Citrix Secure Workspace Access vs Perimeter 81 comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Citrix Secure Workspace Access and Perimeter 81 based on real PeerSpot user reviews.

Find out what your peers are saying about Tailscale, Twingate, Perimeter 81 and others in ZTNA.
To learn more, read our detailed ZTNA Report (Updated: March 2024).
765,234 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is easy and simple, and it has got an easy interface. It is not hard to learn. With just three clicks, you log in, and you're there.""Virtual desktops and virtual apps are most valuable."

More Citrix Secure Workspace Access Pros →

"Providing access and security allows our company employees to work from home and remotely.""The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online.""It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go.""Perimeter 81 is very pretty.""Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.).""Perimeter 81 provides a very secure and non-disruptive experience.""It helps to quickly get access to the pages I need.""Scaling Perimeter 81 was easy to do."

More Perimeter 81 Pros →

Cons
"When we go to print, we have to go through secure print. The secure printing kind of takes a while. It is a little latent.""INGPU for engineering software is an area of improvement."

More Citrix Secure Workspace Access Cons →

"The solution's speed of upload and download is an area where it lacks""A Google Chrome extension would be handy instead of logging into the app.""If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on.""There are a few areas where the solution could be improved. For instance, we sometimes encounter connectivity issues, which can be problematic. Recently, I experienced a connectivity issue while trying to move to Azure. Connectivity issues can be quite frustrating.""There is a very small amount of downtime.""I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful.""One of our challenges is ensuring the security of our cloud-based operations.""What would be useful would be a notification/warning that a session is due to timeout after exceeding the default connection limit."

More Perimeter 81 Cons →

Pricing and Cost Advice
  • "There are costs in addition to the standard licensing fees. They should provide better licensing options."
  • More Citrix Secure Workspace Access Pricing and Cost Advice →

  • "Overall I am very happy with the solution’s flexibility and pricing."
  • "The cost of the solution's licenses depends on the particular use cases."
  • "The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
  • "Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
  • More Perimeter 81 Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
    765,234 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Virtual desktops and virtual apps are most valuable.
    Top Answer:INGPU for engineering software is an area of improvement. There should be better licensing options.
    Top Answer:It is used for INGPU AutoCAD and clerical work. Its deployment is hybrid. It is deployed on a public Azure cloud and on-prem.
    Top Answer:Even after restarting, it tries to quickly reestablish connection which is very helpful.
    Top Answer:It's essential to consider the organization's specific requirements and budget. Here are some general recommendations: * Evaluate your needs * Understand pricing models * Request a quote * Compare… more »
    Top Answer:In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a… more »
    Ranking
    10th
    out of 34 in ZTNA
    Views
    255
    Comparisons
    121
    Reviews
    1
    Average Words per Review
    395
    Rating
    8.0
    3rd
    out of 34 in ZTNA
    Views
    545
    Comparisons
    340
    Reviews
    16
    Average Words per Review
    544
    Rating
    9.2
    Comparisons
    Also Known As
    Citrix Access Control, Citrix Secure Internet Access
    Learn More
    Overview

    Access control is a fundamental component of data security that dictates who’s allowed to access and use company information and resources. Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data. Access control can also be applied to limit physical access to campuses, buildings, rooms, and data centers.

    Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.  

    Perimeter 81 Benefits:

    • Easy to use
    • Flexible access policies
    • Strong encryption and authentication protocols
    • Scalable
    • Compatible with various devices and platforms

    Perimeter 81 Features:

    • Secure Network Access: Perimeter 81 provides secure access to internal resources and cloud-based applications through its client applications and gateways.
    • Software-Defined Perimeter (SDP): SDP is a security framework that focuses on dynamically creating secure connections between users and resources on a need-to-know basis. 
    • Zero Trust Network Access (ZTNA): Perimeter 81 follows the Zero Trust security model, which assumes that no user or device can be inherently trusted. 
    • Multi-Cloud and Hybrid Cloud Support: Perimeter 81 is designed to secure access to resources across multi-cloud and hybrid cloud environments.
    • User and Device Management: The solution offers centralized user and device management capabilities, allowing administrators to define access policies, manage user roles, and enforce multi-factor authentication (MFA) for enhanced security. 
    • Network Segmentation: Perimeter 81 enables organizations to segment their network resources, creating isolated environments based on logical groupings. 
    • Centralized Management and Analytics: Perimeter 81 provides a centralized management console where administrators can configure and monitor their network security settings.

    Reviews from Real Users

    PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".

    Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".

    Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."

      Sample Customers
      The Messenger
      Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
      Top Industries
      VISITORS READING REVIEWS
      Financial Services Firm29%
      Computer Software Company27%
      Comms Service Provider10%
      University6%
      REVIEWERS
      Computer Software Company58%
      University8%
      Media Company8%
      Construction Company8%
      VISITORS READING REVIEWS
      Computer Software Company22%
      Financial Services Firm8%
      Manufacturing Company7%
      Government6%
      Company Size
      No Data Available
      REVIEWERS
      Small Business48%
      Midsize Enterprise30%
      Large Enterprise22%
      VISITORS READING REVIEWS
      Small Business34%
      Midsize Enterprise19%
      Large Enterprise47%
      Buyer's Guide
      ZTNA
      March 2024
      Find out what your peers are saying about Tailscale, Twingate, Perimeter 81 and others in ZTNA. Updated: March 2024.
      765,234 professionals have used our research since 2012.

      Citrix Secure Workspace Access is ranked 10th in ZTNA with 2 reviews while Perimeter 81 is ranked 3rd in ZTNA with 22 reviews. Citrix Secure Workspace Access is rated 8.6, while Perimeter 81 is rated 9.2. The top reviewer of Citrix Secure Workspace Access writes "Makes it convenient to work from home, supports everything I need, and is easy to use". On the other hand, the top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". Citrix Secure Workspace Access is most compared with Appgate SDP and Cato SASE Cloud Platform, whereas Perimeter 81 is most compared with Zscaler Private Access, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Tailscale.

      See our list of best ZTNA vendors.

      We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.