I use Perimeter 81 mostly for remote work. I work in a fast-paced, customer-centric environment overseeing a team of about four or five people who regularly need urgent assistance. I also host group meetings that require me to use other applications that need a VPN. Perimeter 81 has helped me stay connected right around the clock with almost no need for IT app support each day. Dealing with clients online requires good VPN hosting, and Perimeter 81 has provided that
Underwriter at GraceKennedy
It connects quickly and stays connected
Pros and Cons
- "It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go."
- "If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on."
What is our primary use case?
How has it helped my organization?
Perimeter 81 has been a game-changer at my company. Service delivery has improved internally and externally. We had lots of dropped VPN signals with our previous provider, so it was refreshing when we started testing Perimeter 81. We are now considering switching all of our remote employees to Perimeter 81 based on the experiences that the initial users shared during our bi-weekly department and company meetings.
What is most valuable?
It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go. There is also a diagnostic feature that helps you troubleshoot any issue you have, but I've never had to use this because I haven't had any issues.
What needs improvement?
If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on.
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
March 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,672 professionals have used our research since 2012.
For how long have I used the solution?
I've been using Perimeter 81 for about six months
What do I think about the stability of the solution?
Perimeter 81 is highly stable.
What do I think about the scalability of the solution?
Perimeter 81 is highly scalable.
Which solution did I use previously and why did I switch?
Our previous VPN provider dropped the signal too often.
How was the initial setup?
Setting up Perimeter 81 wasn't complex.
What about the implementation team?
We deployed Perimeter 81 in-house.
What other advice do I have?
I rate Perimeter 81 10 out of 10.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:

Cyber Security Engineer at Valuepoint Systems
Provides high performance along with ATP prevention and policy management but firewall configuration could be improved
Pros and Cons
- "The solution offers ATP features and management features."
- "The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support."
- "When it comes to firewall configuration, sometimes we encounter issues."
What is our primary use case?
The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support. We have all these features integrated into our security gateway for every business year, like the SASE model. Cyber threats are becoming increasingly sophisticated nowadays. We have this next-generation firewall, to protect all your network, cloud, data centre, IoT devices, and remote connections. Due to these reasons, we prefer Check Point's network solution. It helps improve the remote workforce security.
What is most valuable?
The solution offers ATP features and management features. We have a smart console and GIA portal. We used to manage all policies on the smart console. We do have the URL filtering and prevention part. We used to do the policy databases and all that configuration from the GIA portal. We have intrusion prevention, application consultant, filtering options and web filtering. It works as a next-gen firewall.
What needs improvement?
Firstly, there are different consoles involved. If someone is selling another product that already has a single console for managing everything, that would be better.
For how long have I used the solution?
I have been using Check Point Quantum SASE for 6 months.
How are customer service and support?
Support is handling requests via email. Additionally, they share documents. We haven't encountered any major issues requiring support. They are available 24hr/day along with alerts, reports or security issues.
How was the initial setup?
The initial setup depends on the organisation. Let's say they are currently using FortiGate, but they want to migrate to Check Point Quantum SASE. We have different options for migration. We can either perform the migration manually or upload existing tests. Manual deployment can be time-consuming. We have two types of configurations: basic and advanced. Basic configuration can be completed quickly, but advanced configurations may take more time. Our deployment process is relatively easy, but managing traffic and other aspects can be challenging. We need to align with the organisation's flow during this process.
Deployment takes about a month depending on the number of firewalls.
What other advice do I have?
The zero trust aspect is being used for VPN purposes. It replaces your VPN, assisting anyone trying to access VPNs.
We are using it for large organisations and enterprises. For instance, if some organisations are using Check Point hardware for their firewalls but don't want to switch to other vendors, they can opt for this solution. Especially for big organisations with data centres facing numerous network issues, it's highly scalable. When it comes to firewall configuration, sometimes we encounter issues, but we can't always blame the firewall.
Check Point offers SmartConsole and other tools. If you compare Quantum with FortiGate, FortiGate doesn't have separate controls for various functions like policy publishing and control. In FortiGate, within one console, you can manage everything by enabling features.
Overall, I rate the solution a 7 out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
March 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,672 professionals have used our research since 2012.
Works
Easy to use, fast, and secure
Pros and Cons
- "Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
- "The overall UI could be improved and updated to bring a simpler feel to the application."
What is our primary use case?
