Try our new research platform with insights from 80,000+ expert users
Founder at Softnetx
Real User
Top 5
Along with an excellent UI, the solution also provides a good UX
Pros and Cons
  • "Check Point provides high-quality technical support. The support was pretty quick."
  • "Automation and scalability are areas where the solution lacks and needs to improve."

What is our primary use case?

Regarding use cases, I can say that the solution's user experience is very good. Also, the solution's UI is excellent. In general, we use it for SASE use cases, and to access VPN, ZTNA etcetera.

What is most valuable?

I am working on automation upstream for Harmony Connect Check Point. There are a bunch of integrations like RDP integrations and active directory integration. Also, its security policy management is seamless.

What needs improvement?

Automation and scalability are areas where the solution lacks and needs to improve.

For how long have I used the solution?

I have been using Check Point Harmony ConnectCheck Point Harmony Connect for a year. My company has a partnership with Check Point. Also, I don't remember the version of the solution I am using.

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
September 2024
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: September 2024.
802,829 professionals have used our research since 2012.

What do I think about the stability of the solution?

The stability of the solution is not bad. Stability-wise, I rate the solution an eight out of ten.

What do I think about the scalability of the solution?

There are a lot of hidden features, so I can't really give you a rating. We are working on it, so it is a work in progress.

The scalability of the tool is pretty good. However, we need to do some work on it to improve it. Scalability-wise, I rate the solution a six or seven out of ten.

In the next release of the solution, I would like to see more automation features.

The number of users using the solution depends and varies from client to client. It can scale from a small and simple number of 20 to 30 users to almost 10,000. It could be more than 10,000 users. However, it could be more from other partners.

How are customer service and support?

Check Point provides high-quality technical support. The support was pretty quick. I rate the technical support a nine out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have been out of Cisco domain for quite some time since I used it in my previous company. I am not using high-end Cisco technologies anymore. However, I may use it in the future.

How was the initial setup?

I rate the setup phase an eight on a scale of one to ten, where one is difficult, and ten is an easy setup. Also, it's hard to generalize since it depends on what we have to do.

The solution is deployed on the cloud.

The initial deployment was done using Check Point's UI for us, so it was five hours.

Regarding the steps for deployment, I would say that there is a deployment software that you have to onboard. Then, you have to do the initial registration, and once you do the initial registration, you'll have to integrate Azure. After Azure is integrated, you have to deploy the users for the applications.

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, I can say that the more the number of users, the less they have to pay.

What other advice do I have?

I would tell others planning to use the solution that the solution has simplicity and good UX. Also, people will have to wait for future automation rollouts.

I rate the overall solution a nine out of ten.

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
drzmachado - PeerSpot reviewer
Frontend Developer at Limelight Networks
Vendor
Great user experience, available on mobile, and is easy to set up
Pros and Cons
  • "Perimeter 81 is very pretty."
  • "I don't know if it is technically feasible, however, if the Desktop App could be used as a Web App or a Chrome Extension it would be very nice."

What is our primary use case?

I'm using it for the VPN, I work from a home office and need to access data from different websites. I'm a front-end web developer for a famous brand, working remotely from another country, and the content I have to access must be from different countries. There are some internal tools we must use too, and we must access them with a VPN. Some of these tools are on mobile too, so we also have to install VPN solutions on mobile phones. I have to use a tool that we can access multiple VPNs and switch regions with ease.

How has it helped my organization?

We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile. The other solutions have more steps to set up, are more complicated and it was not a good experience. Unfortunately, I can't use Perimeter 81 for all VPN use cases, due to the company's policy, however, when I can, I always choose it. 

I have to use it on my phone too, and my smartphone was not compatible with the other VPN solutions (old Android version), but Perimeter 81 works on old mobile phones and is very light. 

What is most valuable?

The best points of Perimeter 81 are the:

- User experience
- Design
- Ease of use
- Support for mobile and desktop
- Very light mobile app

The other VPN tools have some old interface with a not great user experience. I use a Mac and the interface looks like an old Windows App. Perimeter 81 is very pretty. My phone is an old Android version (I cannot upgrade right now) and I could not use the other tools to access the VPN because their two-step authentication app could not run on my phone. Perimeter 81 app works on old phones and is very lightweight. The battery consumption is very low. 

What needs improvement?

