Perimeter 81 Named as a Finalist For The 2020 Red Herring Top 100 North America
Reading Time: 2 minutes

Tel Aviv, Israel – November 16th, 2020 – Perimeter 81 has been selected as a finalist for Red Herring’s Top 100 North America award, one of the technology industry’s most prestigious prizes.

Finalists for the awards are among the continent’s brightest and most innovative private ventures. Red Herring’s editorial team has chosen their place among North America’s tech elite, during a months-long process that takes into account criteria including disruptive impact, proof of concept, financial performance, market footprint and quality of management.

“We are honored to be a finalist for Red Herring’s Top 100 North America award,”  said Amit Bareket, CEO and Co-Founder of Perimeter 81. “This recognition not only serves as a validation of our success but it also demonstrates our approach in delivering enterprise-level network security solutions to our customers. 

For over two decades Red Herring’s team has seen through the tech sector’s hype to select brands that have become industry benchmarks. Previous Top 100 finalists have included Alibaba, Facebook, Google, Skype, SuperCell, Spotify, Twitter, and YouTube. 

The Top 100 North America has become not only a springboard for some of tech’s biggest names, but a valued and trusted tool for venture capitalists, experts and analysts predicting trends at the industry’s sharpest edge.

“Selecting finalists for this year’s Top 100 has proved more difficult than ever,” said Alex Vieux, publisher and chairman of Red Herring. “North America has been tech’s beating heart for years–but never have I seen such an exciting, disruptive and innovative generation as we have in 2020. “

“Perimeter 81 fully deserves its place among our finalists, and I’ve every confidence it will make a significant impact in the tech world,” added Vieux.

Finalists are invited to present their winning strategies at the Red Herring Top 100 North America conference on Nov 17-18, 2020. The Top 100 winners will be announced after all the presentations at the Top 100 Forum.

About Perimeter 81

Perimeter 81 is a Zero Trust Secure Network as a Service that is simplifying network security for the modern and distributed workforce. Based in Tel Aviv, the heart of the startup nation and a global hub for innovative technology development, Perimeter 81 was founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali. Perimeter 81’s clients range from small businesses to Fortune 500 corporations across a variety of sectors, and its partners are among the world’s foremost integrators, managed service providers and channel resellers. Earlier last year, Gartner selected Perimeter 81 as a Cool Vendor in Network and Cyber-Physical Systems Security.

Read More
1000 customers - Blog Banner
Perimeter 81 Surpasses 1,000 Customer Milestone
Reading Time: 3 minutes

We are excited to announce that we have surpassed a long-anticipated milestone: There are now 1,000 customers using Perimeter 81 to secure their networks. Our company has witnessed tremendous 500% year-over-year growth and tripling the customer base in less than one year. 

Customers have expressed that they appreciate our service for its intuitiveness, ease of deployment and high scalability. We truly see our customers as partners in building our product, and we believe this has been our real growth engine. 

When we launched our Secure Network as a Service in 2018, the majority of our initial customer base was tech and SaaS companies. Early adopters of cloud and mobile, tech organizations were onboard with our innovative solution from the start. As the shift to cloud and remote work became more widespread across all industries, even before COVID-19, we were able to roll out our platform to relevant sectors and fields. 

Now, we serve customers in a range of industries with our clientele comprising 38% tech companies, 10% healthcare, 9% in the finance sector, 6% consulting services, and the remainder in retail, media, education, government and more.

With remote work as the new normal and our collective status quo for the near future, more businesses have realized the continuity plans they have in place aren’t equipped to safeguard against new and evolving security risks for remote workers, or resilient enough to sustain operations through another potential outbreak. We’ve come prepared with a solution that will drive us moving forward.

Gaining Momentum Towards SASE

The typical organization’s network is more complicated than ever, and traffic through these networks is increasingly convoluted, with data flowing between local resources, cloud applications, and mobile devices in rapid succession. As resources are now more present in the cloud than on-premises, IT teams have enlisted a bevy of tools to regain the network visibility they need to ensure security. These are numerous, and while they may be able to together provide visibility, orchestrating and managing them is difficult and unwieldy. 

Accordingly, for the past year we have been working tirelessly to build out a holistic SASE solution. SASE (Secure Access Service Edge) is a new converged solution for network and security services. While the term was only recently introduced and coined by Gartner in August 2019, Perimeter 81 is already considered by industry participants to be winning the “SASE space race”. 

SASE enables IT security solutions to provide a more holistic and agile service for business networking and security. By offering a unified security solution, we are simplifying the consumption of network security for organizations of all industries and sizes – and this is shown through our expanding customer base. 

Looking to the Future

While COVID-19 will not last forever, the technologies adopted during the pandemic will continue to be used far into the future. Many businesses that previously did not have the option for employees to work remotely or from home can now allow their workforce to remain remote if they choose, as employees can securely connect to the organization’s resources through Perimeter 81. We are proud to help businesses continue functioning productively and securely through these times and into the future. 

It is time to look past the legacy hardware solutions and look into the future with a more secure and modern approach to network security. Organizations are relying on Perimeter 81 to continue working securely from home, with our cost-effective, cloud-based, highly-scalable solution. We are helping organizations of all sizes and in many industries work through these trying times and continue to use our services well into the future and we are grateful to our 1000+ happy customers who are along for the ride. 

Looking forward to celebrating many more milestones together,
Amit and Sagi
Perimeter 81 Co-founders

Read More
An Exciting Announcement: Perimeter 81 Raises $40 Million in Series B Funding Led by Insight Partners
Reading Time: 3 minutes

Today truly marks a milestone for Perimeter 81.

We are so proud to share the news that we have raised a Series B round of $40 million, led by a premier VC and private equity firm, Insight Partners with the participation of Toba Capital and our existing shareholders. The financing represents a giant leap forward in our efforts to simplify and modernize the way businesses consume cyber and network security.  

