Try our new research platform with insights from 80,000+ expert users
reviewer2170548 - PeerSpot reviewer
Customer Service Specialist at Arbicare
User
Top 20
Secure, allows for remote connectivity, and helps with productivity
Pros and Cons
  • "Providing access and security allows our company employees to work from home and remotely."
  • "A Google Chrome extension would be handy instead of logging into the app."

What is our primary use case?

The primary use is for secure site protection. 

I work at a worker's compensation company that deals with sensitive information, such as SSN, home addresses, phone numbers, and doctor notes that contain medical history and conditions. 

This product helps us keep the information on websites that are solely accessible through Perimeter 81 so we do not leak the patients, doctors, or adjusters' information to the public. Everything is in a safe space while at the same time, Perimeter 81 makes working from home accessible. 

How has it helped my organization?

It helps improve our organization by allowing employees work all over the globe providing colleagues with safe internet no matter what part of the globe they find themselves. 

Providing access and security allows our company employees to work from home and remotely. They are not confined to one space or location if they need to travel. The Perimeter 81 VPN provides the luxury to travel and work while maintaining security to create the work-life balance everyone needs. 

It improved our organization more than can be explained. We plan to continue to further use of this technology. 

What is most valuable?

The VPN is the main function used. It's valuable to us since it's the only way to access most company websites. All company websites can only be used if users are connected to Perimeter 81. It does not matter what location you are in. 

If Perimeter 81 is not connecting, it slows down company productivity. This is why we appreciate the live updates and minimal issues we have when dealing with this product. The faster we work, the more patients are taken care of, and the higher client success rate we can achieve. Perimeter 81's VPN feature helps our company be as efficient as possible. 

What needs improvement?

A Google Chrome extension would be handy instead of logging into the app. That way, it's pre-signed in and ready to go while browsing. 

While the app connects as we log in, it would be helpful to be able to stay signed in and have an automatic connection while browsing. The connection may be faster and stronger that way as well. 

A VPN Extention through the web browser would be a great asset to web users and companies. With a one-time login, we can have access and not worry about reconnecting to the VPN. I'm looking forward to seeing this feature. 

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
February 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

For how long have I used the solution?

I've been using Perimeter 81 for one year. 

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

Currently, I do not have access to this information. 

Which other solutions did I evaluate?

I'm an employee. I do not make decisions on organizational software. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1911213 - PeerSpot reviewer
Accounts Payable Specialist at Simera
User
Good security and privacy capabilities with excellent support
Pros and Cons
  • "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
  • "I have found that the log-in/out process takes quite some time."

What is our primary use case?

I needed the solution to attach it to the vendor's file in our accounting software. The customer service team provided such an efficient and fast service. We have an account manager, which is great as we get personalized attention. I asked for the W-9 form once, and it was provided to me. I was not able to download it and then forgot about it. I asked for it again, and without any hesitation, the team provided it again. They were not rude about it. I later realized and apologized for asking for it twice.

How has it helped my organization?

Our organization is more secure with Perimeter81's Virtual Private Network (VPN). We manage sensitive information of clients. In my department, we manage bank and credit card information. It is a lot of responsibility to have access to that kind of data. Now that our company has implemented Perimeter81's services with the VPN, personally, I feel more secure when navigating through these different platforms. It is a great investment for today's workplaces - especially when we handle critical information virtually.

What is most valuable?

The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online. 

Similarly, I find that the work that Perimeter 81's customer service team does is very valuable. I have heard from our IT department that Perimeter 81's team is quite knowledgeable and efficient. These are important traits and they describe not only the company's service but the quality of its product as well. So far, our company is very happy with the product.

What needs improvement?

Overall the product is very efficient. However, personally, there is something that I dislike. I have found that the log-in/out process takes quite some time. I usually click on the app, and it asks me to login in through the web, and then after I log in it takes me back to the app. It seems to me that I should be able to log out without having to leave the app. I do like that it connects automatically/logs in as soon as I sign on. I am not sure why login in is easier than logout. 

For how long have I used the solution?

The resolution took a couple of hours to be solved, around six hours.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

The experience with technical support was great. The team is professional, polite, and efficient.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time that we used a VPN in the company.

How was the initial setup?

I'm not able to say what the setup is like.

What about the implementation team?

I'm not able to say if we had any outside assistance.

What was our ROI?

I'm not able to say what the ROI would be.

What's my experience with pricing, setup cost, and licensing?

I am not able to advise on the cost/pricing.

Which other solutions did I evaluate?

