Secure Network Access For The Modern Distributed Workforce

Promotion

There is a growing demand for secure and scalable solutions for network access. It is time to look beyond the legacy hardware solutions and look into the future with a more secure and modern approach to network security.

Now, The research firm, Forrester has named Israeli cyber security company Perimeter 81 as one of the top five leaders in the area of Zero-Trust Network Access. 

Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilises the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers.

This is the first time that Forrester has addressed Zero-Trust Network Access (ZTNA), which is considered a growing field in the cyber security industry. The Zero Trust Network Access Report Q3 2021 says that “Perimeter 81’s ZTNA management is intuitive and modern” and that “its reference customers are among the most enthusiastic of those included in this evaluation.” 

When a company’s digital assets have to traverse long distances on the unsafe paths of the Internet, the stakes are so high that you can trust nothing and no one. That’s why you should adopt the zero-trust network model to restrict all users’ access to all network resources at all times.

Forrester found that “Perimeter 81’s ZTNA management is intuitive and modern. Its ability to handle nonweb applications like VoIP is a major differentiator in this field.” 

They also noted that Perimeter 81 is “the best fit for smaller enterprises that need ZTNA as a service, quickly. Its self-service portal allows smaller organisations to sign up quickly and onboard dozens of applications in less than a month.” In addition, Forrester noted that “Perimeter 81 reference customers are among the most enthusiastic of those included in this evaluation. They extol the vendor relationship, support, and dedication to improving the product quickly.”

“The downside of flexible, hybrid work is that it has increased the attack surface of every company,” says Sagi Gidali, CPO and Co-Founder of Perimeter 81. “The recent wave of data breaches and ransomware, from the Colonial Pipeline to the T-Mobile breach, has demonstrated that secure access is a must-have for businesses of all types and sizes... As a young, rapidly growing company, we are especially grateful for the industry recognition...  We believe both are a testament to our determination to provide the highest levels of cybersecurity with a relentless commitment to our customers’ success.”

Perimeter 81 simplifies cyber security and secure network access for the hybrid workforce by transforming multiple outdated, complex, hardware-based network security technologies into a single, easy-to-use, cloud-based security platform, including Zero Trust Network Access, Firewall as a Service, VPN as a Service, Device Posture Security and more. 

The company’s offering is designed to be easy to buy, quick to implement, and simple to use on a day-to-day basis, both for IT professionals and non-technical users of networking resources.

Perimeter81 offers two approaches to managing and keeping an organisation’s applications and networks secure, both on cloud and on-premises environments. The two proposals start from offering zero-trust networks as a service. To do this, Perimeter 81 uses a software-defined perimeter architecture, which provides great flexibility to onboard new users and offers greater visibility into the network. In addition, the service is compatible with the main cloud infrastructure providers.

Zero Trust Application Access is based on the assumption that every company has critical applications and services that most users do not need access to. The service allows raising barriers to specific users based on their roles, devices, locations, and other identifiers.

Forrester make special reference to Perimeter 81’s ability to handle non-web applications like VoIP as its major differentiator, but says it still needs to add integration with Microsoft endpoint security and apply more inline security and analytics. By transforming the outdated, hardware-based security appliances into a cloud-based SaaS solution, the company is simplifying network security for the modern and distributed workforce and helping organisations of all sizes and in many industries to secure their remote workers.

Since its founding, Perimeter 81 has quickly gained traction in the Secure Access Service Edge (SASE) and Network-as-a-Service market, and is transforming the way companies consume cyber and network security. The company has been named a Gartner Cool Vendor, holds a patent for Automatic Wi-Fi Security, and is considered by industry leaders to be winning the “SASE space race”.

For more information and to requesta demo please click here:  Perimeter81  

 Business Wire:       CTech:      Newsbreak:     Geekflare:     Okta:       Silicon Review:

You Might Also Read:

Zero Trust - The New Standard Of Security:

 

« Mēris Botnet Goes Global
CYRIN Webinar - Stop Ransomware In Its Tracks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Skybox Security

Skybox Security

Skybox combines firewall and network device data with vulnerability and threat intelligence, putting security decisions in your unique network context.

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.