Perimeter 81 status
Author: k | 2025-04-24
What is the current Perimeter 81 status? Perimeter 81 is currently operational. You can check Perimeter 81 status and incident details on the top of the page. The status is updated in almost
status.perimeter81.com - Perimeter 81 Status - Status Perimeter 81
84 Followers on Owler is an Israel-based cybersecurity platform that offers solutions such as network visibility and data protection for sectors including healthcare and finance... Read moreOverviewCompetitorsFundingNews & InsightsPerimeter 81 is an Israel-based cybersecurity platform that offers solutions such as network visibility and data protection for sectors including healthcare and finance... Read moreCo-Founder & CEOAmit BareketCEO Approval Rating86/1002018Tel AvivTel Aviv DistrictPrivateAcquired by Check Point Software Technologies Ltd.Software, Internet & Computer ServicesSecurity Software73737371 NAICS listing Annual Revenue$5.0-25MAgree?Est. Employees250-500Agree?Funding$159.5MNewsOct 18, 2023CRN AustraliaPerimeter 81: Pax8 adds network security vendor Perimeter 81 to cloud marketplaceSep 18, 2023Intelligent Tech ChannelsPerimeter 81: Check Point Software completes acquisition of Perimeter 81Aug 13, 2023NoCamelsPerimeter 81: Check Point Buys Israeli Firm Securing Remote Work For $490MAug 10, 2023TechCrunchPerimeter 81: Check Point buys Perimeter 81 for $490M to enhance its security tools for hybrid and remote workersJul 24, 2023SecurityWeekPerimeter 81: Perimeter81 Vulnerability Disclosed After Botched Disclosure ProcessMay 05, 2023CRNPerimeter 81: Perimeter 81 CEO On The SASE Platform As A 'Painkiller, Not A Vitamin' For Partners, End Customers | CRNApr 13, 2023EIN PresswirePress Release: Perimeter 81 : Multipoint Group Partners with Perimeter 81 to Deliver Its Secure Network GloballyMar 30, 2023Picante TodayPerimeter 81: Perimeter 81 Named a Top Partner Program in CRN's 2023 GuideMar 01, 2023Picante TodayPerimeter 81: Perimeter 81 Recognized Among IT Security Leaders on CRN's 2023 Security 100 ListFeb 22, 2023Help Net SecurityPerimeter 81: Perimeter 81 and TD SYNNEX provide secure network access for the modern workforcePerimeter 81 Competitors12345678910Unlock 10 + competitorsTrending Companies What is the current Perimeter 81 status? Perimeter 81 is currently operational. You can check Perimeter 81 status and incident details on the top of the page. The status is updated in almost Perimeter 81 Zero-Trust Applications not working? Check what's wrong with Perimeter 81 Zero-Trust Applications right now. Receive alerts for Perimeter 81 Zero-Trust Applications status The need for a Firewall as a Service architectureKey benefits of adopting a FWaaS solutionUnique advantages of Perimeter 81’s FWaaS offeringWhat Do Perimeter 81 Customers Say?Perimeter 81 provides us with reliable low-touch and multi-platform access control in a complete Network as a Service. The easy-to-use web UI with centralized administration options demonstrates a clear advantage – we can deploy changes from anywhere and have new configurations live in minutes.Since we have a small IT team, Perimeter 81 is really the most valuable solution for me and the entire company. Knowing that every employee is securely accessing our system and resources while using Perimeter 81 makes my job a whole lot easier.Maks SuskiIT Manager of KustomerWe see Perimeter 81 as a true visionary and real leader in the network and cybersecurity space. With their highly intuitive and feature-rich SASE solution, they are at the forefront of a critical cybersecurity market transformation, where cloud-native, holistic services are now more important than ever.Michael KenneyVice President of Strategy & Corporate DevelopmentComments
84 Followers on Owler is an Israel-based cybersecurity platform that offers solutions such as network visibility and data protection for sectors including healthcare and finance... Read moreOverviewCompetitorsFundingNews & InsightsPerimeter 81 is an Israel-based cybersecurity platform that offers solutions such as network visibility and data protection for sectors including healthcare and finance... Read moreCo-Founder & CEOAmit BareketCEO Approval Rating86/1002018Tel AvivTel Aviv DistrictPrivateAcquired by Check Point Software Technologies Ltd.Software, Internet & Computer ServicesSecurity Software73737371 NAICS listing Annual Revenue$5.0-25MAgree?Est. Employees250-500Agree?Funding$159.5MNewsOct 18, 2023CRN AustraliaPerimeter 81: Pax8 adds network security vendor Perimeter 81 to cloud marketplaceSep 18, 2023Intelligent Tech ChannelsPerimeter 81: Check Point Software completes acquisition of Perimeter 81Aug 13, 2023NoCamelsPerimeter 81: Check Point Buys Israeli Firm Securing Remote Work For $490MAug 10, 2023TechCrunchPerimeter 81: Check Point buys Perimeter 81 for $490M to enhance its security tools for hybrid and remote workersJul 24, 2023SecurityWeekPerimeter 81: Perimeter81 Vulnerability Disclosed After Botched Disclosure ProcessMay 05, 2023CRNPerimeter 81: Perimeter 81 CEO On The SASE Platform As A 'Painkiller, Not A Vitamin' For Partners, End Customers | CRNApr 13, 2023EIN PresswirePress Release: Perimeter 81 : Multipoint Group Partners with Perimeter 81 to Deliver Its Secure Network GloballyMar 30, 2023Picante TodayPerimeter 81: Perimeter 81 Named a Top Partner Program in CRN's 2023 GuideMar 01, 2023Picante TodayPerimeter 81: Perimeter 81 Recognized Among IT Security Leaders on CRN's 2023 Security 100 ListFeb 22, 2023Help Net SecurityPerimeter 81: Perimeter 81 and TD SYNNEX provide secure network access for the modern workforcePerimeter 81 Competitors12345678910Unlock 10 + competitorsTrending Companies
2025-04-01The need for a Firewall as a Service architectureKey benefits of adopting a FWaaS solutionUnique advantages of Perimeter 81’s FWaaS offeringWhat Do Perimeter 81 Customers Say?Perimeter 81 provides us with reliable low-touch and multi-platform access control in a complete Network as a Service. The easy-to-use web UI with centralized administration options demonstrates a clear advantage – we can deploy changes from anywhere and have new configurations live in minutes.Since we have a small IT team, Perimeter 81 is really the most valuable solution for me and the entire company. Knowing that every employee is securely accessing our system and resources while using Perimeter 81 makes my job a whole lot easier.Maks SuskiIT Manager of KustomerWe see Perimeter 81 as a true visionary and real leader in the network and cybersecurity space. With their highly intuitive and feature-rich SASE solution, they are at the forefront of a critical cybersecurity market transformation, where cloud-native, holistic services are now more important than ever.Michael KenneyVice President of Strategy & Corporate Development
2025-04-23Perimeter 81 is dedicated to making network security as simple and seamless as possible, and that has meant prioritizing technologies to help IT admins manage the many security settings present in their corporate resources.That’s why we’re so pleased to introduce our SCIM integration for Okta and Azure AD to all our Enterprise customers, allowing continuous syncing between Perimeter 81 provisioning and updates in the corporate Identity Provider (IdP).As our customers know, the way that they’re able to take advantage of automatic Zero Trust, least-privilege access is by integrating an Identity Provider (IdP) and sorting users into groups with specific security configurations and access permissions.But these settings won’t be the same forever. For example, when an employee leaves the company, switches departments or is promoted, the resources they can or cannot access and the security tools configured for them will change. Critically, they must change in the same way both within the IdP and the Perimeter 81 platform in order to avoid creating configuration gaps.Ensuring consistency for this ever-evolving identity lifecycle is something that security professionals are responsible for, and that’s where the System for Cross-domain Identity Management (SCIM) comes in.Don’t Sleep on SCIMSCIM is an open standard that automates user provisioning and de-provisioning between Identity Providers and software that integrates identity data for the purpose of security, such as Perimeter 81. While it’s easy to import IdP data into Perimeter 81 and onboard existing security settings, it’s now just as simple to alter or remove those settings in your Okta or Azure AD IdP and see them automatically reflected in Perimeter 81.Syncing of user settings helps admins automate the user identity lifecycle management process. It also makes user data more secure, and boosts the scalability of security. As companies grow and experience turnover, de-provisioning employees is especially a priority in order to reduce the incidents of already-departed employees accessing the network.With SCIM, IT departments no longer need to spend time developing or constantly updating custom integrations between directories to various external tools and apps. The peace of mind that employees get from Single Sign-On and IdP, can finally be enjoyed on the administration side as well.As companies continue to grow and create new workflows and adopt new resources, staying on top of these changes without fear of losing track of configurations or opening security gaps is confidence-inspiring. We hope our Enterprise customers take advantage of SCIM, and stay tuned for further updates!
