Amazon partner network

Perimeter 81 is an Advanced Technology Partner in the Amazon Web Services Partner Network

Reading Time: 2 minutes

Perimeter 81 receives Advanced AWS Technical Validation

Perimeter 81, a leading provider of Cloud VPN and Software Defined Perimeter technology, has been recognized as an Advanced Technology Partner in the Amazon Web Services (AWS) Partner Network (APN).

About APN Technology Partners

The APN is a global program, designed to help APN Partners build successful AWS-based businesses or solutions by providing business, technical, marketing, and go-to-market support.

This distinction recognizes that Perimeter 81 offers an advanced software solution that has demonstrated proven expertise, technical proficiency and directly integrates with the AWS platform.

Additionally, as an APN Partner, Perimeter 81’s solution is secure, compliant, follows the AWS Well-Architected Framework, and implements best practices for security, high availability, support, costs, and automation on AWS.

Why Work with an APN Partner?

APN Partners have proven, deep expertise on AWS – meaning they are fully capable of assisting you during your transition to the cloud. With full access to the business benefits AWS has to offer, APN partners are able to help customers succeed during their journey and help them reach their business objectives.

For Perimeter 81, this accomplishment benefits our current and future clients and partners by enhancing our ability to provide a next-generation secure network access solution to our customers using AWS.  

“We are proud to join the AWS Partner Network and are excited to have been upgraded as an AWS Advanced Technology Partner,” said Amit Baraket, CEO and Co-Founder of Perimeter 81. “We are committed to simplifying cloud security with an easy-to-use software solution available to businesses of all sizes and hope that this recognition will continue to push us forward in this quickly growing market.”

Perimeter 81 for AWS

Perimeter 81 offers Cloud VPN for AWS customers are responsible for secure usage of unmanaged AWS services. That means customers must provide their own security through authentication and user access control in order to protect their Amazon cloud environment.  

We understand the impact of cloud migration, which is why we’re offering an easy-to-use, scalable cloud security solution that provides simple and cost-effective access control and monitoring for your entire security landscape.

Perimeter 81’s advanced security features include:

  • Cost-Effective Compliance
  • Segmented Resource Access
  • Actionable Intelligence
  • Simple Cloud Migration
  • End-to-End Encryption
  • Secure Remote Access

About Perimeter 81

Perimeter 81 is a next-generation, software-defined network security provider, driven by the mission to transform secure network access for the modern and distributed workforce. Built from scratch based on input from security leaders needing a change from legacy VPN technology, Perimeter 81’s user-friendly interface, unified management and seamless integration with major cloud services, give companies of all industries and sizes the power to be fully mobile and confidently cloud-based. Please visit http://www.perimeter81.com to learn more.

Attending AWS re:Invent? Schedule a meeting with our team and learn how to simplify secure access to your entire AWS network.

Read More
Public Wifi threats

Public Wi-Fi Risks and How You Can Easily Protect Your Clients from Them

Reading Time: 3 minutes

Public Wi-Fi is an incredible free resource for business people on the road. However, there are many dangers associated with public Wi-Fi.

Utilizing a VPN (Virtual Private Network) is one of the safest ways to keep data protected. In this webinar, we discuss how a cloud-based VPN can support the convenience of public Wi-Fi while adding extra security for business people to keep their data traffic encrypted and their company’s assets safe.

The Risks of Public Wi-Fi

As public Wi-Fi has become more and more available, attacks on public networks have only increased. Cisco’s Visual Network report revealed that the number of public Wi-Fi hotspots is expected to grow to 7 times the 2015 figure, from 64 million to 432 million by 2020.

Some risks associated with using public Wi-Fi include:

  • Insufficient Encryption
    Many Wi-Fi hotspots have absolutely no form of encryption, or they utilize the much weaker WEP protocol that is susceptible to cybersecurity breaches.
  • Poor Password Protection
    Many Wi-Fi hotspots have widely shared passwords, or even worse, absolutely no password protection. This provides incredibly easy access to cybercriminals who’d like to access the network and compromise your data.
  • Lack of Awareness
    Unfortunately, many people are not aware of the risks of public Wi-Fi and assume that since they had to log in, the network must be secure. In fact, only one in three people can actually tell the difference between secured and unsecured Wi-Fi networks.

