Imunify360CloudLinux, Inc.  
                        
                        
                        
                        
                     | 
        
        
        
            Perimeter 81Check Point Software Technologies 
                        
                        
                        
                        
                     | 
        
        |||||
Related Products
  | 
            
            ||||||
                
            
            
            About
            Imunify360 is a security solution for web-hosting servers. Imunify360 goes beyond antivirus and WAF and is a combination of an Intrusion Prevention and Detection system, a Application Specific Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components in one security suite. Imunify360 is a fully-automated solution and it collects all statistics under an intuitive dashboard.
             
            
        
         | 
        
        
                
            
            
            About
            Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. 
Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers.
Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race".
Network security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience! 
             
            
        
         | 
        |||||
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        
        
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        |||||
                
            
        
        Audience
        Organizations that run Linux web servers
         
        
    
         | 
        
        
                
            
        
        Audience
        Simplifying network security for clients worldwide
         
        
    
         | 
        |||||
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        
        
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        |||||
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        
        
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        |||||
                
            
        
        Screenshots and Videos | 
        
        
                
            
        
        Screenshots and Videos | 
        |||||
                
            
        
        Pricing
        $12
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        
        
                
            
        
        Pricing
        $8 per user per month
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        |||||
                
            
        
    
        
Reviews/
        
    
    
         | 
        
        
                
            
        
    
        
Reviews/
        
    
    
         | 
        |||||
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        
        
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        |||||
                
            
        
        Company InformationCloudLinux, Inc.  
    
    Founded: 2009 
    
    United States 
    www.imunify360.com 
         | 
        
        
                
            
        
        Company InformationCheck Point Software Technologies 
    
    Founded: 1993 
    
    Israel 
    www.perimeter81.com 
         | 
        |||||
                
            
            
    
        
        
        
            Alternatives | 
        
        
                
            
            
    
        
        
        
            Alternatives | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
                
            
        
    
        Categories | 
        
        
                
            
        
    
        Categories | 
        |||||
                
            
        
    
        
            
            
                
                Application Security Features
            
                Analytics / Reporting
            
            
         
        
    
        
        
            
                Open Source Component Monitoring
            
            
         
        
    
        
        
            
                Source Code Analysis
            
            
         
        
    
        
        
            
                Third-Party Tools Integration
            
            
         
        
    
        
        
            
                Training Resources
            
            
         
        
    
        
        
            
                Vulnerability Detection
            
            
         
        
    
        
        
            
                Vulnerability Remediation
            
            
         
        
    
                    Cloud Security Features
            
                Antivirus
            
            
         
        
    
        
        
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Intelligence
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Management
            
            
         
        
    
                    Cybersecurity Features
            
                AI / Machine Learning
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                IOC Verification
            
            
         
        
    
        
        
            
                Tokenization
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    IT Security Features
            
                Anti Spam
            
            
         
        
    
        
        
            
                Anti Virus
            
            
         
        
    
        
        
            
                Email Attachment Protection
            
            
         
        
    
        
        
            
                Event Tracking
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                IP Protection
            
            
         
        
    
        
        
            
                Spyware Removal
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Web Traffic Reporting
            
            
         
        
    
                    Data Security Features
            
                Alerts / Notifications
            
            
         
        
    
        
        
            
                Antivirus/Malware Detection
            
            
         
        
    
        
        
            
                At-Risk Analysis
            
            
         
        
    
        
        
            
                Audits
            
            
         
        
    
        
        
            
                Data Center Security
            
            
         
        
    
        
        
            
                Data Classification
            
            
         
        
    
        
        
            
                Data Discovery
            
            
         
        
    
        
        
            
                Data Loss Prevention
            
            
         
        
    
        
        
            
                Data Masking
            
            
         
        
    
        
        
            
                Data-Centric Security
            
            
         
        
    
        
        
            
                Database Security
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Identity / Access Management
            
            
         
        
    
        
        
            
                Logging / Reporting
            
            
         
        
    
        
        
            
                Mobile Data Security
            
            
         
        
    
        
        
            
                Monitor Abnormalities
            
            
         
        
    
        
        
            
                Policy Management
            
            
         
        
    
        
        
            
                Secure Data Transport
            
            
         
        
    
        
        
            
                Sensitive Data Compliance
            
            
         
        
    
                    Firewall Features
            
                Alerts / Notifications
            
            
         
        
    
        
        
            
                Application Visibility / Control
            
            
         
        
    
        
        
            
                Automated Testing
            
            
         
        
    
        
        
            
                Intrusion Prevention
            
            
         
