Top Tools for Remote Workers
Top 10 Tools for People with Remote Jobs
Reading Time: 4 minutes

The world of freelancing and hiring remote workers has transformed the way people work. With people constantly plugged in, self-managing time and projects, and traveling and connecting to unsecured networks, the resources and tools remote workers need are far-reaching. That’s why we’ve outlined just a few ways you can help a remote worker you know increase productivity with these top 10 gifts for people with remote jobs.

Productivity Tools

Time Doctor – Time Tracking and Management
Remote workers rely heavily on time tracking, productivity management tools, and other self-managing apps and services that help boost productivity. Time Doctor is a must-try time tracking tool that allows remote workers to account for every hard working minute and easily send invoices to clients. While this boosts tracking efforts by employees, this also allows employers and clients to monitor the money they are investing in projects as well. “By letting them start the habit of knowing how and where they spent their time (which Time Doctor’s analytics would show), productivity will increase by at least 20%.” – Carlo Borja, Head of Online Marketing at Time Doctor

Trello – Project Management Software
Trello is a popular project management and collaboration tool that allows users to organize tasks visually according to different boards and projects. “I’ve been a big fan of Trello for a long time because I can organize all my projects into one place. The color design is beautiful and being able to check in on several boards at once somehow makes my stress plummet. Furthermore, the recent Slack integration is excellent for remaining connected to the office and updating my boss on project milestones. For anyone working with multiple to-do lists, timelines, and goals, I highly recommend Trello. Plus, it’s only $10 a month!” Taylor Covington, Content Marketing Associate at The Zebra

Airtable – Task Management and Content Curating
While there are many task management tools out there, Airtable’s social media marketing and content tools make managing work and increasing productivity easy. “It helps me set content schedules, is great for content planning, and the social media calendar tool makes my clients feel confident in my social media management services.” – Mikaela Delia, Freelance Online Marketer at Miracle Marketing

Technology Tools

Portable Laptop Battery
Working remotely means you’re in constant need of a power supply. Unfortunately, knowing where you can plug in while traveling can become quite the hassle. With a new, high-speed laptop charger, remote workers can quickly recharge, making working on-the-go even easier. “Equipped with both USB-C Power Delivery and a hi-voltage laptop port, the V88 quickly & efficiently charges laptops (including MacBook, Surface, & USB Type C) on-the-go. FAA compliant and compact, it’s the perfect gift for travelers of all kinds.” – Julia Yavin, Director of Sales & Marketing at Voltaic Systems

Bluetooth Headphones
While Bluetooth headphones are convenient for many people, remote workers benefit drastically by going hands-free. Many remote workers often spend hours on their computers, dialed into conference calls, sharing screens and more. Each of these activities requires headphones and other audio hardware, making hands-free Bluetooth headphones an excellent idea for any remote worker. “My top resources for working remote: A good laptop and a good set of Bluetooth earphones – I love my MacBook and AirPods” – Debbie Winkelbauer, CEO of Surf Search

Wireless Chargers and Scanners
Wireless chargers and scanners have become increasingly convenient both in offices and for those with remote jobs. “Many [wireless chargers] are compatible with Apple products and can even charge an iPhone and Apple Watch at the same time. Some wireless chargers even work in the car, so you can easily charge your devices on the go,” says James Rice, Head of Digital Marketing at WikiJob. “When you are a remote worker, sometimes things that are easy within an office environment become tricky. A wireless scanning device can sign and scan contracts or digitize paperwork ready for uploading or emailing. This makes it easy to share signed or printed paperwork with colleagues all over the globe. Its compact size is also great for travel or for small home offices.”