It will help support our rapid growth and accelerate our hiring and development, it will further our disruption of the traditional VPN and Firewall markets and most importantly, it will allow us to create the best possible service for you, our valued customers and partners.

We’d like to take this opportunity to reflect on the past and look to the future —  sharing the vision that has driven us so far, and our hopes and aspirations as we move forward.

It All Started with a Vision for Change

Back in our early days as startup founders, when we were working part-time at large enterprises, we had to deal with outdated and complicated network technologies on a daily basis. These were the only choices available to securely access corporate resources. And while these tools were so critical to maintaining employee productivity, they were also incredibly difficult to use.

The first company we founded was a personal VPN service that allowed consumers to browse securely and privately over the public Internet. With this business, we were able to learn how to build highly scalable and global network infrastructure, as well as design a single-click cybersecurity product for the end-user.

During that time, we often reflected on our enterprise experiences. We believed that innovation in B2B network security was necessary and that we could apply what we learned from creating a service for consumers to create a much better experience for businesses. And so, Perimeter 81 was born.

Remote Work Became the New Reality

Three years ago we noticed two key trends in the modern workforce: Cloud and Mobility. Many companies started to migrate their entire assets to cloud infrastructures and the employees — they were working from different locations across the globe. With that in mind, we understood the huge potential and immediate need for a change in the cybersecurity landscape.

We assumed that in the next 5 to 10 years there would be a complete digital work transformation, but in March of this year, everything changed in the blink of an eye. COVID-19 spread across the globe and as it evolved from an epidemic to a pandemic, it forced companies worldwide to send their employees home.

Many new clients came to us in need of a scalable and reliable network security solution. Their site-centric and hardware-based legacy VPN solutions had severe licensing restrictions, or they were simply too difficult to manage — no longer accessible with the new work-from-home reality.

In tandem, our current customers turned to us needing to rapidly expand their accounts, as it was no longer specific teams but rather, their entire organizations that were now reliant upon secure remote access in order to stay productive.

This major global event clearly demonstrated to us the significance and importance of our vision to bring network security into the 21st century, and deliver a ‘one-stop-shop platform’ to house network and security solutions as a service under one roof.

Looking to the Future

As we look at our current global reality, one truth is clear: the future of network security is now. We feel fortunate to have the support of such amazing investors that recognize this truth as well, and want to help us propel a necessary market transformation.

We are thrilled that Insight Partners embraces our vision and shares our belief in the importance of transforming the way organizations are consuming cyber and network security. We’ve had a long relationship with them and have always been closely aligned on the significance of strong SaaS offerings and the value they bring to the market. 

This latest funding round will launch us forward as we build our complete SASE solution. With this platform, we aim to eliminate tool sprawl and consolidate fragmented legacy technologies — protecting businesses globally from large scale, and potentially devastating, cybersecurity breaches. 

On a company level, to support our vision, we are rapidly growing our talented team and hiring for multiple positions across our Sales, Marketing and R&D teams in our Tel Aviv, New York and California locations.

We are confident that in working together with our committed investors, dedicated employees and our valued customers and partners, we can continue to develop highly innovative network security solutions and further disrupt the industry — driving a new path forward to securely enable and fully empower our modern, ‘work from anywhere’ society.


Amit Bareket & Sagi Gidali, Perimeter 81 Co-Founders

For more information about our unique vision and SASE platform, click here.

Read More
CRN® Recognizes Perimeter 81 on the 2020 Emerging Vendors List
Reading Time: 3 minutes

Tel Aviv Israel – July 20th, 2020 – Perimeter 81, a leading Secure Access Service Edge (SASE) provider,  announced today that CRN®, a brand of The Channel Company, has named Perimeter 81 to its 2020 Emerging Vendors list in the security category. This annual list honors new, rising technology suppliers that exhibit great promise in shaping the future success of the channel with their dedication to innovation. The list recognizes channel-focused organizations across eight categories: Cloud, Data Center, Security, Big Data, Internet of Things (IoT), Storage and Networking/Unified Communications. 

This list recognizes recently founded, up-and-coming technology suppliers that are shaping the future of the IT channel through unique technological innovations. In addition to commemorating these standout companies, the Emerging Vendors list serves as a valuable resource for solution providers looking to expand their portfolios with cutting-edge technology. 

Partners of Perimeter 81 recognize the advantages of deploying cloud-based network security instead of traditional security solutions. Not only does this facilitate greater security and performance for their clients but also allows predictable recurring revenues and the simplicity of managing network security 100% remotely from an intuitively designed multi-tenant partner dashboard.

“It’s an honor to be named among the select few companies chosen as part of CRN’s Emerging Vendors in Security for 2020,” said Amit Bareket, CEO and Co-Founder of Perimeter 81. “This recognition not only serves as a validation of our success but it also demonstrates our channel-centric approach in delivering enterprise-level network security solutions to our partners.”

CRN’s Emerging Vendors recognizes pioneering technology suppliers in the IT channel that are driving innovation and growth. This list serves as a valuable resource for solution providers in search of the latest technologies.  

The Emerging Vendors list is selected by CRN’s esteemed editorial team. These vendors are inspiring the IT channel with groundbreaking technologies and best-in-class offerings that are elevating businesses – driving success with solutions built to battle the challenges of the IT channel. 

“CRN’s 2020 Emerging Vendors list recognizes vendors that are revolutionizing the IT channel with innovative solutions that meet the complex demands of our industry,” said Blaine Raddon, CEO of The Channel Company. “It honors inspirational new vendors that are driving channel growth with state-of-the-art technologies that will continue to shape the channel into the future.” 

The 2020 Emerging Vendors list will be featured in the August 2020 issue of CRN Magazine and online at

About Perimeter 81

Perimeter 81 is a Zero Trust Secure Network as a Service that is simplifying network security for the modern and distributed workforce. Based in Tel Aviv, the heart of the startup nation and a global hub for innovative technology development, Perimeter 81 was founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali. Perimeter 81’s clients range from small businesses to Fortune 500 corporations across a variety of sectors, and its partners are among the world’s foremost integrators, managed service providers and channel resellers. Earlier last year, Gartner selected Perimeter 81 as a Cool Vendor in Network and Cyber-Physical Systems Security.

