Try our new research platform with insights from 80,000+ expert users
reviewer681415 - PeerSpot reviewer
Program Manager at CommVault
Real User
Top 20
Intuitive interface, straightforward to set up and ensures secure access
Pros and Cons
  • "The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
  • "Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."

What is our primary use case?

Our company operates within the intricate and highly regulated insurance market. Here, the sanctity of data is paramount and any breach could result in significant consequences for our stakeholders. 

Given the sensitive nature of our data and the frequent exchange of confidential information with our clients and partners, having a secure connection at all times is non-negotiable. 

Perimeter 81 has emerged as a linchpin in our cybersecurity strategy. Whether our employees are working from the confines of our fortified office infrastructure or accessing systems remotely, Perimeter 81 ensures that our data remains secure. 

Its robust architecture dovetails seamlessly with our existing IT infrastructure, offering us peace of mind in an environment increasingly characterized by cyber threats. 

How has it helped my organization?

Adopting Perimeter 81 has yielded noticeable improvements in our organization, especially in the realm of user experience. It's no secret that some cybersecurity tools can be daunting for users, especially those who aren't inherently tech-savvy. 

However, Perimeter 81’s interface is intuitive, and its setup is straightforward. This has reduced the learning curve for our employees substantially. The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization.

What is most valuable?

While the entirety of Perimeter 81's suite is commendable, the quick access LAN feature stands out as a particular favorite in our organization. The ability to swiftly and securely access our local area network without cumbersome processes or technical hitches is invaluable. 

This feature not only boosts productivity by ensuring uninterrupted access to essential resources; it also buttresses our cybersecurity measures by ensuring that this access is always secure. The competitors of Perimeter 81 can learn a thing or two. 

What needs improvement?

While Perimeter 81 has proven to be an invaluable asset, there's always room for improvement. A focus on catering to non-tech users even further would be beneficial. Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential. 

Moreover, integrating interactive tutorials or walkthroughs for new features in future releases could provide users with hands-on guidance, further simplifying their experience.

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
February 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for six to 12 months.

What do I think about the stability of the solution?

I've never had any issues whatsoever, so the stability is very strong. 

What do I think about the scalability of the solution?

The solution is easily scalable for both small and medium-sized organizations.

How are customer service and support?

I haven't yet had to reach out to Perimeters' customer service and support. 

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

No, we didn't use any similar solution before Perimeter 81.

How was the initial setup?

The initial setup is very easy and straightforward, even for non-tech users.

What about the implementation team?

We used a vendor team with a high level of expertise. They could help us quickly and answered all our questions. 

Which other solutions did I evaluate?

I wasn't personally part of the decision, however, I know that our choice was made after a thorough evaluation process comparing different competitors. 

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1765167 - PeerSpot reviewer
Underwriter at GraceKennedy
User
It connects quickly and stays connected
Pros and Cons
  • "It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go."
  • "If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on."

What is our primary use case?

I use Perimeter 81 mostly for remote work. I work in a fast-paced, customer-centric environment overseeing a team of about four or five people who regularly need urgent assistance. I also host group meetings that require me to use other applications that need a VPN. Perimeter 81 has helped me stay connected right around the clock with almost no need for IT app support each day. Dealing with clients online requires good VPN hosting, and Perimeter 81 has provided that

How has it helped my organization?

Perimeter 81 has been a game-changer at my company. Service delivery has improved internally and externally. We had lots of dropped VPN signals with our previous provider, so it was refreshing when we started testing Perimeter 81. We are now considering switching all of our remote employees to Perimeter 81 based on the experiences that the initial users shared during our bi-weekly department and company meetings. 

What is most valuable?

It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go. There is also a diagnostic feature that helps you troubleshoot any issue you have, but I've never had to use this because I haven't had any issues. 

What needs improvement?

If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on. 

For how long have I used the solution?

I've been using Perimeter 81 for about six months

What do I think about the stability of the solution?

Perimeter 81 is highly stable.

What do I think about the scalability of the solution?

Perimeter 81 is highly scalable.

Which solution did I use previously and why did I switch?

Our previous VPN provider dropped the signal too often.

How was the initial setup?

Setting up Perimeter 81 wasn't complex.

What about the implementation team?

We deployed Perimeter 81 in-house.

What other advice do I have?

I rate Perimeter 81 10 out of 10.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
February 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
User
Easy to use, fast, and secure
Pros and Cons
  • "Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
  • "The overall UI could be improved and updated to bring a simpler feel to the application."

What is our primary use case?

Primarily I use the product for work purposes. My work environment is currently remote, therefore, I tend to move between private and public networks pretty often. Having this solution for public networks is key in ensuring that you are staying secure while browsing or using work-related software or services. While working from home, people tend to travel and never realize that public networks are very insecure and they allow hackers to access information from your computer very easily, especially if you don't have a VPN service.