Noise-Canceling Headphones
Often times, remote workers carry out their work in public spaces. This may be coffee shops, airports, or other public places. Noise-canceling headphones allow remote workers to tune out the distractions and get to work uninterrupted. “They allow you to work in co-working spaces and other noisy environments without interruptions. They are also very helpful if you work from home and have children around the house.” Rob Palmer, CEO of GoFreelance

Collaboration Tools

Toggl – Time Tracking Software
One of the toughest challenges of being a remote worker is collaborating with distributed teams. “Most of our engineers (we’re a Software Development Staffing company) are remote workers. We use Toggl for time tracking and notifying clients of how the time they are paying for is being spent.” – Julia Duran, CEO and Co-Founder of South Geeks LLC

Loom – Video Collaboration
“This is a free screen and video recording tool. It allows me to quickly send a video to my team and share my thoughts. It’s extremely easy to use and makes communication far more clear than email. Sometimes, when I want to show specific things to my team or give feedback, I quickly create a video using it. It saves a lot of time and has helped me become a lot more efficient.” – Sumit Bansal, Founder of Craft of Blogging

A Business VPN
Virtual Private Networks, VPNs, are not only useful for expats looking to bypass geo-restrictions, but they also offer powerful advantages for both consumers and businesses. Since remote workers often travel and connect to unsecured Wi-FI, it’s important that they utilize a VPN to quickly set up a private, secure connection to another remote network. That means they can safely access any of their clients’ private data without compromising the data or sensitive systems or triggering security alerts.

We hope you found this post helpful! Feel free to let us know if you have any questions and follow us on social media if you’d like to continue receiving all the latest business security news.

Read More
HIPPA Compliance - Perimeter 81
How a VPN Can Help with HIPAA Compliance
Reading Time: 3 minutes

HIPAA compliance affects healthcare organizations, insurance agents and more. In this recent podcast, we’ve outlined the easiest way to secure your data so that you can meet HIPAA compliance obligations easily and cost-effectively.

Public Wi-Fi is dangerous for both people and businesses, especially for those dealing with confidential and sensitive data. Due to a lack of encryption and open passwords, unsecured networks can be hacked in a matter of seconds.

We’ve already seen many significant healthcare data breaches this year. The HIPAA Journal reported that there were 29 breaches in May of 2018 alone with unauthorized access being the most numerous type of breach with an incident of 51 percent.

Introducing the Cloud VPN

With a Virtual Private Network (VPN), organizations can easily protect data transmission, secure data with strong encryption and meet other compliance requirements to secure electronic Protected Health Information (ePHI).

When you connect to a VPN, you create an encrypted tunnel that protects your data from hackers and third parties. This allows you to set up a completely private and secure connection to another network, enabling remote employees to securely access the network while they’re outside of the office.

Our service actually takes this one step further with Automatic Wi-Fi Security – a patent-pending feature that automatically activates military-grade encryption the moment an employee connects to an unsecured Wi-Fi network. This keeps all data being transferred over the network hidden from hackers – even if their mobile device is locked and inside their pocket.

How Does a VPN Supplement HIPAA Compliance?

Majority of ePHI breaches result from compromised mobile devices or networks that contain unencrypted data which can result in loss of trust, substantial fines, criminal charges, and even civil action lawsuits.

To secure confidential data, organizations can implement a VPN to encrypt all transmitted data over the network, securing protected health information both on-site and remotely. Cloud VPNs integrate seamlessly with major cloud providers and can ensure that sensitive data located in cloud environments are fuly protected and secured.

The Benefits of Using a Cloud VPN

  • Lockdown Confidential Data and Databases to a Specific IP Address

    When you deploy a private server, you essentially restrict access to certain resources using a specific IP address. This allows you to designate certain team members to have access to only that server or IP address, limiting data access and segmenting the network.

  • Nonstop Security with VPN Kill Switch

    A VPN kill switch ensures that if the VPN disconnects for any reason, the Internet connection is stopped and no data is transferred. That means that no data will ever be transmitted over the network without encryption so that no third party can see your data in plain text.  

  • Full Visibility with a Unified Management Platform

    Not all software based VPN services offer advanced visibility and management features. With our VPN service, you can easily invite team members, deploy private servers and view all network activity in one unified place.

  • Two-Factor Authentication and Identity Provider Integration

    Two-factor authorization is key to security because it prevents hackers from accessing your account even if they were to obtain your login credentials. By requiring an additional layer of security via SMS push notifications or Google Authenticator, user access can be easily maintained.

Achieve HIPAA Compliance with a Full-Service Security Solution

At Perimeter 81, we’re highly aware of data storage and logging privacy because it’s critically important in both the business and consumer spaces. Even before GDPR came into effect, we were ready to address these security issues for our customers.

