Zero Trust Application Access Solution
Perimeter 81 Launches New Zero Trust Application Access Solution
Reading Time: 2 minutes

We’re excited to announce that we have officially launched our new solution: Zero Trust Application Access. This new solution will allow our customers to provide their workforce with secured, Zero Trust access to popular web applications —  without an agent. 

Our new Zero Trust Application Access solution seamlessly employs multiple security layers of user trust and device trust policy validation. With the Zero Trust Application Access solution, employees are validated and granted quick access to applications in a session that will be fully audited and can be recorded and monitored.

Zero Trust Application Access allows you to easily manage application access by creating customized policies with a more granular authentication approach. By applying user identification rules, you can seamlessly and continuously protect your organization’s applications. The identification access rules can be based on network, device, location, work schedule and connection time.

Secure Application Access

Our new Zero Trust Application Access solution is designed to meet the demands of today’s ever-expanding modern network and ensure fully secured, isolated and agentless access to an organization’s critical web applications.

With Zero Trust Application Access you’ll now have: 

  • Fully Audited Access: Secure application-level access by fully auditing, recording and monitoring each session.  
  • Application Deployment Access: Based on customized protocols, organizations can deploy four types of applications: secure shell (SSH), remote desktop (RDP), virtual network computing (VNC) and Telnet.
  • Identification Policy Rules: User identification rules seamlessly and continuously protect your organization’s applications.
  • Advanced Threat Protection: Comprehensive protection against both known and unknown threats, including threats on mobile devices.

Zero Trust Access Principles 

Conventional security models assume everything “on the inside” can be trusted, which is why these legacy technologies are, for the most part, no longer effective. Our new service secures the network, employees, and applications by applying Zero Trust guidelines that isolate applications from the network at all times. 

With unparalleled visibility, control, and threat protection, our Zero Trust Application Access provides a completely transparent experience for all users without needing to modify existing networks.

By implementing Perimeter 81’s Zero Trust Application Access, our customers can experience several technical and business advantages, including:

  • Mitigating Data Loss: Dramatically enhance your security posture and mitigate data loss via visibility, safe enablement of applications and threat prevention.
  • Increasing Efficiency: Simplify compliance with highly effective trust boundaries by segmenting sensitive resources into many small perimeters that are secured based on user permissions.
  • Enabling Mobility and Virtualization: Increase the ability to accommodate transformative IT initiatives such as cloud computing, infrastructure virtualization, user mobility, social networking and more. 
  • Reducing TCO: Reduce total cost of ownership (TCO) for IT security by replacing disconnected point products with a single, consolidated security platform. 
  • Increased Visibility: With audited access to cloud environments, applications and local services, Perimeter  81’s Zero Trust Application Access increases security, monitoring and visibility while reducing help-desk support.
  • Increased Security: By encrypting all data and filtering unwanted traffic, organizations can prevent sophisticated cyber threats from penetrating perimeter defenses. 

Perimeter 81 Zero Trust Application Access complements our Zero Trust Network Access solution, which ensures simple secure access to any cloud environment or LAN. With Zero Trust Secure Application Access and Zero Trust Network Access, Perimeter 81 is now among the first Networks as a Service to deliver a complete Zero Trust network security platform for both managed and unmanaged devices as a cloud service.

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected].

If you don’t currently have an account and would like to experience a full tour of our platform, be sure to request a complimentary demo.

Read More
5 Network Security Mistakes
5 Network Security Mistakes Your Employees are Still Making
Reading Time: 4 minutes

Network security breaches are frequently grabbing the headlines, often with the same angle of how big was the hack, who was affected and what information was taken. The majority of the time, the source of the hacks tend to be influenced by which actor or which technical error occurred. While these data breach stories grab readers attention, we need to rethink how these kinds of hacks really occur.

5 Network Security Mistakes Your Employees are Still Making

Today, companies are increasing their cybersecurity budget by implementing different security solutions to fight off hackers. This is good news as we are not just depending upon best practices. However, there is one security patch that can never be fully fixed the errors committed by the company’s employees.

Every organization is aware of the risk of human error. Employees occasionally commit mistakes, which can hurt the network of their company. However, not all organizations realize how dangerous human errors can be when it comes to the network security of the organization. 

So how do you help lead your employees past some of the common and painful network security mistakes?

Here are the 5 most common network security mistakes by your employees and how to fix them.

1. Using Weak Passwords

One of the most common network security threats is the usage of weak passwords. When passwords are not set using the correct procedures, they can be easily hacked by external actors which will allow them to infiltrate the company‘s network.

Passwords are considered one of the most common forms of security, and they can be highly effective when used properly to protect the privacy of data stored on servers across the network. The use of weak passwords can easily be resolved by educating employees about strong passwords and the part they play in keeping hackers away. For critical and sensitive business data, implementing a stronger password-protection system like periodic expiration of the password and multi-factor authentication can provide an additional layer of security against hackers.

2. Using a Traditional VPN

More and more companies have adopted remote workers and the migration of their critical applications to the cloud. Traditional VPN services are too tolerant, allowing staff to access their company’s network for their day-to-day work. As a result, these resources assume unwarranted visibility and become more receptive to compromise.

Instead of providing your employees with a traditional Business VPN or an OpenVPN replacement, you should adopt an organization-wide Software-Defined Perimeter solution. Implementing a Software-Defined Perimeter will allow you to restrict network access and provide customized, manageable and secure access to networked systems. 

Traditional security models are designed to protect the perimeter to fight off threats that try to exploit your company’s network. By implementing the Zero Trust need-to-know model, each employee will gain a customized secure connection to their organization’s resources requiring access.

3. Using Unknown Devices

Employees tend to make the mistake of sharing external USB devices or using unauthorized devices which can be plugged-in any machine on the network. In addition, some employees make the potentially harmful mistake of plugging in unknown USB drives into their laptops that they find around the office.

