Try our new research platform with insights from 80,000+ expert users
Works at Miller Insurance Services LLP
User
Top 20
Its user-friendly interface and seamless integration with existing IT systems allow for minimal disruption and quick deployment
Pros and Cons
  • "While the higher cost and complexity may pose challenges for smaller companies without extensive IT resources, the value provided by Check Point's advanced capabilities and excellent 24/7 support justifies the investment. Overall, it is highly recommended that insurance firms prioritize data security and regulatory compliance, especially medium to large companies with the resources to manage and fully utilize its features."
  • "Although the interface is user-friendly, further simplification and customization options tailored for non-technical users would benefit smaller firms without dedicated IT teams. Intuitive dashboards and guided setups can help in reducing the learning curve."

What is our primary use case?

We are a company that is rapidly expanding our presence across multiple regions and moving key operations to a hybrid cloud model and needed a scalable, prevention-first security platform to bolster its security stack. 

Check Point Security Tooling by Check Point Software Technologies offers a robust and comprehensive cybersecurity solution tailored for the insurance industry. With features like advanced threat detection using AI and machine learning, firewalls, intrusion prevention, and endpoint protection, it ensures the security of sensitive customer data and compliance with industry regulations. Its user-friendly interface and seamless integration with existing IT systems allow for minimal disruption and quick deployment, making it adaptable to both small and large insurance firms.

How has it helped my organization?

The solution has improved our organization by providing a scalable, prevention-first security platform to better protect critical applications and sensitive client data, and meet industry compliance requirements. We chose Check Point Quantum Security Gateways and Check Point CloudGuard Network Security to protect our on-premises and cloud-based assets. The Quantum gateways in the data center are paired with a cluster of CloudGuard cores in the cloud, safeguarding assets and services in both environments with next-generation threat prevention. 

Check Point’s unified security management made it easy to implement controls and access real-time security data for on-premises and cloud environments. Since the rollout, Quantum's anti-bot, antivirus and SandBlast capabilities have delivered consistent protection. 

What is most valuable?

The following features provide consistent protection and make it easy to ensure security everywhere.

  • SandBlast Zero-Day Protection in the Quantum Security Gateways, which defends against the latest cyber threats.
  • Advanced threat prevention, the Intrusion Prevention System, and threat extraction defend against the latest cyber threats.
  • The unified security management made it easy to implement controls and access real-time security data for on-premises and cloud environments.

While the higher cost and complexity may pose challenges for smaller companies without extensive IT resources, the value provided by Check Point's advanced capabilities and excellent 24/7 support justifies the investment. Overall, it is highly recommended that insurance firms prioritize data security and regulatory compliance, especially medium to large companies with the resources to manage and fully utilize its features.

What needs improvement?

Although the interface is user-friendly, further simplification and customization options tailored for non-technical users would benefit smaller firms without dedicated IT teams. Intuitive dashboards and guided setups can help in reducing the learning curve.

Increasing the automation capabilities for threat detection, response, and reporting can help reduce the manual workload on IT staff. Automated compliance reporting tailored to regulatory requirements could be particularly beneficial.

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
September 2024
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: September 2024.
801,634 professionals have used our research since 2012.

For how long have I used the solution?

I have been using it for a year.

What do I think about the stability of the solution?

Stability is excellent.

What do I think about the scalability of the solution?

Scalability is excellent.

How are customer service and support?

The customer support is excellent.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup was straightforward using the unified security management modules.

What about the implementation team?

We implemented it in-house.

What was our ROI?

It is difficult to calculate ROI, as it mitigates risk.

What's my experience with pricing, setup cost, and licensing?

It is an expensive solution, but worth the cost.

Which other solutions did I evaluate?

We looked at various options.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
reviewer681415 - PeerSpot reviewer
Program Manager at CommVault
Real User
Top 20
Intuitive interface, straightforward to set up and ensures secure access
Pros and Cons
  • "The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
  • "Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."

What is our primary use case?

Our company operates within the intricate and highly regulated insurance market. Here, the sanctity of data is paramount and any breach could result in significant consequences for our stakeholders. 

