What Is Perimeter 81?

Unlike traditional VPN technology which is costly, hardware-based and both difficult to install and manage, our innovative platform simply secures access to your local networks, cloud infrastructures, and business applications, with one unified platform.

Who Uses Perimeter 81?

Any organization (SMB to Large Enterprise) running local data centers or resources in any major cloud provider (Azure, GCP, AWS, etc.)

Perimeter 81 Details

Perimeter 81

Founded in 2018

Perimeter 81 pricing

Starting Price:

US$15.00/month
  • No free trial
  • No free version

Perimeter 81 does not have a free version and does not offer a free trial. Perimeter 81 paid version starts at US$15.00/month.

Pricing plans

Perimeter 81 Details

Perimeter 81

Founded in 2018

Perimeter 81 videos and images

Perimeter 81 video
Perimeter 81 Software - 1 - thumbnail
Perimeter 81 Software - 2 - thumbnail
Perimeter 81 Software - 3 - thumbnail
Perimeter 81 Software - 4 - thumbnail
Perimeter 81 Software - 5 - thumbnail

Perimeter 81 deployment and support

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Deployment

  • Cloud, SaaS, Web-based
  • Mac (Desktop)
  • Windows (Desktop)
  • Linux (Desktop)
  • Windows (On-Premise)
  • Linux (On-Premise)
  • Android (Mobile)
  • iPhone (Mobile)
  • iPad (Mobile)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

Features of Perimeter 81

  • API
  • Activity Dashboard
  • Alerts/Notifications
  • Audit Management
  • Automatic Backup
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Compliance Management
  • Compression
  • Continuous Backup
  • Customisable Reports
  • Data Import/Export
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronisation
  • Disaster Recovery
  • Document Storage
  • Email Alerts
  • Encryption
  • File Transfer
  • Incident Management
  • Incremental Backup
  • Local Server Options
  • Mobile Alerts
  • Monitoring
  • Multiple Format Support
  • Multiple System Support
  • Optical Character Recognition
  • Performance Metrics
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Server Options
  • Reporting & Statistics
  • Retention Policy
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Status Tracking
  • Storage Quantity Control
  • Task Management
  • Third Party Integrations
  • Version Control
  • Web Access / Restoration
  • Workflow Management

View full list of Business Continuity Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioural Analytics
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Encryption
  • Endpoint Management
  • Event Logs
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Single Sign On
  • Status Tracking
  • Third Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Management
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Cloud Security Software

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behaviour Tracking
  • Behavioural Analytics
  • Collaboration Tools
  • Compliance Management
  • DDoS Protection
  • Data Security
  • Data Visualisation
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Firewalls
  • HIPAA Compliant
  • IOC Verification
  • Incident Management
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Cybersecurity Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavioural Analytics
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Device Management
  • Encryption
  • Event Logs
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting/Analytics
  • Risk Analytics
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Summary Reports
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting

View full list of Endpoint Protection Software

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Behaviour Tracking
  • Compliance Management
  • Content Filtering
  • Customisable Reports
  • Dashboard Creation
  • Event Logs
  • Filtering
  • Hardware Integration
  • IP Filtering
  • Incident Management
  • Intrusion Detection System
  • Intrusion Prevention System
  • Log Access
  • Monitoring
  • Multi-Location
  • Network Monitoring
  • Next-Generation Firewall
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Role-Based Permissions
  • SSL Security
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Summary Reports
  • Two-Factor Authentication
  • Uptime Reporting
  • VPN
  • Visual Analytics
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Firewall Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Audit Management
  • Audit Trail
  • Capacity Management
  • Change Management
  • Chat/Messaging
  • Compliance Management
  • Configurable Workflow
  • Configuration Management
  • Customisable Branding
  • Customisable Reports
  • Dashboard
  • Data Import/Export
  • Data Visualisation
  • Event Logs
  • IT Asset Tracking
  • IT Reporting
  • Incident Management
  • Inventory Management
  • Issue Auditing
  • Knowledge Management
  • License Management
  • Maintenance Scheduling
  • Monitoring
  • Patch Management
  • Performance Metrics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Updates
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • SSL Security
  • Self Service Portal
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Single Sign On
  • Task Management
  • Third Party Integrations
  • Ticket Management
  • Uptime Reporting
  • User Management
  • Workflow Management

