Cybersecurity Breakthrough Award 2019 - Blog Post v2

Perimeter 81 Named Wi-Fi Security Solution of the Year in 2019 CyberSecurity Breakthrough Awards

Reading Time: 2 minutes

Company Wins “Wi-Fi Security Solution of the Year” Award in 2019 CyberSecurity Breakthrough Awards

Perimeter 81, the leading Zero Trust Secure Network as a Service provider, today announced that it has been named the winner of the “Wi-Fi Security Solution of the Year” award from CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies and products in the global information security market today.

The annual CyberSecurity Breakthrough Awards honor excellence and recognize the innovation, hard work and success in a range of information security categories, including cloud security, threat detection, risk management, fraud prevention, mobile security, email security and more. This year’s program attracted more than 3,500 nominations from companies across the globe.

“This prestigious recognition from the CyberSecurity Breakthrough awards inspires us to look ahead and continuously seek new, innovative ways to improve our product,” said Amit Bareket, CEO and Co-Founder of Perimeter 81. “We’re continuing to work on transforming the world of secure network access and help businesses of all industries securely move to the cloud and empower their modern, mobile workforce.”

“This award is an attestation to the hard work our team has put in the past year to make Perimeter 81 one of the leading Wi-Fi Security solutions. We are looking forward to continuing to build on this momentum in 2020 and moving forward,” says Sagi Gidali, CPO and Co-Founder of Perimeter 81.

About CyberSecurity Breakthrough Awards

Part of Tech Breakthrough, a leading market intelligence and recognition platform for global technology innovation and leadership, the CyberSecurity Breakthrough Awards program is devoted to honoring excellence in information security and cybersecurity technology companies, products and people. The CyberSecurity Breakthrough Awards provide a platform for public recognition around the achievements of breakthrough information security companies and products in categories including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Web and Email Security, UTM, Firewall and more

View the complete list of winners

About Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

 

Read More
Goldenbridge_gold19

Perimeter 81 Honored as Gold Winner in the 11th Annual 2019 Golden Bridge Awards

Reading Time: 2 minutes

TEL AVIV, Israel- Perimeter 81, the leading Zero Trust Secure Network as a Service provider, announced its Zero Trust Network as a Service solution was named a Gold Winner in the 2019 Golden Bridge Awards for Startup of the Year in Cyber Security Cloud/SaaS.

The annual Golden Bridge Awards program encompasses the world’s best in organizational performance, innovations, products and services, executives and management teams, women in business and the professions, as well as innovations, best deployments, product management, etc. from every major industry in the world. Organizations from all over the world are eligible to submit nominations including public and private, for-profit and nonprofit, largest to smallest and new start-ups. Winners will be honored in San Francisco on Monday, October 28, 2019 during the annual Red Carpet SVUS Awards Ceremony.

“We are honored to be recognized for our product innovation,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “Today, employees are working from everywhere and anywhere and are increasingly using cloud technologies. With Perimeter 81, it is our aim to help businesses seamlessly secure network, cloud and application access for the modern and mobile workforce. We are very proud to be recognized by the Golden Bridge Awards for our innovative and user-centric Software-Defined Perimeter and Zero Trust technology.”

Perimeter 81’s win adds to a list of other 2019 honors that have recognized the Zero Trust Network as a Service, including being selected by Gartner as a Cool Vendor in Network and Cyber-Physical Systems Security” and the Frost & Sullivan Software-Defined Access Technology Leadership Award.

About the Golden Bridge Awards

The Golden Bridge Awards are an annual industry and peers recognition program honoring the best companies in every major industry from large to small and new start-ups in North America, Europe, Middle-East, Africa, Asia-Pacific, and Latin-America. The Award highlights the Best New Products and Services, Best Innovations, Management and Teams, Women in Business and the Professions, Case Studies, Customer Satisfaction, and PR and Marketing Campaigns from all over the world. Learn more about Golden Bridge Awards at www.goldenbridgeawards.com

About Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

Read More
eloitte Technology Fast 500

Deloitte Names Perimeter 81 as One of the 500 Fastest-Growing EMEA Tech Companies

Reading Time: 2 minutes

TEL AVIV, Israel – Perimeter 81 announced that it has been recognized in the 2018 Deloitte Technology Fast 500™ rankings for EMEA (Europe, the Middle East and Africa). This annual ranking of the fastest-growing EMEA companies in the technology, media, telecommunications, life sciences and energy tech sectors. 

For more than 20 years, Deloitte has recognized the fastest-growing public and private technology companies globally. Award winners are selected based on percentage fiscal year revenue growth from 2014 to 2017. Perimeter 81 impressive growth nearly reached 1287% during the three-year period.

With this recognition, we are positioned as one of the fastest-growing technology companies in the network security industry. “Cloud and mobility are creating a mega shift in traditional network security,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “With Perimeter 81, it is our aim to help businesses seamlessly secure network, cloud and application access for the modern and mobile workforce. Being named by Deloitte in this prestigious list of technology companies is truly an honor and a clear example of our employees’ dedication, talent and passion for our innovative and user-centric Software-Defined Perimeter and Zero Trust technology.”

“We are proud to be recognized as an industry player whose network security solution has grown over 1200% in the past three years, it is an incredible validation for our solution and company we’ve worked hard to build.” says Sagi Gidali, CPO and Co-Founder. 

About Deloitte’s 2018 Technology Fast 500™

Deloitte’s Technology Fast 500 provides a ranking of the fastest-growing technology, media, telecommunications, life sciences and energy tech companies — both public and private — in North America. Technology Fast 500 award winners are selected based on percentage fiscal year revenue growth from 2014 to 2017.

In order to be eligible for Technology Fast 500 recognition, companies must own proprietary intellectual property or technology that is sold to customers in products that contribute to a majority of the company’s operating revenues. Companies must have base-year operating revenues of at least $50,000 USD, and current-year operating revenues of at least $5 million USD. Additionally, companies must be in business for a minimum of four years and be headquartered within North America.

Click here to see the rankings

About Deloitte

Deloitte provides audit & assurance, consulting, financial advisory, risk advisory, tax and related services to public and private clients spanning multiple industries. Deloitte serves four out of five Fortune Global 500® companies through a globally connected network of member firms in more than 150 countries and territories bringing world-class capabilities, insights and service to address clients’ most complex business challenges. 

About Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

If you’d like to receive a full tour of Perimeter 81’s award-winning Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Wework_WiFi

Weak WeWork Wi-Fi Network Security Leaves Tenants’ Records Exposed

Reading Time: 4 minutes

With the rise of the mobile and remote workforce, more and more organizations are changing from the outdated cubicle office architecture to the modern coworking space option. Coworking spaces such as WeWork and Green Space offer many different advantages for organizations, from lower office costs, flexibility in working, networking opportunities, happy hours and more. However, along with the advantages there are always some security risks.

Working out of a coworking space might save your organization money and overhead, but it’s important to consider the security implications it presents to your organization’s resources. In the case of the lead coworking space WeWork, massive security risks have grabbed the headlines over the past month.

WeWork’s Lax Wi-Fi Security

Security issues with WeWork’s Wi-Fi network were first introduced in August 2019 in a Fast Company report, which noted that the company “used the same weak passwords and outdated Wi-Fi system throughout all its branches”. WeWork’s lack of password security has gotten to the point that it has regularly been featured on the list of the worst passwords that anyone can possibly use. The report described that WeWork’s Wi-Fi weak security is “laughably weak” and “downright dangerous.”

The “laughably weak” Wi-Fi at WeWork now has resulted in exposing the sensitive documents and data of it’s New York’s Financial District members.

CNET reported that a WeWork tenant named Teemu Airamo who joined the New York shared workspace in 2015 scanned the facility’s Wi-Fi security upon arrival to ensure his organization would not be vulnerable to an attack. Airamo noticed that other companies located at the WeWork were visible on the network and were spilling out an “astronomical amount” of data.

Airamo disclosed the issue to the WeWork management, and despite the Wi-Fi security risk, WeWork never patched the vulnerability. Four years later, this Wi-Fi security risk is still intact. Airamo over the years has continued to run regular scans of the network and found that over 700 devices are leaking information from the WeWork network. The different kinds of sensitive data exposed included emails, financial records, and client databases as well as scans of people’s IDs, their bank account credentials and, quite randomly, a virtual birthday card with a cat photo of Nicolas Cage.

Public Wi-Fi Security Risks 

With 90 percent of Americans using their personal devices for work, employees are constantly at risk of accidentally opening access to company data. To fight off potential hacks on the network or the risk of exposing critical data, everyone needs a better understanding of the different security risks that correlate with using public Wi-Fi networks.

Insufficient Encryption

Many Wi-Fi hotspots have absolutely no form of encryption, or they utilize a weak WEP protocol that can result in a potential security breach.

Poor Password Protection

Wi-Fi hotspots often have widely shared passwords, or even worse, absolutely no password protection. This provides incredibly easy access to hackers to access the network and compromise your data.

Lack of Awareness

Most people are not aware of the different kinds of risks when using public Wi-Fi and assume the network must be secure. In fact, only one in three people can actually tell the difference between secured and unsecured Wi-Fi networks.

Steps to Secure Wi-Fi Network

One of the most popular network misconceptions is that free public Wi-Fi is completely secure. If you’re using public Wi-Fi without the proper protection, you’re potentially putting your organization’s sensitive data at risk. Here are a few measures you can take right now to start protecting your data on public Wi-Fi.

Browse Only over HTTPS Encrypted Sites

When you browse on a website you want to check for a green lock symbol at the start of the URL. This indicates that your traffic is being encrypted through SSL encryption technology and that the data transferred between your browser and the website is secured. However, this method is still vulnerable to SSL stripping.

Enable Two-Factor Authentication

Two-factor authentication (2FA) is a great way to prevent your accounts from being hacked. It ensures that, in addition to your username and password, a second layer of verification such as an SMS code is required. However, in the case of public Wi-Fi, this method only protects your account during the login process, so it isn’t enough to keep you safe online.

Disable Auto Join to Wi-Fi Networks

Many Wi-Fi hotspots are unsecured. However, your phone automatically remembers previous networks you’ve connected to and will reconnect to them even if you don’t interact with your phone. Since it’s important to make sure that the network you’re connecting to is authorized, reliable and trustworthy, you should disable auto-join on your device.

Authorized Access is Key

Many organizations are still relying on outdated hardware-based VPN technology for their secure network access, however, it’s not enough to fight off the new network attacks.

Secure network access must be defended and protected by adopting security strategies, like the popular Zero Trust security model, which enforces multiple layers of verification before granting resource access.

Furthermore, this breach highlights the need to embrace cloud-compatible cybersecurity solutions. According to the Cloud Security Alliance (CSA), Software-Defined Perimeters provide “the ability to deploy perimeters that retain the traditional model’s value of invisibility and inaccessibility to “outsiders,” but can be deployed anywhere – on the internet, in the cloud, at a hosting center, on the private corporate network, or across some or all of these locations.

To prevent similar risks such as WeWork’s Wi-Fi security risks, organizations should use Software-Defined Perimeter technology and the Zero Trust model to ensure secure access by authorized devices, users and locations. They should also seek services such as Perimeter 81 which include advanced or even automatic Wi-Fi security features, ensuring employee communications are encrypted across all Internet connections. With Perimeter 81, organizations can ensure that only authorized connections are being established while leaving their cloud environments completely hidden from attacks.

To learn more about Perimeter 81’s Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Cloud Security_5_Steps

5 Steps to Improving Your Cloud Security

Reading Time: 4 minutes

The adoption of the cloud has come a long way in the past decade. In the early 2010s “The Cloud” was initially introduced as a buzzword, but today most organizations are employing the cloud for their business. Seventy-two percent of all businesses globally are dependent on some form of the cloud in their daily work life and that number will increase even more for personal use. The adoption of the cloud is changing the way businesses and organizations are running globally as everyone and everything is becoming dependent on technology.

The cloud market is estimated to be worth $411 billion by 2020 and the number will only continue to increase with more and more organizations moving from on-premise to the cloud. 

While cloud usage is rapidly increasing, one of the major concerns for all organizations with the adoption of the cloud is security. Every year we are seeing a continuous increase in the number of cloud-related security breaches leading organizations to carefully contemplate whether to adopt cloud services or stay on-premises.

In the early years of cloud adoption, the cloud was less secure than we know it today. However, service providers have learned from their past mistakes and implemented new security features that can fight off different cloud risks. Better security tools and processes have been developed to make the cloud safer than on-premises solutions in many cases, but for complete cloud security, organizations need to emphasize the priority of cloud security. 

Security Has to Become a Priority 

Organizations are stepping up their adoption of cloud services and are becoming more at ease and familiar with the importance of working securely in the cloud. The reasoning behind the increasing adoption of cloud services is that organizations are implementing the common shared-responsibility model of cloud security which is the idea that organizations and their cloud service providers are in agreement to split up different responsibilities for the cloud deployment. The cloud provider will be responsible for cloud deployments such as networks and operating systems and the organizations will be responsible for the rest. Yet working with well-known cloud providers doesn’t always mean that your cloud resources are secure. It is extremely important for organizations to invest in cloud security in order to avoid security risks in their network and to defend against internal and external cloud threats. However, while this is an obvious priority for security teams, it also needs to become a priority for all employees.

The decision-makers need to have a better understanding and commitment to the importance of cloud security. Instead of just delegating every security risk to the security team, it has to become a decision maker’s issue as well because the result of failure can potentially collapse a business. Any organization may be only a data breach away from catastrophe.

5 Steps to Improving Your Cloud Security 

With the constant threats against networks and web applications increasing, it’s time for a refresher on how to secure your organization’s cloud security in just five steps.

Deploying Authentication Tools

Adopting a multi-factor authentication solution inside your organization provides another layer of security by challenging users to prove they are who they say they are. It provides IT security teams with broad visibility into the organization’s network and application. 

Encouraging your employees to sign in with one or more extra authentication tools on top of their username/password is a simple and efficient way to provide an additional layer of protection.  

Manage Your User Access

Most of your employees won’t need access to every application, resource or critical information belonging to your organization. Setting proper levels of authorization ensures that each employee can only have access and work on the applications or resources necessary for them to do their job.

Stolen user accounts are major concerns for organizations’ cloud security. This headache can be fixed if we limit what users can access. So even though we still require verification for every user, by providing employees with a minimal level of privileges, this will make it harder for hackers to access the organization’s critical resources and networks.

Monitoring User Network Activities

Real-time monitoring and analysis of network users’ activities can help you point out anomalies from the normal activity patterns of your employees. For example, unknown users logging in from unauthorized devices, IP addresses, locations and more.

Logging user data will allow you to prove to auditors that your networks and applications are secure and you can provide a full activity report at any given time and location in case of a serious breach. These irregular activities could display a potential breach in your system, and discovering them early on will allow you to fix security issues.

Encrypt Your Data

By failing to encrypt sensitive data you risk putting both your organization and customers at risk. It is the responsibility of the cloud provider to make sure that data is encrypted, and that the data can be properly decrypted once it’s taken from the cloud. 

IT teams should have the encryption and decryption keys in a secure location, and they should never be stored with the data on the cloud. This encrypted data is very hard to crack, especially if the cloud provider and organization use different encryptions on the data.

Educate Your Team 

One of the key steps for better cloud security is to educate employees. Human error accounts for 90% of data breaches and it can be very easy to accidentally introduce malware into an organization’s network. It is important to train employees on security policies and to explain the rationale behind those policies.

Employees won’t care about creating a strong password or watching for phishing emails if they don’t understand the risks behind them. You don’t need to teach employees about every technical detail in security protocols, but they should know which risks can impact their jobs. Organizations should frequently run training sessions to keep their employees up to date with security best practices. 

Secure Networks with Cloud Security

Improving your cloud security starts with prioritizing the importance of cloud adoption and the correct security hygiene throughout the organization. Start with adopting a Zero Trust Network as a Service that incorporates the Software-Defined Perimeter model such as Perimeter 81, which allows you to deploy authentication tools, manage user access and monitor network activities in all in one platform.

Your cloud security strategy should be flexible and upgraded to cope with the different security threats. By implementing the 5 steps above and utilizing a Zero Trust Network as a Service, your organization will have a more complete and secure cloud security.

 

Read More
Naas_blog

The Rise of Network as a Service

Reading Time: 5 minutes

An increase in innovation in enterprise IT is changing how companies manage every aspect of their business. At the core of this revolution is the rise of cloud computing, which is among the most significant transformations since the launch of the internet.

Before cloud computing technology was available, businesses had to manage their network and resources on-premises, with employees working from one site-centric location. Today, the IT industry is seeing a massive increase in organizations adopting cloud services that use private clouds, which are created independently and used by a single organization. 

As for employees, we are seeing an increase of over 16% of global companies fully employing remote workers on the go and thus make the adoption of the cloud a requirement for organizations moving forward. 

The global cloud computing market is estimated to be worth over $300 billion by 2022. Cloud computing has transformed IT offerings for organizations with cost-effective, scalable solutions to the various needs of the IT teams. Further, it has proven to be a critical stepping stone for the future of how organizations adopt cloud-based networks. 

Cloud Networks May Lead to More Security Issues 

The use of cloud network services is universal—we’ve seen this rise over the past decade to the point where many of our organizations couldn’t function today without the cloud. The ability to quickly upload resources, adopt new applications, and respond in real-time to end users’ tickets allows organizations to compete effectively in today’s ever-changing marketplace. The understanding that sensitive data lives in the cloud and must be protected is critical for cloud adoption growth. Critical to cloud adoption growth is the understanding that sensitive data, now lives in the cloud and must be protected. The cloud also introduces a different set of risks that need to be understood properly in order to prevent potential cyber.

The expansion of cloud services being implemented by organizations means that it can be confusing to clearly understand where and which data is being exposed to risk. Storing data without encryption and lack of multi-factor authentication for access can lead to loss of intellectual property, loss of management control, exposure to malware, compliance violations, massive data breaches with customers and partners and ultimately loss of customer trust and loss of revenue. As we learned in the Capital One data breach, we need a clear understanding of which cloud services are being used and which data is being uploaded in order to implement specific security policies.  

Organizations that introduce company-wide identity access policies provide another layer of security for their employees and their customer’s data. This is where the idea of Network as a Service is introduced. 

What is a Network as a Service?

To understand if Network as a Service is the right solution for your organization, we need to understand what it actually is and why it’s the modern solution for cloud network security. 

Network as a Service is the model of delivering enterprise network services virtually on a subscription basis. Configuring and operating business networks and protocols routers can be time-consuming and complicated. With Network as a Service (NaaS), the entire network operations can be handled by a third-party service provider, such as Perimeter 81.

