
We use Perimeters’s identity validation and configuration monitoring to better enforce and maintain our policies. Perimeters makes it easy to identify unnecessary privileges and accounts as well as saving time in the actual remediation process. Fixed issues are automatically confirmed to provide a final layer of validation.

Cyber Security Specialist, Tel Aviv Stock Exchange