# Perimeter 81 Software Pricing, Alternatives & More 2026 | Capterra

> With the help of Capterra, learn about Perimeter 81 Software - reviews, pricing plans, popular comparisons to other VPN products and more.

Source: https://www.capterra.com/p/166731/Perimeter-81

---

# 

 Perimeter 81 Software Review 2026: Features, Integrations, Pros & Cons

Last updated on March 13, 2026

Provider data verified by our Software Research team, and reviews moderated by our Reviews Verification team.

Independent research methodology

Capterra’s researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology. [Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI. [Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website. [Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)

[Description](#description)[Use cases](#use-cases)[Alternatives](#alternatives)[Features](#features)[Pricing](#pricing)[Integrations](#integrations)[Support](#support)[Reviews](#reviews)

Perimeter 81

## What is Perimeter 81?

Perimeter 81 is a leading Zero Trust Network Access platform, ensuring secure remote access from anywhere. Secure your organization with both agent and agentless access as well as advanced security features such as Firewall as a Service, device posture security, and SWG. With its groundbreaking ease-of-use and global network of PoPs, Perimeter 81 allows you to manage your network and scale as you grow.

## What is Perimeter 81 used for?

[VPN](https://www.capterra.com/vpn-software/)[Remote Work](https://www.capterra.com/remote-work-software/)[Network Security](https://www.capterra.com/network-security-software/)

Top alternative

Featured

Overall rating

Based on 80 user reviews

Reviews sentiment

Positive

98%

Neutral

1%

Negative

1%

Starting price

$8

Per User, Per Month

Free trial  
not available

Capterra Shortlist charts the highest-rated and most popular products...

Our "Best of" badge program showcases products with the highest ratings...

Our "Best of" badge program showcases products with the highest ratings...

Do you work for Perimeter 81?[Manage this product listing](https://digitalmarkets.gartner.com/get-listed/claim-bx?url=https://www.checkpoint.com&name=Perimeter 81)

## Compare with a popular alternative

Capterra selects software alternatives based on relevant features, verified user reviews and user interactions. Placement may be influenced by client status.

### Perimeter 81

4.8 (80)

VS.

[4.6 (33)](https://www.capterra.com/p/203059/NordLayer/reviews/)

Starting Price

$8

Per User, Per Month

Starting Price

$8

Per User, Per Month

Free Trial

Free Version

Pricing Options

Free Trial

Free Version

Ease Of Use

4.7 (80)

Ease Of Use

4.7 (978)

Value For Money

4.7 (53)

Value For Money

4.3 (516)

Customer Service

4.8 (59)

Customer Service

4.2 (511)

## Perimeter 81 alternatives

[4.6 (264)](https://www.capterra.com/p/175092/JumpCloud-DaaS/reviews/)

Starting price

$3.00

Per User, Per Month

[Cisco AnyConnect](https://www.capterra.com/p/169495/VPN-and-Endpoint-Security-Clients/)

[4.6 (978)](https://www.capterra.com/p/169495/VPN-and-Endpoint-Security-Clients/reviews/)

Starting price

Contact vendor for pricing

[Learn More](https://www.capterra.com/p/169495/VPN-and-Endpoint-Security-Clients/)

Highest Rated

[UTunnel VPN](https://www.capterra.com/p/199683/Utunnel-VPN/)

[5.0 (69)](https://www.capterra.com/p/199683/Utunnel-VPN/reviews/)

Starting price

$6.00

Per User, Per Month

[Learn More](https://www.capterra.com/p/199683/Utunnel-VPN/)

[GoodAccess](https://www.capterra.com/p/208155/GoodAccess/)

[4.9 (103)](https://www.capterra.com/p/208155/GoodAccess/reviews/)

Starting price

$7.00

Per User, Per Month

[Learn More](https://www.capterra.com/p/208155/GoodAccess/)

[View all alternatives](https://www.capterra.com/p/166731/Perimeter-81/alternatives/)

## Features

Features with the highest number of reviews are displayed first. Those that have no reviews appear next, sorted alphabetically.

