We performed a comparison between Perimeter 81 and Safe-T Secure Application Access based on real PeerSpot user reviews.
Find out what your peers are saying about OpenVPN, Fortinet, Cisco and others in Enterprise Infrastructure VPN."The solution has good performance."
"It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"It helps to quickly get access to the pages I need."
"The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
"The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
"Our operators can work from home without any problems."
"It is a scalable solution."
"The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way."
"The solution provides us with an easy way to configure and join the VPN with Perimeter 81."
"The setup is really easy...I rate the support team a ten out of ten."
"Safe-T is very good for users because it has plug-in for Outlook."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"There must be a more easy-to-use GUI."
"It would be nice to have a notification sound when Perimeter81 disconnects, as I sometimes don't notice when the icon shows that it's disconnected, and I end up wasting time waiting for my browser to load a page that shows an error, usually error 404."
"I would suggest adding more networking and security features that allow more customization within their platform."
"I don't know if it is technically feasible, however, if the Desktop App could be used as a Web App or a Chrome Extension it would be very nice."
"One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."
"A Google Chrome extension would be handy instead of logging into the app."
"There are a few areas where the solution could be improved. For instance, we sometimes encounter connectivity issues, which can be problematic. Recently, I experienced a connectivity issue while trying to move to Azure. Connectivity issues can be quite frustrating."
"I have found that the log-in/out process takes quite some time."
"If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
"The Outlook agent is not working well for installing it in the entire office."
Earn 20 points
Perimeter 81 is ranked 8th in Enterprise Infrastructure VPN with 22 reviews while Safe-T Secure Application Access is ranked 44th in Enterprise Infrastructure VPN. Perimeter 81 is rated 9.2, while Safe-T Secure Application Access is rated 7.8. The top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Tailscale, whereas Safe-T Secure Application Access is most compared with .
See our list of best Enterprise Infrastructure VPN vendors, best ZTNA vendors, and best ZTNA as a Service vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.