Primarily I use the product for work purposes. My work environment is currently remote, therefore, I tend to move between private and public networks pretty often. Having this solution for public networks is key in ensuring that you are staying secure while browsing or using work-related software or services. While working from home, people tend to travel and never realize that public networks are very insecure and they allow hackers to access information from your computer very easily, especially if you don't have a VPN service.
How has it helped my organization?
Perimeter 81 has increased my security and privacy while maintaining solid internet performance.
Without this software, I tend to always be concerned with security and privacy while browsing the web, however, when I'm using this software, I tend to feel more comfortable browsing knowing that I'm covered. It has made working from home feel more secure while not impacting computer performance.
Many other services that I've used heavily affect the overall performance of my computer, however Perimeter 81 doesn't affect it at all.
What is most valuable?
The Perimeter 81 VPN is fast and secure. It also is very easy to use, with a simple yet elegant UI. I like how this software will automatically turn on my VPN and connect whenever I hop on my machine. The Always On VPN really can't be beaten.
While I'm using this service, I never even notice that I'm using it (due to the overall performance of the program), which is really what you want when you're using a VPN. This has to be the most valuable part of this software, along with the user-friendly interface.
What needs improvement?
I don't think that this service can be improved. Speed and privacy could always be improved, however, the current product doesn't lack these criteria. I also think that the overall UI could be improved and updated to bring a simpler feel to the application, but again, the software doesn't truly lack in this category.
Aside from this, the service is really pleasant to use and I've never once had the thought of uninstalling the application. While it would be great to have the ability to move the location of the VPN, I don't think that this is required to increase the overall performance.
For how long have I used the solution?
I've used this solution for about two months.
What do I think about the stability of the solution?
I've gotten a great first impression in terms of stability.
What do I think about the scalability of the solution?
The scalability has given me a great first impression.
How are customer service and support?
I haven't had to reach out to support.
Which solution did I use previously and why did I switch?
I've used other services. That said, I didn't have a great experience with their UI and performance lacking abilities.
How was the initial setup?
The setup was a breeze.
What about the implementation team?
I'm not too sure if we had assistance or not.
What's my experience with pricing, setup cost, and licensing?
This service is very affordable and worth it for what you actually get out of the software.
Which other solutions did I evaluate?
I didn't look into other options before choosing this service, however, I don't think there is a need to at the moment.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
VP Engineering at Loris.ai
Affordable, secure, and allows me to manage all user access in one platform
Pros and Cons
- "Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
- "I would suggest adding more networking and security features that allow more customization within their platform."
What is our primary use case?
We are using Perimeter 81 for secure network connections while working remotely.
As my entire team is working remotely, we were looking for a simple and secure remote access solution and we went with Perimeter 81. So far, we have been super happy with Perimeter 81’s affordable and simple to manage solution.
We initially started to use Perimeter 81 for their networking features but recently we integrated their split-tunneling feature and their simple Google Authenticator two-factor authentication integration. Both features have been game-changers for us.
How has it helped my organization?
Simply, Perimeter 81 has allowed me to easily manage all our user access to my company’s networks in one platform.
Additionally, my employees can quickly connect to a reliable and more secure network connection while working outside the office. Instead of manually connecting to a VPN, all of my employees are automatically connected to Perimeter 81 when they open their computer or other company devices.
Since implementing Perimeter 81 we are seeing an increase in network performance and employee productivity.
What is most valuable?
Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution.
We were able to configure tunnels to our IP addresses for specific user access, including application access to any devices no matter their location. This has helped me make sure the right users are getting the right access to their work resources to do their daily job.
Also, I am very happy with their MFA feature. It was very easy to integrate with our two-factor authentication and simplified the authorization process for all of our employees to gain network access.
What needs improvement?
I would suggest adding more networking and security features that allow more customization within their platform.
So far, I am very happy with their simple network management platform. However, I feel such features as SD-WAN, Firewalls, and more real-time alerts would take this solution to the next level. By adding these networking and security features, it will allow me to customize my company's network security to the level I am seeking.
For how long have I used the solution?
I have been using Perimeter 81 for three months.
Which solution did I use previously and why did I switch?
We did not use another solution prior to Perimeter 81.
What's my experience with pricing, setup cost, and licensing?
Overall I am very happy with the solution’s flexibility and pricing. Very fair dissolution for the price I am paying.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Founder at BlockMosiac
Helps to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements
Pros and Cons
- "The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele."
- "While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures."
What is our primary use case?
We utilize cryptographic techniques, leveraging the tool's capabilities in Blockchain, to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements. Integrating Quantum-resilient technology into our decentralized enterprise framework ensures the security of our clients' sensitive data. This proactive approach protects client data from potential threats associated with Quantum computing.
