We performed a comparison between Perimeter 81 and Safe-T Secure Application Access based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"The solution has good performance."
"It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go."
"Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
"Perimeter 81 provides a very secure and non-disruptive experience."
"The solution provides us with an easy way to configure and join the VPN with Perimeter 81."
"Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
"SD-WAN is one of the primary solutions offered by Perimeter 81."
"The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
"Even after restarting, it tries to quickly reestablish connection which is very helpful."
"Safe-T is very good for users because it has plug-in for Outlook."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"There must be a more easy-to-use GUI."
"A Google Chrome extension would be handy instead of logging into the app."
"I would suggest adding more networking and security features that allow more customization within their platform."
"One of our challenges is ensuring the security of our cloud-based operations."
"Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."
"I don't know if it is technically feasible, however, if the Desktop App could be used as a Web App or a Chrome Extension it would be very nice."
"There is a very small amount of downtime."
"In the future, maybe P81 can improve the network traffic balancing and redundancy."
"Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
"The Outlook agent is not working well for installing it in the entire office."
Earn 20 points
Perimeter 81 is ranked 8th in Enterprise Infrastructure VPN with 22 reviews while Safe-T Secure Application Access is ranked 44th in Enterprise Infrastructure VPN. Perimeter 81 is rated 9.2, while Safe-T Secure Application Access is rated 7.8. The top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Tailscale, whereas Safe-T Secure Application Access is most compared with . See our Perimeter 81 vs. Safe-T Secure Application Access report.
See our list of best Enterprise Infrastructure VPN vendors, best ZTNA vendors, and best ZTNA as a Service vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.