Secure Network Access For The Modern Distributed Workforce

Promotion

There is a growing demand for secure and scalable solutions for network access. It is time to look beyond the legacy hardware solutions and look into the future with a more secure and modern approach to network security.

Now, The research firm, Forrester has named Israeli cyber security company Perimeter 81 as one of the top five leaders in the area of Zero-Trust Network Access. 

Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilises the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers.

This is the first time that Forrester has addressed Zero-Trust Network Access (ZTNA), which is considered a growing field in the cyber security industry. The Zero Trust Network Access Report Q3 2021 says that “Perimeter 81’s ZTNA management is intuitive and modern” and that “its reference customers are among the most enthusiastic of those included in this evaluation.” 

When a company’s digital assets have to traverse long distances on the unsafe paths of the Internet, the stakes are so high that you can trust nothing and no one. That’s why you should adopt the zero-trust network model to restrict all users’ access to all network resources at all times.

Forrester found that “Perimeter 81’s ZTNA management is intuitive and modern. Its ability to handle nonweb applications like VoIP is a major differentiator in this field.” 

They also noted that Perimeter 81 is “the best fit for smaller enterprises that need ZTNA as a service, quickly. Its self-service portal allows smaller organisations to sign up quickly and onboard dozens of applications in less than a month.” In addition, Forrester noted that “Perimeter 81 reference customers are among the most enthusiastic of those included in this evaluation. They extol the vendor relationship, support, and dedication to improving the product quickly.”

“The downside of flexible, hybrid work is that it has increased the attack surface of every company,” says Sagi Gidali, CPO and Co-Founder of Perimeter 81. “The recent wave of data breaches and ransomware, from the Colonial Pipeline to the T-Mobile breach, has demonstrated that secure access is a must-have for businesses of all types and sizes... As a young, rapidly growing company, we are especially grateful for the industry recognition...  We believe both are a testament to our determination to provide the highest levels of cybersecurity with a relentless commitment to our customers’ success.”

Perimeter 81 simplifies cyber security and secure network access for the hybrid workforce by transforming multiple outdated, complex, hardware-based network security technologies into a single, easy-to-use, cloud-based security platform, including Zero Trust Network Access, Firewall as a Service, VPN as a Service, Device Posture Security and more. 

The company’s offering is designed to be easy to buy, quick to implement, and simple to use on a day-to-day basis, both for IT professionals and non-technical users of networking resources.

Perimeter81 offers two approaches to managing and keeping an organisation’s applications and networks secure, both on cloud and on-premises environments. The two proposals start from offering zero-trust networks as a service. To do this, Perimeter 81 uses a software-defined perimeter architecture, which provides great flexibility to onboard new users and offers greater visibility into the network. In addition, the service is compatible with the main cloud infrastructure providers.

Zero Trust Application Access is based on the assumption that every company has critical applications and services that most users do not need access to. The service allows raising barriers to specific users based on their roles, devices, locations, and other identifiers.

Forrester make special reference to Perimeter 81’s ability to handle non-web applications like VoIP as its major differentiator, but says it still needs to add integration with Microsoft endpoint security and apply more inline security and analytics. By transforming the outdated, hardware-based security appliances into a cloud-based SaaS solution, the company is simplifying network security for the modern and distributed workforce and helping organisations of all sizes and in many industries to secure their remote workers.

Since its founding, Perimeter 81 has quickly gained traction in the Secure Access Service Edge (SASE) and Network-as-a-Service market, and is transforming the way companies consume cyber and network security. The company has been named a Gartner Cool Vendor, holds a patent for Automatic Wi-Fi Security, and is considered by industry leaders to be winning the “SASE space race”.

For more information and to requesta demo please click here:  Perimeter81  

 Business Wire:       CTech:      Newsbreak:     Geekflare:     Okta:       Silicon Review:

You Might Also Read:

Zero Trust - The New Standard Of Security:

 

« Mēris Botnet Goes Global
CYRIN Webinar - Stop Ransomware In Its Tracks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

Secure Innovations

Secure Innovations

Secure Innovations is a cybersecurity firm dedicated to providing top-tier cyber security solutions for the Defense and the Intelligence Community.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

CYSEC NG

CYSEC NG

Cyber Security Challenge Nigeria Initiative (CYSEC NG) is the first, and largest offensive premier Cyber Conference and Hacking event in Africa.

CyberCareers.gov

CyberCareers.gov

CyberCareers.gov is a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cybersecurity Employees, Students and Universities.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

Illustria

Illustria

Illustria is your agent-less “watchdog” for all open source libraries. Our mission is becoming a dev-velocity company, enabled via cyber security.