Primarily I use the product for work purposes. My work environment is currently remote, therefore, I tend to move between private and public networks pretty often. Having this solution for public networks is key in ensuring that you are staying secure while browsing or using work-related software or services. While working from home, people tend to travel and never realize that public networks are very insecure and they allow hackers to access information from your computer very easily, especially if you don't have a VPN service.
Works
Easy to use, fast, and secure
Pros and Cons
- "Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
- "The overall UI could be improved and updated to bring a simpler feel to the application."
What is our primary use case?
How has it helped my organization?
Perimeter 81 has increased my security and privacy while maintaining solid internet performance.
Without this software, I tend to always be concerned with security and privacy while browsing the web, however, when I'm using this software, I tend to feel more comfortable browsing knowing that I'm covered. It has made working from home feel more secure while not impacting computer performance.
Many other services that I've used heavily affect the overall performance of my computer, however Perimeter 81 doesn't affect it at all.
What is most valuable?
The Perimeter 81 VPN is fast and secure. It also is very easy to use, with a simple yet elegant UI. I like how this software will automatically turn on my VPN and connect whenever I hop on my machine. The Always On VPN really can't be beaten.
While I'm using this service, I never even notice that I'm using it (due to the overall performance of the program), which is really what you want when you're using a VPN. This has to be the most valuable part of this software, along with the user-friendly interface.
What needs improvement?
I don't think that this service can be improved. Speed and privacy could always be improved, however, the current product doesn't lack these criteria. I also think that the overall UI could be improved and updated to bring a simpler feel to the application, but again, the software doesn't truly lack in this category.
Aside from this, the service is really pleasant to use and I've never once had the thought of uninstalling the application. While it would be great to have the ability to move the location of the VPN, I don't think that this is required to increase the overall performance.
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
January 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
For how long have I used the solution?
I've used this solution for about two months.
What do I think about the stability of the solution?
I've gotten a great first impression in terms of stability.
What do I think about the scalability of the solution?
The scalability has given me a great first impression.
How are customer service and support?
I haven't had to reach out to support.
Which solution did I use previously and why did I switch?
I've used other services. That said, I didn't have a great experience with their UI and performance lacking abilities.
How was the initial setup?
The setup was a breeze.
What about the implementation team?
I'm not too sure if we had assistance or not.
What's my experience with pricing, setup cost, and licensing?
This service is very affordable and worth it for what you actually get out of the software.
Which other solutions did I evaluate?
I didn't look into other options before choosing this service, however, I don't think there is a need to at the moment.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Chief Executive Officer at Vincacyber
Highly reliable and protects organizations from phishing attacks and downtime
Pros and Cons
- "The installation is very easy."
- "The tool could be more user-friendly."
What is our primary use case?
Check Point Quantum SASE is a next-generation email security solution. It can be used to protect users from phishing emails.
What is most valuable?
The tool connects as an API. The installation is very easy. The integration with the existing network was very easy. It is a good tool. We can rely on it.
What needs improvement?
The tool could be more user-friendly.
For how long have I used the solution?
I have been using the solution for more than a year.
What do I think about the stability of the solution?
The tool is very stable and highly reliable. I rate the stability a ten out of ten.
What do I think about the scalability of the solution?
I rate the tool's scalability a ten out of ten. We have approximately 120 users. We have plans to increase the number of users. Our team members are experts. Anyone can deploy and maintain the solution.
How are customer service and support?
The support is good. The support personnel give prompt responses. They take ownership of our issues and communicate with us quickly. They try to get back to us quickly.
How was the initial setup?
The setup is very easy. The deployment can be done without much effort. It is done at the API level. It is deployed on the cloud.
What was our ROI?
I do not face phishing attacks and downtime due to the product.
What's my experience with pricing, setup cost, and licensing?
Check Point Quantum SASE is a SaaS-based product. We have to pay yearly. The product is reasonably priced. There are no additional costs associated with the tool.
Which other solutions did I evaluate?
I evaluated Microsoft Defender. Defender is a good solution, but it is not reliable.
What other advice do I have?
One of the biggest challenges organizations face is email threats. They are completely unknown. The users get deceived by them and tend to click on them. Previously, there was a solution called Avanan. It was one of the pioneers in email security that ensured no unwanted email came to our inbox. I will recommend the product to others. People must look at the solution very seriously. It will help them safeguard their organizations.
Overall, I rate the tool a ten out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: May 14, 2024
Flag as inappropriateBuyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
January 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
Founder at BlockMosiac
Helps to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements
Pros and Cons
- "The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele."
- "While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures."
What is our primary use case?
We utilize cryptographic techniques, leveraging the tool's capabilities in Blockchain, to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements. Integrating Quantum-resilient technology into our decentralized enterprise framework ensures the security of our clients' sensitive data. This proactive approach protects client data from potential threats associated with Quantum computing.