I am very satisfied with the product right now. I don't know if it is technically feasible, however, if the Desktop App could be used as a Web App or a Chrome Extension it would be very nice. It would help a lot if I could click a link with the right-click and select from a range of options like: "Open a with VPN: Network main" and that tab would open with VPN activated only on that. And then I could refresh the tab with the VPN on or off. When I access a URL, the Extension could have an option like: "Reload current tab with VPN".

For how long have I used the solution?

I've used the solution for two months.

What do I think about the stability of the solution?

I didn't have to deal with any bugs so far.

What do I think about the scalability of the solution?

Our team is big, from people all around the world. Everybody is using a VPN. It scales well.

How are customer service and support?

Until now, I have not needed to reach out for service support.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Yes, I did use a different solution, however, I didn't make a full switch as some tools we use can only be accessed with specific VPN tools. That said, when I can choose, I prefer Perimeter 81 due to its ease of use.

How was the initial setup?

It was very easy to set up.

What about the implementation team?

Our IT team provided a step-by-step to setup the solution.

What was our ROI?

I don't deal with the billing.

What's my experience with pricing, setup cost, and licensing?

I don't deal with billing, however, it would be nice to have a time trial.

Which other solutions did I evaluate?

IT selects the tools we use. I did not evaluate others.

What other advice do I have?

I'd advise others to use it if you need to access VPN for both desktop and mobile.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
September 2024
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: September 2024.
802,829 professionals have used our research since 2012.
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
Offers great performance and reliability
Pros and Cons
  • "The product's initial setup phase is very simple."
  • "When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end."

What is our primary use case?

In our company, Quantum SASE is available for namesake in our environment since we rely on Check Point Secure Web Gateway for its firewall functionalities. Most of our company's customers use firewalls from Check Point Software, Palo Alto, or Fortinet. The simple use case of the tool for our company's customers stems from the fact that they have a general internal network or many users for which a firewall is required to secure the network traffic flow and communications that happen from outside to inside the company.

What needs improvement?

When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end. There are no OEMs in the market that provide 100 percent security. The security of the product has to be improved.

For how long have I used the solution?

I have been using Check Point Quantum SASE for seven years.

What do I think about the stability of the solution?

The product's stability is very good. Stability-wise, I rate the solution a nine out of ten.

What do I think about the scalability of the solution?

In firewall products, scalability is not required. If you set up the two firewall tools, no scalability is required. Scalability-wise, I rate the solution a nine out of ten.

My company deals with 20 or 30 customers of the tool.

My company's customers extensively use the product.

How are customer service and support?

The support from Check Point Quantum SASE is very good, and the response from the support team is fast. The support from Check Point Quantum SASE is customer-friendly and knowledgeable about troubleshooting issues.

How was the initial setup?

The product's initial setup phase is very simple.

The product's installation process consists of racking, stacking, and mounting, after which a user can directly start the appliance and configure the HA status and policies.

The solution is deployed on an on-premises model.

The solution can be deployed in two or three days.

One engineer is required to take care of one single deployment process.

What was our ROI?

The ROI of the tool can be calculated depending on the tool's ability to be used for multiple use cases and protect the confidential data of users. It is very simple to calculate the product's ROI. If you use Check Point Quantum SASE, then your internal users are protected from outside attackers.

What's my experience with pricing, setup cost, and licensing?

Check Point Quantum SASE provides SASE functionalities with all the required features. Check Point Quantum SASE's price is higher than what its competitors offer. The price of the product is something that depends on the requirements, and the purchase or order value of the customers.

The price of the tool depends on whether customers need SMTP, NGTP, or Check Point NG licenses.

I consider the product to be a medium-priced solution. There are no additional costs attached to the tool.

What other advice do I have?

The solution enhances the ability of our company's remote workforce to secure access to corporate resources since we use VPN to secure work-from-home users and domain users.

Check Point Quantum SASE offers all the features essential for threat prevention, threat emulation, threat extraction, anti-spam, and anti-malware.

In relation to Check Point Quantum SASE, I haven't worked with the part involving WAN architecture. I only handle cybersecurity for a portfolio with respect to the LAN segment, and not WAN segment.

I rate the tool's performance a ten out of ten.

Check Point Quantum SASE can be described as the world's best security product without a doubt since it is a market leader in its segment.