Cloud-based VPN technology offers much-needed scalability, affordability and increased compatibility with cloud storage environments. We are GDPR compliant, SOC-2 compliant and ISO 27 001 compliant so that we can offer a highly effective solution for any organizations’ HIPAA compliance needs. 

If you’d like to learn more about using a VPN for HIPAA compliance, please don’t hesitate to request a demo at or contact our sales team at [email protected].

Read More
Amazon partner network
Perimeter 81 is an Advanced Technology Partner in the Amazon Web Services Partner Network
Reading Time: 2 minutes

Perimeter 81 receives Advanced AWS Technical Validation

Perimeter 81, a leading provider of Cloud VPN and Software Defined Perimeter technology, has been recognized as an Advanced Technology Partner in the Amazon Web Services (AWS) Partner Network (APN).

About APN Technology Partners

The APN is a global program, designed to help APN Partners build successful AWS-based businesses or solutions by providing business, technical, marketing, and go-to-market support.

This distinction recognizes that Perimeter 81 offers an advanced software solution that has demonstrated proven expertise, technical proficiency and directly integrates with the AWS platform.

Additionally, as an APN Partner, Perimeter 81’s solution is secure, compliant, follows the AWS Well-Architected Framework, and implements best practices for security, high availability, support, costs, and automation on AWS.

Why Work with an APN Partner?

APN Partners have proven, deep expertise on AWS – meaning they are fully capable of assisting you during your transition to the cloud. With full access to the business benefits AWS has to offer, APN partners are able to help customers succeed during their journey and help them reach their business objectives.

For Perimeter 81, this accomplishment benefits our current and future clients and partners by enhancing our ability to provide a next-generation secure network access solution to our customers using AWS.  

“We are proud to join the AWS Partner Network and are excited to have been upgraded as an AWS Advanced Technology Partner,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “We are committed to simplifying cloud security with an easy-to-use software solution available to businesses of all sizes and hope that this recognition will continue to push us forward in this quickly growing market.”

Perimeter 81 for AWS

Perimeter 81 offers Cloud VPN for AWS customers are responsible for secure usage of unmanaged AWS services. That means customers must provide their own security through authentication and user access control in order to protect their Amazon cloud environment.  

We understand the impact of cloud migration, which is why we’re offering an easy-to-use, scalable cloud security solution that provides simple and cost-effective access control and monitoring for your entire security landscape.

Perimeter 81’s advanced security features include:

About Perimeter 81

Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based. Please visit to learn more.

Attending AWS re:Invent? Schedule a meeting with our team and learn how to simplify secure access to your entire AWS network.

Read More
Public Wifi threats
Public Wi-Fi Risks and How You Can Easily Protect Your Clients from Them
Reading Time: 3 minutes

The number of public Wi-Fi networks is expected to grow to 432 million by 2020. As public Wi-Fi becomes more available, attacks on them will only increase. So what are the risks associated with using public Wi-Fi and how to avoid them?

Utilizing a VPN (Virtual Private Network) is one of the safest ways to keep data protected. In this webinar, we discuss how a cloud-based VPN can support the convenience of public Wi-Fi while adding extra security for business people to keep their data traffic encrypted and their company’s assets safe.

The Risks of Public Wi-Fi

As public Wi-Fi has become more and more available, attacks on public networks have only increased. Cisco’s Visual Network report revealed that the number of public Wi-Fi hotspots is expected to grow to 7 times the 2015 figure, from 64 million to 432 million by 2020.

Some risks associated with using public Wi-Fi include:

  • Insufficient Encryption
    Many Wi-Fi hotspots have absolutely no form of encryption, or they utilize the much weaker WEP protocol that is susceptible to cybersecurity breaches.
  • Poor Password Protection
    Many Wi-Fi hotspots have widely shared passwords, or even worse, absolutely no password protection. This provides incredibly easy access to cybercriminals who’d like to access the network and compromise your data.
  • Lack of Awareness
    Unfortunately, many people are not aware of the risks of public Wi-Fi and assume that since they had to log in, the network must be secure. In fact, only one in three people can actually tell the difference between secured and unsecured Wi-Fi networks.

