My production environment today is hybrid and I use several cloud solutions and more than one on-premise data center. The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment. It does all this with an additional gain of the possibility of auditing some accesses to the environment.
Senior Network Administrator at eSales Solutions
Reasonably priced with an easy initial setup and great centralization capabilities
Pros and Cons
- "The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment."
- "As it is a new market solution, I still face some instabilities in access at certain times of the day when I have more than 150 users using it simultaneously."
What is our primary use case?
What needs improvement?
As it is a new market solution, I still face some instabilities in access at certain times of the day when I have more than 150 users using it simultaneously. It would be interesting for the solution to have something that monitors and scales more resources by itself so that these instabilities do not occur.
Another problem faced is that, regarding the audit, native RDP sessions, as well as the database, are not recorded and it is not possible to audit the use by the collaborators.
These two points would be important for the evolution of the tool.
For how long have I used the solution?
I've used the solution for just over two years.
What do I think about the stability of the solution?
As mentioned, some improvements are needed in regard to stability.
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
March 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,767 professionals have used our research since 2012.
What do I think about the scalability of the solution?
It is a solution that is meeting expectations well - even though there are some points to improve.
How are customer service and support?
Technical support is a little slow most of the time.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Previously I used a VPN solution. I changed it for ease of management and centralization of access.
How was the initial setup?
The initial setup was simple.
What about the implementation team?
The implementation was executed using a hybrid form.
What was our ROI?
ROI hasn't been calculated yet.
What's my experience with pricing, setup cost, and licensing?
Values are within market expectations.
Which other solutions did I evaluate?
I haven't considered other options.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Sr. IT Network & Security Manager at Cloud Seven Trading and Contracting Co.
Good pricing, easy to use, and very secure
Pros and Cons
- "The integration that this solution has with the different routers or perimeter equipment is exceptional."
- "The suspend feature needs more control."
What is our primary use case?
We are using Harmony Connect (clientless and client) with Harmony Mobile, Harmony End Point, Harmony Office security.
Before we were using Fortinet Client with Token and we are now using Harmony Connect in Saudi Arabia.
We use Check Point for application control, IPS, and web filter on-premises and wanted an in-kind solution for off-prem users. The primary requirement was for the Harmony policy to be able to be managed from the same SmartConsole instance as our on-premises gateways are managed.
How has it helped my organization?
The solution is secure, scalable, and easy to handle with good support
The Check Point portfolio showcases very strong products.
It very easily allows users to leverage their home office via safe access. If they had any type of issue with the machine, the disk is already encrypted.
The client's requirements were that the solution could:
- Be designed to prevent the most evasive cyberattacks
- Have Zero-Trust network access to enterprise applications
- Secure Internet access for remote users
- Protect branch office (SD-WAN) connections to the Internet and the cloud
What is most valuable?
Harmony Connect Client is very powerful tool.
I find it very easy to implement and deploy in the organization. One point to note is that it is a very user-centric solution.
The integration that this solution has with the different routers or perimeter equipment is exceptional. We were able to implement the solution on the same hardware as the SD-WAN equipment in each branch and central site.
Mainly, Zero Trust Network Access is one of the most important features of this Check Point Harmony Connect solution. It's of the Secure Access Service Edge (SASE) type since it gives us secure access to the organization as if we were physically in the organization.
What needs improvement?
The suspend feature needs more control.
Zero Trust Network Access can be a security breach if not used correctly. I have implemented it and it turns out that access to the organization's applications must be complemented with user awareness.
It is important to note that the Zero Trust Network Access feature is an important feature for the solution, however, at the same time, the organization's applications can be accessed if user access is available. A double authentication factor could solve this gap.
For how long have I used the solution?
I've been using the solution for one year.
Which solution did I use previously and why did I switch?
We were using Fortinet Client Token Solution. We switched as CP gives more control and visibility.
What's my experience with pricing, setup cost, and licensing?
The tool is very handy at a good price.
