Secure network access for remote teams
January 16, 2023

Secure network access for remote teams

Will Emmerson | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Software Version

Premium

Overall Satisfaction with Perimeter 81

Perimeter81 provides us with a secure network to connect our team members to, primarily from remote based locations, allowing us to tunnel securely into other cloud services or lock down access to web services to a specific static IP (provided by Perimeter81). We use the Perimeter81 agent on a mixture of Windows, Mac and Linux endpoints, which then allows us to connect to one of the secure networks we've setup - it's easy to setup for new starters.
  • Administration of network / tunnels is straight forward
  • Easy to install for new starters
  • Support for a mixture of operating systems
  • Automatic agent upgrades - sometimes these fail and require a manual update
  • Secure network / VPN
  • Support for linux (many providers only support Windows and OS X)
  • Simple agent deployment
  • Decreased the amount of time spent on VPN maintenance
  • Sped up the onboarding of new starters

Do you think Perimeter 81 delivers good value for the price?

Yes

Are you happy with Perimeter 81's feature set?

Yes

Did Perimeter 81 live up to sales and marketing promises?

Yes

Did implementation of Perimeter 81 go as expected?

Yes

Would you buy Perimeter 81 again?

Yes

I'd suggest that Perimeter81 is recommended when you want something that is easy to administrate, with little maintenance, unlike a VPN/secure network that you host and manage internally. We've had incidents when there has been downtime at Perimeter81, which has effectively locked us out of some of our secure services (anything locked down via IP). They have made improvements to their infrastructure and it seems to have improved in recent months, but this is something to keep in mind for critical connections.

Perimeter 81 Feature Ratings

Continuous Verification
10
Secure Web Gateways
10
Network Flow Control
Not Rated
Network Traffic Analysis
Not Rated
Segmentation Leveraging
9
Admin Access Control
10
Network Data Encryption
Not Rated
Network Topology Mapping
Not Rated
Network Analytics
Not Rated
Threat Recognition
Not Rated
Vulnerability Classification
Not Rated
Automated Alerts and Reporting
Not Rated
Threat Analysis
Not Rated
Threat Intelligence Reporting
Not Rated
Automated Threat Identification
Not Rated
Multi-Factor Authentication
10
Endpoint Detection and Response (EDR)
Not Rated