Perimeter 81
Perimeter 81 delivers strong cloud-based network security.
Basic Information
Perimeter 81 is a cloud-based Security Service Edge (SSE) and Zero Trust Network Access (ZTNA) platform, designed to provide secure remote networks for organizations. It functions as a service, replacing traditional VPNs and firewalls with a software-defined approach. Founded in 2018, Perimeter 81 was acquired by Check Point in 2023 and has since been rebranded as "Harmony SASE."
- Model: Cloud-delivered converged networking and network security service (SASE, ZTNA, FWaaS, SWG).
- Version: As a cloud service, the platform undergoes continuous updates. Client agents have specific versions, with recent updates including Windows agent 11.6.0.2555 and Mac agent 11.7.0.5310.
- Release Date: Company founded in 2018.
- Minimum Requirements: Requires a personal computer or mobile device running a supported operating system and active internet access. Local administrative access may be needed for client agent installation.
- Supported Operating Systems: Windows 8.1 or later, macOS X 10.15 or later, Ubuntu 18.04 or later, Redhat 8 or later, Fedora 40 or later, iOS, and Android.
- Latest Stable Version: Client agents are continuously updated. Recent versions include Windows agent 11.6.0.2555 and Mac agent 11.7.0.5310.
- End of Support Date: Not applicable for the cloud service, as it is continuously maintained and updated by the vendor. Client agent support aligns with OS compatibility.
- End of Life Date: Not applicable for the cloud service.
- Auto-update Expiration Date: Not applicable; client agents receive automatic updates.
- License Type: Subscription-based, with various plans available (e.g., Essentials, Premium, Premium Plus, Enterprise).
- Deployment Model: Cloud-based (SaaS), utilizing client applications for end-users and gateways for network integration.
Technical Requirements
Perimeter 81's client applications are designed to be lightweight, with primary technical requirements revolving around operating system compatibility and network connectivity.
- Operating System: Windows 8.1 or later, macOS X 10.15 or later, Ubuntu 18.04 or later, Redhat 8 or later, Fedora 40 or later, iOS, and Android.
- Processor: A modern processor capable of running the supported operating systems efficiently.
- RAM: Sufficient RAM to support the operating system and typical applications, as the Perimeter 81 client agent has minimal overhead.
- Storage: Minimal storage space required for the client application installation.
- Display: Standard display resolution supported by the operating system.
- Ports: Active internet connection is required. Specific ports may be utilized for VPN protocols (e.g., WireGuard, OpenVPN, IKEv2) and management communication.
Analysis of Technical Requirements
The technical requirements for Perimeter 81 client agents are generally low, reflecting its nature as a software-defined service. The platform is designed to run on a wide range of modern devices without demanding significant hardware resources. The emphasis is on operating system compatibility and a stable internet connection, making it accessible for diverse user environments. This approach minimizes the burden on end-user devices and simplifies deployment across an organization's existing hardware infrastructure.
Support & Compatibility
Perimeter 81 offers broad compatibility and support across various platforms, ensuring secure access for a diverse workforce.
- Latest Version: Client agents are regularly updated, with recent versions including Windows agent 11.6.0.2555 and Mac agent 11.7.0.5310.
- OS Support: Comprehensive support for desktop and mobile operating systems, including Windows (8.1+), macOS (10.15+), Linux (Ubuntu 18.04+, Redhat 8+, Fedora 40+), iOS, and Android.
- End of Support Date: As a continuously evolving cloud service, the platform itself does not have a fixed end-of-support date. Client agents are supported through ongoing updates.
- Localization: The primary interface and documentation are in English. Regional presence is noted in various countries, but specific UI localization details are not extensively provided.
- Available Drivers: Not applicable in the traditional sense. The service relies on client agents and standard network protocols.
Analysis of Overall Support & Compatibility Status
Perimeter 81 demonstrates strong support and compatibility, catering to a wide array of operating systems for its client agents. This broad coverage ensures that organizations with diverse device ecosystems can integrate the service effectively. The continuous update model for the cloud platform and client agents ensures ongoing security patches, feature enhancements, and compatibility with the latest OS versions. While the primary language is English, its global presence suggests an understanding of international user needs, even if explicit UI localization is not detailed. The ease of deployment and management across these platforms is a key strength.
Security Status
Perimeter 81 integrates a robust suite of security features built on a Zero Trust architecture.
- Security Features: Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), Cloud VPN, Firewall as a Service (FWaaS), Device Posture Check (DPC), Multi-Factor Authentication (MFA), Single Sign-On (SSO), Network Segmentation, DNS Filtering, Automatic Wi-Fi Security, Activity and Audit Reports, Policy-Based Access Control, Identity Provider Integration, Endpoint Security, Threat Intelligence, Malware Protection, Split Tunneling, and Agentless Access.
- Known Vulnerabilities: A local privilege escalation vulnerability (CVE-2023-33298) was reported in its macOS application in 2023, which allowed arbitrary command execution with root privileges. Some users have also reported issues with SSL verification affecting applications like npm, git, and Docker.
- Blacklist Status: No reports of botnet activity have been detected in recent monitoring.
- Certifications: Certified with SOC 2 Type II, ISO 27001, GDPR, CCPA, and HIPAA compliance, demonstrating adherence to high security and data protection standards.
- Encryption Support: Utilizes AES-256 encryption, TLS/SSL for user-to-app connections, and the WireGuard Protocol for efficient and secure VPN tunnels. IPSec is supported for site-to-site VPN connections.