Small to midsize businesses are the classic NaaS buyers, however, with the rise of SaaS and other service models, enterprises and large organizations are becoming more interested in the network model. NaaS can also be appealing to new business owners because there is no need for a large investment for traditional network hardware. This model also reduces the amount of staff time required to maintain the network and reduces the level of training and skill required of network staff.

In the NaaS business model, IT Security teams can manage the organization’s network through a portal rather than through network management tools and out of date hardware. A new virtual network can be added to the organization’s WAN by connecting it to the NaaS provider’s nearest point of presence (POP) either directly through a leased line to a nearby data center or over the internet.

Now that we’ve explained the advantages of a Network as a Service, read on to find out how this particular model can benefit your organization. 

Benefits of Network as a Service

Network as a Service will become the ideal business model for delivering scalable network services using a subscription-based application and enables vendors to scale the service by the customer needs and add new functionality and features on-demand. 

Additionally, businesses can easily deploy custom routing and user access protocols. Further, by modifying the content of the network, businesses can efficiently implement advanced network services, such as in-network data aggregation, redundancy elimination and more. 

Here are some key benefits when implementing a NaaS for your business:

Reduced Costs

Implementing a Network as a Service reduces many IT costs including infrastructure, hardware, software, operations, and maintenance. The lowered expenses are due not only to outsourcing but also to the knowledge and expertise that NaaS providers can bring to the table. The right NaaS partner can make the transitional period as smooth as possible, minimizing expenses and mistakes as you implement new processes and equipment.

Continuous Maintenance 

Network as a Service provides a continuous monitoring service to ensure that threats are easily preventable, and notifications can often be configured so that major issues can be identified and resolved.

Enhanced Security

With Network as a Service, service providers can protect and secure sensitive data, applications, and resources. 

Increased Levels of Uptime  

Many Service Level Agreements (SLAs) are created with managed network service providers that guarantee levels of their availability, network uptime, and response and resolving services for addressing network issues. Employing a Network as a Service with a reputable provider is an easy way to ensure these service level guarantees, and provide organizations with confidence that they have a dependable and stable communications system.

The Future of Network as a Service

Software-defined wide area networks have opened new opportunities for network service providers to offer Network as a Service to more enterprise businesses. While organizations today are expanding globally, relying on data and applications on the cloud and driven by the mobile workforce, SD-WAN is addressing the right IT needs. This new network service approach allows security vendors to provide one network with one security framework for all users and applications, which makes IT leaner, more agile. While a software-defined wide area network has played as a strong variable with today’s evolution of the wide-area network, it has successfully encouraged businesses to adopt Network as a Service by bringing a new vision for networking and security to today’s business.

When looking into the future of Network as a Service, another phase is now developing. While still being defined, some of the attributes that are emerging include the expansion of running Network as a Service workload in public clouds.

The transition of running cloud services in the public cloud domain will likely be a gradual process, but there is already an initial demand for this capability for applications. The attraction here is that the public cloud is well-suited to deliver any service that requires cloud computing. 

As a result, future phases of NaaS will continue to expand with the increasing adoption of cloud services. Every business will have its own strategy for migrating to the internet. However, given the fact that Network as a Service is always evolving with the cloud, IT managers will have a lot of different network options moving forward.

We hope you found this post helpful! If you’d like to learn more about the many advantages of a Zero Trust Network as a Service, check out our blog 5 Non-Disruptive Tips to Get Started with Zero Trust Network Security.

Read More
IT World Awards Blog Post

Perimeter 81 Continues Winning Streak with 12 Awards in the 14th Annual IT World Awards

Reading Time: 3 minutes

Perimeter 81, the leading Zero Trust Secure Network as a Service provider, has been named the winner of twelve different awards in the 14th Annual Network Products Guides 2019 IT World Awards. The wins include Gold for Fastest Growing IT Company of the Year | 11 – 2,499 Employees and Silver for Startup of the Year | Israel. Additionally, Sivan Tehila, Perimeter 81’s Director of Solution Architecture, was recognized in the category of Woman in Information Technology for her work in promoting women in cybersecurity.

The IT World Awards is the Information Technology (IT) industry’s premier excellence awards program honoring achievements in every facet of the IT industry. An annual achievements and recognition awards program with active participation from a broad spectrum of industry voices, the coveted annual IT World Awards recognition program encompasses the world’s best in organizational performance, products and services, hot technologies, executives and management teams, successful deployments, product management and engineering, customer satisfaction, and public relations in every area of IT.

“This prestigious recognition from IT World Awards inspires us to look ahead and continuously seek new, innovative ways to improve our product,” said Amit Bareket, CEO and Co-Founder of Perimeter 81. “We’re continuing to work on transforming the world of secure network access and help businesses of all industries securely move to the cloud and empower their modern, mobile workforce.”

“I’m honored and humbled to be included in an award celebrating such powerful and inspiring women in tech,” said Sivan Tehila, Director of Solution Architecture of Perimeter 81. “It’s exciting to be recognized for my work promoting women in cybersecurity, and I hope I am motivating more women to join the field.”

The full list of awards Perimeter 81 received includes:

Fastest Growing IT Company of the Year | 11 – 2,499 Employees – Gold
Startup of the Year | Israel – Silver
Women in Information Technology | 11 – 2,499 Employees – Bronze, recognizing Perimeter 81’s Director of Solution Architecture Sivan Tehila
Company of the Year | Information Technology Software | 11 – 2,499 Employees – Bronze
Company of the Year | Security Cloud/SaaS | 11 – 2,499 Employees – Bronze
Company of the Year | Security Services | 11 – 2,499 Employees – Bronze
Startup of the Year | Information Technology Software – Bronze
Startup of the Year | Security Cloud/SaaS – Bronze
Startup of the Year | Security Software – Bronze
Hot IT Company of the Year | Information Technology Software – Bronze
Hot IT Company of the Year | Security Cloud/SaaS – Bronze
Hot IT Company of the Year | Security Software – Bronze

About NPG’s IT World Awards

As the industry’s leading technology research and advisory publication, Network Products Guide plays a vital role in keeping decision-makers and end-users informed of the choices they can make in all areas of information technology. The Annual IT World Awards is part of the SVUS Awards® recognition program from Silicon Valley in the United States of America which also includes other programs such as CEO World Awards, Consumer World Awards, Customer Sales and Service World Awards, Golden Bridge Awards, Globee Awards, Info Security PG’s Global Excellence Awards, Pillar World Awards, PR World Awards, and Women World Awards. 

View the complete list of winners

About Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

If you’d like to receive a full tour of Perimeter 81’s award-winning Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Team_BH

Black Hat 2019: Network Security and Beyond

Reading Time: 3 minutes

The 2019 Black Hat USA conference may have come and gone, and we’re thrilled to report a successful and productive (and fun!) experience at one of the industry’s top security conferences. Black Hat is still at the top of our minds, thanks to over one thousand network security conversations that took place at our booth. 

Join us as we look back on last week’s event from start to finish, sharing our key learnings, conversations and booth activities.

Simon Says: Visit Perimeter 81’s Booth

We went all out at Black Hat – we had extensive demos so attendees could walk through our Zero Trust Network as a Service solution and all of its capabilities.

We also made sure that guests were in for some fun! Attendees who stopped by our booth experienced nostalgia by playing the game Simon Says. Each participant that successfully made it to the second stage of the game was automatically entered into a raffle for great prizes. Winners received wireless headphones, retro puzzles, and portable record player.

winners_conference_photos

Presenting at the SentinelOne Booth

Our CEO and Co-Founder Amit Bareket presented at SentinelOne’s booth where he discussed our latest partnership with SentinelOne. The new partnership provides a wide range of businesses, from midsize companies to Fortune 500s, with unified network and endpoint security, ensuring more effective threat defense for the cloud and mobile-first world.

The new integration with SentinelOne’s next-gen solution ensures that endpoints are fully compliant and protected before they join Perimeter 81’s secure cloud-based network.

BH_Amit

Mirage of Industry Experts

During the week of Black Hat, thousands of security experts converge together in Las Vegas to get a better understanding of the security trends in 2019 and forward. This presents a great opportunity for customers and vendors to meet industry experts in person. Our Director of Solution Architecture, Sivan Tehila, had the pleasure of meeting with Richard Stiennon the author of Secure Cloud Transformation: The CIO’S Journey While talking to Richard, Sivan presented our solution and explained how it fulfills the vision of his great book.

Sivan_BH

On the second day of Black Hat, David Spark stopped by our booth for a great conversation about network security. David is the host of one of our favorite podcasts: CISO/Security Vendor Relationship Series.

David_Spark_BH

Great Conference to See Customers

One of the best parts of attending Black Hat has been the opportunity to meet with our amazing clients. Even if it’s just a quick hello or a longer conversation, it’s great to be acknowledged by your customers. While at the conference we had great conversations with eight different customers and each conversation provided us with real-time customer insights of our solution.

Synack_BH

Meeting the Synack team at the Perimeter 81 booth

The ETS-AV team discussing Perimeter 81   

Tessitura Network_BH

Catching up with Tessitura Network at the Perimeter 81 booth

Until Next Time

When it was all said and done, it was a very enjoyable and exciting week, filled with great activities, the opportunity to meet up with old colleagues, and the chance to make some new connections. A big hats-off to everyone who helped make Black Hat 2019 a huge success! We look forward to seeing you at another industry event soon.

Team_BH

Read More
AWS_Marketplace

Perimeter 81 Is Now Available on the AWS Marketplace

Reading Time: 2 minutes

Securing your network access just got easier. Today, we’re pleased to announce that our Zero Trust Network as a Service is now available on the AWS marketplace. Now you can subscribe to Perimeter 81 directly through AWS Marketplace and manage your organization’s subscription through AWS. You can see our listing and subscribe here.

About the AWS Marketplace

The AWS Marketplace is an online store that helps customers discover, purchase, migrate and immediately start using the software and services they need to build products and run their businesses.

A major benefit of the AWS Marketplace is that it is easy to integrate products in your AWS infrastructure. SaaS subscriptions allow AWS customers to not only have a single place to select AWS third party integrated solutions but also to be billed through their AWS account.

AWS Marketplace SaaS subscriptions simplify the process of improving your AWS infrastructure. Thus, allowing you to consolidate the billing of the SaaS products you integrate with your AWS Infrastructure. Now, Perimeter 81 is one of those products.

Benefits of Perimeter 81 with AWS

With our ongoing relationship with AWS as an Advanced Technology Partners and the opportunity to offer Perimeter 81 in the AWS Marketplace, AWS users now have the ability to simply secure their cloud, network, and application access. By utilizing the zero-trust and Software-Defined Perimeter models, Perimeter 81 ensures secure, policy-based access to AWS resources with a cloud-based network hub.

With Perimeter 81’s unified management platform, IT security & DevOps professionals can easily allow AWS users to connect into AWS VPCs and segment team member access based on group policies. Perimeter 81 integrates with Identity Providers, including Okta, GSuite, Microsoft Azure AD, and Active Directory/LDAP. Additionally, we offer a built-in two-factor authentication through SMS/push notification, Google Authenticator and Duo Security.

For interconnectivity with your AWS environment or any other cloud or on-premise environments, Perimeter 81 admins can choose to add a Perimeter 81 Connector to interconnect cloud environments, or an IPsec Site-to-Site Tunnel, to create a secure communication link between two different networks located at different sites.

Once private networks and gateways are deployed, team members – whether they are working in the office or on the go – can quickly and securely access AWS resources with single-click client software which is available for Windows, Mac, iOS and Android. Perimeter 81 admins can audit team activity and enjoy full network visibility with the platform’s Activity Log.

Getting Started with AWS 

Perimeter 81 offers AWS customers a secure usage of AWS services. That means customers must provide their own security through authentication and user access control in order to protect their Amazon cloud environment.  

We understand the impact of cloud migration, which is why we offer an easy-to-use, scalable cloud security solution that provides simple and cost-effective access control and monitoring for your entire security landscape.

If you’re just starting out with Perimeter 81 you can sign up through the AWS Marketplace and have the account connected from the get-go. If you’re already a Perimeter 81 user, you can subscribe through the Marketplace and it will direct you to the login view, which will connect your AWS account once you insert your credentials.

To learn more about how you can secure your Amazon Web Services with Perimeter 81, visit our listing on AWS Marketplace.

Read More
Capitol One Breach

The Capital One Data Breach: How Crisis Could Have Been Averted

Reading Time: 3 minutes

One of the largest hacks in 2019 was made by a former Amazon employee who stole credit card data, including 80k bank account numbers and 140k Social Security numbers affecting millions of Americans and Canadians. Here’s how this crisis could have been averted.

The largest category of information which was accessed is related to consumers and small businesses who applied for credit cards between 2005 and early 2019, according to a statement from Capital One. 

The stolen information included names, addresses, postal codes, phone numbers, email addresses, dates of birth, and self-reported income, as well as other bits of important data that may be used by criminals to carry out fraud. 

Who Let the Data Out?

The cause of the breach was a cloud firewall configuration vulnerability, which Capital One said it has since fixed. The unauthorized access took place on March 22-23, 2019 when the attacker exploited a firewall misconfiguration which permitted commands to reach the impacted server. 

This exploit allowed a hacker to execute a series of commands on the bank’s servers. Once through the perimeter, the intruder commandeered the credentials for an administrator account, gaining access to Capital One’s data stored on their AWS servers. The file contained code for three commands:

The first command obtained security credentials from an administrator account that had access for web application firewalls. The second listed the number of buckets or folders of data in an Amazon Web Services (AWS) database. The final command by the hacker was to copy the data from the Capital One repository. After successfully exfiltrating the data from Capital One’s servers, the hacker posted the stolen data to GitHub for a brief while before dropping a dime on herself on Slack. Despite her use of tools aimed at keeping her anonymous, it created a digital trail for their potential arrest. 

Is Capital One to Blame? 

Data breaches on cloud storage services are occurring more often, primarily because more companies are using the cloud and attackers are seeing this as a fruitful platform. Despite the migration to cloud services, companies are still responsible for their own security even on the cloud. When implementing a cloud storage service there are many financial and logistic benefits but companies must not forget the importance of cloud storage security. 

There is no denying that cloud computing is the way of the future, but when financial institutions that house so much sensitive customer data approach the cloud, implementing the proper security measures is an absolute must. In the case of the Capital One breach, despite being cloud innovators, security wasn’t up to par.   

Capital One has been a major advocate in the banking world for cloud services. The company is migrating more of its applications and data to the cloud and plans to be done with its data centers by the end of 2020. Other financial institutes have been more cautious of implementing cloud services, largely for security reasons.

Cloud-hosting services such as AWS are very appealing to companies looking to cut costs as data centers carry a hefty price tag, often tens of millions of dollars. When it comes to data security, AWS, like most providers, the cloud storage model is the Shared Security Responsibility model. This assures certain layers of infrastructure and software security, but the customer is ultimately responsible for how data is used and accessed.

Clearly, there were mistakes with how Capital One was protecting this AWS bucket as it appears someone was able to access the data it contained pretty easily. The Capital One breach is proof that companies have a lot to learn when it comes to deploying security technology effectively and especially the importance of access to cloud storage must be defended and protected by adopting security strategies.

Stay on Top with Secure Network Access 

Many organizations still rely on outdated hardware-based VPN technology with a distributed management system and other complicated client applications. These systems are complex, costly, require extensive management, and most notably, they are not cloud-friendly.

Access to cloud storage must be defended and protected by adopting security strategies, like the Zero Trust security model, which enforces multiple layers of verification before granting resource access. Furthermore, this breach highlights the need to embrace cloud-compatible cybersecurity solutions. 

To prevent similar risks such as the Capital One breach, organizations should use Software-Defined Perimeter technology and the Zero Trust model to close their cloud environments and SaaS services so that they can only be accessed by authorized devices, users and locations.

The shift to the cloud is inevitable, so it is key that financial institutions also adopt cybersecurity services that are well designed to integrate with major cloud providers. Our solution is based on the Zero-Trust security model and allows direct access to cloud resources and applications while evaluating the user permissions and related metadata. With Perimeter 81, organizations can ensure that only authorized connections are being established while leaving their cloud environments completely hidden from attacks.

To learn more about Perimeter 81’s Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
press release image

Perimeter 81 Partners with SentinelOne to Deliver Fully Automated, Zero Trust Network Security and Endpoint Protection

Reading Time: 2 minutes

TEL AVIV, IsraelJuly 30, 2019 /PRNewswire/ — Perimeter 81, a pioneer in Zero Trust software-defined network access, has partnered with SentinelOnethe autonomous endpoint protection company. The partnership will provide a wide range of businesses, from midsize companies to Fortune 500s, with unified network and endpoint security, ensuring more effective threat defense for the cloud and mobile-first world.

“We’re proud to have helped hundreds of clients ensure simplified, Zero Trust access to their on-premise and cloud environments with our Zero Trust Network as a Service. Now we would like to create an even greater impact,” said Amit Bareket co-founder and CEO of Perimeter 81. “By partnering with world-class cybersecurity vendors like SentinelOne, we look forward to extending the power of our offering in order to provide a comprehensive set of secure network capabilities: Zero Trust Access, Web Security and Global Interconnectivity. The combination of endpoint security and compliance enabled by this partnership is a crucial part of ensuring holistic protection for the Secure Network as a Service.”

“Perimeter 81 helps organizations adopt a Zero Trust architecture, and the combination of our solutions delivers tremendous efficacy in securing the modern enterprise,” said Daniel Bernard, CMO, SentinelOne. “With SentinelOne’s ability to protect every device across the evolving enterprise network, from standard desktop and laptop to IoT, customers can trust the endpoint security of Zero Trust models.”

The rapid rise of Cloud and Mobility has created a mega-shift in the cybersecurity landscape. By 2020, IDC (International Data Corporation) research has indicated that mobile workers will make up nearly 75% of the US workforce1, and worldwide spending on public cloud computing is expected to reach 162 billion USD2. The sheer number of widely distributed network endpoints and the shift from the static, HQ-centered network to the dispersed, user-centric network, pose new and evolving security challenges for today’s organizations, leaving the traditional, 30-year-old network security appliances obsolete.

Perimeter 81’s award-winning Zero Trust Network as a Service is among the first solutions to provide fully customized and automated secure network infrastructure deployment in one holistic platform. The service seamlessly applies adaptive policies based on device, identity and location, so that only authorized users are granted access to critical corporate resources. The integration with SentinelOne’s next-gen solution, which autonomously defends every endpoint against every type of attack at every stage in the threat lifecycle, ensures that endpoints are fully compliant and protected before they join Perimeter 81’s secure cloud-based network.

