{"id":41130,"date":"2023-10-17T15:19:49","date_gmt":"2023-10-17T15:19:49","guid":{"rendered":"https:\/\/www.pax8.com\/en-us\/?post_type=vendors&#038;p=41130"},"modified":"2024-06-17T16:31:06","modified_gmt":"2024-06-17T16:31:06","slug":"perimeter-81","status":"publish","type":"vendors","link":"https:\/\/www.pax8.com\/en-us\/vendors\/perimeter-81\/","title":{"rendered":"Perimeter 81"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Perimeter 81 is a cloud-delivered converged networking and network security service that connects all users to all resources over a private global backbone.<\/p>\n","protected":false},"featured_media":47829,"menu_order":0,"template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"categories":[111,173,197,91,114],"class_list":["post-41130","vendors","type-vendors","status-publish","has-post-thumbnail","hentry","category-endpoint-security","category-network-security","category-sase-secure-access-service-edge","category-security","category-web-security"],"acf":{"vendor_name":"Perimeter 81","short_description":"Perimeter 81 is a cloud-delivered converged networking and network security service that connects all users, in the office or remote, to all resources, located on-prem or in the cloud, over a private global backbone. It includes advanced capabilities such as:\r\n<ul>\r\n\t<li>Zero Trust Network Access (ZTNA)<\/li>\r\n\t<li>Unmanaged device remote access<\/li>\r\n\t<li>Secure internet access<\/li>\r\n\t<li>Ransomware and other malware protection<\/li>\r\n\t<li>Firewall-as-a-Service (FWaaS)<\/li>\r\n\t<li>Device Posture Check (DPC)<\/li>\r\n<\/ul>\r\n\r\n\r\n","greyscale_logo":"","colored_logo":"","products":[{"product":"<h4><strong>Security<\/strong><\/h4>\r\n<br>&nbsp;<br>\r\n<h5>Endpoint security<\/h5>\r\n<br>&nbsp;<br>\r\n<ul>\r\n\t<li>Perimeter 81<\/li>\r\n<\/ul>"},{"product":"<h4>&nbsp;<\/h4>\r\n<br>&nbsp;<br>\r\n<h5>Network security<\/h5>\r\n<br>&nbsp;<br>\r\n<ul>\r\n\t<li>Perimeter 81<\/li>\r\n<\/ul>"},{"product":"<h5>SASE (Secure Access Service Edge)<\/h5>\r\n<br>&nbsp;<br>\r\n<ul>\r\n\t<li>Perimeter 81<\/li>\r\n<\/ul>"},{"product":"<h5>Web security<\/h5>\r\n<br>&nbsp;<br>\r\n<ul>\r\n\t<li>Perimeter 81<\/li>\r\n<\/ul>"}],"resource_url":"https:\/\/www.pax8.com\/en-us\/vendors\/perimeter-81\/resources\/","vendor_flag":"null"},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/vendors\/41130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/vendors"}],"about":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/types\/vendors"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/media\/47829"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/media?parent=41130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/categories?post=41130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}