These devices may contain a virus that could spread from one infected computer to another. Employees should refrain from using these kinds of devices that were not authorized by the administrators of their network. Organizations should set up company policies that prohibit employees from using their own devices which might have been controlled remotely by a hacker.

4. Using Free WiFi Hotspots for Work

Public Wi-Fi hotspots are convenient when abroad on vacation, at a cafe, and at the airport. Remote workers and employees who frequently travel for business often take advantage of public Wi-Fi to work on the go. However, connecting to public Wi-Fi for accessing your company’s network can prove risky to your employees as these networks are easy to hack. Hackers can easily gain access to the company’s confidential and sensitive data.

Hackers can also use public Wi-Fi hotspots to install malware on the mobile devices of those employees who have enabled file-sharing on their system. To fight off the hackers, organizations should advise employees to avoid using public Wi-Fi networks to connect to corporate resources without a secure network as a service solution that incudes DNS Filtering.

5. Unauthorized Application Installation

Another common security threat by your employees is the installation of unauthorized applications on the company’s network. This can be a critical threat to a company because it just takes a few small installation steps for a small program to take control of the whole network.

This can easily be fixed by revoking administrative access for most employees. Another way to fix this type of threat is by training employees the importance of third-party credibility and authenticity. This can be enough to make employees aware of the threats posed by the installation of unauthorized applications.

Moving Forward 

The human factor is one of the main issues in ensuring the security of corporate systems. More and more often attackers choose to slip into the corporate network by attacking the employees, rather than hacking into the infrastructure directly from outside the perimeter.

To prevent attackers from getting inside your company’s infrastructure, your organization’s employees should be properly educated about security and the risks involved. By properly educating your employees with network security best practices, they will provide an additional layer of defense against hackers attempting to gain access to your network.

We hope you found this post helpful! Feel free to share any network security mistakes that you have witnessed in the comments section below. If you’d like to learn more about the many advantages a Zero Trust Network as a Service, check out our blog 5 Non-Disruptive Tips to Get Started with Zero Trust Network Security.

Read More
Welcome_Sivan_Tehila
We Are Excited to Welcome Sivan Tehila, Perimeter 81’s New Director of Solution Architecture
Reading Time: 1 minute

Sivan Tehila, Director of Solution Architecture at Perimeter 81, is a cybersecurity expert with over 13 years of experience in the industry. She served in the Israel Defense Forces as an Intelligence Officer and then in various field positions including CISO of the Research and Analysis Division and Head of the Information Security Department of the Intelligence Corps. Sivan was honorably discharged as a Captain.

Sivan Tehila blog post

After her military service, Sivan worked as an Information Security Officer and profiler at defense technology company RAFAEL and as a cybersecurity consultant for the Israel Railways. During the last two years, Sivan has dedicated herself to promoting women in Cybersecurity. As part of this initiative, she founded the Leading Cyber Ladies community in NYC and Cyber19w in Israel.

Sivan’s impressive record in cybersecurity, highly driven social impact and information security experience has prepared her to successfully lead Perimeter 81’s client architecture solutions and technological partnership development.  

Sivan is native to Israel but has recently relocated to NYC. Her hobbies include stand up paddle (SUP) surfing, her social life and spending her free time as a certified aerobics instructor.

“I believe Perimeter 81 is a smart solution for any organization looking for cyber defense protection in the category of SDP. In this age of digital transformation and cloud transition, I am proud to be part of a pioneering team and excited to create an impact in this great field.”

Read More
Perimeter 81 featured in Gartner Zero Trust Network Access Market Guide
Perimeter 81 Recognized in Gartner’s 2019 Market Guide for Zero Trust Network Access
Reading Time: 3 minutes

Perimeter 81, a secure network access solution for the modern and distributed workforce has been included in the 2019 Market Guide for Zero Trust Network Access by Gartner Inc., a leading IT research and advisory company.
Gartner Zero Trust Market Guide

At Perimeter 81, our Software-Defined Perimeter (SDP) service, backed by Zero Trust access control, ensures secure access to web applications, SSH, RDP, VNC or Telnet, through protected IPSec tunnels – without an agent.

Employees simply access their application portal, select the application they have permission to enter and create a session that is fully audited, recorded and monitored.

According to Gartner, “ZTNA, which is also known as a software-defined perimeter (SDP), creates an identity- and context-based, logical-access boundary around an application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a set of named entities. The broker verifies the identity, context and policy adherence of the specified participants before allowing access. This removes the application assets from public visibility and significantly reduces the surface area for attack.”

What Is the Market Guide for Zero Trust Network Access?

Each year, Gartner publishes the Market Guide for Zero Trust Network Access. This report states that “this research helps security and risk management leaders choose the best solutions for their use cases, including application-centric and demand-driven connections.”

According to Gartner, “Zero trust network access replaces traditional technologies, which require companies to extend excessive trust to employees and partners to connect and collaborate. Security and risk management leaders should plan pilot ZTNA projects for employee/partner-facing applications.”

The Perimeter 81 Secure Connection Product Offering

For Zero Trust network access, it’s essential that organizations obtain unparalleled visibility into enterprise computing activity. Our Zero Trust solution, managed through our central management platform, provides visibility, control, and threat protection with comprehensive coverage for all IT domains.  

