Hi [[ session.user.profile.firstName ]]

Simplifying Connectivity to AWS using Transit Gateway with Perimeter 81

In this 45-minute webinar, we will explain how Perimeter 81, with a combination of AWS transit gateway, gives organizations the simplicity of accessing cloud resources in a secure way from anywhere in the world.

Together with AWS and our client SuperData, a Nielsen Company, we will explore the options for simplifying connectivity to AWS transit gateways using our platform.
Recorded Mar 19 2020 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Alvarez, Albert Ngo, Anjali Vijayakumar
Presentation preview: Simplifying Connectivity to AWS using Transit Gateway with Perimeter 81

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Demystifying the Realities of SASE Apr 29 2021 5:00 pm UTC 60 mins
    Amit Bareket, Zeus Kerravala, Michael Soussan
    The arrival of SASE is already producing incredible benefits for organizations, businesses, and enterprises that are securing their networks or remote workforce with cutting-edge cloud technology. SASE was coined in Gartner in 2019 and is defined as, “simplifying WAN networking and security by delivering both as-a-cloud-service directly to the source (user, device, office, edge location), rather than only the enterprise data center.”

    But, when it comes to the realities of SASE, myths exist that can prevent organizations from tapping into its incredible power. Many SMBs and SMEs may look at SASE being offered by large enterprise-facing vendors and believe those services are beyond their reach and resources. However, the reality of SASE services is its goal of democratizing access to the same enterprise-grade security, for organizations of any shape, size, industry, or budget. With a global shift towards remote work, SASE is primed and ready to become the go-to solution.

    In this webinar, Amit Bareket, CEO and Co-founder of Perimeter 81, and leading industry expert and principal analyst of ZK Research, Zeus Kerravala, come together to demystify the new reality of how SASE can protect the modern workforce and on-prem networks while simplifying and democratizing cloud security for the world at large.
  • The Network Security Prescription for Healthcare Recorded: Apr 22 2021 59 mins
    Sivan Tehila, Itay Meller, Or Biran
    Due to the profitable nature of selling Private Health information (PHI) data, many cyber criminals focused their efforts on the healthcare industry in 2020. In order to safeguard user PHI from exploitation, healthcare firms must therefore never underestimate the importance of securing PHI data versus financial related data.

    While 2020 can be characterized as the year of COVID-19 and ransomware crises and remote work, the challenges that healthcare organizations faced with data privacy and Proactive Patient Identification before the pandemic have not indicated that 2021 will be any different.

    The pandemic has impacted the way healthcare professionals offer care to patients and has accelerated usage of telemedicine and telehealth. With this shift in healthcare delivery, physicians rely on tools such as the Electronic Health Record (EHR) to be able access their patient’s charts from anywhere and share information with other healthcare providers and organizations.

    Join our webinar where we’ll discuss:
    - How have rapid shifts in telemedicine and telehealth increased privacy and security risks?
    - What tools are needed to safeguard the financial and personal information delivery of patients?
    - How do we satisfy the different stakeholders in today's environment and how do we provide a solution that satisfies everyone in these circumstances?
    - How can healthcare providers provide Secure Network Access to private information?
    - How can we mitigate threats relating to cloud-based devices?
    - How do you internally secure PHI information?
  • Perimeter 81 Presents: Network Traffic Control & Device Posture Check Recorded: Apr 6 2021 33 mins
    Miryam Brand, Alon Gvili, Daniel Goldfeld
    Cybersecurity demands for today’s businesses have evolved even faster than expected, making it imperative for organizations to adapt to stay protected. The workforce is becoming more remote as employees work from homes and unsecured locations, but organizational firewalls are restricted to on-premise networks. For IT and business decision-makers, if your employees can work from anywhere - why can’t your firewall? And how can you ensure that employees' devices are secure wherever they are located?

    In this webinar, the Perimeter 81 team, Miryam Brand, Alon Gvili, and Daniel Goldfeld, introduces and demonstrates two new security features: Network Traffic Control and Device Posture Check. By enabling these new premium features, organizations can maintain greater control over network access and device security, helping network admins and IT teams secure their corporate networks.

    Join Perimeter 81 in highlighting our latest Firewall-as-a-Service feature Network Traffic Control (NTC), as well as our Device Posture Check (DPC), designed for better endpoint protection. Together, we will explore these new features with a live demo and an open audience Q&A session to learn more.
  • Educating the Next Generation of Cybersecurity Professionals Recorded: Feb 16 2021 22 mins
    Zev Brodsky, Aleksandr Zhuk
    In 2021 the cybersecurity industry is seeing dramatic growth in jobs. But a massive shortage exists of security professionals with the necessary qualifications to fill those roles.

