New Agent Banner
Introducing Our New Platform Agent 7.0
Reading Time: 2 minutes

Seamless network connection, online security and support in one

Today we’ve reached another major milestone at Perimeter 81. After months of planning, development and design, we’ve officially launched our new platform agent. From a smoother login to new support options, Perimeter 81 Agent 7.0 is designed with our customers and end-users in mind. 

Our new and easy-to-use agent UI ensures that your employees can quickly and securely connect to your cloud and on-premise environments. The features of the new agent include:

Improved Performance and Smoother Login

Perimeter 81 Agent 7.0 includes a range of stability and performance improvements for a better user experience.  Agent 7.0 also handles more of the login process within the default browser, so that SSO users do not need to log in again on subsequent visits, making using the agent that much simpler and more seamless.

New Interface with More Options and Information

Agent 7.0 provides users with more options and information, such as time connected, gateway location, and public and internal IP addresses, right on the home screen. 

The new Agent interface includes:

  • More information for easier tracking and troubleshooting 
  • Easy network switching from the home screen and clear navigation to the Networks interface from the sidebar 
  • New support menu easily accessible from the home screen

Enhanced Support Options

Each user has their preferred method to get support. That’s why we give them numerous support options in the new Agent support screen.

support screen devices mockup-01From the support screen, users can:

  • Look up walkthroughs in our online User Guides
  • Start a live chat with a Perimeter 81 expert
  • Run our diagnosis tool to send a complete diagnosis and log to our support team for more streamlined troubleshooting

Ready to Use

Perimeter 81 Agent 7.0 is available for download now from our Download Center and from the “Downloads” tab in your Web Console. Experience it today!

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected].

If you don’t currently have an account and would like to experience a full tour of our platform, be sure to request a free demo.

Read More
Welcome Bob Kilbride
We’re Pleased to Announce a New Member: Bob Kilbride, Vice President of Channels Sales
Reading Time: 2 minutes

At Perimeter 81 we like to welcome new employees with open arms, and what better way than to speak about their vast accomplishments? As our new VP of Channels Sales, Bob is no exception. He has an impressive professional history and brings a ton of crucial channel experience to the table. Before joining Perimeter 81, Bob was the head of global channel sales at CloudHealth by VMware and prior to that he spent 6 years managing partners and partner programs at Microsoft.   

At CloudHealth, Bob was the Batman of channel marketing and built a market-leading managed service provider program and community that leveraged the CloudHealth platform to offer differentiated cloud management services. In 2019, he even earned a spot among CRN’s 50 Most Influential Channel Chiefs for his work at CloudHealth, and more specifically for his stellar 2019 performance: boosting revenue from partnerships by over 125% and establishing a channels team that doubled in size the previous two consecutive years.

Bob’s long and successful career in software solutions sales will bring a go-getter spirit that Perimeter 81 looks for in its employees and takes care to encourage, and we have little doubt that he is up to the challenge of leading our channels sales efforts. We also hope that when he isn’t crushing it for us, that he is having fun with his main hobbies – running, antiquing and catching live music.  

“I am truly thrilled to be joining Perimeter 81,” said Mr. Kilbride. “Given the accelerated growth and demand for businesses to securely connect their distributed workforces to their company’s networks, Perimeter 81’s industry-leading platform is uniquely positioned to meet this business challenge.  Our partners will play a crucial role in driving positive outcomes at our joint customers, and I’m excited about building a world-class program that will enable them to do so.”

Read More
solarwinds_breach
The SolarWinds Breach, And How to Avoid Falling Victim
Reading Time: 3 minutes

In case you haven’t been reading security news headlines recently, the IT security vendor space was shaken by the latest attack, which experts say is bigger than the famous Equifax breach. Thousands of global enterprises and government agencies may have been exploited by hackers via the Solarwinds Orion network monitoring solution.  

The security community is continuing to investigate the nuts and bolts of the attack. While some details have been announced, we want to briefly dig into how it occurred, who was affected, and what organizations should do to step up their security hygiene and avoid being breached in such a way. 

SolarWinds Orion Breach

The latest sign that 2020 was not going to go out quietly was when different sources from FireEye and Microsoft first disclosed that a highly advanced and sophisticated attack on SolarWinds had occurred. 

A group of state-backed Russian hackers exploited the SolarWinds Orion software via a malware attack, which allowed the cybercriminals to move within the network and create a backdoor into the system. This attack was followed up by creating a malicious update within the SolarWinds system, providing the attackers full visibility and mobility within the exploited victims’ systems. 

The Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive on December 13th instructing that SolarWinds Orion network solutions have become exploited by malicious actors. On the same day, FireEye announced a detailed technical analysis of the backdoor created by the cybercriminals.

SolarWinds suggested that 18,000 of their 300,000 customers had possibly downloaded and installed the malware within their organizations. Many of SolarWind’s customers include different global Fortune 500 companies, the majority of the US-based telcos, and different branches of the US military. On top of these global organizations, other cybersecurity vendors such as FireEye and different US and UK government branches were potentially exploited in the attack.

Due to the impact of the SolarWinds breach, the security community will look back at this attack as one of the biggest breaches on the United States governments ever committed. 

