We primarily use Perimeter 81 for VPN purposes.
Technical Lead at Law Office of Mary Kennedy
Easy Installation but connectivity Issues
Pros and Cons
- "Scaling Perimeter 81 was easy to do."
- "There are a few areas where the solution could be improved. For instance, we sometimes encounter connectivity issues, which can be problematic. Recently, I experienced a connectivity issue while trying to move to Azure. Connectivity issues can be quite frustrating."
What is our primary use case?
What is most valuable?
The customer support was excellent. They were very helpful whenever we needed assistance. Also, the gateway they provided worked well. The availability of support programs made it easy for us to resolve any issues promptly. The solution itself was quite similar to others we have used, so the strong support was a distinguishing factor.
What needs improvement?
There are a few areas where the solution could be improved. For instance, we sometimes encounter connectivity issues, which can be problematic. Recently, I experienced a connectivity issue while trying to move to Azure. Connectivity issues can be quite frustrating.
Moreover, in the past, they may have charged differently for their services, which could have impacted the current performance or connectivity. However, I am not entirely sure about the specifics of their previous service offerings. But overall, connectivity issues are a common occurrence when using VPNs.
For how long have I used the solution?
We've been using Perimeter 81 for almost three months now.
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
September 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,676 professionals have used our research since 2012.
What do I think about the scalability of the solution?
Scaling Perimeter 81 was easy to do. Around 20+ users were using it.
How are customer service and support?
I had a moderate level of experience with the support. During the installation phase, I found it very easy and supportive. However, after that, when I faced an issue, the support person themselves became part of the problem. We went back and forth trying to resolve the issue, but unfortunately, nothing worked out, and we had to find a solution on our own. So, that's been my experience with their support.
How was the initial setup?
The installation on Azure was actually quite easy. I had to provide a couple of personal details for data installations, and then I was able to set it up.
In Azure, there were multiple instances available for the installation, which was helpful. It was a good experience, and I was able to get it up and running smoothly.
What about the implementation team?
For the installation of Perimeter 81, it didn't take long at all. Setting up the backend and connecting with the users only took about ten minutes. It was a quick process, and I didn't spend more than that time on it. However, I didn't handle the filling up of all the details myself, as that part was handled by a third person.
We only had a single point of contact for the deployment. There was one person available to assist with the installation and configuration.
When it came to maintenance, we faced some connectivity issues, and whenever that happened, we contacted their support for assistance. There were some technical workarounds provided, but sometimes the response and resolution were not satisfactory, which became frustrating. Due to this, I had to get in touch with the solution team often. Eventually, I decided to move away from their service.
What's my experience with pricing, setup cost, and licensing?
Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable. Azure's pricing details were not as clear as Perimeter 81's. While Azure team mentioned certain areas, Perimeter 81 provided a clearer breakdown of the pricing, making it more understandable. So, I would say it was moderate in terms of cost.
Perimeter 81 offers both monthly and yearly licensing options. Users can choose whichever option they prefer based on their needs and preferences.
What other advice do I have?
For those planning to use Perimeter 81, I would recommend going ahead with it. However, I suggest ensuring that there is a reliable tech support process in place. It's essential to know which person would be available for assistance so that you can connect with them anytime you face any issues. Also, it's important to avoid any support connectivity issues during usage. In my experience, they were in a good space when it came to using the solution.
Overall, I would rate the solution a six out of ten.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Huawei IP Pre-sales Solution Manager at MC3
Highly scalable and unique advantage of SD-WAN
Pros and Cons
- "SD-WAN is one of the primary solutions offered by Perimeter 81."
- "One of our challenges is ensuring the security of our cloud-based operations."
What is our primary use case?
I use Perimeter 81 primarily for VPN connections and work and home banking. Additionally, I use it for some oil and gas applications. You should also consider using it for SD-WAN solutions. In fact, SD-WAN is one of the primary solutions offered by Perimeter 81.
