What is our primary use case?
My primary use case for Perimeter 81 is to have a secure remote workforce. With colleagues stationed across the globe, it ensures a secure network connection, enabling seamless remote work.
This is particularly vital for our multinational operations, as it guarantees that our team can access critical resources and applications securely from anywhere in the world.
Perimeter 81 has become the cornerstone of our remote work infrastructure, providing peace of mind and reliability to our globally dispersed workforce.
How has it helped my organization?
Perimeter 81 has been instrumental in transforming our organization. It has seamlessly integrated security into our remote work setup, allowing us to adapt swiftly to the evolving work landscape.
Our employees now enjoy secure, uninterrupted access to vital resources from anywhere. It has not only improved our overall productivity but also instilled confidence in our team. However, it's crucial to emphasize that achieving these benefits necessitates careful configuration and ongoing management to ensure optimal performance and security.
What is most valuable?
The feature I find most valuable in Perimeter 81 is its user-friendly interface and very quick connection establishment feature. Even after restarting, it tries to quickly reestablish connection which is very helpful. It simplifies the management of multiple users and devices, making administrative tasks efficient and straightforward. This ease of use has saved our IT team time and effort, allowing us to focus on more strategic aspects of network security and management.
The intuitive design and straightforward controls have significantly contributed to a smoother user experience within our organization, ultimately enhancing our productivity and overall satisfaction with the service.
What needs improvement?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity.
Additionally, expanding integration options with a broader range of third-party tools would be beneficial for seamless compatibility with various existing systems.
As for additional features in the next release, it would be great to see advanced threat detection and response capabilities integrated into the platform. This would further enhance security by proactively identifying and mitigating potential threats.
Additionally, improved mobile device management features and more comprehensive user behavior analytics would be valuable additions to meet evolving cybersecurity needs.
For how long have I used the solution?
I've used the solution for a couple of months.
What do I think about the stability of the solution?
Perimeter 81 has demonstrated remarkable stability throughout our usage. We've experienced minimal downtime or disruptions in our network connectivity.
The solution has consistently delivered reliable and secure access to resources, even during peak usage periods or when facing potential network threats. This stability has instilled confidence in our team, knowing that we can depend on Perimeter 81 to maintain a secure and stable network environment.
Overall, we've been highly satisfied with the solution's stability and its ability to provide uninterrupted service to our organization.
What do I think about the scalability of the solution?
The scalability of Perimeter 81 is quite impressive. It offers flexibility to adapt to the evolving needs of our organization.
We've easily scaled up the number of users and devices as our team has grown, and the solution has seamlessly accommodated these changes without compromising performance or security. This scalability is particularly valuable for businesses with dynamic workforces and changing network demands.
Perimeter 81's ability to efficiently scale resources has been a key asset in ensuring the continued reliability of our network security infrastructure.
How are customer service and support?
Our experience with Perimeter 81's customer service and support has been highly positive. They have been responsive and attentive to our needs, promptly addressing any inquiries or issues that have arisen.
Overall, their customer service and support have been exceptional.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I didn't previously use a different solution before adopting Perimeter 81. I chose Perimeter 81 as the initial network security solution due to its reputation for user-friendliness, robust security features, and seamless support for remote work. It aligned perfectly with our needs from the start, so there was no need for a switch from a previous solution.
How was the initial setup?
The initial setup of Perimeter 81 was straightforward for basic deployment but became more complex when customizing security policies and integrating with our existing network infrastructure.
What about the implementation team?
We implemented Perimeter 81 with the assistance of a vendor team. Their level of expertise was excellent, and they provided valuable guidance throughout the deployment process.
What was our ROI?
In our case, the ROI from implementing Perimeter 81 has been substantial. We've seen a reduction in security incidents and associated costs, improved productivity due to secure remote work capabilities, and significant cost savings by reducing the need for employees to travel to the office.
Perimeter 81 has delivered a positive and measurable return on our investment in terms of enhanced security, productivity, and cost-effectiveness.
What's my experience with pricing, setup cost, and licensing?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations:
- Evaluate your needs
- Understand pricing models
- Request a quote
- Compare competing prices
- Factor in support and maintenance
- Demo/trial period
- Negotiate
Which other solutions did I evaluate?
Before selecting Perimeter 81, we conducted a thorough evaluation of several other network security solutions. Some of the options we considered included Cisco AnyConnect, Palo Alto Networks GlobalProtect, and Fortinet FortiClient.
We assessed these options based on factors such as security features, ease of deployment, scalability, user-friendliness, and cost-effectiveness. Ultimately, Perimeter 81 emerged as the best fit for our organization's specific needs and requirements, especially in the context of enabling secure remote work for our geographically dispersed team.
What other advice do I have?
Perimeter 81 is a valuable tool for network security and remote work, but user training is key to its effectiveness as it comes with many features and might be overwhelming for new users.
Users should keep the software up-to-date and utilize the provided support. Emphasize cybersecurity best practices, consider integration with other tools, and maintain a feedback loop with the Perimeter 81 team.
Regular audits and compliance checks are important, and users must continually evaluate the solution's value in meeting evolving security and remote work needs.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.