Try our new research platform with insights from 80,000+ expert users
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
Offers great performance and reliability
Pros and Cons
  • "The product's initial setup phase is very simple."
  • "When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end."

What is our primary use case?

In our company, Quantum SASE is available for namesake in our environment since we rely on Check Point Secure Web Gateway for its firewall functionalities. Most of our company's customers use firewalls from Check Point Software, Palo Alto, or Fortinet. The simple use case of the tool for our company's customers stems from the fact that they have a general internal network or many users for which a firewall is required to secure the network traffic flow and communications that happen from outside to inside the company.

What needs improvement?

When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end. There are no OEMs in the market that provide 100 percent security. The security of the product has to be improved.

For how long have I used the solution?

I have been using Check Point Quantum SASE for seven years.

What do I think about the stability of the solution?

The product's stability is very good. Stability-wise, I rate the solution a nine out of ten.

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
November 2024
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.

What do I think about the scalability of the solution?

In firewall products, scalability is not required. If you set up the two firewall tools, no scalability is required. Scalability-wise, I rate the solution a nine out of ten.

My company deals with 20 or 30 customers of the tool.

My company's customers extensively use the product.

How are customer service and support?

The support from Check Point Quantum SASE is very good, and the response from the support team is fast. The support from Check Point Quantum SASE is customer-friendly and knowledgeable about troubleshooting issues.

How was the initial setup?

The product's initial setup phase is very simple.

The product's installation process consists of racking, stacking, and mounting, after which a user can directly start the appliance and configure the HA status and policies.

The solution is deployed on an on-premises model.

The solution can be deployed in two or three days.

One engineer is required to take care of one single deployment process.

What was our ROI?

The ROI of the tool can be calculated depending on the tool's ability to be used for multiple use cases and protect the confidential data of users. It is very simple to calculate the product's ROI. If you use Check Point Quantum SASE, then your internal users are protected from outside attackers.

What's my experience with pricing, setup cost, and licensing?

Check Point Quantum SASE provides SASE functionalities with all the required features. Check Point Quantum SASE's price is higher than what its competitors offer. The price of the product is something that depends on the requirements, and the purchase or order value of the customers.

The price of the tool depends on whether customers need SMTP, NGTP, or Check Point NG licenses.

I consider the product to be a medium-priced solution. There are no additional costs attached to the tool.

What other advice do I have?

The solution enhances the ability of our company's remote workforce to secure access to corporate resources since we use VPN to secure work-from-home users and domain users.

Check Point Quantum SASE offers all the features essential for threat prevention, threat emulation, threat extraction, anti-spam, and anti-malware.

In relation to Check Point Quantum SASE, I haven't worked with the part involving WAN architecture. I only handle cybersecurity for a portfolio with respect to the LAN segment, and not WAN segment.

I rate the tool's performance a ten out of ten.

Check Point Quantum SASE can be described as the world's best security product without a doubt since it is a market leader in its segment.

The performance and reliability offered by the tool depend on the customer environment, and after considering aspects like throughput, how many users, and how many concurrent connections, my company plans the sizing part of the tool.

The value of working with the tool is good, as it can secure users, environments, and applications.

I rate the tool a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Srini Krish - PeerSpot reviewer
Business Development Sales Engineer at Orca Tech
User
Simple, easy to manage policies, and offers good reports
Pros and Cons
  • "The reports give a simple overview of the traffic pattern within the organization."
  • "Branding could be better."

What is our primary use case?

The solution is predominantly used for Internet access when mobile. In the office, we have already deployed a Quantum Spark appliance, and this was focused on mobile users. 

We don't have on-premise applications or servers, so there is no use case for Remote access. However, we were keen to try it out from an evaluation perspective by bridging to the existing Check Point gateway at the site. 

Simplicity was needed, and importantly, we wanted something to not be too intrusive to mobile users. The interface has a few simple options, and it makes it easier.

How has it helped my organization?

We believe in defense in depth, and Harmony connect SASE adds another layer of protection for internet access. 

We have already deployed the entire Harmony suite, from Email & Collab protection to Harmony Endpoint. This adds a layer on top. Being a mobile user, securing Internet access was very important, and the product's pricing was simple enough and unlike other multiple add-ons on top of the base products from other vendors.