To see Perimeter 81 and SentinelOne’s joint collaboration in action, visit the SentinelOne Black Hat Booth (#222, BMR 716) at 12:00 PM on Wednesday, August 7, 2019 or 3:00 PM on Thursday, August 8, 2019 for a live demo and interactive presentation.

About SentinelOne

SentinelOne delivers autonomous endpoint protection through a single agent that successfully prevents, detects, responds, and hunts attacks across all major vectors. Designed for extreme ease of use, the S1 platform saves customers time by applying AI to automatically eliminate threats in real-time for both on-premise and cloud environments and is the only solution to provide full visibility from edge to cloud across the network.

About Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

Read More
press release image

Perimeter 81 Amplifies Its Global Reach with Ingram Micro Cloud Distribution Agreement

Reading Time: 3 minutes

TEL AVIV, IsraelJuly 23, 2019 /PRNewswire/ — Perimeter 81, a leading provider of software-defined network security solutions, today announced a distribution agreement with Ingram Micro, Inc. to offer its cutting-edge Zero Trust Network as a Service to resellers through the Ingram Micro Cloud Marketplace.

A finalist from Ingram Micro’s Comet Competition in 2018, Perimeter 81 was recently recognized as a Gartner Cool Vendor for “Cyber-Physical Systems and Network Security” and selected by Frost & Sullivan as a Best Practices Award Winner for Software-Defined Access Technology Leadership. Perimeter 81’s Zero Trust Network as a Service is among the first to provide fully customized and automated secure network infrastructure deployment in one holistic platform. The B2B SaaS solution transcends the complex and hardware-based legacy network appliances of the past by seamlessly ensuring secure employee access to critical corporate resources — whether these resources are located on-premises or in the cloud.

“With the rapid rise of telecommuting, personal work devices, and cloud-based services, Perimeter 81’s simplified, software-defined and user-centric approach to network security is a must for today’s modern workforce,” said Sagi Gidali, co-founder and CPO of Perimeter 81. “We want to help as many businesses as possible more easily and efficiently secure their ever-expanding corporate networks and we’re confident that with Ingram Micro’s unparalleled reach and vast expertise in cloud-delivered services, we will greatly advance our efforts to achieve this goal.”

Ingram Micro delivers a full spectrum of global technology and supply chain services to businesses around the world. The Ingram Micro Cloud Marketplace is an ecosystem of buyers, sellers, and solutions that enables channel partners and professionals to purchase, provision, manage and invoice with efficiency, confidence and ease. It removes the complexity in procurement, management and support that is too often inherent in cloud technologies, and enables partners to manage the complete end-customer subscription lifecycle from a single, automated platform that is provided and supported by Ingram Micro.

“Our customers are eager to adopt more manageable and cloud-compatible software security solutions and Perimeter 81 meets this growing demand,” said Michael Kenney, Vice President of Strategy and Corporate Development. “We are excited to broaden the portfolio of cloud services by adding Perimeter 81 to our Cloud Marketplace, which is now being used by more than 55,000 technology partners around the world to manage nearly four million fully-automated seats.”

Some of the highlights of Perimeter 81’s distribution agreement with Ingram Micro include:

  • Resellers can now be at the forefront of a critical cybersecurity market transformation powered by software-defined Security as a Service solutions.
  • For the first time, network managers can leverage a single, multi-tenant platform to build, manage and secure their critical network infrastructures.
  • Through access to Perimeter 81’s Zero Trust Network as a Service, organizations can more easily ensure their valuable on-premises resources, cloud environments and business applications remain fully secured.
  • IT departments can dramatically reduce overhead costs by eliminating the expensive hardware and manual configurations required by legacy solutions.

About Ingram Micro

Ingram Micro helps businesses realize the promise of technology. It delivers a full spectrum of global technology and supply chain services to businesses around the world. Deep expertise in technology solutions, mobility, cloud, and supply chain solutions enables its business partners to operate efficiently and successfully in the markets they serve. Unrivaled agility, deep market insights and the trust and dependability that come from decades of proven relationships, set Ingram Micro apart and ahead. Discover how Ingram Micro can help you realize the promise of technology. More at www.ingrammicro.com.

About Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers. To learn more visit www.perimeter81.com.

Read More
press release image

Perimeter 81 Launches Zero Trust Application Access

Reading Time: 2 minutes

TEL AVIV, IsraelJuly 16, 2019 /PRNewswire/ — Perimeter 81, the leading Zero Trust Secure Network as a Service provider, announced today that it has officially unveiled its new cornerstone solution: Zero Trust Application Access. The service is designed to meet the demands of today’s ever-expanding modern network and ensure fully secured, isolated and agentless access to an organization’s critical web applications, secure shell (SSH), remote desktop (RDP), virtual network computing (VNC) and Telnet in an emulated, streamlined and seamless way, regardless of where employees connect.

Zero Trust Application Access employs multiple layers of user trust and device trust policy validation to authorize employees before granting them swift access to applications in a session that is fully audited and can be recorded and monitored. The solution secures the network, employees, and applications using Zero Trust guidelines, and isolates the applications from the network at all times.

“The corporate network we see today is increasingly user-centric rather than site-centric, and with the proliferation of software services like web applications, IT security professionals are dealing with a rapidly increasing attack surface,” said Amit Bareket, Perimeter 81 co-founder and CEO. “Our Zero Trust Application Access solution simplifies the security measures required by these numerous and widely distributed web services with a unified, multi-tenant and holistic platform that provides full visibility, high availability and precise access control based on user and device trust.”

Perimeter 81’s Zero Trust Secure Application Access complements its Zero Trust Network Access solution, which ensures simple, segmented and secure access to any cloud environment or LAN, including all ports and all protocols, through a secure network layer and single-click, cross-platform applications. With Zero Trust Secure Application Access and Zero Trust Network Access, Perimeter 81 is now among the first Networks as a Service to deliver a complete Zero Trust network security platform for both managed and unmanaged devices as a cloud service.

Perimeter 81 plans to follow up today’s launch by adding further cybersecurity services like Web Security and Branch & Cloud Interconnectivity in order to deliver a fully holistic, unified and user-centric Network Security as a Service platform.

“Our ultimate aim is to build a customizable one-stop-shop for networking cybersecurity, in which one platform, one agent, and one cloud network are used to consume multiple cybersecurity solutions,” added Bareket. “The launch of Zero Trust Application Access is a key step in our efforts.”

About Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

Read More
Zero Trust Application Access Solution

Perimeter 81 Launches New Zero Trust Application Access Solution

Reading Time: 2 minutes

We’re excited to announce that we have officially launched our new solution: Zero Trust Application Access. This new solution will allow our customers to provide their workforce with secured, Zero Trust access to popular web applications —  without an agent. 

Our new Zero Trust Application Access solution seamlessly employs multiple security layers of user trust and device trust policy validation. With the Zero Trust Application Access solution, employees are validated and granted quick access to applications in a session that will be fully audited and can be recorded and monitored.

Zero Trust Application Access allows you to easily manage application access by creating customized policies with a more granular authentication approach. By applying user identification rules, you can seamlessly and continuously protect your organization’s applications. The identification access rules can be based on network, device, location, work schedule and connection time.

Secure Application Access

Our new Zero Trust Application Access solution is designed to meet the demands of today’s ever-expanding modern network and ensure fully secured, isolated and agentless access to an organization’s critical web applications.

With Zero Trust Application Access you’ll now have: 

  • Fully Audited Access: Secure application-level access by fully auditing, recording and monitoring each session.  
  • Application Deployment Access: Based on customized protocols, organizations can deploy four types of applications: secure shell (SSH), remote desktop (RDP), virtual network computing (VNC) and Telnet.
  • Identification Policy Rules: User identification rules seamlessly and continuously protect your organization’s applications.
  • Advanced Threat Protection: Comprehensive protection against both known and unknown threats, including threats on mobile devices.

Zero Trust Access Principles 

Conventional security models assume everything “on the inside” can be trusted, which is why these legacy technologies are, for the most part, no longer effective. Our new service secures the network, employees, and applications by applying Zero Trust guidelines that isolate applications from the network at all times. 

With unparalleled visibility, control, and threat protection, our Zero Trust Application Access provides a completely transparent experience for all users without needing to modify existing networks.

By implementing Perimeter 81’s Zero Trust Application Access, our customers can experience several technical and business advantages, including:

  • Mitigating Data Loss: Dramatically enhance your security posture and mitigate data loss via visibility, safe enablement of applications and threat prevention.
  • Increasing Efficiency: Simplify compliance with highly effective trust boundaries by segmenting sensitive resources into many small perimeters that are secured based on user permissions.
  • Enabling Mobility and Virtualization: Increase the ability to accommodate transformative IT initiatives such as cloud computing, infrastructure virtualization, user mobility, social networking and more. 
  • Reducing TCO: Reduce total cost of ownership (TCO) for IT security by replacing disconnected point products with a single, consolidated security platform. 
  • Increased Visibility: With audited access to cloud environments, applications and local services, Perimeter  81’s Zero Trust Application Access increases security, monitoring and visibility while reducing help-desk support.
  • Increased Security: By encrypting all data and filtering unwanted traffic, organizations can prevent sophisticated cyber threats from penetrating perimeter defenses. 

Perimeter 81 Zero Trust Application Access complements our Zero Trust Network Access solution, which ensures simple secure access to any cloud environment or LAN. With Zero Trust Secure Application Access and Zero Trust Network Access, Perimeter 81 is now among the first Networks as a Service to deliver a complete Zero Trust network security platform for both managed and unmanaged devices as a cloud service.

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected].

If you don’t currently have an account and would like to experience a full tour of our platform, be sure to request a complimentary demo.

Read More
5 Network Security Mistakes

5 Network Security Mistakes Your Employees are Still Making

Reading Time: 4 minutes

Network security breaches are frequently grabbing the headlines, often with the same angle of how big was the hack, who was affected and what information was taken. The majority of the time, the source of the hacks tend to be influenced by which actor or which technical error occurred. While these data breach stories grab readers attention, we need to rethink how these kinds of hacks really occur.

5 Network Security Mistakes Your Employees are Still Making

Today, companies are increasing their cybersecurity budget by implementing different security solutions to fight off hackers. This is good news as we are not just depending upon best practices. However, there is one security patch that can never be fully fixed the errors committed by the company’s employees.

Every organization is aware of the risk of human error. Employees occasionally commit mistakes, which can hurt the network of their company. However, not all organizations realize how dangerous human errors can be when it comes to the network security of the organization. 

So how do you help lead your employees past some of the common and painful network security mistakes?

Here are the 5 most common network security mistakes by your employees and how to fix them.

1. Using Weak Passwords

One of the most common network security threats is the usage of weak passwords. When passwords are not set using the correct procedures, they can be easily hacked by external actors which will allow them to infiltrate the company‘s network.

Passwords are considered one of the most common forms of security, and they can be highly effective when used properly to protect the privacy of data stored on servers across the network. The use of weak passwords can easily be resolved by educating employees about strong passwords and the part they play in keeping hackers away. For critical and sensitive business data, implementing a stronger password-protection system like periodic expiration of the password and multi-factor authentication can provide an additional layer of security against hackers.

2. Using a Traditional VPN

More and more companies have adopted remote workers and the migration of their critical applications to the cloud. Traditional VPN services are too tolerant, allowing staff to access their company’s network for their day-to-day work. As a result, these resources assume unwarranted visibility and become more receptive to compromise.

Instead of providing your employees with a traditional VPN, you should adopt an organization-wide Software-Defined Perimeter solution. Implementing a Software-Defined Perimeter will allow you to restrict network access and provide customized, manageable and secure access to networked systems. 

Traditional security models are designed to protect the perimeter to fight off threats that try to exploit your company’s network. By implementing the Zero Trust need-to-know model, each employee will gain a customized secure connection to their organization’s resources requiring access.

3. Using Unknown Devices

Employees tend to make the mistake of sharing external USB devices or using unauthorized devices which can be plugged-in any machine on the network. In addition, some employees make the potentially harmful mistake of plugging in unknown USB drives into their laptops that they find around the office.

These devices may contain a virus that could spread from one infected computer to another. Employees should refrain from using these kinds of devices that were not authorized by the administrators of their network. Organizations should set up company policies that prohibit employees from using their own devices which might have been controlled remotely by a hacker.

4. Using Free WiFi Hotspots for Work

Public Wi-Fi hotspots are convenient when abroad on vacation, at a cafe, and at the airport. Remote workers and employees who frequently travel for business often take advantage of public Wi-Fi to work on the go. However, connecting to public Wi-Fi for accessing your company’s network can prove risky to your employees as these networks are easy to hack. Hackers can easily gain access to the company’s confidential and sensitive data.

Hackers can also use public Wi-Fi hotspots to install malware on the mobile devices of those employees who have enabled file-sharing on their system. To fight off the hackers, organizations should advise employees to avoid using public Wi-Fi networks to connect to corporate resources without a secure network as a service solution.

5. Unauthorized Application Installation

Another common security threat by your employees is the installation of unauthorized applications on the company’s network. This can be a critical threat to a company because it just takes a few small installation steps for a small program to take control of the whole network.

This can easily be fixed by revoking administrative access for most employees. Another way to fix this type of threat is by training employees the importance of third-party credibility and authenticity. This can be enough to make employees aware of the threats posed by the installation of unauthorized applications.

Moving Forward 

The human factor is one of the main issues in ensuring the security of corporate systems. More and more often attackers choose to slip into the corporate network by attacking the employees, rather than hacking into the infrastructure directly from outside the perimeter.

To prevent attackers from getting inside your company’s infrastructure, your organization’s employees should be properly educated about security and the risks involved. By properly educating your employees with network security best practices, they will provide an additional layer of defense against hackers attempting to gain access to your network.

We hope you found this post helpful! Feel free to share any network security mistakes that you have witnessed in the comments section below. If you’d like to learn more about the many advantages a Zero Trust Network as a Service, check out our blog 5 Non-Disruptive Tips to Get Started with Zero Trust Network Security.

Read More
Welcome_Sivan_Tehila

We Are Excited to Welcome Sivan Tehila, Perimeter 81’s New Director of Solution Architecture

Reading Time: 1 minute

Sivan Tehila, Director of Solution Architecture at Perimeter 81, is a cybersecurity expert with over 13 years of experience in the industry. She served in the Israel Defense Forces as an Intelligence Officer and then in various field positions including CISO of the Research and Analysis Division and Head of the Information Security Department of the Intelligence Corps. Sivan was honorably discharged as a Captain.

Sivan Tehila blog post

After her military service, Sivan worked as an Information Security Officer and profiler at defense technology company RAFAEL and as a cybersecurity consultant for the Israel Railways. During the last two years, Sivan has dedicated herself to promoting women in Cybersecurity. As part of this initiative, she founded the Leading Cyber Ladies community in NYC and Cyber19w in Israel.

Sivan’s impressive record in cybersecurity, highly driven social impact and information security experience has prepared her to successfully lead Perimeter 81’s client architecture solutions and technological partnership development.  

Sivan is native to Israel but has recently relocated to NYC. Her hobbies include stand up paddle (SUP) surfing, her social life and spending her free time as a certified aerobics instructor.

“I believe Perimeter 81 is a smart solution for any organization looking for cyber defense protection in the category of SDP. In this age of digital transformation and cloud transition, I am proud to be part of a pioneering team and excited to create an impact in this great field.”

Read More
Perimeter 81 featured in Gartner Zero Trust Network Access Market Guide

Perimeter 81 Recognized in Gartner’s 2019 Market Guide for Zero Trust Network Access

Reading Time: 4 minutes

Perimeter 81, a secure network access solution for the modern and distributed workforce has been included in the 2019 Market Guide for Zero Trust Network Access by Gartner Inc., a leading IT research and advisory company.
Gartner Zero Trust Market Guide

Perimeter 81, a secure network access solution for the modern and distributed workforce has been included in the 2019 Market Guide for Zero Trust Network Access by Gartner Inc., a leading IT research and advisory company.

At Perimeter 81, our Software-Defined Perimeter (SDP) service, backed by Zero Trust access control, ensures secure access to web applications, SSH, RDP, VNC or Telnet, through protected IPSec tunnels – without an agent.

Employees simply access their application portal, select the application they have permission to enter and create a session that is fully audited, recorded and monitored.

According to Gartner, “ZTNA, which is also known as a software-defined perimeter (SDP), creates an identity- and context-based, logical-access boundary around an application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a set of named entities. The broker verifies the identity, context and policy adherence of the specified participants before allowing access. This removes the application assets from public visibility and significantly reduces the surface area for attack.”

What Is the Market Guide for Zero Trust Network Access?

Each year, Gartner publishes the Market Guide for Zero Trust Network Access. This report states that “this research helps security and risk management leaders choose the best solutions for their use cases, including application-centric and demand-driven connections.”

According to Gartner, “Zero trust network access replaces traditional technologies, which require companies to extend excessive trust to employees and partners to connect and collaborate. Security and risk management leaders should plan pilot ZTNA projects for employee/partner-facing applications.”

The Perimeter 81 Secure Connection Product Offering

For Zero Trust network access, it’s essential that organizations obtain unparalleled visibility into enterprise computing activity. Our Zero Trust solution, managed through our central management platform, provides visibility, control, and threat protection with comprehensive coverage for all IT domains.  

Our  non-disruptive Zero Trust network security solution features:

  • Secure Network Access
    Network security, implemented via a client application for endpoints, allows for secure IPsec and SSL VPN connectivity for all employees, partners, customers and guests no matter where they’re connecting from (e.g., remotely, on the local network, or over the Internet).
  • Inspect and Log All Traffic
    Accurately monitor network activity by identifying and classifying all traffic, regardless of ports and protocols, encryption or hopping. This reiterates the need to “always verify” and eliminates methods that malware may use to hide from detection and provides complete context into applications, associated content and threats.
  • Least Privilege Access Control
    Many legacy solutions are limited to port and protocol-level classification, resulting in too much unfiltered traffic. With granular access control, users can safely access appropriate applications and data by reducing available pathways and eliminating unauthorized and malicious traffic from the network.
  • Advanced Threat Protection
    Legacy stateful inspection technology is incapable of enforcing a least-privileged policy because they only understand IP addresses, ports and protocols – not specific applications. Perimeter Zero protects against both known and unknown threats is necessary to support a closed-loop, highly integrated defense stature that consistently and cost-effectively enables trust boundaries.
  • High-Performance Design
    Zero Trust security and networking capabilities must be implemented in a way that they do not become a performance bottleneck. The Perimeter 81 software architecture minimizes latency and surpasses processing requirements, providing high availability, avoiding loss of service and increasing the uptime of your network. By deploying multiple server instances in locations closest to your business, data centers or remote employees, organizations can prevent slow-downs and reduce redundant loads on servers.

