Perimeter 81: Top Tier Security

A secure platform for your networks and data

Our platform is secured by a multi-layered approach including encryption of static and mobile data, internal and external pentests, audits, product- and user-level safeguards, continuous testing and monitoring, and more.

Perimeter 81: Top Tier Security

Protecting Perimeter 81

We employ the following security measures to keep our platform impregnable against hackers and our networks airtight. 

 Development Safeguards

Security of our dev process is the pillar of security for our product

Uncompromising Compliance

We ensure that our network and yours meet the latest privacy and security standards

Encrypted Production

Our system is out of hackers’ reach, and we ensure it stays that way

Defense in Depth

Autonomous and add-on security tools protect our networks around the clock

We develop intelligently

We develop intelligently

All code intended for production is peer reviewed, live code is scanned for malware, and policies are periodically analyzed for risk by internal and external security team

Compliance with no compromises

Compliance with no compromises

Perimeter 81 proudly maintains 100% compliance with ISO 27001/2  and SOC 2 Type 2, ensuring that our customers’ data is secure

Zero-trust production environment

Zero-trust production environment

Our production and staging environments are hidden from the public Internet, and an automated integration and delivery pipeline removes the need for human access to the production environments.

Security is stronger in layers

Security is stronger in layers

We implement multiple layers of security on top of access management and encryption, including numerous protection types and product-level safeguards

Live Login Protection for Clients

Real-time malware defenses are deployed by our team and to customers via our platform. Alongside bank-level AES256 encryption for connections to cloud or on-prem resources, networks have a tripwire system to autonomously identify and defend against several types of login attacks.

TriggerPerimeter 81
Brute Force AttackHigh velocity and volume of login attempts for an IP and account.Blocks the user associated with the IP from logging in for a period of time.
IP Throttling AttackHigh velocity and volume of login attempts for a tenant account.Detects the attempts and blocks the user from logging in
Breached Password Use of a password that has been flagged via one of the trusted sources.Blocks the user from choosing and logging in with that password.
Bot or Botnet LoginsLow-value or low-reputation IP attempts login.Recognizes the bot’s pattern and deploys a CAPTCHA at login to stop it.

Testing Our Own Perimeter

We take a no mercy approach to our network security, and periodically hire trusted third-party firms to engage in penetration testing against our networks and offices, audit our processes and internal security procedures, and analyze the defenses of our entire stack. Putting security first is why our customers trust us, and why their networks enjoy the highest level of security. To see how Perimeter 81 can help you secure your business, book your demo today.