The performance and reliability offered by the tool depend on the customer environment, and after considering aspects like throughput, how many users, and how many concurrent connections, my company plans the sizing part of the tool.

The value of working with the tool is good, as it can secure users, environments, and applications.

I rate the tool a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Srini Krish - PeerSpot reviewer
Business Development Sales Engineer at Orca Tech
User
Top 10
Simple, easy to manage policies, and offers good reports
Pros and Cons
  • "The reports give a simple overview of the traffic pattern within the organization."
  • "Branding could be better."

What is our primary use case?

The solution is predominantly used for Internet access when mobile. In the office, we have already deployed a Quantum Spark appliance, and this was focused on mobile users. 

We don't have on-premise applications or servers, so there is no use case for Remote access. However, we were keen to try it out from an evaluation perspective by bridging to the existing Check Point gateway at the site. 

Simplicity was needed, and importantly, we wanted something to not be too intrusive to mobile users. The interface has a few simple options, and it makes it easier.

How has it helped my organization?

We believe in defense in depth, and Harmony connect SASE adds another layer of protection for internet access. 

We have already deployed the entire Harmony suite, from Email & Collab protection to Harmony Endpoint. This adds a layer on top. Being a mobile user, securing Internet access was very important, and the product's pricing was simple enough and unlike other multiple add-ons on top of the base products from other vendors.

The reports give a simple overview of the traffic pattern within the organization. Though we don't use it to track user productivity, we can if necessary. There are reports specific to SaaS applications as well, which do come in handy.

What is most valuable?

The simplicity is good. It's good for consolidating security and being manageable from the Infinity portal with other Harmony solutions and makes management easy. We can use this instead of managing multiple-point solutions. It has a unified policy for private and internet access, making it easier to manage policies. 

The weekly reports have been informative as well. We are also keen on trying clientless access to provide restricted access to applications for third-party users.

Deployment was a breeze. We just key in the target users' email, and the rest is easy.

What needs improvement?

Branding could be better. Not many Check Point users realize there is a SASE offering at all. Policies could have layers as they do with their Firewalls, though I understand that's more of a functionality within the Smart dashboard. The threat prevention profiles like IPS, file, and URL protections could have more fine-tuning options.

Though all the policies are managed from the Infinity portal, we still have to manually configure different solutions. It would be nice to know how the new XDR option will bridge this gap.

Also, for Multi-factor authentication, there was an option for G-auth. However, I'm not sure about other forms of authentication they offer in their gateways. Bringing the backend closer to the gateway management would make it more granular.

For how long have I used the solution?

I've been using Harmony Connect for more than three months now. 

What do I think about the stability of the solution?

We haven't had any glitches or issues with it at all. It's very transparent to the user.

What do I think about the scalability of the solution?

It's very scalable and easy to deploy. It's scalable with users and it's scalable with the existing CP gateway deployments as well. There isn't much information on how it integrates with other end-point solutions. We had a full Check Point environment and it was clean.

How are customer service and support?

We haven't run into any issues so far. We did need some assistance during the initial policy configuration, and the Check Point solutions team was there to assist.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use any other SASE offering before. 

How was the initial setup?

It's a simple setup; we just key in the end user's email address and it sends an invite to download the client. 

What about the implementation team?

We implemented it in-house with the assistance of Check Point's solutions team.

What was our ROI?

The ROI is better than using a traditional VPN to connect back to the office gateway. We needed something that was light and transparent without the hassle of having to connect manually. We aren't planning to remove the gateway yet, however, in the long run, we will consider it, and that should negate the gateway costs.

What's my experience with pricing, setup cost, and licensing?

Setup is a breeze. You key in the target user's email, and the rest is a click away. Pricing is competitive compared to the top players in the SASE market. 

Also, there is no concept of add-ons which makes it easier. 

Licensing with a minimum of 50 users could be a show-stopper for smaller organizations. However, a small company has probably got to do it with the infra in the backend to make it worthwhile.

Which other solutions did I evaluate?

Since we were keen on consolidating, we did not focus on multiple options.

What other advice do I have?

The product seems to be transparent to the users. It lacks application segmentation options which some competitors offer.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: We are Checkpoint Distributor as well but the comments are based on my experience with the product.
PeerSpot user
reviewer1428267 - PeerSpot reviewer
VP Engineering at Loris.ai
Real User
Affordable, secure, and allows me to manage all user access in one platform
Pros and Cons
  • "Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
  • "I would suggest adding more networking and security features that allow more customization within their platform."