Given the sensitive nature of our data and the frequent exchange of confidential information with our clients and partners, having a secure connection at all times is non-negotiable. 

Perimeter 81 has emerged as a linchpin in our cybersecurity strategy. Whether our employees are working from the confines of our fortified office infrastructure or accessing systems remotely, Perimeter 81 ensures that our data remains secure. 

Its robust architecture dovetails seamlessly with our existing IT infrastructure, offering us peace of mind in an environment increasingly characterized by cyber threats. 

How has it helped my organization?

Adopting Perimeter 81 has yielded noticeable improvements in our organization, especially in the realm of user experience. It's no secret that some cybersecurity tools can be daunting for users, especially those who aren't inherently tech-savvy. 

However, Perimeter 81’s interface is intuitive, and its setup is straightforward. This has reduced the learning curve for our employees substantially. The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization.

What is most valuable?

While the entirety of Perimeter 81's suite is commendable, the quick access LAN feature stands out as a particular favorite in our organization. The ability to swiftly and securely access our local area network without cumbersome processes or technical hitches is invaluable. 

This feature not only boosts productivity by ensuring uninterrupted access to essential resources; it also buttresses our cybersecurity measures by ensuring that this access is always secure. The competitors of Perimeter 81 can learn a thing or two. 

What needs improvement?

While Perimeter 81 has proven to be an invaluable asset, there's always room for improvement. A focus on catering to non-tech users even further would be beneficial. Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential. 

Moreover, integrating interactive tutorials or walkthroughs for new features in future releases could provide users with hands-on guidance, further simplifying their experience.

For how long have I used the solution?

I've used the solution for six to 12 months.

What do I think about the stability of the solution?

I've never had any issues whatsoever, so the stability is very strong. 

What do I think about the scalability of the solution?

The solution is easily scalable for both small and medium-sized organizations.

How are customer service and support?

I haven't yet had to reach out to Perimeters' customer service and support. 

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

No, we didn't use any similar solution before Perimeter 81.

How was the initial setup?

The initial setup is very easy and straightforward, even for non-tech users.

What about the implementation team?

We used a vendor team with a high level of expertise. They could help us quickly and answered all our questions. 

Which other solutions did I evaluate?

I wasn't personally part of the decision, however, I know that our choice was made after a thorough evaluation process comparing different competitors. 

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
September 2024
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: September 2024.
801,634 professionals have used our research since 2012.
Salim Hebada - PeerSpot reviewer
Huawei IP Pre-sales Solution Manager at MC3
Real User
Top 5Leaderboard
Highly scalable and unique advantage of SD-WAN
Pros and Cons
  • "SD-WAN is one of the primary solutions offered by Perimeter 81."
  • "One of our challenges is ensuring the security of our cloud-based operations."

What is our primary use case?

I use Perimeter 81 primarily for VPN connections and work and home banking. Additionally, I use it for some oil and gas applications. You should also consider using it for SD-WAN solutions. In fact, SD-WAN is one of the primary solutions offered by Perimeter 81.

In order to minimize costs, you can use a zero-trust security model. We also use VPN to interconnect many branches, for example, here in Nigeria, for an operator in the oil and gas industry. We have a high frequency in our network.

What is most valuable?

For us, SD-WAN is the most valuable feature. They provide a unique advantage for banking purposes and are also different from other solutions. VPN is good for security.

What needs improvement?

One of our challenges is ensuring the security of our cloud-based operations. We place a high priority on security and take measures to protect our data. We avoid using public cloud services and instead rely on data centers to collect data for both small and large branches.

In the next release, I would like to see more improvement in security capabilities.

For how long have I used the solution?

I have been using Perimeter 81 for ten years. I am working with the latest version.

What do I think about the stability of the solution?

It is a very stable solution. It efficiently ensures security. We also use VPN to touch cloud and ensure secure information. However, for a specific company, we may need to improve security. The code is updated biweekly.

What do I think about the scalability of the solution?

The scalability of Perimeter 81 depends on your equipment and routers. Different solutions may require different approaches. It is also a PLS to control.

How are customer service and support?

The customer service was good. We needed to make some configurations, and it was the same as with other providers because it's a solution we use.