Our  non-disruptive Zero Trust network security solution features:

  • Secure Network Access
    Network security, implemented via a client application for endpoints, allows for secure IPsec and SSL VPN connectivity for all employees, partners, customers and guests no matter where they’re connecting from (e.g., remotely, on the local network, or over the Internet).
  • Inspect and Log All Traffic
    Accurately monitor network activity by identifying and classifying all traffic, regardless of ports and protocols, encryption or hopping. This reiterates the need to “always verify” and eliminates methods that malware may use to hide from detection and provides complete context into applications, associated content and threats.
  • Least Privilege Access Control
    Many legacy solutions are limited to port and protocol-level classification, resulting in too much unfiltered traffic. With granular access control, users can safely access appropriate applications and data by reducing available pathways and eliminating unauthorized and malicious traffic from the network.
  • Advanced Threat Protection
    Legacy stateful inspection technology is incapable of enforcing a least-privileged policy because they only understand IP addresses, ports and protocols – not specific applications. Perimeter Zero protects against both known and unknown threats is necessary to support a closed-loop, highly integrated defense stature that consistently and cost-effectively enables trust boundaries.
  • High-Performance Design
    Zero Trust security and networking capabilities must be implemented in a way that they do not become a performance bottleneck. The Perimeter 81 software architecture minimizes latency and surpasses processing requirements, providing high availability, avoiding loss of service and increasing the uptime of your network. By deploying multiple server instances in locations closest to your business, data centers or remote employees, organizations can prevent slow-downs and reduce redundant loads on servers.

Penetrating a Growing Market

From our perspective, being recognized as a Representative Vendor in the 2019 Market Guide for Zero Trust Network Access from such a reputable resource validates our continuous effort in the enterprise cybersecurity market.

“With a least-privileged strategy and strictly enforced access control, organizations can control interactions with resources based on relevant attributes, including application access, user and group identity and the sensitivity of the data being accessed,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “With unmatched visibility and control of applications, users, and content, organizations can migrate to Perimeter 81’s Zero Trust network security flexibly and non-disruptively.”

Read more about our recent recognitions:

Gartner Hype Cycles
- Hype Cycle for Infrastructure Strategies, July 2018
- Hype Cycle for Cloud Security, July 2018
- Hype Cycle for Enterprise Networking and Communications, July 2018
Comet Competition Finalist
- Perimeter 81 was announced as one of 12 finalists
for the 2019 Comet Competition, held by Ingram Micro
Inc., in partnership with MassChallenge
Annual Cybersecurity Breakthrough Awards
- “Mobile VPN of the Year” - 2018 CyberSecurity Breakthrough Awards
Info Security Products Guide
- Silver Winner of Startup of the Year – Founded in 2018
- Bronze Winner of Cyber Security Vendor Achievement of the Year
Gartner Market Guide
- Gartner, Market Guide for Secure Enterprise Data Communications, April 2019
Gartner Cool Vendor
- Gartner, Cool Vendors in Network and Cyber-Physical Systems Security, April 2019

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Market Guide for Zero Trust Network Access, 2019, Steve Riley, Neil MacDonald, Lawrence Orans, 29 April 2019.    

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected] or drop us a line in the comments section below.

To learn more about Perimeter 81’s Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Perimeter 81 Receives Frost & Sullivan’s 2019 European Software-Defined Access Technology Leadership Award
Perimeter 81 Wins Frost & Sullivan’s 2019 Software-Defined Access Technology Leadership Award
Reading Time: 3 minutes

Leading Market Research and Consultancy Firm Identifies Perimeter 81 as the Industry’s Leading Solution for Software-Defined Access Technology.

We’re excited to announce that our secure network access solution for the modern and distributed workforce has received the prestigious 2019 Frost & Sullivan Software-Defined Access Technology Leadership Award.

Our Secure Network as a Service is simplifying the way employees connect to and interact with business data and resources. By utilizing the Software-Defined Perimeter architecture, backed by Zero Trust cloud, local network and application-level access, we’re securing user access, corporate communication, and the entire network.

About the Frost & Sullivan Technology Leadership Award

Frost & Sullivan is world-renowned for its role in identifying disruptive technologies and products that are driving future success. This award recognizes companies with technologically-innovative products that enable growth, innovation and leadership in their respective industry. By comparing key market participants and measuring performance, industry analysts provide extensive research to identify these top leaders in the technology market.

Our Software-Defined Access Solution

Our cloud-based cybersecurity solution is completely user-centric with the modern workforce in mind. By focusing on dynamic user environments, we’re solving the shortcomings of today’s outdated solutions with an easy-to-install and easy-to-manage solution that meets today’s demands.

Perimeter 81 Cloud Management Platform Frost & Sullivan Technology Leadership Award

Our Network as a Service replaces on-premise firewalls and hardware-based VPNs entirely. By providing seamless and secure access to cloud-based resources, servers and applications, Perimeter 81’s user access control becomes inherently simple for network administrators.

Using our single-click application, compatible with all major web browsers and mobile operating systems, employees can safely access confidential resources no matter where they’re connecting from. That means no more managing on-site hardware VPN servers.

We take secure access one step further with our Automatic Wi-Fi Security solution that routes user traffic via secure servers using advanced 256-bit level encryption protocols – without affecting connection speed or requiring any action from the user.

Centralized Network Management

Our service is more than just comprehensive security. We also provide complete network visibility and activity monitoring to ensure compliance, mitigate risks and to provide auditing capabilities and more.

Our multi-platform access control and centralized management platform allow network administrators to easily assign users to groups, automatically whitelist IP addresses and providing user-specific, Zero Trust application level access to resources.

“The benefits of a cloud-based Secure Network as a Service that utilizes the Software-Defined Perimeter and Zero-Trust security models, extends further than seamless and secure end-user access, by replacing a physical firewall at each location where a corporation does business, the operational responsibility for the firewall can be unified and considered at a single location staffed with a team dedicated solely to cybersecurity, instead of relying on employees at the endpoint.”

Frost & Sullivan, 2019 Best Practices, Software-Defined Access Technology Leadership Award

Our Service and Vision

Our long-term cloud strategy includes many additional services, including Zero Trust application-level access and a full cloud firewall.