This decision was made by the IT department, however, naturally, they did evaluate other vendors

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company has a business relationship with this vendor other than being a customer: Simera, the company I work, is the client. I am an user.
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
February 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
reviewer1906227 - PeerSpot reviewer
Full Stack Engineer at Datalex PLC
User
Great segmentation, makes it easy to add users and offers good uptime
Pros and Cons
  • "The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way."
  • "There is a very small amount of downtime."

What is our primary use case?

I am a remote developer and I use Perimeter81 as a VPN to access development and UAT servers for booking systems that service tier1 airlines. Those servers are mostly on the cloud, however, some are physical. We use AWS servers and physical servers in Dublin, Manchester, Amsterdam, Bejing, and Altlanta. We have individual team members spread out possibly 15-20 countries that need to be managed so it's important that we can be grouped and organized in a manner that allows us to authorize not just depending on our location but also our roles.

How has it helped my organization?

Our organization is made up of permanent and contract employees both onsite in our office worldwide and in remote individual locations across the globe. Perimeter81 allows us to develop software as a service (SaaS) collaboratively in a safe and efficient manner. We can authorize our web services not just by our team members' roles but also by our team members' locations based on the IP addresses on an individual level but also based on the group role for that member. The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way.

What is most valuable?

As a virtual private network, it enables us to communicate through development groups that segment our organization through the correct allocation of bandwidth and easily configured groups. 

Being able to add individuals to groups is the single most valuable feature, simple as it may seem. This combined with the underlying protocol makes for a powerful and easy-to-use feature for our organization. Adding and removing individuals is simple and easy to do which adds to the overall convenience and usability.

What needs improvement?

There is a very small amount of downtime. As a general user of the network, I'm not sure if this is down to maintenance time needed by our own network engineers who support our organization or indeed if it is up to Perimeter81 and its maintenance. What would be helpful is if this downtime was reduced. This may or may not involve some collaboration with Perimeter81 engineers and our own organization's engineers to ensure more up time, although I'm not complaining as this is very infrequent.

For how long have I used the solution?

I've used the solution for over one year now.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

I don't directly deal with technical support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Openpath was our old solution. We switched simply for better service and more uptime.

How was the initial setup?

I did not handle the initial setup.

What about the implementation team?

I did not handle the initial setup.

What was our ROI?

I don't know anything about the ROI - it's not my area.

What's my experience with pricing, setup cost, and licensing?

Licensing is not my area.

Which other solutions did I evaluate?

I don't what other solutions were considered.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Sonali Dhende - PeerSpot reviewer
Cyber Security Engineer at Valuepoint Systems
Real User
Provides high performance along with ATP prevention and policy management but firewall configuration could be improved
Pros and Cons
  • "The solution offers ATP features and management features."
  • "The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support."
  • "When it comes to firewall configuration, sometimes we encounter issues."

What is our primary use case?

The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support. We have all these features integrated into our security gateway for every business year, like the SASE model. Cyber threats are becoming increasingly sophisticated nowadays. We have this next-generation firewall, to protect all your network, cloud, data centre, IoT devices, and remote connections. Due to these reasons, we prefer Check Point's network solution. It helps improve the remote workforce security.

What is most valuable?

The solution offers ATP features and management features. We have a smart console and GIA portal. We used to manage all policies on the smart console. We do have the URL filtering and prevention part. We used to do the policy databases and all that configuration from the GIA portal. We have intrusion prevention, application consultant, filtering options and web filtering. It works as a next-gen firewall.

What needs improvement?

Firstly, there are different consoles involved. If someone is selling another product that already has a single console for managing everything, that would be better.

For how long have I used the solution?

I have been using Check Point Quantum SASE for 6 months.

How are customer service and support?

Support is handling requests via email. Additionally, they share documents. We haven't encountered any major issues requiring support. They are available 24hr/day along with alerts, reports or security issues.

How was the initial setup?

The initial setup depends on the organisation. Let's say they are currently using FortiGate, but they want to migrate to Check Point Quantum SASE. We have different options for migration. We can either perform the migration manually or upload existing tests. Manual deployment can be time-consuming. We have two types of configurations: basic and advanced. Basic configuration can be completed quickly, but advanced configurations may take more time. Our deployment process is relatively easy, but managing traffic and other aspects can be challenging. We need to align with the organisation's flow during this process.

Deployment takes about a month depending on the number of firewalls.

What other advice do I have?

The zero trust aspect is being used for VPN purposes. It replaces your VPN, assisting anyone trying to access VPNs.

