Get Granular with a New Feature: User Configuration Profiles
Reading Time: 3 minutes

The ABCs of proper network security start with A, of course. A is for Access, and it’s the basic idea that lies at the heart of any secure organization. Employees connecting to essential corporate resources shouldn’t have the same access policies, or else they all represent an equal threat to the organization’s data, and present a wide attack surface to hackers.

Just as you wouldn’t give every employee the same access privileges, configuring their security software the same way is also something to avoid. No two employees connect in the exact same way, and designing security as if they do is a mistake. That’s why we’ve recently released the newest of many layers in our multi-layer network security platform: User Configuration Profiles.

Scalable Security Starts with Configuration

Some of the most dangerous security blunders involve mismanaged software configurations, and according to a recent Threat Stack survey, over 73% of companies were able to identify at least one serious misconfiguration happening in their own networks. One wrongly-toggled setting can create wide gaps in security that aren’t easily identified, because they may not happen to every user, and because misconfiguration is a problem that doesn’t call a lot of attention to itself – unlike breaches like DDoS attacks which occur overtly.

To combat configuration mishaps, it’s important to configure each employee’s security software in a way that complements their unique situation. Legacy solutions don’t provide this capability, forcing companies to use the same configuration for all users, or they force IT teams to work manually and configure each employee on a case-by-case basis.

When creating a User Configuration Profile, you can define how the Perimeter 81 agent or web platform is configured – down to the granular details – and then assign it to a relevant user or group of users in your network. Profiles allow you to differentiate configurations for users with different roles, devices, locations, operating systems, and more, and save and reprioritize them so they can quickly be assigned to new users.

How Does It Work?

Account managers and admins can find the User Configuration Profiles tool under Settings, after logging in to the Perimeter 81 web platform. After clicking on User Configuration Profiles under Settings, you’ll see the menu where your previously-created profiles live. There will already be one Default Profile here, which includes all your users.

Clicking on the Add Profile button brings up the screen where you’ll name the profile and assign it to a predefined group of users: these are the only two fields required for your profile to be listed on the previous screen.

Below the fold, you’ll be able to tweak this profile’s configuration options for both the Perimeter 81 web platform and the agent. Specifically, configuration options include General Settings, Network Settings, and OS-Level Settings.

General Settings: Available for both the web platform and the agent. General settings include the ability to automatically log users out after a certain period of time, to connect users to a specific public gateway, to connect on launch, to enforce automatic upgrades and other basic options.

Network Settings: Only available for the agent, network settings let admins determine how and when traffic through these users’ devices is encrypted. Options like our patented Automatic Wi-Fi protection automatically activate a VPN connection on unsecured networks, while Always-On VPN cuts the internet if encryption falters, even momentarily. Other options include a VPN kill switch and the ability to specify Trusted Wi-Fi networks.

OS-Specific Settings: Another agent-only configuration option, OS-specific settings determine how users on different operating systems can connect. The central utility here is that the profile’s users are protected with a VPN encryption protocol chosen specifically for their OS, for example you can enable IPSec encryption for Mac users and WireGuard for Windows users, or any combination in-between.

Configurations Galore

Perimeter 81 customers will notice that multiple users can be assigned to one configuration profile, but also that a single user might be a part of multiple configuration profiles. With the additional ability to swap the priority of active configuration profiles, customers will enjoy newfound customization and granular control over an often underestimated element of network security.

We look forward to adding new security and networking features that further strengthen our customers against data theft. For now, we recommend you get acquainted with User Configuration Profiles, and the best place to get started is our helpful knowledge base article.

Read More
Edge Security and Our Strengthening Data Center Backbone
Reading Time: 3 minutes

The cloud is synonymous with data centers, making the term much more grounded than its airy nickname lets on. Behind the buzzword, it’s common knowledge that most companies in the world rely on a number of infrastructure, hosting, and computing providers that can be counted on one hand.

Providers of the public cloud have been hard at work centralizing their enormous collections of servers, and eating away at the empty space in the industry until the competition has mostly been gobbled up. Most opportunities for new providers are now on the “edge”, away from giant server warehouses and closer to cloud consumers.

The edge is simply where users are, it’s that simple. It’s where applications are being accessed, rather than where the servers sit. Computing, storage, and other ideas have moved to the edge to better serve users, and it stands to reason that security should be on the edge as well. Otherwise, processes like authentication and encryption occur over much longer distances and place limits on productivity – largely due to high latency.