Remote Access/Control

4.7 (39)

61.54% of 39 reviewers that rated this feature as important or highly important

Access work applications remotely, for when working away from the office and/or traveling

Encryption

4.8 (21)

76.19% of 21 reviewers that rated this feature as important or highly important

Convert data into a code for security

Single Sign On

4.6 (21)

66.67% of 21 reviewers that rated this feature as important or highly important

Allow users to access multiple services after entering their login credentials once

Access Controls/Permissions

4.5 (20)

60.00% of 20 reviewers that rated this feature as important or highly important

Define levels of authorization for access to specific files or systems

Anonymous Browsing

4.8 (20)

45.00% of 20 reviewers that rated this feature as important or highly important

Users can access websites without revealing their IP addresses

Secure Browsing

4.8 (18)

72.22% of 18 reviewers that rated this feature as important or highly important

Allow or block access to specific domains and individual pages

Perimeter 81 69 features

Define levels of authorization for access to specific files or systems

Control and manage access to company resources

Track and report on everything that happens within the system or network

Track and document all activities across devices, networks, and other systems

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Users can access websites without revealing their IP addresses

Application programming interface that allows for integration with other systems/databases

Identify and respond to security threats to developed applications

Plan, schedule, and execute organization's accounts and assets to ensure compliance with policies and laws

Verify the identity of users/devices to enable secure access

Track and analyse user behavior within a system or network

Monitor service demand and performance to plan for adequate resources that meet business needs

Identify and respond to security threats to cloud applications

Track and manage adherence to policies for any service, product, process, or supplier

Identify component attributes like servers, hardware, software, and manage relationships across all services

Manage usernames, account numbers, passwords, biometric data, public access keys, and other documentation

Assembly of graphs and charts for visualizing and tracking statistics/metrics

Manage and store data in a database

Prevention of DNS leaks that allows ISPs to track internet movements

Monitor and track what your employees are doing

Convert data into a code for security

Track status, assign actions, and control access to systems for devices within the organization

Protect users working remotely and provide secure environments for personal devices to access company programs

A chronological record of actions or occurrences within a network, software, or process

Find & retrieve relevant data or documents

Monitor and control network/web traffic based on predetermined rules, protecting against unauthorized access and threats

Intended to be used by managed service providers

Hiding the end user's IP address and replacing it with a different address

Managing inventories and tracking changes to hardware and software configurations

Tracking KPIs over a certain period to assess helpdesk issues, ticket status & resolution, costs and revenue stats, assets usage & more

Immediately stop the process from executing

Accounts held by members of an organization

Access software remotely via mobile devices

Observe and track the demand, usage, progress or quality of a system, product, or user

Manage and support multiple languages

Manage and support multiple locations

Network topology maps providing infrastructure visualization for devices, connections, configurations, etc.

Tracks and makes accessible data on the health of servers and other network components.

Set up and configure network resources to make them accessible for authorized users, devices and servers

Prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources

A set of indicators that tracks the performance of networks, applications, systems, teams, etc.

Create, manage, and track policies and procedures within an organization

Estimate or forecast of a future scenario based on the study of present trends

Active monitoring of systems, applications, or networks

Notifications that are delivered to users as soon as an event occurs

Access work applications remotely, for when working away from the office and/or traveling

Remotely monitor and manage client networks, endpoints, systems, and devices via locally installed applications

Collection, analysis, and representation of numerical data and generation of reports to understand various patterns

View and track pertinent metrics to find patterns and gain insights from data

Set & manage permission levels based on user roles and restrict access to only authorized individuals

Search and filter data across systems to locate required information by entering keywords or certain criteria

Allow or block access to specific domains and individual pages

Securely stores data to prevent data loss or breaches

Includes firewalls, intrusion detection, and network-based antivirus programs to provide security against online threats

Continuously scan servers on a designated network to monitor health and search for any irregularities or failures

Set and monitor service level agreements to ensure timely response and resolution

Allow users to access multiple services after entering their login credentials once

Set up connections to third-party platforms to improve business processes

Information to prevent, understand and identify cyber threats

Identifying, analyzing, and mitigating security issues and taking appropriate action to protect systems and data from potential harm

Convert sensitive data into unique identification symbols (Tokens) that retain all essential information

Extra layer of security that requires not only a password and username but also something specific to that user

Track the availability time for a designated network or website over a given period of time

Manage user accounts, profiles, roles, permissions, and other details across applications, devices or networks

Create, modify, disable, or delete user accounts and their profiles across IT infrastructures

Maintain and control user sessions (including session tracking, timeouts and termination) in a web application or system

Extend virtual private network over public networks to enable protected information exchange

Collect and analyze traffic data about website visitors

Control system access and/or deliverability for applications and email addresses

Get Advice

We can help you find the software with the features you need.

