Who Uses Perimeter 81?

Any organization (SMB to Large Enterprise) running local data centers or resources in any major cloud provider (Azure, GCP, AWS, etc.)

What Is Perimeter 81?

Unlike traditional VPN technology which is costly, hardware-based and both difficult to install and manage, our innovative platform simply secures access to your local networks, cloud infrastructures, and business applications, with one unified platform.

Perimeter 81 Details

Perimeter 81

https://www.perimeter81.com/

Founded 2018

Perimeter 81 Software - 1
Perimeter 81 Software - 2
Perimeter 81 Software - 3
Perimeter 81 Software - 4
Perimeter 81 Software - 5
Perimeter 81 video
Play
Perimeter 81 Software - 1 - thumbnail
Perimeter 81 Software - 2 - thumbnail
Perimeter 81 Software - 3 - thumbnail
Perimeter 81 Software - 4 - thumbnail
Perimeter 81 Software - 5 - thumbnail

Perimeter 81 pricing overview

See pricing plans

Perimeter 81 does not have a free version. Perimeter 81 paid version starts at US$10.00/month.


Starting Price

US$10.00/month See pricing details

Free Version

No

Perimeter 81 deployment and support

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Deployment

  • Cloud, SaaS, Web-based
  • Mac (Desktop)
  • Windows (Desktop)
  • Linux (Desktop)
  • Windows (On-Premise)
  • Linux (On-Premise)
  • Android (Mobile)
  • iPhone (Mobile)
  • iPad (Mobile)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

Perimeter 81 Features

  • API
  • Activity Dashboard
  • Alerts/Notifications
  • Audit Management
  • Automatic Backup
  • Backup Log
  • Backup Scheduling
  • Backup and Recovery
  • Compliance Management
  • Compression
  • Continuous Backup
  • Customisable Reports
  • Data Import/Export
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronisation
  • Disaster Recovery
  • Document Storage
  • Email Alerts
  • Encryption
  • File Transfer
  • Incident Management
  • Incremental Backup
  • Local Server Options
  • Mobile Alerts
  • Monitoring
  • Multiple Format Support
  • Multiple System Support
  • Optical Character Recognition
  • Performance Metrics
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Server Options
  • Reporting & Statistics
  • Retention Policy
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Status Tracking
  • Storage Quantity Control
  • Task Management
  • Third Party Integrations
  • Version Control
  • Web Access / Restoration
  • Workflow Management

View full list of Business Continuity Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioural Analytics
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Encryption
  • Endpoint Management
  • Event Logs
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Single Sign On
  • Status Tracking
  • Third Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Management
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Cloud Security Software

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Behaviour Tracking
  • Behavioural Analytics
  • Collaboration Tools
  • Compliance Management
  • DDoS Protection
  • Data Security
  • Data Visualisation
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Firewalls
  • HIPAA Compliant
  • IOC Verification
  • Incident Management
  • Monitoring
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Tokenization
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Cybersecurity Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Virus
  • Application Management
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Behaviour Tracking
  • Behavioural Analytics
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Device Management
  • Encryption
  • Event Logs
  • Event Tracking
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Signature Matching
  • Summary Reports
  • Third Party Integrations
  • Two-Factor Authentication
  • Uptime Reporting
  • User Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting

View full list of Endpoint Protection Software

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Behaviour Tracking
  • Compliance Management
  • Content Filtering
  • Customisable Reports
  • Dashboard Creation
  • Event Logs
  • Filtering
  • Hardware Integration
  • IP Filtering
  • Incident Management
  • Intrusion Detection System
  • Intrusion Prevention System
  • Log Access
  • Monitoring
  • Multi-Location
  • Network Monitoring
  • Next-Generation Firewall
  • Policy Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Role-Based Permissions
  • SSL Security
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Summary Reports
  • Two-Factor Authentication
  • Uptime Reporting
  • VPN
  • Visual Analytics
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Firewall Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Audit Management
  • Audit Trail
  • Capacity Management
  • Change Management
  • Chat/Messaging
  • Compliance Management
  • Configurable Workflow
  • Configuration Management
  • Customisable Branding
  • Customisable Reports
  • Dashboard
  • Data Import/Export
  • Data Visualisation
  • Event Logs
  • IT Asset Tracking
  • IT Reporting
  • Incident Management
  • Inventory Management
  • Issue Auditing
  • Knowledge Management
  • License Management
  • Maintenance Scheduling
  • Monitoring
  • Patch Management
  • Performance Metrics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Updates
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • SSL Security
  • Self Service Portal
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Single Sign On
  • Task Management
  • Third Party Integrations
  • Ticket Management
  • Uptime Reporting
  • User Management
  • Workflow Management