Perimeter 81 Serves Security from the Edge

As both resources and network infrastructure management make transition to the cloud, it no longer makes sense to conduct security through legacy solutions, which were designed to protect the classically defined network perimeter. The perimeter has dissipated, and is now where users are – and especially in the era of remote work, it makes sense to apply security practices at network nodes that are outside the traditional core. 

The edge must be secured with the same ideas required by the core, including:

  • Visibility of all resources, not just those that are on-premises
  • Monitoring that encompasses users and endpoints on the edge
  • Data and traffic privacy at all times and states
  • Resource access policies that incorporate the cloud

A quickly growing number of remote workers with access to the cloud means that countless endpoints have direct access to company data, so the same security processes that used to happen between office PCs and office servers now must happen between a mobile phone and a local data center. To help our customers achieve this feat, we’ve been building a backbone of global data centers that better supports edge networking and security.

Perimeter 81 Customers: Deploy a Custom Cloud Edge

With five new self-managed gateways being added to our already strong backbone of global data centers, Perimeter 81 customers are able to orchestrate access more safely and efficiently from the edge of their networks. These five gateways also offer customers a greater degree of control over their local hardware.

New Data Centers:

  • New York
  • London
  • Silicon Valley
  • Dallas
  • Israel

Now in production, customers are able to set up new network gateways in New York City, Dallas, London, Silicon Valley, and Israel. A crucial part of this infrastructure is that it’s proprietary and not set up by a third party, allowing Perimeter 81 (and our customers by extension) granular knowledge and control over specifications and configurations, downtime, and more.

Exercise Greater Gateway Control:

  • Proprietary managed and set-up hardware
  • Tailored configuration, downtime and other details
  • Redundant internet connectivity
  • Connections routed through our IPs, not public
  • Priority bandwidth

We offer priority bandwidth in these locations, and do not route customer connections to our gateways through the internet or cloud providers: All connections are direct on our own IPs, which prevents customers from being blocked due to public or ISP origins, and also allow the fastest speeds and lowest latency possible. 

In addition, all gateways come with redundant internet connections that keep your users productive even on the rare occasion that an ISP drops. This is a new and beneficial precedent that we’re setting for our customers, who we want in the future to be able to customize their networks and receive the most secure, low-latency, and streamlined experience possible.

Read More
April Product Updates: New SIEM Integrations, Amazon S3 and Azure Sentinel
Reading Time: 3 minutes

It’s not only the excellent feedback and requests from our customers that push us at Perimeter 81 to seek constant improvement. Our drive towards a complete SASE (Secure Access Service Edge) platform is a goal we’ve always got our eyes on, and we just got even closer. In that light, we’re excited to introduce some important new functionality to our solution this month: integration with Microsoft’s Azure SIEM and Amazon S3.

Smart Networks Lean on SIEM

No comprehensive network security platform should be without the ability to monitor and log the traffic or user activity that takes place. For ensuring total compliance and obtaining awareness of potential network exposure, SIEM (Security Information and Event Management) tools allow Perimeter 81 users to receive security alerts and analysis of events generated by applications and other parts of their networks in real-time.

Starting now, users with an Enterprise plan will be able to integrate their Perimeter 81 platforms with two more popular tools for free alongside our previous Splunk integration: Azure Sentinel and Amazon S3.

Azure Sentinel

A perfect fit for Perimeter 81, Azure Sentinel is a cloud-native SIEM and SOAR (Security Orchestration Automated Response) solution that is known for its scalability and ease of use. Now that it can be integrated directly with Perimeter 81, customers will be able to enjoy smart security analytics capabilities and live threat intelligence across their networks and applications.

Perimeter 81 customers will find it simple to set up a Log Analytics Workspace within our platform and link it to their Azure Sentinel solution, providing them with a unified platform that includes our rich array of network and security functions, and now also alert detection, threat visibility, proactive hunting, and threat response.

Perimeter 81 Azure Sentinel Integration

For a guide on how to integrate Azure into your Perimeter 81 platform, see our complete integration guide.

Amazon S3

The popular Amazon Simple Storage Service (abbreviated Amazon S3) helps organizations store their network objects and scale easily as they expand. Offering superior data availability, security, and performance than other leading solutions, organizations around the world rely on S3 to store, manage access to, and protect the enormous amount of data generated by their operations. Perimeter 81 now integrates with Amazon S3, enabling our users to forward data captured on their networks to their Amazon S3 bucket and improve their access controls in pursuit of specific business and compliance goals.

