In our comparison of Endpoint Protector vs. Perimeter 81, Perimeter 81 is the best option with a higher overall Wheelhouse Score. Wheelhouse Score uses a combination of feature and pricing comparison data, average user ratings, and editorial reviews to score software vendors on a scale of 1-10.
* Vendor does not share prices.
For most businesses, Endpoint Protector is a lifesaver when it comes to managing USB access and averting data leaks. It's a game-changer because we can now readily ban or allow USBs based on individual needs. Even yet, there are still certain license nuances that need to be resolved. The incompatibility with FIPS 140-2 is the largest disappointment. It would be an unbeatable combination of data security if they could create their own FIPS 140-2 USBs or even apply policies to these high-security devices.
Easy to implement
Licensing issues, Missing feature
Perimeter 81 assists me in safeguarding the personal and sensitive information of my customers. As someone who deals with such data, this product helps me ensure its security and protection.
The best aspect of Perimeter 81, as experienced by my company, is its flawless performance and speed. So far, I haven't encountered any issues, and everything has been working efficiently. I have no negative feedback to share.
There are no complaints or dislikes to mention at this time. Everything has been functioning well.
For most businesses, Endpoint Protector is a lifesaver when it comes to managing USB access and averting data leaks. It's a game-changer because we can now readily ban or allow USBs based on individual needs. Even yet, there are still certain license nuances that need to be resolved. The incompatibility with FIPS 140-2 is the largest disappointment. It would be an unbeatable combination of data security if they could create their own FIPS 140-2 USBs or even apply policies to these high-security devices.
Easy to implement
Licensing issues, Missing feature
The product solves the problem of remote access by providing a SaaS solution with dedicated access points and IP address allocations. This greatly benefits our organization by ensuring secure and reliable remote access for our team members.
One of the standout features is how quickly and seamlessly we were able to replace our remote access solution during our SOC2 Type II process. Within just 15 minutes, we connected our G-Suite for SSO, implemented access restrictions for our GCP instances, configured IP whitelisting for our main SaaS services, and invited our entire team. The user-friendly native agent has made it easy for both technical and non-technical teams to use without any issues. Additionally, having access points in the specific geo-locations we needed (Israel, EMEA, and US) has greatly improved performance.
There isn't much to dislike, especially after exploring other solutions. However, it would be nice to have additional dashboards, bandwidth tracking, and more granular traffic control within the Perimeter 81 network as our company grows.
For most businesses, Endpoint Protector is a lifesaver when it comes to managing USB access and averting data leaks. It's a game-changer because we can now readily ban or allow USBs based on individual needs. Even yet, there are still certain license nuances that need to be resolved. The incompatibility with FIPS 140-2 is the largest disappointment. It would be an unbeatable combination of data security if they could create their own FIPS 140-2 USBs or even apply policies to these high-security devices.
Easy to implement
Licensing issues, Missing feature
For most businesses, Endpoint Protector is a lifesaver when it comes to managing USB access and averting data leaks. It's a game-changer because we can now readily ban or allow USBs based on individual needs. Even yet, there are still certain license nuances that need to be resolved. The incompatibility with FIPS 140-2 is the largest disappointment. It would be an unbeatable combination of data security if they could create their own FIPS 140-2 USBs or even apply policies to these high-security devices.
Easy to implement
Licensing issues, Missing feature
Perimeter 81 assists me in safeguarding the personal and sensitive information of my customers. As someone who deals with such data, this product helps me ensure its security and protection.
The best aspect of Perimeter 81, as experienced by my company, is its flawless performance and speed. So far, I haven't encountered any issues, and everything has been working efficiently. I have no negative feedback to share.
There are no complaints or dislikes to mention at this time. Everything has been functioning well.
The product solves the problem of remote access by providing a SaaS solution with dedicated access points and IP address allocations. This greatly benefits our organization by ensuring secure and reliable remote access for our team members.
One of the standout features is how quickly and seamlessly we were able to replace our remote access solution during our SOC2 Type II process. Within just 15 minutes, we connected our G-Suite for SSO, implemented access restrictions for our GCP instances, configured IP whitelisting for our main SaaS services, and invited our entire team. The user-friendly native agent has made it easy for both technical and non-technical teams to use without any issues. Additionally, having access points in the specific geo-locations we needed (Israel, EMEA, and US) has greatly improved performance.
There isn't much to dislike, especially after exploring other solutions. However, it would be nice to have additional dashboards, bandwidth tracking, and more granular traffic control within the Perimeter 81 network as our company grows.
Add suggested to comparison
In our rating and review comparison of Endpoint Protector vs. Perimeter 81, Perimeter 81 has 15 user reviews and Endpoint Protector has 10. The average star rating for Perimeter 81 is 4.8 while Endpoint Protector has an average rating of 4.7. Perimeter 81 has more positive reviews than Endpoint Protector. Comparing Endpoint Protector vs. Perimeter 81 reviews, Perimeter 81 has stronger overall reviews.
Endpoint Protector vs. Perimeter 81 both offer a strong set of features and functionality including Cybersecurity Features, Cybersecurity Protection Types, Reporting & Analytics, Governance, Risk, & Compliance (GRC), Identity and Access Management (IAM), Network Management, Device Management, Sync/Refresh, Software Development Lifecycle (SDLC) Integrations, After-Sales Service, Limits. In our feature comparison of Endpoint Protector vs. Perimeter 81, Perimeter 81 offers more of the most popular features and tools than Endpoint Protector.
In our pricing comparison of Endpoint Protector vs. Perimeter 81, Perimeter 81's pricing starts at $8/month and is more affordable compared to Perimeter 81's starting cost of $8/month.
Our comparison of Endpoint Protector vs. Perimeter 81 shows that Perimeter 81 scores higher in usability for meets requirements, quality of support, ease of admin. Endpoint Protector scores higher in ease of use, learning curve, setup & support, but Perimeter 81 has the best scores overall for system usability.
Get your personalized recommendations now.