test text 11 top

test list

We’re a studio in Berlin with an international practice in architecture, urban planning and interior design. We believe in sharing knowledge and promoting dialogue to increase the creative potential of collaboration.

title test

  • The Russia vs. Ukraine War: Cybersecurity Threats & Best Practices

    The Russia vs. Ukraine War: Cybersecurity Threats & Best Practices

    Cybercrime has been on the rise as criminals have gone from robbing banks to hacking into checking accounts. Most recently, the war in Ukraine has highlighted another aspect of cybercrime: state actors. State actors are actually one of the most active types of hackers. The war in Ukraine began with cyberattacks that targeted military and…


  • 5 Tips for Maximizing Your Cybersecurity at the 2022 Olympics

    5 Tips for Maximizing Your Cybersecurity at the 2022 Olympics

    The Olympics are back. More than 150,000 people from around the world are traveling to Beijing to experience the historic event. But large scale sporting events are a common target for cyberattacks, and the Olympic games are no exception. 


  • An Inside Look at Perimeter 81’s Technology Alliances Partner Program

    An Inside Look at Perimeter 81’s Technology Alliances Partner Program

    As a component of our vision of our Cybersecurity Experience (CSX) Platform, to offer simplicity and groundbreaking ease-of-use for businesses and organizations around the world, we understand there is an ever-present and growing requirement for collaboration. Customers


  • Brack Capital Migrates 100 Users to WFH in Two Days With Cloud VPN

    Brack Capital Migrates 100 Users to WFH in Two Days With Cloud VPN

    Geva called Perimeter 81 and told them that he needed 100 licenses ASAP since they expected to send their whole company home. “Deployment was swift. Within two days, I had installed 100 licenses, and people were able to work from home. Perimeter 81 was a life-saver for our business.”


  • The Time for a Radically Simple Secure Web Gateway (SWG) Has Arrived

    The Time for a Radically Simple Secure Web Gateway (SWG) Has Arrived

    Announcing the new Perimeter 81 Secure Web Gateway (SWG)! Perimeter 81 now provides secure Internet access with our famous one-click deployment.


  • Top 5 Cybersecurity Predictions for 2022

    Top 5 Cybersecurity Predictions for 2022

    Imagine a new world where people can work wherever and however they please. A world where cybersecurity offers IT and security professionals the radical simplicity to confidently and successfully overcome whatever challenges and cyber threats that may lie ahead.


  • A Deep Dive into the New Cybersecurity Experience Platform

    A Deep Dive into the New Cybersecurity Experience Platform

    Imagine a new world where people can work wherever and however they please. A world where cybersecurity offers IT and security professionals the radical simplicity to confidently and successfully overcome whatever challenges and cyber threats that may lie ahead.


  • 71% of VPs and CIOs Have Difficulty in Combating Cyberattacks due to Complexity

    71% of VPs and CIOs Have Difficulty in Combating Cyberattacks due to Complexity

    “Hybrid and remote work is definitely here to stay,” says Amit Bareket, CEO of Perimeter 81. “A remarkable 87% of responding companies will have hybrid workers even after Covid—and more than half of them will work remotely three to four days a week. This is a dramatic development that permanently increases the size of the…


  • The Birth of the Cybersecurity Experience Platform

    The Birth of the Cybersecurity Experience Platform

    The problem of cyber complexity didn’t just start today. Both Amit and I saw it in our first IT jobs after finishing our degrees at Tel Aviv University. We saw that the complexity of VPNs and other cyber solutions hindered productivity and made them less effective in providing essential cybersecurity.  Sure, change is inevitable, but…


  • Signpost Deploys NaaS and Goes Officeless During the Second Wave of Covid

    Signpost Deploys NaaS and Goes Officeless During the Second Wave of Covid

    Because of RDP, Meredtih Sleep Centres were getting hacked every month. After detecting a ransomware attack, the IT Manager would have to shut down the network for an hour and roll back the systems.