Perimeter 81 Amazon S3 Integration

For users relying on Amazon S3 to capture and who want to gain greater visibility over their Perimeter 81 network data, our handy integration guide makes it simple.

Stay Tuned for More

We’re hard at work adding features that complement our already robust Secure Zero Trust Network as a Service solution. Get in touch with us if there are features, functions, or integrations you’d like to see in the future – and keep an eye out for them!

Read More
New Product Update: DNS Filtering and Data Centers
Reading Time: 4 minutes

The dilemma that Perimeter 81 has always sought to address is simple: In a world where mobile and cloud have moved the network perimeter, how do we provide a complete, scalable security solution that moves along with it? 

With our Zero Trust Network as a Service, we’ve so far helped IT teams to pivot their security strategies around users rather than sites or resources, and this month we’re excited to introduce a new feature that makes it easier to implement this type of agile network security.

Perimeter 81’s new DNS filtering tool is a great addition to the array of network security features we offer in our Zero Trust NaaS, but it’s also one of the first one to be offered as a part of our vision to build a complete Secure Access Service Edge (SASE) platform. 

Thanks to our highly talented team, and some excellent feedback from our users, we can now offer DNS filtering immediately. We’re excited to show you how to use it to more effectively secure networks for your remote and on-premise employees. 

DNS Filtering Feature Goes Live

With a user-centric approach to network security, it’s easier for IT teams to monitor and stay aware of those accessing their organization’s resources, but it’s often not enough. Active measures for blocking entry to certain websites is a cornerstone of any truly secure access management model. This is especially true when hackers create over 300,000 new pieces of malware every day, and when at any given time, it’s estimated that a full 1% of the internet’s 1.5 billion websites are infected.

Being aware of risky internet browsing habits does little to secure your network against the malware that often lurks on these sites – gambling, pornography, and others. This is why as of March 2020, DNS filtering is being rolled out to customers of Perimeter 81 who are using the Premium or Enterprise plans. 

How Does DNS Filtering Work?

Activate DNS filtering on your Network page.

We recognize that the Domain Name System, or DNS, is used for mapping written URLs to IP addresses, and DNS filtering can be used in the same processes for an opposite result. By typing a URL into your Perimeter 81 DNS Filtering dashboard, you’re telling the DNS Resolver not to resolve the website associated with its IP address and display in internet browsers. 

Instead, Perimeter 81 steps in and tells it to show a custom page indicating to the user that the content they’re trying to access is blocked. There are a few ways that IT teams  can broaden or narrow which sites are blocked on network-connected devices.

This is what employees will see when trying to navigate to a blocked URL.

Blacklisting: When any URL is entered into a browser, the DNS Resolver receives a query, and if the name matches any of those that have been typed directly into the Blacklisted URLs field in Perimeter 81 (or uploaded as part of a list), then it cannot be reached by users. 

Whitelisting: Web filtering also acts in the other direction as a whitelisting tool, which gives IT administrators more control over the list of web destinations that employees are allowed to access. This two-pronged strategy is vital for herding users away from the bad and towards the good.

Category-Based Filtering: It’s easy to block access to the most popular and often compromised websites by category. Social media, pornography, news sites, gambling and gaming sites, and other categories can be removed in their entirety, and then supplemented with individual additions to either the Blacklisted URLs or Whitelisted URLs fields.

Why DNS Filtering is In Demand

The primary goal of DNS filtering is to block access to resources which shouldn’t be accessed from the company’s network, whether from a PC or user devices that may be accessing resources thanks to a BYOD policy. Blocking serves many purposes, sites may be malware infected, copyright-infringing sites, or just distracting sites. People use their personal devices differently than they do a work laptop, for example, and thankfully web filtering has utility for blocking malicious websites but also phishing emails.

  • Block websites: Compromised websites can go about infecting you with malware in many different ways. A drive-by attack simply downloads the malware onto your employee’s computer once the page loads, for instance. It may also try to trick them into downloading malware by clicking a button or banner.
  • Phishing emails: A phishing email is intended to get the recipient to go to a fake, yet official-looking website. If the DNS filter is aware of the most notorious fakes and phishing domains it can save a fatal error from being made, and block access to the problematic domain immediately.

More Gateways in New Places

We wouldn’t leave the update at DNS Filtering. Network security features must also be applied efficiently and non-intrusively across networks of any size, granting remote access that is as fast as it is expansive. In pursuit of this need, and thanks to requests from our loyal customers, we’ve continually strengthened our global backbone of data centers (and plan on continuing this trend) by adding the following gateway locations:

  • Helsinki
  • San Jose
  • Fremont
  • Mumbai

Six will be added in the very near future, bringing the total new data center additions to ten.