What is our primary use case?

We are using Perimeter 81 for secure network connections while working remotely.

As my entire team is working remotely, we were looking for a simple and secure remote access solution and we went with Perimeter 81. So far, we have been super happy with Perimeter 81’s affordable and simple to manage solution.

We initially started to use Perimeter 81 for their networking features but recently we integrated their split-tunneling feature and their simple Google Authenticator two-factor authentication integration. Both features have been game-changers for us.

How has it helped my organization?

Simply, Perimeter 81 has allowed me to easily manage all our user access to my company’s networks in one platform.

Additionally, my employees can quickly connect to a reliable and more secure network connection while working outside the office. Instead of manually connecting to a VPN, all of my employees are automatically connected to Perimeter 81 when they open their computer or other company devices.

Since implementing Perimeter 81 we are seeing an increase in network performance and employee productivity.

What is most valuable?

Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution.

We were able to configure tunnels to our IP addresses for specific user access, including application access to any devices no matter their location. This has helped me make sure the right users are getting the right access to their work resources to do their daily job.

Also, I am very happy with their MFA feature. It was very easy to integrate with our two-factor authentication and simplified the authorization process for all of our employees to gain network access.

What needs improvement?

I would suggest adding more networking and security features that allow more customization within their platform.

So far, I am very happy with their simple network management platform. However, I feel such features as SD-WAN, Firewalls, and more real-time alerts would take this solution to the next level. By adding these networking and security features, it will allow me to customize my company's network security to the level I am seeking.

For how long have I used the solution?

I have been using Perimeter 81 for three months.

Which solution did I use previously and why did I switch?

We did not use another solution prior to Perimeter 81.

What's my experience with pricing, setup cost, and licensing?

Overall I am very happy with the solution’s flexibility and pricing. Very fair dissolution for the price I am paying.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
CLAUDIO SANTOS - PeerSpot reviewer
Operation Director at GLOBALIP
Reseller
Top 10Leaderboard
Provides a valuable multi-factor authentication functionality and an effective feature for controlling employee access to specific applications
Pros and Cons
  • "Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process."
  • "The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations."

What is our primary use case?

The platform manages remote access by allowing employees to log into a secure portal, where they are only given access to the specific applications they are authorized to use. This access is based on an HTTPS connection, ensuring security.

What is most valuable?

All product features are valuable, but multi-factor authentication (MFA) is especially critical for securing remote work environments. Without two-factor authentication, there is a heightened risk of security breaches. 

Another key feature is the ability to control the time frame for employee access to applications, allowing for greater security and control.

What needs improvement?

The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations.

For how long have I used the solution?

I have been working with Check Point Quantum SASE for three years. Currently, I am providing it to three customers and implementing it for a fourth. My clients have used it for varying periods, from six months to two years.

What do I think about the stability of the solution?

The solution is very stable and requires minimal maintenance. Once configured and exposed through the portal, it generally does not present issues related to the security service itself.

What do I think about the scalability of the solution?

The product is designed to be scalable, particularly as a SASE (Secure Access Service Edge) product. Its architecture supports easy scaling and can handle increasing users without issues.

How are customer service and support?

The support is comprehensive, and the channel ecosystem effectively assists with resolving complex issues. I can escalate problems to Check Point's research and development teams for further assistance.

How would you rate customer service and support?

Positive

What was our ROI?

The return on investment typically depends on the size of the customer. Most customers find the solution's benefits outweigh the costs, and the return is usually balanced.

What's my experience with pricing, setup cost, and licensing?

The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users.

What other advice do I have?

The solution's cost-effectiveness depends on the size of the business and the specific problems it needs to address.

Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process.

It already comes with all the necessary features. When you purchase it, you get the full package. However, different levels of coverage are offered for endpoint solutions.

I rate it a nine out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Excellent product - HC modern security tool
Pros and Cons
  • "Protection against threats like ransomware is very effective."
  • "Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us."

What is our primary use case?

This tool is of great help and allows us to provide security assistance to our users who work remotely. They connect from any site, secure or insecure, accessing applications and business email without protection as they are outside the company perimeter.

It gives us granular security through web control policies, reports, and monitoring. We manage to avoid user vulnerabilities from anywhere. It is managed with Harmony Connect in the Check Point Infinity Portal, a very good tool.

