Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

Perimeter

Show rating breakdown
44 reviews
  • 1 profiles
  • 2 categories
Average star rating
4.8
Serving customers since
2017

Profile Name

Star Rating

40
4
0
0
0

Perimeter Reviews

Review Filters
Profile Name
Star Rating
40
4
0
0
0
Verified User in Hospital & Health Care
AH
Verified User in Hospital & Health Care
01/20/2026
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

User-Friendly Platform That Made Vendor Onboarding and Migration Easy

Perimeter is very user friendly and has helped Cape Fear on board and assess our vendors. We were able to migrate over from our old platform to Perimeter with the help of support with ease. Our team uses Perimeter every day to meet our needs in assessing vendors for our projects and devices.
Verified User in Hospital & Health Care
AH
Verified User in Hospital & Health Care
12/12/2025
Validated Reviewer
Review source: Seller invite
Incentivized Review

Stunning Visuals and Effortless Usability

Ease of use and the visuals, Centralized Risk Intelligence - Having all assessments, artifacts, scores, and historical data in one system dramatically improves how we track vendor posture and trends. It eliminates guesswork and allows for data-driven decisions.
MR
Miguel A. R.
12/10/2025
Validated Reviewer
Review source: Organic

Effortless to Use and Highly Intuitive

The best thing I like about Perimeter is the Ease of Use.

About

Contact

HQ Location:
Minnetonka, MN

Social

What is Perimeter?

Our Mission Is Simple: Deliver painless, real-time vendor risk management through one integrated platform—from onboarding to assessment to continuous monitoring. We give teams the tools they need to automate assessments, validate vendor responses, monitor risk continuously, and respond to issues before they escalate—all without adding headcount, complexity, or overhead. We were founded to fix the inefficiencies and blind spots plaguing traditional VRM programs—programs that are too slow to scale, too manual to trust, and too fragmented to protect against real-world threats.

Details

Year Founded
2017