How Does the Breach Affect You? 

While this breach demonstrates how far Russian state-backed attacks will go, most organizations need to think about the effect it will have on their businesses rather than who the attackers are.

First, every organization no matter its size should double-check and make sure that their SIEM solution is secure and up-to-date with the current threat landscape. While some people might refrain from putting their entire organization’s trust in a monitoring solution after reading about this attack, now is the time for stronger and more up-to-date alerts and auditing. 

These kinds of attacks should push your organization to better understand the status of their security, and if needed, to adopt the right solutions to patch up potential points of entry for hackers – literally. Patching is hugely important now as various solutions update in response to new threats, and the breach will push SIEM providers to investigate their solutions to see where they can be exploited.

Lessons to Learn From the SolarWinds Attack

While the details of the attacks are still being investigated and will continue for months, here are three takeaways that your organizations can think about to decrease the chances of becoming a victim.

Supply Chain Attacks Are Not Disappearing

Cybercriminals are increasing their attack efforts with more sophisticated attempts on organizations’ software supply chains, and the SolarWinds attack has forced everyone to pay attention. While your organization might believe it is secure, in reality, no one is. Ensure all communications are encrypted, and make good use of basic tools like 2FA.

Attackers Just Need One Entry Point

Cybercriminals are finding new ways to attack organizations and exploit their critical resources and networks. Hackers can easily exploit your organization from in-depth attacks or in some cases the simple theft of an employee’s password, but no matter how they get in they can still enjoy frightful lateral movement if the right access management precautions aren’t taken.

Vulnerabilities Take Time to Patch

As seen in different breaches, cybercriminals may not be detected for weeks or even months. People tend to think of data breaches as attackers quickly exploiting and deserting their victims within minutes. In reality, attackers often are lurking for years until a breach is found. To fight off unauthorized access from malicious actors your organization should prioritize monitoring and network visibility. 

Security Community as One

As a member of the cybersecurity vendor community, it’s tough to see a fellow vendor become the victim of a cyber attack. All cybersecurity vendors know we are working together to make the world a more secure place. At Perimeter 81, we strive to provide the most secure experience for our customers and partners, and take the SolarWinds breach very seriously As we look into 2021 we will innovate further and ensure even better network security in the upcoming year and on. 

Read More
red_herring
Perimeter 81 Named as a Finalist For The 2020 Red Herring Top 100 North America
Reading Time: 2 minutes

Tel Aviv, Israel – November 16th, 2020 – Perimeter 81 has been selected as a finalist for Red Herring’s Top 100 North America award, one of the technology industry’s most prestigious prizes.

Finalists for the awards are among the continent’s brightest and most innovative private ventures. Red Herring’s editorial team has chosen their place among North America’s tech elite, during a months-long process that takes into account criteria including disruptive impact, proof of concept, financial performance, market footprint and quality of management.

“We are honored to be a finalist for Red Herring’s Top 100 North America award,”  said Amit Bareket, CEO and Co-Founder of Perimeter 81. “This recognition not only serves as a validation of our success but it also demonstrates our approach in delivering enterprise-level network security solutions to our customers. 

For over two decades Red Herring’s team has seen through the tech sector’s hype to select brands that have become industry benchmarks. Previous Top 100 finalists have included Alibaba, Facebook, Google, Skype, SuperCell, Spotify, Twitter, and YouTube. 

The Top 100 North America has become not only a springboard for some of tech’s biggest names, but a valued and trusted tool for venture capitalists, experts and analysts predicting trends at the industry’s sharpest edge.

“Selecting finalists for this year’s Top 100 has proved more difficult than ever,” said Alex Vieux, publisher and chairman of Red Herring. “North America has been tech’s beating heart for years–but never have I seen such an exciting, disruptive and innovative generation as we have in 2020. “

“Perimeter 81 fully deserves its place among our finalists, and I’ve every confidence it will make a significant impact in the tech world,” added Vieux.

Finalists are invited to present their winning strategies at the Red Herring Top 100 North America conference on Nov 17-18, 2020. The Top 100 winners will be announced after all the presentations at the Top 100 Forum.

About Perimeter 81

Perimeter 81 is a Zero Trust Secure Network as a Service that is simplifying network security for the modern and distributed workforce. Based in Tel Aviv, the heart of the startup nation and a global hub for innovative technology development, Perimeter 81 was founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali. Perimeter 81’s clients range from small businesses to Fortune 500 corporations across a variety of sectors, and its partners are among the world’s foremost integrators, managed service providers and channel resellers. Earlier last year, Gartner selected Perimeter 81 as a Cool Vendor in Network and Cyber-Physical Systems Security.

Read More
1000 customers - Blog Banner
Perimeter 81 Surpasses 1,000 Customer Milestone
Reading Time: 3 minutes

We are excited to announce that we have surpassed a long-anticipated milestone: There are now 1,000 customers using Perimeter 81 to secure their networks. Our company has witnessed tremendous 500% year-over-year growth and tripling the customer base in less than one year. 

Customers have expressed that they appreciate our service for its intuitiveness, ease of deployment and high scalability. We truly see our customers as partners in building our product, and we believe this has been our real growth engine. 