“Perimeter 81 is working on utilizing its cloud structure for services including a secure web gateway, which protects against online threats by enforcing company security protocols, and network forensics, where logs of network traffic are analyzed for signs of instruction.”

Frost & Sullivan, 2019 Best Practices, Software-Defined Access Technology Leadership Award

As a fast-growing startup, we have found significant demand for our product in the midsize to the enterprise market. With proof-of-concept trials taking just under 14 minutes, we’re confident that our solution will continue to positively impact and contribute to substantial growth in the industry.

To learn more about the latest industry transformations and the significance of new, software-defined networking solutions, access and read the full report here.

If you’d like to receive a full tour of Perimeter 81’s award-winning Zero Trust Network as a Service be sure to request a complimentary demo.

Read More
Perimeter 81 Gartner Cool Vendor in Network Security
Perimeter 81 Named Gartner ‘Cool Vendor’ for Network and Cyber-Physical Systems Security
Reading Time: 3 minutes

Tel Aviv, April 24, 2019                                                                                                                                           

Perimeter 81, a leading Secure Network as a Service and zero-trust Software-Defined Perimeter (SDP) provider, announced today that it has been selected by Gartner as a “Cool Vendor in Network and Cyber-Physical Systems Security.”

Perimeter 81 is designed to simplify secure network, cloud and application access in the age of Cloud and Mobility.

“We are honored to be recognized by Gartner as a Cool Vendor, and feel this definitely affirms the value that our user-centric and cloud-friendly Secure Network as a Service brings to the market,” said Amit Bareket, co-founder and CEO of Perimeter 81. “We believe this is a major step in our work towards building a single, holistic cybersecurity platform that serves as a one-stop shop for multiple cybersecurity offerings. Ultimately, our vision is to provide one agent, one management platform and one Secure Network as Service for a unified cybersecurity experience.”

Perimeter 81 currently provides an SDP service, primarily addressing the virtual private network (VPN) replacement use case, but also plans to add additional cybersecurity services like software-defined networking in a wide area network (SD-WAN), secure Web gateway, and browser isolation capabilities, in order to deliver a complete cloud firewall solution.

The Gartner Cool Vendor report notes that “rapid changes to networks require new and adaptive approaches to securing them.” It recommends “security and risk management leaders should utilize adaptive security policies where required by different network traffic streams; in such cases, deploy SDP services that offer ‘secure network as a service’ capabilities.” (1)

Perimeter 81’s cloud-agnostic solution offers both customizable networking capabilities and advanced security features, and also ensures secure access at the network and application level. The software service can be rolled out quickly and provides automatic gateway deployment, easy multi-tenant management and full network visibility.

Since the launch of the product, Perimeter 81 has grown at a rapid, double-digit rate month over month and quickly acquired hundreds of clients — including Fortune 500 companies and some of the leading names in government, entertainment, technology, and AI. Additionally, Perimeter 81 has been named an Ingram Micro Mass Challenge Comet Finalist, an Info Security Products Guide Global Excellence “Cybersecurity Startup of the Year” and “Cybersecurity Vendor Achievement of the Year” winner, and a Cybersecurity Breakthrough Awards winner.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Cool Vendors in Network and Cyber-Physical Systems Security, Perkins, MacDonald, Thielemann and Brian Reed, 16 April 2019.

The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner customers may access the full report here.

About Perimeter 81

Perimeter 81 is a Secure Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, CEO Amit Bareket and CPO Sagi Gidali, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

To learn more about Perimeter 81’s zero-trust Software-Defined Perimeter Service be sure to request a complimentary demo.

For additional media inquiries, please contact: [email protected]

Read More
Gartner 2019 Market Guide - Perimeter 81
Perimeter 81 Recognized in Gartner’s 2019 Market Guide for Secure Enterprise Data Communications
Reading Time: 2 minutes

Perimeter 81, a secure network access solution for the modern and distributed workforce has been included in the April 2019 Market Guide for Secure Enterprise Data Communications by Gartner Inc., a leading IT research and advisory company. The Market Guide includes 12 of more than 40 Secure Enterprise Data Communications providers from around the world.

At Perimeter 81, our Software-Defined Perimeter (SDP) service and comprehensive management platform ensure secure access to cloud networks, data centers, SaaS applications and the entire Internet – all while increasing network visibility through a simple, easy-to-use and cost-effective software solution.

What Is the Market Guide for Secure Enterprise Data Communications?

Each year, Gartner publishes the Market Guide for Secure Enterprise Data Communications. This report states that “this research helps security and risk management leaders choose the best solutions for their use cases, including application-centric and demand-driven connections.”

According to Gartner, “Secure enterprise data communications solutions are products and services used to achieve security and confidentiality for data in motion by means of encryption and access controls.” (1)

The Perimeter 81 Secure Connection Product Offering

For secure enterprise data communications, it’s important that organizations tighten infrastructure and support integration and interoperability in hybrid on-premises and cloud environments. This can be achieved through site-to-site and device-level network communications and endpoint security that reduces the exposure and vulnerability of the network and servers.

At Perimeter 81, we’re proud to confirm that we meet multiple categories of secure communications using just one platform:

  • Network Building Capabilities
  • Multi-Regional Support
  • Split Tunneling
  • Custom DNS
  • Sleek, User-Friendly UI
  • Single Sign-On Integration
  • Two-Factor Authentication
  • Advanced Activity Monitoring
  • Automatic Wi-Fi Security
  • Cross-Platform Compatibility
  • Private Servers
  • DNS Filtering

Global Recognition

Our inclusion in this report is the most recent global recognition of Perimeter 81. From our perspective, being recognized as a Representative Vendor in the 2019 Market Guide for Secure Enterprise Data Communications from such a reputable resource is an honor and certainly validates our unique product vision during our boundless journey into the enterprise market.