  • How to Jump-Start Startup Success

    How to Jump-Start Startup Success

    The Security Innovation Network (SINET) has selected Zero Trust Network Access and SASE leader Perimeter 81 to win the annual SINET16 Innovator award. The award is given to the 16 most “innovative and compelling” companies addressing cybersecurity threats and vulnerabilities.    


  • Now Live: Perimeter 81’s New API Support for Cybersecurity

    Now Live: Perimeter 81’s New API Support for Cybersecurity

    Security admins using Perimeter 81 to manage their networks will be able to generate an API key and securely link it with another API-enabled service, allowing them to manipulate network security settings without entering the Perimeter 81 platform. 


  • Perimeter 81 Wins 2021 Gold Stevie® International Business Award®

    Perimeter 81 Wins 2021 Gold Stevie® International Business Award®

    Perimeter 81 has won a Gold Stevie® Award in the Founding Team of the Year category in The 18th Annual International Business Awards® (IBAs). According to the IBA judges, company co-founders, Amit Bareket and Sagi Gidali, are an “entrepreneurial dynamic duo” delivering a “masterclass in business development.”


  • To Pay or Not to Pay? The Kaseya Malware Hack Revisited.

    To Pay or Not to Pay? The Kaseya Malware Hack Revisited.

    On July 22, 2021, Kaseya announced it had obtained a REvil ransomware decryptor “from a third party.” They claim that they didn’t pay the ransom.


  • Putting an End to Ransomware Attacks with Perimeter 81

    Putting an End to Ransomware Attacks with Perimeter 81

    Because of RDP, Meredtih Sleep Centres were getting hacked every month. After detecting a ransomware attack, the IT Manager would have to shut down the network for an hour and roll back the systems.


  • Debunking The Top 5 SASE Myths and Discovering its Business Benefits

    Debunking The Top 5 SASE Myths and Discovering its Business Benefits

    The world of cybersecurity is undergoing an incredible transformation birthed by the introduction of Secure Access Service Edge, more commonly known as “SASE”. The core of SASE is to offer a unified cybersecurity solution that caters to all the unique cloud and network security needs harbored by any company. The arrival of SASE is already…


  • [Infographic] SASE for Superheroes – Defending Your Perimeter and Beyond

    [Infographic] SASE for Superheroes – Defending Your Perimeter and Beyond

    With the rise of remote and hybrid work following COVID-19, IT teams are growing increasingly frustrated with the overload of security tools and products, more commonly known as tool sprawl.  In fact, the average IT team is using between 10-30 security monitoring solutions for applications, network infrastructures, and cloud environments according to a recent 451…


  • 10 WFH Best Practices On How To Stay Secure

    10 WFH Best Practices On How To Stay Secure

    Remote work has redefined how businesses operate, emphasizing flexibility and productivity. However, ensuring both efficiency and security in a remote work environment requires thoughtful strategies. As remote employees and remote teams continue to evolve, organizations must adopt best practices that protect sensitive data and maintain engagement across the entire team.  Below, we explore critical WFH…


  • Zero Trust Implementation Challenges, and How to Overcome Them

    Zero Trust Implementation Challenges, and How to Overcome Them

    Zero trust promises a new approach to cybersecurity modeling: often contrasted against the traditional castle-and-moat style of architecture. It aims to eradicate any trust that is inherited and shared between an organization’s devices and data.  However, this radical re-positioning of security controls and access provisioning comes with challenges. In this guide, we address those that…


  • 8 Most Common Cybersecurity Risks in WFH

    8 Most Common Cybersecurity Risks in WFH

    The remote work environment is attractive to malicious actors, who capitalize on unsecured networks, public Wi-Fi, and personally owned devices to infiltrate sensitive systems. As businesses adapt to this new normal, it’s essential to address the most common cybersecurity risks and implement a robust security strategy to protect sensitive company data and maintain the integrity…


fghfghfgh test