Secure Network Access For The Modern Distributed Workforce

Promotion

There is a growing demand for secure and scalable solutions for network access. It is time to look beyond the legacy hardware solutions and look into the future with a more secure and modern approach to network security.

Now, The research firm, Forrester has named Israeli cyber security company Perimeter 81 as one of the top five leaders in the area of Zero-Trust Network Access. 

Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilises the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers.

This is the first time that Forrester has addressed Zero-Trust Network Access (ZTNA), which is considered a growing field in the cyber security industry. The Zero Trust Network Access Report Q3 2021 says that “Perimeter 81’s ZTNA management is intuitive and modern” and that “its reference customers are among the most enthusiastic of those included in this evaluation.” 

When a company’s digital assets have to traverse long distances on the unsafe paths of the Internet, the stakes are so high that you can trust nothing and no one. That’s why you should adopt the zero-trust network model to restrict all users’ access to all network resources at all times.

Forrester found that “Perimeter 81’s ZTNA management is intuitive and modern. Its ability to handle nonweb applications like VoIP is a major differentiator in this field.” 

They also noted that Perimeter 81 is “the best fit for smaller enterprises that need ZTNA as a service, quickly. Its self-service portal allows smaller organisations to sign up quickly and onboard dozens of applications in less than a month.” In addition, Forrester noted that “Perimeter 81 reference customers are among the most enthusiastic of those included in this evaluation. They extol the vendor relationship, support, and dedication to improving the product quickly.”

“The downside of flexible, hybrid work is that it has increased the attack surface of every company,” says Sagi Gidali, CPO and Co-Founder of Perimeter 81. “The recent wave of data breaches and ransomware, from the Colonial Pipeline to the T-Mobile breach, has demonstrated that secure access is a must-have for businesses of all types and sizes... As a young, rapidly growing company, we are especially grateful for the industry recognition...  We believe both are a testament to our determination to provide the highest levels of cybersecurity with a relentless commitment to our customers’ success.”

Perimeter 81 simplifies cyber security and secure network access for the hybrid workforce by transforming multiple outdated, complex, hardware-based network security technologies into a single, easy-to-use, cloud-based security platform, including Zero Trust Network Access, Firewall as a Service, VPN as a Service, Device Posture Security and more. 

The company’s offering is designed to be easy to buy, quick to implement, and simple to use on a day-to-day basis, both for IT professionals and non-technical users of networking resources.

Perimeter81 offers two approaches to managing and keeping an organisation’s applications and networks secure, both on cloud and on-premises environments. The two proposals start from offering zero-trust networks as a service. To do this, Perimeter 81 uses a software-defined perimeter architecture, which provides great flexibility to onboard new users and offers greater visibility into the network. In addition, the service is compatible with the main cloud infrastructure providers.

Zero Trust Application Access is based on the assumption that every company has critical applications and services that most users do not need access to. The service allows raising barriers to specific users based on their roles, devices, locations, and other identifiers.

Forrester make special reference to Perimeter 81’s ability to handle non-web applications like VoIP as its major differentiator, but says it still needs to add integration with Microsoft endpoint security and apply more inline security and analytics. By transforming the outdated, hardware-based security appliances into a cloud-based SaaS solution, the company is simplifying network security for the modern and distributed workforce and helping organisations of all sizes and in many industries to secure their remote workers.

Since its founding, Perimeter 81 has quickly gained traction in the Secure Access Service Edge (SASE) and Network-as-a-Service market, and is transforming the way companies consume cyber and network security. The company has been named a Gartner Cool Vendor, holds a patent for Automatic Wi-Fi Security, and is considered by industry leaders to be winning the “SASE space race”.

For more information and to requesta demo please click here:  Perimeter81  

 Business Wire:       CTech:      Newsbreak:     Geekflare:     Okta:       Silicon Review:

You Might Also Read:

Zero Trust - The New Standard Of Security:

 

« Mēris Botnet Goes Global
CYRIN Webinar - Stop Ransomware In Its Tracks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

Randaemon

Randaemon

RANDAEMON’s mission is to create True Random Number Generators (TRNG) that are hardware-based and integrated into System-on-Chip.

Falconfeeds

Falconfeeds

Falconfeeds empowers businesses and security professionals with immediate access to the latest and historical threat intelligence data.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

CloudGuard

CloudGuard

CloudGuard is an AI-driven XDR platform that helps organisations to proactively detect and automatically remediate threats in real-time.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

Redapt

Redapt

Redapt is an end-to-end technology solutions provider that brings clarity to a dynamic technical environment.