Sprinting Into 2020

We’re confident that these updates, and those coming in the future thanks to the combined power of SonicWall and Perimeter 81, will bring a better experience for users and we stand by to help you implement them. With a quickly expanding toolkit of network security features, our race towards a holistic, cloud-based SASE platform is happening at a breakneck pace, so stay tuned: It’s only a matter of time until we announce the next steps toward the future of network security.

For a free demo to see how DNS filtering and other Perimeter 81 features work in real-time, click here.

Read More
Product Updates
February 2020 Product Updates: Splunk Integration, Linux Agent and More
Reading Time: 3 minutes

The new year has only just begun, and thanks to many different customer requests we have recently implemented and launched new features and updates, and are thrilled to share. It’s no stretch to say that the best feedback is from customers using your platform on a daily basis, but nowhere is it written in ink that this feedback justifies any changes. In our case, we write it in stone, because our users are just that good.

With the excellent feedback you’ve provided, we’re proud to highlight the latest product updates and integrations since the start of 2020 to our Network as a Service solution.

Splunk Integration

Traditional security solutions tend to lack the ability to monitor, log, alert and integrate data from cloud resources into Security Information Event Management (SIEM) systems.

Lacking the right monitoring processes and systems also makes it difficult to respond in real-time to a cyber attack or data breach. No less important is having skilled security analysts who are able to take action when recognizing network anomalies, correlate events, and eliminate manual data analysis for AWS action detection such as suspicious instance creation, new user account creation or resource access and security group modification.

Accordingly, we have recently launched our new Splunk Integration into the Perimeter 81 platform, that our users can set up as a Splunk VPN. Splunk enables organizations of all sizes to search, analyze, and view the data gathered from all components of their IT infrastructure or business. Splunk users can enable log aggregation of event data from across their environment into a single repository of critical security insights within their Splunk platform.

In the video below we walk you through how to configure Splunk in order to have full visibility of your Perimeter 81 activity.

New Linux Agent

Customers often request new features and integrations, however in late 2019 we saw a surge of requests for our application to be available for Linux operating systems. Now your calls have been answered, as our application is now available with Linux X64.

You can download the Linux agent inside your platform under the Downloads tab, or you can download it in the Downloading the Applications page in our knowledge base. Additionally, if you would like to manually configure for your Linux agent we provide a step by step process here.  

24/7 Phone and Chat Support

As a company that strives for exceptional customer support, we are continuously updating our knowledge base with different articles to help our customers solve any issues they encounter on their own steam.

Now we are excited to share that our customer support services have expanded with 24/7 chat support and phone support. Unlike other Cloud VPN or Business VPN providers, our chat and phone support teams will be able to answer issues or requests you might have in real time. 

New Pricing Packages

As the Perimeter 81 solution evolves with new security features, so does the flexibility and accessibility of our application. We are thrilled to announce that we’ve launched our new Perimeter 81 subscription plans and billing system on the platform and on our website. 

Our new plans will allow users to get the services and features that they actually need while utilizing our new robust billing system. The new billing system is an improved self-service experience that allows users to easily change subscription plans with a click of their mouse. 

Stay Tuned

We’d love to hear your feedback going into the busy spring months and stay tuned for more product updates in the upcoming months. We are planning to launch our new unified network and security platform with more network and security features in the upcoming year.

Read More
Product Updates
December 2019 Product Updates: Automatic WI-Fi, WireGuard and More
Reading Time: 3 minutes

Over time, we have learned that we develop products, not for our solution, but for you, the customer, to help resolve your network access problems. But just resolving a customer’s problem is not enough – the product should also be intuitive and user-friendly. 

It’s clear that the best people to provide feedback about the ease of use of our platform are our customers. We listened to your feedback and requests and recently have made some significant updates across the Perimeter 81 platform that will help your employees achieve easy and secure network access. 

Below, we’ve outlined the highlights of our latest product updates over the past 6 months to our Network as a Service solution.

Automatic Wi-Fi Security Feature

As the number of public Wi-Fi hotspots worldwide is projected to reach 432 million by 2020, Wi-Fi continues to pose serious risks to businesses of all sizes. Due to the lack of encryption and open passwords, open networks can be hacked in a matter of seconds. Wi-Fi hotspots are everywhere – cafes, airports, hotels, smart cities, but only one out of every three people know how to identify unsecured networks. Simply, it’s no surprise that one out of every five people and three out of ten organizations fall prey to cybercrime while on-the-go.