How has it helped my organization?
The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele.
What needs improvement?
While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures. Exploring ways to streamline the integration process and optimize performance ensures a seamless experience for developers and users.
Additionally, fostering an open dialogue with the security community and staying attuned to emerging threats aids in identifying areas for improvement. Regular updates and patches to address vulnerabilities improve the tool's longevity and effectiveness.
What do I think about the stability of the solution?
I rate the product's stability an eight out of ten. While it is generally stable, occasional downtime issues arise, particularly during increased network workload or high server demand.
What do I think about the scalability of the solution?
I rate the tool's scalability a ten out of ten. My company has 1000 users.
How are customer service and support?
The technical support and customer service for enterprise clients have been very good. They guide the users to solutions with expertise and understanding of the issues.
How would you rate customer service and support?
Positive
How was the initial setup?
My leadership executed the tool's initial deployment with precision and efficiency. Our dedicated team ensured a seamless integration process with clear documentation and comprehensive training modules, facilitating the onboarding of our developers. Collaborating with top-tier experts from Check Point Quantum SASE contributed to a smooth implementation, with any potential challenges being proactively addressed.
As a result, the transition to these advanced security measures was carried out to minimize disruptions to ongoing operations. The overall deployment took two to three hours to complete.
What's my experience with pricing, setup cost, and licensing?
The product's pricing model accommodates diverse needs and deployment sizes. The licensing options include perpetual licenses, requiring a one-time fee for permanent feature access but excluding future updates, and subscription licenses, which grant customers access to the latest features through ongoing subscriptions.
What other advice do I have?
I rate the overall product an eight out of ten. Its implementation has been very effective, enhancing our organization's security and increasing client confidence. This improvement has led to a broader adoption of enterprise solutions, fostering extended partnerships and growing our user base. The increased market share and client adoption further highlight the substantial return on investment (ROI) derived from the strategic integration of Check Point Quantum SASE.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Information Security Manager at Adidas
Secure, with good support and an openness to constructive feedback
Pros and Cons
- "The Check Point portfolio showcases very strong products."
- "An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia."
What is our primary use case?
We are using the product to secure roaming users who work outside the office as well for protecting a variety of company locations.
It is great that Check Point continues to be a visionary in the network security market and delivers such anticipated products which allow users to cope with ongoing security challenges and trends.
It is used to protect offices and retail stores and it is a step forward from the traditional connectivity architecture which lacks flexibility and prevents business to advance at the desired pace.
How has it helped my organization?
It is great from an operational point of view. There is no need to procure and install HW; a new location could be secured almost instantly.
There is no need to talk about security. It comes from a team of talented developers and has a historic record. The Check Point portfolio showcases very strong products.
The support from Check Point's side is great as it always and allows you to understand the product, produce and secure design as well as deploy and test it. Furthermore, the product owners are actively looking for feedback. This allows you to express your opinion and shape the product to improve it according to your needs.
What is most valuable?
The product is great as it allows users to deliver the most security value at the fastest speed. It reduces an operational load in terms of provision, installation, management, patching, and hardware replacement by increasing uptime and reducing the time to deliver to market. It also provides cloud-native availability and allows you not to bother with the sizing and location capacity as long as you stick with Harmony Connect. The price is reasonable.
Last but not least, there is an option to manage Harmony Connect from the centralized management station which allows users to apply existing policies while having a single pane of glass for network security.
What needs improvement?
An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia. Some PoP locations might create complicated traffic flows and impact the latency and load on network infrastructure even further.
Advanced details of log information are missing. However, the Check Point team is definitely open to constructive advice and is happy to make any requested changes.
There are still some limitations that exist while using centralized management with Harmony Connect.
For how long have I used the solution?
I've used the solution for six months.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Operation Director at GLOBALIP
Provides a valuable multi-factor authentication functionality and an effective feature for controlling employee access to specific applications
Pros and Cons
- "Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process."
- "The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations."
What is our primary use case?
The platform manages remote access by allowing employees to log into a secure portal, where they are only given access to the specific applications they are authorized to use. This access is based on an HTTPS connection, ensuring security.
What is most valuable?
All product features are valuable, but multi-factor authentication (MFA) is especially critical for securing remote work environments. Without two-factor authentication, there is a heightened risk of security breaches.
Another key feature is the ability to control the time frame for employee access to applications, allowing for greater security and control.
What needs improvement?
The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations.
For how long have I used the solution?