The reports give a simple overview of the traffic pattern within the organization. Though we don't use it to track user productivity, we can if necessary. There are reports specific to SaaS applications as well, which do come in handy.

What is most valuable?

The simplicity is good. It's good for consolidating security and being manageable from the Infinity portal with other Harmony solutions and makes management easy. We can use this instead of managing multiple-point solutions. It has a unified policy for private and internet access, making it easier to manage policies. 

The weekly reports have been informative as well. We are also keen on trying clientless access to provide restricted access to applications for third-party users.

Deployment was a breeze. We just key in the target users' email, and the rest is easy.

What needs improvement?

Branding could be better. Not many Check Point users realize there is a SASE offering at all. Policies could have layers as they do with their Firewalls, though I understand that's more of a functionality within the Smart dashboard. The threat prevention profiles like IPS, file, and URL protections could have more fine-tuning options.

Though all the policies are managed from the Infinity portal, we still have to manually configure different solutions. It would be nice to know how the new XDR option will bridge this gap.

Also, for Multi-factor authentication, there was an option for G-auth. However, I'm not sure about other forms of authentication they offer in their gateways. Bringing the backend closer to the gateway management would make it more granular.

For how long have I used the solution?

I've been using Harmony Connect for more than three months now. 

What do I think about the stability of the solution?

We haven't had any glitches or issues with it at all. It's very transparent to the user.

What do I think about the scalability of the solution?

It's very scalable and easy to deploy. It's scalable with users and it's scalable with the existing CP gateway deployments as well. There isn't much information on how it integrates with other end-point solutions. We had a full Check Point environment and it was clean.

How are customer service and support?

We haven't run into any issues so far. We did need some assistance during the initial policy configuration, and the Check Point solutions team was there to assist.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use any other SASE offering before. 

How was the initial setup?

It's a simple setup; we just key in the end user's email address and it sends an invite to download the client. 

What about the implementation team?

We implemented it in-house with the assistance of Check Point's solutions team.

What was our ROI?

The ROI is better than using a traditional VPN to connect back to the office gateway. We needed something that was light and transparent without the hassle of having to connect manually. We aren't planning to remove the gateway yet, however, in the long run, we will consider it, and that should negate the gateway costs.

What's my experience with pricing, setup cost, and licensing?

Setup is a breeze. You key in the target user's email, and the rest is a click away. Pricing is competitive compared to the top players in the SASE market. 

Also, there is no concept of add-ons which makes it easier. 

Licensing with a minimum of 50 users could be a show-stopper for smaller organizations. However, a small company has probably got to do it with the infra in the backend to make it worthwhile.

Which other solutions did I evaluate?

Since we were keen on consolidating, we did not focus on multiple options.

What other advice do I have?

The product seems to be transparent to the users. It lacks application segmentation options which some competitors offer.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: We are Checkpoint Distributor as well but the comments are based on my experience with the product.
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
November 2024
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
reviewer2170548 - PeerSpot reviewer
Customer Service Specialist at Arbicare
User
Top 20
Secure, allows for remote connectivity, and helps with productivity
Pros and Cons
  • "Providing access and security allows our company employees to work from home and remotely."
  • "A Google Chrome extension would be handy instead of logging into the app."

What is our primary use case?

The primary use is for secure site protection. 

I work at a worker's compensation company that deals with sensitive information, such as SSN, home addresses, phone numbers, and doctor notes that contain medical history and conditions. 

This product helps us keep the information on websites that are solely accessible through Perimeter 81 so we do not leak the patients, doctors, or adjusters' information to the public. Everything is in a safe space while at the same time, Perimeter 81 makes working from home accessible. 

How has it helped my organization?

It helps improve our organization by allowing employees work all over the globe providing colleagues with safe internet no matter what part of the globe they find themselves. 

Providing access and security allows our company employees to work from home and remotely. They are not confined to one space or location if they need to travel. The Perimeter 81 VPN provides the luxury to travel and work while maintaining security to create the work-life balance everyone needs. 

It improved our organization more than can be explained. We plan to continue to further use of this technology. 

What is most valuable?

The VPN is the main function used. It's valuable to us since it's the only way to access most company websites. All company websites can only be used if users are connected to Perimeter 81. It does not matter what location you are in. 