Penetrating a Growing Market

From our perspective, being recognized as a Representative Vendor in the 2019 Market Guide for Zero Trust Network Access from such a reputable resource validates our continuous effort in the enterprise cybersecurity market.

“With a least-privileged strategy and strictly enforced access control, organizations can control interactions with resources based on relevant attributes, including application access, user and group identity and the sensitivity of the data being accessed,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “With unmatched visibility and control of applications, users, and content, organizations can migrate to Perimeter 81’s Zero Trust network security flexibly and non-disruptively.”

Read more about our recent recognitions:

Gartner Hype Cycles
- Hype Cycle for Infrastructure Strategies, July 2018
- Hype Cycle for Cloud Security, July 2018
- Hype Cycle for Enterprise Networking and Communications, July 2018
Comet Competition Finalist
- Perimeter 81 was announced as one of 12 finalists
for the 2019 Comet Competition, held by Ingram Micro
Inc., in partnership with MassChallenge
Annual Cybersecurity Breakthrough Awards
- “Mobile VPN of the Year” - 2018 CyberSecurity Breakthrough Awards
Info Security Products Guide
- Silver Winner of Startup of the Year – Founded in 2018
- Bronze Winner of Cyber Security Vendor Achievement of the Year
Gartner Market Guide
- Gartner, Market Guide for Secure Enterprise Data Communications, April 2019
Gartner Cool Vendor
- Gartner, Cool Vendors in Network and Cyber-Physical Systems Security, April 2019

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Market Guide for Zero Trust Network Access, 2019, Steve Riley, Neil MacDonald, Lawrence Orans, 29 April 2019.    

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected] or drop us a line in the comments section below.

To learn more about Perimeter 81’s Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Perimeter 81 Receives Frost & Sullivan’s 2019 European Software-Defined Access Technology Leadership Award

Perimeter 81 Wins Frost & Sullivan’s 2019 Software-Defined Access Technology Leadership Award

Reading Time: 3 minutes

Leading Market Research and Consultancy Firm Identifies Perimeter 81 as the Industry’s Leading Solution for Software-Defined Access Technology.

We’re excited to announce that our secure network access solution for the modern and distributed workforce has received the prestigious 2019 Frost & Sullivan Software-Defined Access Technology Leadership Award.

Our Secure Network as a Service is simplifying the way employees connect to and interact with business data and resources. By utilizing the Software-Defined Perimeter architecture, backed by Zero Trust cloud, local network and application-level access, we’re securing user access, corporate communication, and the entire network.

About the Frost & Sullivan Technology Leadership Award

Frost & Sullivan is world-renowned for its role in identifying disruptive technologies and products that are driving future success. This award recognizes companies with technologically-innovative products that enable growth, innovation and leadership in their respective industry. By comparing key market participants and measuring performance, industry analysts provide extensive research to identify these top leaders in the technology market.

Our Software-Defined Access Solution

Our cloud-based cybersecurity solution is completely user-centric with the modern workforce in mind. By focusing on dynamic user environments, we’re solving the shortcomings of today’s outdated solutions with an easy-to-install and easy-to-manage solution that meets today’s demands.

Perimeter 81 Cloud Management Platform Frost & Sullivan Technology Leadership Award

Our Network as a Service replaces on-premise firewalls and hardware-based VPNs entirely. By providing seamless and secure access to cloud-based resources, servers and applications, Perimeter 81’s user access control becomes inherently simple for network administrators.

Using our single-click application, compatible with all major web browsers and mobile operating systems, employees can safely access confidential resources no matter where they’re connecting from. That means no more managing on-site hardware VPN servers.

We take secure access one step further with our Automatic Wi-Fi Security solution that routes user traffic via secure servers using advanced 256-bit level encryption protocols – without affecting connection speed or requiring any action from the user.

Centralized Network Management

Our service is more than just comprehensive security. We also provide complete network visibility and activity monitoring to ensure compliance, mitigate risks and to provide auditing capabilities and more.

Our multi-platform access control and centralized management platform allow network administrators to easily assign users to groups, automatically whitelist IP addresses and providing user-specific, Zero Trust application level access to resources.

“The benefits of a cloud-based Secure Network as a Service that utilizes the Software-Defined Perimeter and Zero-Trust security models, extends further than seamless and secure end-user access, by replacing a physical firewall at each location where a corporation does business, the operational responsibility for the firewall can be unified and considered at a single location staffed with a team dedicated solely to cybersecurity, instead of relying on employees at the endpoint.”

Frost & Sullivan, 2019 Best Practices, Software-Defined Access Technology Leadership Award

Our Service and Vision

Our long-term cloud strategy includes many additional services, including Zero Trust application-level access and a full cloud firewall.

“Perimeter 81 is working on utilizing its cloud structure for services including a secure web gateway, which protects against online threats by enforcing company security protocols, and network forensics, where logs of network traffic are analyzed for signs of instruction.”

Frost & Sullivan, 2019 Best Practices, Software-Defined Access Technology Leadership Award

As a fast-growing startup, we have found significant demand for our product in the midsize to the enterprise market. With proof-of-concept trials taking just under 14 minutes, we’re confident that our solution will continue to positively impact and contribute to substantial growth in the industry.

To learn more about the latest industry transformations and the significance of new, software-defined networking solutions, access and read the full report here.

If you’d like to receive a full tour of Perimeter 81’s award-winning Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Perimeter 81 Gartner Cool Vendor in Network Security

Perimeter 81 Named Gartner ‘Cool Vendor’ for Network and Cyber-Physical Systems Security

Reading Time: 3 minutes

Tel Aviv, April 24, 2019                                                                                                                                           

Perimeter 81, a leading Secure Network as a Service and zero-trust Software-Defined Perimeter (SDP) provider, announced today that it has been selected by Gartner as a “Cool Vendor in Network and Cyber-Physical Systems Security.”

Perimeter 81 is designed to simplify secure network, cloud and application access in the age of Cloud and Mobility.

“We are honored to be recognized by Gartner as a Cool Vendor, and feel this definitely affirms the value that our user-centric and cloud-friendly Secure Network as a Service brings to the market,” said Amit Bareket, co-founder and CEO of Perimeter 81. “We believe this is a major step in our work towards building a single, holistic cybersecurity platform that serves as a one-stop shop for multiple cybersecurity offerings. Ultimately, our vision is to provide one agent, one management platform and one Secure Network as Service for a unified cybersecurity experience.”

Perimeter 81 currently provides an SDP service, primarily addressing the virtual private network (VPN) replacement use case, but also plans to add additional cybersecurity services like software-defined networking in a wide area network (SD-WAN), secure Web gateway, and browser isolation capabilities, in order to deliver a complete cloud firewall solution.

The Gartner Cool Vendor report notes that “rapid changes to networks require new and adaptive approaches to securing them.” It recommends “security and risk management leaders should utilize adaptive security policies where required by different network traffic streams; in such cases, deploy SDP services that offer ‘secure network as a service’ capabilities.” (1)

Perimeter 81’s cloud-agnostic solution offers both customizable networking capabilities and advanced security features, and also ensures secure access at the network and application level. The software service can be rolled out quickly and provides automatic gateway deployment, easy multi-tenant management and full network visibility.

Since the launch of the product, Perimeter 81 has grown at a rapid, double-digit rate month over month and quickly acquired hundreds of clients — including Fortune 500 companies and some of the leading names in government, entertainment, technology, and AI. Additionally, Perimeter 81 has been named an Ingram Micro Mass Challenge Comet Finalist, an Info Security Products Guide Global Excellence “Cybersecurity Startup of the Year” and “Cybersecurity Vendor Achievement of the Year” winner, and a Cybersecurity Breakthrough Awards winner.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Cool Vendors in Network and Cyber-Physical Systems Security, Perkins, MacDonald, Thielemann and Brian Reed, 16 April 2019.

The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner customers may access the full report here.

About Perimeter 81

Perimeter 81 is a Secure Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

To learn more about Perimeter 81’s zero-trust Software-Defined Perimeter Service be sure to request a complimentary demo.

For additional media inquiries, please contact: [email protected]

Read More
Gartner 2019 Market Guide - Perimeter 81

Perimeter 81 Recognized in Gartner’s 2019 Market Guide for Secure Enterprise Data Communications

Reading Time: 2 minutes

Perimeter 81, a secure network access solution for the modern and distributed workforce has been included in the April 2019 Market Guide for Secure Enterprise Data Communications by Gartner Inc., a leading IT research and advisory company. The Market Guide includes 12 of more than 40 Secure Enterprise Data Communications providers from around the world.

At Perimeter 81, our Software-Defined Perimeter (SDP) service and comprehensive management platform ensure secure access to cloud networks, data centers, SaaS applications and the entire Internet – all while increasing network visibility through a simple, easy-to-use and cost-effective software solution.

What Is the Market Guide for Secure Enterprise Data Communications?

Each year, Gartner publishes the Market Guide for Secure Enterprise Data Communications. This report states that “this research helps security and risk management leaders choose the best solutions for their use cases, including application-centric and demand-driven connections.”

According to Gartner, “Secure enterprise data communications solutions are products and services used to achieve security and confidentiality for data in motion by means of encryption and access controls.” (1)

The Perimeter 81 Secure Connection Product Offering

For secure enterprise data communications, it’s important that organizations tighten infrastructure and support integration and interoperability in hybrid on-premises and cloud environments. This can be achieved through site-to-site and device-level network communications and endpoint security that reduces the exposure and vulnerability of the network and servers.

At Perimeter 81, we’re proud to confirm that we meet multiple categories of secure communications using just one platform:

  • Network Building Capabilities
  • Multi-Regional Support
  • Split Tunneling
  • Custom DNS
  • Sleek, User-Friendly UI
  • Single Sign-On Integration
  • Two-Factor Authentication
  • Advanced Activity Monitoring
  • Automatic Wi-Fi Security
  • Cross-Platform Compatibility
  • Private Servers

Global Recognition

Our inclusion in this report is the most recent global recognition of Perimeter 81. From our perspective, being recognized as a Representative Vendor in the 2019 Market Guide for Secure Enterprise Data Communications from such a reputable resource is an honor and certainly validates our unique product vision during our boundless journey into the enterprise market.

“We believe that being included in Gartner’s 2019 Market Guide for Secure Enterprise Data Communications recognizes the simplicity and innovation the Perimeter 81 service continues to provide,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “The Perimeter 81 team has worked tirelessly to deliver a secure, network as a service solution that collectively provides secure networking and data science technologies in a way that overcomes the limitations of traditional security solutions. We feel that to be recognized by Gartner is a tremendous validation for the work the Perimeter 81 team has accomplished.”

Read more about our recent recognitions:

Gartner Hype Cycles
- Hype Cycle for Infrastructure Strategies, July 2018
- Hype Cycle for Cloud Security, July 2018
- Hype Cycle for Enterprise Networking and Communications, July 2018
Comet Competition Finalist
- Perimeter 81 was announced as one of 12 finalists
for the 2019 Comet Competition, held by Ingram Micro
Inc., in partnership with MassChallenge
Annual Cybersecurity Breakthrough Awards
- “Mobile VPN of the Year” - 2018 CyberSecurity Breakthrough Awards
Info Security Products Guide
- Silver Winner of Startup of the Year – Founded in 2018
- Bronze Winner of Cyber Security Vendor Achievement of the Year
Gartner Market Guide
- Gartner, Market Guide for Secure Enterprise Data Communications, April 2019
Gartner Cool Vendor
- Gartner, Cool Vendors in Network and Cyber-Physical Systems Security, April 2019

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Market Guide for Secure Enterprise Data Communications, 2019, John Girard, Jeremy D’Hoinne, 11 April 2019.    

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected] or drop us a line in the comments section below.

If you don’t currently have an account and would like to experience a full tour of our platform, but sure to request a complimentary demo.

Read More
Network Building Feature - Perimeter 81

Perimeter 81 Platform Release: Introducing Our Network Building Capabilities

Reading Time: 3 minutes

We’re excited to announce the launch of our new and powerful network building capabilities which now allow you, our valued customers, to create fully flexible, customized networks that are multi-regional, interconnected to your environments and optimized for speed.

Perimeter 81’s new network building capabilities enable you to model your entire network using several advanced security features. Our new and easy-to-use UI helps you create, manage and secure multi-regional custom networks that are interconnected to your cloud and on-premise environments.

New Network Building Capabilities

Perimeter 81’s new Network Capabilities allow you to automatically create fully customized networks.

The new and innovative platform UI includes:

  • Multi-Regional Support: Now you can have private gateways in different locations to ensure your network can best serve international branches and employees with reduced latency and optimal speed. Since our applications are optimized for performance, employees will automatically connect to the nearest private gateway.
  • Split Tunneling: Control whether you tunnel all your network traffic, or specific subnets, from the client applications to Perimeter 81’s Secure Network as a Service. You can choose to add a Perimeter 81 Connector to interconnect your cloud (AWS, Azure, Google Cloud) and on-premise environments, or use an IPsec Site-to-Site Tunnel to create a secure communication link between two different networks located at different sites.
  • Custom DNS: Now you can opt-in to use a Custom DNS will allow you to utilize your organization’s DNS servers, as well as local domain names. You can choose to either obtain a DNS server address automatically, or select a primary and secondary DNS address manually.

Network Innovation

Businesses across a wide variety of industries are in need of simpler, more reliable network security. By delivering a single-click service that eliminates much of the hassle and headache of the past, our users are able to deploy, manage, and visualize network connections using only software. This enables the integration of powerful APIs, as well as the ability to analyze and visualize network traffic.

With Perimeter 81, you get the full package. Along with our new networking building capabilities, our platform continues to provide:

  • Sleek, User-Friendly UI: With our improved UX and UI, compatible for web and mobile devices, it’s now easier than ever before to deploy, manage and secure your organization’s network.
  • Single Sign-On Integration: Our customers can enforce secure policy-based access with total ease. Perimeter 81 offers integration with several leading Identity Providers including G Suite/ Google Cloud, Okta, Microsoft Azure AD and Active Directory/LDAP.
  • Two-Factor Authentication: Add an extra layer of security and prevent remote attacks with SMS notifications, Google Authenticator and Duo Security authentication. We know this feature will be highly valuable for all businesses, and particularly those that need to adhere to strict industry regulations, like HIPAA compliance standards.
  • Advanced Activity Monitoring: With the management platform, you can gain even more insight into your network’s health, activity and security. Our platform includes a wide range of activity types including visibility into group and server creation, team member authentication, password changes and more.
  • Automatic Wi-Fi Security: Immediately protect your traveling employees from Wi-Fi hotspot threats with an encrypted connection that activates the moment your employees connect to an unsecured network.
  • Cross Platform: Easy-to-use cross-platform applications available for all your employees’ corporate and BYOD devices.
  • Private Servers: Private servers with dedicated IPs so you can skip manual IP whitelisting and lock down secure resources to protected IPs.

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected].

If you don’t currently have an account and would like to experience a full tour of our platform, be sure to request a complimentary demo.

We hope you enjoy all the new networking features and benefit from a faster, simpler, and more seamless way to build and manage your network!

Read More
Perimeter 81 Closes $5M Funding Round

Perimeter 81 Completes a $5M Funding Round to Help Businesses Achieve Network, Cloud and Application Security

Reading Time: 4 minutes

FOR IMMEDIATE RELEASE

Tel Aviv, Israel – Perimeter 81, a Zero-Trust Software Defined Perimeter company, founded by Amit Bareket, CEO, and Sagi Gidali, CPO, announced today that it has completed a $5M funding round.

The round was led by Spring Ventures, controlled by Aviv Refuah, with additional funds from US-based investors and existing shareholders. The company will use the funds to accelerate growth, primarily investing in expanding the sales, marketing and R&D teams in its Tel Aviv and New York offices, and developing new cloud firewall capabilities.

“The rise of Cloud and Mobility has disrupted network, cloud and application security as we know it. With employees working on the go and from different locations around the world, and companies increasingly moving towards the cloud, the traditional hardware-based legacy appliances of the past are no longer suitable for today’s modern and distributed workforce,” said CEO and Co-Founder Amit Bareket. “Perimeter 81’s user-centric Secure Network as a Service, which utilizes the Zero-Trust and Software-Defined Perimeter models, enables businesses to more easily secure access to local network resources, cloud environments, and business applications, with a seamless and highly intuitive SaaS solution.”

Since the launch of the product, Perimeter 81 has gained immediate traction in the market, growing at a rapid, double-digit rate month over month and quickly acquiring hundreds of clients including Fortune 500 companies and some of the leading industry names in government, entertainment, technology, and AI. Additionally, Perimeter 81 has been named an Ingram Micro Mass Challenge Comet Finalist, an InfoSecurity Product Guides Global Excellence “Cybersecurity Startup of the Year” and “Cybersecurity Vendor Achievement of the Year” winner, and a Cybersecurity Breakthrough Awards winner.

“We are big believers in the Zero-Trust and Software-Defined Perimeter cloud-based approach and have followed Perimeter 81 for a long time,” said Aviv Refuah, founder of Spring Ventures. “With its unique and forward-thinking cybersecurity SaaS approach, great team and impressive growth rate, Perimeter 81 will now be able to grow even faster, add additional security features and fulfill its vision to fully bring network security into the cloud.”

Perimeter 81 was recognized as a Sample Vendor under the Software-Defined Perimeter category in three Gartner Hype Cycle reports.

Perimeter 81 is unique in the market in that its holistic, cloud-agnostic solution offers both customizable networking capabilities and advanced security features, and also ensures secure access at the network and application level. The software service can be rolled out quickly and provides automatic gateway deployment, easy multi-tenant management, and full network visibility.

Perimeter 81 is the second venture for Co-Founders Amit Bareket and Sagi Gidali, who have also launched successful consumer VPN service, SaferVPN. SaferVPN, a profitable business launched in early 2014, quickly became a household name, with over 3 million international app downloads and one of the highest customer satisfaction rates in the industry. The consumer software company was selected by Deloitte Israel’s Technology Fast 50 – Rising Star rankings, recognized for sustained revenue growth over 2 years. Moreover, its patented Automatic Wi-Fi Security was white-labeled by leading global endpoint protection company Webroot, recently acquired by Carbonite.

With the new funding round, Perimeter 81 expects to double its team, add more security services, fulfill its vision to lead the SDP market and furthermore, disrupt the traditional firewall landscape.