View full list of IT Management Software

  • API
  • Access Certification
  • Access Controls/Permissions
  • Access Management
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Application Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Biometrics
  • Collaboration Tools
  • Compliance Management
  • Credential Management
  • Customisable Branding
  • Data Storage Management
  • Data Synchronisation
  • Data Verification
  • Event Logs
  • Fraud Detection
  • HIPAA Compliant
  • Member Accounts
  • Mobile Access
  • Monitoring
  • Multi-Factor Authentication
  • Multiple User Accounts
  • PCI Compliance
  • Password Management
  • Policy Management
  • Privileged Account Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Reporting & Statistics
  • Role-Based Permissions
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Self Service Portal
  • Self-Service Access Request
  • Single Sign On
  • Third Party Integrations
  • Two-Factor Authentication
  • Unified Directory
  • User Management
  • User Provisioning
  • Workflow Management

View full list of Identity Management Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Data Visualisation
  • Email Alerts
  • Event Logs
  • Event Tracking
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • VPN
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Workflow Management

View full list of Network Security Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Management
  • Activity Tracking
  • Application Access Control
  • Approval Process Control
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioural Analytics
  • Biometrics
  • Compliance Management
  • Configurable Workflow
  • Credential Management
  • Data Synchronisation
  • Data Verification
  • Endpoint Management
  • Event Logs
  • File Management
  • HIPAA Compliant
  • Incident Management
  • Least Privilege
  • Member Accounts
  • Monitoring
  • Multi-Factor Authentication
  • Multiple Data Sources
  • Multiple User Accounts
  • PCI Compliance
  • Password Management
  • Policy Management
  • Real Time Monitoring
  • Remote Access Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Role-Based Permissions
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Self Service Portal
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Activity Monitoring
  • User Management
  • Workflow Management

View full list of Privileged Access Management Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Anti Virus
  • Asset Lifecycle Management
  • Audit Management
  • Audit Trail
  • Automatic Backup
  • Compliance Management
  • Configuration Management
  • Customisable Branding
  • Customisable Reports
  • Deployment Management
  • Event Logs
  • For MSPs
  • IT Asset Management
  • IT Asset Tracking
  • Inventory Management
  • Maintenance Scheduling
  • Mobile Access
  • Monitoring
  • Multiple User Accounts
  • Network Monitoring
  • Patch Management
  • Policy Management
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Alerts
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Role-Based Permissions
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Summary Reports
  • Support Ticket Management
  • Task Management
  • Task Scheduling
  • Third Party Integrations
  • Uptime Reporting
  • Usage Tracking/Analytics
  • User Management
  • Vulnerability Scanning
  • Workflow Management

View full list of RMM Software

  • @mentions
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Assignment Management
  • Calendar Management
  • Chat/Messaging
  • Collaboration Tools
  • Commenting/Notes
  • Communication Management
  • Customisable Branding
  • Customisable Templates
  • Data Import/Export
  • Document Management
  • Document Storage
  • Drag & Drop
  • Electronic Signature
  • Email Management
  • Employee Activity Monitoring
  • File Management
  • File Transfer
  • Live Chat
  • Meeting Management
  • Monitoring
  • Prioritisation
  • Progress Tracking
  • Project Time Tracking
  • Projections
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real-time Updates
  • Remote Access/Control
  • Remote Support Software
  • Reporting & Statistics
  • SSL Security
  • Single Sign On
  • Softphone Software
  • Tagging
  • Task Management
  • Task Progress Tracking
  • Task Scheduling
  • Third Party Integrations
  • Time Zone Tracking
  • Two-Way Audio & Video
  • Video Chat
  • Video Conferencing
  • Workflow Management

View full list of Remote Work Software

  • API
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavior Analytics
  • Cloud Backup
  • Customisable Reports
  • Data Visualisation
  • Event Analysis
  • Event Logs
  • IT Reporting
  • Incident Reporting
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Prioritisation
  • Profiling
  • Real Time Analytics
  • Real Time Data
  • Real Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Server Monitoring
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Web-Application Security