If Perimeter 81 is not connecting, it slows down company productivity. This is why we appreciate the live updates and minimal issues we have when dealing with this product. The faster we work, the more patients are taken care of, and the higher client success rate we can achieve. Perimeter 81's VPN feature helps our company be as efficient as possible. 

What needs improvement?

A Google Chrome extension would be handy instead of logging into the app. That way, it's pre-signed in and ready to go while browsing. 

While the app connects as we log in, it would be helpful to be able to stay signed in and have an automatic connection while browsing. The connection may be faster and stronger that way as well. 

A VPN Extention through the web browser would be a great asset to web users and companies. With a one-time login, we can have access and not worry about reconnecting to the VPN. I'm looking forward to seeing this feature. 

For how long have I used the solution?

I've been using Perimeter 81 for one year. 

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

Currently, I do not have access to this information. 

Which other solutions did I evaluate?

I'm an employee. I do not make decisions on organizational software. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1428267 - PeerSpot reviewer
VP Engineering at Loris.ai
Real User
Affordable, secure, and allows me to manage all user access in one platform
Pros and Cons
  • "Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
  • "I would suggest adding more networking and security features that allow more customization within their platform."

What is our primary use case?

We are using Perimeter 81 for secure network connections while working remotely.

As my entire team is working remotely, we were looking for a simple and secure remote access solution and we went with Perimeter 81. So far, we have been super happy with Perimeter 81’s affordable and simple to manage solution.

We initially started to use Perimeter 81 for their networking features but recently we integrated their split-tunneling feature and their simple Google Authenticator two-factor authentication integration. Both features have been game-changers for us.

How has it helped my organization?

Simply, Perimeter 81 has allowed me to easily manage all our user access to my company’s networks in one platform.

Additionally, my employees can quickly connect to a reliable and more secure network connection while working outside the office. Instead of manually connecting to a VPN, all of my employees are automatically connected to Perimeter 81 when they open their computer or other company devices.

Since implementing Perimeter 81 we are seeing an increase in network performance and employee productivity.

What is most valuable?

Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution.

We were able to configure tunnels to our IP addresses for specific user access, including application access to any devices no matter their location. This has helped me make sure the right users are getting the right access to their work resources to do their daily job.

Also, I am very happy with their MFA feature. It was very easy to integrate with our two-factor authentication and simplified the authorization process for all of our employees to gain network access.

What needs improvement?

I would suggest adding more networking and security features that allow more customization within their platform.

So far, I am very happy with their simple network management platform. However, I feel such features as SD-WAN, Firewalls, and more real-time alerts would take this solution to the next level. By adding these networking and security features, it will allow me to customize my company's network security to the level I am seeking.

For how long have I used the solution?

I have been using Perimeter 81 for three months.

Which solution did I use previously and why did I switch?

We did not use another solution prior to Perimeter 81.

What's my experience with pricing, setup cost, and licensing?

Overall I am very happy with the solution’s flexibility and pricing. Very fair dissolution for the price I am paying.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
CLAUDIO SANTOS - PeerSpot reviewer
Operation Director at GLOBALIP
Reseller
Top 5Leaderboard
Provides a valuable multi-factor authentication functionality and an effective feature for controlling employee access to specific applications
Pros and Cons
  • "Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process."
  • "The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations."

What is our primary use case?

The platform manages remote access by allowing employees to log into a secure portal, where they are only given access to the specific applications they are authorized to use. This access is based on an HTTPS connection, ensuring security.

What is most valuable?

All product features are valuable, but multi-factor authentication (MFA) is especially critical for securing remote work environments. Without two-factor authentication, there is a heightened risk of security breaches. 

Another key feature is the ability to control the time frame for employee access to applications, allowing for greater security and control.

What needs improvement?

The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations.

For how long have I used the solution?

I have been working with Check Point Quantum SASE for three years. Currently, I am providing it to three customers and implementing it for a fourth. My clients have used it for varying periods, from six months to two years.

What do I think about the stability of the solution?

The solution is very stable and requires minimal maintenance. Once configured and exposed through the portal, it generally does not present issues related to the security service itself.

What do I think about the scalability of the solution?