We are using it for large organisations and enterprises. For instance, if some organisations are using Check Point hardware for their firewalls but don't want to switch to other vendors, they can opt for this solution. Especially for big organisations with data centres facing numerous network issues, it's highly scalable. When it comes to firewall configuration, sometimes we encounter issues, but we can't always blame the firewall.

Check Point offers SmartConsole and other tools. If you compare Quantum with FortiGate, FortiGate doesn't have separate controls for various functions like policy publishing and control. In FortiGate, within one console, you can manage everything by enabling features.

Overall, I rate the solution a 7 out of 10.

Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
reviewer1832313 - PeerSpot reviewer
Associate IT Engineer at Qualco
User
Great anti-malware scans with excellent disk encryption but it's difficult to install the Check Point client
Pros and Cons
  • "Using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials."
  • "There is an issue when installing the Check Point client."

What is our primary use case?

We are using Check Point Endpoint Security as an application for all corporate users. 

The main features are antivirus (antimalware, antiphishing), disk preboot encryption, and VPN connection. We also use SSL VPN (a VPN connection using a browser) for our external partners. 

We have about 250 active machines (both desktops and laptops), running Windows 10 Pro 64bit, an i5 or i7 processor with 8GB RAM or more, and SSD drives (all Dell hardware). The Check Point client we use is version E86.10.0036. 

We also have Check Point firewalls.

How has it helped my organization?

The disk encryption made our computers more secure for data leaks in the case of a stolen machine. 

The Check Point VPN connection is way more stable than our previous software. Previously, when connecting/disconnecting from a VPN while we were on a call, the network would temporarily drop and then reconnect again. Using Check Point's VPN, this does not happen anymore. 

Also, using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials. 

Anti-malware scans are also very helpful.

What is most valuable?

The preboot VPN connection, in the case where users are locked remotely. is very useful 

The disk encryption feature is important. The Check Point VPN connection process is quite simple when using the Microsoft MFA method. 

Previously, when connecting/disconnecting from a VPN while we were on a call, the network would temporarily drop and then reconnect again. Using Check Point VPN, this does not happen anymore. 

Also, using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials. 

The anti-malware scan is very helpful. 

The SSL VPN is great where we can use a browser for external partners.

What needs improvement?

There is an issue when installing the Check Point client. If the machine has RAID on mode for storage rather than AHCI, the disk encryption never begins and stays in the "setup protection" warning message. Changing mode from RAID to AHCI means a Windows format is required, which takes more time. On top of that, in the preboot screen, sometimes caps lock is on, and yet when someone types it's not in capitals. When that happens, many users get locked. 

In addition to this, number lock should be automatically on as users think it is, and when they type they get locked again.

What do I think about the stability of the solution?

The solution is quite stable. There are minor bugs.

What do I think about the scalability of the solution?

The solution is pretty flexible.

Which solution did I use previously and why did I switch?

We did use a different solution. It was not our decision to switch (as it's managed by a group IT).

How was the initial setup?

I was not included in initial setup. The client setup on machines is easy.

What was our ROI?

We do not have any ROI details. 

What's my experience with pricing, setup cost, and licensing?

Data is not available in terms of pricing. 

Which other solutions did I evaluate?

Evaluations were not included in the process.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1428267 - PeerSpot reviewer
VP Engineering at Loris.ai
Real User
Affordable, secure, and allows me to manage all user access in one platform
Pros and Cons
  • "Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
  • "I would suggest adding more networking and security features that allow more customization within their platform."

What is our primary use case?

We are using Perimeter 81 for secure network connections while working remotely.

As my entire team is working remotely, we were looking for a simple and secure remote access solution and we went with Perimeter 81. So far, we have been super happy with Perimeter 81’s affordable and simple to manage solution.

We initially started to use Perimeter 81 for their networking features but recently we integrated their split-tunneling feature and their simple Google Authenticator two-factor authentication integration. Both features have been game-changers for us.

How has it helped my organization?

Simply, Perimeter 81 has allowed me to easily manage all our user access to my company’s networks in one platform.

Additionally, my employees can quickly connect to a reliable and more secure network connection while working outside the office. Instead of manually connecting to a VPN, all of my employees are automatically connected to Perimeter 81 when they open their computer or other company devices.

Since implementing Perimeter 81 we are seeing an increase in network performance and employee productivity.

What is most valuable?

Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution.

We were able to configure tunnels to our IP addresses for specific user access, including application access to any devices no matter their location. This has helped me make sure the right users are getting the right access to their work resources to do their daily job.

Also, I am very happy with their MFA feature. It was very easy to integrate with our two-factor authentication and simplified the authorization process for all of our employees to gain network access.

