Perimeter_81 Profile Banner
Perimeter 81 Profile
Perimeter 81

@Perimeter_81

Followers
1K
Following
1K
Media
682
Statuses
1K

Perimeter 81 is a robust, yet easy to use, cloud-delivered secure network, which connects and protects all business resources and users.

Worldwide
Joined December 2017
Don't wanna be here? Send us removal request.
@Perimeter_81
Perimeter 81
2 years
It’s official πŸŽ‰ We’re a @CheckPointSW company 🀝 Have a look at our new logo 🌟 Exciting times coming up πŸ™ŒπŸ½
2
6
10
@CheckPointSW
Check Point Software
2 years
πŸ“’ We've completed the acquisition of @Perimeter_81! This acquisition reinforces our dedication to ensuring fast and secure access for remote users, sites, datacenters, and the internet. Learn more: https://t.co/9EY3IYGTdo #acquisition #cybersecurity
1
2
3
@Perimeter_81
Perimeter 81
2 years
Unmanaged devices are a ticking time bomb πŸ’£ BYOD has transformed the workplace. But every unmanaged device could be a backdoor for threats. Unmanaged devices are potential cyber entry points. How does your company handle unmanaged devices?
0
1
1
@Perimeter_81
Perimeter 81
2 years
πŸ” Breach aftermath: Setback or stepping stone? Breaches test our trust. Yet, recovery isn't just damage controlβ€”it's crucial to network security. With the proper steps, trust rebuilds stronger. No fluff, just real solutions πŸš€ What's your post-breach move? πŸ‘©β€πŸ’»πŸ‘‰
1
2
1
@Perimeter_81
Perimeter 81
2 years
What happened when @DatagenTech leveraged Perimeter 81 for seamless global team collaboration? Faster connections, easy onboarding & a surprise: hidden malware detections! 🌐 Dive into the case study: https://t.co/7rlCLn33Tn πŸ“Š #Cybersecurity #MalwareProtection
0
0
1
@Perimeter_81
Perimeter 81
2 years
Think AWS connections are a maze? Think again! Discover Perimeter 81's simple 4-step AWS integration in this guide πŸ‘‰ https://t.co/rrNjEjwPNE ?utm_source=twitter&utm_medium=soc&utm_campaign=aws_datasheet Challenging integrations? Tell us below! πŸ‘‡ #AWS #NetworkingChallenge
0
0
1
@Perimeter_81
Perimeter 81
2 years
"Building trust with Zero Trust?" πŸ€” Since its 1994 emergence, it's evolved into a staple for network security. Ready to dive in or still weighing it? Share your thoughts! πŸ’¬ #ZeroTrust #Cybersecurity
1
1
2
@Perimeter_81
Perimeter 81
2 years
We are excited to share we have signed a definitive agreement to be acquired by @CheckPointSW! Combining our advanced, easy-to-use cloud network security capabilities, with Check Point's cutting-edge security and SD-WAN solutions, we will build the world's premier SASE platform.
1
10
24
@Perimeter_81
Perimeter 81
2 years
Network security is in the details. That's why @Zivver_EN teamed up with us for: πŸ” Better user auth 🎯 Enhanced access control 🌐 Global connectivity boost ⏱️ Efficient user onboarding/offboarding πŸ›‘οΈ Fewer errors & risks Dive into the case study: https://t.co/jHD4dRhNbr
0
0
3
@Perimeter_81
Perimeter 81
2 years
AI is the talk of the town. But are we all on the same page when it comes to use cases for network security? Whether it's ML, LLMs, or GENAI, there's a lot that can be done to boost network security. Is AI the future of network security?
0
0
0
@Perimeter_81
Perimeter 81
2 years
Did you know? Cyber attacks started as early as the 1970s with the Creeper virus πŸ•·οΈ Fast forward to today ⏩ cyber attacks have morphed into a multi-billion dollar 'industry' that continues to evolve and threaten businesses worldwide. What's your strategy against cyber threats?
0
0
1
@Perimeter_81
Perimeter 81
2 years
What's the best way a small business can keep malware out? Is it an elaborate offensive approach? Or do several lines of defense offer the best protection? Let us know πŸ—³οΈ What's your top strategy against malware attacks?
0
1
2
@Perimeter_81
Perimeter 81
2 years
#ITipOfTheWeek 1st step in protecting your organization from malware attacks: Know the malware threat-scape πŸ•·οΈ Malware attacks have developed and become harder to stop. Which is the most important? πŸ‘‡πŸΌ
0
0
1
@Perimeter_81
Perimeter 81
3 years
Wow! 43 Awards πŸ† We're thrilled to share our @G2 Summer Awards that we received thanks to our customer's reviews πŸ™πŸΎ It's hard to say which award we're most proud of, so here are three that got us very excited: 1️⃣ Fastest Implementation 2️⃣ Best Usability 3️⃣ Leader for Enterprise
0
0
1
@Perimeter_81
Perimeter 81
3 years
How many security vendors does your company have?
0
0
0
@Perimeter_81
Perimeter 81
3 years
H2 is just around the corner. Time to share our H2 security resolutions πŸŽ‰ What's your H2 security resolution? Share it in the comments πŸ‘‡πŸΌ #networkprotection #cybersecurity #ITAdmins
0
0
0
@Perimeter_81
Perimeter 81
3 years
Has your organization been socially engineered? Watch our latest conversation with world-renowned people hacker @Jenny_Radcliffe on #ransomware and how you can protect your company. Watch the full video here 🎬 https://t.co/fkm7UqQxhu
0
0
1
@Perimeter_81
Perimeter 81
3 years
As an MSP, your customers know that you have their back. But who’s got your back? Follow these 7️⃣ essential steps tailored specifically for MSPs to enhance the security of your RMM or PSA platform. https://t.co/fqOB95FNVT #msp #itpartner #mssp
0
0
1
@Perimeter_81
Perimeter 81
3 years
IT admins are often the unsung heroes of the workplace. Working behind the scenes to keep everything running smoothly. But are they being included in decision-making processes? We want to hear how often organizations involve IT admins in decision-making processes πŸ‘‡πŸΌ #itadmins
0
0
0
@Perimeter_81
Perimeter 81
3 years
Why use a converged network security platform? πŸ‘‰πŸΌ Simplified security management πŸ‘‰πŸΌ Improved security effectiveness πŸ‘‰πŸΌ Reduce costs Still not sure? Read the full CRA report here -> https://t.co/A2fmcXlNl2
0
0
1