    Aleksandr Zhuk, Information Security Architect at Axoni joins the Zev Brodsky, of Beyond the Perimeter Podcast to discuss his experiences with IT, IT security and how he is helping to teach future experts of cybersecurity.
  • From Cloud to Compliance: Mitigating Cyber Risks for Financial Services Recorded: Feb 4 2021 39 mins
    Amit Bareket, Sid Yenamandra, Karen Mesoznik
    Financial service organizations manage large amounts of wealth and sensitive data, making them an ideal target for hackers. While digital business flourishes, financial institutions have become high-value targets of cyber attacks, forcing the industry to step up its security practices. Companies in financial services face additional challenges of meeting FINRA and SEC compliance requirements, satisfying strict regulators and managing data in order to mitigate risk.

    Many financial institutions are reluctant to adopt cloud-based services due to concerns over security, lack of privacy, changing regulations, traditional architecture, and various other factors. The fact of the matter is, cloud-based security solutions can and do address all of these concerns, with the added benefits of cost-reduction, flexibility, and scalability.

    The quick shift to remote work last year forced many organizations with a more traditional approach to rapidly adopt and deploy cloud-based technologies and services. While the financial industry had previously been slower on the uptake, COVID-19 accelerated this adoption and saw it quickly catch up with other industries, all while reaping the benefits of the cloud.

    In this webinar, Amit Bareket, CEO and Co-founder of Perimeter 81, and Sid Yenamandra, CEO and Founder of Entreda, now a part of Smarsh, will discuss the importance of cloud adoption for financial institutions and how cloud-based security solutions provide stronger defenses, clearer network visibility and are easily scalable. Together, they will explore the connection between network security and compliance and give practical tips and insights into securing your organization through the cloud.
  • Effectively Securing Thousands of Devices, One Day at a Time Recorded: Jan 18 2021 21 mins
    Zev Brodsky
    In this episode of the Beyond the Perimeter Podcast, Zev Brodsky speaks with Yoav Nathaniel, Cloud Security Architect at Goldman Sachs. Together they discuss how cyber attacks are becoming more complex, forcing IT teams to acquire more talented IT specialists to help fight off these attacks. Moreover, automation and network visibility are now essential for businesses and the modern IT security team.
  • The Evolution of Zero Trust: Past, Present and Future Recorded: Dec 9 2020 62 mins
    Stephanie Balaouras - Forrester and Amit Bareket - Perimeter 81
    While the principle of "never trust, always verify" has remained the same since the inception of Zero Trust almost two decades ago, the way that it is achieved differs based on changing technology. The Zero Trust model predated the digital transformation, cloud adoption, and shift to remote work - trends that would not have been possible without it. This idea, designed to protect modern digital environments, leverages network segmentation, helps prevent lateral movement, and simplifies granular user-access control by enforcing user authentication.

    Understanding the key concepts behind Zero Trust is crucial for securing your organization's network in today's day and age. In times where remote work and cloud adoption are on the rise, the perimeter is everywhere and adopting Zero Trust is especially important as it is not dependent on a location. With the individualized approach of Zero Trust, organizations can customize security for specific resources, users, applications and data. Achieving Zero Trust is neither as costly nor complex as often assumed as it is built upon existing architecture and does not require replacing technology.

    In this webinar, Perimeter 81 Co-founder and CEO, host Amit Bareket, will be joined by VP, Group Director Serving Security & Risk Professionals at Forrester, guest speaker Stephanie Balaouras. Together, they will explore how Zero Trust was conceived and what it entailed then, practical examples from the present day, and the vision for using Zero Trust moving forward. Perimeter 81 will also conduct a live product demo of the Perimeter 81 platform.


    Host: Amit Bareket - Co-founder and CEO of Perimeter 81
    Guest Speaker: Stephanie Balaouras - VP, Group Director Serving Security & Risk Professionals at Forrester
    Moderator: Karen Mesoznik - Sr. Director of Corporate Marketing at Perimeter 81
  • Transforming Secure Access: This Is Not Your Legacy VPN Recorded: Nov 19 2020 57 mins
    Amit Bareket - Co-founder & CEO of Perimeter 81 and Paul Asadoorian - Chief Innovation Officer at Cyber Risk Alliance
    While COVID-19 may have accelerated remote work and cloud adoption, these trends have steadily prevailed as the modern workforce changed dramatically over the past decade. Despite this, organizations are still using 30-year old legacy hardware, such as VPNs, to connect to resources from outside the office.