- Authentication Methods: Supports various authentication methods including SAML, OpenID Connect, LDAP, Google Workspace, Azure AD, Duo Security, TOTP Authenticator, and SMS/push notifications for MFA.
- General Recommendations: Organizations should enforce Multi-Factor Authentication (MFA) for all users, leverage granular ZTNA policies, ensure client agents are regularly updated, and actively monitor activity and audit logs for suspicious behavior.
Analysis on the Overall Security Rating
Perimeter 81 boasts a strong overall security posture, underpinned by its comprehensive Zero Trust architecture and a wide array of integrated security features. Its certifications (SOC 2 Type II, ISO 27001, GDPR, HIPAA) attest to its commitment to industry-recognized security and compliance standards. The use of robust encryption (AES-256) and modern protocols like WireGuard further strengthens data protection. However, the disclosure of a privilege escalation vulnerability in its macOS application in 2023 highlights the continuous need for vigilant security practices and prompt patching. While the platform offers extensive security controls, the effectiveness ultimately depends on proper configuration and ongoing management by the implementing organization.
Performance & Benchmarks
Perimeter 81 emphasizes high performance and reliability, crucial for a network security service.
- Benchmark Scores: Specific, publicly available benchmark scores for the entire Perimeter 81 platform are not detailed. Performance is generally assessed through real-world metrics.
- Real-World Performance Metrics: The service is designed for low latency and high throughput, facilitating fast connection speeds. It leverages a global backbone network with over 50 Points of Presence (PoPs) to ensure optimal performance and reliability for users worldwide. The WireGuard protocol is noted for its efficiency and low latency.
- Power Consumption: Not directly applicable to end-user devices for a cloud-based service. The service's infrastructure power consumption is managed by the vendor.
- Carbon Footprint: Not directly applicable to end-user devices. Information on the vendor's specific carbon footprint or sustainability initiatives is not readily available in the provided data.
- Comparison with Similar Assets: Positioned as a modern alternative to traditional VPNs and firewalls, competing with other SASE/ZTNA solutions. It is often praised for its ease of deployment and centralized management compared to more complex enterprise solutions.
Analysis of the Overall Performance Status
Perimeter 81 prioritizes performance by utilizing a global network infrastructure and efficient protocols. The focus on low latency and high throughput aims to provide a seamless user experience, even for remote or geographically dispersed teams. The adoption of WireGuard contributes significantly to its speed and efficiency. While formal benchmark scores are not widely published, user feedback and the architectural design suggest a strong emphasis on delivering reliable and fast network access. The cloud-native approach inherently offers scalability and resilience, which are critical performance aspects for enterprise-grade network security.
User Reviews & Feedback
User feedback for Perimeter 81 generally highlights its strengths in ease of use and robust security, while also pointing out areas for improvement.
- Strengths: Users frequently praise its ease of use, quick deployment (often cited as under 15-20 minutes), and intuitive management interface. The robust security features, including ZTNA and MFA, are highly valued. Its broad OS support and global network of over 50 PoPs and 700+ servers contribute to reliable, low-latency connections for remote workforces. Many find it an excellent solution for securing access to cloud and on-premises resources and supporting BYOD policies.
- Weaknesses: Common criticisms include its pricing, which some consider higher than competitors, and the requirement for premium plans to access advanced features. Some users have reported occasional connectivity issues, disruptions following updates, and authentication failures. A local privilege escalation vulnerability in the macOS client was noted, and some users experienced SSL verification problems with development tools like npm, git, and Docker.
- Recommended Use Cases: Ideal for organizations with remote or hybrid workforces, businesses needing to connect multiple offices securely, and those looking to implement Zero Trust principles for accessing cloud and on-premises applications. It is particularly suited for SMBs seeking simplified network security management.
Summary
Perimeter 81, now part of Check Point Harmony SASE, stands as a comprehensive cloud-based Security Service Edge (SSE) and Zero Trust Network Access (ZTNA) platform. It offers a modern, software-defined approach to network security, moving away from traditional VPNs and firewalls. Its core strengths lie in its ease of deployment, intuitive management, and extensive suite of security features, including ZTNA, FWaaS, SWG, DPC, and robust MFA options. The platform boasts broad compatibility across Windows, macOS, Linux, iOS, and Android, supported by a global backbone network designed for low latency and high throughput. Certifications like SOC 2 Type II, ISO 27001, GDPR, and HIPAA underscore its commitment to security and compliance.
However, the asset is not without its drawbacks. Some users find its pricing to be on the higher side, with advanced features often locked behind premium tiers. Occasional reports of connectivity issues, update-related disruptions, and past vulnerabilities in client applications highlight areas where continuous improvement is necessary. The platform's reliance on client-side software also introduces potential points of failure or compatibility challenges, as seen with reported SSL verification issues for certain development tools.
Overall, Perimeter 81 is a strong contender for organizations seeking to modernize their network security, particularly those with a distributed workforce or complex cloud environments. Its simplified management and robust security features make it an attractive option for businesses aiming to implement Zero Trust principles. Recommendations include leveraging its full suite of security controls, ensuring timely client agent updates, and maintaining a proactive approach to monitoring and policy enforcement to maximize its benefits.
Information provided is based on publicly available data and may vary depending on specific device configurations. For up-to-date information, please consult official manufacturer resources.