The Most Common Public Wi-Fi Threats That You Should Be Aware Of

One in five people and three in ten senior business managers have been hit by cybercrime while on the go.

Here are a few examples of how these attacks happen:

  • Man-In-The-Middle Attack
    Using this method, hackers are able to intercept data transmission between two endpoints. Once they are in control of the connection, attackers have the ability to read and even alter data that is transferred back and forth.
  • Packet Sniffing
    Using readily available tools, hackers can capture packets of data passing through the network, allowing them to steal administrative passwords, sensitive login credentials and much more.
  • Evil Twin Attack
    With a seemingly legitimate network, hackers can trick employees into connecting to a rogue Wi-Fi hotspot. Once this happens, they have full access to all the information that a person transfers online.
  • Wi-Fi Pineapple
    For less than a hundred dollars a bad actor can use a small portable device called a Wi-Fi pineapple to generate spoof sites that allow them to eavesdrop on your private data.

How to Protect Yourself on Public Wi-Fi

With the rise of people working remotely and connecting to Wi-Fi hotspots with their mobile devices, businesses are struggling to protect their confidential information.

Here are a few measures you can take right now to start protecting your data: 

Browse Only over HTTPS Encrypted Sites

When you browse on a website you want to check for a green lock symbol at the start of the URL. This indicates that your traffic is being encrypted through SSL encryption technology and that the data transferred between your browser and the website is secured. However, this method is still vulnerable to SSL stripping.

Enable Two-Factor Authentication

Two-factor authentication (2FA) is a great way to prevent your accounts from being hacked. It ensures that, in addition to your username and password, a second layer of verification such as an SMS code is required. However, in the case of public Wi-Fi, this method only protects your account during the login process, so it isn’t enough to keep you safe online. 

Disable Auto Join to Wi-Fi Networks

Many Wi-Fi hotspots are unsecured. However, your phone automatically remembers previous networks you’ve connected to and will reconnect to them even if you don’t interact with your phone. Since it’s important to make sure that the network you’re connecting to is authorized, reliable and trustworthy, you should disable auto join on your device. 

With Perimeter 81

With Perimeter 81, you can set up a private secure connection to another network which enables you to browse through an encrypted tunnel

Perimeter 81’s secure network access solution offers an easy-to-use security tool with many technical advantages, including

  • It’s cost effective because you don’t have the expensive external hardware
  • It’s easy to set up and manage because it’s software-based and offers immediate updates and upgrades
  • It is highly scalable and offers seamless cloud integration
  • It provides multi-tenant support and clear MSP management

With a secure network access solution, you can rest assured knowing that your entire network is protected. We’ve received special approval from Apple for our breakthrough feature automatic Wi-Fi security. When activated, the minute a user connects to an unsecured Wi-Fi network, we automatically activate an encrypted VPN channel to ensure that all their data is protected.

We also utilize 256-bit AES bank-level encryption, secure tunneling protocols including OpenVPN, L2TP over IPSec, and Perfect Forward Secrecy (PFS) which rotates encryption keys every 60 minutes.

If you’d like to learn more about using a VPN for Wi-Fi Security, please don’t hesitate to request a demo at or contact our sales team at [email protected].

Read More
Webinar Increase Network Security
Webinar: How to Increase Network Security with a Few Clicks
Reading Time: 1 minute

The static, corporate network we once knew has completely transformed. More and more people are working from outside networks as they connect remotely or on-the-go, and company resources are no longer solely hosted in closed, on-premise environments, but have also expanded to the open Internet and cloud.

The IDC has projected that by 2020, 75% of the workforce will be comprised of mobile workers, and public cloud spending will have reached a whopping $162 billion dollars.

For years we’ve relied on the traditional hardware-based VPN to enable secure network access. Yet with fragmented architecture, complicated client applications, and a lack of seamless cloud integration, the traditional VPN is no longer a viable option for today’s modern workforce.

Luckily, there is a change on the horizon. This webinar outlines how the emergence of the Software-Defined Perimeter technology and Zero-Trust network architecture has the power to improve network security for companies across the board.

This webinar also reveals how Software-Defined Network Access solutions can effectively hide critical resources from unauthorized users and bad actors.

