs of ATO are obvious, the damage has already been done.

Our Email Security helps you to intercept account takeover attempts, at any stage — ready to prevent, detect, and rapidly respond with multiple defense layers.

  • Prevent credential theft — block phishing attempts to steal employees’ credentials with multiple engines
  • Monitor accounts for signs of compromise — analyzes end user patterns and behaviors and uses machine learning algorithms to detect anomalies that could suggest an account has been compromised
  • Instantly detect and remediate compromised accounts — ensure fast remediation and account containment by the incident response team in the event of account takeover


What features are included in Advanced Email Security?
  • Our Next Generation Email Security, powered by Perception Point, helps prevent all email-borne threats, including spam, phishing, BEC and impersonation attempts, ATO, malware, APTs, and zero days before reaching end users with multiple protection layers. It also enhances compliance and increases visibility into all actions performed by the admin users and the Incident Response team with a comprehensive audit log.

  • The anti-spam engines act as the first line of defense, applying anti-spam and reputation-based filters, including IP reputation checks, to email upon receipt — to block malicious or unwanted communication.

  • All emails are then recursively unpacked into smaller, individual components like URLs and files by anti-evasion technology. This process detects malicious embedded or hidden content. The URLs and files are separately run in multiple versions and patterns through the subsequent security layers to catch any hidden threats.

  • Next Generation Email Security leverages powerful threat intelligence from six market-leading sources, combined with Perception Point’s technology that scans URLs and files in the wild to stay ahead of emerging threats.

  • Anti-phishing engines apply URL reputation filtering from four market-leading sources, combined with a unique image recognition technology that detects unknown, malicious URLs based on logos and images used on the webpage.

  • To catch payload-less attacks (BEC), such as impersonation attempts, look-alike domains, and display-name deceptions, Advanced Email Security leverages machine learning algorithms with IP reputation, sender policy framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-Based Message Authentication Reporting and Conformance (DMARC) record checks.

  • In order to prevent ATO, Advanced Email Security stops attackers from infiltrating the organization via credential phishing, analyzes end user patterns and behaviors to detect anomalies, prevents attackers from spreading malicious content to other users, and provides incident management of every account takeover attempt.

  • Known malware is stopped with the help of best-in-class, signature-based detection technologies, specifically developed to prevent email-borne threats, that act as another layer of protection on top of users’ local anti-malware solution.

  • The last line of defense is the next-generation dynamic scanning that prevents advanced threats that evade conventional defenses such as zero days and APTs. The unique, CPU-level technology acts earlier in the kill chain than any other solution to block attacks at the exploit phase by analyzing the applications’ execution flow during runtime to identify deviations from standard flow based on assembly code.

  • Moreover, service providers have access to a dashboard that provides a holistic view of the threat landscape across organizations with forensics data for each email, proactive insights on threats seen in the wild, and analysis of any file or URL on which the service delivery team needs forensics.

  • With the incident response service, you also gain access to cyber analysts that monitor all customer traffic and malicious intent with ongoing reporting and ongoing support, including handling false positives, remediating, and releasing when required.

How easy is to migrate to the email security solution from another solution ?
  • If you choose to migrate to our Next Generation Email Security from another solution, the process of upgrading your services is as seamless as possible. We have an API-based email security technology that integrates directly into the email system without the need for any additional configuration, including configuring MX records.

  • If you already use our CAL Defense- Managed Device Protection System, implementing Email Security happens with the flip of a switch.
Will next generation email security affects email delivery ?

Due to the unmatched detection speed, which is up to a few seconds, compared to seven to 20 minutes for legacy sandboxing solutions, all emails are scanned before delivery to end users with near-zero delays to ensure proactive protection without disrupting every day business process.

What is email security ?

Email security ensures the availability, integrity and authenticity of email communications by detecting and blocking email threats to reduce the risks of email-borne attacks.

What are some types of email security threats ?

Email security threats come in many forms:

  • Spam is any type of unwanted, unsolicited digital communication that is sent out in bulk.

  • Phishing is a common attack technique that utilizes deceptive communications (including email, instant messages, SMS, and websites) from a seemingly reputable source in order to gain access to sensitive information.

  • Business email compromise (BEC) involves phishing emails that use impersonation and company knowledge to trick employees to wire money or data, or to change bank account information.

  • Account takeover (ATO) also known as account compromise, occurs when a cyber attacker gains control of a legitimate account. Once they have control of an account, they can launch a variety of attacks, such as supply-chain phishing, data exfiltration, financial fraud, etc.

  • Malware is an application written with the intent of causing damage to systems, stealing data, gaining unauthorized access to a network, or generally wreaking havoc.

  • Ransomware is a form of malware that infects systems and encrypts files. The user cannot access their data until a ransom is paid in exchange for a decryption key. Once the ransom is paid, a user can only hope that the attacker will provide the decryption key and permit them to regain access to their files.

  • Advanced persistent threats (APTs) are complex attacks intended to establish an illicit, long-term presence in a network in order to collect highly sensitive data or compromise an organization’s operability.

  • Zero-day exploits refer to a vulnerability that is actively being exploited in the wild, but is not yet known to the software provider. Thus, a software patch to fix the exploit is unavailable.

Is email security important ?
  • Email is the primary attack vector, with 94% of malware being delivered via email, according to a 2019 Verizon Data Breach Investigations Report. More recent reports from Verizon, HP and Acronis still point to email as one of the most common entry points for attacks.

  • Cybercriminals will continuously target business’ email accounts, attempting to open a backdoor and infiltrate an organization’s network. That’s why it is vital to secure your clients’ riskiest communication channel. It’s important to note that no matter how trained an employee is, they receive hundreds of emails a day and with email exhaustion, they can inadvertently click on a malicious email.

Do MSPs need email security ?
  • Amidst the rising number of digital threats, more service providers are seeing cybersecurity as their primary revenue generator. Email security is an essential service for the majority of businesses as email is still the most used communication channel and the primary channel cybercriminals attack.

  • To remain competitive and reduce security risks for clients, service providers must offer a portfolio of services with multiple defense layers, including email security. Launching such a service can help MSPs increase their client base and increase per client revenues.

Proven regulatory compliance

SOC-2 certified

HIPAA certified

CCPA compliant

GDPR compliant

How to purchase ? Please contact us via chat or the contact form


01832 644442 (Whatsapp and Call)


Level 4, Awal Center, 34, Kamal Ataturk Avenue, Banani , Dhaka-1213,Bangladesh


Aerospace & Defense Company

Our Industry


National Security




Information Technology

Financial Services


© Copyright 2022 . All Rights Reserved. Cyber Aeronautycs Ltd .

Registered in Bangladesh . Company Registration Number C-172611