“We believe that being included in Gartner’s 2019 Market Guide for Secure Enterprise Data Communications recognizes the simplicity and innovation the Perimeter 81 service continues to provide,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “The Perimeter 81 team has worked tirelessly to deliver a secure, network as a service solution that collectively provides secure networking and data science technologies in a way that overcomes the limitations of traditional security solutions. We feel that to be recognized by Gartner is a tremendous validation for the work the Perimeter 81 team has accomplished.”

Read more about our recent recognitions:

Gartner Hype Cycles
- Hype Cycle for Infrastructure Strategies, July 2018
- Hype Cycle for Cloud Security, July 2018
- Hype Cycle for Enterprise Networking and Communications, July 2018
Comet Competition Finalist
- Perimeter 81 was announced as one of 12 finalists
for the 2019 Comet Competition, held by Ingram Micro
Inc., in partnership with MassChallenge
Annual Cybersecurity Breakthrough Awards
- “Mobile VPN of the Year” - 2018 CyberSecurity Breakthrough Awards
Info Security Products Guide
- Silver Winner of Startup of the Year – Founded in 2018
- Bronze Winner of Cyber Security Vendor Achievement of the Year
Gartner Market Guide
- Gartner, Market Guide for Secure Enterprise Data Communications, April 2019
Gartner Cool Vendor
- Gartner, Cool Vendors in Network and Cyber-Physical Systems Security, April 2019

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

(1) Gartner, Market Guide for Secure Enterprise Data Communications, 2019, John Girard, Jeremy D’Hoinne, 11 April 2019.    

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected] or drop us a line in the comments section below.

If you don’t currently have an account and would like to experience a full tour of our platform, but sure to request a complimentary demo.

Read More
Network Building Feature - Perimeter 81
Perimeter 81 Platform Release: Introducing Our Network Building Capabilities
Reading Time: 3 minutes

We’re excited to announce the launch of our new and powerful network building capabilities which now allow you, our valued customers, to create fully flexible, customized networks that are multi-regional, interconnected to your environments and optimized for speed.

Perimeter 81’s new network building capabilities enable you to model your entire network using several advanced security features. Our new and easy-to-use UI helps you create, manage and secure multi-regional custom networks that are interconnected to your cloud and on-premise environments.

New Network Building Capabilities

Perimeter 81’s new Network Capabilities allow you to automatically create fully customized networks.

The new and innovative platform UI includes:

  • Multi-Regional Support: Now you can have private gateways in different locations to ensure your network can best serve international branches and employees with reduced latency and optimal speed. Since our applications are optimized for performance, employees will automatically connect to the nearest private gateway.
  • Split Tunneling: Control whether you tunnel all your network traffic, or specific subnets, from the client applications to Perimeter 81’s Secure Network as a Service. You can choose to add a Perimeter 81 Connector to interconnect your cloud (AWS, Azure, Google Cloud) and on-premise environments, or use an IPsec Site-to-Site Tunnel to create a secure communication link between two different networks located at different sites.
  • Custom DNS: Now you can opt-in to use a Custom DNS will allow you to utilize your organization’s DNS servers, as well as local domain names. You can choose to either obtain a DNS server address automatically, or select a primary and secondary DNS address manually.

Network Innovation

Businesses across a wide variety of industries are in need of simpler, more reliable network security. By delivering a single-click service that eliminates much of the hassle and headache of the past, our users are able to deploy, manage, and visualize network connections using only software. This enables the integration of powerful APIs, as well as the ability to analyze and visualize network traffic.

With Perimeter 81, you get the full package. More than just an OpenVPN alternative, along with our new networking building capabilities, our platform continues to provide:

  • Sleek, User-Friendly UI: With our improved UX and UI, compatible for web and mobile devices, it’s now easier than ever before to deploy, manage and secure your organization’s network.
  • Single Sign-On Integration: Our customers can enforce secure policy-based access with total ease. Perimeter 81 offers integration with several leading Identity Providers including G Suite/ Google Cloud, Okta, Microsoft Azure AD and Active Directory/LDAP.
  • Two-Factor Authentication: Add an extra layer of security and prevent remote attacks with SMS notifications, Google Authenticator and Duo Security authentication. We know this feature will be highly valuable for all businesses, and particularly those that need to adhere to strict industry regulations, like HIPAA compliance standards.
  • Advanced Activity Monitoring: With the management platform, you can gain even more insight into your network’s health, activity and security. Our platform includes a wide range of activity types including visibility into group and server creation, team member authentication, password changes and more.
  • Automatic Wi-Fi Security: Immediately protect your traveling employees from Wi-Fi hotspot threats with an encrypted connection that activates the moment your employees connect to an unsecured network.
  • Cross Platform: Easy-to-use cross-platform applications available for all your employees’ corporate and BYOD devices.
  • Private Servers: Private servers with dedicated IPs so you can skip manual IP whitelisting and lock down secure resources to protected IPs.
  • DNS FilteringProtect your employees from insidious websites instantly and easily.

Have any product questions or suggestions? Don’t hesitate to contact us at [email protected].

If you don’t currently have an account and would like to experience a full tour of our platform, be sure to request a complimentary demo.

We hope you enjoy all the new networking features and benefit from a faster, simpler, and more seamless way to build and manage your network!

Read More
Perimeter 81 Closes $5M Funding Round
Perimeter 81 Completes a $5M Funding Round to Help Businesses Achieve Network, Cloud and Application Security
Reading Time: 4 minutes

FOR IMMEDIATE RELEASE

Tel Aviv, Israel – Perimeter 81, a Zero-Trust Software Defined Perimeter company, founded by Amit Bareket, CEO, and Sagi Gidali, CPO, announced today that it has completed a $5M funding round.