For more information, please visit or send an email to [email protected].

Read More
Cybersecurity breakthrough award
Perimeter 81 Honored in Annual CyberSecurity Breakthrough Awards Program
Reading Time: 2 minutes

Company Wins “Mobile VPN of the Year” Designation in 2018 CyberSecurity Breakthrough Awards

PITTSBURGH, Sept. 26, 2018 – Perimeter 81, a leading provider of Cloud VPN and Software Defined Perimeter technology, today announced that it has been named the winner of the “Mobile VPN Solution of the Year” award from CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies and products in the global information security market today.

“Today’s workforce is largely mobile and yet we are seeing many legacy privacy and security solutions currently implemented despite the fact that they were built for stationary office-centric workers,” said James Johnson, managing director, CyberSecurity Breakthrough. “Perimeter 81 is a true mobile VPN and Wi-Fi security solution that is built for today’s modern, mobile workforce, helping organizations proactively protect their mobile workforce, and we are pleased to recognize them as a 2018 CyberSecurity Breakthrough Award winner. Congratulations to the entire Perimeter 81 team on their well-deserved industry recognition.”

The mission of the CyberSecurity Breakthrough Awards is to honor excellence and recognize the innovation, hard work and success in a range of information security categories, including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Email Security and many more. This year’s program attracted more than 3,000 nominations from over 14 different countries throughout the world.

“The rise of Cloud and Mobility has disrupted the legacy security appliances market. Users are working from anywhere, anytime and mostly from their mobile devices.” Amit Bareket, CEO and Co-Founder of Perimeter 81. “We’re honored that CyberSecurity Breakthrough has chosen us as their Mobile VPN Solution of the Year.”

Perimeter 81’s consumer division, SaferVPN, was also awarded Consumer Encryption Solution of the Year for the CyberSecurity Breakthrough Awards.

About Perimeter 81

Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based. 

About CyberSecurity Breakthrough

Part of the Tech Breakthrough Awards organization, the CyberSecurity Breakthrough Awards program is devoted to honoring excellence in information security and cybersecurity technology companies, products and people. The CyberSecurity Breakthrough Awards provide a platform for public recognition around the achievements of breakthrough information security companies and products in categories including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Web and Email Security, UTM, Firewall and more. For more information visit

Read More
Perimeter 81 Cloud Platform Launch
Introducing Our New Cloud Management Platform
Reading Time: 2 minutes

Today we’ve reached a major milestone. After months and months of planning, development and design, we’ve officially launched our new, feature-rich cloud management platform.

The new platform not only features a sleeker, even friendlier user interface, it also includes several advanced security features to help you, our valued customers, easily and completely build, manage and secure your networks.

Since launching Perimeter 81 a few short months ago, we have quickly gained traction in the mid-market. We’re seeing so many businesses, across a wide variety of industries that are in need of simpler, more reliable network security. Our goal, since day one, has been to deliver a single-click service that will eliminate much of the hassle and headache you experienced in the past, and give you greater peace of mind in the future.

The features of the new platform include:

  • New, Sleek UI: With our new and improved UX and UI, compatible for web and mobile devices, it’s now easier than ever before to deploy, manage and secure your organization’s network.
  • Single Sign-On Integration: Now our customers can enforce secure policy-based access with total ease. Perimeter 81 offers integration with several leading Identity Providers including G Suite/ Google Cloud, Okta, Microsoft Azure AD and Active Directory/LDAP.
  • Two-Factor Authentication: Add an extra layer of security and prevent remote attacks with SMS notifications, Google Authenticator and Duo Security authentications. We know this feature will be highly valuable for all businesses, and particularly those that need to adhere to strict industry regulations, like HIPAA compliance standards.
  • Brand New Server Locations: For even higher availability and connection speed, we’ve added seven new, international locations where our customers can deploy private servers: Atlanta, Dallas, Miami and Seattle in the United States; Paris, France; Sydney, Australia and Tokyo, Japan.
  • Advanced Activity MonitoringWith the new platform, you can gain even more insight into your network’s health, activity and security. Our new platform includes a wide range of activity types including visibility into group and server creation, team member authentications, password changes and more.