When we launched our Secure Network as a Service in 2018, the majority of our initial customer base was tech and SaaS companies. Early adopters of cloud and mobile, tech organizations were onboard with our innovative solution from the start. As the shift to cloud and remote work became more widespread across all industries, even before COVID-19, we were able to roll out our platform to relevant sectors and fields. 

Now, we serve customers in a range of industries with our clientele comprising 38% tech companies, 10% healthcare, 9% in the finance sector, 6% consulting services, and the remainder in retail, media, education, government and more.

With remote work as the new normal and our collective status quo for the near future, more businesses have realized the continuity plans they have in place aren’t equipped to safeguard against new and evolving security risks for remote workers, or resilient enough to sustain operations through another potential outbreak. We’ve come prepared with a solution that will drive us moving forward.

Gaining Momentum Towards SASE

The typical organization’s network is more complicated than ever, and traffic through these networks is increasingly convoluted, with data flowing between local resources, cloud applications, and mobile devices in rapid succession. As resources are now more present in the cloud than on-premises, IT teams have enlisted a bevy of tools to regain the network visibility they need to ensure security. These are numerous, and while they may be able to together provide visibility, orchestrating and managing them is difficult and unwieldy. 

Accordingly, for the past year we have been working tirelessly to build out a holistic SASE solution. SASE (Secure Access Service Edge) is a new converged solution for network and security services. While the term was only recently introduced and coined by Gartner in August 2019, Perimeter 81 is already considered by industry participants to be winning the “SASE space race”. 

SASE enables IT security solutions to provide a more holistic and agile service for business networking and security. By offering a unified security solution, we are simplifying the consumption of network security for organizations of all industries and sizes – and this is shown through our expanding customer base. 

Looking to the Future

While COVID-19 will not last forever, the technologies adopted during the pandemic will continue to be used far into the future. Many businesses that previously did not have the option for employees to work remotely or from home can now allow their workforce to remain remote if they choose, as employees can securely connect to the organization’s resources through Perimeter 81. We are proud to help businesses continue functioning productively and securely through these times and into the future. 

It is time to look past the legacy hardware solutions and look into the future with a more secure and modern approach to network security. Organizations are relying on Perimeter 81 to continue working securely from home, with our cost-effective, cloud-based, highly-scalable solution. We are helping organizations of all sizes and in many industries work through these trying times and continue to use our services well into the future and we are grateful to our 1000+ happy customers who are along for the ride. 

Looking forward to celebrating many more milestones together,
Amit and Sagi
Perimeter 81 Co-founders

Read More
An Exciting Announcement: Perimeter 81 Raises $40 Million in Series B Funding Led by Insight Partners
Reading Time: 3 minutes

Today truly marks a milestone for Perimeter 81.

We are so proud to share the news that we have raised a Series B round of $40 million, led by a premier VC and private equity firm, Insight Partners with the participation of Toba Capital and our existing shareholders. The financing represents a giant leap forward in our efforts to simplify and modernize the way businesses consume cyber and network security.  

It will help support our rapid growth and accelerate our hiring and development, it will further our disruption of the traditional VPN and Firewall markets and most importantly, it will allow us to create the best possible service for you, our valued customers and partners.

We’d like to take this opportunity to reflect on the past and look to the future —  sharing the vision that has driven us so far, and our hopes and aspirations as we move forward.

It All Started with a Vision for Change

Back in our early days as startup founders, when we were working part-time at large enterprises, we had to deal with outdated and complicated network technologies on a daily basis. These were the only choices available to securely access corporate resources. And while these tools were so critical to maintaining employee productivity, they were also incredibly difficult to use.

The first company we founded was a personal VPN service that allowed consumers to browse securely and privately over the public Internet. With this business, we were able to learn how to build highly scalable and global network infrastructure, as well as design a single-click cybersecurity product for the end-user.

During that time, we often reflected on our enterprise experiences. We believed that innovation in B2B network security was necessary and that we could apply what we learned from creating a service for consumers to create a much better experience for businesses. And so, Perimeter 81 was born.

Remote Work Became the New Reality

Three years ago we noticed two key trends in the modern workforce: Cloud and Mobility. Many companies started to migrate their entire assets to cloud infrastructures and the employees — they were working from different locations across the globe. With that in mind, we understood the huge potential and immediate need for a change in the cybersecurity landscape.

We assumed that in the next 5 to 10 years there would be a complete digital work transformation, but in March of this year, everything changed in the blink of an eye. COVID-19 spread across the globe and as it evolved from an epidemic to a pandemic, it forced companies worldwide to send their employees home.

Many new clients came to us in need of a scalable and reliable network security solution. Their site-centric and hardware-based legacy VPN solutions had severe licensing restrictions, or they were simply too difficult to manage — no longer accessible with the new work-from-home reality.

In tandem, our current customers turned to us needing to rapidly expand their accounts, as it was no longer specific teams but rather, their entire organizations that were now reliant upon secure remote access in order to stay productive.

This major global event clearly demonstrated to us the significance and importance of our vision to bring network security into the 21st century, and deliver a ‘one-stop-shop platform’ to house network and security solutions as a service under one roof.