About The Channel Company 

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers, and end-users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. 

Follow The Channel Company: Twitter, LinkedIn and Facebook 

©2020 The Channel Company, LLC. CRN is a registered trademark of The Channel Company, LLC. All rights reserved. 

The Channel Company Contact: 

Jennifer Hogan The Channel Company [email protected] 

Read More
Perimeter 81 Recognized as a Sample Vendor In Gartner’s 2020 Hype Cycles For Network Security and Enterprise Networking
Reading Time: 3 minutes

Perimeter 81, the Secure Network as a Service solution for the modern and distributed workforce, has been recognized in the latest Hype Cycles by Gartner Inc., a leading IT research and advisory company. 

We are proud to be named a sample vendor in the Zero Trust Network Access ( ZTNA) category in the Hype Cycle for Network Security, 2020, and the Hype Cycle for Enterprise Networking, 2020. This industry recognition affirms the success we’ve had in developing the next generation of innovative network access and network security products. 

Over the past years, ZTNA vendors have replaced the need for the traditional Business VPN. As stated in the report, “As more organizations suddenly find themselves transitioning to much more remote work, hardware-based VPNs exhibit limitations. ZTNA has piqued the interest of those seeking a more flexible alternative to VPNs.” (1)

What is the Hype Cycle?

Gartner Hype Cycles provides a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. Gartner Hype Cycle methodology gives you a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals.

In each report under the Zero Trust Network Network Access  (ZTNA) category, Gartner Analyst, Steve Riley discusses how ZTNA provides a more immediate and modern solution in place of the traditional VPN. The ZTNA model offers better network visibility which most VPNs are lacking. Additionally, ZTNA allows organizations to enable a cloud transformation that will be more geared to their corporate network resources and applications.

In this year’s reports, Gartner highlights the different business impacts that ZTNA has to offer.  “ZTNA brings significant benefits in user experience, agility, adaptability and ease of policy management.” (2) Additionally, the report lists the different vendors that offer a ZTNA solution and the benefits that are being offered such as an increasing number of points of presence (Pop) which are helping organizations with network latency.

The Perimeter 81 Network Security Offering 

In each report, Gartner mentioned that with cloud-based ZTNA offerings, scalability and ease of adoption are additional benefits. At Perimeter 81, we are providing secure access to local network, applications and cloud infrastructures with one unified platform. By transforming the outdated, hardware-based security appliances into a cloud-based SaaS solution, we are simplifying network security for the modern and distributed workforce. 

As a holistic SaaS solution providing customizable networking and the highest levels of security in the cloud, Perimeter 81 is revolutionizing the way organizations consume network security. 

Our Zero Trust Network Access (ZTNA) solution provides policy enforcement and protection by isolating applications and segmenting network access based on user permissions, authentication, and verification. The platform’s comprehensive software-defined perimeter (SDP) solution offers simple cloud migration security, seamless least privilege access to resources and secured access to cloud environments including IaaS and PaaS.

Unlike hardware-based legacy VPN and firewall technology, our scalable SaaS solution offers greater network visibility, seamless onboarding and full integration with major cloud providers, giving companies of all industries and sizes the power to be fully mobile and completely cloud confident. 

Global Recognition 

Being recognized as a representative vendor in both the 2020 Hype Cycle for Network Security report and the 2020 Hype Cycle for Enterprise Networking report from such an esteemed resource validates our ongoing effort in the enterprise cybersecurity market.

“We are pleased to have been included in the Gartner Hype Cycle,” said Amit Bareket, CEO and Co-Founder of Perimeter 81. “We believe we are shaping the future how businesses will consume network security and this recognition validates the depth and breadth of our innovative offering. Being named by Gartner as a sample vendor reinforces the value of our approach to helping our clients with a more secure network connection to their cloud services and resources.”

  1. Gartner, Hype Cycle for Network Security, 2020, Pete Shoard, 30 June 2020.
  2. Gartner, Hype Cycle for Enterprise Networking, 2020, Danellie, Young, Andrew Lerner, 8 July 2020.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected] 

To learn more about Perimeter 81’s Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Perimeter 81 Recognized in Gartner’s 2020 Market Guide for Zero Trust Network Access
Reading Time: 3 minutes

Perimeter 81, the Secure Network as a Service solution for the modern and distributed workforce, has been included in the 2020 Market Guide for Zero Trust Network Access by Gartner Inc., a leading IT research and advisory company.

We were named as a representative vendor in the “ZTNA as a Service” category in the 2020 report. This year’s report was written by Analysts Steve Riley, Neil MacDonald, Lawrence Orans. Zero Trust network Access (ZTNA) describes the emerging market that is recommending organizations to replace their outdated traditional remote access VPN technologies with a more modern model that improves security while supporting a larger amount of use cases and enhancing the end-user experience.

Unlike stand-alone ZTNA solutions, as-a-service offerings require less setup and maintenance. According to Gartner, ZTNA as a Service solutions like Perimeter 81 typically require provisioning at the end-user or service side and route traffic through the vendor’s cloud for policy enforcement. Stand-alone offerings require customers to deploy and manage all elements of the product. In addition, several of the major IaaS cloud providers offer ZTNA capabilities for their customers. 

What Is the Market Guide for Zero Trust Network Access?

Every year, Gartner publishes the Market Guide for Zero Trust Network Access. The annual report helps security and risk management leaders choose the best ZTNA solution for their organization’s needs, specifically application-centric and demand-driven connections.