Due to this, we have integrated our patented Automatic Wi-FI technology  (Patent number: 10440762) which automatically secures your Wi-Fi connection no matter where you are working from. Our Automatic Wi-Fi security feature activates an instantaneous connection if an employee’s device connects to unsecured Wi-Fi, and establishes a private and secure connection. This security feature will be a key addition to our upcoming bundle of new security capabilities. 

Automatic Wi-Fi Security is enabled by default. Each user can adjust this configuration locally in their account when signed into the client application on their device.

WireGuard Connector 

Customers often ask how we are improving the performance and the speed of our solution. Now your questions are answered by our latest integration of the WireGuard® connector into the Perimeter 81 platform.

WireGuard connector is a free and open-source software application and communication protocol that implements virtual private network (VPN) techniques to create secure point-to-point connections in routed or bridged configurations. It aims to be faster, simpler, leaner, and more useful than IPsec while avoiding the challenges that comes with an IPSec VPN. Compared to OpenVPN, Wireguard connectors have outperformed when it comes to quicker performance and simplified implementation, enabling all our solutions including our Business VPN and Cloud VPN to go to the next level. 

While it was initially released for the Linux kernel, it is now available and deployable on all major platforms (Windows, macOS, BSD, iOS, Android). By implementing WireGuard Connector in our platform, users will experience a faster performance within their Perimeter 81 application, making it an amazing OpenVPN replacement.

Always-on VPN

In the summer days of July, we added a new configuration feature into the Perimeter 81 applications, Always-On VPN. This simple new feature establishes an automatic VPN connection any time an authorized client has an active internet connection. 

We recommend that all administrators enable the Always-On VPN technology feature in the configuration settings for all client applications. No matter which team member is using the application, they will always be connected to a secure network while working.  

New Gateway Locations

As the Perimeter solution advances with new security features, so does the amount of public and private gateway locations. We are now offering you over 36 global public gateway locations within in the Perimeter 81 platform.

While we always recommend all users to create private networks for their teams, we kindly remind you have the option to use the public gateway inside the platform.

That’s a Wrap

2019 was filled with different product updates and our latest partnership with SonicWall. This has capped off a huge 12 months at Perimeter 81. We’d love to hear your feedback going into the holidays and stay tuned for more product updates in 2020 as we are planning to launch our new unified network and security platform with more network and security features

Read More
Zero Trust Application Access Solution
Perimeter 81 Launches New Zero Trust Application Access Solution
Reading Time: 2 minutes

We’re excited to announce that we have officially launched our new solution: Zero Trust Application Access. This new solution will allow our customers to provide their workforce with secured, Zero Trust access to popular web applications —  without an agent. 

Our new Zero Trust Application Access solution seamlessly employs multiple security layers of user trust and device trust policy validation. With the Zero Trust Application Access solution, employees are validated and granted quick access to applications in a session that will be fully audited and can be recorded and monitored.

Zero Trust Application Access allows you to easily manage application access by creating customized policies with a more granular authentication approach. By applying user identification rules, you can seamlessly and continuously protect your organization’s applications. The identification access rules can be based on network, device, location, work schedule and connection time.

Secure Application Access

Our new Zero Trust Application Access solution is designed to meet the demands of today’s ever-expanding modern network and ensure fully secured, isolated and agentless access to an organization’s critical web applications.

With Zero Trust Application Access you’ll now have: 

  • Fully Audited Access: Secure application-level access by fully auditing, recording and monitoring each session.  
  • Application Deployment Access: Based on customized protocols, organizations can deploy four types of applications: secure shell (SSH), remote desktop (RDP), virtual network computing (VNC) and Telnet.
  • Identification Policy Rules: User identification rules seamlessly and continuously protect your organization’s applications.
  • Advanced Threat Protection: Comprehensive protection against both known and unknown threats, including threats on mobile devices.

Zero Trust Access Principles 

Conventional security models assume everything “on the inside” can be trusted, which is why these legacy technologies are, for the most part, no longer effective. Our new service secures the network, employees, and applications by applying Zero Trust guidelines that isolate applications from the network at all times. 

With unparalleled visibility, control, and threat protection, our Zero Trust Application Access provides a completely transparent experience for all users without needing to modify existing networks.

