AWS_Marketplace
Perimeter 81 Is Now Available on the AWS Marketplace
Reading Time: 2 minutes

Securing your network access just got easier. Today, we’re pleased to announce that our Zero Trust Network as a Service is now available on the AWS marketplace. Now you can subscribe to Perimeter 81 directly through AWS Marketplace and manage your organization’s subscription through AWS. You can see our listing and subscribe here.

About the AWS Marketplace

The AWS Marketplace is an online store that helps customers discover, purchase, migrate and immediately start using the software and services they need to build products and run their businesses.

A major benefit of the AWS Marketplace is that it is easy to integrate products in your AWS infrastructure. SaaS subscriptions allow AWS customers to not only have a single place to select AWS third party integrated solutions but also to be billed through their AWS account.

AWS Marketplace SaaS subscriptions simplify the process of improving your AWS infrastructure. Thus, allowing you to consolidate the billing of the SaaS products you integrate with your AWS Infrastructure. Now, Perimeter 81 is one of those products.

Benefits of Perimeter 81 with AWS

With our ongoing relationship with AWS as an Advanced Technology Partners and the opportunity to offer Perimeter 81 in the AWS Marketplace, AWS users now have the ability to simply secure their cloud, network, and application access. By utilizing the zero-trust and Software-Defined Perimeter models, Perimeter 81 ensures secure, policy-based access to AWS resources with a cloud-based network hub.

With Perimeter 81’s unified management platform, IT security & DevOps professionals can easily allow AWS users to connect into AWS VPCs and segment team member access based on group policies. Perimeter 81 integrates with Identity Providers, including Okta, GSuite, Microsoft Azure AD, and Active Directory/LDAP. Additionally, we offer a built-in two-factor authentication through SMS/push notification, Google Authenticator and Duo Security.

For interconnectivity with your AWS environment or any other cloud or on-premise environments, Perimeter 81 admins can choose to add a Perimeter 81 Connector to interconnect cloud environments, or an IPsec Site-to-Site Tunnel, to create a secure communication link between two different networks located at different sites.

Once private networks and gateways are deployed, team members – whether they are working in the office or on the go – can quickly and securely access AWS resources with single-click client software which is available for Windows, Mac, iOS and Android. Perimeter 81 admins can audit team activity and enjoy full network visibility with the platform’s Activity Log.

Getting Started with AWS 

Perimeter 81 offers AWS customers a secure usage of AWS services. That means customers must provide their own security through authentication and user access control in order to protect their Amazon cloud environment.  

We understand the impact of cloud migration, which is why we offer an easy-to-use, scalable cloud security solution that provides simple and cost-effective access control and monitoring for your entire security landscape.

If you’re just starting out with Perimeter 81 you can sign up through the AWS Marketplace and have the account connected from the get-go. If you’re already a Perimeter 81 user, you can subscribe through the Marketplace and it will direct you to the login view, which will connect your AWS account once you insert your credentials.

To learn more about how you can secure your Amazon Web Services with Perimeter 81, visit our listing on AWS Marketplace.

Read More
Capitol One Breach
The Capital One Data Breach: How Crisis Could Have Been Averted
Reading Time: 3 minutes

One of the largest hacks in 2019 was made by a former Amazon employee who stole credit card data, including 80k bank account numbers and 140k Social Security numbers affecting millions of Americans and Canadians. Here’s how this crisis could have been averted.

The largest category of information which was accessed is related to consumers and small businesses who applied for credit cards between 2005 and early 2019, according to a statement from Capital One. 

The stolen information included names, addresses, postal codes, phone numbers, email addresses, dates of birth, and self-reported income, as well as other bits of important data that may be used by criminals to carry out fraud. 

Who Let the Data Out?

The cause of the breach was a cloud firewall configuration vulnerability, which Capital One said it has since fixed. The unauthorized access took place on March 22-23, 2019 when the attacker exploited a firewall misconfiguration which permitted commands to reach the impacted server. 

This exploit allowed a hacker to execute a series of commands on the bank’s servers. Once through the perimeter, the intruder commandeered the credentials for an administrator account, gaining access to Capital One’s data stored on their AWS servers. The file contained code for three commands:

The first command obtained security credentials from an administrator account that had access for web application firewalls. The second listed the number of buckets or folders of data in an Amazon Web Services (AWS) database. The final command by the hacker was to copy the data from the Capital One repository. After successfully exfiltrating the data from Capital One’s servers, the hacker posted the stolen data to GitHub for a brief while before dropping a dime on herself on Slack. Despite her use of tools aimed at keeping her anonymous, it created a digital trail for their potential arrest. 

Is Capital One to Blame? 

Data breaches on cloud storage services are occurring more often, primarily because more companies are using the cloud and attackers are seeing this as a fruitful platform. Despite the migration to cloud services, companies are still responsible for their own security even on the cloud. When implementing a cloud storage service there are many financial and logistic benefits but companies must not forget the importance of cloud storage security. 

There is no denying that cloud computing is the way of the future, but when financial institutions that house so much sensitive customer data approach the cloud, implementing the proper security measures is an absolute must. In the case of the Capital One breach, despite being cloud innovators, security wasn’t up to par.   