In order to minimize costs, you can use a zero-trust security model. We also use VPN to interconnect many branches, for example, here in Nigeria, for an operator in the oil and gas industry. We have a high frequency in our network.
What is most valuable?
For us, SD-WAN is the most valuable feature. They provide a unique advantage for banking purposes and are also different from other solutions. VPN is good for security.
What needs improvement?
One of our challenges is ensuring the security of our cloud-based operations. We place a high priority on security and take measures to protect our data. We avoid using public cloud services and instead rely on data centers to collect data for both small and large branches.
In the next release, I would like to see more improvement in security capabilities.
For how long have I used the solution?
I have been using Perimeter 81 for ten years. I am working with the latest version.
What do I think about the stability of the solution?
It is a very stable solution. It efficiently ensures security. We also use VPN to touch cloud and ensure secure information. However, for a specific company, we may need to improve security. The code is updated biweekly.
What do I think about the scalability of the solution?
The scalability of Perimeter 81 depends on your equipment and routers. Different solutions may require different approaches. It is also a PLS to control.
How are customer service and support?
The customer service was good. We needed to make some configurations, and it was the same as with other providers because it's a solution we use.
How was the initial setup?
The initial setup is easy. The deployment process is different for each project, and it depends on the project's scope, such as the type of network and the kind of project. If you use IP and POS, it's different from if you don't use them.
What about the implementation team?
It's possible to implement it in-house, or we can get some help. As for the technical aspects, we have six people who are required for the deployment and maintenance. We plan to increase the number of users for Permieter 81 in our company.
What was our ROI?
The system should think about how to maximize the ROI and minimize the OpEx cost for the customer. When you use a good solution, you can decrease your supply costs, increase engineering, reduce repair costs, and increase product stability. It's a win-win solution where the customer wins, and you win.
What other advice do I have?
I would definitely recommend using Perimeter 81. Overall, I would rate the product a nine out of ten, but I would like to improve its security.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
September 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,676 professionals have used our research since 2012.
Sales Manager, Checkpoint at South Asian Technologies
Very agile with a granular level of control over users
Pros and Cons
- "The solution offers both client and clientless versions for good remote access."
- "The solution requires you to buy a minimum of 50 licenses and that is not practical."
What is our primary use case?
Our company installed the solution locally to test it and gain user experience. In the future, we plan to sell the solution to customers.
The solution provides internet access, network access, and security. Both on-premises and cloud versions are available.
Initially, we installed the on-premises version but are now testing the cloud version.
What is most valuable?
The solution offers both client and clientless versions for good remote access. We don't like to give our credentials to BYOD devices, non-permanent cadres, or contractors so having two remote access options is a huge benefit.
There is a granular level of control over users with regard to internet or network access. The virtual firewalls for remote connectivity are almost like having a firewall in-house.
The solution is an agile product with very good technology.
What needs improvement?
The solution requires you to buy a minimum of 50 licenses and that is not practical.
For how long have I used the solution?
I have been using the solution for five months.
What do I think about the stability of the solution?
The solution is stable so I rate stability a ten out of ten.
What do I think about the scalability of the solution?
The solution is scalable so I rate scalability a ten out of ten.
Which solution did I use previously and why did I switch?
I have been selling Check Point firewalls for four years. Previously, I sold Fortinet.
I am happier with the solution because my customers are giving me very good feedback.
How was the initial setup?
The setup is easy so I rate it a ten out of ten.
What about the implementation team?
We implemented the solution in-house. We set up our Active Directory and our admin sent the docker through email. We clicked the docker, installed it, and received connection to the solution.
It took about four months for rollout to all of our our engineers and salespeople.
What's my experience with pricing, setup cost, and licensing?
I am not very happy about the pricing because the solution requires you to buy a minimum of 50 licenses. Annual licenses cost $30 to $40 each.
The pricing is not practical in Sri Lanka because we have small customers who need only 10 to 20 licenses. There should be packages for 10, 20, and even 30 licenses.