“With Perimeter 81, we took our knowledge of what worked for the consumer market, and ultimately, the end-user, and transformed the complex and outdated technology that so many businesses rely upon, into a seamless and user-friendly SaaS service,” said Sagi Gidali, Co-Founder and CPO. With this new funding round, we look forward to expanding our reach and further enabling companies of all industries and sizes to become fully, securely mobile and confidently cloud-based.”

Perimeter 81 Founders Sagi Gidali and Amit BareketPerimeter 81 Co-Founders, Sagi Gidali, CPO, and Amit Bareket, CEO

Perimeter 81’s user-centric Secure Cloud Network as a Service management platform and client applicationPerimeter 81’s user-centric Secure Cloud Network as a Service management platform and client application.

ABOUT PERIMETER 81

Perimeter 81 is a Secure Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

To learn more about Perimeter 81’s Zero-Trust Software-Defined Perimeter Service visit: www.perimeter81.com

ABOUT SPRING VENTURES

Spring Ventures, a publicly traded company on the Tel Aviv Stock Exchange, is led by Aviv Refuah, one of Israel’s first and most experienced Tech entrepreneurs. The main activities of Spring Ventures are devoted to investments in the fields of Technology and Internet, both in private and public companies. Spring Ventures made, among other successful deals, the largest e-commerce transaction ever in Israel. Spring Ventures’ investment objective is to seek long-term capital appreciation by investing in a diversified portfolio, while taking advantage of technology-based platforms, global market trends and its expertise.

For additional media inquiries, please contact: [email protected]

 

Read More
Zero Trust Network Security - Perimeter 81

5 Non-Disruptive Tips to Get Started with Zero Trust Network Security

Reading Time: 4 minutes

Zero Trust is an alternative IT security model that remedies the shortcomings of legacy technology by removing the assumption of trust. Under the guiding principle, “Never trust, always verify”, Zero Trust restricts access to the entire network by isolating applications and segmenting network access based on user permissions, authentication and verification.

Conventional security models that “trust, but verify”, fail to meet increasingly sophisticated cyber threats, hyper interconnectivity, globalization and user mobility. By assuming everything “on the inside” can be trusted, these legacy technologies are, for the most part, no longer effective.

Zero Trust network security ensures policy enforcement and protection for all users, devices, applications and data, regardless of where they’re connecting from. This user-centric approach makes the verification of authorized entities mandatory, not optional.

The Benefits of Adopting Zero Trust Principles

Zero Trust provides adequate visibility, control and threat inspection capabilities that are necessary to protect your network from modern malware, targeted attacks and the unauthorized exfiltration of sensitive data.

By migrating to a Zero Trust security architecture, organizations can experience several technical and business advantages, including:

  • Mitigating Data Loss
    Dramatically enhance your security posture and mitigate data loss via visibility, safe enablement of applications and threat prevention.
  • Effortless Compliance
    Simplify compliance with highly effective trust boundaries by segmenting sensitive resources into many small perimeters that are secured and segmented based on user policies and permissions.
  • Enabling Mobility and Virtualization
    Increase the ability to accommodate transformative IT initiatives such as cloud computing, infrastructure virtualization, user mobility, social networking and more.
  • Reducing TCO
    Reduce total cost of ownership (TCO) for IT security by replacing disconnected point products with a single, consolidated security platform.
  • Increasing Security
    By adequately accounting for encrypted traffic and filtering for known threats, organizations can prevent sophisticated cyber threats from penetrating perimeter defenses and moving laterally across the internal network.

The Zero Trust Model – How it Works

Internal networks are comprised of different levels of trust which should be segmented according to sensitivity. Organizations looking to establish secure “trust boundaries” according to the Zero Trust model need to improve their defensive posture through:

  • Network Segmentation
    Network segmentation allows organizations to define internal trust boundaries to granularly control traffic flow, enable secure network access and implement network monitoring. This reduces the attack surface and provides a distributed security solution which operates as a holistic threat protection framework.  
  • Trust Zones
    Trust zones are comprised of distinct pockets of infrastructure where resources operate at the same trust level and similar functionality such as protocols and types of transactions. This minimizes the number of allowed pathways and limits the potential for malicious threats to access sensitive resources.
  • Infrastructure Management
    Zero Trust segmentation relies on the ability to efficiently monitor the network via centralized management capabilities. This allows data to be processed by out-of-band analysis tools and technologies that may further enhance network visibility, detect unknown threats, or support compliance reporting.

5 Tips to Get Started with Zero Trust Network Security

It is important for IT security managers and architects to realize that it’s not necessary to wait for the next network and security infrastructure. By obtaining unparalleled visibility into enterprise computing activity, organizations can incrementally and non-disruptively make the transition to a Zero Trust model.

Here are 5 tips to get started with a Zero Trust approach to network security:

Tip #1: Secure Network Access

To get started, it’s critical to ensure that all resources are accessed securely, regardless of location. Network security, implemented via a client application for endpoints, allows for secure IPsec and SSL VPN connectivity for all employees, partners, customers and guests no matter where they’re connecting from (e.g., remotely, on the local network, or over the Internet).

Additional policies determine which users and devices can access sensitive applications and data. This requires multiple trust boundaries, increased use of secure communications to and from resources and more.  

Tip #2: Inspect and Log ALL Traffic

To accurately monitor what’s happening in the network, organizations must identify and classify all traffic, regardless of ports and protocols, encryption or hopping. This reiterates the need to “always verify” while also making it clear that adequate protection requires more than just strict enforcement of access control. It also eliminates methods that malware may use to hide from detection.  

Tip #3: Least Privilege Access Control

Many legacy solutions are limited to port and protocol-level classification, resulting in too much unfiltered traffic. With granular access control, users can safely access appropriate applications and data by reducing available pathways and eliminating unauthorized and malicious traffic from the network.

With a least-privileged strategy and strictly enforced access control, organizations can define user interactions with resources based on relevant attributes, including application access, user and group identity and the sensitivity of the data being accessed.

Tip #4: Advanced Threat Protection

Legacy security that relies on stateful inspection technology is incapable of enforcing a least-privileged policy because their classification engines only understand IP addresses, ports and protocols – meaning they can’t distinguish between specific applications.

To implement Zero Trust, comprehensive protection against both known and unknown threats, including threats on mobile devices, is necessary to support a closed-loop, highly integrated defense stature that consistently and cost-effectively enables trust boundaries.

Tip #5: High-Performance Design

Since Zero Trust relies on numerous security and networking capabilities, these features must be implemented in a way that doesn’t hinder performance. The Perimeter Zero software architecture minimizes latency and surpasses processing requirements, providing high availability, avoiding loss of service and increasing the uptime of your network.

With unmatched visibility and control of applications, users, and content, organizations can migrate to Zero Trust network security with a highly flexible solution made possible by non-disruptive deployment.

Convert to Zero Trust on the Fly

Because every successful Zero Trust initiative depends on the right solution, organizations can feel confident that they can implement Zero Trust network security without needing to modify the existing network.

Perimeter 81’s software-defined perimeter Zero Trust access feature, called Perimeter Zero, provides a completely transparent experience for all users by enabling access to web applications, SSH, RDP, VNC or Telnet, through resilient IPSec tunnels – without an agent. All your organization’s employees can easily go to their application portal, select the application they have permission to enter and create a session that is fully audited, recorded and monitored.

With secure, segmented and audited access to cloud environments, applications and local services, Zero Trust increases security, auditing, monitoring and visibility while reducing help-desk support and hardware spending.

We hope you found this post helpful! Feel free to let us know if you have any questions and follow us on social media if you’d like to continue receiving all the latest business security news. 

Read More
Perimeter 81 Mass Challenge Ingram Micro Comet Competition Finalist

Perimeter 81 Named a Top Finalist in This Year’s Comet Competition

Reading Time: 3 minutes

TEL AVIV, Israel – Perimeter 81 was announced as one of 12 finalists for this year’s Comet Competition which evaluated 300 ISV applicants, held by Ingram Micro Inc, in partnership with MassChallenge.

Established in 2018, the Comet Competition is the only startup challenge dedicated to discovering talented B2B independent software vendors (ISVs) and accelerating their trajectory to channel market success.

Perimeter 81 – Top 12 Finalist

This award aids in our mission to increase network visibility by providing policy enforcement and protection for all users, devices, applications, data and traffic. By offering innovative, easy-to-use Software-Defined Perimeter solutions, backed by Zero Trust security, we’re working to protect our customers and their clients from looming cyber threats that aren’t addressed by outdated perimeter-centric strategies.

The Comet Competition compliments our progress through go-to-market funding, access to corporate partners and other tools which will help accelerate our success. Once onboarded to the Ingram Micro Cloud Marketplace, ISVs are able to quickly scale, promote, sell and deploy their solutions to channel partners and the customers they serve in more than 50 global markets.

“With Perimeter 81, it is our aim to disrupt the 30-year-old legacy VPN and firewall technology, and help businesses more easily and seamlessly secure network, cloud and application access for the modern and mobile workforce,” said Sagi Gidali, CPO and Co-Founder of Perimeter 81. “We are very proud to be recognized by Ingram Micro and Mass Challenge for our innovative and user-centric Software-Defined Perimeter technology.”

The 2019 Ingram Micro Cloud Summit

We’re excited to join MassChallenge and Ingram Micro at the upcoming 2019 Ingram Micro Cloud Summit, taking place in San Diego, Calif., March 11-13, as they announce the regional winners and showcase all finalists of the Comet Competition.

More information including registration is available here: https://www.ingrammicrocloudsummit.com/

About Ingram Micro Cloud

At Ingram Micro Cloud™, we view cloud not just as a single technology, but as a foundational platform to run and drive a whole new way of doing business. By leveraging our platforms and ecosystem, cloud service providers, telecom companies, resellers and enterprises can quickly transform and get up and running in the cloud within minutes, with little to no investment. Our portfolio includes vetted security, communication and collaboration, business applications, cloud management services and infrastructure solutions designed to help clients monetize and manage the entire lifecycle of cloud and digital services, infrastructure and IoT subscriptions. For more information, please visit: www.IngramMicroCloud.com.

About MassChallenge

MassChallenge is a global network of zero-equity startup accelerators. Headquartered in the United States with locations in Boston, Israel, Mexico, Rhode Island, Switzerland, Texas, and the UK, MassChallenge is committed to strengthening the global innovation ecosystem by supporting high-potential startups across all industries, from anywhere in the world. To date, more than 1,900 MassChallenge alumni have raised more than $4 billion in funding, generated over $2.5 billion in revenue, and created over 120,000 total jobs. Learn more about MassChallenge at www.masschallenge.org.

About Perimeter 81

Perimeter 81 is a Secure Network as a Service that has taken the outdated, complex and hardware-based traditional VPN and firewall technology, and transformed it into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, Perimeter 81 serves Fortune 500 businesses and industry leaders across a wide range of sectors, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

Comet Competition - Perimeter 81

Contact us if you’d like to learn more about software-defined-security technology and our innovative and disruptive SMB targeted product offering!

Read More
RSA Conference 2019 - Perimeter 81

We’re Going to RSA 2019. Want to Join Us?

Reading Time: 2 minutes

We’re attending RSA Conference 2019 in San Francisco, and we want you to join us! Find us at Booth 635 and learn how to modernize and simplify your network infrastructure with our Secure Network as a Service.

At the conference, you can say hello to our team of experts, pick up some limited edition t-shirts and fun retro prizes and receive 1:1 demos of our award-winning technology.

We’ll be discussing the shortcomings of traditional, complicated and costly legacy VPN and firewall appliances and how these limitations can be overcome by removing the assumption of trust.

This Year’s RSA Conference Theme Is “Better”

This year’s theme is Better: “Which means working hard to find better solutions. Making better connections with peers from around the world. And keeping the digital world safe so everyone can get on with making the real world a better place.”

At Perimeter 81, we’d like to create a brighter future through our proactive commitment to security by offering innovative, easy-to-use solutions that address the shortcomings of perimeter centric strategies. We’re constantly working to protect our customers and their clients from cyber threats that continue to grow and devastate organizations around the globe.

By offering a Software-Defined Perimeter, backed by Zero Trust security, we hope to aid companies in the fight against data loss by increasing visibility into the network and providing policy enforcement and protection for all users, devices, applications, data and traffic.

Familiar with Our New and Exciting Product Features?

Since launching Perimeter 81 last year, we have quickly gained traction in the mid-market. We’re seeing businesses across a wide variety of industries that are in need of simpler, more reliable network security. Our goal, since day one, has been to deliver a single-click service that will eliminate much of the hassle and headache you experienced in the past, and give you greater peace of mind in the future.

Our new product features include:

  • New, sleek UI compatible for web and mobile devices
  • Single Sign-On integration with several leading Identity Providers
  • Two-factor authentication via SMS notifications, Google Authenticator and Duo Security
  • Brand new server locations for even higher availability and connection speed
  • Advanced activity monitoring into your network’s health, activity and security
  • Automatic Wi-Fi Security that immediately protects your traveling employees from Wi-Fi threats
  • Easy-to-use cross-platform applications available for all your employees’ corporate and BYOD devices
  • Private servers with dedicated IPs so you can skip manual IP whitelisting and lock down secure resources

About RSA Conference

The RSA Conference is one of the world’s leading information security events, where attendees learn about the very latest in research, development, and trends. The conference offers security professionals new approaches to information security, the opportunity to discover the latest technology, and interaction with top security leaders and pioneers.

Schedule Your Free Demo Today

Simply schedule a meeting with one of our experts and receive your FREE Expo Plus Pass code!

[button style=”btn-default btn-lg” type=”link” target=”true” title=”Join us!” link=”https://www.perimeter81.com/start/rsa-conference-2019/” linkrel=””]

Read More
Info Security PG Award - Perimeter 81

Perimeter 81 Named Winner in the 15th Annual Info Security PG’s 2019 Global Excellence Awards

Reading Time: 2 minutes

Perimeter 81 recognized as the Silver Winner of Startup of the Year – Founded in 2018 and Bronze Winner of Cyber Security Vendor Achievement of the Year.

Perimeter 81, a leading provider of Software-Defined Perimeter technology has been named the winner of the Startup of the Year – Founded in 2018 and Cyber Security Vendor Achievement of the Year award by Info Security Products Guide, the industry’s foremost information security research and advisory guide, in its 15th Annual 2019 Global Excellence Awards.

These prestigious global awards recognize cyber security and information technology vendors with advanced, ground-breaking products, solutions, and services that are helping set the bar higher for others in all areas of security and technologies.

Startup of the Year – Founded in 2018 – Silver Winner
Cyber Security Vendor Achievement of the Year – Bronze Winner

“Cloud and mobility are creating a mega shift in traditional network security,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “Today, employees are working from everywhere and are increasingly using cloud technologies. With Perimeter 81, it is our aim to help businesses seamlessly secure network, cloud and application access for the modern and mobile workforce. We are very proud to be recognized by Info Security PG’s Global Excellence Awards for our innovative and user-centric Software-Defined Perimeter technology.”

“We are proud to be recognized as an industry player whose network security solution has been named a ‘Startup of the Year’ and ‘Cyber Security Vendor Achievement of the Year’ winner by Info Security Products Guide,” says Sagi Gidali, CPO and Co-Founder. “Behind this distinguished success is our relentless drive to stay customer focused and provide a user-friendly product. We believe this recognition from Info Security Products Guide further validates our commitment to our customers and their security needs.”

About Info Security PG’s Global Excellence Awards

Info Security Products Guide sponsors the Global Excellence Awards and plays a vital role in keeping end-users informed of the choices they can make when it comes to protecting their digital resources and assets. It is written expressly for those who are adamant on staying informed of security threats and the preventive measure they can take. You will discover a wealth of information in this guide including tomorrow’s technology today, best deployment scenarios, people and technologies shaping cyber security and industry predictions & directions that facilitate in making the most pertinent security decisions. Visit www.infosecurityproductsguide.com for the complete list of winners.

About Perimeter 81

Perimeter 81 is a next-generation Secure Network as a Service provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based.

Contact us if you’d like to learn more about software-defined-security technology and our innovative and disruptive SMB targeted product offering!

Read More
Replace SDP with VPN - Perimeter 81

5 Reasons Why You Need to Replace Your VPN with SDP

Reading Time: 5 minutes

It is now clear that VPNs do not always provide the visibility and control threat inspection needed for companies. In fact, it’s estimated that 60% of enterprises will phase out network VPNs in favor of software-defined perimeters called SDP by 2021.

Thankfully, these critical pain points can be easily addressed with a consolidated network access solution that provides secure, segmented and audited access to cloud environments, applications and local services – the Software-Defined Perimeter (SDP). 

The Modern Business Environment

It’s critical for cybersecurity to evolve alongside technological advancements and increasingly sophisticated cyber threats.

In today’s modern working environment, there are many endpoints and processes that must be secured, including:  

  • Remote employees, mobile users, and cloud computing solutions
  • Wireless technologies and third-party pathways into the network
  • Malicious outside and inside security threats
  • Weak perimeter defenses that allow intruders to gain access and move laterally within the internal network

Legacy VPNs Provide Inadequate Capabilities

Today’s threats are no longer isolated to on-premises applications and devices. When the average organization uses 1,427 cloud services, of which 90% are unknown to IT, it is clear that legacy technology, such as VPNs, do not provide the visibility, control and threat inspection capabilities needed to effectively secure your network.

Reason #1: Lack of Network Segmentation

Internal networks are rarely homogeneous, which is why different users should have different levels of access and trust to sensitive resources. For example, a remote worker would not have the same access to the network as you would. Which is why network segmentation and user access control is critically important to limit resource access and mitigate cyber attacks. However, traditional VPNs are not able to provide coarse-grained network segmentation with different levels of access for different users.  

Reason #2: Lack of Traffic Visibility

Unfortunately, legacy devices and technologies commonly used to build network perimeters let too much unwanted traffic through. For example, legacy VPN technology is unable to distinguish between good and bad applications which means IT is responsible for building and maintaining extensive permissive access controls. They also fail to adequately account for encrypted application traffic and are unable to accurately identify and control users.

Reason #3: Not Suited for Dynamic Networks

Traditional VPNs require tedious hardware, constant management and cannot easily adjust to network or server changes. These VPNs make it more complicated to scale and rapidly adjust for new users and network locations, making it increasingly difficult to effectively manage hybrid and cloud-based computing models. 

Reason #4: Lack of On-Premises User Security

VPNs are often used to enable remote connections to the network, but as a siloed solution, do not secure on-premises users. This lack of on-site security allows bad actors to exploit weaknesses in the office by gaining access to user accounts and moving laterally across the network.