How has it helped my organization?
The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele.
What needs improvement?
While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures. Exploring ways to streamline the integration process and optimize performance ensures a seamless experience for developers and users.
Additionally, fostering an open dialogue with the security community and staying attuned to emerging threats aids in identifying areas for improvement. Regular updates and patches to address vulnerabilities improve the tool's longevity and effectiveness.
What do I think about the stability of the solution?
I rate the product's stability an eight out of ten. While it is generally stable, occasional downtime issues arise, particularly during increased network workload or high server demand.
What do I think about the scalability of the solution?
I rate the tool's scalability a ten out of ten. My company has 1000 users.
How are customer service and support?
The technical support and customer service for enterprise clients have been very good. They guide the users to solutions with expertise and understanding of the issues.
How would you rate customer service and support?
Positive
How was the initial setup?
My leadership executed the tool's initial deployment with precision and efficiency. Our dedicated team ensured a seamless integration process with clear documentation and comprehensive training modules, facilitating the onboarding of our developers. Collaborating with top-tier experts from Check Point Quantum SASE contributed to a smooth implementation, with any potential challenges being proactively addressed.
As a result, the transition to these advanced security measures was carried out to minimize disruptions to ongoing operations. The overall deployment took two to three hours to complete.
What's my experience with pricing, setup cost, and licensing?
The product's pricing model accommodates diverse needs and deployment sizes. The licensing options include perpetual licenses, requiring a one-time fee for permanent feature access but excluding future updates, and subscription licenses, which grant customers access to the latest features through ongoing subscriptions.
What other advice do I have?
I rate the overall product an eight out of ten. Its implementation has been very effective, enhancing our organization's security and increasing client confidence. This improvement has led to a broader adoption of enterprise solutions, fostering extended partnerships and growing our user base. The increased market share and client adoption further highlight the substantial return on investment (ROI) derived from the strategic integration of Check Point Quantum SASE.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Easy to configure, simple to find connection problems, and makes access easier
Pros and Cons
- "The solution provides us with an easy way to configure and join the VPN with Perimeter 81."
- "In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality."
What is our primary use case?
In order to connect to our applications like our own GitLab solution or our logs tracking system, we need to connect using the Perimeter 81 application. Before that, we needed to have installed the Amazon Workspaces solution and joined it to that one, so every developer or person who needed access to Gitlab. With Perimeter81, each user that needs Gitlab or logs access has a user created.
The maintenance of this solution is easier and we also decrease the problems related to workspace scenarios
How has it helped my organization?
In the past, we needed to use Amazon workspaces in order to connect to the 'VPN', and, after that, we were able to have access to our private Gitlab solution and logs.
This was a mess as each developer or person who needed access to Gitlab needed a Workspace created for that use - even if only you needed to access it just for one day and did not use it anymore. Even in these cases, we needed someone from the infrastructure team to create that particular workspace. With Perimeter 81, we only need to create a user and install the Perimeter81 application on the computer.
What is most valuable?
The solution provides us with:
- An easy way to configure and join the VPN with Perimeter 81. Previously, we were using Amazon workspaces and it took too much time in order to configure the workspace properly in order to just access our Gitlab repository or our logs for just one or two times of use.
- An easy way to find connection problems. You can easily contact Perimeter 81 or check https://status.perimeter81.com to see if some incidents are related to the issue that you have.
What needs improvement?
In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality. I'm using a Mac and we don't have that functionality. On the other hand, in order to connect with an application, we could have the opportunity to use a Google Chrome application/extension. That will make it easy to use and we can skip situations related to admin permissions in order to install the application on some laptops and computers.
For how long have I used the solution?
I've used the solution for six to seven months.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PM at MPS Mayorista de Colombia S.A.
Prevents threats, provides global network protection, and manages API evaluations
Pros and Cons
- "Its software solution also ensures connectivity and protects against NSF filtering."
- "There is a hefty cost"
What is our primary use case?
One use case of SASE is for a partner customer who needs a secure and fast connection for their employees to access the final customer's data center and cloud. Green protection and security measures enable access to all information, including the data center's applications and networks.
How has it helped my organization?
Harmony SASE can prevent threats, provide global network protection, and manage API evaluations of user posture. Its software solution also ensures connectivity and protects against NSF filtering.
What is most valuable?
Check Point complements our more robust solution with Harmony SASE. This solution allows me to see Harmony SASE as an additional layer of security. It profiles security for users connecting remotely, whether working from another branch, a hotel, or an airport. In this case, we needed to protect these connections quickly, so we deployed it as the fastest solution for this customer.
What needs improvement?
