Reinforce secure remote access with Device Posture Check

Boost the security of critical resources by granting access only to devices that meet your security posture rules, and blocking devices that may expose the network.

Reinforce secure remote access with Device Posture Check
Choose the minimum level of security for access

Choose the minimum level of security for access

Device Posture Check ensures devices cannot connect unless they qualify as “secure” according to your criteria. DPC rules can check for the presence of anti-virus software, Windows Registry keys, disk encryption, certificates, and specific files or processes.

Stop potentially insecure devices from connecting

Stop potentially insecure devices from connecting

Attackers can hack a device before and while it accesses a network. Perimeter 81 DPC rules check Windows, Android, MacOS, iOS and Linux devices before and during access, and remove devices where there’s a discrepancy between policy and posture.

Monitor access, device health, and activity

Monitor access, device health, and activity

Perimeter 81 helps you maintain and track your device inventory, including a current overview of device health, login history, successful or failed posture checks, and session information including time, user, OS, device type, attached policy and more.

Augment and improve your device security

Augment and improve your device security

Institute a multi-layered security model for your organization, including segmented networks and device posture enforcement, but also add-on security functionality such as 2FA, automatic-Wi-Fi security, DNS filtering and more.

Verify endpoint posture for every user

Perimeter 81 reduces the attack surface by segmenting network access at the user level, but we further supplement security with Device Posture Check (DPC), enabling admins to create access rules by device as well.

Define Device Security

Define and enforce secure device posture, like the presence of certificates, disk encryption and more.

Block Unsecure Access

Automatically deny access, even for known employee devices, if the security posture doesn’t match DPC rules.

Device Monitoring

Gain real-time, in-depth visibility for the device inventory and user activity within your networks and resources.

Extra Authentication

Build safety nets to back up policy, with easy enforcement of multi-factor authentication and other security features.

Benefits of Device Posture Check for IT

Bring Your Own Device and other trends such as cloud adoption present security challenges that require a holistic approach. DPC and other Perimeter 81 features work together to make any remote connection secure – no matter who, where, or what.

Exert Precise Device Control

Perimeter 81’s DPC rules work for any OS and are built around criteria including anti-virus, certificate, Windows Registry keys, disk encryption and more.

Enhance Device Security

Complement DPC capabilities with other tools like 2FA, Single Sign-On, DNS filtering, always-on encryption and other tools for a multi-layer security strategy.

Secure Remote Workforces

Posture checks run in parallel with encryption provided by cloud gateways, which are VPN tunnels for local employees to privately access your network.

Before implementing the Perimeter 81 solution, I would have to do video calls with each employee on how to configure the VPN on their device. With Perimeter 81, I don’t have to deal with those calls anymore, or hours of VPN requests, and now I have more time to do other things in my workday
Maks Suski
IT Manager at Kustomer

Secure your devices with Perimeter 81

Gain total control of your endpoints and customize user access to your network with Perimeter 81.