Features

4.7 (80)

4.7

Based on 80 reviews

## Pricing

Value for money

4.7 (53)

[View pricing plan details](https://www.capterra.com/p/166731/Perimeter-81/pricing/)

Basic

$8.00

Per User,Per Month

Value for money

4.7 (53)

4.7

Based on 53 reviews

## Integrations

[

Salesforce Sales Cloud](https://www.capterra.com/p/61368/Salesforce/)[

Google Cloud](https://www.capterra.com/p/268690/Google-Cloud-Platform/)[

Microsoft Azure](https://www.capterra.com/p/16365/Azure/)[

Heroku](https://www.capterra.com/p/158191/Heroku/)

Connect with a Capterra advisor for a free 15-minute consultation

Get a personalized software list aligned to your business needs with guidance from our expert advisors. Our team has helped 1 million+ businesses like yours find options that fit their needs.

## Support, customer service and training options

Customer Service

4.8 (59)

Support

-   Email/Help Desk
-   FAQs/Forum
-   Knowledge Base
-   Phone Support
-   24/7 (Live rep)
-   Chat

Training

-   In Person
-   Live Online
-   Webinars
-   Documentation
-   Videos

Deployment

-   Web
-   Android
-   iPhone/iPad

Typical users

-   Freelancers
-   Small businesses
-   Mid size businesses
-   Enterprises

Customer Service

4.8 (59)

4.8

Based on 59 reviews

## User reviews

Overall rating

4.8

Based on 80 reviews

Filter by rating

5(65)

4(13)

3(1)

2(0)

1(1)

Mentioned topic

Sorted by most recent

DB

Damon B.

Founder

Telecommunications

### "Works well after rough installment process"

3.0

Overall Rating

3.0

3.0

Ease of Use

3.0

3.0

Features

4.0

4.0

Customer Service

3.0

3.0

Likelihood to Recommend

6/10

May 17, 2025

Perimeter 81 works well, but the learning curve and setup process feels overly complicated.

Pros

It is a secure way to connect and seems pretty tightly setup.

Cons

The setup was overly complicated with a serious learning curve.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

MG

Monica G.

Cloud Engineer

Telecommunications

### "Good enterprise VPN. Integrates well with AWS. VPN client supports many OSes. "

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

4.0

4.0

Likelihood to Recommend

9/10

March 13, 2025

Great VPN in a pinch. The VPN client supports many operating systems. I would recommend this VPN to others.

Pros

I was able to get a working VPN up and running in less than two weeks right before the covid pandemic started. The documentation to set up the site-to-site vpn on AWS was valuable. The VPN client supports windows, mac, linux, android, and ios.

Cons

Support is not bad, but could be better. Initial setup is a little tricky, but the documentation and support team helps. I wish the activity reports had better filters.

Alternatives considered

[NordVPN](https://www.capterra.com/p/166743/NordVPN/)

Reasons for choosing Perimeter 81

Just didn't integrate well with AWS. Tunnel setup was problematic.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

NR

Nathan R.

IT Director

Furniture

### "Perimeter81, the one stop shop ZTNA"

4.0

Overall Rating

4.0

4.0

Ease of Use

5.0

5.0

Features

4.0

4.0

Customer Service

4.0

4.0

Likelihood to Recommend

9/10

September 10, 2024

We've been using Perimeter81 for about a year now and it has been an excellent service. It is way better than using a run of the mill VPN and will the bonus of extra security elements.

Pros

It will automatically connect depending on what SSIDs or Domains you have whitelisted and let you know if you're connected to a trusted network or not. It is very easy to manage users and their connections. The firewall capabilities allows us to regulate when, how and what 3rd parties are able to connect to.

Cons

The setup process for a new user is a little lengthy for users who aren't as tech savvy or familiar with MFA. Occasionally it seems to break itself and the application needs to be reinstalled on the user's workstation.