Capital One has been a major advocate in the banking world for cloud services. The company is migrating more of its applications and data to the cloud and plans to be done with its data centers by the end of 2020. Other financial institutes have been more cautious of implementing cloud services, largely for security reasons.

Cloud-hosting services such as AWS are very appealing to companies looking to cut costs as data centers carry a hefty price tag, often tens of millions of dollars. When it comes to data security, AWS, like most providers, the cloud storage model is the Shared Security Responsibility model. This assures certain layers of infrastructure and software security, but the customer is ultimately responsible for how data is used and accessed.

Clearly, there were mistakes with how Capital One was protecting this AWS bucket as it appears someone was able to access the data it contained pretty easily. The Capital One breach is proof that companies have a lot to learn when it comes to deploying security technology effectively and especially the importance of access to cloud storage must be defended and protected by adopting security strategies.

Stay on Top with Secure Network Access 

Many organizations still rely on outdated hardware-based VPN technology with a distributed management system and other complicated client applications. These systems are complex, costly, require extensive management, and most notably, they are not cloud-friendly.

Access to cloud storage must be defended and protected by adopting security strategies, like the Zero Trust security model, which enforces multiple layers of verification before granting resource access. Furthermore, this breach highlights the need to embrace cloud-compatible cybersecurity solutions. 

To prevent similar risks such as the Capital One breach, organizations should use Software-Defined Perimeter technology and the Zero Trust model to close their cloud environments and SaaS services so that they can only be accessed by authorized devices, users and locations.

The shift to the cloud is inevitable, so it is key that financial institutions also adopt cybersecurity services that are well designed to integrate with major cloud providers. Our solution is based on the Zero-Trust security model and allows direct access to cloud resources and applications while evaluating the user permissions and related metadata. With Perimeter 81, organizations can ensure that only authorized connections are being established while leaving their cloud environments completely hidden from attacks.

To learn more about Perimeter 81’s Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
press release image
Perimeter 81 Partners with SentinelOne to Deliver Fully Automated, Zero Trust Network Security and Endpoint Protection
Reading Time: 2 minutes

TEL AVIV, IsraelJuly 30, 2019 /PRNewswire/ — Perimeter 81, a pioneer in Zero Trust software-defined network access, has partnered with SentinelOnethe autonomous endpoint protection company. The partnership will provide a wide range of businesses, from midsize companies to Fortune 500s, with unified network and endpoint security, ensuring more effective threat defense for the cloud and mobile-first world.

“We’re proud to have helped hundreds of clients ensure simplified, Zero Trust access to their on-premise and cloud environments with our Zero Trust Network as a Service. Now we would like to create an even greater impact,” said Amit Bareket co-founder and CEO of Perimeter 81. “By partnering with world-class cybersecurity vendors like SentinelOne, we look forward to extending the power of our offering in order to provide a comprehensive set of secure network capabilities: Zero Trust Access, Web Security and Global Interconnectivity. The combination of endpoint security and compliance enabled by this partnership is a crucial part of ensuring holistic protection for the Secure Network as a Service.”

“Perimeter 81 helps organizations adopt a Zero Trust architecture, and the combination of our solutions delivers tremendous efficacy in securing the modern enterprise,” said Daniel Bernard, CMO, SentinelOne. “With SentinelOne’s ability to protect every device across the evolving enterprise network, from standard desktop and laptop to IoT, customers can trust the endpoint security of Zero Trust models.”

The rapid rise of Cloud and Mobility has created a mega-shift in the cybersecurity landscape. By 2020, IDC (International Data Corporation) research has indicated that mobile workers will make up nearly 75% of the US workforce1, and worldwide spending on public cloud computing is expected to reach 162 billion USD2. The sheer number of widely distributed network endpoints and the shift from the static, HQ-centered network to the dispersed, user-centric network, pose new and evolving security challenges for today’s organizations, leaving the traditional, 30-year-old network security appliances obsolete.

Perimeter 81’s award-winning Zero Trust Network as a Service is among the first solutions to provide fully customized and automated secure network infrastructure deployment in one holistic platform. The service seamlessly applies adaptive policies based on device, identity and location, so that only authorized users are granted access to critical corporate resources. The integration with SentinelOne’s next-gen solution, which autonomously defends every endpoint against every type of attack at every stage in the threat lifecycle, ensures that endpoints are fully compliant and protected before they join Perimeter 81’s secure cloud-based network.

To see Perimeter 81 and SentinelOne’s joint collaboration in action, visit the SentinelOne Black Hat Booth (#222, BMR 716) at 12:00 PM on Wednesday, August 7, 2019 or 3:00 PM on Thursday, August 8, 2019 for a live demo and interactive presentation.

About SentinelOne

SentinelOne delivers autonomous endpoint protection through a single agent that successfully prevents, detects, responds, and hunts attacks across all major vectors. Designed for extreme ease of use, the S1 platform saves customers time by applying AI to automatically eliminate threats in real-time for both on-premise and cloud environments and is the only solution to provide full visibility from edge to cloud across the network.

About Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

Read More
press release image
Perimeter 81 Amplifies Its Global Reach with Ingram Micro Cloud Distribution Agreement
Reading Time: 3 minutes

TEL AVIV, IsraelJuly 23, 2019 /PRNewswire/ — Perimeter 81, a leading provider of software-defined network security solutions, today announced a distribution agreement with Ingram Micro, Inc. to offer its cutting-edge Zero Trust Network as a Service to resellers through the Ingram Micro Cloud Marketplace.

A finalist from Ingram Micro’s Comet Competition in 2018, Perimeter 81 was recently recognized as a Gartner Cool Vendor for “Cyber-Physical Systems and Network Security” and selected by Frost & Sullivan as a Best Practices Award Winner for Software-Defined Access Technology Leadership. Perimeter 81’s Zero Trust Network as a Service is among the first to provide fully customized and automated secure network infrastructure deployment in one holistic platform. The B2B SaaS solution transcends the complex and hardware-based legacy network appliances of the past by seamlessly ensuring secure employee access to critical corporate resources — whether these resources are located on-premises or in the cloud.

“With the rapid rise of telecommuting, personal work devices, and cloud-based services, Perimeter 81’s simplified, software-defined and user-centric approach to network security is a must for today’s modern workforce,” said Sagi Gidali, co-founder and CPO of Perimeter 81. “We want to help as many businesses as possible more easily and efficiently secure their ever-expanding corporate networks and we’re confident that with Ingram Micro’s unparalleled reach and vast expertise in cloud-delivered services, we will greatly advance our efforts to achieve this goal.”

Ingram Micro delivers a full spectrum of global technology and supply chain services to businesses around the world. The Ingram Micro Cloud Marketplace is an ecosystem of buyers, sellers, and solutions that enables channel partners and professionals to purchase, provision, manage and invoice with efficiency, confidence and ease. It removes the complexity in procurement, management and support that is too often inherent in cloud technologies, and enables partners to manage the complete end-customer subscription lifecycle from a single, automated platform that is provided and supported by Ingram Micro.

“Our customers are eager to adopt more manageable and cloud-compatible software security solutions and Perimeter 81 meets this growing demand,” said Michael Kenney, Vice President of Strategy and Corporate Development. “We are excited to broaden the portfolio of cloud services by adding Perimeter 81 to our Cloud Marketplace, which is now being used by more than 55,000 technology partners around the world to manage nearly four million fully-automated seats.”

Some of the highlights of Perimeter 81’s distribution agreement with Ingram Micro include:

  • Resellers can now be at the forefront of a critical cybersecurity market transformation powered by software-defined Security as a Service solutions.
  • For the first time, network managers can leverage a single, multi-tenant platform to build, manage and secure their critical network infrastructures.
  • Through access to Perimeter 81’s Zero Trust Network as a Service, organizations can more easily ensure their valuable on-premises resources, cloud environments and business applications remain fully secured.
  • IT departments can dramatically reduce overhead costs by eliminating the expensive hardware and manual configurations required by legacy solutions.

About Ingram Micro

Ingram Micro helps businesses realize the promise of technology. It delivers a full spectrum of global technology and supply chain services to businesses around the world. Deep expertise in technology solutions, mobility, cloud, and supply chain solutions enables its business partners to operate efficiently and successfully in the markets they serve. Unrivaled agility, deep market insights and the trust and dependability that come from decades of proven relationships, set Ingram Micro apart and ahead. Discover how Ingram Micro can help you realize the promise of technology. More at www.ingrammicro.com.

About Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers. To learn more visit www.perimeter81.com.

Read More
press release image
Perimeter 81 Launches Zero Trust Application Access
Reading Time: 2 minutes

TEL AVIV, IsraelJuly 16, 2019 /PRNewswire/ — Perimeter 81, the leading Zero Trust Secure Network as a Service provider, announced today that it has officially unveiled its new cornerstone solution: Zero Trust Application Access. The service is designed to meet the demands of today’s ever-expanding modern network and ensure fully secured, isolated and agentless access to an organization’s critical web applications, secure shell (SSH), remote desktop (RDP), virtual network computing (VNC) and Telnet in an emulated, streamlined and seamless way, regardless of where employees connect.

Zero Trust Application Access employs multiple layers of user trust and device trust policy validation to authorize employees before granting them swift access to applications in a session that is fully audited and can be recorded and monitored. The solution secures the network, employees, and applications using Zero Trust guidelines, and isolates the applications from the network at all times.

“The corporate network we see today is increasingly user-centric rather than site-centric, and with the proliferation of software services like web applications, IT security professionals are dealing with a rapidly increasing attack surface,” said Amit Bareket, Perimeter 81 co-founder and CEO. “Our Zero Trust Application Access solution simplifies the security measures required by these numerous and widely distributed web services with a unified, multi-tenant and holistic platform that provides full visibility, high availability and precise access control based on user and device trust.”