How has it helped my organization?

Perimeter 81 has increased my security and privacy while maintaining solid internet performance. 

Without this software, I tend to always be concerned with security and privacy while browsing the web, however, when I'm using this software, I tend to feel more comfortable browsing knowing that I'm covered. It has made working from home feel more secure while not impacting computer performance. 

Many other services that I've used heavily affect the overall performance of my computer, however Perimeter 81 doesn't affect it at all.

What is most valuable?

The Perimeter 81 VPN is fast and secure. It also is very easy to use, with a simple yet elegant UI. I like how this software will automatically turn on my VPN and connect whenever I hop on my machine. The Always On VPN really can't be beaten. 

While I'm using this service, I never even notice that I'm using it (due to the overall performance of the program), which is really what you want when you're using a VPN. This has to be the most valuable part of this software, along with the user-friendly interface. 

What needs improvement?

I don't think that this service can be improved. Speed and privacy could always be improved, however, the current product doesn't lack these criteria. I also think that the overall UI could be improved and updated to bring a simpler feel to the application, but again, the software doesn't truly lack in this category. 

Aside from this, the service is really pleasant to use and I've never once had the thought of uninstalling the application. While it would be great to have the ability to move the location of the VPN, I don't think that this is required to increase the overall performance.

For how long have I used the solution?

I've used this solution for about two months.

What do I think about the stability of the solution?

I've gotten a great first impression in terms of stability.

What do I think about the scalability of the solution?

The scalability has given me a great first impression.

How are customer service and support?

I haven't had to reach out to support.

Which solution did I use previously and why did I switch?

I've used other services. That said, I didn't have a great experience with their UI and performance lacking abilities.

How was the initial setup?

The setup was a breeze.

What about the implementation team?

I'm not too sure if we had assistance or not.

What's my experience with pricing, setup cost, and licensing?

This service is very affordable and worth it for what you actually get out of the software.

Which other solutions did I evaluate?

I didn't look into other options before choosing this service, however, I don't think there is a need to at the moment.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Chief Executive Officer at Vincacyber
Real User
Top 20
Highly reliable and protects organizations from phishing attacks and downtime
Pros and Cons
  • "The installation is very easy."
  • "The tool could be more user-friendly."

What is our primary use case?

Check Point Quantum SASE is a next-generation email security solution. It can be used to protect users from phishing emails.

What is most valuable?

The tool connects as an API. The installation is very easy. The integration with the existing network was very easy. It is a good tool. We can rely on it.

What needs improvement?

The tool could be more user-friendly.

For how long have I used the solution?

I have been using the solution for more than a year.

What do I think about the stability of the solution?

The tool is very stable and highly reliable. I rate the stability a ten out of ten.

What do I think about the scalability of the solution?

I rate the tool's scalability a ten out of ten. We have approximately 120 users. We have plans to increase the number of users. Our team members are experts. Anyone can deploy and maintain the solution.

How are customer service and support?

The support is good. The support personnel give prompt responses. They take ownership of our issues and communicate with us quickly. They try to get back to us quickly.

How was the initial setup?

The setup is very easy. The deployment can be done without much effort. It is done at the API level. It is deployed on the cloud.

What was our ROI?

I do not face phishing attacks and downtime due to the product.

What's my experience with pricing, setup cost, and licensing?

Check Point Quantum SASE is a SaaS-based product. We have to pay yearly. The product is reasonably priced. There are no additional costs associated with the tool.

Which other solutions did I evaluate?

I evaluated Microsoft Defender. Defender is a good solution, but it is not reliable.

What other advice do I have?

One of the biggest challenges organizations face is email threats. They are completely unknown. The users get deceived by them and tend to click on them. Previously, there was a solution called Avanan. It was one of the pioneers in email security that ensured no unwanted email came to our inbox. I will recommend the product to others. People must look at the solution very seriously. It will help them safeguard their organizations.

Overall, I rate the tool a ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ashish Upadhyay - PeerSpot reviewer
Founder at BlockMosiac
Real User
Top 5Leaderboard
Helps to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements
Pros and Cons
  • "The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele."
  • "While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures."

What is our primary use case?

We utilize cryptographic techniques, leveraging the tool's capabilities in Blockchain, to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements. Integrating Quantum-resilient technology into our decentralized enterprise framework ensures the security of our clients' sensitive data. This proactive approach protects client data from potential threats associated with Quantum computing.

How has it helped my organization?

The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele.

What needs improvement?

While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures. Exploring ways to streamline the integration process and optimize performance ensures a seamless experience for developers and users.