In this year’s report, Gartner highlights how digital business transformation is affecting enterprises worldwide. According to Gartner, “ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Security and risk management leaders should pilot ZTNA projects as part of a SASE strategy or to rapidly expand remote access.” (1)

Perimeter 81’s Secure Zero Trust Network As a Service Offering  

Gartner recommends deploying “a ZTNA product that relies on multiple contextual aspects to establish and adapt trust for application-level access” and to “stop relying primarily on IP addresses and network location as a proxy for trust.”

ZTNA, the modern replacement for cloud VPN, removes excessive trust placed in physical networks in favor of adaptive, identity-aware, precision access that is application-oriented.

At Perimeter 81, it is our mission to simplify secure network, cloud and application access for the modern and distributed workforce. To do so, we have built a holistic SASE (Secure Access Service Edge) solution that provides both customizable networking and the highest levels of security.

Unlike hardware-based legacy VPN and firewall technology, our scalable SaaS solution offers greater network visibility, seamless onboarding and full integration with major cloud providers, giving companies of all industries and sizes the power to be fully mobile and completely cloud confident. 

Our cutting-edge zero Trust network security solution features:

  • Secure Cloud and Network Access 

Ensure user-centric and adaptive, policy-based network access to on-premise resources, SaaS applications, and cloud environments. 

  • Zero Trust Application Access 

Reduce the attack surface. Implement zero trust, fully audited access to web applications (Layer 7) via HTTP/S, SSH, RDP, or VNC, without an agent. 

  • Cross-Platform Endpoint Protection

Enable single sign-on access and two-factor authentication across iOS and Android devices as well as PC and Mac desktops.

  • Site-to-Site Interconnectivity

Bridge the gap with fully customizable networking. Interconnect your cloud environments and different network branches.

Industry Recognition 

Being recognized as a representative vendor of ZTNA as a Service in the 2020 Market Guide for Zero Trust Network Access from such a reputable resource confirms our continuous effort in changing the way organizations consume network security. 

“We believe our inclusion as a Representative Vendor in the Gartner Market Guide validates why leading organizations adopt the Perimeter 81 solution to manage user access to their cloud resources,” said Amit Bareket, CEO and Co-Founder of Perimeter 81. “The Perimeter 81 team has worked tirelessly to deliver a secure, network as a service solution that collectively provides secure networking and data science technologies in a way that overcomes the limitations of traditional security solutions. We feel that to be recognized by Gartner is a tremendous validation for the work the Perimeter 81 team has accomplished.”

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Market Guide for Zero Trust Network Access, 2020, Steve Riley, Neil MacDonald, Lawrence Orans, June 2020.   

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected] 

To learn more about Perimeter 81’s Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
The Proper Privacy Regulations TeleHealth Needs Right Now
Reading Time: 4 minutes

When the average American thinks of March, the first thing that pops into their mind is the beginning of spring. Unfortunately, in March 2020, life as we know it has changed completely due to COVID 19. While only essential employees are allowed to continue work as usual (with additional regulations), anyone and everyone who is able to work remotely has transitioned from the office to home in order to keep things on an even keel. 

This new remote lifestyle has changed the way we live, work, interact with people, and how we approach doctor appointments as well. The healthcare sector quickly implemented changes to provide a more remote experience to comply with social distancing regulations. 

In order to decrease the amount of face-to-face doctor appointments, on March 17th the Department of Health and Human Services (HHS) announced they “will not impose penalties for noncompliance with the regulatory requirements under the HIPAA Rules against covered health care providers in connection with the good faith provision of telehealth during the COVID-19 nationwide public health emergency.”

This popular move has allowed different healthcare providers to implement some of the most popular communication applications such as Zoom, Skype, WebEx, GoToMeeting, and others. Is this move to provide a remote option for patients the right decision for the current situation? 

The Right Healthcare Solution for the Current Situation

With the increasing rise of social distancing limitations and regulations, telehealth services are seeing an overflow of patients requesting a remote doctor appointment instead of face-to-face. 

As hospitals and governments are urging patients to avoid visiting emergency rooms,  many are turning to the online option of telehealth. The online option allows patients to consult with their doctors and specialists over the phone, video or chat as a feasible option. Telehealth video visits can be a successful tool for remotely monitoring and treating patients with mild symptoms who are staying home. Telehealth providers are easily able to monitor a patient’s symptoms and quickly decide whether they should stay home, go to the hospital, or meet their general practitioner. 

While telehealth has many benefits for patients, it comes with its challenges for healthcare providers – especially the traditional healthcare companies that did not have a telehealth program in place. Similar to scaling an entire company remotely, implementing telehealth programs takes time to establish the necessary technology, recruit doctors, train doctors about the best virtual practices and teach the patient how to use the platform. 

Healthcare providers that have not implemented a telehealth program yet should educate their patients with internal resources to learn more about moving to digital doctor appointments. In order to allow patients to take part in telehealth visits instead of in-person, providers should frequently provide medical best practices through their website, blog and social media to keep their patients engaged and informed.  

HIPAA Solves Privacy Risks

Due to surging increase of patients who are turning to telehealth services it comes with many privacy risks. Instead of doctors having previous knowledge of the patient’s medical history, the patients will need to explain more in-depth to their new doctors due to the lack of medical records on hand.

The lack of updated records on patients creates a massive privacy issue between the doctors and the telehealth platforms which they are using. Due to the history of healthcare’s super sensitive regulations for sharing records and the restriction of sharing patients’ data, this presents a problem for telehealth platforms. By sharing sensitive data over a communication app it creates an opportunity for hackers to be a fly on the wall of these more vulnerable conversations between doctor and patient, since communication apps may sometimes be easily breached and represent a trove of valuable patient information. Additionally, hospitals and healthcare providers need to double down on IT and cybersecurity to fight off potential privacy risks. This is where HIPAA comes into play. 

healthcare stat

Over the years, healthcare has been an attractive target for hackers trying to breach patients’ sensitive records. While medical data and records are some of the most delicate pieces of information out there, the healthcare industry has the right compliance regulations in place. HIPAA and other regulations have been around for years but since the HHS weakened the previous compliance regulations, telehealth is now a more attractive target for hackers.