How was the initial setup?

The initial setup is easy. The deployment process is different for each project, and it depends on the project's scope, such as the type of network and the kind of project. If you use IP and POS, it's different from if you don't use them.

What about the implementation team?

It's possible to implement it in-house, or we can get some help. As for the technical aspects, we have six people who are required for the deployment and maintenance. We plan to increase the number of users for Permieter 81 in our company.

What was our ROI?

The system should think about how to maximize the ROI and minimize the OpEx cost for the customer. When you use a good solution, you can decrease your supply costs, increase engineering, reduce repair costs, and increase product stability. It's a win-win solution where the customer wins, and you win.

What other advice do I have?

I would definitely recommend using Perimeter 81. Overall, I would rate the product a nine out of ten, but I would like to improve its security.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Full Stack Engineer at Datalex PLC
User
Great segmentation, makes it easy to add users and offers good uptime
Pros and Cons
  • "The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way."
  • "There is a very small amount of downtime."

What is our primary use case?

I am a remote developer and I use Perimeter81 as a VPN to access development and UAT servers for booking systems that service tier1 airlines. Those servers are mostly on the cloud, however, some are physical. We use AWS servers and physical servers in Dublin, Manchester, Amsterdam, Bejing, and Altlanta. We have individual team members spread out possibly 15-20 countries that need to be managed so it's important that we can be grouped and organized in a manner that allows us to authorize not just depending on our location but also our roles.

How has it helped my organization?

Our organization is made up of permanent and contract employees both onsite in our office worldwide and in remote individual locations across the globe. Perimeter81 allows us to develop software as a service (SaaS) collaboratively in a safe and efficient manner. We can authorize our web services not just by our team members' roles but also by our team members' locations based on the IP addresses on an individual level but also based on the group role for that member. The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way.

What is most valuable?

As a virtual private network, it enables us to communicate through development groups that segment our organization through the correct allocation of bandwidth and easily configured groups. 

Being able to add individuals to groups is the single most valuable feature, simple as it may seem. This combined with the underlying protocol makes for a powerful and easy-to-use feature for our organization. Adding and removing individuals is simple and easy to do which adds to the overall convenience and usability.

What needs improvement?

There is a very small amount of downtime. As a general user of the network, I'm not sure if this is down to maintenance time needed by our own network engineers who support our organization or indeed if it is up to Perimeter81 and its maintenance. What would be helpful is if this downtime was reduced. This may or may not involve some collaboration with Perimeter81 engineers and our own organization's engineers to ensure more up time, although I'm not complaining as this is very infrequent.

For how long have I used the solution?

I've used the solution for over one year now.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

I don't directly deal with technical support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Openpath was our old solution. We switched simply for better service and more uptime.

How was the initial setup?

I did not handle the initial setup.

What about the implementation team?

I did not handle the initial setup.

What was our ROI?

I don't know anything about the ROI - it's not my area.

What's my experience with pricing, setup cost, and licensing?

Licensing is not my area.

Which other solutions did I evaluate?

I don't what other solutions were considered.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Technical Lead at Law Office of Mary Kennedy
Real User
Top 20
Easy Installation but connectivity Issues
Pros and Cons
  • "Scaling Perimeter 81 was easy to do."
  • "There are a few areas where the solution could be improved. For instance, we sometimes encounter connectivity issues, which can be problematic. Recently, I experienced a connectivity issue while trying to move to Azure. Connectivity issues can be quite frustrating."

What is our primary use case?

We primarily use Perimeter 81 for VPN purposes.

What is most valuable?

The customer support was excellent. They were very helpful whenever we needed assistance. Also, the gateway they provided worked well. The availability of support programs made it easy for us to resolve any issues promptly. The solution itself was quite similar to others we have used, so the strong support was a distinguishing factor.

What needs improvement?

There are a few areas where the solution could be improved. For instance, we sometimes encounter connectivity issues, which can be problematic. Recently, I experienced a connectivity issue while trying to move to Azure. Connectivity issues can be quite frustrating.

Moreover, in the past, they may have charged differently for their services, which could have impacted the current performance or connectivity. However, I am not entirely sure about the specifics of their previous service offerings. But overall, connectivity issues are a common occurrence when using VPNs.

