test text 11 top
title test
Cybercrime has been on the rise as criminals have gone from robbing banks to hacking into checking accounts. Most recently, the war in Ukraine has highlighted another aspect of cybercrime: state actors. State actors are actually one of the most active types of hackers. The war in Ukraine began with cyberattacks that targeted military and…
The Olympics are back. More than 150,000 people from around the world are traveling to Beijing to experience the historic event. But large scale sporting events are a common target for cyberattacks, and the Olympic games are no exception.
As a component of our vision of our Cybersecurity Experience (CSX) Platform, to offer simplicity and groundbreaking ease-of-use for businesses and organizations around the world, we understand there is an ever-present and growing requirement for collaboration. Customers
Geva called Perimeter 81 and told them that he needed 100 licenses ASAP since they expected to send their whole company home. “Deployment was swift. Within two days, I had installed 100 licenses, and people were able to work from home. Perimeter 81 was a life-saver for our business.”
Announcing the new Perimeter 81 Secure Web Gateway (SWG)! Perimeter 81 now provides secure Internet access with our famous one-click deployment.
Imagine a new world where people can work wherever and however they please. A world where cybersecurity offers IT and security professionals the radical simplicity to confidently and successfully overcome whatever challenges and cyber threats that may lie ahead.
“Hybrid and remote work is definitely here to stay,” says Amit Bareket, CEO of Perimeter 81. “A remarkable 87% of responding companies will have hybrid workers even after Covid—and more than half of them will work remotely three to four days a week. This is a dramatic development that permanently increases the size of the…
The problem of cyber complexity didn’t just start today. Both Amit and I saw it in our first IT jobs after finishing our degrees at Tel Aviv University. We saw that the complexity of VPNs and other cyber solutions hindered productivity and made them less effective in providing essential cybersecurity. Sure, change is inevitable, but…
Because of RDP, Meredtih Sleep Centres were getting hacked every month. After detecting a ransomware attack, the IT Manager would have to shut down the network for an hour and roll back the systems.
The Security Innovation Network (SINET) has selected Zero Trust Network Access and SASE leader Perimeter 81 to win the annual SINET16 Innovator award. The award is given to the 16 most “innovative and compelling” companies addressing cybersecurity threats and vulnerabilities.
Security admins using Perimeter 81 to manage their networks will be able to generate an API key and securely link it with another API-enabled service, allowing them to manipulate network security settings without entering the Perimeter 81 platform.
Perimeter 81 has won a Gold Stevie® Award in the Founding Team of the Year category in The 18th Annual International Business Awards® (IBAs). According to the IBA judges, company co-founders, Amit Bareket and Sagi Gidali, are an “entrepreneurial dynamic duo” delivering a “masterclass in business development.”
On July 22, 2021, Kaseya announced it had obtained a REvil ransomware decryptor “from a third party.” They claim that they didn’t pay the ransom.
The world of cybersecurity is undergoing an incredible transformation birthed by the introduction of Secure Access Service Edge, more commonly known as “SASE”. The core of SASE is to offer a unified cybersecurity solution that caters to all the unique cloud and network security needs harbored by any company. The arrival of SASE is already…
With the rise of remote and hybrid work following COVID-19, IT teams are growing increasingly frustrated with the overload of security tools and products, more commonly known as tool sprawl. In fact, the average IT team is using between 10-30 security monitoring solutions for applications, network infrastructures, and cloud environments according to a recent 451…
Remote work has redefined how businesses operate, emphasizing flexibility and productivity. However, ensuring both efficiency and security in a remote work environment requires thoughtful strategies. As remote employees and remote teams continue to evolve, organizations must adopt best practices that protect sensitive data and maintain engagement across the entire team. Below, we explore critical WFH…
Zero trust promises a new approach to cybersecurity modeling: often contrasted against the traditional castle-and-moat style of architecture. It aims to eradicate any trust that is inherited and shared between an organization’s devices and data. However, this radical re-positioning of security controls and access provisioning comes with challenges. In this guide, we address those that…
The remote work environment is attractive to malicious actors, who capitalize on unsecured networks, public Wi-Fi, and personally owned devices to infiltrate sensitive systems. As businesses adapt to this new normal, it’s essential to address the most common cybersecurity risks and implement a robust security strategy to protect sensitive company data and maintain the integrity…
fghfghfgh test