    For decades, professionals in charge of organizations’ networks were entirely focused on defining perimeters and setting up a line of defense to keep threats out. This approach served businesses well, with finite exposure points and attack vectors, and adherence to established best practices and frameworks. Today, strategies are changing, and the boundaries of organizations’ networks have become borderless - ever expanding to a growing number of endpoints and networks. Accordingly, the threat landscape is increasingly dangerous.

    The traditional network we once knew can no longer be trusted and is no longer adequate in securing remote and on-premises access. Additionally, the typical organization’s network is more complicated than ever, and traffic through these networks is increasingly convoluted, with data flowing between local resources, cloud applications, and mobile devices in rapid succession.

    Join Amit Bareket (Co-founder & CEO of Perimeter 81) and Paul Asadoorian (Chief Innovation Officer at Cyber Risk Alliance) for a technical deep-dive into the problems inherent in legacy VPN technology and how traditional solutions are putting our networks at risk, instead of securing them. Together they will explore solutions for the modern workforce and how momentum toward perimeter-less architecture is helping redefine the future of cybersecurity.
  • How Behavioral Economics Helps Manage Cybersecurity Risks Recorded: Oct 14 2020 49 mins
    Dr. Maria Blekher, Sivan Tehila, and Sounil Yu
    The behavior and decision-making processes of individuals have a direct impact on modern network security. If 90% of data breaches are caused by human error, understanding the way we think and behave is essential to successfully implementing cybersecurity frameworks and improving their effectiveness. On the other hand, humans are completely irrational.

    Fortunately, behavioral economics can help us understand why users make “bad security decisions” such as sharing devices, choosing poor passwords, downloading questionable links, etc. That’s even more important during the remote work era, when personal security hygiene has a greater impact on overall network health and one wrong decision can affect an entire organization.

    In today’s day and age where home is the new office and the perimeter is everywhere, behavioral economists would say that companies are seriously putting themselves at risk. By granting employees (and devices) too much access with little control in the way of monitoring or segmentation, the door opens further to hacks and breaches. Organizations must adjust to the new reality of a distributed workforce, and there is much to be learned from the behavioral economics discipline in regards to security posture.

    Join behavioral scientist Dr. Maria Blekher and cybersecurity experts Sivan Tehila and Sounil Yu to uncover the connection between behavioral economics and managing cybersecurity risks. Together, they will review the various factors that impact employees’ security decisions, and how we can apply them to our new remote work reality.

    Speakers:
    Sivan Tehila - Cybersecurity Expert, Director of Solution Architecture at Perimeter 81, Founder of Cyber Ladies NYC

    Dr. Maria Blekher - Behavioral Scientist, Founding Director at YU Innovation Lab, Clinical Associate Professor of Digital Strategies, Yeshiva University

    Sounil Yu - CISO in Residence at YL Ventures and Former Chief Security Scientist at Bank of America
  • [Podcast] A Day in the Life of a Security Incident Response Expert Recorded: Oct 12 2020 31 mins
    Zev Brodsky - Content Marketing Manager at Perimeter & Reut Menashe - Incident Response and Founder of Tetrisponse
    In this edition of the Beyond the Perimeter Podcast, we discussed the NorthShore data breach and interviewed Reut Menashe of Tetrisponse about security incident responding.
  • [Podcast] Why AppSec is Key for Your Dev Toolbox Recorded: Sep 17 2020 30 mins
    Zev Brodsky - Content Marketing Manager at Perimeter & Avi Douglen - CEO of Bounce Security
    Beyond The Perimeter Podcast, Episode 05: Why AppSec is Key for Your Dev Toolbox

    In this edition of the Beyond the Perimeter Podcast, we discussed the Poshmark data breach and interviewed Avi Douglen from Bounce Security about application security risks.
  • How Ingram Micro Partners are Utilizing Perimeter 81 for Their Clients Recorded: Sep 9 2020 62 mins
    Jim Finnerty and Jeff Rathmann, Moderated by Kevin Romo
    Silo City IT is a premier Managed Security Service Provider and Solutions Architecture firm specializing in Artificial Intelligence-based solutions.

    Join Ingram Micro partner Jeff Rathmann (CEO at Silo City IT) in conversation with Jim Finnerty (Channel Partner Manager at Perimeter 81) to learn how they are using Zero Trust network and application access for real world use cases in the age of remote work.

