Perygee offers a cost-effective and efficient security design approach for protecting cyber assets by grouping them based on both their communication and security requirements.
Asset identification
Choose from four different tools to create a comprehensive asset inventory
Link your devices to an extensive knowledge base of product-related information
Create custom data fields such as warranty information and location of the device
Security zones
Easily define the operational functions of various assets in Perygee’s flexible data layer
Classify assets into security zones with an automation or graphical data modeling tool
Create custom dashboards and spreadsheets to monitor and manage the security zones
Risk levels
Define categories of risk based on your organization’s requirements and needs
Assign a risk score or level to each security zone using custom attributes
Systematically maintain your security zones and associated assets using automations