By implementing Perimeter 81’s Zero Trust Application Access, our customers can experience several technical and business advantages, including:

  • Mitigating Data Loss: Dramatically enhance your security posture and mitigate data loss via visibility, safe enablement of applications and threat prevention.
  • Increasing Efficiency: Simplify compliance with highly effective trust boundaries by segmenting sensitive resources into many small perimeters that are secured based on user permissions.
  • Enabling Mobility and Virtualization: Increase the ability to accommodate transformative IT initiatives such as cloud computing, infrastructure virtualization, user mobility, social networking and more. 
  • Reducing TCO: Reduce total cost of ownership (TCO) for IT security by replacing disconnected point products with a single, consolidated security platform. 
  • Increased Visibility: With audited access to cloud environments, applications and local services, Perimeter  81’s Zero Trust Application Access increases security, monitoring and visibility while reducing help-desk support.
  • Increased Security: By encrypting all data and filtering unwanted traffic, organizations can prevent sophisticated cyber threats from penetrating perimeter defenses. 

Perimeter 81 Zero Trust Application Access complements our Zero Trust Network Access solution, which ensures simple secure access to any cloud environment or LAN. With Zero Trust Secure Application Access and Zero Trust Network Access, Perimeter 81 is now among the first Networks as a Service to deliver a complete Zero Trust network security platform for both managed and unmanaged devices as a cloud service.

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected].

If you don’t currently have an account and would like to experience a full tour of our platform, be sure to request a complimentary demo.

Read More
MSP Multi-Tenant Platform
Introducing the Multi-Tenant MSP Platform
Reading Time: 2 minutes

With our multi-tenant MSP management platform, we’ve added even more capabilities so that our partners can easily manage multiple organizations and networks all in one place. With these new features, MSPs can use the new multi-tenant management platform to easily switch between multiple organizations and implement network changes almost instantly.

Greater Recognition and Success for MSPsc

Perimeter 81’s hardware-free infrastructure, multi-tenant management platform and single-click client applications grant Managed Service Providers and their clients the benefits of hassle-free, highly scalable and cost-effective network security.

By providing partners with ready-to-use tools and resources, we hope to aid MSPs in promoting their market success. “We at Perimeter 81 are proud to offer even more tools and comprehensive resources to our valued partners,” remarked Amit Bareket, CEO and Co-Founder of Perimeter 81. “With our MSP multi-tenant platform, our partners can easily manage clients and resellers separately while effortlessly switching between accounts. This reduces much of the headache that outdated hardware-based legacy VPNs have created for them.”

The MSP Multi-Tenant Management Platform

In addition to our partner portal where you can amplify your digital marketing efforts with a resource-rich and free-to-use CRM service, the multi-tenant management platform enables MSPs to:

  • Manage customers, resellers, multiple organizations, team members and networks all in one place
  • Easily manage billing and view customer license activities
  • Gain network visibility and intelligence for clients
  • Benefit from consolidated auditing and reporting

MSP Platform - Perimter 81

In the overview section, you can see each of the organizations you manage, including clients and resellers. Here, you can simply select the organization you’d like and quickly manage their networks, servers and licenses. For each organization, you can easily invite team members, connect identity providers, enable two-factor authentication and more.

Perimeter 81: A Secure Network Access Solution

Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based.

As a Perimeter 81 partner, you can offer your clients:

  • Automatic Wi-Fi Security: Our signature patent-pending Automatic Wi-Fi Security feature immediately protects your traveling and remote employees from unsecured Wi-Fi hotspot threats.
  • Cross-Platform Applications: Easy-to-use cross-platform applications available for all your employees’ corporate and BYOD devices. 
  • Dedicated IP Addresses: Private servers with dedicated IP addresses so you can skip manual IP whitelisting and lock down secure resources to protected IPs.
  • Single Sign-On Integration: Enforce secure policy-based access with identity provider integration, including G Suite/ Google Cloud, Okta, Microsoft Azure AD and Active Directory/LDAP.
  • Two-Factor Authentication: Add an extra layer of security and prevent remote attacks with SMS notifications and Google Authenticator.
  • Advanced Activity Monitoring: Gain even more insight into your network’s health, activity and security with increased activity visibility including group and server creation, team member authentications, password changes and more.

Feel free to let us know if you have any questions, follow us on social media or follow the link below to learn more about partnering with us.

[button style=”btn-default btn-lg” type=”link” target=”true” title=”Partner With Us” link=”” linkrel=””]

Read More