Home Powered by ECSO

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • ECSO Market Pulse Reports 2025
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Memberships
    • Vision & mission
    • Powered by ECSO
    • Friends of the hive
  • Matrix™
  • Register

User account menu

  • Log in
Home Powered by ECSO

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • ECSO Market Pulse Reports 2025
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Memberships
    • Vision & mission
    • Powered by ECSO
    • Friends of the hive
  • Matrix™
  • Register

User account menu

  • Log in
Home

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • ECSO Market Pulse Reports 2025
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Memberships
    • Vision & mission
    • Powered by ECSO
    • Friends of the hive
  • Matrix™
  • Register

User account menu

  • Log in

Breadcrumb

  1. Home
  2. Solutions
solution image

Perimetrical

by Diego Suárez García from Transparent Edge
(0 reviews)
Visit our website Plan a meeting
Taxonomy:
  • Protect
    • Identity Management, Authentication, & Access Control
      • Intrusion & Anomaly Prevention
    • Protective Technology
      • (NextGen) Firewalls
      • Unified Threat Management (UTM)
    • Technology Infrastructure Resilience
      • Cloud Security
  • Detect
    • Continous Monitoring
      • Cyber Threat Intelligence
  • Respond
    • Incident Mitigation
      • DDoS protection

Description

Perimetrical is a comprehensive protection for web applications and API that is simple, comprehensive, and quick to deploy. It features a next-generation firewall operating at the edge (WAAP) and includes cyberthreat detection and edge logic. 

Perimetrical mitigates bots, protects against DDoS, is compliant and correlated with the OWASP Core Rule Set (CRS), manages anomalies, and provides API protection. 

Our solution features advanced list management and Under Attack Mode (UAM). The anomaly management system allows you to configure automatic reactions from Anti-DDoS, WAF, and Anti-Bot based on different behaviors and custom thresholds.

Solution properties

  • Cloud, SaaS, web-based
  • Market independent/agnostic (Means the solution overlaps all markets, and is linked to all)
  • Direct sales

Summary on Pricing plans

  • Subscription (monthly/yearly)
    Custom pricing

Vendor overview

Transparent Edge

Contact details

  • Founded in 2021
  • Calle Cedaceros 11 - 6C
  • Spain
crunchbase_logo
Visit the website Visit our website

Solution details

  • Non-profit
    Mid-size business
    Large enterprise
    Public administration
  • English
  • Spanish
  • ISO/IEC 27011 (Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organisations)
  • National Security Framework (Esquema Nacional de Seguridad - ENS)

Support services offered by the vendor ensuring the right implementation and functioning of the solution

Email/Help Desk
FAQs/Forum
Knowledge Base
Phone Support

Training services offered by the vendor enabling the end-user to use the solution

Documentation
In Person
Live Online
Videos
Webinars

Media

docment

Ratings & reviews

This solution has not been reviewed yet.

Do you want to leave a rating?

Login or register to proceed

Login Register

Follow us

Subscribe to our newsletter


Footer menu

  • Contact
  • Data Privacy Policy
  • FAQ

Manage your cookie preferences 


 

European Cyber Security Organisation, asbl

Avenue des Arts 46, Brussels, 1000, Belgium | VAT: BE0656734936 - REG 656734936  
Copyright © 2024 Cyberhive ®: Discover solutions from Europe™ | Powered by ECSO, developed by Trust-IT Services srl