View full list of IT Management Software

  • API
  • Access Certification
  • Access Controls/Permissions
  • Access Management
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Application Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Biometrics
  • Collaboration Tools
  • Compliance Management
  • Credential Management
  • Customisable Branding
  • Data Storage Management
  • Data Synchronisation
  • Data Verification
  • Event Logs
  • Fraud Detection
  • HIPAA Compliant
  • Member Accounts
  • Mobile Access
  • Monitoring
  • Multi-Factor Authentication
  • Multiple User Accounts
  • PCI Compliance
  • Password Management
  • Policy Management
  • Privileged Account Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Reporting & Statistics
  • Role-Based Permissions
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Self Service Portal
  • Self-Service Access Request
  • Single Sign On
  • Third Party Integrations
  • Two-Factor Authentication
  • Unified Directory
  • User Management
  • User Provisioning
  • Workflow Management

View full list of Identity Management Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Data Visualisation
  • Email Alerts
  • Event Logs
  • Event Tracking
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • VPN
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Workflow Management

View full list of Network Security Software

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Management
  • Activity Tracking
  • Application Access Control
  • Approval Process Control
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioural Analytics
  • Biometrics
  • Compliance Management
  • Configurable Workflow
  • Credential Management
  • Data Synchronisation
  • Data Verification
  • Endpoint Management
  • Event Logs
  • File Management
  • HIPAA Compliant
  • Incident Management
  • Least Privilege
  • Member Accounts
  • Monitoring
  • Multi-Factor Authentication
  • Multiple Data Sources
  • Multiple User Accounts
  • PCI Compliance
  • Password Management
  • Policy Management
  • Real Time Monitoring
  • Remote Access Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Risk Alerts
  • Role-Based Permissions
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Self Service Portal
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Intelligence
  • Two-Factor Authentication
  • User Activity Monitoring
  • User Management
  • Workflow Management

View full list of Privileged Access Management Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Anti Virus
  • Asset Management
  • Audit Management
  • Audit Trail
  • Automatic Backup
  • Compliance Management
  • Configuration Management
  • Customisable Branding
  • Customisable Reports
  • Deployment Management
  • Event Logs
  • For MSPs
  • IT Asset Management
  • IT Asset Tracking
  • Inventory Management
  • Maintenance Scheduling
  • Mobile Access
  • Monitoring
  • Multiple User Accounts
  • Network Monitoring
  • Patch Management
  • Policy Management
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Alerts
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Role-Based Permissions
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Summary Reports
  • Support Ticket Management
  • Task Management
  • Task Scheduling
  • Third Party Integrations
  • Uptime Reporting
  • Usage Tracking/Analytics
  • User Management
  • Vulnerability Scanning
  • Workflow Management

View full list of RMM Software

  • @mentions
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Assignment Management
  • Calendar Management
  • Chat/Messaging
  • Collaboration Tools
  • Commenting/Notes
  • Communication Management
  • Customisable Branding
  • Customisable Templates
  • Data Import/Export
  • Document Management
  • Document Storage
  • Drag & Drop
  • Electronic Signature
  • Email Management
  • Employee Activity Monitoring
  • File Management
  • File Transfer
  • Live Chat
  • Meeting Management
  • Monitoring
  • Prioritisation
  • Progress Tracking
  • Project Time Tracking
  • Projections
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real-time Updates
  • Remote Access/Control
  • Remote Support Software
  • Reporting & Statistics
  • SSL Security
  • Single Sign On
  • Softphone Software
  • Tagging
  • Task Management
  • Task Progress Tracking
  • Task Scheduling
  • Third Party Integrations
  • Time Zone Tracking
  • Two-Way Audio & Video
  • Video Chat
  • Video Conferencing
  • Workflow Management

View full list of Remote Work Software

  • Collaboration Tools
  • Incident Management
  • Key Performance Indicators
  • Performance Metrics
  • Process/Workflow Automation
  • Reporting/Analytics
  • Risk Alerts
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response

View full list of SOAR

  • API
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavior Analytics
  • Cloud Backup
  • Customisable Reports
  • Data Visualisation
  • Event Analysis
  • Event Logs
  • IT Reporting
  • Incident Reporting
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Prioritisation
  • Profiling
  • Real Time Analytics
  • Real Time Data
  • Real Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Server Monitoring
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Web-Application Security