    Key Takeaways:
    - How Ingram Micro Partners Benefit using Perimeter 81
    - Considerations When Securing Remote Access for Clients
    - Practical Use Cases for Agentless VPN Access
    - Network Security Capabilities of a Cloud-based, SaaS Platform

    Speakers:
    Jeff Rathmann- CEO at Silo City IT
    Jim Finnerty,- Channel Partner Manager at Perimeter 81
    Moderated by Kevin Romo - Associate Marketing Manager at Ingram Micro Cloud
  • Criminal Evolution in the Age of COVID-19 & How Orgs. Adapt to the New Normal Recorded: Sep 2 2020 66 mins
    Keren Elazari and Sivan Tehila, Moderated by Karen Mesoznik
    Remote work is here for the long run, and as businesses adapt to the new normal, hackers are also adjusting to - and taking advantage of - this new status quo. The COVID-19 pandemic has changed the way we work by transitioning most of the workforce to be remote and turning our homes into offices. This shift has seen hackers and cybercriminals modify their approach and adapt their hacking methods accordingly.

    The combination of rapid cloud adoption, BYOD, and remote work have opened the door to new breaches and hacks. This requires organizations to transform their defensive playbooks and to better understand how hackers are utilizing the crisis for data theft. Recognizing how criminal business models have evolved is key to protecting our data and resources in the present.

    Join Keren Elazari (Cyber Security Analyst, Author & Researcher) and Sivan Tehila (Director of Solution Architecture at Perimeter 81) in a discussion about the evolution of security threats and cyber crime in our new remote work era. From Zoom bombing to account takeovers, access mining and phishing, we’ll shed light on emerging security threats and empower the audience with practical ideas on how to build a more secure future for your organization.

    Speakers:
    Keren Elazari - Cyber Security Analyst, Author & Researcher
    Sivan Tehila - Director of Solution Architecture at Perimeter 81
    Moderated by Karen Mesoznik - Sr. Director of Corporate Marketing at Perimeter 81
  • [Podcast] Your Security Strategy Is Only as Strong as Your Security Hygiene Recorded: Aug 19 2020 23 mins
    Zev Brodsky - Content Marketing Manager at Perimeter & Sivan Tehila - Director of Solution Architecture at Perimeter 81
    Beyond The Perimeter Podcast, Episode 04: Your Security Strategy Is Only as Strong as Your Security Hygiene

    In this edition of the Beyond the Perimeter Podcast, we discussed the Promo.com data breach and interviewed Sivan Tehila, our very own Director of Solution Architecture, to gain her insights about security hygiene.
  • [Podcast] Hacking with a Purpose: Life as a White Hat Hacker Recorded: Aug 2 2020 28 mins
    Zev Brodsky - Content Marketing Manager at Perimeter & Len Noe - White Hat Hacker and Cyber Security Specialist
    Beyond The Perimeter Podcast, Episode 03: Hacking with a Purpose: Life as a White Hat Hacker

    In this edition of the Beyond the Perimeter Podcast, we discussed the Twitter hack which saw many famous celebrity accounts being hijacked which resulted in spreading a cryptocurrency scam. We also interviewed Len Noe who is a white hat hacker and cyber security specialist.
  • Why a Secure Network is a Must for Testing in the Age of Remote Work Recorded: Jul 29 2020 60 mins
    Sivan Tehila - Perimeter 81 & Justin Dolly - Sauce Labs. Moderated by Karen Mesoznik - Perimeter 81
    The transition to the cloud is inevitable and necessary, but it comes with a host of cyber risks. Streamlining and automating testing of mobile and desktop apps through the cloud saves organizations time, money, and resources but it is important to make sure that the testing environment on the cloud is secured. When testing product, web, or mobile applications, employees’ networks and connections must be secured in order to add another layer of protection against hackers trying to breach the testing environment.

    In this webinar, security experts Sivan Tehila and Justin Dolly will discuss:
    - The various threats to your network and to your testing environment that have come about as a result of remote work
    - How cybersecurity is an integral part of the organization's business continuity plan
    - Tips and best practices for securing the home network when the endpoint is now everywhere

    About the Speakers:

    Sivan Tehila is the Director of Solution Architecture at Perimeter 81. Sivan is a cybersecurity expert with over 13 years of experience in the industry, having served in the IDF as an Intelligence Officer and then in various field positions including Information Security Officer and a cybersecurity consultant. For the past two years, Sivan has dedicated herself to promoting women in Cybersecurity and founded the Leading Cyber Ladies community in NYC.