Looking to the Future

As we look at our current global reality, one truth is clear: the future of network security is now. We feel fortunate to have the support of such amazing investors that recognize this truth as well, and want to help us propel a necessary market transformation.

We are thrilled that Insight Partners embraces our vision and shares our belief in the importance of transforming the way organizations are consuming cyber and network security. We’ve had a long relationship with them and have always been closely aligned on the significance of strong SaaS offerings and the value they bring to the market. 

This latest funding round will launch us forward as we build our complete SASE solution. With this platform, we aim to eliminate tool sprawl and consolidate fragmented legacy technologies — protecting businesses globally from large scale, and potentially devastating, cybersecurity breaches. 

On a company level, to support our vision, we are rapidly growing our talented team and hiring for multiple positions across our Sales, Marketing and R&D teams in our Tel Aviv, New York and California locations.

We are confident that in working together with our committed investors, dedicated employees and our valued customers and partners, we can continue to develop highly innovative network security solutions and further disrupt the industry — driving a new path forward to securely enable and fully empower our modern, ‘work from anywhere’ society.

Best,

Amit Bareket & Sagi Gidali, Perimeter 81 Co-Founders

For more information about our unique vision and SASE platform, click here.

Read More
CRN® Recognizes Perimeter 81 on the 2020 Emerging Vendors List
Reading Time: 3 minutes

Tel Aviv Israel – July 20th, 2020 – Perimeter 81, a leading Secure Access Service Edge (SASE) provider,  announced today that CRN®, a brand of The Channel Company, has named Perimeter 81 to its 2020 Emerging Vendors list in the security category. This annual list honors new, rising technology suppliers that exhibit great promise in shaping the future success of the channel with their dedication to innovation. The list recognizes channel-focused organizations across eight categories: Cloud, Data Center, Security, Big Data, Internet of Things (IoT), Storage and Networking/Unified Communications. 

This list recognizes recently founded, up-and-coming technology suppliers that are shaping the future of the IT channel through unique technological innovations. In addition to commemorating these standout companies, the Emerging Vendors list serves as a valuable resource for solution providers looking to expand their portfolios with cutting-edge technology. 

Partners of Perimeter 81 recognize the advantages of deploying cloud-based network security instead of traditional security solutions. Not only does this facilitate greater security and performance for their clients but also allows predictable recurring revenues and the simplicity of managing network security 100% remotely from an intuitively designed multi-tenant partner dashboard.

“It’s an honor to be named among the select few companies chosen as part of CRN’s Emerging Vendors in Security for 2020,” said Amit Bareket, CEO and Co-Founder of Perimeter 81. “This recognition not only serves as a validation of our success but it also demonstrates our channel-centric approach in delivering enterprise-level network security solutions to our partners.”

CRN’s Emerging Vendors recognizes pioneering technology suppliers in the IT channel that are driving innovation and growth. This list serves as a valuable resource for solution providers in search of the latest technologies.  

The Emerging Vendors list is selected by CRN’s esteemed editorial team. These vendors are inspiring the IT channel with groundbreaking technologies and best-in-class offerings that are elevating businesses – driving success with solutions built to battle the challenges of the IT channel. 

“CRN’s 2020 Emerging Vendors list recognizes vendors that are revolutionizing the IT channel with innovative solutions that meet the complex demands of our industry,” said Blaine Raddon, CEO of The Channel Company. “It honors inspirational new vendors that are driving channel growth with state-of-the-art technologies that will continue to shape the channel into the future.” 

The 2020 Emerging Vendors list will be featured in the August 2020 issue of CRN Magazine and online at www.CRN.com/EmergingVendors

About Perimeter 81

Perimeter 81 is a Zero Trust Secure Network as a Service that is simplifying network security for the modern and distributed workforce. Based in Tel Aviv, the heart of the startup nation and a global hub for innovative technology development, Perimeter 81 was founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali. Perimeter 81’s clients range from small businesses to Fortune 500 corporations across a variety of sectors, and its partners are among the world’s foremost integrators, managed service providers and channel resellers. Earlier last year, Gartner selected Perimeter 81 as a Cool Vendor in Network and Cyber-Physical Systems Security.

About The Channel Company 

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers, and end-users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelco.com 

Follow The Channel Company: Twitter, LinkedIn and Facebook 

©2020 The Channel Company, LLC. CRN is a registered trademark of The Channel Company, LLC. All rights reserved. 

The Channel Company Contact: 

Jennifer Hogan The Channel Company [email protected] 

Read More
Perimeter 81 Recognized as a Sample Vendor In Gartner’s 2020 Hype Cycles For Network Security and Enterprise Networking
Reading Time: 3 minutes

Perimeter 81, the Secure Network as a Service solution for the modern and distributed workforce, has been recognized in the latest Hype Cycles by Gartner Inc., a leading IT research and advisory company. 

We are proud to be named a sample vendor in the Zero Trust Network Access ( ZTNA) category in the Hype Cycle for Network Security, 2020, and the Hype Cycle for Enterprise Networking, 2020. This industry recognition affirms the success we’ve had in developing the next generation of innovative network access and network security products. 

