Login
Support
Platform
Platform
Global Backbone Network
Zero Trust Network Access
Secure Web Gateway
Firewall as a Service
Malware Protection
SASE
Software-Defined Perimeter
VPN Alternative
Features
SaaSPass
Monitoring Dashboard
Device Posture Check
Agentless ZTNA
Identity Management
Automatic Wi-Fi
Advanced Security
Web Filtering
See More
White Paper
How a ZTNA solution does what VPNs can’t
Download Now
Solutions
By Role
For IT Management
For DevOps
For CISOs
Small Business Owners
Marketers
By Industry
Technology & SaaS
Healthcare
Finance
Retail & ECommerce
Insurance Providers
Government & Education
Product Integrations
Amazon AWS
Microsoft Azure
Google Cloud
Heroku
Salesforce
Splunk
Secure Access
SDP vs VPN
Remote Access
Cloud VPN
DNS Filtering
Automatic Wi-Fi Security
Regulatory Compliance
Compliance Overview
ISO 27001 Compliance
HIPAA Compliance
Soc 2 Type 2 Compliance
GDPR
White Paper
ZTNA: The Ultimate Buyer’s Guide
Download Now
Customers
Resources
Support Center
Feature Overviews
White Papers
Videos
Webinars
Product Walkthrough
Glossary
Report
2023 Gartner Market Guide for Zero Trust Network Access
Get the Report
Company
About Us
Blog
Careers
Events
Awards
Press Center
Contact Us
Awards
It's always great to be recognized!
Partners
Partners
MSPs/MSSPs
VARs
Technology Alliances
Program & Resources
Become a Partner
Partners Portal
Partner Locator
Off-Site Training
Pricing
Login
Support
Request Demo
Start Now
All
Compliance
Cloud
Infographics
Network
News
Wi-Fi
Product
Zero Trust
Network
Network
Network
26.11.2023
SWG Gateway vs API Gateway: What’s the Difference?
Perimeter 81
5 min read
Network
26.11.2023
Secure Web Gateways (SWG) vs. CASB: Which One to Choose?
Perimeter 81
5 min read
Network
26.11.2023
Remote Access vs. Site-To-Site VPN: Which One Is Better?
Perimeter 81
6 min read
Network
26.11.2023
What is Point-to-Point Tunneling Protocol (PPTP)?
Perimeter 81
7 min read
Network
05.11.2023
What is Secure Socket Tunneling Protocol (SSTP)?
Perimeter 81
7 min read
Network
05.11.2023
Internet Key Exchange (IKE): What Is It and How Does It Work?
Perimeter 81
6 min read
Network
05.11.2023
What is the Layer 2 Tunneling Protocol (L2TP)?
Perimeter 81
6 min read
Network
30.10.2023
10 Best Site-To-Site VPN Protocols and When to Use Them
Perimeter 81
8 min read
Network
30.10.2023
Security Considerations for VPN (And Your Alternatives to It)
Perimeter 81
8 min read
Network
29.10.2023
8 Common VPN Authentication Protocols to Use + Best Practices
Perimeter 81
7 min read
Network
29.10.2023
What is CHAP (Challenge-Handshake Authentication Protocol)?
Perimeter 81
9 min read
Network
29.10.2023
Password Authentication Protocol: Why Choose It?
Perimeter 81
7 min read
Posts navigation
1
2
3
…
9
Close
Font Resize
A-
A+
Reset font size
Underline links
Highlight Links
Images Greyscale
Invert Colors
Clear
Close
Accessibility by WAH