Device security you can count on
Device Posture Check inspects employee devices and prevents potentially dangerous devices from connecting.
6 min watch
Attackers can hack a device before and while it accesses a network. Perimeter 81 DPC rules check Windows, Android, MacOS, iOS and Linux devices before and during access, and remove devices where there’s a discrepancy between policy and posture.
Perimeter 81 helps you maintain and track your device inventory, including a current overview of device health, login history, successful or failed posture checks, and session information including time, user, OS, device type, attached policy and more.
Institute a multi-layered security model for your organization, including segmented networks and device posture enforcement, but also add-on security functionality such as 2FA, automatic-Wi-Fi security, DNS filtering and more.
Perimeter 81 reduces the attack surface by segmenting network access at the user level, but we further supplement security with Device Posture Check (DPC), enabling admins to create access rules by device as well.
Define and enforce secure device posture, like the presence of certificates, disk encryption and more.
Automatically deny access, even for known employee devices, if the security posture doesn’t match DPC rules.
Gain real-time, in-depth visibility for the device inventory and user activity within your networks and resources.
Build safety nets to back up policy, with easy enforcement of multi-factor authentication and other security features.
Bring Your Own Device and other trends such as cloud adoption present security challenges that require a holistic approach. DPC and other Perimeter 81 features work together to make any remote connection secure – no matter who, where, or what.
Perimeter 81’s DPC rules work for any OS and are built around criteria including anti-virus, certificate, Windows Registry keys, disk encryption and more.
Complement DPC capabilities with other tools like 2FA, Single Sign-On, DNS filtering, always-on encryption and other tools for a multi-layer security strategy.
Posture checks run in parallel with encryption provided by cloud gateways, which are VPN tunnels for local employees to privately access your network.
Before implementing the Perimeter 81 solution, I would have to do video calls with each employee on how to configure the VPN on their device. With Perimeter 81, I don’t have to deal with those calls anymore, or hours of VPN requests, and now I have more time to do other things in my workday
Gain total control of your endpoints and customize user access to your network with Perimeter 81.