I have been working with Check Point Quantum SASE for three years. Currently, I am providing it to three customers and implementing it for a fourth. My clients have used it for varying periods, from six months to two years.
What do I think about the stability of the solution?
The solution is very stable and requires minimal maintenance. Once configured and exposed through the portal, it generally does not present issues related to the security service itself.
What do I think about the scalability of the solution?
The product is designed to be scalable, particularly as a SASE (Secure Access Service Edge) product. Its architecture supports easy scaling and can handle increasing users without issues.
How are customer service and support?
The support is comprehensive, and the channel ecosystem effectively assists with resolving complex issues. I can escalate problems to Check Point's research and development teams for further assistance.
How would you rate customer service and support?
Positive
What was our ROI?
The return on investment typically depends on the size of the customer. Most customers find the solution's benefits outweigh the costs, and the return is usually balanced.
What's my experience with pricing, setup cost, and licensing?
The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users.
What other advice do I have?
The solution's cost-effectiveness depends on the size of the business and the specific problems it needs to address.
Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process.
It already comes with all the necessary features. When you purchase it, you get the full package. However, different levels of coverage are offered for endpoint solutions.
I rate it a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Last updated: Sep 13, 2024
Flag as inappropriateConsultant at ITQS
User-friendly, easy to install, and helps with monitoring
Pros and Cons
- "One of the most valuable features found using Harmony is being able to monitor in a simple and orderly way."
- "The support is not very good."
What is our primary use case?
It was implemented at work to be able to monitor collaborators and know what pages they are using and thus be able to take the necessary actions to block pages that are not authorized in the company and also know in which pages collaborators spend more time and be able to measure their work performance and thus be more effective in our company, on the other hand it helps a lot to improve the traffic and performance of the network, which is one of the points where it helps a lot.
Once all the security breaches of our collaborators have been detected, we can determine which options to mitigate in the company and improve security.
How has it helped my organization?
Harmony has improved the organization in being able to better monitor the use of internet bandwidth, accesses, pages, restrict pages, and allow sites, however, it has also been found that it makes machines a bit inefficient, this is because the program consumes many resources of the device where it is connected, sometimes causing slowness and starting to see many jams in the programs or processes that are being executed.
It has also been possible to determine that, for use on a Mac PC it is not very complicated to do the installation. You must have very robust equipment.
What is most valuable?
One of the most valuable features found using Harmony is being able to monitor in a simple and orderly way.
The panel configuration and agent installation on each of the machines is very practical and quickly distributed. Furthermore, all the equipment that does not have an agent installed can be viewed in the administration panel and have better control of each of the devices.
Another valuable characteristic is the configuration of reporting and information of each of the users. This report is quite complete, and it is possible to determine what actions to take in the organization and be able to present a report to high command.
What needs improvement?
One of the areas that must be improved is the ability to make the software less burdensome for the devices since they consume a lot of resources which makes it necessary to make an economic investment in the device itself such as servers, desktop laptops. that handle a relatively normal performance according to the functions it performs since, if used with a high-performance computer, Harmony behaves well and does not cause slowness.
This made us uninstall the product on several collaborating machines since the PC's performance dropped a lot. Some programs, like Teams, do not work and this causes us problems where we cannot monitor those machines.
For how long have I used the solution?
He used the product for 5 years.
What do I think about the stability of the solution?
The stability is very good, however, it harms a little of the performance of the PC.
What do I think about the scalability of the solution?
The scalability has been very good, it has helped us a lot to be able to improve our company.
How are customer service and support?
The support needs to improve lately it is very average they do not respond quickly they do not always comply with the SLA
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
Implementation is now easier since we have considerable experience using the tool.
What about the implementation team?
The installation was carried out with the tool vendor since we did not have much knowledge, today we have managed to have that learning curve and we have been able to do our own installations.
What was our ROI?
The investment in a security product will always have a return, not directly economical, but indirectly since all our information is secured.
What's my experience with pricing, setup cost, and licensing?
The cost is very accessible and the installation is very easy to implement.
Which other solutions did I evaluate?
We did not evaluate other options.
What other advice do I have?
It is very user-friendly. The panel is easy to use.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Firewalls Anti-Malware Tools Enterprise Infrastructure VPN ZTNA as a Service ZTNAPopular Comparisons
Prisma Access by Palo Alto Networks
Zscaler Zero Trust Exchange Platform
Cato SASE Cloud Platform
VMware VeloCloud SD-WAN
Akamai Enterprise Application Access
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?
- Why is Secure Access Service Edge (SASE) important for companies?