The round was led by Spring Ventures, controlled by Aviv Refuah, with additional funds from US-based investors and existing shareholders. The company will use the funds to accelerate growth, primarily investing in expanding the sales, marketing and R&D teams in its Tel Aviv and New York offices, and developing new cloud firewall capabilities.

“The rise of Cloud and Mobility has disrupted network, cloud and application security as we know it. With employees working on the go and from different locations around the world, and companies increasingly moving towards the cloud, the traditional hardware-based legacy appliances of the past are no longer suitable for today’s modern and distributed workforce,” said CEO and Co-Founder Amit Bareket. “Perimeter 81’s user-centric Secure Network as a Service, which utilizes the Zero-Trust and Software-Defined Perimeter models, enables businesses to more easily secure access to local network resources, cloud environments, and business applications, with a seamless and highly intuitive SaaS solution.”

Since the launch of the product, Perimeter 81 has gained immediate traction in the market, growing at a rapid, double-digit rate month over month and quickly acquiring hundreds of clients including Fortune 500 companies and some of the leading industry names in government, entertainment, technology, and AI. Additionally, Perimeter 81 has been named an Ingram Micro Mass Challenge Comet Finalist, an InfoSecurity Product Guides Global Excellence “Cybersecurity Startup of the Year” and “Cybersecurity Vendor Achievement of the Year” winner, and a Cybersecurity Breakthrough Awards winner.

“We are big believers in the Zero-Trust and Software-Defined Perimeter cloud-based approach and have followed Perimeter 81 for a long time,” said Aviv Refuah, founder of Spring Ventures. “With its unique and forward-thinking cybersecurity SaaS approach, great team and impressive growth rate, Perimeter 81 will now be able to grow even faster, add additional security features and fulfill its vision to fully bring network security into the cloud.”

Perimeter 81 was recognized as a Sample Vendor under the Software-Defined Perimeter category in three Gartner Hype Cycle reports.

Perimeter 81 is unique in the market in that its holistic, cloud-agnostic solution offers both customizable networking capabilities and advanced security features, and also ensures secure access at the network and application level. The software service can be rolled out quickly and provides automatic gateway deployment, easy multi-tenant management, and full network visibility.

Perimeter 81 is the second venture for Co-Founders Amit Bareket and Sagi Gidali, who have also launched successful consumer VPN service, SaferVPN. SaferVPN, a profitable business launched in early 2014, quickly became a household name, with over 3 million international app downloads and one of the highest customer satisfaction rates in the industry. The consumer software company was selected by Deloitte Israel’s Technology Fast 50 – Rising Star rankings, recognized for sustained revenue growth over 2 years. Moreover, its patented Automatic Wi-Fi Security was white-labeled by leading global endpoint protection company Webroot, recently acquired by Carbonite.

With the new funding round, Perimeter 81 expects to double its team, add more security services, fulfill its vision to lead the SDP market and furthermore, disrupt the traditional firewall landscape.

“With Perimeter 81, we took our knowledge of what worked for the consumer market, and ultimately, the end-user, and transformed the complex and outdated technology that so many businesses rely upon, into a seamless and user-friendly SaaS service,” said Sagi Gidali, Co-Founder and CPO. With this new funding round, we look forward to expanding our reach and further enabling companies of all industries and sizes to become fully, securely mobile and confidently cloud-based.”

Perimeter 81 Founders Sagi Gidali and Amit BareketPerimeter 81 Co-Founders, Sagi Gidali, CPO, and Amit Bareket, CEO

Perimeter 81’s user-centric Secure Cloud Network as a Service management platform and client applicationPerimeter 81’s user-centric Secure Cloud Network as a Service management platform and client application.

ABOUT PERIMETER 81

Perimeter 81 is a Secure Network as a Service that has taken the outdated, complex and hardware-based traditional network security technologies, and transformed them into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, Perimeter 81 serves a wide range of businesses, from midsize to Fortune 500 companies, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

To learn more about Perimeter 81’s Zero-Trust Software-Defined Perimeter Service visit: www.perimeter81.com

ABOUT SPRING VENTURES

Spring Ventures, a publicly traded company on the Tel Aviv Stock Exchange, is led by Aviv Refuah, one of Israel’s first and most experienced Tech entrepreneurs. The main activities of Spring Ventures are devoted to investments in the fields of Technology and Internet, both in private and public companies. Spring Ventures made, among other successful deals, the largest e-commerce transaction ever in Israel. Spring Ventures’ investment objective is to seek long-term capital appreciation by investing in a diversified portfolio, while taking advantage of technology-based platforms, global market trends and its expertise.

For additional media inquiries, please contact: [email protected]

 

Read More
Zero Trust Network Security - Perimeter 81
5 Non-Disruptive Tips to Get Started with Zero Trust Network Security
Reading Time: 4 minutes

Zero Trust is an alternative IT security model that remedies the shortcomings of legacy technology by removing the assumption of trust. Under the guiding principle, “Never trust, always verify”, Zero Trust restricts access to the entire network by isolating applications and segmenting network access based on user permissions, authentication and verification.

Conventional security models that “trust, but verify”, fail to meet increasingly sophisticated cyber threats, hyper interconnectivity, globalization and user mobility. By assuming everything “on the inside” can be trusted, these legacy technologies are, for the most part, no longer effective.

Zero Trust network security ensures policy enforcement and protection for all users, devices, applications and data, regardless of where they’re connecting from. This user-centric approach makes the verification of authorized entities mandatory, not optional.

The Benefits of Adopting Zero Trust Principles

Zero Trust provides adequate visibility, control and threat inspection capabilities that are necessary to protect your network from modern malware, targeted attacks and the unauthorized exfiltration of sensitive data.