Now that the government has become more lenient with telehealth regulation rules, enforcing HIPAA with telehealth communication is the right move to provide better privacy for patients.

The Health Insurance Portability and Accountability Act (HIPAA) requires medical providers to adopt data security in order to protect their patients’ information from disclosure. The HIPAA regulation requirement of encryption initially sounds a bit confusing, however, it’s much more simple than suggested. The HIPAA encryption requirements for transmission security state that covered entities should “implement a mechanism to encrypt PHI whenever deemed appropriate.” 

In other words, majority healthcare organizations are required to be HIPAA compliant and each provider needs to have some level of security for PHI. Healthcare providers are required to encrypt their data unless they can justify why they can’t implement encryption and can provide an equal alternative.

Achieve HIPAA Compliance with Secure Solutions

Tasked with choosing the best way to store, access and back up electronically protected health information, many healthcare technology companies and providers are looking at cloud computing. Adopting cloud-based Network as a Service technology is a great choice in comparison to traditional hardware-based solutions, as it offers scalability, affordability and increased compatibility with cloud storage environments. But remember, the security service you choose must be SOC 2 type 2 compliant and ISO 27001-compliant and have signed multiple HIPAA BAAs. With these checks in place, a Network as a Service solution like Perimeter 81 for healthcare can offer a highly effective solution for any organization’s HIPAA compliance needs.

TeleHealth is the Future

As we are experiencing a global social distancing, telehealth is quickly evolving, as is the way that it presents a remote option for healthcare services. However, potential privacy and security risks could decrease its value moving forward. Soon, we should begin seeing more government bodies authorize and create federal telehealth privacy and security protocols which will help healthcare providers avoid risks to their patients and better show the numerous benefits telehealth has to offer. With the help of the government and best privacy and security in place telehealth will have that added security to fight off hackers, and be able to shrug off questions about its security.

Read More
Employers See Rising Number of Remote Workers During Corona Scare
Reading Time: 5 minutes


In late January, the World Health Organization declared the Coronavirus outbreak an international health emergency, and on March 11, 2020, they officially declared the virus to be a pandemic. It’s the first time the organization has declared a pandemic since the H1N1 “swine flu” in 2009. Though the numbers keep rising, currently over 315,000 cases have been reported in 109 countries, and over 13,500 have died from the virus.

While people think coronavirus is a new outbreak of disease, it is actually a common thread of various, known viruses. Officially named the 2019 Novel Coronavirus, or Wuhan Coronavirus, this latest and ongoing outbreak contains the most severe type of the virus. Some of the symptoms include coughs, sore throat, vomiting, lack of breath, and fever. A respiratory illness, the severity for patients has ranged from a mild cold to very serious symptoms that can (and do) lead to death. These symptoms tend to occur between 2 to 14 days after being infected. 

The effects of this particular coronavirus have put a spotlight on the need to protect employee health and that of their organizations. Accordingly, remote work has gone from an already popular workplace strategy to a necessary one for companies worldwide. Organizations that have contact with people affected by the Wuhan strain of coronavirus need to consider how to restrict their employees from being in physical contact with each other and potentially infected individuals. As a central tenet of this strategy, gatherings of large numbers of people in public places or in the office should be avoided as much as possible. 

A clear example of this precaution is the recently canceled World Mobile Congress. A majority of vendors decided to pull out of the event and its organizers requested that the city of Barcelona declare a state of health emergency, due to numerous attendees coming directly from the epicenter of Wuhan Coronavirus’s origins.

Coronavirus Has Boosted Remote Work

The concept of working remotely or working on the go isn’t a new trend, and has largely become the status quo for modern organizations. Allowing employees to work “off-campus” is a perk that has mutual advantages for both employees and organizations, and this is why 61% of organizations allow staff the privilege of remote work.

According to Harvard Business Review, ““A key takeaway from our research is that if a work setting is ripe for remote work – that is, the job is fairly independent and the employee knows how to do their job well – implementing WFA (working from anywhere) can benefit both the company and the employee”. This trend is only increasing, and has already grown 159% since 2005 – skyrocketing past the growth of the rest of the workforce.

In places like the UK and USA, the prevalence of flexible work policies runs parallel with employee preferences.

This is no surprise, as managers and executives have found that implementing a remote work policy improves productivity so much that it’s easily measurable, with the estimate that flexible work models will save organizations up to $4.5 trillion in the US alone by 2030. One part of this more tangible productivity is sick days, which traditionally cost organizations significantly when they need to be used, but are reduced by over 13% among remote workers. Another measure is retention. It comes as no great shock that when 70% of potential hires consider remote work flexibility a top priority as to whether or not they’ll join, that organizations who do offer it will retain employees with 10% greater efficiency in 2020.

A New Purpose for Remote Work

To fight off the spread of Coronavirus, organizations are enforcing remote work as a necessity instead of a privilege. Around 60 million people in China were forced to work from home in January as the government tried to contain the virus. Most recently, with the global spread of the virus, major tech giants have begun to follow suit. Twitter has asked all of its international employees to work from home, and Amazon, headquartered in Seattle, now labeled “America’s Corona Virus Capital,” has begun planning remote access stress tests for all employees.

Over the past ten years, organizations around the globe are increasing and expanding opportunities for remote work due to the need for an agile workforce spurred on by new technology. Yet despite the advancement of tech and the tools that create an increasingly mobile workforce, the trend comes with risks that have more to do with network health than personal health. 

More Remote Workers, More Security Holes 

The burgeoning remote work paradigm is creating countless security gaps for organizations. While remote workers might be easier targets for hackers, all employees must be aware of the different attacks that will exploit human behavior to open the door for hackers. One of the easiest attack vectors is unsecured Wi-Fi networks. 

When allowing employees to work remotely, organizations must clearly outline those remote employees’ responsibilities regarding IT security best practices and the importance of data protection. To provide another layer of defense vs unauthorized network access, organizations must implement remote-worker-specific security policies which include device monitoring, multi-factor authentication and Wi-Fi security.