Reason #5: Lacking Wi-Fi Security

Many remote and traveling employees often can’t tell whether Wi-Fi networks are secure, have devices that automatically join unsecured public Wi-Fi hotspots without their knowledge, or utilize VPN services that simply disconnect when a device is in locked or sleep mode. While many VPN providers offer this function, hardware-based legacy appliances and open-source VPN solutions require hours of manual configuration, lack unified network visibility and do not integrate well with the cloud.

Introducing the Software-Defined Perimeter

Replace SDP with VPN - Perimeter 81It’s clear that organizations need an entirely different set of technologies and policies to provide secure network access to both on-site and remote users. The Software-Defined Perimeter (SDP) is an emerging technology that is changing cloud networking. In fact, 60% of enterprises will phase out network VPNs in favor of software-defined perimeters by 2021.

The emergence of SDP has provided a holistic solution to remove the reliance on hardware across the entire security stack and to deploy, manage, and visualize network connections using only software. This enables the integration of powerful APIs, as well as the ability to analyze and visualize network traffic.

Implementing SDP allows organizations to restrict network access and provide customized, manageable and secure access to networked systems. Connectivity is based on the need-to-know-model, meaning each device and identity must be verified before being granted access to the network. This significantly reduces the attack surface area, hiding system and application vulnerabilities from unauthorized users.

How It Works

An SDP solution allows IT Managers to deploy gateways on-premise or over the cloud, securing employees’ remote access to cloud and on-premise applications, all while keeping sensitive data within the organizational network. It has been shown to stop all forms of network attacks including DDoS, Man-in-the-Middle, Server Query (OWASP10) and Advanced Persistent Threat.

A Software-Defined Perimeter (SDP) architecture has three important components: a Client, a Controller, and a Set of Gateways.

  • Client: The client runs on each user’s device while the controller is required to authenticate the users and their devices.
  • Controller: Each user is evaluated by the controller and issues tokens granting each user individual network entitlements.
  • Gateways: The set of gateways is where access is granted to the previously private resources. Network traffic is encrypted and tunneled between the user’s device and the corresponding SDP Gateway. This access point is logged, allowing compliance and auditing to track and record.

Twice as Many Reasons to Use SDP

Without SDP, a single user can do a lot of damage to your organization’s network. While some legacy solutions might be able to provide some of the following benefits with additional customization and integration, the SDP has been found to do it much faster and better.

  • Adaptive
    With an SDP, you can implement automated policies that dictate which device, user or service is able to access the network.
  • Global Access
    Using an SDP, you can deploy unified gateways, giving access to any resources, from any location. This provides connectivity for remote and on-premise users.
  • Precise Segmentation
    SDPs integrate with any Identity Provider, including Active Directory and SAML services, allowing you to utilize precise segmentation.
  • Secured & Encrypted
    To ensure total privacy, data security and classification, SDPs provide client and endpoint protection, identity and access management, OS and application level security, all while encrypting traffic with mutual TLS encryption.
  • Policies Based on Users
    Because SDP systems are user-centric (i.e. they validate the user and the device before permitting any access), they permit organizations to create access policies based on user attributes. This enables automated compliance reporting based on these details.
  • Seamless Audit and Report
    Exporting of logs and connection data to SIEM (security information and event management software products) or analytics platforms (such as Sumo Logic) via API is simple.
  • Account Hijacking
    Session cookie-based account hijacking is completely mitigated by SDP. Since all access is pre-authenticated and pre-authorized, incoming requests from malicious end-points are rejected.
  • Denial of Service
    Single Packet Authorization (SPA) makes SDP architecture much more resilient towards DoS attacks. Since SPA takes significantly fewer resources than a typical TCP handshake, servers are able to drop unsolicited network packets at scale.
  • Reduced Costs
    Automation reduces the need for manual firewall updates, reducing workload and labor costs and increasing productivity.
  • Least Privilege Access
    Secure, policy-based access and network segmentation create one-to-one network connections between the user and the resources they access. Everything else is invisible – including the system itself. This not only applies the principle of least privilege to the network but also reduces the attack surface area by hiding network resources from unauthorized users.

Cost-Effective SDP Network Access and Security

The bottom line is that legacy, perimeter-centric technologies are no longer effective against sophisticated cyber threats, growing endpoints and increased mobility, hyper interconnectivity and globalization.

Perimeter 81 is a technology built to replace traditional VPN technology and provide secure on-premise and remote access for the modern and distributed workforce. It offers a hardware-free, highly-scalable, cost-effective solution that ensures simplified secure network access to protect IP assets from end-point to data-center to the cloud. With a “Dropbox-like” intuitive user-interface, Perimeter 81 is the ideal solution for SMB-sized organizations not currently using a VPN due to cost and complexity.

With Perimeter 81, businesses can monitor and manage their network all in one place and easily secure and segment resource access. Our service provides greater network visibility, seamless onboarding and full integration with major cloud providers, giving companies of all industries and sizes the power to be truly mobile and enjoy complete confidence in the cloud. 

We hope you found this post helpful! Feel free to let us know if you have any questions and follow us on social media if you’d like to continue receiving all the latest business security news. To learn more about the many advantages new SDP technology has over legacy VPN solutions, we invite you to schedule a complimentary demo.

Read More
VP Global Sales - Perimeter 81

We Are Excited to Welcome Ohad Mandelbaum as Perimeter 81’s New VP of Global Sales

Reading Time: 1 minute

VP Global Sales - Perimeter 81

Ohad has more than 15+ years of international management, sales and business development responsibilities where he has built and managed small and large teams across four different continents. Prior to joining Perimeter 81, Ohad was the SVP of Global Sales at a medical device company BrainsWay, a publicly traded company, and as VP Sales & Business Development at Alma Lasers, which was sold to Fuson pharma FOR $241MM and went public in the HK stock exchange. His proven track record in B2B global Sales & Marketing, highly dynamic entrepreneurial start-ups environments and his business development experience has prepared him to successfully lead the Perimeter 81 sales team.  

Ohad’s previous leadership positions have focused on execution, which includes seven years of P&L responsibility. He also has experience and technical knowledge of industry disruptions, including P2P technologies, cloud services and performance management, both as an angel investor and as a consultant. Ohad is looking forward to working in the exciting, ever-growing and dynamic field of cyber security.

Ohad holds a BSc. in Biotechnology Engineering from Ben Gurion University and attended the Northwestern University Kellogg School of Management, earning his Executive MBA. He also served in the Israeli Air Force.

Ohad is native to Israel and spent several years living in Chicago and San Francisco before moving to New York City in 2016. His personal interests include 70.3 Ironmans, marathons, tennis, snowboarding and backpacking.

Read More

5 Easy Ways to Keep Your Employees Safe Online

Reading Time: 4 minutes

90% of Americans are using their personal devices for work, risking their workplace by accidentally opening access to their company data. Keeping your company and employees safe from cyber-attacks can be done by just following these 5 simple rules.
Continue reading

Read More

How to Improve Cloud Security and Productivity Through IP Whitelisting

Reading Time: 4 minutes

Manually whitelisting IP addresses can be a time-consuming process that needs constant management which is why utilizing a service that does this for you can boost employee productivity and improve cloud security.

IP whitelisting allows IT administrators to assign any team member a single, static outgoing IP address. This capability enables new types of cloud and on-premises configurations that are only possible with static IP addresses.

Instead of blocking access to identified risks and threats, such as in the case of blacklisting applications, web pages or IP addresses, IP whitelisting allows you to identify and permit access to trusted resources. By whitelisting IP’s, you are granting only trusted users within a specified IP address range permission to access specific domains or network resources such as emails, applications, URLs or more.

However, manually whitelisting IP addresses can be time-consuming and requires constant management. Here’s how you can automatically whitelist IPs so that you can boost employee productivity and improve cloud security for your entire network.

Whitelisting Usage and Benefits

Implementing IP whitelisting not only improves security but also promotes a more productive workforce by providing a secure and easy way for users to access private network resources from both personal and corporate mobile devices.

  • Improve Cloud Security
    By implementing IP whitelisting, you can improve system security by preventing unauthorized access to your account. If someone tries to access your network with an IP address that isn’t whitelisted, they will be denied access. With Perimeter 81, we provide IT administrators and owners the ability to define user access for every employee in the network, group them with users of similar access limits, and automatically whitelist the group’s IP address.
  • Increase Productivity
    Without a service like Perimeter 81 to whitelist IP addresses for you, IT administrators are left to manually whitelist IP addresses for users, websites, and other gated resources which can take a significant amount of time. With whitelisting, businesses can also limit access to unsecured or distracting sites that can reduce productivity and cut into profits. In fact, 50 percent of businesses take whitelisting very seriously because of these reasons.
  • Secure Remote Access
    Whitelisting enables organizations to secure remote access to the network, including BYOD (Bring Your Own Device) that allow employees to utilize their own devices. With remote access security, businesses can mitigate both cloud and on-site risks that could negatively impact your company’s projects or profits.

How to Whitelist IPs with Perimeter 81

Utilizing Perimeter 81’s secure network access service, all Internet traffic is fully secured and encrypted. Using the unified management portal, IT administrators can easily block out threats, grant user access to approved resources and automatically whitelist specific IP addresses.

How it Works

Perimeter 81’s private gateway feature provides IT administrators with the power to whitelist IP addresses, thereby enabling all team members to share a single, static outgoing IP address accessible by your organization or partners. For example, remote users can always connect to the Perimeter 81 private gateway first, then have their IP address whitelisted.

With Perimeter 81, you can give each user access to the necessary resources they need from any IP address by assigning users to groups. Each user signs in via Identity Provider integration, username and password, and/or two-factor authentication and is then able to access resources according to the roles and permissions assigned to them. This keeps IT administrators from having to manually whitelist every user’s IP address.

After the whitelist is configured with users and permissions, the user list should be audited on a routine basis as employees are hired and leave companies on a regular basis. In addition, partners that access IP whitelisted resources come and go and IT administrators should have full user access visibility through IP whitelisting.

Perimeter 81 IP Whitelisting in the Cloud

Because remote users can always connect to a gateway first and then have their IP address whitelisted to a security group, cloud service platforms including AWS, Azure, Office Firewall, SalesForce, or Zendesk can all be configured to work with Perimeter 81.

Using AWS, for instance, inbound traffic from Perimeter 81 to AWS can be authorized by whitelisting the Perimeter 81 Private Network IP address to your Security Groups (AWS Virtual Firewall).

AWS Security Groups enable the control of IP traffic to your instance, including traffic that can reach instances and services both in the cloud and on-premises. To whitelist IPs, you can allow computers from only your Perimeter 81 Private Server to access your instance using SSH, or use a web server that allows all IP addresses to access your instance using HTTP or HTTPS, so that external users can browse the content on your web server only once connected to Perimeter 81.

Example: How to Whitelist IPs in AWS

Following is a walkthrough of how to use AWS Security Groups to enable the control of traffic to an AWS instance, including traffic that can reach both instances and services:

  • Step 1: Create a Private Network IP Address
    First, create a Perimeter 81 Private Server and then obtain its static public IP address by following this guide.
  • Step 2: Add an EC2 Security Group Rule  
    Add an EC2 Security Group Rule for Inbound Traffic from Perimeter 81 to the required resources by whitelisting access to the Perimeter 81 Private Network to other instances, databases and related security groups.

    • In the navigation pane of the Amazon EC2 console, choose Security Groups.
    • For every security group you’d like to allow secured access over your Perimeter 81 Private Network, add an Inbound Rule:
      • Specify the related Type (ALL TRAFFIC, SSH, HTTP/HTTPS etc..).
      • Under the Source, enter the Perimeter 81 Private Network IP address including the subnet mask. For example, for IP address 129.42.24.22, enter 129.42.24.22/32 (CIDR notation).
      • Click Save.

Whitelist IP - Perimeter 81

Add access from Perimeter 81 Private Network to your AWS Environment, Instances or databases

Whitelisting Isn’t the Full Solution

For most businesses, whitelisting IP addresses can be overwhelmingly beneficial. However, even though whitelisting can improve cybersecurity, boost productivity and benefit your bottom line, it’s important to remember that each line of security is important. Whitelisting should not replace other security measures, but instead, be used as a complementary piece of a comprehensive security solution.

We hope you found this post helpful! Feel free to let us know if you have any questions and follow us on social media if you’d like to continue receiving all the latest business security news.

 

Read More
InfoSec Trends - Perimeter 81

10 InfoSec Trends CISOs Are Excited About Seeing in 2019

Reading Time: 6 minutes

As the number of cyber attacks continues to grow and privacy regulations such as GDPR take effect, it’s clear that security is pushing its way to the forefront of business priorities.

However, simply dumping money into a complex cybersecurity problem isn’t going to protect customer data, segment user access or secure remote connections to the network. Instead, businesses will need to invest in a cybersecurity solution that works for them.

While simple tips such as encrypting data, changing the default passwords on server infrastructure and monitoring network traffic and server usage can help secure your business’ private data, these CISOs explained what trends and innovations they’re most excited about seeing in the InfoSec industry this year.

Trend #1: Talent Availability and Mastering InfoSec

While the new year introduces endless predictions for the next popular product, service and technology, one trend many CISOs are hopeful to see is an increase in talent availability. Information security is only becoming more complex which is why we need more professionals actively seeking to fill this talent gap. 

“At the heart of the challenge is the small number of people with a cybersecurity skillset. We need to find ways to leverage a small population of qualified practitioners while at the same time finding ways to develop new security and risk professionals with a mindset of fundamental best practices. My focus and evangelical mission this year is helping organizations address the fundamentals (setting the stage for taking on the shiny and exciting technical innovations) and finding ways to leverage existing experts and building and fostering new talent.” – Christopher Gerg, Vice President of Risk Management at Gillware

Trend #2: Zero Trust Security

Zero Trust - Perimeter 81

As new cloud applications and services are being introduced all the time, many global enterprises are welcoming more advanced security solutions such as zero trust.

“The zero trust model eliminates the idea that internal players are trustworthy individuals who mean no harm. Zero trust security continuously evaluates an individual’s behavior and actions to identify and eliminate potential threats. This is accomplished by defining parameters of legitimacy via a range of factors that determines the validity of a user’s behavior in the form of a risk score. These determining factors may include a user’s physical location, IP address, and permissions, among many others.” – Aaron Walker, Senior Research Analyst at G2Crowd.com

Trend #3: Application Security Testing

Application layer attacks are expected to increase this year, which is why emerging application security tools such as Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) are necessary to protect custom code, open source libraries and frameworks.

We are seeing a wholesale shift from legacy perimeter defenses and vulnerability scanning to instrumentation-based defenses that run as part of the thing being defended. This is true at every layer of the stack, where we can protect individual workloads by integrating security vulnerability detection and attack prevention directly into each layer. IAST and RASP are the most disruptive here, integrating security directly into custom code applications.” – Jeff Williams, Co-Founder and CTO of Contrast Security

Trend #4: More Immersive Machine Learning and AI Systems

Artificial Intelligence - Perimeter 81While Artificial Intelligence is a trending topic, many of these information security tools remain overcomplicated. In some cases, AI and Machine Learning can be useful as strong detection and prevention tools, but industry-wide, the implementation of these pattern recognition technologies can be troublesome.

“CIOs are realizing that through improper implementation of such disruptive technologies, security weaknesses have been built inside of their organizations. In order for these advanced systems to benefit enterprises, establishing clear requirements and investing in the education of the technology is integral for proficient deployment. We should expect to see CIOs adopting platforms that allows developers to store info with your own security models and is more applicable to the needs of the future.” – Lawrence Flynn, CEO of Artificial Solutions

However, AI systems and machine learning are able to effectively learn from user behavior and apply adaptive controls which can automatically detect known threats before they cause significant harm.

“Machine learning is a large experimentation process. Right now, however, most companies are failing to capture information on the vast majority of their experiments and failing to provide their researchers with the tools they need to efficiently develop cutting-edge models. We’re also going to see a shift from simple, end-to-end tools to custom, best-in-class machine learning platforms as people begin to realize the value of specialization. A leading indicator of this trend will be the rise of new jobs around product management for ML platforms. As specialization occurs, more advanced methods of machine learning like deep learning and reinforcement learning will gain traction.” – Scott Clark, CEO and Co-Founder of SigOpt

Trend #5: Workflow Automation Within SOC Organizations

Workflow automation is expected to increase within SOC organizations this year. “CISO’s will start to explore tech solutions paired with process and procedure to offset the amount of skilled engineers to combat cyber threats. Tooling implemented will not only be focused around workflow, but also machine learning capabilities to identify patterns and behaviors that can drive automation to remediate threats. As enterprises increase in devices, networks, and identities, organizations will need to implement tech to increase awareness driving automated solutions to keep networks secure.” – Ray McKenzie, Founder and Managing Director at Red Beach Advisors

Trend #6: Prioritizing DevOps as the Focus of an Agile Strategy

Agile DevOps - Perimeter 81One of the primary challenges in DevOps is overcoming the “separation of concerns” that exists by providing DevOps teams with a collaborative environment that can be accessed securely without restricting the agility of development and operations.

“In 2019, more companies will begin to prioritize DevOps as the focus of their agile strategy. As nearly every company is shifting their business model towards software in some capacity, those that will be successful will recognize that their ability to be agile can only be accomplished if they are automating as much of their pipeline as possible..” – Alex Salazar, Vice President of Product Strategy at Okta

Trend #7: SDWan Simplifies Network Security

“Services like Megaport and Masergy will increase the ability for InfoSec teams to monitor, control and adapt their networks to mitigate threats. Instead of having to support MPLS, Dark Fiber and ISP, SDWan will pull the networking experience under one roof and allow for greater flexibility and integration which will enable better security.” – Drew Farnsworth, Partner at Green Lane Design

Trend #8: Cloud Security Concerns

As companies continue to shift to the cloud, we’ll see more businesses who fail to configure their cloud environments correctly. One of the first strategies companies attempt for cloud migration is named “lift and shift,” which simply takes an application and migrates it up to the cloud provider. This often unintentionally exposes the applications to more users, where the internal application from several years ago with limited maintenance is now available up in the cloud.

With cloud migrations, I see a level of bill hijacking, where hackers attempt to run their services in other companies’ accounts. When you look at crypto-mining and bustable cloud resources, it’s perfect: the hacker gets the coins and the victim pays for the resources. The cloud always has more resources for sale.” – Erik Costlow, Principal Product Evangelist at Contrast Security

Trend #9: Increased Managed Security Services

Managed IT - Perimeter 81

While businesses move to the cloud, in-house IT services and localized networks are becoming a thing of the past. “Managed security services, where someone is always on and watching your system against threats, is becoming more the rule than the exception. There are nearly a million pieces of malware released per day, and that’s even including more specialized attacks like DDos. The number of threats isn’t going to diminish anytime soon. Being prepared is the only solution.” – Adnan Raja, Vice President of Marketing for Atlantic.Net

Trend #10: Increased Network Segmentation

While many organizations rely on dated, hardware-based VPN technology, these systems are complex, costly and require extensive management. The Software-Defined Perimeter (SDP) model addresses traditional VPN limitations while providing a flexible cloud-based platform, granular user-access control and analytics, and segmented access to on-premise and cloud resources. 