Which other solutions did I evaluate?
In Sri Lanka, there is a lot of competition with endpoint or process solutions. I think the solution is going to be a very good brand in the near future because we have been promoting it and most of our customers want to buy it.
What other advice do I have?
The solution provides a secure tunnel for controlling users while maintaining stability. Security is an important component because you need to prevent hacks and issues with data accessibility. Without a secure tunnel, someone might get into your networks, take credentials or databases, and destroy your data centers.
The solution is fast and provides 100% security, especially for remote users.
I rate the solution a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Chief Executive Officer at Vincacyber
Highly reliable and protects organizations from phishing attacks and downtime
Pros and Cons
- "The installation is very easy."
- "The tool could be more user-friendly."
What is our primary use case?
Check Point Quantum SASE is a next-generation email security solution. It can be used to protect users from phishing emails.
What is most valuable?
The tool connects as an API. The installation is very easy. The integration with the existing network was very easy. It is a good tool. We can rely on it.
What needs improvement?
The tool could be more user-friendly.
For how long have I used the solution?
I have been using the solution for more than a year.
What do I think about the stability of the solution?
The tool is very stable and highly reliable. I rate the stability a ten out of ten.
What do I think about the scalability of the solution?
I rate the tool's scalability a ten out of ten. We have approximately 120 users. We have plans to increase the number of users. Our team members are experts. Anyone can deploy and maintain the solution.
How are customer service and support?
The support is good. The support personnel give prompt responses. They take ownership of our issues and communicate with us quickly. They try to get back to us quickly.
How was the initial setup?
The setup is very easy. The deployment can be done without much effort. It is done at the API level. It is deployed on the cloud.
What was our ROI?
I do not face phishing attacks and downtime due to the product.
What's my experience with pricing, setup cost, and licensing?
Check Point Quantum SASE is a SaaS-based product. We have to pay yearly. The product is reasonably priced. There are no additional costs associated with the tool.
Which other solutions did I evaluate?
I evaluated Microsoft Defender. Defender is a good solution, but it is not reliable.
What other advice do I have?
One of the biggest challenges organizations face is email threats. They are completely unknown. The users get deceived by them and tend to click on them. Previously, there was a solution called Avanan. It was one of the pioneers in email security that ensured no unwanted email came to our inbox. I will recommend the product to others. People must look at the solution very seriously. It will help them safeguard their organizations.
Overall, I rate the tool a ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber Security Engineer at Valuepoint Systems
Provides high performance along with ATP prevention and policy management but firewall configuration could be improved
Pros and Cons
- "The solution offers ATP features and management features."
- "The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support."
- "When it comes to firewall configuration, sometimes we encounter issues."
What is our primary use case?
The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support. We have all these features integrated into our security gateway for every business year, like the SASE model. Cyber threats are becoming increasingly sophisticated nowadays. We have this next-generation firewall, to protect all your network, cloud, data centre, IoT devices, and remote connections. Due to these reasons, we prefer Check Point's network solution. It helps improve the remote workforce security.
What is most valuable?
The solution offers ATP features and management features. We have a smart console and GIA portal. We used to manage all policies on the smart console. We do have the URL filtering and prevention part. We used to do the policy databases and all that configuration from the GIA portal. We have intrusion prevention, application consultant, filtering options and web filtering. It works as a next-gen firewall.
What needs improvement?
Firstly, there are different consoles involved. If someone is selling another product that already has a single console for managing everything, that would be better.
For how long have I used the solution?
I have been using Check Point Quantum SASE for 6 months.
How are customer service and support?
Support is handling requests via email. Additionally, they share documents. We haven't encountered any major issues requiring support. They are available 24hr/day along with alerts, reports or security issues.
How was the initial setup?
The initial setup depends on the organisation. Let's say they are currently using FortiGate, but they want to migrate to Check Point Quantum SASE. We have different options for migration. We can either perform the migration manually or upload existing tests. Manual deployment can be time-consuming. We have two types of configurations: basic and advanced. Basic configuration can be completed quickly, but advanced configurations may take more time. Our deployment process is relatively easy, but managing traffic and other aspects can be challenging. We need to align with the organisation's flow during this process.