Over the past years, ZTNA vendors have replaced the need for the traditional Business VPN. As stated in the report, “As more organizations suddenly find themselves transitioning to much more remote work, hardware-based VPNs exhibit limitations. ZTNA has piqued the interest of those seeking a more flexible alternative to VPNs.” (1)

What is the Hype Cycle?

Gartner Hype Cycles provides a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. Gartner Hype Cycle methodology gives you a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals.

In each report under the Zero Trust Network Network Access  (ZTNA) category, Gartner Analyst, Steve Riley discusses how ZTNA provides a more immediate and modern solution in place of the traditional VPN. The ZTNA model offers better network visibility which most VPNs are lacking. Additionally, ZTNA allows organizations to enable a cloud transformation that will be more geared to their corporate network resources and applications.

In this year’s reports, Gartner highlights the different business impacts that ZTNA has to offer.  “ZTNA brings significant benefits in user experience, agility, adaptability and ease of policy management.” (2) Additionally, the report lists the different vendors that offer a ZTNA solution and the benefits that are being offered such as an increasing number of points of presence (Pop) which are helping organizations with network latency.

The Perimeter 81 Network Security Offering 

In each report, Gartner mentioned that with cloud-based ZTNA offerings, scalability and ease of adoption are additional benefits. At Perimeter 81, we are providing secure access to local network, applications and cloud infrastructures with one unified platform. By transforming the outdated, hardware-based security appliances into a cloud-based SaaS solution, we are simplifying network security for the modern and distributed workforce. 

As a holistic SaaS solution providing customizable networking and the highest levels of security in the cloud, Perimeter 81 is revolutionizing the way organizations consume network security. 

Our Zero Trust Network Access (ZTNA) solution provides policy enforcement and protection by isolating applications and segmenting network access based on user permissions, authentication, and verification. The platform’s comprehensive software-defined perimeter (SDP) solution offers simple cloud migration security, seamless least privilege access to resources and secured access to cloud environments including IaaS and PaaS.

Unlike hardware-based legacy VPN and firewall technology, our scalable SaaS solution offers greater network visibility, seamless onboarding and full integration with major cloud providers, giving companies of all industries and sizes the power to be fully mobile and completely cloud confident. 

Global Recognition 

Being recognized as a representative vendor in both the 2020 Hype Cycle for Network Security report and the 2020 Hype Cycle for Enterprise Networking report from such an esteemed resource validates our ongoing effort in the enterprise cybersecurity market.

“We are pleased to have been included in the Gartner Hype Cycle,” said Amit Bareket, CEO and Co-Founder of Perimeter 81. “We believe we are shaping the future how businesses will consume network security and this recognition validates the depth and breadth of our innovative offering. Being named by Gartner as a sample vendor reinforces the value of our approach to helping our clients with a more secure network connection to their cloud services and resources.”

  1. Gartner, Hype Cycle for Network Security, 2020, Pete Shoard, 30 June 2020.
  2. Gartner, Hype Cycle for Enterprise Networking, 2020, Danellie, Young, Andrew Lerner, 8 July 2020.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected] 

To learn more about Perimeter 81’s Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
ZTNA_2020
Perimeter 81 Recognized in Gartner’s 2020 Market Guide for Zero Trust Network Access
Reading Time: 3 minutes

Perimeter 81, the Secure Network as a Service solution for the modern and distributed workforce, has been included in the 2020 Market Guide for Zero Trust Network Access by Gartner Inc., a leading IT research and advisory company.

We were named as a representative vendor in the “ZTNA as a Service” category in the 2020 report. This year’s report was written by Analysts Steve Riley, Neil MacDonald, Lawrence Orans. Zero Trust network Access (ZTNA) describes the emerging market that is recommending organizations to replace their outdated traditional remote access VPN technologies with a more modern model that improves security while supporting a larger amount of use cases and enhancing the end-user experience.

Unlike stand-alone ZTNA solutions, as-a-service offerings require less setup and maintenance. According to Gartner, ZTNA as a Service solutions like Perimeter 81 typically require provisioning at the end-user or service side and route traffic through the vendor’s cloud for policy enforcement. Stand-alone offerings require customers to deploy and manage all elements of the product. In addition, several of the major IaaS cloud providers offer ZTNA capabilities for their customers. 

What Is the Market Guide for Zero Trust Network Access?

Every year, Gartner publishes the Market Guide for Zero Trust Network Access. The annual report helps security and risk management leaders choose the best ZTNA solution for their organization’s needs, specifically application-centric and demand-driven connections.

In this year’s report, Gartner highlights how digital business transformation is affecting enterprises worldwide. According to Gartner, “ZTNA augments traditional VPN technologies for application access and removes the excessive trust once required to allow employees and partners to connect and collaborate. Security and risk management leaders should pilot ZTNA projects as part of a SASE strategy or to rapidly expand remote access.” (1)

Perimeter 81’s Secure Zero Trust Network As a Service Offering  

Gartner recommends deploying “a ZTNA product that relies on multiple contextual aspects to establish and adapt trust for application-level access” and to “stop relying primarily on IP addresses and network location as a proxy for trust.”

ZTNA, the modern replacement for cloud VPN, removes excessive trust placed in physical networks in favor of adaptive, identity-aware, precision access that is application-oriented.