More advantages of SDP technology include the ability to:

  • Employ role-based access controls, logs and analytics
  • Distribute global IP addresses  
  • Save money on deployment and management
  • Easily achieve compliance regulations
  • Enable secure remote connections”

– Amit Bareket, Co-Founder and CEO of Perimeter 81

We hope you found this post helpful! Feel free to let us know if you have any questions and follow us on social media if you’d like to continue receiving all the latest business security news.

Read More
MSP Multi-Tenant Platform

Introducing the Multi-Tenant MSP Platform

Reading Time: 2 minutes

With our multi-tenant MSP management platform, we’ve added even more capabilities so that our partners can easily manage multiple organizations and networks all in one place. With these new features, MSPs can use the new multi-tenant management platform to easily switch between multiple organizations and implement network changes almost instantly.

Greater Recognition and Success for MSPs

Perimeter 81’s hardware-free infrastructure, multi-tenant management platform and single-click client applications grant Managed Service Providers and their clients the benefits of hassle-free, highly scalable and cost-effective network security.

By providing partners with ready-to-use tools and resources, we hope to aid MSPs in promoting their market success. “We at Perimeter 81 are proud to offer even more tools and comprehensive resources to our valued partners,” remarked Amit Bareket, CEO and Co-Founder of Perimeter 81. “With our MSP multi-tenant platform, our partners can easily manage clients and resellers separately while effortlessly switching between accounts. This reduces much of the headache that outdated hardware-based legacy VPNs have created for them.”

The MSP Multi-Tenant Management Platform

In addition to our partner portal where you can amplify your digital marketing efforts with a resource-rich and free-to-use CRM service, the multi-tenant management platform enables MSPs to:

  • Manage customers, resellers, multiple organizations, team members and networks all in one place
  • Easily manage billing and view customer license activities
  • Gain network visibility and intelligence for clients
  • Benefit from consolidated auditing and reporting

MSP Platform - Perimter 81

In the overview section, you can see each of the organizations you manage, including clients and resellers. Here, you can simply select the organization you’d like and quickly manage their networks, servers and licenses. For each organization, you can easily invite team members, connect identity providers, enable two-factor authentication and more.

Perimeter 81: A Secure Network Access Solution

Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based.

As a Perimeter 81 partner, you can offer your clients:

  • Automatic Wi-Fi Security: Our signature patent-pending Automatic Wi-Fi Security feature immediately protects your traveling and remote employees from unsecured Wi-Fi hotspot threats.
  • Cross-Platform Applications: Easy-to-use cross-platform applications available for all your employees’ corporate and BYOD devices. 
  • Dedicated IP Addresses: Private servers with dedicated IP addresses so you can skip manual IP whitelisting and lock down secure resources to protected IPs.
  • Single Sign-On Integration: Enforce secure policy-based access with identity provider integration, including G Suite/ Google Cloud, Okta, Microsoft Azure AD and Active Directory/LDAP.
  • Two-Factor Authentication: Add an extra layer of security and prevent remote attacks with SMS notifications and Google Authenticator.
  • Advanced Activity Monitoring: Gain even more insight into your network’s health, activity and security with increased activity visibility including group and server creation, team member authentications, password changes and more.

Feel free to let us know if you have any questions, follow us on social media or follow the link below to learn more about partnering with us.

[button style=”btn-default btn-lg” type=”link” target=”true” title=”Partner With Us” link=”https://www.perimeter81.com/partner-with-us” linkrel=””]

Read More
Top Tools for Remote Workers

Top 10 Tools for People with Remote Jobs

Reading Time: 4 minutes

The world of freelancing and hiring remote workers has transformed the way people work. With people constantly plugged in, self-managing time and projects, and traveling and connecting to unsecured networks, the resources and tools remote workers need are far-reaching. That’s why we’ve outlined just a few ways you can help a remote worker you know increase productivity with these top 10 gifts for people with remote jobs.

Productivity Tools

Time Doctor – Time Tracking and Management
Remote workers rely heavily on time tracking, productivity management tools, and other self-managing apps and services that help boost productivity. Time Doctor is a must-try time tracking tool that allows remote workers to account for every hard working minute and easily send invoices to clients. While this boosts tracking efforts by employees, this also allows employers and clients to monitor the money they are investing in projects as well. “By letting them start the habit of knowing how and where they spent their time (which Time Doctor’s analytics would show), productivity will increase by at least 20%.” – Carlo Borja, Head of Online Marketing at Time Doctor

Trello – Project Management Software
Trello is a popular project management and collaboration tool that allows users to organize tasks visually according to different boards and projects. “I’ve been a big fan of Trello for a long time because I can organize all my projects into one place. The color design is beautiful and being able to check in on several boards at once somehow makes my stress plummet. Furthermore, the recent Slack integration is excellent for remaining connected to the office and updating my boss on project milestones. For anyone working with multiple to-do lists, timelines, and goals, I highly recommend Trello. Plus, it’s only $10 a month!” Taylor Covington, Content Marketing Associate at The Zebra

Airtable – Task Management and Content Curating
While there are many task management tools out there, Airtable’s social media marketing and content tools make managing work and increasing productivity easy. “It helps me set content schedules, is great for content planning, and the social media calendar tool makes my clients feel confident in my social media management services.” – Mikaela Delia, Freelance Online Marketer at Miracle Marketing

Technology Tools

Portable Laptop Battery
Working remotely means you’re in constant need of a power supply. Unfortunately, knowing where you can plug in while traveling can become quite the hassle. With a new, high-speed laptop charger, remote workers can quickly recharge, making working on-the-go even easier. “Equipped with both USB-C Power Delivery and a hi-voltage laptop port, the V88 quickly & efficiently charges laptops (including MacBook, Surface, & USB Type C) on-the-go. FAA compliant and compact, it’s the perfect gift for travelers of all kinds.” – Julia Yavin, Director of Sales & Marketing at Voltaic Systems

Bluetooth Headphones
While Bluetooth headphones are convenient for many people, remote workers benefit drastically by going hands-free. Many remote workers often spend hours on their computers, dialed into conference calls, sharing screens and more. Each of these activities requires headphones and other audio hardware, making hands-free Bluetooth headphones an excellent idea for any remote worker. “My top resources for working remote: A good laptop and a good set of Bluetooth earphones – I love my MacBook and AirPods” – Debbie Winkelbauer, CEO of Surf Search

Wireless Chargers and Scanners
Wireless chargers and scanners have become increasingly convenient both in offices and for those with remote jobs. “Many [wireless chargers] are compatible with Apple products and can even charge an iPhone and Apple Watch at the same time. Some wireless chargers even work in the car, so you can easily charge your devices on the go,” says James Rice, Head of Digital Marketing at WikiJob. “When you are a remote worker, sometimes things that are easy within an office environment become tricky. A wireless scanning device can sign and scan contracts or digitize paperwork ready for uploading or emailing. This makes it easy to share signed or printed paperwork with colleagues all over the globe. Its compact size is also great for travel or for small home offices.”

Noise-Canceling Headphones
Often times, remote workers carry out their work in public spaces. This may be coffee shops, airports, or other public places. Noise-canceling headphones allow remote workers to tune out the distractions and get to work uninterrupted. “They allow you to work in co-working spaces and other noisy environments without interruptions. They are also very helpful if you work from home and have children around the house.” Rob Palmer, CEO of GoFreelance

Collaboration Tools

Toggl – Time Tracking Software
One of the toughest challenges of being a remote worker is collaborating with distributed teams. “Most of our engineers (we’re a Software Development Staffing company) are remote workers. We use Toggl for time tracking and notifying clients of how the time they are paying for is being spent.” – Julia Duran, CEO and Co-Founder of South Geeks LLC

Loom – Video Collaboration
“This is a free screen and video recording tool. It allows me to quickly send a video to my team and share my thoughts. It’s extremely easy to use and makes communication far more clear than email. Sometimes, when I want to show specific things to my team or give feedback, I quickly create a video using it. It saves a lot of time and has helped me become a lot more efficient.” – Sumit Bansal, Founder of Craft of Blogging

A Business VPN
Virtual Private Networks, VPNs, are not only useful for expats looking to bypass geo-restrictions, but they also offer powerful advantages for both consumers and businesses. Since remote workers often travel and connect to unsecured Wi-FI, it’s important that they utilize a VPN to quickly set up a private, secure connection to another remote network. That means they can safely access any of their clients’ private data without compromising the data or sensitive systems or triggering security alerts.

We hope you found this post helpful! Feel free to let us know if you have any questions and follow us on social media if you’d like to continue receiving all the latest business security news.

Read More
HIPPA Compliance - Perimeter 81

How a VPN Can Help with HIPAA Compliance

Reading Time: 3 minutes

HIPAA compliance affects healthcare organizations, insurance agents and more. In this recent podcast, we’ve outlined the easiest way to secure your data so that you can meet HIPAA compliance obligations easily and cost-effectively.

Public Wi-Fi is dangerous for both people and businesses, especially for those dealing with confidential and sensitive data. Due to a lack of encryption and open passwords, unsecured networks can be hacked in a matter of seconds.

We’ve already seen many significant healthcare data breaches this year. The HIPAA Journal reported that there were 29 breaches in May of 2018 alone with unauthorized access being the most numerous type of breach with an incident of 51 percent.

Introducing the Cloud VPN

With a Virtual Private Network (VPN), organizations can easily protect data transmission, secure data with strong encryption and meet other compliance requirements to secure electronic Protected Health Information (ePHI).

When you connect to a VPN, you create an encrypted tunnel that protects your data from hackers and third parties. This allows you to set up a completely private and secure connection to another network, enabling remote employees to securely access the network while they’re outside of the office.

Our service actually takes this one step further with Automatic Wi-Fi Security – a patent-pending feature that automatically activates military-grade encryption the moment an employee connects to an unsecured Wi-Fi network. This keeps all data being transferred over the network hidden from hackers – even if their mobile device is locked and inside their pocket.

How Does a VPN Supplement HIPAA Compliance?

Majority of ePHI breaches result from compromised mobile devices or networks that contain unencrypted data which can result in loss of trust, substantial fines, criminal charges, and even civil action lawsuits.

To secure confidential data, organizations can implement a VPN to encrypt all transmitted data over the network, securing protected health information both on-site and remotely. Cloud VPNs integrate seamlessly with major cloud providers and can ensure that sensitive data located in cloud environments are fuly protected and secured.

The Benefits of Using a Cloud VPN

  • Lockdown Confidential Data and Databases to a Specific IP Address

    When you deploy a private server, you essentially restrict access to certain resources using a specific IP address. This allows you to designate certain team members to have access to only that server or IP address, limiting data access and segmenting the network.

  • Nonstop Security with VPN Kill Switch

    A VPN kill switch ensures that if the VPN disconnects for any reason, the Internet connection is stopped and no data is transferred. That means that no data will ever be transmitted over the network without encryption so that no third party can see your data in plain text.  

  • Full Visibility with a Unified Management Platform

    Not all software based VPN services offer advanced visibility and management features. With our VPN service, you can easily invite team members, deploy private servers and view all network activity in one unified place.

  • Two-Factor Authentication and Identity Provider Integration

    Two-factor authorization is key to security because it prevents hackers from accessing your account even if they were to obtain your login credentials. By requiring an additional layer of security via SMS push notifications or Google Authenticator, user access can be easily maintained.

Achieve HIPAA Compliance with a Full-Service Security Solution

At Perimeter 81, we’re highly aware of data storage and logging privacy because it’s critically important in both the business and consumer spaces. Even before GDPR came into effect, we were ready to address these security issues for our customers.

Cloud-based VPN technology offers much-needed scalability, affordability and increased compatibility with cloud storage environments. We are GDPR compliant, SOC-2 compliant and ISO 27 001 compliant so that we can offer a highly effective solution for any organizations’ HIPAA compliance needs. 

If you’d like to learn more about using a VPN for HIPAA compliance, please don’t hesitate to request a demo at www.perimeter81.com/demo or contact our sales team at [email protected].

Read More
Amazon partner network

Perimeter 81 is an Advanced Technology Partner in the Amazon Web Services Partner Network

Reading Time: 2 minutes

Perimeter 81 receives Advanced AWS Technical Validation

Perimeter 81, a leading provider of Cloud VPN and Software Defined Perimeter technology, has been recognized as an Advanced Technology Partner in the Amazon Web Services (AWS) Partner Network (APN).

About APN Technology Partners

The APN is a global program, designed to help APN Partners build successful AWS-based businesses or solutions by providing business, technical, marketing, and go-to-market support.

This distinction recognizes that Perimeter 81 offers an advanced software solution that has demonstrated proven expertise, technical proficiency and directly integrates with the AWS platform.

Additionally, as an APN Partner, Perimeter 81’s solution is secure, compliant, follows the AWS Well-Architected Framework, and implements best practices for security, high availability, support, costs, and automation on AWS.

Why Work with an APN Partner?

APN Partners have proven, deep expertise on AWS – meaning they are fully capable of assisting you during your transition to the cloud. With full access to the business benefits AWS has to offer, APN partners are able to help customers succeed during their journey and help them reach their business objectives.

For Perimeter 81, this accomplishment benefits our current and future clients and partners by enhancing our ability to provide a next-generation secure network access solution to our customers using AWS.  

“We are proud to join the AWS Partner Network and are excited to have been upgraded as an AWS Advanced Technology Partner,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “We are committed to simplifying cloud security with an easy-to-use software solution available to businesses of all sizes and hope that this recognition will continue to push us forward in this quickly growing market.”

Perimeter 81 for AWS

Perimeter 81 offers Cloud VPN for AWS customers are responsible for secure usage of unmanaged AWS services. That means customers must provide their own security through authentication and user access control in order to protect their Amazon cloud environment.  

We understand the impact of cloud migration, which is why we’re offering an easy-to-use, scalable cloud security solution that provides simple and cost-effective access control and monitoring for your entire security landscape.

Perimeter 81’s advanced security features include:

  • Cost-Effective Compliance
  • Segmented Resource Access
  • Actionable Intelligence
  • Simple Cloud Migration
  • End-to-End Encryption
  • Secure Remote Access

About Perimeter 81

Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based. Please visit http://www.perimeter81.com to learn more.

Attending AWS re:Invent? Schedule a meeting with our team and learn how to simplify secure access to your entire AWS network.

Read More
Public Wifi threats

Public Wi-Fi Risks and How You Can Easily Protect Your Clients from Them

Reading Time: 3 minutes

The number of public Wi-Fi networks is expected to grow to 432 million by 2020. As public Wi-Fi becomes more available, attacks on them will only increase. So what are the risks associated with using public Wi-Fi and how to avoid them?

Utilizing a VPN (Virtual Private Network) is one of the safest ways to keep data protected. In this webinar, we discuss how a cloud-based VPN can support the convenience of public Wi-Fi while adding extra security for business people to keep their data traffic encrypted and their company’s assets safe.

The Risks of Public Wi-Fi

As public Wi-Fi has become more and more available, attacks on public networks have only increased. Cisco’s Visual Network report revealed that the number of public Wi-Fi hotspots is expected to grow to 7 times the 2015 figure, from 64 million to 432 million by 2020.

Some risks associated with using public Wi-Fi include:

  • Insufficient Encryption
    Many Wi-Fi hotspots have absolutely no form of encryption, or they utilize the much weaker WEP protocol that is susceptible to cybersecurity breaches.
  • Poor Password Protection
    Many Wi-Fi hotspots have widely shared passwords, or even worse, absolutely no password protection. This provides incredibly easy access to cybercriminals who’d like to access the network and compromise your data.
  • Lack of Awareness
    Unfortunately, many people are not aware of the risks of public Wi-Fi and assume that since they had to log in, the network must be secure. In fact, only one in three people can actually tell the difference between secured and unsecured Wi-Fi networks.

The Most Common Public Wi-Fi Threats That You Should Be Aware Of

One in five people and three in ten senior business managers have been hit by cybercrime while on the go.

Here are a few examples of how these attacks happen:

  • Man-In-The-Middle Attack
    Using this method, hackers are able to intercept data transmission between two endpoints. Once they are in control of the connection, attackers have the ability to read and even alter data that is transferred back and forth.
  • Packet Sniffing
    Using readily available tools, hackers can capture packets of data passing through the network, allowing them to steal administrative passwords, sensitive login credentials and much more.
  • Evil Twin Attack
    With a seemingly legitimate network, hackers can trick employees into connecting to a rogue Wi-Fi hotspot. Once this happens, they have full access to all the information that a person transfers online.
  • Wi-Fi Pineapple
    For less than a hundred dollars a bad actor can use a small portable device called a Wi-Fi pineapple to generate spoof sites that allow them to eavesdrop on your private data.

How to Protect Yourself on Public Wi-Fi

With the rise of people working remotely and connecting to Wi-Fi hotspots with their mobile devices, businesses are struggling to protect their confidential information.

Here are a few measures you can take right now to start protecting your data: 

Browse Only over HTTPS Encrypted Sites

When you browse on a website you want to check for a green lock symbol at the start of the URL. This indicates that your traffic is being encrypted through SSL encryption technology and that the data transferred between your browser and the website is secured. However, this method is still vulnerable to SSL stripping.

Enable Two-Factor Authentication

Two-factor authentication (2FA) is a great way to prevent your accounts from being hacked. It ensures that, in addition to your username and password, a second layer of verification such as an SMS code is required. However, in the case of public Wi-Fi, this method only protects your account during the login process, so it isn’t enough to keep you safe online. 

Disable Auto Join to Wi-Fi Networks

Many Wi-Fi hotspots are unsecured. However, your phone automatically remembers previous networks you’ve connected to and will reconnect to them even if you don’t interact with your phone. Since it’s important to make sure that the network you’re connecting to is authorized, reliable and trustworthy, you should disable auto join on your device. 