What needs improvement?

I would suggest adding more networking and security features that allow more customization within their platform.

So far, I am very happy with their simple network management platform. However, I feel such features as SD-WAN, Firewalls, and more real-time alerts would take this solution to the next level. By adding these networking and security features, it will allow me to customize my company's network security to the level I am seeking.

For how long have I used the solution?

I have been using Perimeter 81 for three months.

Which solution did I use previously and why did I switch?

We did not use another solution prior to Perimeter 81.

What's my experience with pricing, setup cost, and licensing?

Overall I am very happy with the solution’s flexibility and pricing. Very fair dissolution for the price I am paying.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1831461 - PeerSpot reviewer
Senior Information Security Manager at Adidas
User
Secure, with good support and an openness to constructive feedback
Pros and Cons
  • "The Check Point portfolio showcases very strong products."
  • "An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia."

What is our primary use case?

We are using the product to secure roaming users who work outside the office as well for protecting a variety of company locations. 

It is great that Check Point continues to be a visionary in the network security market and delivers such anticipated products which allow users to cope with ongoing security challenges and trends.

It is used to protect offices and retail stores and it is a step forward from the traditional connectivity architecture which lacks flexibility and prevents business to advance at the desired pace.

How has it helped my organization?

It is great from an operational point of view. There is no need to procure and install HW; a new location could be secured almost instantly.

There is no need to talk about security. It comes from a team of talented developers and has a historic record. The Check Point portfolio showcases very strong products. 

The support from Check Point's side is great as it always and allows you to understand the product, produce and secure design as well as deploy and test it. Furthermore, the product owners are actively looking for feedback. This allows you to express your opinion and shape the product to improve it according to your needs.

What is most valuable?

The product is great as it allows users to deliver the most security value at the fastest speed. It reduces an operational load in terms of provision, installation, management, patching, and hardware replacement by increasing uptime and reducing the time to deliver to market. It also provides cloud-native availability and allows you not to bother with the sizing and location capacity as long as you stick with Harmony Connect. The price is reasonable.

Last but not least, there is an option to manage Harmony Connect from the centralized management station which allows users to apply existing policies while having a single pane of glass for network security.

What needs improvement?

An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia. Some PoP locations might create complicated traffic flows and impact the latency and load on network infrastructure even further.

Advanced details of log information are missing. However, the Check Point team is definitely open to constructive advice and is happy to make any requested changes.

There are still some limitations that exist while using centralized management with Harmony Connect.

For how long have I used the solution?

I've used the solution for six months.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
CLAUDIO SANTOS - PeerSpot reviewer
Operation Director at GLOBALIP
Reseller
Top 5Leaderboard
Provides a valuable multi-factor authentication functionality and an effective feature for controlling employee access to specific applications
Pros and Cons
  • "Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process."
  • "The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations."

What is our primary use case?

The platform manages remote access by allowing employees to log into a secure portal, where they are only given access to the specific applications they are authorized to use. This access is based on an HTTPS connection, ensuring security.

What is most valuable?

All product features are valuable, but multi-factor authentication (MFA) is especially critical for securing remote work environments. Without two-factor authentication, there is a heightened risk of security breaches. 

Another key feature is the ability to control the time frame for employee access to applications, allowing for greater security and control.

What needs improvement?

The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations.

For how long have I used the solution?

I have been working with Check Point Quantum SASE for three years. Currently, I am providing it to three customers and implementing it for a fourth. My clients have used it for varying periods, from six months to two years.

What do I think about the stability of the solution?

The solution is very stable and requires minimal maintenance. Once configured and exposed through the portal, it generally does not present issues related to the security service itself.

What do I think about the scalability of the solution?

The product is designed to be scalable, particularly as a SASE (Secure Access Service Edge) product. Its architecture supports easy scaling and can handle increasing users without issues.

How are customer service and support?

The support is comprehensive, and the channel ecosystem effectively assists with resolving complex issues. I can escalate problems to Check Point's research and development teams for further assistance.

How would you rate customer service and support?

Positive

What was our ROI?

The return on investment typically depends on the size of the customer. Most customers find the solution's benefits outweigh the costs, and the return is usually balanced.

What's my experience with pricing, setup cost, and licensing?

The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users.

What other advice do I have?

The solution's cost-effectiveness depends on the size of the business and the specific problems it needs to address.

Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process.

It already comes with all the necessary features. When you purchase it, you get the full package. However, different levels of coverage are offered for endpoint solutions.

I rate it a nine out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.