Hi, how can we help you today?

Perimeter 81 Alternatives

Perimeter 81 is a cloud-based network as a service that provides secure internet access and remote connectivity to businesses through a global network of secure access points. It offers scalable, reliable, and easy-to-use solutions for secure networking.

Alternative Products

ESET Endpoint Security logo

ESET Endpoint Security

ESET Endpoint Security protects endpoints from various threats with advanced AI-powered technology, including anti-malware, firewall, and VPN features. It provides robust protection against ransomware, phishing, and zero-day attacks while minimizing system impact for smooth business operations.

Overall Rating 4.2 (11,266 Reviews)

Productivity: 11%

ROI: 15%

AI icon

Categories: 17

AI icon

Features: 101

Pulseway logo

Pulseway

Pulseway is a cloud-based ITSM and RMM (Remote Monitoring & Management) solution that provides real-time monitoring, automated patch management, and proactive issue resolution for small to medium-sized businesses.

Overall Rating 4.7 (422 Reviews)

Productivity: 80%

ROI: 40%

AI icon

Categories: 12

AI icon

Features: 92

MySQL

MySQL is a free and open-source relational database management system (RDBMS) that utilizes Structured Query Language (SQL) to store and retrieve data. It supports multi-threaded, SQL-based architecture and is designed to handle large databases with high scalability and performance. MySQL provides ACID compliant transactions and supports various storage engines for flexible data storage options.

Overall Rating 4.5 (3,758 Reviews)

Productivity: 53%

ROI: 63%

AI icon

Categories: 7

AI icon

Features: 65

WebTitan

WebTitan is a comprehensive web filtering solution designed to protect users from online threats. It blocks malware, phishing attempts, and unauthorized websites, ensuring a safe browsing experience. The software also offers content control features, allowing administrators to restrict access to specific websites or categories of sites. WebTitan integrates with existing DNS infrastructure, providing seamless protection for networks of all sizes.

Overall Rating 4.3 (371 Reviews)

Productivity: 51%

ROI: 4%

AI icon

Categories: 7

AI icon

Features: 55

ManageEngine Firewall Analyzer

ManageEngine Firewall Analyzer is a network traffic monitoring and analysis tool that provides real-time visibility into firewall activity, detecting security threats, and optimizing network performance. It offers detailed reporting, alerting, and automated compliance features for improved IT management.

Overall Rating 4.6 (200 Reviews)

Productivity: 26%

ROI: 2%

AI icon

Categories: 5

AI icon

Features: 46

Network Configuration Manager

Network Configuration Manager is a centralized solution for managing network device configurations. It automates and streamlines the process of deploying, modifying and backing up configurations across multiple devices, reducing errors and downtime caused by misconfigurations or out-of-date settings. This software enables IT teams to monitor and control network configurations from a single interface.

Overall Rating 4.5 (3,629 Reviews)

Productivity: 5%

ROI: 36%

AI icon

Categories: 4

AI icon

Features: 42

TunnelBear

TunnelBear is a VPN service that provides secure internet browsing by encrypting data and masking IP addresses through a global network of servers, offering user-friendly apps for various platforms.

Overall Rating 4.5 (499 Reviews)

Productivity: 31%

ROI: 39%

AI icon

Categories: 4

AI icon

Features: 39

Device42

Device42 is an IT asset management and data center infrastructure management (DCIM) software that helps organizations visualize and manage their physical and virtual assets, inventory, and relationships in real-time.

Overall Rating 4.6 (118 Reviews)

Productivity: 34%

ROI: 17%

AI icon

Categories: 4

AI icon

Features: 36

VPN and Endpoint Security Clients

Secure remote access and endpoint protection software that encrypts internet traffic, blocks malware, and enforces security policies on devices connecting to a network, ensuring confidentiality, integrity, and authenticity of data transmission.

Overall Rating 4.3 (1,468 Reviews)

Productivity: 35%

ROI: 22%

AI icon

Categories: 4

AI icon

Features: 35

SecureLink

SecureLink is a secure and compliant remote access solution that enables healthcare providers to connect with patients securely through a HIPAA-compliant platform, ensuring confidentiality, integrity, and availability of patient data.