The product is designed to be scalable, particularly as a SASE (Secure Access Service Edge) product. Its architecture supports easy scaling and can handle increasing users without issues.

How are customer service and support?

The support is comprehensive, and the channel ecosystem effectively assists with resolving complex issues. I can escalate problems to Check Point's research and development teams for further assistance.

How would you rate customer service and support?

Positive

What was our ROI?

The return on investment typically depends on the size of the customer. Most customers find the solution's benefits outweigh the costs, and the return is usually balanced.

What's my experience with pricing, setup cost, and licensing?

The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users.

What other advice do I have?

The solution's cost-effectiveness depends on the size of the business and the specific problems it needs to address.

Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process.

It already comes with all the necessary features. When you purchase it, you get the full package. However, different levels of coverage are offered for endpoint solutions.

I rate it a nine out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
High catch rates, automated forensic data analysis, and great machine learning capabilities
Pros and Cons
  • "Review of exported and imported packages and protection and content filtering have been useful."
  • "In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity."

What is our primary use case?

It was installed on the machines of the organization due to the need to filter all the incoming and outgoing content and to protect the teams - mainly our units that use laptops and have to be constantly moving. 

In the last two years with the appearance of Covid-19, this solution gave us that protection outside the organization that had been neglected for strengthening internal security. 

Another great advantage is the possibility of being able to protect our mobile devices by integrating the solution into all mobile devices.

How has it helped my organization?

The solution has given us an additional layer of protection in our equipment and applications, mainly now that the equipment is portable and in many cases, we must connect to various public Wi-Fi networks.

Its Granular Access Control over and within each resource, based on dynamic and contextual evaluation of user attributes and device states is great. 

A broad set of rules can be applied across all users, servers, and enterprise data stores, including user commands and database queries - giving users well-managed access.

What is most valuable?

Review of exported and imported packages and protection and content filtering have been useful. 

Advanced behavior analysis and machine learning algorithms shut down malware before it does damage. 

The solution offers high catch rates and low false positives to ensure safety,
efficacy, and effective prevention.

The automated forensic data analysis delivers insights into threats. 

Complete attack containment and remediation can quickly restore any infected system. 

It blocks malware coming from web browsing or email attachments before it reaches the endpoints. 

What needs improvement?

It is important to locally validate the consumption exerted on the equipment. At times, when I lose connection, I feel that the equipment is slowing me down. They could improve this detail or indicate that the application, while it is being restored, can generate latency in the communication processes. That said, it is definitely a very good solution for the protection layer in teams inside and outside the organization. 

In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity.

For how long have I used the solution?

I have been using the solution for two years and it really works.

What do I think about the stability of the solution?

It is very stable and normally any problems generated are from loss of internet.

What do I think about the scalability of the solution?

Scaling is easy and fast, thanks to the fact that it is licensed.

Which solution did I use previously and why did I switch?

We did not use a different solution previously.

What's my experience with pricing, setup cost, and licensing?

It is a quick solution to install, however, its cost is really medium and not low.

Which other solutions did I evaluate?

We did not evaluate other options.

What other advice do I have?

It is perfect for keeping all my devices protected.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Karol Méndez - PeerSpot reviewer
Administrador de Office 365 y Azure at ITQS
User
Easy to implement with good visibility and helpful audit reports
Pros and Cons
  • "The characteristics that I have liked the most are the ease of implementation and administration."
  • "Sometimes downloading PDF files can be slow."

What is our primary use case?

We are a company of around 30-50 people who have been working from home since the pandemic began. Our environment is completely cloud-based and all our computers are managed by our organization. 

We needed a solution that would help us protect users and the information that is handled in our company. This solution had to comply with characteristics such as the protection of network connections, prevention of threats such as malware and phishing, data protection, and, above all, it had to be easy to implement and manage. This is why we implemented Check Point Harmony Connect.

How has it helped my organization?

Check Point Harmony Connect helped us create a more secure environment in our organization, since our users can be safer when browsing and not being attacked by malicious actors who try to affect them with phishing or malware. On the other hand, administrators have more visibility of the sites to which users navigate and be able to control them, they can also access audit reports that allow them to make better decisions on security rules that must be applied. The protection of data in our company is the most important.

What is most valuable?