2025-04-12An owner-manager is not going to have time to manage. Perimeter 81 lets you join all of your sites and cloud services together in a virtual network that connects remote workers, multiple sites, and SaaS applications, such as Microsoft 365.Once you have created your virtual network that links everyone together in a private system, you activate the Perimeter 81 FWaaS to filter traffic that is exchanged with outsiders. Although this all sounds complicated, if you can set up and use a firewall for your LAN, you can get this FWaaS working properly to protect all of your resources wherever they are with one unified set of security policies.The cost of this package works out a lot cheaper than buying a hardware firewall or installing firewall software in every location. You don’t have to force your home-based employees to install the firewall of your choice on their own computers because the Perimeter 81 FWaaS will protect their business traffic as well.Who is it recommended for?The Perimeter 81 platform offers a range of solutions that can be implemented by applying different components in the package. For example, it is possible to implement a Zero Trust Access and Single Sign-On environment for application access, so the cloud-based firewall is not the only tool offered by this system.Pros:A Package of Tools: Suitable for multiple strategiesMulti-Site Management: Makes this viable for MSPsMany Integrations: Includes LDAP, SAML, Okta, and Google WorkspacesFlexible Pricing: Four plan levels and a per-user rateLinks Users to Applications: Easy-to-use object-based configurationsCons:No Free Trial: A trial would be preferable over a demoThe Perimeter 81 package includes a number of security modules and you get all of them for a subscription with no contract fees. There are four editions, but the first of these, called Essentials, doesn’t include the FWaaS. The Premium edition is your cheapest option to get the FWaaS. This costs $12 per user per month plus $40 per location per site per month. This plan requires that you sign up for at least 10 users. EDITOR'S CHOICE Perimeter 81 is our top pick for a small business firewall because it is offered from the cloud and involves no upfront costs. You can protect multiple networks, servers, applications, and users with one account. This centralized approach to protecting many resources simplifies your efforts to keep your business protected against cybersecurity threats. The full Perimeter 81 will join up all of your users and sites into one private virtual network. Download: Get a demo Official Site: OS: Cloud based 2. Sophos FirewallOne of the highest-rated options in hardware firewalls is Sophos which promises to offer its users a secure solution to your internet security risks. Sophos offers both virtual and hardware firewall solutions. These when coupled with the powerful capabilities of the accompanying ML-based software allow the system to keep itself up-to-date with the latest risks and adapt to the changing networking requirements. The system smartly detects and filters compromised devices on the network and advises about the best possible course of action.Key
2025-04-22Applied to different environments.Networking and Security, UnifiedThe Perimeter 81 network security platform helps IT improve security, easily meet GDPR and other compliance standards and reduce the complication and overheads involved in defending a modern financial firm from data threats.Increase the speed and security of remote resource access for your employees, with local VPN gateways that provide encrypted, low-latency connections.Security professionals can design access profiles for different roles, devices, locations and administer them from one cloud platform.Least-privilege access and constant monitoring across the network ensures that hackers can’t move laterally across resources or do significant damage.Build your network in as little as 15 minutes, and add team members and groups, create and manage policies, and enforce security tools like 2FA, DNS filtering and more.Perimeter 81 is compliant with GDPR, SOC 2 Type 2, ISO 27001/2, HIPAA, HITRUST and other important data protection regulations.Integrate our solution across any major cloud providers and SaaS services, or your local solutions, enabling IT to get the full security picture no matter where or what.SASE is a Turnkey Security Solution for FinanceAs a SASE solution (Secure Access Service Edge), Perimeter 81 unifies your business’s networking and security tools and puts them in the cloud, providing a single solution for IT to secure customer data and critical corporate resources.Is your IT team ready to adopt Secure Access Service Edge?Have You Achieved This Security Checklist?Financial services providers are able to boost security in several key ways and easily exceed compliance requirements with Perimeter 81.Protect data transmission with bank-level
2025-04-12