Experience the full tour of our new platform here:

Along with the new additions, Perimeter 81 continues to provide:

  • Our signature Automatic Wi-Fi security feature to immediately protect your traveling employees from Wi-Fi hotspot threats
  • Easy-to-use cross-platform applications available for all your employees’ corporate and BYOD devices
  • Private servers with dedicated IPs so you can skip manual IP whitelisting and lock down secure resources to protected IPs.

And in the near future, we will be launching a multi-tenant platform for our channel partners so that our partners will have the ability to manage multiple organizations and networks all in one place, and enjoy consolidated billing, auditing and reporting.  

We’re so excited to hear what you think about the new platform, and thank you for all your valuable feedback so far. Together we’re reaching a new level of network and data security — for our businesses and our customers.

– Amit and Sagi

Read More
Perimeter 81 Launches New Partner Portal in Conjunction with Mindmatrix
Reading Time: 3 minutes

Tel Aviv, Israel – September 5, 2018

The Cloud VPN service and Sales Enablement Software Provider have teamed up to empower MSPs to sell a new brand of innovative, software-defined network access

Perimeter 81, a pioneering provider of Cloud VPN and Software Defined Perimeter technology, has officially launched its Channel Partner Portal in conjunction with Pittsburgh-based Mindmatrix, a leader in sales and channel enablement software solutions.

The new Partner Portal will promote Perimeter 81 partners’ sales and digital marketing efforts by providing them with a resource-rich and free-to-use CRM service.

“As a channel-forward service, we at Perimeter 81 are excited to offer this comprehensive resource to our valued partners,” remarked Amit Bareket, CEO and Co-Founder of Perimeter 81. “Many of our partners have expressed to us how our software-based VPN-as-a-service reduces so much of the headache outdated hardware-based legacy VPNs have created for them. Now we are proud to offer them even more tools to enable their market success.”

The unified management platform includes a wide variety of beneficial digital marketing and sales features. Highlights of the portal for partners include:

  • Co-Branded Marketing Assets
    Partners can co-brand and distribute valuable marketing materials to prospective clients.
  • Training Materials
    Partners can access a sales playbook with scripts, technical guides and presentations.
  • Lead Sharing
    Perimeter 81 partners can quickly receive contacts for relevant and interested leads.
  • Lead Generation
    Partners can create customized email campaigns to onboard current clients and nurture prospects.
  • Deal Registration
    Partners can easily track, register and get immediate priority for their deals.

“One of the key factors driving channel partner relationship success is helping channel partners sell and market better,” said Harbinder Khera, CEO and Founder of Mindmatrix. “Partners have too much going on already and will naturally pick vendors whose products and services are the easiest to sell. Providing partners with ready-to-use tools and resources that help them build their brand in the local market, will make all the difference. With its Partner Portal, Mindmatrix is helping Perimeter 81 accomplish that.”

Perimeter 81’s hardware-free infrastructure, multi-tenant management platform and single-click client applications grant Managed Service Providers and their clients the benefits of hassle-free, highly scalable and cost-effective network security. The Cloud VPN service’s new Partner Portal promises to offer its industry partners even greater recognition and success.


Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based.

To learn more about Perimeter 81’s cutting-edge secure network access service visit:


Mindmatrix offers Channel & Sales Enablement software for direct and indirect sales channels. Mindmatrix is the only provider of a Single Unified Platform that combines PRM software, Direct Sales and Channel Enablement, Channel Marketing software, Marketing Automation software and Marketing Asset Management. Mindmatrix takes you through every step in the sales process from lead to revenue, enabling your salespeople and channel partners to sell more, faster.

Perimeter 81 Co-founders: Sagi Gidali, CPO, and Amit Bareket, CEO

Perimeter 81 Channel Partner Portal

A glimpse of the new Perimeter 81 Partner Portal

Read More
Perimeter 81 Recognized in Gartner’s Hype Cycle for Infrastructure Strategies, 2018, Hype Cycle for Cloud Security, 2018, and Hype Cycle for Enterprise Networking and Communications, 2018
Perimeter 81 Recognized in Gartner’s Hype Cycle
Reading Time: 3 minutes

Perimeter 81, a secure network access solution for the modern and distributed workforce has been recognized as a Sample Vendor by Gartner Inc., a leading IT research and advisory company, in the Hype Cycle for Infrastructure Strategies, 2018, Hype Cycle for Cloud Security, 2018, and Hype Cycle for Enterprise Networking and Communications, 2018.