With Perimeter 81

With Perimeter 81, you can set up a private secure connection to another network which enables you to browse through an encrypted tunnel

Perimeter 81’s secure network access solution offers an easy-to-use security tool with many technical advantages, including

  • It’s cost effective because you don’t have the expensive external hardware
  • It’s easy to set up and manage because it’s software-based and offers immediate updates and upgrades
  • It is highly scalable and offers seamless cloud integration
  • It provides multi-tenant support and clear MSP management

With a secure network access solution, you can rest assured knowing that your entire network is protected. We’ve received special approval from Apple for our breakthrough feature automatic Wi-Fi security. When activated, the minute a user connects to an unsecured Wi-Fi network, we automatically activate an encrypted VPN channel to ensure that all their data is protected.

We also utilize 256-bit AES bank-level encryption, secure tunneling protocols including OpenVPN, L2TP over IPSec, and Perfect Forward Secrecy (PFS) which rotates encryption keys every 60 minutes.

If you’d like to learn more about using a VPN for Wi-Fi Security, please don’t hesitate to request a demo at www.perimeter81.com/demo or contact our sales team at [email protected].

Read More
Webinar Increase Network Security

Webinar: How to Increase Network Security with a Few Clicks

Reading Time: 1 minute

The static, corporate network we once knew has completely transformed. More and more people are working from outside networks as they connect remotely or on-the-go, and company resources are no longer solely hosted in closed, on-premise environments, but have also expanded to the open Internet and cloud.

The IDC has projected that by 2020, 75% of the workforce will be comprised of mobile workers, and public cloud spending will have reached a whopping $162 billion dollars.

For years we’ve relied on the traditional hardware-based VPN to enable secure network access. Yet with fragmented architecture, complicated client applications, and a lack of seamless cloud integration, the traditional VPN is no longer a viable option for today’s modern workforce.

Luckily, there is a change on the horizon. This webinar outlines how the emergence of the Software-Defined Perimeter technology and Zero-Trust network architecture has the power to improve network security for companies across the board.

This webinar also reveals how Software-Defined Network Access solutions can effectively hide critical resources from unauthorized users and bad actors.

For more information, please visit www.perimeter81.com or send an email to [email protected].

Read More
Cybersecurity breakthrough award

Perimeter 81 Honored in Annual CyberSecurity Breakthrough Awards Program

Reading Time: 2 minutes

Company Wins “Mobile VPN of the Year” Designation in 2018 CyberSecurity Breakthrough Awards

PITTSBURGH, Sept. 26, 2018 – Perimeter 81, a leading provider of Cloud VPN and Software Defined Perimeter technology, today announced that it has been named the winner of the “Mobile VPN Solution of the Year” award from CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies and products in the global information security market today.

“Today’s workforce is largely mobile and yet we are seeing many legacy privacy and security solutions currently implemented despite the fact that they were built for stationary office-centric workers,” said James Johnson, managing director, CyberSecurity Breakthrough. “Perimeter 81 is a true mobile VPN and Wi-Fi security solution that is built for today’s modern, mobile workforce, helping organizations proactively protect their mobile workforce, and we are pleased to recognize them as a 2018 CyberSecurity Breakthrough Award winner. Congratulations to the entire Perimeter 81 team on their well-deserved industry recognition.”

The mission of the CyberSecurity Breakthrough Awards is to honor excellence and recognize the innovation, hard work and success in a range of information security categories, including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Email Security and many more. This year’s program attracted more than 3,000 nominations from over 14 different countries throughout the world.

“The rise of Cloud and Mobility has disrupted the legacy security appliances market. Users are working from anywhere, anytime and mostly from their mobile devices.” Amit Bareket, CEO and Co-Founder of Perimeter 81. “We’re honored that CyberSecurity Breakthrough has chosen us as their Mobile VPN Solution of the Year.”

Perimeter 81’s consumer division, SaferVPN, was also awarded Consumer Encryption Solution of the Year for the CyberSecurity Breakthrough Awards.

About Perimeter 81

Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based. 

About CyberSecurity Breakthrough

Part of the Tech Breakthrough Awards organization, the CyberSecurity Breakthrough Awards program is devoted to honoring excellence in information security and cybersecurity technology companies, products and people. The CyberSecurity Breakthrough Awards provide a platform for public recognition around the achievements of breakthrough information security companies and products in categories including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Web and Email Security, UTM, Firewall and more. For more information visit CyberSecurityBreakthrough.com.

Read More
Perimeter 81 Cloud Platform Launch

Introducing Our New Cloud Management Platform

Reading Time: 2 minutes

Today we’ve reached a major milestone. After months and months of planning, development and design, we’ve officially launched our new, feature-rich cloud management platform.

The new platform not only features a sleeker, even friendlier user interface, it also includes several advanced security features to help you, our valued customers, easily and completely build, manage and secure your networks.

Since launching Perimeter 81 a few short months ago, we have quickly gained traction in the mid-market. We’re seeing so many businesses, across a wide variety of industries that are in need of simpler, more reliable network security. Our goal, since day one, has been to deliver a single-click service that will eliminate much of the hassle and headache you experienced in the past, and give you greater peace of mind in the future.

The features of the new platform include:

  • New, Sleek UI: With our new and improved UX and UI, compatible for web and mobile devices, it’s now easier than ever before to deploy, manage and secure your organization’s network.
  • Single Sign-On Integration: Now our customers can enforce secure policy-based access with total ease. Perimeter 81 offers integration with several leading Identity Providers including G Suite/ Google Cloud, Okta, Microsoft Azure AD and Active Directory/LDAP.
  • Two-Factor Authentication: Add an extra layer of security and prevent remote attacks with SMS notifications, Google Authenticator and Duo Security authentications. We know this feature will be highly valuable for all businesses, and particularly those that need to adhere to strict industry regulations, like HIPAA compliance standards.
  • Brand New Server Locations: For even higher availability and connection speed, we’ve added seven new, international locations where our customers can deploy private servers: Atlanta, Dallas, Miami and Seattle in the United States; Paris, France; Sydney, Australia and Tokyo, Japan.
  • Advanced Activity MonitoringWith the new platform, you can gain even more insight into your network’s health, activity and security. Our new platform includes a wide range of activity types including visibility into group and server creation, team member authentications, password changes and more.

Experience the full tour of our new platform here:

Along with the new additions, Perimeter 81 continues to provide:

  • Our signature Automatic Wi-Fi security feature to immediately protect your traveling employees from Wi-Fi hotspot threats
  • Easy-to-use cross-platform applications available for all your employees’ corporate and BYOD devices
  • Private servers with dedicated IPs so you can skip manual IP whitelisting and lock down secure resources to protected IPs.

And in the near future, we will be launching a multi-tenant platform for our channel partners so that our partners will have the ability to manage multiple organizations and networks all in one place, and enjoy consolidated billing, auditing and reporting.  

We’re so excited to hear what you think about the new platform, and thank you for all your valuable feedback so far. Together we’re reaching a new level of network and data security — for our businesses and our customers.

– Amit and Sagi

Read More

Perimeter 81 Launches New Partner Portal in Conjunction with Mindmatrix

Reading Time: 3 minutes

Tel Aviv, Israel – September 5, 2018

The Cloud VPN service and Sales Enablement Software Provider have teamed up to empower MSPs to sell a new brand of innovative, software-defined network access

Perimeter 81, a pioneering provider of Cloud VPN and Software Defined Perimeter technology, has officially launched its Channel Partner Portal in conjunction with Pittsburgh-based Mindmatrix, a leader in sales and channel enablement software solutions.

The new Partner Portal will promote Perimeter 81 partners’ sales and digital marketing efforts by providing them with a resource-rich and free-to-use CRM service.

“As a channel-forward service, we at Perimeter 81 are excited to offer this comprehensive resource to our valued partners,” remarked Amit Bareket, CEO and Co-Founder of Perimeter 81. “Many of our partners have expressed to us how our software-based VPN-as-a-service reduces so much of the headache outdated hardware-based legacy VPNs have created for them. Now we are proud to offer them even more tools to enable their market success.”

The unified management platform includes a wide variety of beneficial digital marketing and sales features. Highlights of the portal for partners include:

  • Co-Branded Marketing Assets
    Partners can co-brand and distribute valuable marketing materials to prospective clients.
  • Training Materials
    Partners can access a sales playbook with scripts, technical guides and presentations.
  • Lead Sharing
    Perimeter 81 partners can quickly receive contacts for relevant and interested leads.
  • Lead Generation
    Partners can create customized email campaigns to onboard current clients and nurture prospects.
  • Deal Registration
    Partners can easily track, register and get immediate priority for their deals.

“One of the key factors driving channel partner relationship success is helping channel partners sell and market better,” said Harbinder Khera, CEO and Founder of Mindmatrix. “Partners have too much going on already and will naturally pick vendors whose products and services are the easiest to sell. Providing partners with ready-to-use tools and resources that help them build their brand in the local market, will make all the difference. With its Partner Portal, Mindmatrix is helping Perimeter 81 accomplish that.”

Perimeter 81’s hardware-free infrastructure, multi-tenant management platform and single-click client applications grant Managed Service Providers and their clients the benefits of hassle-free, highly scalable and cost-effective network security. The Cloud VPN service’s new Partner Portal promises to offer its industry partners even greater recognition and success.

ABOUT PERIMETER 81

Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based.

To learn more about Perimeter 81’s cutting-edge secure network access service visit: www.perimeter81.com

ABOUT MINDMATRIX

Mindmatrix offers Channel & Sales Enablement software for direct and indirect sales channels. Mindmatrix is the only provider of a Single Unified Platform that combines PRM software, Direct Sales and Channel Enablement, Channel Marketing software, Marketing Automation software and Marketing Asset Management. Mindmatrix takes you through every step in the sales process from lead to revenue, enabling your salespeople and channel partners to sell more, faster.

Perimeter 81 Co-founders: Sagi Gidali, CPO, and Amit Bareket, CEO

Perimeter 81 Channel Partner Portal

A glimpse of the new Perimeter 81 Partner Portal

Read More
Perimeter 81 Recognized in Gartner’s Hype Cycle for Infrastructure Strategies, 2018, Hype Cycle for Cloud Security, 2018, and Hype Cycle for Enterprise Networking and Communications, 2018

Perimeter 81 Recognized in Gartner’s Hype Cycle

Reading Time: 3 minutes

Perimeter 81, a secure network access solution for the modern and distributed workforce has been recognized as a Sample Vendor by Gartner Inc., a leading IT research and advisory company, in the Hype Cycle for Infrastructure Strategies, 2018, Hype Cycle for Cloud Security, 2018, and Hype Cycle for Enterprise Networking and Communications, 2018.

We feel that this recognition encourages the success we’ve had in developing the next generation of innovative network access products and Wi-Fi security solutions.

At Perimeter 81, we have eliminated the need for traditional legacy VPN technology which is hardware-based, costly and both difficult to install and manage. Instead, we offer a simple, easy-to-use and cost-effective software solution for companies of all sizes.

Our Software-Defined Perimeter (SDP) service provides greater network visibility, seamless onboarding and full integration with major cloud providers, giving companies of all industries and sizes the power to be truly mobile and enjoy complete confidence in the cloud.

In the Hype Cycle for Infrastructure Strategies, 2018 report Gartner analysts Neil MacDonald and Steve Riley describe software-defined perimeter (SDP) as “an intersection of software-defined security and software-defined networking concepts, targeting controlled access of resources to a defined community of entities, thus reducing the surface area for attack.”

They also wrote, “SDP has piqued the interest of organizations seeking an alternative to VPNs and more precise access and session control to applications located on-premises and in the cloud.” The technology “will appeal to organizations looking for innovative and secure ways to both connect and collaborate with their digital business ecosystem, remote workers and partners.”

In the Hype Cycle for Enterprise Networking and Communications, 2018, Neil Macdonald and Steve Riley write that there are several use cases that lend themselves to SDP:

  • Opening up applications and services to collaborative ecosystem applications, such as distribution channels, suppliers, contractors or retail outlets without requiring the use of a VPN or DMZ.
  • Cloaking systems on hostile networks, such as systems facing the public internet used for collaboration.
  • Carrying encryption all the way to the endpoints for scenarios where you don’t trust the carrier or cloud provider.
  • Application-specific access for IT contractors and remote or mobile employees as an alternative to VPN-based access.
  • Permitting users in potentially dangerous areas of the world to interact with applications and data in ways that reduce or eliminate risk prone to originate in those areas.
  • Secure enclaves of IoT devices if the device can support lightweight SDP agent or a virtual-appliance-based connector on the IoT network segment for connection.
  • Enabling SaaS to enterprise connectivity for workloads that require SaaS applications to interact with on-premises services.

What is the Hype Cycle?

Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. Gartner Hype Cycle methodology gives you a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals.

Additionally, we feel that the Hype Cycle for Enterprise Networking and Communications, 2018, allows I&O leaders to evolve their networks by evaluating new technologies that support digital business initiatives and new business models. However, we believe that Gartner’s Hype Cycle for Cloud Security, 2018 encompasses technologies and standards that improve the security, governance and reliability of private and public cloud computing.

Why We Feel This Recognition Is Important

As new solutions continue to rise, it’s important to have a reputable resource to gain insight on the most effective and successful solutions on the market. From our perspective, the Hype Cycle gives leaders this much-needed resource, allowing them to easily find successful infrastructure strategies, cloud security solutions and effective enterprise networking and communications applications.

We are honored to be recognized in this year’s Gartner Hype Cycle. You can access Gartner’s Hype Cycle for Infrastructure Strategies, 2018 report, Hype Cycle for Cloud Security, 2018 report, and Hype Cycle for Enterprise Networking and Communications, 2018 report on gartner.com.

We are a globally recognized secure network access provider that lives up to and beyond the hype.  If you’d like to learn more about our product, or our vision for SDP technology, don’t hesitate to reach out to us or comment below.

 

Gartner, Hype Cycle for Infrastructure Strategies, 2018, Philip Dawson, Nathan Hill, 17 July 2018.

Gartner, Hype Cycle for Cloud Security, 2018, Jay Heiser, 19 July 2018.

Gartner, Hype Cycle for Enterprise Networking and Communications, 2018, Danellie, Young, Mike Toussaint, 13 July 2018.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Read More

Perimeter 81 Partners with Takara Joho to Bring Simpler, Software-Defined Network Access to the Japanese SMB Market

Reading Time: 3 minutes

FOR IMMEDIATE RELEASE

 Tel Aviv, Israel – August 13, 2018

Perimeter 81, a leading provider of Cloud VPN and Software Defined Perimeter technology, announced today that it has officially launched a partnership with Takara Joho, the premier IT reseller and MSP for SMBs in Japan.

The two parties have signed an agreement to introduce Perimeter 81’s innovative network-as-a-service technology to the Japanese market through Takara Joho’s multi-tier IT distribution and managed services.

“We are very committed to our growth and development in Japan and by working with an industry leader like Takara Joho, I am confident we can redefine secure network access for the Japanese mid-market,” said Amit Bareket, CEO and Co-Founder of Perimeter 81.

With its hardware-free infrastructure, multi-tenant management platform and single-click client applications, Perimeter 81 offers Managed Service Providers and their clients the benefits of hassle-free, highly scalable and cost-effective network security.

The software service is uniquely suited for the SMB and SME businesses, making it possible to automatically deploy secure policy-based access gateways in any location, on-premise or in the cloud, without the need for hardware installations and complex manual configuration.

“Perimeter 81’s solution for encrypting a company’s Internet traffic is now becoming a necessary infrastructure to secure Internet access. We intend to focus on selling Perimeter 81 as it aligns with our mission to protect SMBs in Japan from cyber attacks,” said Akihiko Hogyoku, President and CEO of Takara Joho. “As Japan will host the Rugby World Cup in 2019 and Tokyo Olympics in 2020, we have to be prepared for increasing cyber attacks and fake Wi-Fi hotspots. With Perimeter 81, Takara Joho will certainly contribute to cyber security in Japan.”

 ABOUT PERIMETER 81

Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based.

To learn more about Perimeter 81’s cutting-edge secure network access service visit: www.perimeter81.com

ABOUT TAKARA JOHO

Takara Joho, established in 1995 and headquartered in Osaka, is a leading distributor in Japan, providing a wide range of security solutions from network security to endpoint, mobile and cloud security. The company deals with multiple resellers, integrators and service providers to deliver to the SMB market and mid-market across Japan. Takara Joho has been one of the top distributors of leading Israeli cyber security solutions in Japan, offering years of reliable technical support.

To learn more about Takara Joho’s leading distribution service: https://www.takarajoho.com/

For additional media inquiries, please contact: [email protected]

Perimeter 81 Co-founders: Sagi Gidali, CPO, and Amit Bareket, CEO.

Read More

ChannelNEXT: A “Mastermind” Experience for Channel Partners

Reading Time: 2 minutes

Dubbed the best business practice building conference, ChannelNEXT gathered service providers, agents, VARs and MSPs to share marketplace knowledge, drive conversation and help shape the industry.

“After a few years of transforming ChannelNEXT, I believe we finally got it right. We have transformed into a best business practice building conference with peer-to-peer collaboration at its core. It’s going to help build more channel champions!” Commented Julian Lee, President of TechnoPlanet, organizer of the ChannelNEXT event.

After a week-long experience of great people and wonderful food, our team had the opportunity to be a part of an exciting learning environment.

During our “Mastermind” peer-group sessions, we were able to share our goals, pain points and advice all while making connections and learning about new insights and solutions entering the market.

Presenting our Secure Network Access at ChannelNEXT

It’s become clear that the way we work has changed. Today, the workforce is overwhelmingly mobile, cloud-based and dependent on unsecured Wi-Fi which is why companies are in dire need of a cloud-enabled VPN.

The high demand for this increasingly popular technology has allowed us to develop new MSP relationships by offering a new source of recurring, consistent revenue streams, allowing them to deepen their customer relationships while saving them time and money.  

Here are a few of our highlights from the ChannelNEXT Conference in Niagara Falls:

Perimeter 81: Simplifying Secure Network Access

With the rise of the mobile workforce, cloud transformation and adoption of BYOD policies, fortifying secure network access is more important than ever before. But many MSPs still feel they have to turn to outdated, complex and costly legacy VPN solutions that offer limited management capabilities, are difficult to use, and do not integrate well with the cloud. In this workshop, we’ll show you how the rise of the Software-Defined Perimeter can help you achieve stronger security, more easily manage your clients’ networks, earn high recurring revenues and ensure your place at the forefront of the market.

Contact us if you’d like to learn more about software-defined-security technology and our innovative and disruptive SMB targeted product offering!

Read More

VPN for the General Data Protection Regulation (GDPR)

Reading Time: 4 minutes

The European Union’s new General Data Protection Regulation (GDPR) is officially in effect May 25, 2018. However, Gartner believes that less than 50 percent of all organizations will have fully complied with GDPR by that date. Continue reading

Read More