Users are quite happy with the applied security performance.

How has it helped my organization?

Check Point Harmony Connect has improved the protection of computers outside the office. It offers implementation that is simple. 

Also, with the monitoring dashboard, we can make decisions to improve the control policies and web access so that we can better protect our teams.

This tool does not require being on the same network. Everything is verified thanks to a small Check Point protection agent that is installed on the client.

Protection against threats like ransomware is very effective.

What is most valuable?

We really liked the Check Point Harmony Connect tool and the monitoring, since we can make the right decisions thanks to the records observed in a simple way through the dashboard. The portal is really very intuitive.

The policies applied to users are quite granular, which helps a lot with the differential protection of users, generating managerial profiles and normal profiles efficiently.

We have also put VPNs into practice through harmony connect, having secure user connectivity. It is a very robust, modern, and secure tool.

What needs improvement?

They should include the ease of implementation or installation of the agent through an Excel list, where all the users can be loaded and added to be able to send the agent by mail.

I would also like it if they could include more documentation from the manufacturer to be able to implement it more efficiently and follow all the best practices.

Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us.

For how long have I used the solution?

We have been using this tool for approximately two years now. It is an excellent security tool to protect telecommuting users.

What do I think about the scalability of the solution?

This is an excellent cloud-managed Check Point tool; no server is required.

How are customer service and support?

Problems are always solved, however, with modern security applications, specifically those that are in the Check Point Infinity Portal, it is a little more difficult to solve with support.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We have not had a modern solution like this before. Check Point has innovated our processes.

What's my experience with pricing, setup cost, and licensing?

It is important to associate you company with a partner who can work with prices and documentation in order to find the security application that best suits the company's requirements.

Which other solutions did I evaluate?

Before acquiring any company-level security tool, we undertake the task of investigating several solutions. In this case, Check Point was the best.

What other advice do I have?

All Harmony solutions are excellent. I really recommend this option.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
High catch rates, automated forensic data analysis, and great machine learning capabilities
Pros and Cons
  • "Review of exported and imported packages and protection and content filtering have been useful."
  • "In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity."

What is our primary use case?

It was installed on the machines of the organization due to the need to filter all the incoming and outgoing content and to protect the teams - mainly our units that use laptops and have to be constantly moving. 

In the last two years with the appearance of Covid-19, this solution gave us that protection outside the organization that had been neglected for strengthening internal security. 

Another great advantage is the possibility of being able to protect our mobile devices by integrating the solution into all mobile devices.

How has it helped my organization?

The solution has given us an additional layer of protection in our equipment and applications, mainly now that the equipment is portable and in many cases, we must connect to various public Wi-Fi networks.

Its Granular Access Control over and within each resource, based on dynamic and contextual evaluation of user attributes and device states is great. 

A broad set of rules can be applied across all users, servers, and enterprise data stores, including user commands and database queries - giving users well-managed access.

What is most valuable?

Review of exported and imported packages and protection and content filtering have been useful. 

Advanced behavior analysis and machine learning algorithms shut down malware before it does damage. 

The solution offers high catch rates and low false positives to ensure safety,
efficacy, and effective prevention.

The automated forensic data analysis delivers insights into threats. 

Complete attack containment and remediation can quickly restore any infected system. 

It blocks malware coming from web browsing or email attachments before it reaches the endpoints. 

What needs improvement?

It is important to locally validate the consumption exerted on the equipment. At times, when I lose connection, I feel that the equipment is slowing me down. They could improve this detail or indicate that the application, while it is being restored, can generate latency in the communication processes. That said, it is definitely a very good solution for the protection layer in teams inside and outside the organization. 

In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity.

For how long have I used the solution?

I have been using the solution for two years and it really works.

What do I think about the stability of the solution?

It is very stable and normally any problems generated are from loss of internet.

What do I think about the scalability of the solution?

Scaling is easy and fast, thanks to the fact that it is licensed.

Which solution did I use previously and why did I switch?

We did not use a different solution previously.

What's my experience with pricing, setup cost, and licensing?

It is a quick solution to install, however, its cost is really medium and not low.

Which other solutions did I evaluate?

We did not evaluate other options.

What other advice do I have?

It is perfect for keeping all my devices protected.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2024
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.