Perimeter 81’s Zero Trust Secure Application Access complements its Zero Trust Network Access solution, which ensures simple, segmented and secure access to any cloud environment or LAN, including all ports and all protocols, through a secure network layer and single-click, cross-platform applications. With Zero Trust Secure Application Access and Zero Trust Network Access, Perimeter 81 is now among the first Networks as a Service to deliver a complete Zero Trust network security platform for both managed and unmanaged devices as a cloud service.

Perimeter 81 plans to follow up today’s launch by adding further cybersecurity services like Web Security and Branch & Cloud Interconnectivity in order to deliver a fully holistic, unified and user-centric Network Security as a Service platform.

“Our ultimate aim is to build a customizable one-stop-shop for networking cybersecurity, in which one platform, one agent, and one cloud network are used to consume multiple cybersecurity solutions,” added Bareket. “The launch of Zero Trust Application Access is a key step in our efforts.”

About Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

Read More
Zero Trust Application Access Solution
Perimeter 81 Launches New Zero Trust Application Access Solution
Reading Time: 2 minutes

We’re excited to announce that we have officially launched our new solution: Zero Trust Application Access. This new solution will allow our customers to provide their workforce with secured, Zero Trust access to popular web applications —  without an agent. 

Our new Zero Trust Application Access solution seamlessly employs multiple security layers of user trust and device trust policy validation. With the Zero Trust Application Access solution, employees are validated and granted quick access to applications in a session that will be fully audited and can be recorded and monitored.

Zero Trust Application Access allows you to easily manage application access by creating customized policies with a more granular authentication approach. By applying user identification rules, you can seamlessly and continuously protect your organization’s applications. The identification access rules can be based on network, device, location, work schedule and connection time.

Secure Application Access

Our new Zero Trust Application Access solution is designed to meet the demands of today’s ever-expanding modern network and ensure fully secured, isolated and agentless access to an organization’s critical web applications.

With Zero Trust Application Access you’ll now have: 

  • Fully Audited Access: Secure application-level access by fully auditing, recording and monitoring each session.  
  • Application Deployment Access: Based on customized protocols, organizations can deploy four types of applications: secure shell (SSH), remote desktop (RDP), virtual network computing (VNC) and Telnet.
  • Identification Policy Rules: User identification rules seamlessly and continuously protect your organization’s applications.
  • Advanced Threat Protection: Comprehensive protection against both known and unknown threats, including threats on mobile devices.

Zero Trust Access Principles 

Conventional security models assume everything “on the inside” can be trusted, which is why these legacy technologies are, for the most part, no longer effective. Our new service secures the network, employees, and applications by applying Zero Trust guidelines that isolate applications from the network at all times. 

With unparalleled visibility, control, and threat protection, our Zero Trust Application Access provides a completely transparent experience for all users without needing to modify existing networks.

By implementing Perimeter 81’s Zero Trust Application Access, our customers can experience several technical and business advantages, including:

  • Mitigating Data Loss: Dramatically enhance your security posture and mitigate data loss via visibility, safe enablement of applications and threat prevention.
  • Increasing Efficiency: Simplify compliance with highly effective trust boundaries by segmenting sensitive resources into many small perimeters that are secured based on user permissions.
  • Enabling Mobility and Virtualization: Increase the ability to accommodate transformative IT initiatives such as cloud computing, infrastructure virtualization, user mobility, social networking and more. 
  • Reducing TCO: Reduce total cost of ownership (TCO) for IT security by replacing disconnected point products with a single, consolidated security platform. 
  • Increased Visibility: With audited access to cloud environments, applications and local services, Perimeter  81’s Zero Trust Application Access increases security, monitoring and visibility while reducing help-desk support.
  • Increased Security: By encrypting all data and filtering unwanted traffic, organizations can prevent sophisticated cyber threats from penetrating perimeter defenses. 

Perimeter 81 Zero Trust Application Access complements our Zero Trust Network Access solution, which ensures simple secure access to any cloud environment or LAN. With Zero Trust Secure Application Access and Zero Trust Network Access, Perimeter 81 is now among the first Networks as a Service to deliver a complete Zero Trust network security platform for both managed and unmanaged devices as a cloud service.

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected].

If you don’t currently have an account and would like to experience a full tour of our platform, be sure to request a complimentary demo.

Read More
5 Network Security Mistakes
5 Network Security Mistakes Your Employees are Still Making
Reading Time: 4 minutes

Network security breaches are frequently grabbing the headlines, often with the same angle of how big was the hack, who was affected and what information was taken. The majority of the time, the source of the hacks tend to be influenced by which actor or which technical error occurred. While these data breach stories grab readers attention, we need to rethink how these kinds of hacks really occur.

5 Network Security Mistakes Your Employees are Still Making

Today, companies are increasing their cybersecurity budget by implementing different security solutions to fight off hackers. This is good news as we are not just depending upon best practices. However, there is one security patch that can never be fully fixed the errors committed by the company’s employees.

Every organization is aware of the risk of human error. Employees occasionally commit mistakes, which can hurt the network of their company. However, not all organizations realize how dangerous human errors can be when it comes to the network security of the organization. 

So how do you help lead your employees past some of the common and painful network security mistakes?