Today the majority of global organizations still depend on legacy hardware-based VPN technology for secure network access and access to cloud resources on different networks.  These site-centric and hardware-based network security appliances that we’ve relied on for the past 30 years are no longer adequate in securing remote and on-premise access.

In providing secure network access to remote workers, organizations need to create and implement different security strategies to fight off different attacks on their network and resources. The user-centric Zero Trust security model enforces multiple layers of verification before granting resource access to any user.

Additionally, by implementing a solution that offers Software-Defined Perimeter architecture, organizations are helped to deploy perimeters globally while retaining the traditional model’s value of invisibility and inaccessibility to “outsiders”. These can be deployed anywhere – on the internet, in the cloud, at a hosting center, on the private corporate network, or across some or all of these locations.

Security Hygiene and Health Go Hand in Hand

To prevent remote access risks such as a sudden movement of employees off-premises in order to fight off Coronavirus, organizations should implement Software-Defined Perimeter technology and the Zero Trust model to ensure secure access by authorized devices, users and locations. They should also seek services that include advanced or even automatic Wi-Fi security features, ensuring employee communications are encrypted across all Internet connections. With the right security tools in place, organizations can ensure that only authorized connections are being established while leaving their cloud environments completely hidden from attacks, giving networks as clean a bill of health as their users.


Read More
One Small Step for SASE: Perimeter 81 Lands at RSA 2020
Reading Time: 3 minutes

After a record-breaking and thought-provoking 2020 RSA conference, we’re excited to gush about Perimeter 81’s successes and reminisce on the latest security trends – not to mention the adventures we had in sunny San Francisco. 

While it will be impossible to cover all that was discussed during the countless visits to our (literally) stellar booth, some of the most important highlights can definitely do our accomplishments justice.

RSA Revs Up

Over 650 companies attended this year, and the space was a loudly buzzing forum for security-centric activity and discussion. Despite the hubbub, we grabbed a significant amount of attention from thousands of curious event-goers, and so our team was constantly on their feet demonstrating the advantages of Perimeter 81’s Secure Network as a Service platform.

VP of Customer Success Daniel Goldfeld, deep in conversation.

The Crown of the Conference

Though RSA is where “the world talks about security”, our booth design was the real talk of the town. 45,000 people attended RSA this year and thousands were drawn to our space-themed booth, which was the biggest we’ve ever had. With asteroid beanbags and an anti-gravity prize display, it was pretty hard to miss. Just ask this enthusiastic visitor:

It was even harder to miss the intrepid Perimeter 81 team, outfitted with some sassy SASE jackets to signify that we’re already far along on our expedition to take network security to places it’s never been – and beyond. Secure Access Service Edge is the way the security sector’s rocket ship is headed: a unified cloud-based solution for both network and security.

The team, fully outfitted, flexing on the streets of San Fran.

The “SASE Squad” wore our colors around town as well, and it wasn’t just for the famously temperate San Fran weather (but they did help). Though we had tons of fun exploring, seeing the sights, and eating our way through the city, as always it was important to balance work with play. And work we did.

Leading the Discussion on Network Security

Our presence as an industry leader was exemplified during panels in which our CEO Amit Bareket and Director of Business Development James Alvarez led their respective conversations, perking ears and drawing crowds as they outlined the biggest issues in network security that organizations face and talking with other industry leaders about what the future will look like.

The panel left our fearless leaders a bit hungry, but they’re not the type to dismiss an opportunity when it comes into their orbit. Accordingly, they managed to find time to grab a quick bite with security expert and prolific author Richard Stiennon, who quickly found himself deep in conversation with the two executives, and was generous enough to give them a copy of his Security Yearbook 2020: A History and Directory of the IT Industry. Cheers Richard!

RSA 2021 Here We Come

Given the skyward trajectory of Perimeter 81’s ship, we’ve already booked a booth that’s double the size as this year’s for RSA 2021, and we look forward to showing off our complete, fully unified Secure SASE platform. See you there!

Read More
Why Your Organization Needs to Become California Consumer Privacy Act (CCPA) Compliant
Reading Time: 4 minutes

Over the past decade, organizations are getting familiar with the different new privacy laws being enforced by governments. In 2018, GDPR went into effect and we are seeing the huge impact this law has had on organizations when dealing with people’s personal data. Now, there’s another major regulation that just went into effect.

On January 1, 2020, the California Consumer Privacy Act of 2018 (CCPA) went into effect and sets new requirements and rights relating to personal information of California consumers. This is the first state-level privacy law in the United States.

Data-driven companies are quickly making the right adjustments with the new regulation into their system, similar to how they prepared for GDPR. 

Despite not knowing how much of an impact this new regulation will have on organizations, it’s always best to prepare and be compliant. In this blog post, we will explain what the CCPA is, how it will impact your business and any other lingering questions you may have about CCPA. 

What is the CCPA?

The CCPA was created in order to protect the privacy and personal data of consumers who live within the state of California. The CCPA grants people the right to know what information businesses are storing about them. The act additionally gives people the right to tell businesses they cannot use their personal information.

Similar to GDPR, people may request that a business discloses the types of personal information it collects, the purpose of collecting that information, and who the information is being sold to. According to the regulation, people are allowed to request this data report twice a year, free of charge.

Why did California pass CCPA?

The California legislature approved the CCPA regulation after the mining of personal data was brought to light in 2018 with the famous data mining Cambridge Analytica scandal and how the congress hearing proved how vulnerable personal information can be misused. The state desired to create more laws that will implement better data privacy control and transparency.   

According to CNET, more states are considering similar laws and similar proposals are being presented at the federal level.