We feel that this recognition encourages the success we’ve had in developing the next generation of innovative network access products and Wi-Fi security solutions.

At Perimeter 81, we have eliminated the need for traditional legacy VPN technology which is hardware-based, costly and both difficult to install and manage. Instead, we offer a simple, easy-to-use and cost-effective software solution for companies of all sizes.

Our Software-Defined Perimeter (SDP) service provides greater network visibility, seamless onboarding and full integration with major cloud providers, giving companies of all industries and sizes the power to be truly mobile and enjoy complete confidence in the cloud.

In the Hype Cycle for Infrastructure Strategies, 2018 report Gartner analysts Neil MacDonald and Steve Riley describe software-defined perimeter (SDP) as “an intersection of software-defined security and software-defined networking concepts, targeting controlled access of resources to a defined community of entities, thus reducing the surface area for attack.”

They also wrote, “SDP has piqued the interest of organizations seeking an alternative to VPNs and more precise access and session control to applications located on-premises and in the cloud.” The technology “will appeal to organizations looking for innovative and secure ways to both connect and collaborate with their digital business ecosystem, remote workers and partners.”

In the Hype Cycle for Enterprise Networking and Communications, 2018, Neil Macdonald and Steve Riley write that there are several use cases that lend themselves to SDP:

  • Opening up applications and services to collaborative ecosystem applications, such as distribution channels, suppliers, contractors or retail outlets without requiring the use of a VPN or DMZ.
  • Cloaking systems on hostile networks, such as systems facing the public internet used for collaboration.
  • Carrying encryption all the way to the endpoints for scenarios where you don’t trust the carrier or cloud provider.
  • Application-specific access for IT contractors and remote or mobile employees as an alternative to VPN-based access.
  • Permitting users in potentially dangerous areas of the world to interact with applications and data in ways that reduce or eliminate risk prone to originate in those areas.
  • Secure enclaves of IoT devices if the device can support lightweight SDP agent or a virtual-appliance-based connector on the IoT network segment for connection.
  • Enabling SaaS to enterprise connectivity for workloads that require SaaS applications to interact with on-premises services.

What is the Hype Cycle?

Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. Gartner Hype Cycle methodology gives you a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals.

Additionally, we feel that the Hype Cycle for Enterprise Networking and Communications, 2018, allows I&O leaders to evolve their networks by evaluating new technologies that support digital business initiatives and new business models. However, we believe that Gartner’s Hype Cycle for Cloud Security, 2018 encompasses technologies and standards that improve the security, governance and reliability of private and public cloud computing.

Why We Feel This Recognition Is Important

As new solutions continue to rise, it’s important to have a reputable resource to gain insight on the most effective and successful solutions on the market. From our perspective, the Hype Cycle gives leaders this much-needed resource, allowing them to easily find successful infrastructure strategies, cloud security solutions and effective enterprise networking and communications applications.

We are honored to be recognized in this year’s Gartner Hype Cycle. You can access Gartner’s Hype Cycle for Infrastructure Strategies, 2018 report, Hype Cycle for Cloud Security, 2018 report, and Hype Cycle for Enterprise Networking and Communications, 2018 report on

We are a globally recognized secure network access provider that lives up to and beyond the hype.  If you’d like to learn more about our product, or our vision for SDP technology, don’t hesitate to reach out to us or comment below.


Gartner, Hype Cycle for Infrastructure Strategies, 2018, Philip Dawson, Nathan Hill, 17 July 2018.

Gartner, Hype Cycle for Cloud Security, 2018, Jay Heiser, 19 July 2018.

Gartner, Hype Cycle for Enterprise Networking and Communications, 2018, Danellie, Young, Mike Toussaint, 13 July 2018.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Read More
Perimeter 81 Partners with Takara Joho to Bring Simpler, Software-Defined Network Access to the Japanese SMB Market
Reading Time: 3 minutes


 Tel Aviv, Israel – August 13, 2018

Perimeter 81, a leading provider of Cloud VPN and Software Defined Perimeter technology, announced today that it has officially launched a partnership with Takara Joho, the premier IT reseller and MSP for SMBs in Japan.