Here are the 5 most common network security mistakes by your employees and how to fix them.

1. Using Weak Passwords

One of the most common network security threats is the usage of weak passwords. When passwords are not set using the correct procedures, they can be easily hacked by external actors which will allow them to infiltrate the company‘s network.

Passwords are considered one of the most common forms of security, and they can be highly effective when used properly to protect the privacy of data stored on servers across the network. The use of weak passwords can easily be resolved by educating employees about strong passwords and the part they play in keeping hackers away. For critical and sensitive business data, implementing a stronger password-protection system like periodic expiration of the password and multi-factor authentication can provide an additional layer of security against hackers.

2. Using a Traditional VPN

More and more companies have adopted remote workers and the migration of their critical applications to the cloud. Traditional VPN services are too tolerant, allowing staff to access their company’s network for their day-to-day work. As a result, these resources assume unwarranted visibility and become more receptive to compromise.

Instead of providing your employees with a traditional VPN, you should adopt an organization-wide Software-Defined Perimeter solution. Implementing a Software-Defined Perimeter will allow you to restrict network access and provide customized, manageable and secure access to networked systems. 

Traditional security models are designed to protect the perimeter to fight off threats that try to exploit your company’s network. By implementing the Zero Trust need-to-know model, each employee will gain a customized secure connection to their organization’s resources requiring access.

3. Using Unknown Devices

Employees tend to make the mistake of sharing external USB devices or using unauthorized devices which can be plugged-in any machine on the network. In addition, some employees make the potentially harmful mistake of plugging in unknown USB drives into their laptops that they find around the office.

These devices may contain a virus that could spread from one infected computer to another. Employees should refrain from using these kinds of devices that were not authorized by the administrators of their network. Organizations should set up company policies that prohibit employees from using their own devices which might have been controlled remotely by a hacker.

4. Using Free WiFi Hotspots for Work

Public Wi-Fi hotspots are convenient when abroad on vacation, at a cafe, and at the airport. Remote workers and employees who frequently travel for business often take advantage of public Wi-Fi to work on the go. However, connecting to public Wi-Fi for accessing your company’s network can prove risky to your employees as these networks are easy to hack. Hackers can easily gain access to the company’s confidential and sensitive data.

Hackers can also use public Wi-Fi hotspots to install malware on the mobile devices of those employees who have enabled file-sharing on their system. To fight off the hackers, organizations should advise employees to avoid using public Wi-Fi networks to connect to corporate resources without a secure network as a service solution.

5. Unauthorized Application Installation

Another common security threat by your employees is the installation of unauthorized applications on the company’s network. This can be a critical threat to a company because it just takes a few small installation steps for a small program to take control of the whole network.

This can easily be fixed by revoking administrative access for most employees. Another way to fix this type of threat is by training employees the importance of third-party credibility and authenticity. This can be enough to make employees aware of the threats posed by the installation of unauthorized applications.

Moving Forward 

The human factor is one of the main issues in ensuring the security of corporate systems. More and more often attackers choose to slip into the corporate network by attacking the employees, rather than hacking into the infrastructure directly from outside the perimeter.

To prevent attackers from getting inside your company’s infrastructure, your organization’s employees should be properly educated about security and the risks involved. By properly educating your employees with network security best practices, they will provide an additional layer of defense against hackers attempting to gain access to your network.

We hope you found this post helpful! Feel free to share any network security mistakes that you have witnessed in the comments section below. If you’d like to learn more about the many advantages a Zero Trust Network as a Service, check out our blog 5 Non-Disruptive Tips to Get Started with Zero Trust Network Security.

Read More
Welcome_Sivan_Tehila
We Are Excited to Welcome Sivan Tehila, Perimeter 81’s New Director of Solution Architecture
Reading Time: 1 minute

Sivan Tehila, Director of Solution Architecture at Perimeter 81, is a cybersecurity expert with over 13 years of experience in the industry. She served in the Israel Defense Forces as an Intelligence Officer and then in various field positions including CISO of the Research and Analysis Division and Head of the Information Security Department of the Intelligence Corps. Sivan was honorably discharged as a Captain.

Sivan Tehila blog post

After her military service, Sivan worked as an Information Security Officer and profiler at defense technology company RAFAEL and as a cybersecurity consultant for the Israel Railways. During the last two years, Sivan has dedicated herself to promoting women in Cybersecurity. As part of this initiative, she founded the Leading Cyber Ladies community in NYC and Cyber19w in Israel.

Sivan’s impressive record in cybersecurity, highly driven social impact and information security experience has prepared her to successfully lead Perimeter 81’s client architecture solutions and technological partnership development.  

Sivan is native to Israel but has recently relocated to NYC. Her hobbies include stand up paddle (SUP) surfing, her social life and spending her free time as a certified aerobics instructor.

“I believe Perimeter 81 is a smart solution for any organization looking for cyber defense protection in the category of SDP. In this age of digital transformation and cloud transition, I am proud to be part of a pioneering team and excited to create an impact in this great field.”