At Perimeter 81, it is our mission to simplify secure network, cloud and application access for the modern and distributed workforce. To do so, we have built a holistic SASE (Secure Access Service Edge) solution that provides both customizable networking and the highest levels of security.

Unlike hardware-based legacy VPN and firewall technology, our scalable SaaS solution offers greater network visibility, seamless onboarding and full integration with major cloud providers, giving companies of all industries and sizes the power to be fully mobile and completely cloud confident. 

Our cutting-edge zero Trust network security solution features:

  • Secure Cloud and Network Access 

Ensure user-centric and adaptive, policy-based network access to on-premise resources, SaaS applications, and cloud environments. 

  • Zero Trust Application Access 

Reduce the attack surface. Implement zero trust, fully audited access to web applications (Layer 7) via HTTP/S, SSH, RDP, or VNC, without an agent. 

  • Cross-Platform Endpoint Protection

Enable single sign-on access and two-factor authentication across iOS and Android devices as well as PC and Mac desktops.

  • Site-to-Site Interconnectivity

Bridge the gap with fully customizable networking. Interconnect your cloud environments and different network branches.

Industry Recognition 

Being recognized as a representative vendor of ZTNA as a Service in the 2020 Market Guide for Zero Trust Network Access from such a reputable resource confirms our continuous effort in changing the way organizations consume network security. 

“We believe our inclusion as a Representative Vendor in the Gartner Market Guide validates why leading organizations adopt the Perimeter 81 solution to manage user access to their cloud resources,” said Amit Bareket, CEO and Co-Founder of Perimeter 81. “The Perimeter 81 team has worked tirelessly to deliver a secure, network as a service solution that collectively provides secure networking and data science technologies in a way that overcomes the limitations of traditional security solutions. We feel that to be recognized by Gartner is a tremendous validation for the work the Perimeter 81 team has accomplished.”

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Market Guide for Zero Trust Network Access, 2020, Steve Riley, Neil MacDonald, Lawrence Orans, June 2020.   

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected] 

To learn more about Perimeter 81’s Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Telehealth
The Proper Privacy Regulations TeleHealth Needs Right Now
Reading Time: 4 minutes

When the average American thinks of March, the first thing that pops into their mind is the beginning of spring. Unfortunately, in March 2020, life as we know it has changed completely due to COVID 19. While only essential employees are allowed to continue work as usual (with additional regulations), anyone and everyone who is able to work remotely has transitioned from the office to home in order to keep things on an even keel. 

This new remote lifestyle has changed the way we live, work, interact with people, and how we approach doctor appointments as well. The healthcare sector quickly implemented changes to provide a more remote experience to comply with social distancing regulations. 

In order to decrease the amount of face-to-face doctor appointments, on March 17th the Department of Health and Human Services (HHS) announced they “will not impose penalties for noncompliance with the regulatory requirements under the HIPAA Rules against covered health care providers in connection with the good faith provision of telehealth during the COVID-19 nationwide public health emergency.”

This popular move has allowed different healthcare providers to implement some of the most popular communication applications such as Zoom, Skype, WebEx, GoToMeeting, and others. Is this move to provide a remote option for patients the right decision for the current situation? 

The Right Healthcare Solution for the Current Situation

With the increasing rise of social distancing limitations and regulations, telehealth services are seeing an overflow of patients requesting a remote doctor appointment instead of face-to-face. 

As hospitals and governments are urging patients to avoid visiting emergency rooms,  many are turning to the online option of telehealth. The online option allows patients to consult with their doctors and specialists over the phone, video or chat as a feasible option. Telehealth video visits can be a successful tool for remotely monitoring and treating patients with mild symptoms who are staying home. Telehealth providers are easily able to monitor a patient’s symptoms and quickly decide whether they should stay home, go to the hospital, or meet their general practitioner. 

While telehealth has many benefits for patients, it comes with its challenges for healthcare providers – especially the traditional healthcare companies that did not have a telehealth program in place. Similar to scaling an entire company remotely, implementing telehealth programs takes time to establish the necessary technology, recruit doctors, train doctors about the best virtual practices and teach the patient how to use the platform. 

Healthcare providers that have not implemented a telehealth program yet should educate their patients with internal resources to learn more about moving to digital doctor appointments. In order to allow patients to take part in telehealth visits instead of in-person, providers should frequently provide medical best practices through their website, blog and social media to keep their patients engaged and informed.  

HIPAA Solves Privacy Risks

Due to surging increase of patients who are turning to telehealth services it comes with many privacy risks. Instead of doctors having previous knowledge of the patient’s medical history, the patients will need to explain more in-depth to their new doctors due to the lack of medical records on hand.

The lack of updated records on patients creates a massive privacy issue between the doctors and the telehealth platforms which they are using. Due to the history of healthcare’s super sensitive regulations for sharing records and the restriction of sharing patients’ data, this presents a problem for telehealth platforms. By sharing sensitive data over a communication app it creates an opportunity for hackers to be a fly on the wall of these more vulnerable conversations between doctor and patient, since communication apps may sometimes be easily breached and represent a trove of valuable patient information. Additionally, hospitals and healthcare providers need to double down on IT and cybersecurity to fight off potential privacy risks. This is where HIPAA comes into play. 

healthcare stat

Over the years, healthcare has been an attractive target for hackers trying to breach patients’ sensitive records. While medical data and records are some of the most delicate pieces of information out there, the healthcare industry has the right compliance regulations in place. HIPAA and other regulations have been around for years but since the HHS weakened the previous compliance regulations, telehealth is now a more attractive target for hackers.