The two parties have signed an agreement to introduce Perimeter 81’s innovative network-as-a-service technology to the Japanese market through Takara Joho’s multi-tier IT distribution and managed services.

“We are very committed to our growth and development in Japan and by working with an industry leader like Takara Joho, I am confident we can redefine secure network access for the Japanese mid-market,” said Amit Bareket, CEO and Co-Founder of Perimeter 81.

With its hardware-free infrastructure, multi-tenant management platform and single-click client applications, Perimeter 81 offers Managed Service Providers and their clients the benefits of hassle-free, highly scalable and cost-effective network security.

The software service is uniquely suited for the SMB and SME businesses, making it possible to automatically deploy secure policy-based access gateways in any location, on-premise or in the cloud, without the need for hardware installations and complex manual configuration.

“Perimeter 81’s solution for encrypting a company’s Internet traffic is now becoming a necessary infrastructure to secure Internet access. We intend to focus on selling Perimeter 81 as it aligns with our mission to protect SMBs in Japan from cyber attacks,” said Akihiko Hogyoku, President and CEO of Takara Joho. “As Japan will host the Rugby World Cup in 2019 and Tokyo Olympics in 2020, we have to be prepared for increasing cyber attacks and fake Wi-Fi hotspots. With Perimeter 81, Takara Joho will certainly contribute to cyber security in Japan.”


Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based.

To learn more about Perimeter 81’s cutting-edge secure network access service visit:


Takara Joho, established in 1995 and headquartered in Osaka, is a leading distributor in Japan, providing a wide range of security solutions from network security to endpoint, mobile and cloud security. The company deals with multiple resellers, integrators and service providers to deliver to the SMB market and mid-market across Japan. Takara Joho has been one of the top distributors of leading Israeli cyber security solutions in Japan, offering years of reliable technical support.

To learn more about Takara Joho’s leading distribution service:

For additional media inquiries, please contact: [email protected]

Perimeter 81 Co-founders: Sagi Gidali, CPO, and Amit Bareket, CEO.

Read More
ChannelNEXT: A “Mastermind” Experience for Channel Partners
Reading Time: 2 minutes

Dubbed the best business practice building conference, ChannelNEXT gathered service providers, agents, VARs and MSPs to share marketplace knowledge, drive conversation and help shape the industry.

“After a few years of transforming ChannelNEXT, I believe we finally got it right. We have transformed into a best business practice building conference with peer-to-peer collaboration at its core. It’s going to help build more channel champions!” Commented Julian Lee, President of TechnoPlanet, organizer of the ChannelNEXT event.

After a week-long experience of great people and wonderful food, our team had the opportunity to be a part of an exciting learning environment.

During our “Mastermind” peer-group sessions, we were able to share our goals, pain points and advice all while making connections and learning about new insights and solutions entering the market.

Presenting our Secure Network Access at ChannelNEXT

It’s become clear that the way we work has changed. Today, the workforce is overwhelmingly mobile, cloud-based and dependent on unsecured Wi-Fi which is why companies are in dire need of a cloud-enabled VPN.

The high demand for this increasingly popular technology has allowed us to develop new MSP relationships by offering a new source of recurring, consistent revenue streams, allowing them to deepen their customer relationships while saving them time and money.  

Here are a few of our highlights from the ChannelNEXT Conference in Niagara Falls:

Perimeter 81: Simplifying Secure Network Access

With the rise of the mobile workforce, cloud transformation and adoption of BYOD policies, fortifying secure network access is more important than ever before. But many MSPs still feel they have to turn to outdated, complex and costly legacy VPN solutions that offer limited management capabilities, are difficult to use, and do not integrate well with the cloud. In this workshop, we’ll show you how the rise of the Software-Defined Perimeter can help you achieve stronger security, more easily manage your clients’ networks, earn high recurring revenues and ensure your place at the forefront of the market.

Contact us if you’d like to learn more about software-defined-security technology and our innovative and disruptive SMB targeted product offering!

Read More