The Most Common Public Wi-Fi Threats That You Should Be Aware Of

One in five people and three in ten senior business managers have been hit by cybercrime while on the go.

Here are a few examples of how these attacks happen:

  • Man-In-The-Middle Attack
    Using this method, hackers are able to intercept data transmission between two endpoints. Once they are in control of the connection, attackers have the ability to read and even alter data that is transferred back and forth.
  • Packet Sniffing
    Using readily available tools, hackers can capture packets of data passing through the network, allowing them to steal administrative passwords, sensitive login credentials and much more.
  • Evil Twin Attack
    With a seemingly legitimate network, hackers can trick employees into connecting to a rogue Wi-Fi hotspot. Once this happens, they have full access to all the information that a person transfers online.
  • Wi-Fi Pineapple
    For less than a hundred dollars a bad actor can use a small portable device called a Wi-Fi pineapple to generate spoof sites that allow them to eavesdrop on your private data.

How to Protect Yourself on Public Wi-Fi

With the rise of people working remotely and connecting to Wi-Fi hotspots with their mobile devices, businesses are struggling to protect their confidential information.

Here are a few measures you can take right now to start protecting your data: 

Browse Only over HTTPS Encrypted Sites

When you browse on a website you want to check for a green lock symbol at the start of the URL. This indicates that your traffic is being encrypted through SSL encryption technology and that the data transferred between your browser and the website is secured. However, this method is still vulnerable to SSL stripping.

Enable Two-Factor Authentication

Two-factor authentication (2FA) is a great way to prevent your accounts from being hacked. It ensures that, in addition to your username and password, a second layer of verification such as an SMS code is required. However, in the case of public Wi-Fi, this method only protects your account during the login process, so it isn’t enough to keep you safe online. 

Disable Auto Join to Wi-Fi Networks

Many Wi-Fi hotspots are unsecured. However, your phone automatically remembers previous networks you’ve connected to and will reconnect to them even if you don’t interact with your phone. Since it’s important to make sure that the network you’re connecting to is authorized, reliable and trustworthy, you should disable auto join on your device. 

With Perimeter 81

With Perimeter 81, you can set up a private secure connection to another network which enables you to browse through an encrypted tunnel

Perimeter 81’s secure network access solution offers an easy-to-use security tool with many technical advantages, including

  • It’s cost effective because you don’t have the expensive external hardware
  • It’s easy to set up and manage because it’s software-based and offers immediate updates and upgrades
  • It is highly scalable and offers seamless cloud integration
  • It provides multi-tenant support and clear MSP management

With a secure network access solution, you can rest assured knowing that your entire network is protected. We’ve received special approval from Apple for our breakthrough feature automatic Wi-Fi security. When activated, the minute a user connects to an unsecured Wi-Fi network, we automatically activate an encrypted VPN channel to ensure that all their data is protected.

We also utilize 256-bit AES bank-level encryption, secure tunneling protocols including OpenVPN, L2TP over IPSec, and Perfect Forward Secrecy (PFS) which rotates encryption keys every 60 minutes.

Read More

11 Reasons Why a Cloud VPN is the Secret Ingredient for Your Company’s Success

Reading Time: 7 minutes

Give your business a competitive edge with a Cloud VPN service. In this post, we’ll tell you why a VPN is the secret ingredient for your company’s success. Continue reading

Read More

VPN for the General Data Protection Regulation (GDPR)

Reading Time: 4 minutes

The European Union’s new General Data Protection Regulation (GDPR) is officially in effect May 25, 2018. However, Gartner believes that less than 50 percent of all organizations will have fully complied with GDPR by that date. Continue reading

Read More