What CCPA Means for Consumers

The CCPA regulation provides California residents with 4 basic rights with their personal information:

  • The right to know what personal information, including specific pieces of information which are being stored and what the business is doing with the information.
  • The right to request that the business who is storing their information delete their personal information.
  • The right to opt-out of the sale of their personal information. 
  • If a consumer takes advantage of their rights under the CCPA, freedom from discrimination of price or services. However, a business may offer financial incentives, including payments to consumers, for the collection, sale, or deletion of personal information

How Do I Know If My Organization Is Impacted by the CCPA?

The CCPA regulation affects any organization that collects, shares, or sells California residents’ personal data and meets any of the following three criteria:

  • Has an annual gross revenue of $25 million or more.
  • Possesses the personal information of 50,000 or more consumers, households, or devices.
  • Earns more than half of its annual revenue by selling personal information.

How Can My Organization Become CCPA Compliant?

Your organization can implement different privacy steps to ensure consumers are able to exercise their rights under the CCPA. Here are the key steps to make:

  • Provide two or more methods for consumers to submit requests about their personal information. At a minimum, these methods must include a toll-free telephone number and at least one additional method such as a designated email address or online form.
  • Establish protocols to respond to consumer requests within 45 days of receiving them.
  • Update your privacy policies to include new CCPA privacy rights.
  • Analyze your data collection and documentation processes. Ensure that you are able to track how you collect data, how you use it, where it resides, and have a system in place to provide consumers with this information. 
  • Provide consumers with notice that their personal information is being sold. Implement a process to honor opt-out requests in a timely manner.
  • Assess and document your data security practices to ensure your business takes the necessary steps to avoid data theft and any other security breaches. 

Make sure your legal team reviews the entire CCPA initiative to identify all steps your business must implement to remain CCPA compliant. We highly recommend that you educate your entire staff on the main factors of CCPA compliance. 

Meeting CCPA with a Zero Trust Network As a Service

Although the law requirements are clear, CCPA does not provide a technical direction on how to meet these standards. Instead, organizations are required independently to create a plan to meet data security requirements. Admittingly, this sounds quite data-heavy, but each of these benchmarks can be easily met using a Zero Trust Network as a Service platform.

A Zero Trust Network as a Service (ZTNA) uses pre-shared keys to identify, authenticate and authorize user access. Using a ZTNA which offers a centralized cloud management platform, an entity can create customized user access to sensitive data – including cloud environments, SaaS services, sandbox and production environments, and more.

Additionally, any data which passes over any network is secured with advanced encryption. This creates a virtual tunnel so data can’t be intercepted by users who don’t have access. By offering network visibility and identifying risks and vulnerabilities to your systems and data, detailed activity reports provide insight into which resources are being accessed, what applications are being used, and how much bandwidth is being consumed.

Accelerate Your CCPA Compliance with Perimeter 81

At Perimeter 81, we are committed to protecting your company’s data and your customers’ data. In order to ensure complete CCPA compliance, we have:

  • Undergone a full third-party audit
  • Updated our terms of service and Privacy Policy
  • Ensured that our platform meets all data storage requirements

To help you navigate the CCPA and secure your clients’ data, we provide:

Automatic Wi-Fi Security for CCPA Compliance

With CCPA in effect, the way businesses handle Wi-Fi security will change drastically. At Perimeter 81, we have made this one of our key priorities. Our patented, Automatic Wi-Fi Security feature is a special built-in functionality to all of our applications that allows users to automatically deploy a VPN connection even if the device is locked and in your pocket.

Once you install Perimeter 81’s client applications, you can rest assured that data passing over any network is secured with 256-bit bank-level encryption. Perimeter 81’s innovative Automatic Wi-Fi Security immediately shields data by automatically activating VPN protection when employees connect to unknown, untrusted networks. Those advanced features, that come out of the box, are the reasons why Perimeter 81 is considered to be one of the best OpenVPN replacement.

If you have any more questions about CCPA, our Automatic Wi-Fi Security feature, or the steps we at Perimeter 81 have taken to protect your data, please don’t hesitate to contact us at [email protected]

Read More
Top 10 Security Experts You Should be Following in 2020
Reading Time: 4 minutes

Data breaches and cybersecurity attacks tend to dominate the global headlines with the prominent details of the attack or hack. However, when looking for the bolts and nuts of a security breach, you need to know where and whom should you go for answers. 

Twitter and different security blogs are the most popular places to gain more insights and expertise from different security experts. These ever-changing platforms provide any user or person to engage and learn from the best minds in the security industry. You have the chance to communicate and interact with experts that you normally wouldn’t have the opportunity to by reaching out, commenting or tagging them in their tweets or comment section of their blog post.

While the common internet user will go to Twitter to see what their favorite athlete or musician is commenting or discussing on, the network security community uses the platform to provide another angle on different attacks or the direction of the industry. 

So before you go follow everyone who says they are the “must follow” security expert, you need to ask yourself who you should be following. We recommend that you check their expertise in security, whether they are active, and finally, what do they actually tweet or blog about. Once you know who to follow or subscribe to, we recommend creating Twitter lists or feeds per category of the expert. This will be key to simplifying the different numerous network security expert opinions that matter most to you.

We have assembled the best network security experts you should be following in 2020 and forward. Don’t have time to follow them all? Follow our list here

Brian Krebs (@briankrebs)

Brian Krebs is the most well-known cybersecurity expert in security. He is an independent investigative security journalist who spends his days investigating and reporting the latest hacks and breaches. Krebs started his career as a reporter for The Washington Post but only started to write about cybersecurity after his entire home network was taken over by a Chinese hacking group. His security blog mainly focuses on all things considered computer security and cybercrime. Brian tweets on a daily basis about security vulnerabilities and current InfoSec issues.

Graham Cluley (@gcluley)

Graham Cluley is one of the most active security bloggers, researchers, podcasters, and public speakers. Since the early ’90s, Cluley has been fighting to make the internet a safer place with his endless investigations and blogging about different hacks and breaches. Graham’s blog and daily tweets cover the latest security news, malware, breaches and cyberattacks.