    Justin Dolly is Chief Security Officer at Sauce Labs, where he oversees the development and implementation of the company’s long-term security strategy, ensuring its customers have the highest level of protection to support their digital goals. He is a Certified Chief Information Security Officer (CCISO) with more than 20 years of experience in building and implementing a culture of security within global organizations.
  • What will cyber security look like in the post-COVID-19 world? Recorded: Jul 8 2020 48 mins
    Richard Stiennon - Industry Analyst & Amit Bareket - Perimeter 81, Moderated by Karen Mesoznik - Perimeter 81
    In addition to all of the demographic, economic, and healthcare implications brought on by COVID-19, the once-familiar 9-to-5 office environment as we know it has changed dramatically. Remote work, once expected to be the future, is now our new reality. Even though Gartner predicted that by 2020, half of the US workforce would be working remotely, no one could have anticipated it to become ubiquitous during the COVID-19 outbreak. Now, nearly everyone has been forced to work from home for the foreseeable future. Organizations have been seeing an increase in productivity from employees and have extended their work from home policies until the end of 2020, or even indefinitely.

    Along with all of its benefits, remote work also brings a host of cyber security risks that are harder to tackle outside of the office. Additionally, with millions of people connecting to their corporate networks from their homes, network infrastructure is being taxed like never before, creating new issues of internet overload and skyrocketing VPN usage.

    While the future remains uncertain, organizations are embracing the new normal, and now is the time for CISOs and IT managers to start thinking about how they will continue securing their teams while working remotely. Join us as we discuss the future of cyber security, and how the pandemic that changed the world is inevitably accelerating the way we consume cyber and network security.
  • [Podcast] Young Startup: Are You Ready for a CISO Onboard? Recorded: Jul 7 2020 18 mins
    Zev Brodsky - Content Marketing Manager at Perimeter & Reut Weitzman- COO and Cybersecurity Consultant at QMasters
    Beyond The Perimeter Podcast, Episode 02: Young Startup: Are You Ready for a CISO Onboard?

    In this edition of the Beyond the Perimeter Podcast, we explained how millions of Chrome users might be affected by the Google Chrome security breach and we interviewed Ms. Reut Weitzman who is the COO and Cybersecurity Consultant at QMasters to learn about her experience and insights as a CISO at a startup.
  • [Podcast] From Young Hacker to Security Researcher Recorded: Jun 22 2020 22 mins
    Zev Brodsky - Content Marketing Manager at Perimeter & Ryan Nolette - Independent Security Researcher
    Beyond The Perimeter Podcast, Episode 01: From Young Hacker to Security Researcher

    In this edition of the Beyond the Perimeter Podcast, we learn from security researcher Ryan Nolette how he made a hobby into his career.
  • Simplifying Network Security for the Modern and Distributed Workforce Recorded: Jun 14 2020 43 mins
    Jim Finnerty - Channel Partner Manager at Perimeter 81 and Sivan Tehila - Director of Solution Architecture at Perimeter 81
    In this webinar for MSPs and resellers, hosted by our partner Ingram Micro Cloud, we cover:

    1. How to easily incorporate the Zero Trust security model in your network architecture

    2. What are Perimeter 81’s unique features?

    3. How can Perimeter 81 benefit partners and MSPs?

    4. The future of network security: a one-stop shop for network and security needs

    With the rise of the mobile workforce and cloud transformation, the traditional network we once knew can no longer be trusted. Many companies are moving to cloud infrastructures such as AWS, Google Cloud, Azure, etc. However, many companies are still using the same site-centric and hardware-based network security appliances that are no longer adequate in securing remote and on-premises access.

    Unlike traditional hardware-based network security providers, Perimeter 81 provides greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers, giving companies of all industries and sizes the power to be securely mobile and cloud-confident.
The Secure Network as a Service
Cloud and mobility are creating a mega shift in traditional network security, and hardware-based solutions are not capable of accommodating this migration. Unlike legacy solutions, Perimeter 81’s Zero Trust Secure Network as a Service utilizes a Software-Defined Perimeter architecture, offering greater network visibility, seamless onboarding, and full compatibility with all major cloud providers.

Perimeter 81 also incorporates robust security capabilities following the SASE model, a term coined by Gartner to describe the convergence of security and network management inside one platform. Our product, which subscribes to this new concept gives companies of all industries and sizes the power to be fully mobile and completely cloud-confident.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Simplifying Connectivity to AWS using Transit Gateway with Perimeter 81
  • Live at: Mar 19 2020 11:35 am
  • Presented by: James Alvarez, Albert Ngo, Anjali Vijayakumar
  • From:
Your email has been sent.
or close