For how long have I used the solution?

We've been using Perimeter 81 for almost three months now.

What do I think about the scalability of the solution?

Scaling Perimeter 81 was easy to do. Around 20+ users were using it.

How are customer service and support?

I had a moderate level of experience with the support. During the installation phase, I found it very easy and supportive. However, after that, when I faced an issue, the support person themselves became part of the problem. We went back and forth trying to resolve the issue, but unfortunately, nothing worked out, and we had to find a solution on our own. So, that's been my experience with their support.

How was the initial setup?

The installation on Azure was actually quite easy. I had to provide a couple of personal details for data installations, and then I was able to set it up. 

In Azure, there were multiple instances available for the installation, which was helpful. It was a good experience, and I was able to get it up and running smoothly.

What about the implementation team?

For the installation of Perimeter 81, it didn't take long at all. Setting up the backend and connecting with the users only took about ten minutes. It was a quick process, and I didn't spend more than that time on it. However, I didn't handle the filling up of all the details myself, as that part was handled by a third person.

We only had a single point of contact for the deployment. There was one person available to assist with the installation and configuration.

When it came to maintenance, we faced some connectivity issues, and whenever that happened, we contacted their support for assistance. There were some technical workarounds provided, but sometimes the response and resolution were not satisfactory, which became frustrating. Due to this, I had to get in touch with the solution team often. Eventually, I decided to move away from their service.

What's my experience with pricing, setup cost, and licensing?

Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable. Azure's pricing details were not as clear as Perimeter 81's. While Azure team mentioned certain areas, Perimeter 81 provided a clearer breakdown of the pricing, making it more understandable. So, I would say it was moderate in terms of cost.

Perimeter 81 offers both monthly and yearly licensing options. Users can choose whichever option they prefer based on their needs and preferences.

What other advice do I have?

For those planning to use Perimeter 81, I would recommend going ahead with it. However, I suggest ensuring that there is a reliable tech support process in place. It's essential to know which person would be available for assistance so that you can connect with them anytime you face any issues. Also, it's important to avoid any support connectivity issues during usage. In my experience, they were in a good space when it came to using the solution.

Overall, I would rate the solution a six out of ten. 

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Senior Information Security Manager at Adidas
User
Secure, with good support and an openness to constructive feedback
Pros and Cons
  • "The Check Point portfolio showcases very strong products."
  • "An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia."

What is our primary use case?

We are using the product to secure roaming users who work outside the office as well for protecting a variety of company locations. 

It is great that Check Point continues to be a visionary in the network security market and delivers such anticipated products which allow users to cope with ongoing security challenges and trends.

It is used to protect offices and retail stores and it is a step forward from the traditional connectivity architecture which lacks flexibility and prevents business to advance at the desired pace.

How has it helped my organization?

It is great from an operational point of view. There is no need to procure and install HW; a new location could be secured almost instantly.

There is no need to talk about security. It comes from a team of talented developers and has a historic record. The Check Point portfolio showcases very strong products. 

The support from Check Point's side is great as it always and allows you to understand the product, produce and secure design as well as deploy and test it. Furthermore, the product owners are actively looking for feedback. This allows you to express your opinion and shape the product to improve it according to your needs.

What is most valuable?

The product is great as it allows users to deliver the most security value at the fastest speed. It reduces an operational load in terms of provision, installation, management, patching, and hardware replacement by increasing uptime and reducing the time to deliver to market. It also provides cloud-native availability and allows you not to bother with the sizing and location capacity as long as you stick with Harmony Connect. The price is reasonable.

Last but not least, there is an option to manage Harmony Connect from the centralized management station which allows users to apply existing policies while having a single pane of glass for network security.

What needs improvement?

An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia. Some PoP locations might create complicated traffic flows and impact the latency and load on network infrastructure even further.

Advanced details of log information are missing. However, the Check Point team is definitely open to constructive advice and is happy to make any requested changes.

There are still some limitations that exist while using centralized management with Harmony Connect.

For how long have I used the solution?