By migrating to a Zero Trust architecture, organizations can experience several technical and business advantages, including:

  • Mitigating Data Loss
    Dramatically enhance your security posture and mitigate data loss via visibility, safe enablement of applications and threat prevention.
  • Effortless Compliance
    Simplify compliance with highly effective trust boundaries by segmenting sensitive resources into many small perimeters that are secured and segmented based on user policies and permissions.
  • Enabling Mobility and Virtualization
    Increase the ability to accommodate transformative IT initiatives such as cloud computing, infrastructure virtualization, user mobility, social networking and more.
  • Reducing TCO
    Reduce total cost of ownership (TCO) for IT security by replacing disconnected point products with a single, consolidated security platform.
  • Increasing Security
    By adequately accounting for encrypted traffic and filtering for known threats, organizations can prevent sophisticated cyber threats from penetrating perimeter defenses and moving laterally across the internal network thanks to a solid business VPN solution.

The Zero Trust Model – How it Works

Internal networks are comprised of different levels of trust which should be segmented according to sensitivity. Organizations looking to establish secure “trust boundaries” according to the Zero Trust model need to improve their defensive posture through:

  • Network Segmentation
    Network segmentation allows organizations to define internal trust boundaries to granularly control traffic flow, enable secure network access and implement network monitoring. This reduces the attack surface and provides a distributed security solution which operates as a holistic threat protection framework.  
  • Trust Zones
    Trust zones are comprised of distinct pockets of infrastructure where resources operate at the same trust level and similar functionality such as protocols and types of transactions. This minimizes the number of allowed pathways and limits the potential for malicious threats to access sensitive resources.
  • Infrastructure Management
    Zero Trust segmentation relies on the ability to efficiently monitor the network via centralized management capabilities. This allows data to be processed by out-of-band analysis tools and technologies that may further enhance network visibility, detect unknown threats, or support compliance reporting.

5 Tips to Get Started with Zero Trust Network Security

It is important for IT security managers and architects to realize that it’s not necessary to wait for the next network and security infrastructure. By obtaining unparalleled visibility into enterprise computing activity, organizations can incrementally and non-disruptively make the transition to a Zero Trust model.

Here are 5 tips to get started with a Zero Trust approach to network security:

Tip #1: Secure Network Access

To get started, it’s critical to ensure that all resources are accessed securely, regardless of location. Network security, implemented via a client application for endpoints, allows for secure IPsec and SSL VPN connectivity for all employees, partners, customers and guests no matter where they’re connecting from (e.g., remotely, on the local network, or over the Internet).

Additional policies determine which users and devices can access sensitive applications and data. This requires multiple trust boundaries, increased use of secure communications to and from resources and more.  

Tip #2: Inspect and Log ALL Traffic

To accurately monitor what’s happening in the network, organizations must identify and classify all traffic, regardless of ports and protocols, encryption or hopping. This reiterates the need to “always verify” while also making it clear that adequate protection requires more than just strict enforcement of access control. It also eliminates methods that malware may use to hide from detection.  

Tip #3: Least Privilege Access Control

Many legacy solutions are limited to port and protocol-level classification, resulting in too much unfiltered traffic. With granular access control, users can safely access appropriate applications and data by reducing available pathways and eliminating unauthorized and malicious traffic from the network.

With a least-privileged strategy and strictly enforced access control, organizations can define user interactions with resources based on relevant attributes, including application access, user and group identity and the sensitivity of the data being accessed.

Tip #4: Advanced Threat Protection

Legacy security that relies on stateful inspection technology is incapable of enforcing a least-privileged policy because their classification engines only understand IP addresses, ports and protocols – meaning they can’t distinguish between specific applications.

To implement Zero Trust, comprehensive protection against both known and unknown threats, including threats on mobile devices, is necessary to support a closed-loop, highly integrated defense stature that consistently and cost-effectively enables trust boundaries.

Tip #5: High-Performance Design

Since Zero Trust relies on numerous security and networking capabilities, these features must be implemented in a way that doesn’t hinder performance. The Perimeter Zero software architecture minimizes latency and surpasses processing requirements, providing high availability, avoiding loss of service and increasing the uptime of your network.

With unmatched visibility and control of applications, users, and content, organizations can migrate to Zero Trust network security with a highly flexible solution made possible by non-disruptive deployment.

Convert to Zero Trust on the Fly

Because every successful Zero Trust initiative depends on the right solution, organizations can feel confident that they can implement Zero Trust network security without needing to modify the existing network.

Perimeter 81’s software-defined perimeter Zero Trust access feature, called Perimeter Zero, provides a completely transparent experience for all users by enabling access to web applications, SSH, RDP, VNC or Telnet, through resilient IPSec tunnels – without an agent. All your organization’s employees can easily go to their application portal, select the application they have permission to enter and create a session that is fully audited, recorded and monitored.

With secure, segmented and audited access to cloud environments, applications and local services, Zero Trust increases security, auditing, monitoring and visibility while reducing help-desk support and hardware spending.

We hope you found this post helpful! Feel free to let us know if you have any questions and follow us on social media if you’d like to continue receiving all the latest business security news. 

Read More
Perimeter 81 Mass Challenge Ingram Micro Comet Competition Finalist
Perimeter 81 Named a Top Finalist in This Year’s Comet Competition
Reading Time: 3 minutes

TEL AVIV, Israel – Perimeter 81 was announced as one of 12 finalists for this year’s Comet Competition which evaluated 300 ISV applicants, held by Ingram Micro Inc, in partnership with MassChallenge.

Established in 2018, the Comet Competition is the only startup challenge dedicated to discovering talented B2B independent software vendors (ISVs) and accelerating their trajectory to channel market success.

Perimeter 81 – Top 12 Finalist

This award aids in our mission to increase network visibility by providing policy enforcement and protection for all users, devices, applications, data and traffic. By offering innovative, easy-to-use Software-Defined Perimeter solutions, backed by Zero Trust security, we’re working to protect our customers and their clients from looming cyber threats that aren’t addressed by outdated perimeter-centric strategies.