Read More
Perimeter 81 featured in Gartner Zero Trust Network Access Market Guide
Perimeter 81 Recognized in Gartner’s 2019 Market Guide for Zero Trust Network Access
Reading Time: 3 minutes

Perimeter 81, a secure network access solution for the modern and distributed workforce has been included in the 2019 Market Guide for Zero Trust Network Access by Gartner Inc., a leading IT research and advisory company.
Gartner Zero Trust Market Guide

At Perimeter 81, our Software-Defined Perimeter (SDP) service, backed by Zero Trust access control, ensures secure access to web applications, SSH, RDP, VNC or Telnet, through protected IPSec tunnels – without an agent.

Employees simply access their application portal, select the application they have permission to enter and create a session that is fully audited, recorded and monitored.

According to Gartner, “ZTNA, which is also known as a software-defined perimeter (SDP), creates an identity- and context-based, logical-access boundary around an application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a set of named entities. The broker verifies the identity, context and policy adherence of the specified participants before allowing access. This removes the application assets from public visibility and significantly reduces the surface area for attack.”

What Is the Market Guide for Zero Trust Network Access?

Each year, Gartner publishes the Market Guide for Zero Trust Network Access. This report states that “this research helps security and risk management leaders choose the best solutions for their use cases, including application-centric and demand-driven connections.”

According to Gartner, “Zero trust network access replaces traditional technologies, which require companies to extend excessive trust to employees and partners to connect and collaborate. Security and risk management leaders should plan pilot ZTNA projects for employee/partner-facing applications.”

The Perimeter 81 Secure Connection Product Offering

For Zero Trust network access, it’s essential that organizations obtain unparalleled visibility into enterprise computing activity. Our Zero Trust solution, managed through our central management platform, provides visibility, control, and threat protection with comprehensive coverage for all IT domains.  

Our  non-disruptive Zero Trust network security solution features:

  • Secure Network Access
    Network security, implemented via a client application for endpoints, allows for secure IPsec and SSL VPN connectivity for all employees, partners, customers and guests no matter where they’re connecting from (e.g., remotely, on the local network, or over the Internet).
  • Inspect and Log All Traffic
    Accurately monitor network activity by identifying and classifying all traffic, regardless of ports and protocols, encryption or hopping. This reiterates the need to “always verify” and eliminates methods that malware may use to hide from detection and provides complete context into applications, associated content and threats.
  • Least Privilege Access Control
    Many legacy solutions are limited to port and protocol-level classification, resulting in too much unfiltered traffic. With granular access control, users can safely access appropriate applications and data by reducing available pathways and eliminating unauthorized and malicious traffic from the network.
  • Advanced Threat Protection
    Legacy stateful inspection technology is incapable of enforcing a least-privileged policy because they only understand IP addresses, ports and protocols – not specific applications. Perimeter Zero protects against both known and unknown threats is necessary to support a closed-loop, highly integrated defense stature that consistently and cost-effectively enables trust boundaries.
  • High-Performance Design
    Zero Trust security and networking capabilities must be implemented in a way that they do not become a performance bottleneck. The Perimeter 81 software architecture minimizes latency and surpasses processing requirements, providing high availability, avoiding loss of service and increasing the uptime of your network. By deploying multiple server instances in locations closest to your business, data centers or remote employees, organizations can prevent slow-downs and reduce redundant loads on servers.

Penetrating a Growing Market

From our perspective, being recognized as a Representative Vendor in the 2019 Market Guide for Zero Trust Network Access from such a reputable resource validates our continuous effort in the enterprise cybersecurity market.

“With a least-privileged strategy and strictly enforced access control, organizations can control interactions with resources based on relevant attributes, including application access, user and group identity and the sensitivity of the data being accessed,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “With unmatched visibility and control of applications, users, and content, organizations can migrate to Perimeter 81’s Zero Trust network security flexibly and non-disruptively.”

Read more about our recent recognitions:

Gartner Hype Cycles
- Hype Cycle for Infrastructure Strategies, July 2018
- Hype Cycle for Cloud Security, July 2018
- Hype Cycle for Enterprise Networking and Communications, July 2018
Comet Competition Finalist
- Perimeter 81 was announced as one of 12 finalists
for the 2019 Comet Competition, held by Ingram Micro
Inc., in partnership with MassChallenge
Annual Cybersecurity Breakthrough Awards
- “Mobile VPN of the Year” - 2018 CyberSecurity Breakthrough Awards
Info Security Products Guide
- Silver Winner of Startup of the Year – Founded in 2018
- Bronze Winner of Cyber Security Vendor Achievement of the Year
Gartner Market Guide
- Gartner, Market Guide for Secure Enterprise Data Communications, April 2019
Gartner Cool Vendor
- Gartner, Cool Vendors in Network and Cyber-Physical Systems Security, April 2019

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Market Guide for Zero Trust Network Access, 2019, Steve Riley, Neil MacDonald, Lawrence Orans, 29 April 2019.    

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected] or drop us a line in the comments section below.

