Audience

Simplifying network security for clients worldwide.

About Perimeter 81

Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud.

Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers.
Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race".

Pricing

Starting Price:
$8 per user per month

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Perimeter 81
Founded: 2018
Israel
www.perimeter81.com

Videos and Screen Captures

Product Details

System Requirements

SaaS
Windows
Mac
Linux
iPhone
iPad
Android

Training

Documentation
Live Online
Webinars
In Person

Support

Business Hours
24/7 Live Support
Online

help_center_black_24dp Perimeter 81 Frequently Asked Questions

Q: What kinds of users and organization types does Perimeter 81 work with?
Q: What languages does Perimeter 81 support in their product?
Q: What kind of support options does Perimeter 81 offer?
Q: What other applications or services does Perimeter 81 integrate with?
Q: Does Perimeter 81 have a mobile app?
Q: What type of training does Perimeter 81 provide?
Q: How much does Perimeter 81 cost?
Q: What pricing for training is available for Perimeter 81?

Perimeter 81 Product Features

Cloud Management

Supply Monitoring
Cost Management
Multi-Cloud Management
Access Control
Billing & Provisioning
Performance Analytics
Demand Monitoring
SLA Management
Workflow Approval
Capacity Analytics

IT Management

Remote Access
Event Logs
Software Inventory
Patch Management
License Management
IT Budgeting
Hardware Inventory
Capacity Monitoring
Scheduling
Compliance Management
User Activity Monitoring

IT Security

IP Protection
Two-Factor Authentication
Web Threat Management
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Vulnerability Scanning
Web Traffic Reporting

Network Security

Access Control
Firewalls
VPN
Analytics / Reporting
Internet Usage Monitoring
Intrusion Detection System
Threat Response
Vulnerability Scanning