Now that the government has become more lenient with telehealth regulation rules, enforcing HIPAA with telehealth communication is the right move to provide better privacy for patients.

The Health Insurance Portability and Accountability Act (HIPAA) requires medical providers to adopt data security in order to protect their patients’ information from disclosure. The HIPAA regulation requirement of encryption initially sounds a bit confusing, however, it’s much more simple than suggested. The HIPAA encryption requirements for transmission security state that covered entities should “implement a mechanism to encrypt PHI whenever deemed appropriate.” 

In other words, majority healthcare organizations are required to be HIPAA compliant and each provider needs to have some level of security for PHI. Healthcare providers are required to encrypt their data unless they can justify why they can’t implement encryption and can provide an equal alternative.

Achieve HIPAA Compliance with Secure Solutions

Tasked with choosing the best way to store, access and back up electronically protected health information, many healthcare technology companies and providers are looking at cloud computing. Adopting cloud-based Network as a Service technology is a great choice in comparison to traditional hardware-based solutions, as it offers scalability, affordability and increased compatibility with cloud storage environments. But remember, the security service you choose must be SOC 2 type 2 compliant and ISO 27001-compliant and have signed multiple HIPAA BAAs. With these checks in place, a Network as a Service solution like Perimeter 81 for healthcare can offer a highly effective solution for any organization’s HIPAA compliance needs.

TeleHealth is the Future

As we are experiencing a global social distancing, telehealth is quickly evolving, as is the way that it presents a remote option for healthcare services. However, potential privacy and security risks could decrease its value moving forward. Soon, we should begin seeing more government bodies authorize and create federal telehealth privacy and security protocols which will help healthcare providers avoid risks to their patients and better show the numerous benefits telehealth has to offer. With the help of the government and best privacy and security in place telehealth will have that added security to fight off hackers, and be able to shrug off questions about its security.

Read More
Employers See Rising Number of Remote Workers During Corona Scare
Reading Time: 5 minutes

 

In late January, the World Health Organization declared the Coronavirus outbreak an international health emergency, and on March 11, 2020, they officially declared the virus to be a pandemic. It’s the first time the organization has declared a pandemic since the H1N1 “swine flu” in 2009. Though the numbers keep rising, currently over 315,000 cases have been reported in 109 countries, and over 13,500 have died from the virus.

While people think coronavirus is a new outbreak of disease, it is actually a common thread of various, known viruses. Officially named the 2019 Novel Coronavirus, or Wuhan Coronavirus, this latest and ongoing outbreak contains the most severe type of the virus. Some of the symptoms include coughs, sore throat, vomiting, lack of breath, and fever. A respiratory illness, the severity for patients has ranged from a mild cold to very serious symptoms that can (and do) lead to death. These symptoms tend to occur between 2 to 14 days after being infected. 

The effects of this particular coronavirus have put a spotlight on the need to protect employee health and that of their organizations. Accordingly, remote work has gone from an already popular workplace strategy to a necessary one for companies worldwide. Organizations that have contact with people affected by the Wuhan strain of coronavirus need to consider how to restrict their employees from being in physical contact with each other and potentially infected individuals. As a central tenet of this strategy, gatherings of large numbers of people in public places or in the office should be avoided as much as possible. 

A clear example of this precaution is the recently canceled World Mobile Congress. A majority of vendors decided to pull out of the event and its organizers requested that the city of Barcelona declare a state of health emergency, due to numerous attendees coming directly from the epicenter of Wuhan Coronavirus’s origins.

Coronavirus Has Boosted Remote Work

The concept of working remotely or working on the go isn’t a new trend, and has largely become the status quo for modern organizations. Allowing employees to work “off-campus” is a perk that has mutual advantages for both employees and organizations, and this is why 61% of organizations allow staff the privilege of remote work.

According to Harvard Business Review, ““A key takeaway from our research is that if a work setting is ripe for remote work – that is, the job is fairly independent and the employee knows how to do their job well – implementing WFA (working from anywhere) can benefit both the company and the employee”. This trend is only increasing, and has already grown 159% since 2005 – skyrocketing past the growth of the rest of the workforce.

In places like the UK and USA, the prevalence of flexible work policies runs parallel with employee preferences.

This is no surprise, as managers and executives have found that implementing a remote work policy improves productivity so much that it’s easily measurable, with the estimate that flexible work models will save organizations up to $4.5 trillion in the US alone by 2030. One part of this more tangible productivity is sick days, which traditionally cost organizations significantly when they need to be used, but are reduced by over 13% among remote workers. Another measure is retention. It comes as no great shock that when 70% of potential hires consider remote work flexibility a top priority as to whether or not they’ll join, that organizations who do offer it will retain employees with 10% greater efficiency in 2020.