View full list of Threat Intelligence

  • API
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Management
  • Activity Tracking
  • Anonymous Browsing
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Authentication
  • Certification Tracking
  • Compliance Management
  • DNS Leak Protection
  • Data Storage Management
  • Email Alerts
  • Event Logs
  • Exceptions Management
  • Geolocation
  • Kill Switch
  • Member Accounts
  • Mobile Access
  • Mobile Alerts
  • Monitoring
  • Multi-Language
  • Multi-Location
  • Multi-Protocol
  • Offline Access
  • Peer-to-Peer
  • Performance Testing
  • Policy Management
  • Product Catalogue
  • Real Time Monitoring
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Route Management
  • Rules-Based Workflow
  • SSL Security
  • Scheduling
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Transaction Monitoring
  • Two-Factor Authentication
  • Uptime Reporting
  • User Management
  • Web Inspection

View full list of VPN Software

Perimeter 81 Alternatives

More Perimeter 81 alternatives

Perimeter 81 Reviews for UK Users

Read all reviews

Overall rating

4.7/5

Average score

Ease of Use 5
Customer Service 5
Features 4.5
Value for Money 4.8

Review software

Share your experiences with other software buyers.

Write a Review!
Verified Reviewer
CEO
Wholesale, 11-50 Employees
Used the Software for: 6-12 months
  • Overall Rating
    5 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    5 /5
  • Customer Support
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 09/09/2018

"Easy to secure our salesmen"

Comments: Run a team of 25 salesmen with laptops around the world connecting themselves form a hotel or coffee shop. Before lots of headaches with clients, updates, etc. Now nothing.

Pros: That I can secure my team without headaches.

Cons: No cons at all. Management and starting up running the software is super easy.

  • Reviewer Source 
  • Reviewed on 09/09/2018
Domenico P.
Presales Engineer
Computer & Network Security, 2-10 Employees
Used the Software for: 6-12 months
  • Overall Rating
    5 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    5 /5
  • Customer Support
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 12/02/2021

"Finally a safe and simple VPN"

Comments: I can manage the onboarding and offboarding of external users and suppliers quickly and easily. I can also create WebApps to facilitate access for users or even IT administrators.

Pros: It is a Cloud service that lightens management and maintenance activities, making the end user independent from expensive hardware solutions or complex software solutions. It integrates seamlessly with many identity management solutions. Unlike other VPN solutions, it also contains many features that increase the security of users' endpoints (eg DNS filtering and VPN Kill).

Cons: I believe that password management and synchronization with IdPs can be improved, it would also be necessary to make it possible to create granular access rules.

  • Reviewer Source 
  • Reviewed on 12/02/2021
Tom H.
CEO
Used the Software for: 1-5 months
  • Overall Rating
    4 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    3 /5
  • Customer Support
    5 /5
  • Value for Money
    4 /5
  • Likelihood to Recommend
    Unrated
  • Reviewer Source 
  • Reviewed on 12/04/2018

"Simple to learn, allows businesses to create a secured network that connects with remote employees,"

Pros: I like that I can connect with my remote employees and no bandwidth limits. The pricing is affordable and 24/7 customer service.

Cons: I liked least that it only supports Windows, OSX and Linus users currently. My clients use multiple sources.

  • Reviewer Source 
  • Reviewed on 12/04/2018
Chris R.
Director of Data Operations
Publishing, 11-50 Employees
Used the Software for: 1-5 months
  • Overall Rating
    5 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    5 /5
  • Customer Support
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    10/10
  • Reviewer Source 
  • Reviewed on 13/08/2018

"Awesome support experience"

Comments: I've found their support and software to be simple yet competent at every level.

Pros: Easily configurable cloud VPN with convenient software and excellent support. I was able to easily configure clients on mac, windows, and even ubuntu, and their excellent support team helped us to get our AWS VPC networked with the VPN.

Cons: No issues so far. Some sites were able to detect and block traffic as a proxy, but that hasn't been an issue.

  • Reviewer Source 
  • Reviewed on 13/08/2018
Eran B.
Head Of DevOps
Computer Software, 11-50 Employees
Used the Software for: 1-5 months
  • Overall Rating
    4 /5
  • Ease of Use
    5 /5
  • Features & Functionality
    4 /5
  • Customer Support
    5 /5
  • Value for Money
    5 /5
  • Likelihood to Recommend
    Unrated
  • Reviewer Source 
  • Reviewed on 01/03/2018

"using SaferVPN for 6 month. With 30 active users on our account. The overall experience was great"

Pros: easy to use. multiple server across the globe. client support Windows, OSX and Linux users. nice web management.

Cons: not supporting google authentication yet. Linux users doesn't have native client manual configuration is needed.

  • Reviewer Source 
  • Reviewed on 01/03/2018