Deployment takes about a month depending on the number of firewalls.
What other advice do I have?
The zero trust aspect is being used for VPN purposes. It replaces your VPN, assisting anyone trying to access VPNs.
We are using it for large organisations and enterprises. For instance, if some organisations are using Check Point hardware for their firewalls but don't want to switch to other vendors, they can opt for this solution. Especially for big organisations with data centres facing numerous network issues, it's highly scalable. When it comes to firewall configuration, sometimes we encounter issues, but we can't always blame the firewall.
Check Point offers SmartConsole and other tools. If you compare Quantum with FortiGate, FortiGate doesn't have separate controls for various functions like policy publishing and control. In FortiGate, within one console, you can manage everything by enabling features.
Overall, I rate the solution a 7 out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
An easy-to-use and set-up cloud solution for security
Pros and Cons
- "The tool is easy to use and set up."
- "The product has a reasonably high pricing."
What is our primary use case?
We use the solution for security.
What is most valuable?
The tool is easy to use and set up.
What needs improvement?
Harmony Connect has two components: one for accessing the internet and the other for accessing the corporate network. The Access intelligence lab is particularly useful because it eliminates the need to purchase a separate firewall for the branch office. Instead, you can connect the Check Point VPN, providing you with Check Point Harmony Connect firewall functionality for monitoring traffic.
The setup is easy, but it depends on the router configuration. The router configuration, in turn, will depend on the specific releases. The configuration could be improved.
For how long have I used the solution?
I have been using Check Point Harmony Connect for two to three years.
What do I think about the stability of the solution?
The product is stable.
What do I think about the scalability of the solution?
What are your impressions of the scalability of this solution?
The solution is scalable.
Which solution did I use previously and why did I switch?
Since I trust the Check Point security, I trust Harmony Connect.
How was the initial setup?
The initial setup is easy and may take a half hour to complete if you’ve experience.
I rate the initial setup a ten out of ten, where one is difficult and ten is easy.
What's my experience with pricing, setup cost, and licensing?
The product has a reasonably high pricing.
What other advice do I have?
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
Program Manager at CommVault
Intuitive interface, straightforward to set up and ensures secure access
Pros and Cons
- "The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
- "Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."
What is our primary use case?
Our company operates within the intricate and highly regulated insurance market. Here, the sanctity of data is paramount and any breach could result in significant consequences for our stakeholders.
Given the sensitive nature of our data and the frequent exchange of confidential information with our clients and partners, having a secure connection at all times is non-negotiable.
Perimeter 81 has emerged as a linchpin in our cybersecurity strategy. Whether our employees are working from the confines of our fortified office infrastructure or accessing systems remotely, Perimeter 81 ensures that our data remains secure.
Its robust architecture dovetails seamlessly with our existing IT infrastructure, offering us peace of mind in an environment increasingly characterized by cyber threats.
How has it helped my organization?
Adopting Perimeter 81 has yielded noticeable improvements in our organization, especially in the realm of user experience. It's no secret that some cybersecurity tools can be daunting for users, especially those who aren't inherently tech-savvy.
However, Perimeter 81’s interface is intuitive, and its setup is straightforward. This has reduced the learning curve for our employees substantially. The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization.
What is most valuable?
While the entirety of Perimeter 81's suite is commendable, the quick access LAN feature stands out as a particular favorite in our organization. The ability to swiftly and securely access our local area network without cumbersome processes or technical hitches is invaluable.
This feature not only boosts productivity by ensuring uninterrupted access to essential resources; it also buttresses our cybersecurity measures by ensuring that this access is always secure. The competitors of Perimeter 81 can learn a thing or two.
What needs improvement?
While Perimeter 81 has proven to be an invaluable asset, there's always room for improvement. A focus on catering to non-tech users even further would be beneficial. Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential.