To learn more about Perimeter 81’s Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Perimeter 81 Receives Frost & Sullivan’s 2019 European Software-Defined Access Technology Leadership Award
Perimeter 81 Wins Frost & Sullivan’s 2019 Software-Defined Access Technology Leadership Award
Reading Time: 3 minutes

Leading Market Research and Consultancy Firm Identifies Perimeter 81 as the Industry’s Leading Solution for Software-Defined Access Technology.

We’re excited to announce that our secure network access solution for the modern and distributed workforce has received the prestigious 2019 Frost & Sullivan Software-Defined Access Technology Leadership Award.

Our Secure Network as a Service is simplifying the way employees connect to and interact with business data and resources. By utilizing the Software-Defined Perimeter architecture, backed by Zero Trust cloud, local network and application-level access, we’re securing user access, corporate communication, and the entire network.

About the Frost & Sullivan Technology Leadership Award

Frost & Sullivan is world-renowned for its role in identifying disruptive technologies and products that are driving future success. This award recognizes companies with technologically-innovative products that enable growth, innovation and leadership in their respective industry. By comparing key market participants and measuring performance, industry analysts provide extensive research to identify these top leaders in the technology market.

Our Software-Defined Access Solution

Our cloud-based cybersecurity solution is completely user-centric with the modern workforce in mind. By focusing on dynamic user environments, we’re solving the shortcomings of today’s outdated solutions with an easy-to-install and easy-to-manage solution that meets today’s demands.

Perimeter 81 Cloud Management Platform Frost & Sullivan Technology Leadership Award

Our Network as a Service replaces on-premise firewalls and hardware-based VPNs entirely. By providing seamless and secure access to cloud-based resources, servers and applications, Perimeter 81’s user access control becomes inherently simple for network administrators.

Using our single-click application, compatible with all major web browsers and mobile operating systems, employees can safely access confidential resources no matter where they’re connecting from. That means no more managing on-site hardware VPN servers.

We take secure access one step further with our Automatic Wi-Fi Security solution that routes user traffic via secure servers using advanced 256-bit level encryption protocols – without affecting connection speed or requiring any action from the user.

Centralized Network Management

Our service is more than just comprehensive security. We also provide complete network visibility and activity monitoring to ensure compliance, mitigate risks and to provide auditing capabilities and more.

Our multi-platform access control and centralized management platform allow network administrators to easily assign users to groups, automatically whitelist IP addresses and providing user-specific, Zero Trust application level access to resources.

“The benefits of a cloud-based Secure Network as a Service that utilizes the Software-Defined Perimeter and Zero-Trust security models, extends further than seamless and secure end-user access, by replacing a physical firewall at each location where a corporation does business, the operational responsibility for the firewall can be unified and considered at a single location staffed with a team dedicated solely to cybersecurity, instead of relying on employees at the endpoint.”

Frost & Sullivan, 2019 Best Practices, Software-Defined Access Technology Leadership Award

Our Service and Vision

Our long-term cloud strategy includes many additional services, including Zero Trust application-level access and a full cloud firewall.

“Perimeter 81 is working on utilizing its cloud structure for services including a secure web gateway, which protects against online threats by enforcing company security protocols, and network forensics, where logs of network traffic are analyzed for signs of instruction.”

Frost & Sullivan, 2019 Best Practices, Software-Defined Access Technology Leadership Award

As a fast-growing startup, we have found significant demand for our product in the midsize to the enterprise market. With proof-of-concept trials taking just under 14 minutes, we’re confident that our solution will continue to positively impact and contribute to substantial growth in the industry.

To learn more about the latest industry transformations and the significance of new, software-defined networking solutions, access and read the full report here.

If you’d like to receive a full tour of Perimeter 81’s award-winning Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Perimeter 81 Gartner Cool Vendor in Network Security
Perimeter 81 Named Gartner ‘Cool Vendor’ for Network and Cyber-Physical Systems Security
Reading Time: 3 minutes

Tel Aviv, April 24, 2019                                                                                                                                           

Perimeter 81, a leading Secure Network as a Service and zero-trust Software-Defined Perimeter (SDP) provider, announced today that it has been selected by Gartner as a “Cool Vendor in Network and Cyber-Physical Systems Security.”

Perimeter 81 is designed to simplify secure network, cloud and application access in the age of Cloud and Mobility.

“We are honored to be recognized by Gartner as a Cool Vendor, and feel this definitely affirms the value that our user-centric and cloud-friendly Secure Network as a Service brings to the market,” said Amit Bareket, co-founder and CEO of Perimeter 81. “We believe this is a major step in our work towards building a single, holistic cybersecurity platform that serves as a one-stop shop for multiple cybersecurity offerings. Ultimately, our vision is to provide one agent, one management platform and one Secure Network as Service for a unified cybersecurity experience.”

Perimeter 81 currently provides an SDP service, primarily addressing the virtual private network (VPN) replacement use case, but also plans to add additional cybersecurity services like software-defined networking in a wide area network (SD-WAN), secure Web gateway, and browser isolation capabilities, in order to deliver a complete cloud firewall solution.

