What Is Perimeter 81?

Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use and unified network security stack. With a global network of PoPs, Perimeter 81 offers secure network capabilities managed over our multi-tenant cloud and highly scalable for organizations worldwide.

With Perimeter 81, you can easily move your resources to the cloud, manage team member access from anywhere and gain network visibility in an all-in-one cloud management portal.

Who Uses Perimeter 81?

From small businesses to large enterprises, Perimeter 81 is the go-to security solution for thousands of companies worldwide. Perimeter 81 seamlessly integrates with major cloud service providers.

Where can Perimeter 81 be deployed?

Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop), Linux (Desktop), Windows (On-Premise), Linux (On-Premise), Android (Mobile), iPhone (Mobile), iPad (Mobile)

About the vendor

  • by Perimeter 81
  • Located in Tel Aviv, Israel
  • Founded in 2018
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Countries available

Australia, Belgium, Canada, Denmark, Finland and 20 others

Languages

English

Perimeter 81 pricing

Starting Price:

US$15.00/month
  • No free trial
  • No free version

Perimeter 81 does not have a free version and does not offer a free trial. Perimeter 81 paid version starts at US$15.00/month.

Pricing plans

About the vendor

  • by Perimeter 81
  • Located in Tel Aviv, Israel
  • Founded in 2018
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Countries available

Australia, Belgium, Canada, Denmark, Finland and 20 others

Languages

English

Perimeter 81 videos and images

Perimeter 81 video
Perimeter 81 Software - 1 - thumbnail
Perimeter 81 Software - 2 - thumbnail
Perimeter 81 Software - 3 - thumbnail
Perimeter 81 Software - 4 - thumbnail
Perimeter 81 Software - 5 - thumbnail

Perimeter 81 Features

  • API
  • Activity Dashboard
  • Alerts/Notifications
  • Audit Management
  • Automatic Backup
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Compliance Management
  • Compression
  • Continuous Backup
  • Customizable Reports
  • Data Import/Export
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronization
  • Disaster Recovery
  • Document Storage
  • Email Alerts
  • Encryption
  • File Transfer
  • Incident Management
  • Incremental Backup
  • Local Server Options
  • Mobile Alerts
  • Monitoring
  • Multiple Format Support
  • Multiple System Support
  • Optical Character Recognition
  • Performance Metrics
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Server Options
  • Reporting & Statistics
  • Retention Policy
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Status Tracking
  • Storage Quantity Control
  • Task Management
  • Third Party Integrations
  • Version Control
  • Web Access / Restoration
  • Workflow Management

View full list of Business Continuity

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Alerts/Notifications
  • Anti Virus
  • Audit Management
  • Behavioral Analytics
  • Cloud Application Security
  • Cloud Encryption
  • Cloud Security Policy Management
  • Compliance Management
  • Data Visualization
  • Encryption
  • Endpoint Management
  • Event Logs
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • Patch Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Assessment
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Single Sign On
  • Status Tracking
  • Third Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Management
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning

View full list of Cloud Security

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavior Tracking
  • Behavioral Analytics
  • Collaboration Tools
  • Compliance Management
  • DDoS Protection
  • Data Security
  • Data Visualization
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Firewalls
  • HIPAA Compliant
  • IOC Verification
  • Incident Management
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Cybersecurity

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavioral Analytics
  • Compliance Management
  • Customizable Reports
  • Data Visualization
  • Device Management
  • Encryption
  • Event Logs
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting/Analytics
  • Risk Analytics
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Summary Reports
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting

View full list of Endpoint Protection

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Behavior Tracking
  • Compliance Management
  • Content Filtering
  • Customizable Reports
  • Dashboard Creation
  • Event Logs
  • Filtering
  • Hardware Integration
  • IP Filtering
  • Incident Management
  • Intrusion Detection System
  • Intrusion Prevention System
  • Log Access
  • Monitoring
  • Multi-Location
  • Network Monitoring
  • Next-Generation Firewall
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Role-Based Permissions
  • SSL Security
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Summary Reports
  • Two-Factor Authentication
  • Uptime Reporting
  • VPN Software
  • Visual Analytics
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Firewall