Moreover, integrating interactive tutorials or walkthroughs for new features in future releases could provide users with hands-on guidance, further simplifying their experience.
For how long have I used the solution?
I've used the solution for six to 12 months.
What do I think about the stability of the solution?
I've never had any issues whatsoever, so the stability is very strong.
What do I think about the scalability of the solution?
The solution is easily scalable for both small and medium-sized organizations.
How are customer service and support?
I haven't yet had to reach out to Perimeters' customer service and support.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
No, we didn't use any similar solution before Perimeter 81.
How was the initial setup?
The initial setup is very easy and straightforward, even for non-tech users.
What about the implementation team?
We used a vendor team with a high level of expertise. They could help us quickly and answered all our questions.
Which other solutions did I evaluate?
I wasn't personally part of the decision, however, I know that our choice was made after a thorough evaluation process comparing different competitors.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Founder at Softnetx
Along with an excellent UI, the solution also provides a good UX
Pros and Cons
- "Check Point provides high-quality technical support. The support was pretty quick."
- "Automation and scalability are areas where the solution lacks and needs to improve."
What is our primary use case?
Regarding use cases, I can say that the solution's user experience is very good. Also, the solution's UI is excellent. In general, we use it for SASE use cases, and to access VPN, ZTNA etcetera.
What is most valuable?
I am working on automation upstream for Harmony Connect Check Point. There are a bunch of integrations like RDP integrations and active directory integration. Also, its security policy management is seamless.
What needs improvement?
Automation and scalability are areas where the solution lacks and needs to improve.
For how long have I used the solution?
I have been using Check Point Harmony ConnectCheck Point Harmony Connect for a year. My company has a partnership with Check Point. Also, I don't remember the version of the solution I am using.
What do I think about the stability of the solution?
The stability of the solution is not bad. Stability-wise, I rate the solution an eight out of ten.
What do I think about the scalability of the solution?
There are a lot of hidden features, so I can't really give you a rating. We are working on it, so it is a work in progress.
The scalability of the tool is pretty good. However, we need to do some work on it to improve it. Scalability-wise, I rate the solution a six or seven out of ten.
In the next release of the solution, I would like to see more automation features.
The number of users using the solution depends and varies from client to client. It can scale from a small and simple number of 20 to 30 users to almost 10,000. It could be more than 10,000 users. However, it could be more from other partners.
How are customer service and support?
Check Point provides high-quality technical support. The support was pretty quick. I rate the technical support a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have been out of Cisco domain for quite some time since I used it in my previous company. I am not using high-end Cisco technologies anymore. However, I may use it in the future.
How was the initial setup?
I rate the setup phase an eight on a scale of one to ten, where one is difficult, and ten is an easy setup. Also, it's hard to generalize since it depends on what we have to do.
The solution is deployed on the cloud.
The initial deployment was done using Check Point's UI for us, so it was five hours.
Regarding the steps for deployment, I would say that there is a deployment software that you have to onboard. Then, you have to do the initial registration, and once you do the initial registration, you'll have to integrate Azure. After Azure is integrated, you have to deploy the users for the applications.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, I can say that the more the number of users, the less they have to pay.
What other advice do I have?
I would tell others planning to use the solution that the solution has simplicity and good UX. Also, people will have to wait for future automation rollouts.
I rate the overall solution a nine out of ten.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer. partner

Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Firewalls Anti-Malware Tools Enterprise Infrastructure VPN ZTNA as a Service ZTNAPopular Comparisons
Fortinet FortiGate
Microsoft Defender for Endpoint
Cisco Secure Firewall
SentinelOne Singularity Complete
Prisma Access by Palo Alto Networks
Fortinet FortiClient
Palo Alto Networks NG Firewalls
Zscaler Zero Trust Exchange Platform
WatchGuard Firebox
OpenVPN Access Server
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?
- Why is Secure Access Service Edge (SASE) important for companies?