I've used the solution for six months.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
fnunez - PeerSpot reviewer
Release Manager at COPADO SOLUTIONS SL
Vendor
Easy to configure, simple to find connection problems, and makes access easier
Pros and Cons
  • "The solution provides us with an easy way to configure and join the VPN with Perimeter 81."
  • "In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality."

What is our primary use case?

In order to connect to our applications like our own GitLab solution or our logs tracking system, we need to connect using the Perimeter 81 application. Before that, we needed to have installed the Amazon Workspaces solution and joined it to that one, so every developer or person who needed access to Gitlab. With Perimeter81, each user that needs Gitlab or logs access has a user created. 

The maintenance of this solution is easier and we also decrease the problems related to workspace scenarios

How has it helped my organization?

In the past, we needed to use Amazon workspaces in order to connect to the 'VPN', and, after that, we were able to have access to our private Gitlab solution and logs. 

This was a mess as each developer or person who needed access to Gitlab needed a Workspace created for that use - even if only you needed to access it just for one day and did not use it anymore. Even in these cases, we needed someone from the infrastructure team to create that particular workspace. With Perimeter 81, we only need to create a user and install the Perimeter81 application on the computer.

What is most valuable?

The solution provides us with:

- An easy way to configure and join the VPN with Perimeter 81. Previously, we were using Amazon workspaces and it took too much time in order to configure the workspace properly in order to just access our Gitlab repository or our logs for just one or two times of use.

- An easy way to find connection problems. You can easily contact Perimeter 81 or check https://status.perimeter81.com to see if some incidents are related to the issue that you have.

What needs improvement?

In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality. I'm using a Mac and we don't have that functionality. On the other hand, in order to connect with an application, we could have the opportunity to use a Google Chrome application/extension. That will make it easy to use and we can skip situations related to admin permissions in order to install the application on some laptops and computers. 

For how long have I used the solution?

I've used the solution for six to seven months. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Customer Service Specialist at Arbicare
User
Top 20
Secure, allows for remote connectivity, and helps with productivity
Pros and Cons
  • "Providing access and security allows our company employees to work from home and remotely."
  • "A Google Chrome extension would be handy instead of logging into the app."

What is our primary use case?

The primary use is for secure site protection. 

I work at a worker's compensation company that deals with sensitive information, such as SSN, home addresses, phone numbers, and doctor notes that contain medical history and conditions. 

This product helps us keep the information on websites that are solely accessible through Perimeter 81 so we do not leak the patients, doctors, or adjusters' information to the public. Everything is in a safe space while at the same time, Perimeter 81 makes working from home accessible. 

How has it helped my organization?

It helps improve our organization by allowing employees work all over the globe providing colleagues with safe internet no matter what part of the globe they find themselves. 

Providing access and security allows our company employees to work from home and remotely. They are not confined to one space or location if they need to travel. The Perimeter 81 VPN provides the luxury to travel and work while maintaining security to create the work-life balance everyone needs. 

It improved our organization more than can be explained. We plan to continue to further use of this technology. 

What is most valuable?

The VPN is the main function used. It's valuable to us since it's the only way to access most company websites. All company websites can only be used if users are connected to Perimeter 81. It does not matter what location you are in. 

If Perimeter 81 is not connecting, it slows down company productivity. This is why we appreciate the live updates and minimal issues we have when dealing with this product. The faster we work, the more patients are taken care of, and the higher client success rate we can achieve. Perimeter 81's VPN feature helps our company be as efficient as possible. 

What needs improvement?

A Google Chrome extension would be handy instead of logging into the app. That way, it's pre-signed in and ready to go while browsing. 

While the app connects as we log in, it would be helpful to be able to stay signed in and have an automatic connection while browsing. The connection may be faster and stronger that way as well. 

A VPN Extention through the web browser would be a great asset to web users and companies. With a one-time login, we can have access and not worry about reconnecting to the VPN. I'm looking forward to seeing this feature. 

For how long have I used the solution?

I've been using Perimeter 81 for one year. 

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

Currently, I do not have access to this information. 

Which other solutions did I evaluate?

I'm an employee. I do not make decisions on organizational software. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2024
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.