Additionally, fostering an open dialogue with the security community and staying attuned to emerging threats aids in identifying areas for improvement. Regular updates and patches to address vulnerabilities improve the tool's longevity and effectiveness.

What do I think about the stability of the solution?

I rate the product's stability an eight out of ten. While it is generally stable, occasional downtime issues arise, particularly during increased network workload or high server demand.

What do I think about the scalability of the solution?

I rate the tool's scalability a ten out of ten. My company has 1000 users. 

How are customer service and support?

The technical support and customer service for enterprise clients have been very good. They guide the users to solutions with expertise and understanding of the issues.

How would you rate customer service and support?

Positive

How was the initial setup?

My leadership executed the tool's initial deployment with precision and efficiency. Our dedicated team ensured a seamless integration process with clear documentation and comprehensive training modules, facilitating the onboarding of our developers. Collaborating with top-tier experts from Check Point Quantum SASE contributed to a smooth implementation, with any potential challenges being proactively addressed.

As a result, the transition to these advanced security measures was carried out to minimize disruptions to ongoing operations. The overall deployment took two to three hours to complete. 

What's my experience with pricing, setup cost, and licensing?

The product's pricing model accommodates diverse needs and deployment sizes. The licensing options include perpetual licenses, requiring a one-time fee for permanent feature access but excluding future updates, and subscription licenses, which grant customers access to the latest features through ongoing subscriptions.

What other advice do I have?

I rate the overall product an eight out of ten. Its implementation has been very effective, enhancing our organization's security and increasing client confidence. This improvement has led to a broader adoption of enterprise solutions, fostering extended partnerships and growing our user base. The increased market share and client adoption further highlight the substantial return on investment (ROI) derived from the strategic integration of Check Point Quantum SASE.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
fnunez - PeerSpot reviewer
Release Manager at COPADO SOLUTIONS SL
Vendor
Easy to configure, simple to find connection problems, and makes access easier
Pros and Cons
  • "The solution provides us with an easy way to configure and join the VPN with Perimeter 81."
  • "In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality."

What is our primary use case?

In order to connect to our applications like our own GitLab solution or our logs tracking system, we need to connect using the Perimeter 81 application. Before that, we needed to have installed the Amazon Workspaces solution and joined it to that one, so every developer or person who needed access to Gitlab. With Perimeter81, each user that needs Gitlab or logs access has a user created. 

The maintenance of this solution is easier and we also decrease the problems related to workspace scenarios

How has it helped my organization?

In the past, we needed to use Amazon workspaces in order to connect to the 'VPN', and, after that, we were able to have access to our private Gitlab solution and logs. 

This was a mess as each developer or person who needed access to Gitlab needed a Workspace created for that use - even if only you needed to access it just for one day and did not use it anymore. Even in these cases, we needed someone from the infrastructure team to create that particular workspace. With Perimeter 81, we only need to create a user and install the Perimeter81 application on the computer.

What is most valuable?

The solution provides us with:

- An easy way to configure and join the VPN with Perimeter 81. Previously, we were using Amazon workspaces and it took too much time in order to configure the workspace properly in order to just access our Gitlab repository or our logs for just one or two times of use.

- An easy way to find connection problems. You can easily contact Perimeter 81 or check https://status.perimeter81.com to see if some incidents are related to the issue that you have.

What needs improvement?

In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality. I'm using a Mac and we don't have that functionality. On the other hand, in order to connect with an application, we could have the opportunity to use a Google Chrome application/extension. That will make it easy to use and we can skip situations related to admin permissions in order to install the application on some laptops and computers. 

For how long have I used the solution?

I've used the solution for six to seven months. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
LuisPerez9 - PeerSpot reviewer
PM at MPS Mayorista de Colombia S.A.
Real User
Top 10
Prevents threats, provides global network protection, and manages API evaluations
Pros and Cons
  • "Its software solution also ensures connectivity and protects against NSF filtering."
  • "There is a hefty cost"

What is our primary use case?

One use case of SASE is for a partner customer who needs a secure and fast connection for their employees to access the final customer's data center and cloud. Green protection and security measures enable access to all information, including the data center's applications and networks.

How has it helped my organization?

Harmony SASE can prevent threats, provide global network protection, and manage API evaluations of user posture. Its software solution also ensures connectivity and protects against NSF filtering.

What is most valuable?

Check Point complements our more robust solution with Harmony SASE. This solution allows me to see Harmony SASE as an additional layer of security. It profiles security for users connecting remotely, whether working from another branch, a hotel, or an airport. In this case, we needed to protect these connections quickly, so we deployed it as the fastest solution for this customer.

What needs improvement?