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Audit Management
  • Audit Trail
  • Capacity Management
  • Change Management
  • Chat/Messaging
  • Compliance Management
  • Configurable Workflow
  • Configuration Management
  • Customizable Branding
  • Customizable Reports
  • Dashboard
  • Data Import/Export
  • Data Visualization
  • Event Logs
  • IT Asset Tracking
  • IT Reporting
  • Incident Management
  • Inventory Management
  • Issue Auditing
  • Knowledge Management
  • License Management
  • Maintenance Scheduling
  • Monitoring
  • Patch Management
  • Performance Metrics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Updates
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • SSL Security
  • Self Service Portal
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Single Sign On
  • Task Management
  • Third Party Integrations
  • Ticket Management
  • Uptime Reporting
  • User Management
  • Workflow Management

View full list of IT Management

  • API
  • Access Certification
  • Access Controls/Permissions
  • Access Management
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Application Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Biometrics
  • Collaboration Tools
  • Compliance Management
  • Credential Management
  • Customizable Branding
  • Data Storage Management
  • Data Synchronization
  • Data Verification
  • Event Logs
  • Fraud Detection
  • HIPAA Compliant
  • Member Accounts
  • Mobile Access
  • Monitoring
  • Multi-Factor Authentication
  • Multiple User Accounts
  • PCI Compliance
  • Password Management
  • Policy Management
  • Privileged Account Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Reporting & Statistics
  • Role-Based Permissions
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Self Service Portal
  • Self-Service Access Request
  • Single Sign On
  • Third Party Integrations
  • Two-Factor Authentication
  • Unified Directory
  • User Management
  • User Provisioning
  • Workflow Management

View full list of Identity Management

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Data Visualization
  • Email Alerts
  • Event Logs
  • Event Tracking
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • VPN Software
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Workflow Management

View full list of Network Security

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Management
  • Activity Tracking
  • Application Access Control
  • Approval Process Control
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioral Analytics
  • Biometrics
  • Compliance Management
  • Configurable Workflow
  • Credential Management
  • Data Synchronization
  • Data Verification
  • Endpoint Management
  • Event Logs
  • File Management
  • HIPAA Compliant
  • Incident Management
  • Least Privilege
  • Member Accounts
  • Monitoring
  • Multi-Factor Authentication
  • Multiple Data Sources
  • Multiple User Accounts
  • PCI Compliance
  • Password Management
  • Policy Management
  • Real Time Monitoring
  • Remote Access Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Role-Based Permissions
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Self Service Portal
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Activity Monitoring
  • User Management
  • Workflow Management

View full list of Privileged Access Management

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Anti Virus
  • Asset Lifecycle Management
  • Audit Management
  • Audit Trail
  • Automatic Backup
  • Compliance Management
  • Configuration Management
  • Customizable Branding
  • Customizable Reports
  • Deployment Management
  • Event Logs
  • For MSPs
  • IT Asset Management
  • IT Asset Tracking
  • Inventory Management
  • Maintenance Scheduling
  • Mobile Access
  • Monitoring
  • Multiple User Accounts
  • Network Monitoring
  • Patch Management
  • Policy Management
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Alerts
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Role-Based Permissions
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Summary Reports
  • Support Ticket Management
  • Task Management
  • Task Scheduling
  • Third Party Integrations
  • Uptime Reporting
  • Usage Tracking/Analytics
  • User Management
  • Vulnerability Scanning
  • Workflow Management

View full list of Remote Monitoring and Management

  • @mentions
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Assignment Management
  • Calendar Management
  • Chat/Messaging
  • Collaboration Tools
  • Commenting/Notes
  • Communication Management
  • Customizable Branding
  • Customizable Templates
  • Data Import/Export
  • Document Management
  • Document Storage
  • Drag & Drop
  • Electronic Signature
  • Email Management
  • Employee Activity Monitoring
  • File Management
  • File Transfer
  • Live Chat
  • Meeting Management
  • Monitoring
  • Prioritization
  • Progress Tracking
  • Project Time Tracking
  • Projections
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real-time Updates
  • Remote Access/Control
  • Remote Support Software
  • Reporting & Statistics
  • SSL Security
  • Single Sign On
  • Softphone Software
  • Tagging
  • Task Management
  • Task Progress Tracking
  • Task Scheduling
  • Third Party Integrations
  • Time Zone Tracking
  • Two-Way Audio & Video
  • Video Chat
  • Video Conferencing
  • Workflow Management