There is a hefty cost, but it has excellent coverage. We need SASE management for five websites, including streamlining, logging, and monitoring. The solution offers the final customer three cloud coverage options and an excellent price point. Our competitors are Palo Alto, Cisco, Symantec, and Solar.
If the dashboard allows the PMS administrator to easily and quickly deploy configurations, it will facilitate the solution's faster deployment.
What do I think about the stability of the solution?
It is stable. It brings strong stability to the program, including updates to protect against new ransomware attacks.
What do I think about the scalability of the solution?
How are customer service and support?
Check Point's support is on par with the best in the market. Check Point Harmony SASE is a leading solution in both the local and global markets.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Unlike Cisco, Microsoft Azure, and similar solutions, SASE Insight offers limited visibility. It is slow in detecting and reacting to threats at the point of entry in real-time. Microsoft’s solution is focused on protection but doesn’t provide comprehensive security management. Although it deploys easily, Microsoft’s approach to security isn’t sufficient for robust threat prevention, especially against ransomware. Check Point's Harmony SASE is a more effective solution as it includes several advanced tools and sandboxing capabilities for thorough threat prevention and management.
How was the initial setup?
The deployment is easy, but financial customers must have a comprehensive protection solution. Check Point's Harmony provides complex protection with its firewalls and other features.
What was our ROI?
The return of the SASE web addresses the void in the quality of information protection clients have in their employment. We can check the information, ensuring higher value and effective deployment, ultimately benefiting us. It is crucial to verify the quantum of protection provided and the conditions and access to private information.
What's my experience with pricing, setup cost, and licensing?
Harmony SASE may not be the cheapest solution but offers more value. It provides enhanced capabilities and features that justify its cost. We are conducting several trials with the new rigs in the silver packs to evaluate their effectiveness.
What other advice do I have?
I recommend Check Point's solution, including various verticals like Quantum, CloudGuard, and Harmony. Harmony SASE, in particular, covers mobile endpoints, email, and collaboration. It's known for easy and fast deployment, as well as efficient administration through the portal. This solution provides organizations with real-time protection and is considered one of the best in the market.
Overall, I rate the solution an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Last updated: Jul 30, 2024
Flag as inappropriateFounder at Softnetx
Along with an excellent UI, the solution also provides a good UX
Pros and Cons
- "Check Point provides high-quality technical support. The support was pretty quick."
- "Automation and scalability are areas where the solution lacks and needs to improve."
What is our primary use case?
Regarding use cases, I can say that the solution's user experience is very good. Also, the solution's UI is excellent. In general, we use it for SASE use cases, and to access VPN, ZTNA etcetera.
What is most valuable?
I am working on automation upstream for Harmony Connect Check Point. There are a bunch of integrations like RDP integrations and active directory integration. Also, its security policy management is seamless.
What needs improvement?
Automation and scalability are areas where the solution lacks and needs to improve.
For how long have I used the solution?
I have been using Check Point Harmony ConnectCheck Point Harmony Connect for a year. My company has a partnership with Check Point. Also, I don't remember the version of the solution I am using.
What do I think about the stability of the solution?
The stability of the solution is not bad. Stability-wise, I rate the solution an eight out of ten.
What do I think about the scalability of the solution?
There are a lot of hidden features, so I can't really give you a rating. We are working on it, so it is a work in progress.
The scalability of the tool is pretty good. However, we need to do some work on it to improve it. Scalability-wise, I rate the solution a six or seven out of ten.
In the next release of the solution, I would like to see more automation features.
The number of users using the solution depends and varies from client to client. It can scale from a small and simple number of 20 to 30 users to almost 10,000. It could be more than 10,000 users. However, it could be more from other partners.
How are customer service and support?
Check Point provides high-quality technical support. The support was pretty quick. I rate the technical support a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have been out of Cisco domain for quite some time since I used it in my previous company. I am not using high-end Cisco technologies anymore. However, I may use it in the future.
How was the initial setup?
I rate the setup phase an eight on a scale of one to ten, where one is difficult, and ten is an easy setup. Also, it's hard to generalize since it depends on what we have to do.
The solution is deployed on the cloud.
The initial deployment was done using Check Point's UI for us, so it was five hours.
Regarding the steps for deployment, I would say that there is a deployment software that you have to onboard. Then, you have to do the initial registration, and once you do the initial registration, you'll have to integrate Azure. After Azure is integrated, you have to deploy the users for the applications.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, I can say that the more the number of users, the less they have to pay.
What other advice do I have?
I would tell others planning to use the solution that the solution has simplicity and good UX. Also, people will have to wait for future automation rollouts.
I rate the overall solution a nine out of ten.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Customer Service Specialist at Arbicare
Secure, allows for remote connectivity, and helps with productivity
Pros and Cons
- "Providing access and security allows our company employees to work from home and remotely."