View full list of Threat Intelligence

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Management
  • Activity Tracking
  • Anonymous Browsing
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Authentication
  • Certification Tracking
  • Compliance Management
  • DNS Leak Protection
  • Data Storage Management
  • Email Alerts
  • Event Logs
  • Exceptions Management
  • Geolocation
  • Kill Switch
  • Member Accounts
  • Mobile Access
  • Mobile Alerts
  • Monitoring
  • Multi-Language
  • Multi-Location
  • Multi-Protocol
  • Offline Access
  • Peer-to-Peer
  • Performance Testing
  • Policy Management
  • Product Catalogue
  • Real Time Monitoring
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Route Management
  • Rules-Based Workflow
  • SSL Security
  • Scheduling
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Transaction Monitoring
  • Two-Factor Authentication
  • Uptime Reporting
  • User Management
  • Web Inspection

View full list of VPN Software

Alternatives to Perimeter 81

More Perimeter 81 alternatives

Reviews of Perimeter 81

Read all 8 reviews

Average score

Overall
4.5
Ease of Use
4.9
Customer Service
5
Features
4.4
Value for Money
4.6

Reviews by score

5
4
4
4

Reviews by company size (employees)

  • <50
  • 51-200
  • 201-1,000
  • >1,001
Verified Reviewer
CEO in Israel
Verified LinkedIn User
Wholesale, 11-50 Employees
Used the Software for: 6-12 months
Reviewer Source

Easy to secure our salesmen

5 3 years ago

Comments: Run a team of 25 salesmen with laptops around the world connecting themselves form a hotel or coffee shop. Before lots of headaches with clients, updates, etc. Now nothing.

Pros:

That I can secure my team without headaches.

Cons:

No cons at all. Management and starting up running the software is super easy.

Domenico P.
Presales Engineer in Netherlands
Computer & Network Security, 2-10 Employees
Used the Software for: 6-12 months
Reviewer Source

Finally a safe and simple VPN

5 10 months ago

Comments: I can manage the onboarding and offboarding of external users and suppliers quickly and easily. I can also create WebApps to facilitate access for users or even IT administrators.

Pros:

It is a Cloud service that lightens management and maintenance activities, making the end user independent from expensive hardware solutions or complex software solutions. It integrates seamlessly with many identity management solutions. Unlike other VPN solutions, it also contains many features that increase the security of users' endpoints (eg DNS filtering and VPN Kill).

Cons:

I believe that password management and synchronization with IdPs can be improved, it would also be necessary to make it possible to create granular access rules.

Philip W.
Head of Security in UK
Financial Services, 51-200 Employees
Used the Software for: 1+ year
Reviewer Source

Nice start up, but not fully matured yet.

4 4 months ago

Comments: We moved away from P81 due to it missing some features, however when speaking to them they were on the road map. I think the product has a lot of potential to grow and evolve.

Pros:

Easy to use, some nice features as well. Easy to manage.

Cons:

Not enough on the security side Poor logging No good traffic views or IPS/IDS ability

Khurram M.
Consultant in Canada
Accounting, 2-10 Employees
Used the Software for: 6-12 months
Reviewer Source

Perimeter 81 review

4 3 months ago

Pros:

It provides a user-friendly, equally safe interface and flexible remotely accessible environment ideally suited for small businesses.

Cons:

Occasional issues with connectivity and performance scalability

Chris R.
Director of Data Operations in US
Publishing, 11-50 Employees
Used the Software for: 1-5 months
Reviewer Source

Awesome support experience

5 3 years ago

Comments: I've found their support and software to be simple yet competent at every level.

Pros:

Easily configurable cloud VPN with convenient software and excellent support. I was able to easily configure clients on mac, windows, and even ubuntu, and their excellent support team helped us to get our AWS VPC networked with the VPN.

Cons:

No issues so far. Some sites were able to detect and block traffic as a proxy, but that hasn't been an issue.