View full list of Remote Work

  • API
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavior Analytics
  • Cloud Backup
  • Customizable Reports
  • Data Visualization
  • Event Analysis
  • Event Logs
  • IT Reporting
  • Incident Reporting
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Prioritization
  • Profiling
  • Real Time Analytics
  • Real Time Data
  • Real Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Server Monitoring
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Web-Application Security

View full list of Threat Intelligence

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Management
  • Activity Tracking
  • Anonymous Browsing
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Authentication
  • Certification Tracking
  • Compliance Management
  • DNS Leak Protection
  • Data Storage Management
  • Email Alerts
  • Event Logs
  • Exceptions Management
  • Geolocation
  • Kill Switch
  • Member Accounts
  • Mobile Access
  • Mobile Alerts
  • Monitoring
  • Multi-Language
  • Multi-Location
  • Multi-Protocol
  • Offline Access
  • Peer-to-Peer
  • Performance Testing Tools
  • Policy Management
  • Product Catalog
  • Real Time Monitoring
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Route Management
  • Rules-Based Workflow
  • SSL Security
  • Scheduling
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Transaction Monitoring
  • Two-Factor Authentication
  • Uptime Reporting
  • User Management
  • Web Inspection

View full list of VPN

Perimeter 81 Alternatives

More Perimeter 81 alternatives

Perimeter 81 Reviews

Read all 8 reviews

Average score

Overall
4.5
Ease of Use
4.9
Customer Service
5
Features
4.4
Value for Money
4.6

Reviews by score

5
4
4
4

Reviews by company size (employees)

  • <50
  • 51-200
  • 201-1,000
  • >1,001
Verified Reviewer
CEO in Israel
Verified LinkedIn User
Wholesale, 11-50 Employees
Used the Software for: 6-12 months
Reviewer Source

Easy to secure our salesmen

5 3 years ago

Comments: Run a team of 25 salesmen with laptops around the world connecting themselves form a hotel or coffee shop. Before lots of headaches with clients, updates, etc. Now nothing.

Pros:

That I can secure my team without headaches.

Cons:

No cons at all. Management and starting up running the software is super easy.

Domenico P.
Presales Engineer in Netherlands
Computer & Network Security, 2-10 Employees
Used the Software for: 6-12 months
Reviewer Source

Finally a safe and simple VPN

5 11 months ago

Comments: I can manage the onboarding and offboarding of external users and suppliers quickly and easily. I can also create WebApps to facilitate access for users or even IT administrators.

Pros:

It is a Cloud service that lightens management and maintenance activities, making the end user independent from expensive hardware solutions or complex software solutions. It integrates seamlessly with many identity management solutions. Unlike other VPN solutions, it also contains many features that increase the security of users' endpoints (eg DNS filtering and VPN Kill).

Cons:

I believe that password management and synchronization with IdPs can be improved, it would also be necessary to make it possible to create granular access rules.

Philip W.
Head of Security in UK
Financial Services, 51-200 Employees
Used the Software for: 1+ year
Reviewer Source

Nice start up, but not fully matured yet.

4 6 months ago

Comments: We moved away from P81 due to it missing some features, however when speaking to them they were on the road map. I think the product has a lot of potential to grow and evolve.

Pros:

Easy to use, some nice features as well. Easy to manage.

Cons:

Not enough on the security side Poor logging No good traffic views or IPS/IDS ability

Khurram M.
Consultant in Canada
Accounting, 2-10 Employees
Used the Software for: 6-12 months
Reviewer Source

Perimeter 81 review

4 5 months ago

Pros:

It provides a user-friendly, equally safe interface and flexible remotely accessible environment ideally suited for small businesses.

Cons:

Occasional issues with connectivity and performance scalability

Chris R.
Director of Data Operations in US
Publishing, 11-50 Employees
Used the Software for: 1-5 months
Reviewer Source

Awesome support experience

5 3 years ago

Comments: I've found their support and software to be simple yet competent at every level.

Pros:

Easily configurable cloud VPN with convenient software and excellent support. I was able to easily configure clients on mac, windows, and even ubuntu, and their excellent support team helped us to get our AWS VPC networked with the VPN.

Cons:

No issues so far. Some sites were able to detect and block traffic as a proxy, but that hasn't been an issue.