Troy Hunt (@troyhunt)

Troy Hunt is one of the best experts when it comes to data breaches and security practices. Currently Troy is the  Microsoft Regional Director, a Microsoft Most Valuable Professional (MVP) for Developer Security and an international speaker on web security. He also runs the site Have I been pwned?, a free tool that aggregates every public data breach and instantly lets people know if their email account has been compromised in a breach. He tweets and blogs about network attacks and app security on a daily basis.

Bruce Schneier (@schneierblog)

Bruce Schneier is an internationally known privacy specialist and cybersecurity writer who famously was named the “Security Guru” by The Economist. Over the years, he has shared his cybersecurity experience and in-depth knowledge as an author of over 13 books. On his website Schneier on Security”, he regularly writes about the top security issues that we as internet users are facing. While he has an active Twitter account, it’s best to bookmark his security blog as that’s where he goes into the small details.   

The Grugq (@thegrugq)

While The Grugq doesn’t share his real identity, he is one of the most popular and well respected independent information security consultants and anti-forensic researcher. His detailed blogs on Medium are insightful and must-reads after a hack has become public. His Twitter account provides a sharp and witty commentary for pointing out the absurd and real concerns in the security space

Richard Stiennon (@stiennon

Richard Stiennon is an industry analyst who not only covers the IT security space but has spent a lot of time investigating the technology research business. Richard authored the book “There Will Be Cyberwar”, a book about the U.S. military’s shift to network-centric warfare and what that portends for cyberwar. He was named one of the “50 Most Powerful People in Networking” by Network World Magazine. His twitter account is filled with his interviews and articles on different topics within cybersecurity. 

Shira Rubinoff (@shirastweet)

Shira Rubinoff is one of the most recognized and popular female cybersecurity experts who leads multiple women-in-technology efforts. Additionally, she is one of the leading experts when it comes to the human factors of information technology and security. She lectures and publishes on a  regular basis on different topics that relate to cybersecurity and psychology. She tweets daily about all things considered security and how the human factor plays into cybersecurity.

Zack Whittaker (@zackwhittaker)

Zack Whittaker is the lead security editor for TechCrunch. He has been a security journalist for over 10 years writing for ZDNet, CNET and CBS News. Additionally, his articles have been featured in Time, WIRED, Fortune and other online outlets. He is constantly tweeting about news stories on security, legal, privacy, cybersecurity, national security, government and technology. He also produces a cybersecurity newsletter where he summarizes the previous week’s news.

InfoSec Taylor Swift (@SwiftOnSecurity)

Swift On Security is a parody account that was originally created to discuss with the Twittersphere about the famous HeartBleed bug, but currently, it has grown to Twitter famous in the security industry. For those who like their security with the right amount of mockery and passion, this is a must-follow.

Daniel Miessler (@DanielMiessler)

Daniel Miessler is one of the most veteran security bloggers in the industry. He has shared his thoughts on the interactions between technology and society since 1999 and his current focus is on the security of networks, web applications, mobile, and IoT systems. His Twitter account is a great place to find out what’s happening with all aspects of cybersecurity that you rarely will find elsewhere. Every week he puts an email newsletter about all the interest security news over the past week, you can subscribe here.

We’ve highlighted just a few of the best security experts in the industry that will help you stay connected with everything security-related. Of course, we have to mention that you can always stay updated with all our news and content by following @Perimeter_81 on Twitter.

Read More
AWS re:Invent 2019: The Future is in the Cloud
Reading Time: 3 minutes

December started with a bang, culminating in the always exciting AWS re:Invent conference. Over 65,000 attendees made the trek to Las Vegas to get a grasp of the plethora of new updates at AWS and learn more about the different security vendors (including Perimeter 81) who were exhibiting at the conference. 

After the action-packed week that was AWS re:Invent, it’s time to reflect on the highlights and great conversations we had with customers, partners and thousands of potential clients that we met throughout the four-day conference.

Join us as we look back on last week’s event from start to finish, sharing our key learnings, conversations and booth activities.

AWS Doubling Down on Entire Cloud Migration

Every re:Invent, AWS announces different new features and services to their customers and this year they kept it simple with Andy Jassy’s keynote session. The clear message was organizations need to migrate everything to the cloud. Jassy’s and AWS vision is that by organization fully adopting AWS cloud services it will unlock additional IT spending. The main point presented was that AWS has the most features and capabilities of any provider and that competitors aren’t getting any closer. So in short AWS wants to become the pillar of next-generation of businesses in the upcoming year. A migration should always be followed be the implementation of a complete AWS security solution

One of the Best Conference to meet Customers

While exhibiting at AWS re:Invent, we had endless opportunities to meet with our amazing clients. Even if it’s just a quick hello or a longer conversation, it’s great to have the face to face discussion with our customers. While at the conference we had great conversations with different customers from different sectors and each conversation provided us with real-time customer insights into our solution. Their personal insights and feedback will help our team to continue to build the best Network as a service solution in the market.

                       Catching up with True{X} at the Perimeter 81 booth

Attendees Came for Company Swag and Were Welcomed with Demos

Like other large security conferences, we went all out at AWS re:Invent – we ran a voluminous amount of demos so attendees could receive a better understanding of our product and walk through our Zero Trust Network as a Service solution and all of its capabilities.


We also made sure that people didn’t leave empty-handed! Attendees who stopped by our booth had the option of different company stickers and swag.


Additionally, each visitor of our booth received a scratch card with the opportunity to win great prizes. Winners received Bluetooth turntable with speakers, portable speakers, Instax cameras and more.


Until Next Time

When looking back at the jam-packed week that was AWS re:Invent, it was a very enjoyable and exciting week, filled with great activities, the opportunity to meet up with old colleagues, and the chance to make some new connections. A big hats-off to everyone who helped make AWS re:Invent 2019 a huge success! We look forward to seeing you at the next industry event soon.

We’d love to have you join us for a webinar discussing simplifying connectivity to AWS transit gateway with Perimeter 81. 

Read More