A New Purpose for Remote Work

To fight off the spread of Coronavirus, organizations are enforcing remote work as a necessity instead of a privilege. Around 60 million people in China were forced to work from home in January as the government tried to contain the virus. Most recently, with the global spread of the virus, major tech giants have begun to follow suit. Twitter has asked all of its international employees to work from home, and Amazon, headquartered in Seattle, now labeled “America’s Corona Virus Capital,” has begun planning remote access stress tests for all employees.

Over the past ten years, organizations around the globe are increasing and expanding opportunities for remote work due to the need for an agile workforce spurred on by new technology. Yet despite the advancement of tech and the tools that create an increasingly mobile workforce, the trend comes with risks that have more to do with network health than personal health. 

More Remote Workers, More Security Holes 

The burgeoning remote work paradigm is creating countless security gaps for organizations. While remote workers might be easier targets for hackers, all employees must be aware of the different attacks that will exploit human behavior to open the door for hackers. One of the easiest attack vectors is unsecured Wi-Fi networks. 

When allowing employees to work remotely, organizations must clearly outline those remote employees’ responsibilities regarding IT security best practices and the importance of data protection. To provide another layer of defense vs unauthorized network access, organizations must implement remote-worker-specific security policies which include device monitoring, multi-factor authentication and Wi-Fi security.

Today the majority of global organizations still depend on legacy hardware-based VPN technology for secure network access and access to cloud resources on different networks.  These site-centric and hardware-based network security appliances that we’ve relied on for the past 30 years are no longer adequate in securing remote and on-premise access.

In providing secure network access to remote workers, organizations need to create and implement different security strategies to fight off different attacks on their network and resources. The user-centric Zero Trust security model enforces multiple layers of verification before granting resource access to any user.

Additionally, by implementing a solution that offers Software-Defined Perimeter architecture, organizations are helped to deploy perimeters globally while retaining the traditional model’s value of invisibility and inaccessibility to “outsiders”. These can be deployed anywhere – on the internet, in the cloud, at a hosting center, on the private corporate network, or across some or all of these locations.

Security Hygiene and Health Go Hand in Hand

To prevent remote access risks such as a sudden movement of employees off-premises in order to fight off Coronavirus, organizations should implement Software-Defined Perimeter technology and the Zero Trust model to ensure secure access by authorized devices, users and locations. They should also seek services that include advanced or even automatic Wi-Fi security features, ensuring employee communications are encrypted across all Internet connections. With the right security tools in place, organizations can ensure that only authorized connections are being established while leaving their cloud environments completely hidden from attacks, giving networks as clean a bill of health as their users.

 

Read More
One Small Step for SASE: Perimeter 81 Lands at RSA 2020
Reading Time: 3 minutes

After a record-breaking and thought-provoking 2020 RSA conference, we’re excited to gush about Perimeter 81’s successes and reminisce on the latest security trends – not to mention the adventures we had in sunny San Francisco. 

While it will be impossible to cover all that was discussed during the countless visits to our (literally) stellar booth, some of the most important highlights can definitely do our accomplishments justice.

RSA Revs Up

Over 650 companies attended this year, and the space was a loudly buzzing forum for security-centric activity and discussion. Despite the hubbub, we grabbed a significant amount of attention from thousands of curious event-goers, and so our team was constantly on their feet demonstrating the advantages of Perimeter 81’s Secure Network as a Service platform.

VP of Customer Success Daniel Goldfeld, deep in conversation.

The Crown of the Conference

Though RSA is where “the world talks about security”, our booth design was the real talk of the town. 45,000 people attended RSA this year and thousands were drawn to our space-themed booth, which was the biggest we’ve ever had. With asteroid beanbags and an anti-gravity prize display, it was pretty hard to miss. Just ask this enthusiastic visitor:

It was even harder to miss the intrepid Perimeter 81 team, outfitted with some sassy SASE jackets to signify that we’re already far along on our expedition to take network security to places it’s never been – and beyond. Secure Access Service Edge is the way the security sector’s rocket ship is headed: a unified cloud-based solution for both network and security.

The team, fully outfitted, flexing on the streets of San Fran.

The “SASE Squad” wore our colors around town as well, and it wasn’t just for the famously temperate San Fran weather (but they did help). Though we had tons of fun exploring, seeing the sights, and eating our way through the city, as always it was important to balance work with play. And work we did.

Leading the Discussion on Network Security

Our presence as an industry leader was exemplified during panels in which our CEO Amit Bareket and Director of Business Development James Alvarez led their respective conversations, perking ears and drawing crowds as they outlined the biggest issues in network security that organizations face and talking with other industry leaders about what the future will look like.

The panel left our fearless leaders a bit hungry, but they’re not the type to dismiss an opportunity when it comes into their orbit. Accordingly, they managed to find time to grab a quick bite with security expert and prolific author Richard Stiennon, who quickly found himself deep in conversation with the two executives, and was generous enough to give them a copy of his Security Yearbook 2020: A History and Directory of the IT Industry. Cheers Richard!

RSA 2021 Here We Come

Given the skyward trajectory of Perimeter 81’s ship, we’ve already booked a booth that’s double the size as this year’s for RSA 2021, and we look forward to showing off our complete, fully unified Secure SASE platform. See you there!

Read More