        
    
        
        
            
                LDAP Integration
            
            
         
        
    
        
        
            
                Physical / Virtual Environment
            
            
         
        
    
        
        
            
                Sandbox / Threat Simulation
            
            
         
        
    
        
        
            
                Threat Identification
            
            
         
        
    
                    Server Management Features
            
                CPU Monitoring
            
            
         
        
    
        
        
            
                Credential Management
            
            
         
        
    
        
        
            
                Database Servers
            
            
         
        
    
        
        
            
                Email Monitoring
            
            
         
        
    
        
        
            
                Event Logs
            
            
         
        
    
        
        
            
                History Tracking
            
            
         
        
    
        
        
            
                Patch Management
            
            
         
        
    
        
        
            
                Scheduling
            
            
         
        
    
        
        
            
                User Activity Monitoring
            
            
         
        
    
        
        
            
                Virtual Machine Monitoring
            
            
         
        
    
                     | 
        
        
                
            
        
    
        
            
            
        
            
            
                
                Cloud Security Features
            
                Antivirus
            
            
         
        
    
        
        
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Intelligence
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Management
            
            
         
        
    
                    IT Security Features
            
                Anti Spam
            
            
         
        
    
        
        
            
                Anti Virus
            
            
         
        
    
        
        
            
                Email Attachment Protection
            
            
         
        
    
        
        
            
                Event Tracking
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                IP Protection
            
            
         
        
    
        
        
            
                Spyware Removal
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Web Traffic Reporting
            
            
         
        
    
                    Network Security Features
            
                Access Control
            
            
         
        
    
        
        
            
                Analytics / Reporting
            
            
         
        
    
        
        
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Firewalls
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Response
            
            
         
        
    
        
        
            
                VPN
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
                    Cloud Management Features
            
                Access Control
            
            
         
        
    
        
        
            
                Billing & Provisioning
            
            
         
        
    
        
        
            
                Capacity Analytics
            
            
         
        
    
        
        
            
                Cost Management
            
            
         
        
    
        
        
            
                Demand Monitoring
            
            
         
        
    
        
        
            
                Multi-Cloud Management
            
            
         
        
    
        
        
            
                Performance Analytics
            
            
         
        
    
        
        
            
                SLA Management
            
            
         
        
    
        
        
            
                Supply Monitoring
            
            
         
        
    
        
        
            
                Workflow Approval
            
            
         
        
    
                    IT Management Features
            
                Capacity Monitoring
            
            
         
        
    
        
        
            
                Compliance Management
            
            
         
        
    
        
        
            
                Event Logs
            
            
         
        
    
        
        
            
                Hardware Inventory
            
            
         
        
    
        
        
            
                IT Budgeting
            
            
         
        
    
        
        
            
                License Management
            
            
         
        
    
        
        
            
                Patch Management
            
            
         
        
    
        
        
            
                Remote Access
            
            
         
        
    
        
        
            
                Scheduling
            
            
         
        
    
        
        
            
                Software Inventory
            
            
         
        
    
        
        
            
                User Activity Monitoring
            
            
         
        
    
                     | 
        |||||
                
            
        
    
        Integrations
            
                
    Amazon Web Services (AWS)
            
            
         
        
    
        
        
            
                
    Dianahost
            
            
         
        
    
        
        
            
                
    Electric
            
            
         
        
    
        
        
            
                
    GB Network Solutions
            
            
         
        
    
        
        
            
                
    Google Cloud Platform
            
            
         
        
    
        
        
            
                
    Heroku
            
            
         
        
    
        
        
            
                
    HostBill
            
            
         
        
    
        
        
            
                
    Hostbun
            
            
         
        
    
        
        
            
                
    HosterDaddy
            
            
         
        
    
        
        
            
                
    Indent
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        
        
                
            
        
    
        Integrations
            
                
    Amazon Web Services (AWS)
            
            
         
        
    
        
        
            
                
    Dianahost
            
            
         
        
    
        
        
            
                
    Electric
            
            
         
        
    
        
        
            
                
    GB Network Solutions
            
            
         
        
    
        
        
            
                
    Google Cloud Platform
            
            
         
        
    
        
        
            
                
    Heroku
            
            
         
        
    
        
        
            
                
    HostBill
            
            
         
        
    
        
        
            
                
    Hostbun
            
            
         
        
    
        
        
            
                
    HosterDaddy
            
            
         
        
    
        
        
            
                
    Indent
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        |||||
| 
                
            
        
    
     | 
        
        
                
            
        
    
     |