The Comet Competition compliments our progress through go-to-market funding, access to corporate partners and other tools which will help accelerate our success. Once onboarded to the Ingram Micro Cloud Marketplace, ISVs are able to quickly scale, promote, sell and deploy their solutions to channel partners and the customers they serve in more than 50 global markets.

“With Perimeter 81, it is our aim to disrupt the 30-year-old legacy VPN and firewall technology, and help businesses more easily and seamlessly secure network, cloud and application access for the modern and mobile workforce,” said Sagi Gidali, CPO and Co-Founder of Perimeter 81. “We are very proud to be recognized by Ingram Micro and Mass Challenge for our innovative and user-centric Software-Defined Perimeter technology.”

The 2019 Ingram Micro Cloud Summit

We’re excited to join MassChallenge and Ingram Micro at the upcoming 2019 Ingram Micro Cloud Summit, taking place in San Diego, Calif., March 11-13, as they announce the regional winners and showcase all finalists of the Comet Competition.

More information including registration is available here: https://www.ingrammicrocloudsummit.com/

About Ingram Micro Cloud

At Ingram Micro Cloud™, we view cloud not just as a single technology, but as a foundational platform to run and drive a whole new way of doing business. By leveraging our platforms and ecosystem, cloud service providers, telecom companies, resellers and enterprises can quickly transform and get up and running in the cloud within minutes, with little to no investment. Our portfolio includes vetted security, communication and collaboration, business applications, cloud management services and infrastructure solutions designed to help clients monetize and manage the entire lifecycle of cloud and digital services, infrastructure and IoT subscriptions. For more information, please visit: www.IngramMicroCloud.com.

About MassChallenge

MassChallenge is a global network of zero-equity startup accelerators. Headquartered in the United States with locations in Boston, Israel, Mexico, Rhode Island, Switzerland, Texas, and the UK, MassChallenge is committed to strengthening the global innovation ecosystem by supporting high-potential startups across all industries, from anywhere in the world. To date, more than 1,900 MassChallenge alumni have raised more than $4 billion in funding, generated over $2.5 billion in revenue, and created over 120,000 total jobs. Learn more about MassChallenge at www.masschallenge.org.

About Perimeter 81

Perimeter 81 is a Secure Network as a Service that has taken the outdated, complex and hardware-based traditional VPN and firewall technology, and transformed it into a user-friendly and easy-to-use software solution — simplifying secure network access for the modern and distributed workforce. Founded by two IDF elite intelligence unit alumni, Perimeter 81 serves Fortune 500 businesses and industry leaders across a wide range of sectors, and has established partnerships with the world’s foremost integrators, managed service providers and channel resellers.

Comet Competition - Perimeter 81

Contact us if you’d like to learn more about software-defined-security technology and our innovative and disruptive SMB targeted product offering!

Read More
RSA Conference 2019 - Perimeter 81
We’re Going to RSA 2019. Want to Join Us?
Reading Time: 2 minutes

We’re attending RSA Conference 2019 in San Francisco, and we want you to join us! Find us at Booth 635 and learn how to modernize and simplify your network infrastructure with our Secure Network as a Service.

At the conference, you can say hello to our team of experts, pick up some limited edition t-shirts and fun retro prizes and receive 1:1 demos of our award-winning technology.

We’ll be discussing the shortcomings of traditional, complicated and costly legacy VPN and firewall appliances and how these limitations can be overcome by removing the assumption of trust.

This Year’s RSA Conference Theme Is “Better”

This year’s theme is Better: “Which means working hard to find better solutions. Making better connections with peers from around the world. And keeping the digital world safe so everyone can get on with making the real world a better place.”

At Perimeter 81, we’d like to create a brighter future through our proactive commitment to security by offering innovative, easy-to-use solutions that address the shortcomings of perimeter centric strategies. We’re constantly working to protect our customers and their clients from cyber threats that continue to grow and devastate organizations around the globe.

By offering a Software-Defined Perimeter, backed by Zero Trust security, we hope to aid companies in the fight against data loss by increasing visibility into the network and providing policy enforcement and protection for all users, devices, applications, data and traffic.

Familiar with Our New and Exciting Product Features?

Since launching Perimeter 81 last year, we have quickly gained traction in the mid-market. We’re seeing businesses across a wide variety of industries that are in need of simpler, more reliable network security. Our goal, since day one, has been to deliver a single-click service that will eliminate much of the hassle and headache you experienced in the past, and give you greater peace of mind in the future.

Our new product features include:

  • New, sleek UI compatible for web and mobile devices
  • Single Sign-On integration with several leading Identity Providers
  • Two-factor authentication via SMS notifications, Google Authenticator and Duo Security
  • Brand new server locations for even higher availability and connection speed
  • Advanced activity monitoring into your network’s health, activity and security
  • Automatic Wi-Fi Security that immediately protects your traveling employees from Wi-Fi threats
  • Easy-to-use cross-platform applications available for all your employees’ corporate and BYOD devices
  • Private servers with dedicated IPs so you can skip manual IP whitelisting and lock down secure resources
  • DNS Filtering solution for blocking access to certain websites from your company’s network.

About RSA Conference

The RSA Conference is one of the world’s leading information security events, where attendees learn about the very latest in research, development, and trends. The conference offers security professionals new approaches to information security, the opportunity to discover the latest technology, and interaction with top security leaders and pioneers.

Schedule Your Free Demo Today

Simply schedule a meeting with one of our experts and receive your FREE Expo Plus Pass code!

[button style=”btn-default btn-lg” type=”link” target=”true” title=”Join us!” link=”https://www.perimeter81.com/start/rsa-conference-2019/” linkrel=””]

Read More