test text 11 top

test list

We’re a studio in Berlin with an international practice in architecture, urban planning and interior design. We believe in sharing knowledge and promoting dialogue to increase the creative potential of collaboration.

title test

  • Five Steps For Preventing Malware With Zero Trust

    Five Steps For Preventing Malware With Zero Trust

    Implementing zero trust in your organization is becoming the go-to methodology to prevent malware.  In the past, traditional security protocols relied on trusting users, devices, and applications with privileged access – all of which are vulnerable vectors for cybercriminals to deploy malware. Even with some of the most advanced internal security measures and secure web…


  • The Russia vs. Ukraine War: Cybersecurity Threats & Best Practices

    The Russia vs. Ukraine War: Cybersecurity Threats & Best Practices

    Cybercrime has been on the rise as criminals have gone from robbing banks to hacking into checking accounts. Most recently, the war in Ukraine has highlighted another aspect of cybercrime: state actors. State actors are actually one of the most active types of hackers. The war in Ukraine began with cyberattacks that targeted military and…


  • Increasing Security with URL and DNS Filtering

    Increasing Security with URL and DNS Filtering

    A key step to preventing cyber attacks is implementing URL & DNS filtering so that harmful content is blocked from ever reaching your users.


  • SSE vs. SASE: What Organizations Need to Know

    SSE vs. SASE: What Organizations Need to Know

    What makes the SSE framework innovative, how is it different from SASE, and why is it important for your organization?


  • 5 Tips for Maximizing Your Cybersecurity at the 2022 Olympics

    5 Tips for Maximizing Your Cybersecurity at the 2022 Olympics

    The Olympics are back. More than 150,000 people from around the world are traveling to Beijing to experience the historic event. But large scale sporting events are a common target for cyberattacks, and the Olympic games are no exception. 


  • An Inside Look at Perimeter 81’s Technology Alliances Partner Program

    An Inside Look at Perimeter 81’s Technology Alliances Partner Program

    As a component of our vision of our Cybersecurity Experience (CSX) Platform, to offer simplicity and groundbreaking ease-of-use for businesses and organizations around the world, we understand there is an ever-present and growing requirement for collaboration. Customers


  • Brack Capital Migrates 100 Users to WFH in Two Days With Cloud VPN

    Brack Capital Migrates 100 Users to WFH in Two Days With Cloud VPN

    Geva called Perimeter 81 and told them that he needed 100 licenses ASAP since they expected to send their whole company home. “Deployment was swift. Within two days, I had installed 100 licenses, and people were able to work from home. Perimeter 81 was a life-saver for our business.”


  • The Time for a Radically Simple Secure Web Gateway (SWG) Has Arrived

    The Time for a Radically Simple Secure Web Gateway (SWG) Has Arrived

    Announcing the new Perimeter 81 Secure Web Gateway (SWG)! Perimeter 81 now provides secure Internet access with our famous one-click deployment.


  • Top 5 Cybersecurity Predictions for 2022

    Top 5 Cybersecurity Predictions for 2022

    Imagine a new world where people can work wherever and however they please. A world where cybersecurity offers IT and security professionals the radical simplicity to confidently and successfully overcome whatever challenges and cyber threats that may lie ahead.


  • A Deep Dive into the New Cybersecurity Experience Platform

    A Deep Dive into the New Cybersecurity Experience Platform

    Imagine a new world where people can work wherever and however they please. A world where cybersecurity offers IT and security professionals the radical simplicity to confidently and successfully overcome whatever challenges and cyber threats that may lie ahead.


  • 71% of VPs and CIOs Have Difficulty in Combating Cyberattacks due to Complexity

    71% of VPs and CIOs Have Difficulty in Combating Cyberattacks due to Complexity

    “Hybrid and remote work is definitely here to stay,” says Amit Bareket, CEO of Perimeter 81. “A remarkable 87% of responding companies will have hybrid workers even after Covid—and more than half of them will work remotely three to four days a week. This is a dramatic development that permanently increases the size of the…


  • The Birth of the Cybersecurity Experience Platform

    The Birth of the Cybersecurity Experience Platform

    The problem of cyber complexity didn’t just start today. Both Amit and I saw it in our first IT jobs after finishing our degrees at Tel Aviv University. We saw that the complexity of VPNs and other cyber solutions hindered productivity and made them less effective in providing essential cybersecurity.  Sure, change is inevitable, but…


  • Signpost Deploys NaaS and Goes Officeless During the Second Wave of Covid

    Signpost Deploys NaaS and Goes Officeless During the Second Wave of Covid

    Because of RDP, Meredtih Sleep Centres were getting hacked every month. After detecting a ransomware attack, the IT Manager would have to shut down the network for an hour and roll back the systems.