There is a hefty cost, but it has excellent coverage. We need SASE management for five websites, including streamlining, logging, and monitoring. The solution offers the final customer three cloud coverage options and an excellent price point. Our competitors are Palo Alto, Cisco, Symantec, and Solar.

If the dashboard allows the PMS administrator to easily and quickly deploy configurations, it will facilitate the solution's faster deployment.

What do I think about the stability of the solution?

It is stable. It brings strong stability to the program, including updates to protect against new ransomware attacks.

What do I think about the scalability of the solution?


How are customer service and support?

Check Point's support is on par with the best in the market. Check Point Harmony SASE is a leading solution in both the local and global markets.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Unlike Cisco, Microsoft Azure, and similar solutions, SASE Insight offers limited visibility. It is slow in detecting and reacting to threats at the point of entry in real-time. Microsoft’s solution is focused on protection but doesn’t provide comprehensive security management. Although it deploys easily, Microsoft’s approach to security isn’t sufficient for robust threat prevention, especially against ransomware. Check Point's Harmony SASE is a more effective solution as it includes several advanced tools and sandboxing capabilities for thorough threat prevention and management.

How was the initial setup?

The deployment is easy, but financial customers must have a comprehensive protection solution. Check Point's Harmony provides complex protection with its firewalls and other features.

What was our ROI?

The return of the SASE web addresses the void in the quality of information protection clients have in their employment. We can check the information, ensuring higher value and effective deployment, ultimately benefiting us. It is crucial to verify the quantum of protection provided and the conditions and access to private information. 

What's my experience with pricing, setup cost, and licensing?

Harmony SASE may not be the cheapest solution but offers more value. It provides enhanced capabilities and features that justify its cost. We are conducting several trials with the new rigs in the silver packs to evaluate their effectiveness.

What other advice do I have?

I recommend Check Point's solution, including various verticals like Quantum, CloudGuard, and Harmony. Harmony SASE, in particular, covers mobile endpoints, email, and collaboration. It's known for easy and fast deployment, as well as efficient administration through the portal. This solution provides organizations with real-time protection and is considered one of the best in the market.

Overall, I rate the solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Flag as inappropriate
PeerSpot user
Founder at Softnetx
Real User
Top 5
Along with an excellent UI, the solution also provides a good UX
Pros and Cons
  • "Check Point provides high-quality technical support. The support was pretty quick."
  • "Automation and scalability are areas where the solution lacks and needs to improve."

What is our primary use case?

Regarding use cases, I can say that the solution's user experience is very good. Also, the solution's UI is excellent. In general, we use it for SASE use cases, and to access VPN, ZTNA etcetera.

What is most valuable?

I am working on automation upstream for Harmony Connect Check Point. There are a bunch of integrations like RDP integrations and active directory integration. Also, its security policy management is seamless.

What needs improvement?

Automation and scalability are areas where the solution lacks and needs to improve.

For how long have I used the solution?

I have been using Check Point Harmony ConnectCheck Point Harmony Connect for a year. My company has a partnership with Check Point. Also, I don't remember the version of the solution I am using.

What do I think about the stability of the solution?

The stability of the solution is not bad. Stability-wise, I rate the solution an eight out of ten.

What do I think about the scalability of the solution?

There are a lot of hidden features, so I can't really give you a rating. We are working on it, so it is a work in progress.

The scalability of the tool is pretty good. However, we need to do some work on it to improve it. Scalability-wise, I rate the solution a six or seven out of ten.

In the next release of the solution, I would like to see more automation features.

The number of users using the solution depends and varies from client to client. It can scale from a small and simple number of 20 to 30 users to almost 10,000. It could be more than 10,000 users. However, it could be more from other partners.

How are customer service and support?

Check Point provides high-quality technical support. The support was pretty quick. I rate the technical support a nine out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have been out of Cisco domain for quite some time since I used it in my previous company. I am not using high-end Cisco technologies anymore. However, I may use it in the future.

How was the initial setup?

I rate the setup phase an eight on a scale of one to ten, where one is difficult, and ten is an easy setup. Also, it's hard to generalize since it depends on what we have to do.

The solution is deployed on the cloud.

The initial deployment was done using Check Point's UI for us, so it was five hours.

Regarding the steps for deployment, I would say that there is a deployment software that you have to onboard. Then, you have to do the initial registration, and once you do the initial registration, you'll have to integrate Azure. After Azure is integrated, you have to deploy the users for the applications.

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, I can say that the more the number of users, the less they have to pay.

What other advice do I have?

I would tell others planning to use the solution that the solution has simplicity and good UX. Also, people will have to wait for future automation rollouts.

I rate the overall solution a nine out of ten.

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.