The characteristics that I have liked the most are the ease of implementation and administration. It is a cloud-based service it can be configured easily and very quickly and the administration center is very friendly for administrator users who do not know or have used the product. 

In addition, it is a cloud-based service that helps prevent cyber attacks by ensuring internet access for our users who work remotely, facilitating access control. 

Another valuable feature is that company information is kept protected by internet access control, applications to be managed, and URL filtering protection.

What needs improvement?

Sometimes downloading PDF files can be slow. It may take a while to scan the downloaded files. On some computers, the Check Point Harmony Connect agent can be a bit heavy to run in terms of CPU and Memory resources. 

Transparency to end-users could be improved. 

More compatible applications can be included. 

The support provided could be improved for when problems arise that require support from the Check Point team. Check Point is an expensive product so support should be more adequate. 

Some EDR features may still be under development and may need more time to be ready for use on a larger scale.

For how long have I used the solution?

I've used the solution for one year.

What do I think about the stability of the solution?

Stability is 90% good. File scanning and web console stability could be improved.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Support is good, however, in some cases, they could improve the response time.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have not used any other option before.

How was the initial setup?

The initial configuration was very easy to perform; the installation on the endpoints was very simple for the users.

What about the implementation team?

The initial setup was handled by an internal team with supervision or support from the provider.

What was our ROI?

There have been savings related to the number of hours of implementation and administration.

What's my experience with pricing, setup cost, and licensing?

I recommend that you evaluate using Check Point Harmony Connect, since, although its price may be a little more expensive, it is a solution that adds advanced security to the organization.

Which other solutions did I evaluate?

I only evaluated Microsoft and evaluated if Fortinet had any product that met the requirements.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Sonali Dhende - PeerSpot reviewer
Cyber Security Engineer at Valuepoint Systems
Real User
Provides high performance along with ATP prevention and policy management but firewall configuration could be improved
Pros and Cons
  • "The solution offers ATP features and management features."
  • "The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support."
  • "When it comes to firewall configuration, sometimes we encounter issues."

What is our primary use case?

The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support. We have all these features integrated into our security gateway for every business year, like the SASE model. Cyber threats are becoming increasingly sophisticated nowadays. We have this next-generation firewall, to protect all your network, cloud, data centre, IoT devices, and remote connections. Due to these reasons, we prefer Check Point's network solution. It helps improve the remote workforce security.

What is most valuable?

The solution offers ATP features and management features. We have a smart console and GIA portal. We used to manage all policies on the smart console. We do have the URL filtering and prevention part. We used to do the policy databases and all that configuration from the GIA portal. We have intrusion prevention, application consultant, filtering options and web filtering. It works as a next-gen firewall.

What needs improvement?

Firstly, there are different consoles involved. If someone is selling another product that already has a single console for managing everything, that would be better.

For how long have I used the solution?

I have been using Check Point Quantum SASE for 6 months.

How are customer service and support?

Support is handling requests via email. Additionally, they share documents. We haven't encountered any major issues requiring support. They are available 24hr/day along with alerts, reports or security issues.

How was the initial setup?

The initial setup depends on the organisation. Let's say they are currently using FortiGate, but they want to migrate to Check Point Quantum SASE. We have different options for migration. We can either perform the migration manually or upload existing tests. Manual deployment can be time-consuming. We have two types of configurations: basic and advanced. Basic configuration can be completed quickly, but advanced configurations may take more time. Our deployment process is relatively easy, but managing traffic and other aspects can be challenging. We need to align with the organisation's flow during this process.

Deployment takes about a month depending on the number of firewalls.

What other advice do I have?

The zero trust aspect is being used for VPN purposes. It replaces your VPN, assisting anyone trying to access VPNs.

We are using it for large organisations and enterprises. For instance, if some organisations are using Check Point hardware for their firewalls but don't want to switch to other vendors, they can opt for this solution. Especially for big organisations with data centres facing numerous network issues, it's highly scalable. When it comes to firewall configuration, sometimes we encounter issues, but we can't always blame the firewall.

Check Point offers SmartConsole and other tools. If you compare Quantum with FortiGate, FortiGate doesn't have separate controls for various functions like policy publishing and control. In FortiGate, within one console, you can manage everything by enabling features.

Overall, I rate the solution a 7 out of 10.

Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.