Switched from

[Cisco AnyConnect](https://www.capterra.com/p/169495/VPN-and-Endpoint-Security-Clients/)

Perimeter81 is not just a VPN but a ZTNA product. Cisco Anyconnect is a basic VPN and we needed the extra security of a ZTNA

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

RS

Randall S.

Systems Admin

Computer Networking

### "Hard to set up, and no support for Small Business"

1.0

Overall Rating

1.0

1.0

Ease of Use

1.0

1.0

Features

5.0

5.0

Customer Service

1.0

1.0

Likelihood to Recommend

0/10

July 18, 2024

Horrible, their support for Small Business is nonexistent. They say it is text only but if you ask anything more complex than downloading software they say you need a training session that is impossible to setup. If you have an enterprise company maybe it is better, but because they only offer text support to SB, I would not recommend.

Pros

I liked the features advertised. It seemed like a good solution for my client

Cons

The website was nearly impossible to get a login to. I had to send multiple emails and they kept just telling me to use the MFA token that wasn't setting up. It was like someone had set up the account before, and I didn't have the token. I could not convince them to reset the token. 10 emails later that was done. I logged in and got the software, and installed it on my clients computers. It seemed to work, but I got no reports. When I attempted to do the Google Inegration, it blew up and cut all clients off from any network access. I tried to call, no support for SB. I texted for 2 hours with their support and they told me I needed to get a zoom or teams meeting with a rep. I sent an email to get that arranged. 6 days later I was sent an email stating if I did not respond to that email they would close the call. I was never contacted about training. It still doesn't work for my client.

Review source

Non-incentivized review: any software user can leave a review for any product listed on our site. All submitted reviews are subject to our verification process prior to publication.

BK

Bhavith K.

Software Engineer

Computer Software

### "Perimeter 81 review"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

9/10

May 13, 2024

Pros

Perimeter 81 as one of the best network connectivity.

Cons

Sometimes it misbehaves when I try to switch my Wi-Fi.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

AU

Anonymous User

Senior Service Delivery

Computer Software

### "Easy installation and great user interface"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

0.0

0.0

Likelihood to Recommend

10/10

April 27, 2024

Pros

easy installation and no further action needed as all tasks are managed by corporate office. Great user interface and easy to connect to company network.

Cons

All functionality is as expected. No regret installing it.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

Edson Edu S.

Regional Technical Service Manager

Computer Software

### "Una VPN de fácil acceso y excelente seguridad "

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

April 17, 2024

Pros

La facilidad para acceder a la cuenta de vpn y la velocidad con que se ingresa es increible.

Cons

La doble autenticación se activa automáticamente sin consultar la clave con cada reinicio.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

MM

Monique M.

Property Manager

Real Estate

### "Ease of use"

5.0

Overall Rating

5.0

5.0

Ease of Use

4.0

4.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

8/10

April 2, 2024

good experience so far, my company did some changes and it has been working better

Pros

Very easy to use, makes easy to all be connected to the right network

Cons

sometimes it crashes and logs you off and you have to log back into system

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

AP

Aakash P.

Accessibility Consultant

Information Technology and Services

### "Easy to use"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

March 25, 2024

Pros

The application interface is extremely easy to navigate. The mobile app has a similar interface. Both run well

Cons

It will sometimes not connect automatically to the VPN and it’s easy to forget to reconnect manually which can be annoying.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

SM

Salvador M.

Sr Financial Analyst

Computer Software

### "Easy to use"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

10/10

February 22, 2024

Pros

How easy and automatically it turns on and off when needed, you don't even feel like it is there but you know it is there helping.

Cons

The first time I logged in, it made my computer run really slow for about 1 hour.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

[View all Reviews](https://www.capterra.com/p/166731/Perimeter-81/reviews/)

Popular comparisons

[Cisco AnyConnect vs Perimeter 81](https://www.capterra.com/compare/166731-169495/Perimeter-81-vs-VPN-and-Endpoint-Security-Clients)

[NordLayer vs Perimeter 81](https://www.capterra.com/compare/166731-203059/Perimeter-81-vs-NordLayer) 

Independent research methodology

Capterra's researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.

[Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.

[Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider's website.

[Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)