Overall Rating 4.2 (241 Reviews)

Productivity: 16%

ROI: 29%

AI icon

Categories: 3

AI icon

Features: 29

Nessus

Nessus is a comprehensive vulnerability scanner that detects and reports on security weaknesses across various systems, networks, and applications. Its advanced scanning capabilities enable users to identify potential threats, prioritize remediation efforts, and ensure compliance with regulatory requirements. It supports a wide range of platforms and technologies, making it a versatile tool for IT professionals and security teams.

Overall Rating 4.5 (379 Reviews)

Productivity: 22%

ROI: 15%

AI icon

Categories: 3

AI icon

Features: 26

FortiClient

FortiClient is a lightweight endpoint security solution that provides real-time protection against malware, viruses, and other cyber threats. It integrates with Fortinet's network security solutions to offer advanced threat detection and remediation capabilities. The software includes features such as firewall management, application control, and antivirus scanning, ensuring comprehensive endpoint security for businesses and organizations.

Overall Rating 4.4 (503 Reviews)

Productivity: 16%

ROI: 14%

AI icon

Categories: 2

AI icon

Features: 22

access server

Our Access Server is a scalable and secure platform that enables remote access to your network resources while maintaining robust security features. It supports multiple protocols, including RDP, VNC, SSH, and more, providing users with flexibility in their access options. With granular access controls and advanced logging capabilities, you can trust our server to safeguard your sensitive data.

Overall Rating 4.5 (425 Reviews)

Productivity: 12%

ROI: 18%

AI icon

Categories: 2

AI icon

Features: 19

DNSFilter

DNSFilter is a cloud-based web content filtering and security solution that protects users from online threats and unwanted websites. It filters out malicious URLs, blocks phishing sites, and enforces acceptable use policies across devices. With customizable categories and granular control, DNSFilter helps organizations maintain a secure and productive digital environment for employees and students.

Overall Rating 4.6 (325 Reviews)

Productivity: 14%

ROI: 8%

AI icon

Categories: 2

AI icon

Features: 18

GoodAccess

GoodAccess is a cloud-based security platform that provides secure and seamless access to company resources for remote workers. It uses AI-powered zero-trust architecture to verify user identities and control access based on context, ensuring that users have the right level of access to the resources they need without compromising security.

Overall Rating 4.8 (244 Reviews)

Productivity: 17%

ROI: 9%

AI icon

Categories: 2

AI icon

Features: 19

Lookout

Lookout is a cloud-based cybersecurity platform that detects and prevents mobile threats, providing real-time protection against malware, phishing, and other online dangers through AI-powered scanning and alerts.

Overall Rating 4.5 (141 Reviews)

Productivity: 19%

ROI: 19%

AI icon

Categories: 2

AI icon

Features: 21

Cisco Umbrella

Cisco Umbrella is a cloud-delivered security service that protects networks, users, and applications from threats using DNS-layer security, preventing malware, phishing, and other online attacks before they reach the network.

Overall Rating 4.3 (131 Reviews)

Productivity: 13%

ROI: 5%

AI icon

Categories: 1

AI icon

Features: 12

iboss

iBoss is a cloud-based cybersecurity solution that provides advanced threat protection, web filtering, and content control for businesses, schools, and organizations, protecting users from online threats and maintaining network security.

Overall Rating 3.6 (18 Reviews)

Productivity: 10%

ROI: 11%

AI icon

Categories: 1

AI icon

Features: 11

Unified Threat Management

Unified Threat Management (UTM) software provides comprehensive security protection for organizations by combining multiple security features into a single solution. It integrates firewall, intrusion detection and prevention systems, antivirus software, and content filtering to detect and block various types of threats, including malware, viruses, and other cyber-attacks.

Overall Rating 3.5 (939 Reviews)

Productivity: 10%

ROI: 9%

AI icon

Categories: 1

AI icon

Features: 12

Cloud Access Security Broker CASB

Cloud Access Security Broker (CASB) software enables organizations to monitor and control cloud application usage, enforce security policies, detect threats, and ensure compliance, providing visibility and control over cloud-based data.

Overall Rating 3.7 (17 Reviews)

Productivity: 9%

ROI: 8%

AI icon

Categories: 1

AI icon

Features: 14


Hi there, what do you need?

We need a reliable project management software for 50 for less than 10$ per user...

Audit platform with integrated learning and inventory management...

I need a dental clinic software to handle, bookings and payments...

Recommend me an easy and fast to implement chatbot for our support...

Our Advanced algorithm will find the best solution for your needs and filter out all the nonsense and marketing buzz for you