  • How to Jump-Start Startup Success

    How to Jump-Start Startup Success

    The Security Innovation Network (SINET) has selected Zero Trust Network Access and SASE leader Perimeter 81 to win the annual SINET16 Innovator award. The award is given to the 16 most “innovative and compelling” companies addressing cybersecurity threats and vulnerabilities.    


  • Now Live: Perimeter 81’s New API Support for Cybersecurity

    Now Live: Perimeter 81’s New API Support for Cybersecurity

    Security admins using Perimeter 81 to manage their networks will be able to generate an API key and securely link it with another API-enabled service, allowing them to manipulate network security settings without entering the Perimeter 81 platform. 


  • Perimeter 81 Wins 2021 Gold Stevie® International Business Award®

    Perimeter 81 Wins 2021 Gold Stevie® International Business Award®

    Perimeter 81 has won a Gold Stevie® Award in the Founding Team of the Year category in The 18th Annual International Business Awards® (IBAs). According to the IBA judges, company co-founders, Amit Bareket and Sagi Gidali, are an “entrepreneurial dynamic duo” delivering a “masterclass in business development.”


  • To Pay or Not to Pay? The Kaseya Malware Hack Revisited.

    To Pay or Not to Pay? The Kaseya Malware Hack Revisited.

    On July 22, 2021, Kaseya announced it had obtained a REvil ransomware decryptor “from a third party.” They claim that they didn’t pay the ransom.


  • Putting an End to Ransomware Attacks with Perimeter 81

    Putting an End to Ransomware Attacks with Perimeter 81

    Because of RDP, Meredtih Sleep Centres were getting hacked every month. After detecting a ransomware attack, the IT Manager would have to shut down the network for an hour and roll back the systems.


  • Debunking The Top 5 SASE Myths and Discovering its Business Benefits

    Debunking The Top 5 SASE Myths and Discovering its Business Benefits

    The world of cybersecurity is undergoing an incredible transformation birthed by the introduction of Secure Access Service Edge, more commonly known as “SASE”. The core of SASE is to offer a unified cybersecurity solution that caters to all the unique cloud and network security needs harbored by any company. The arrival of SASE is already…


  • [Infographic] SASE for Superheroes – Defending Your Perimeter and Beyond

    [Infographic] SASE for Superheroes – Defending Your Perimeter and Beyond

    With the rise of remote and hybrid work following COVID-19, IT teams are growing increasingly frustrated with the overload of security tools and products, more commonly known as tool sprawl.  In fact, the average IT team is using between 10-30 security monitoring solutions for applications, network infrastructures, and cloud environments according to a recent 451…


  • The Role of VPNs in Ensuring Compliance with Data Protection Laws

    The Role of VPNs in Ensuring Compliance with Data Protection Laws

    Today’s culture of interconnected data has paved the way for stunning leaps in operational efficiency. As a result, data protection has become one of the most critical components to managing an organization’s workforce and customers. Let’s explore the role of a Virtual Private Network (VPN) in ensuring compliance with the myriad of data protection laws.…


  • How to Ensure High-Speed Internet with a Business VPN in 6 Steps 

    How to Ensure High-Speed Internet with a Business VPN in 6 Steps 

    A business VPN (Virtual Private Network) is a secure, encrypted connection established over the internet between an employee’s device and the company’s internal network. This secure tunnel ensures that data transmitted between the employee and the company’s network is protected from eavesdropping, interception, and unauthorized access.  Business VPNs are commonly used to allow employees to…


  • Why Free VPNs Are a Danger to Your Businesses

    Why Free VPNs Are a Danger to Your Businesses

    VPNs (Virtual Private Network) offer a way for data to be transmitted in a secure way. By encrypting in-transit data, customers and employees are kept safe from attacks that aim to intercept and steal it. VPNs’ proximity to browsing behavior and data also makes them shockingly important to an enterprise’s data integrity, however.  Rather than…


fghfghfgh test