The Gartner Cool Vendor report notes that “rapid changes to networks require new and adaptive approaches to securing them.” It recommends “security and risk management leaders should utilize adaptive security policies where required by different network traffic streams; in such cases, deploy SDP services that offer ‘secure network as a service’ capabilities.” (1)

Perimeter 81’s cloud-agnostic solution offers both customizable networking capabilities and advanced security features, and also ensures secure access at the network and application level. The software service can be rolled out quickly and provides automatic gateway deployment, easy multi-tenant management and full network visibility.

Since the launch of the product, Perimeter 81 has grown at a rapid, double-digit rate month over month and quickly acquired hundreds of clients — including Fortune 500 companies and some of the leading names in government, entertainment, technology, and AI. Additionally, Perimeter 81 has been named an Ingram Micro Mass Challenge Comet Finalist, an Info Security Products Guide Global Excellence “Cybersecurity Startup of the Year” and “Cybersecurity Vendor Achievement of the Year” winner, and a Cybersecurity Breakthrough Awards winner.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Cool Vendors in Network and Cyber-Physical Systems Security, Perkins, MacDonald, Thielemann and Brian Reed, 16 April 2019.

The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner customers may access the full report here.

About Perimeter 81

Perimeter 81 is a Secure Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

To learn more about Perimeter 81’s zero-trust Software-Defined Perimeter Service be sure to request a complimentary demo.

For additional media inquiries, please contact: [email protected]

Read More
Gartner 2019 Market Guide - Perimeter 81
Perimeter 81 Recognized in Gartner’s 2019 Market Guide for Secure Enterprise Data Communications
Reading Time: 2 minutes

Perimeter 81, a secure network access solution for the modern and distributed workforce has been included in the April 2019 Market Guide for Secure Enterprise Data Communications by Gartner Inc., a leading IT research and advisory company. The Market Guide includes 12 of more than 40 Secure Enterprise Data Communications providers from around the world.

At Perimeter 81, our Software-Defined Perimeter (SDP) service and comprehensive management platform ensure secure access to cloud networks, data centers, SaaS applications and the entire Internet – all while increasing network visibility through a simple, easy-to-use and cost-effective software solution.

What Is the Market Guide for Secure Enterprise Data Communications?

Each year, Gartner publishes the Market Guide for Secure Enterprise Data Communications. This report states that “this research helps security and risk management leaders choose the best solutions for their use cases, including application-centric and demand-driven connections.”

According to Gartner, “Secure enterprise data communications solutions are products and services used to achieve security and confidentiality for data in motion by means of encryption and access controls.” (1)

The Perimeter 81 Secure Connection Product Offering

For secure enterprise data communications, it’s important that organizations tighten infrastructure and support integration and interoperability in hybrid on-premises and cloud environments. This can be achieved through site-to-site and device-level network communications and endpoint security that reduces the exposure and vulnerability of the network and servers.

At Perimeter 81, we’re proud to confirm that we meet multiple categories of secure communications using just one platform:

  • Network Building Capabilities
  • Multi-Regional Support
  • Split Tunneling
  • Custom DNS
  • Sleek, User-Friendly UI
  • Single Sign-On Integration
  • Two-Factor Authentication
  • Advanced Activity Monitoring
  • Automatic Wi-Fi Security
  • Cross-Platform Compatibility
  • Private Servers

Global Recognition

Our inclusion in this report is the most recent global recognition of Perimeter 81. From our perspective, being recognized as a Representative Vendor in the 2019 Market Guide for Secure Enterprise Data Communications from such a reputable resource is an honor and certainly validates our unique product vision during our boundless journey into the enterprise market.

“We believe that being included in Gartner’s 2019 Market Guide for Secure Enterprise Data Communications recognizes the simplicity and innovation the Perimeter 81 service continues to provide,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “The Perimeter 81 team has worked tirelessly to deliver a secure, network as a service solution that collectively provides secure networking and data science technologies in a way that overcomes the limitations of traditional security solutions. We feel that to be recognized by Gartner is a tremendous validation for the work the Perimeter 81 team has accomplished.”

Read more about our recent recognitions:

Gartner Hype Cycles
- Hype Cycle for Infrastructure Strategies, July 2018
- Hype Cycle for Cloud Security, July 2018
- Hype Cycle for Enterprise Networking and Communications, July 2018
Comet Competition Finalist
- Perimeter 81 was announced as one of 12 finalists
for the 2019 Comet Competition, held by Ingram Micro
Inc., in partnership with MassChallenge
Annual Cybersecurity Breakthrough Awards
- “Mobile VPN of the Year” - 2018 CyberSecurity Breakthrough Awards
Info Security Products Guide
- Silver Winner of Startup of the Year – Founded in 2018
- Bronze Winner of Cyber Security Vendor Achievement of the Year
Gartner Market Guide
- Gartner, Market Guide for Secure Enterprise Data Communications, April 2019
Gartner Cool Vendor
- Gartner, Cool Vendors in Network and Cyber-Physical Systems Security, April 2019

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Market Guide for Secure Enterprise Data Communications, 2019, John Girard, Jeremy D’Hoinne, 11 April 2019.    

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected] or drop us a line in the comments section below.

If you don’t currently have an account and would like to experience a full tour of our platform, but sure to request a complimentary demo.

Read More