Perimeter 81 Agent

Enforce security on the edge of your network

The Perimeter 81 agent is easily installed on any device, and deploys relevant security directly to employees trying to access your network.

Perimeter 81 Agent

Extend security to where it matters

Access to critical resources now occurs further from the traditional network perimeter than ever before. Bring security to the edge where employee devices access cloud-based resources with Perimeter 81’s agent-based (or agentless) Zero Trust network access solution

Endpoint visibility

Enforce authentication via IdP identifying users and applying user-centric, segmented access

Secure any employee

Our agent works with any device or OS so that your entire organization is secured and monitored 

Connect to global gateways

Build your network with our public or private global gateways, and tunnel user traffic via the agent for lower latency

Enforce additional security measures

Deploy security through the agent including mandatory 2FA, Automatic Wi-Fi Security and Always On VPN

Gain higher endpoint security and visibility

Gain higher endpoint security and visibility

Use the agent to deploy policy-based device posture security to users through Device Posture Check and other rules, which check employee devices for running anti-viruses, disk encryption, and the presence of specific certificates, files, and Windows Registry keys before granting access.

Flexible protection for any employee device

Flexible protection for any employee device

Our lightweight agent is optimized for any device or OS, including MacOS, Windows, iOS, Android and Linux. No endpoints should be out of IT’s line of sight, and the Perimeter 81 agent is designed to provide authentication and security enforcement no matter what device the employee uses to gain access or where they are located.

Your gateway to secure remote access

Your gateway to secure remote access

When connected through the agent, Perimeter 81 can tunnel user connections through any of our public or private global gateways, providing users with encrypted and low-latency access to critical corporate resources.

Deploy an additional security layer

Deploy an additional security layer

Other security measures that are enforceable through the agent include Automatic Wi-Fi Security and Always-On VPN, which make encrypted connections from untrusted networks mandatory and block internet connections should the VPN tunnel drop.

With Perimeter 81’s self-managed system, every new employee can download and deploy the solution by themselves and have instant secure access, whether it’s on their laptop or on their mobile device.
Amir Jerbi
Co-Founder and CTO of Aqua Security

Reach out to secure your entire perimeter, on every device

Whether through an agent or browser, Perimeter 81 provides organizations with the simple ability to segment their networks for users depending on their unique security profiles. Tie authentication to identity instead of credentials, and gain superior network visibility and control today with Perimeter 81. To see how it works, reach out and schedule your demo today.

Font Resize