- "A Google Chrome extension would be handy instead of logging into the app."
What is our primary use case?
The primary use is for secure site protection.
I work at a worker's compensation company that deals with sensitive information, such as SSN, home addresses, phone numbers, and doctor notes that contain medical history and conditions.
This product helps us keep the information on websites that are solely accessible through Perimeter 81 so we do not leak the patients, doctors, or adjusters' information to the public. Everything is in a safe space while at the same time, Perimeter 81 makes working from home accessible.
How has it helped my organization?
It helps improve our organization by allowing employees work all over the globe providing colleagues with safe internet no matter what part of the globe they find themselves.
Providing access and security allows our company employees to work from home and remotely. They are not confined to one space or location if they need to travel. The Perimeter 81 VPN provides the luxury to travel and work while maintaining security to create the work-life balance everyone needs.
It improved our organization more than can be explained. We plan to continue to further use of this technology.
What is most valuable?
The VPN is the main function used. It's valuable to us since it's the only way to access most company websites. All company websites can only be used if users are connected to Perimeter 81. It does not matter what location you are in.
If Perimeter 81 is not connecting, it slows down company productivity. This is why we appreciate the live updates and minimal issues we have when dealing with this product. The faster we work, the more patients are taken care of, and the higher client success rate we can achieve. Perimeter 81's VPN feature helps our company be as efficient as possible.
What needs improvement?
A Google Chrome extension would be handy instead of logging into the app. That way, it's pre-signed in and ready to go while browsing.
While the app connects as we log in, it would be helpful to be able to stay signed in and have an automatic connection while browsing. The connection may be faster and stronger that way as well.
A VPN Extention through the web browser would be a great asset to web users and companies. With a one-time login, we can have access and not worry about reconnecting to the VPN. I'm looking forward to seeing this feature.
For how long have I used the solution?
I've been using Perimeter 81 for one year.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
What's my experience with pricing, setup cost, and licensing?
Currently, I do not have access to this information.
Which other solutions did I evaluate?
I'm an employee. I do not make decisions on organizational software.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Accounts Payable Specialist at Simera
Good security and privacy capabilities with excellent support
Pros and Cons
- "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
- "I have found that the log-in/out process takes quite some time."
What is our primary use case?
I needed the solution to attach it to the vendor's file in our accounting software. The customer service team provided such an efficient and fast service. We have an account manager, which is great as we get personalized attention. I asked for the W-9 form once, and it was provided to me. I was not able to download it and then forgot about it. I asked for it again, and without any hesitation, the team provided it again. They were not rude about it. I later realized and apologized for asking for it twice.
How has it helped my organization?
Our organization is more secure with Perimeter81's Virtual Private Network (VPN). We manage sensitive information of clients. In my department, we manage bank and credit card information. It is a lot of responsibility to have access to that kind of data. Now that our company has implemented Perimeter81's services with the VPN, personally, I feel more secure when navigating through these different platforms. It is a great investment for today's workplaces - especially when we handle critical information virtually.
What is most valuable?
The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online.
Similarly, I find that the work that Perimeter 81's customer service team does is very valuable. I have heard from our IT department that Perimeter 81's team is quite knowledgeable and efficient. These are important traits and they describe not only the company's service but the quality of its product as well. So far, our company is very happy with the product.
What needs improvement?
Overall the product is very efficient. However, personally, there is something that I dislike. I have found that the log-in/out process takes quite some time. I usually click on the app, and it asks me to login in through the web, and then after I log in it takes me back to the app. It seems to me that I should be able to log out without having to leave the app. I do like that it connects automatically/logs in as soon as I sign on. I am not sure why login in is easier than logout.
For how long have I used the solution?
The resolution took a couple of hours to be solved, around six hours.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
The experience with technical support was great. The team is professional, polite, and efficient.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
This is the first time that we used a VPN in the company.
How was the initial setup?
I'm not able to say what the setup is like.
What about the implementation team?
I'm not able to say if we had any outside assistance.
What was our ROI?
I'm not able to say what the ROI would be.
What's my experience with pricing, setup cost, and licensing?
I am not able to advise on the cost/pricing.
Which other solutions did I evaluate?
This decision was made by the IT department, however, naturally, they did evaluate other vendors
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: My company has a business relationship with this vendor other than being a customer: Simera, the company I work, is the client. I am an user.
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Firewalls Anti-Malware Tools Enterprise Infrastructure VPN ZTNA as a Service ZTNAPopular Comparisons
Prisma Access by Palo Alto Networks
Zscaler Zero Trust Exchange Platform
Cato SASE Cloud Platform
VMware VeloCloud SD-WAN
Akamai Enterprise Application Access
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?
- Why is Secure Access Service Edge (SASE) important for companies?