Which other solutions did I evaluate?
We did not look at other options.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
March 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,767 professionals have used our research since 2012.
Senior Security Architect at a energy/utilities company with 1,001-5,000 employees
Great anti-phishing, anti-bot, and URL filtering features
Pros and Cons
- "The solution has many valuable aspects, including anti-Phishing, which blocks phishing attacks in all applications (email, messaging, and social networks)."
- "The product needs to work on the integration of alerts with different SIEM or security solutions."
What is our primary use case?
The development of mobile devices and wireless technologies in recent years has revolutionized the way people work and communicate. The growing use of these technologies makes mobile devices one of the main targets of cyber threats.
The proliferation of mobile devices in recent years, together with the increase in their capabilities, features, and possibilities of use, makes it necessary to evaluate in-depth the security offered by this type of device. On top of that, the mechanisms for protecting the information they manage, within the Information and communications technology environments are key.
How has it helped my organization?
Harmony Mobile has enabled us to provide the necessary information for the evaluation and analysis of the risks, threats, and security vulnerabilities to which mobile devices are currently exposed, as well as the technology used to address these risks.
In addition, the document presents a list of general security recommendations aimed at protecting mobile devices, their communications and the information and data they manage and store.
We are using malicious application detection to identify known and unknown threats through threat emulation, advanced static code analysis, application reputation, and machine learning. The solution captures apps as they are downloaded to devices and runs them in a cloud-based virtual environment to analyze how safe they are.
What is most valuable?
The solution has many valuable aspects, including:
Anti-Phishing, which blocks phishing attacks in all applications (email, messaging, and social networks).
Safe Browsing, which blocks access to malicious sites in all browsers based on dynamic security intelligence provided by Check Point ThreatCloudTM, the world's largest threat database.
Conditional Access, which blocks infected devices from accessing corporate applications and data, regardless of UEM solutions.
Anti-Bot, which detects bot-infected devices and automatically blocks their communication with command and control (C&C) servers.
URL filtering, which prevents access to websites deemed inappropriate by an organization's corporate policies. It allows companies to blacklist and whitelist websites at a granular level of detail, and to enforce policies on mobile devices across all browser applications as well as non-browser-specific applications.
Wi-Fi network security, which detects malicious network behavior and man-in-the-middle attacks and automatically disables connections to malicious networks.
What needs improvement?
The product needs to work on the integration of alerts with different SIEM or security solutions. Harmony provides visibility of device security, yet, precisely due to the growth of attacks and threats on these technologies, it is important to integrate the information it generates with the rest of the intelligence handled by cybersecurity areas.
In the same vein, it would be important to have detailed information on the type of threats and new intelligence that the platform is providing, so that it is easy to alert users when it provides value.
For how long have I used the solution?
I've used the solution for one year.
How are customer service and support?
The solution offers excellent support service.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a different solution. Instead, we were just using an MDM solution but although we can make configurations oriented to protect the devices, it is far from being a complete solution like Harmony.
How was the initial setup?
The initial setup is easy.
What about the implementation team?
We handled the implementation in-house.
What's my experience with pricing, setup cost, and licensing?
I'd advise a potential new user to talk with their account manager.
Which other solutions did I evaluate?
We also evaluated McAfee and Cortex, but Harmony fixes better with my company requisites in order to run in background for end user.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Associate IT Engineer at Qualco
Great anti-malware scans with excellent disk encryption but it's difficult to install the Check Point client
Pros and Cons
- "Using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials."
- "There is an issue when installing the Check Point client."
What is our primary use case?
We are using Check Point Endpoint Security as an application for all corporate users.
The main features are antivirus (antimalware, antiphishing), disk preboot encryption, and VPN connection. We also use SSL VPN (a VPN connection using a browser) for our external partners.
We have about 250 active machines (both desktops and laptops), running Windows 10 Pro 64bit, an i5 or i7 processor with 8GB RAM or more, and SSD drives (all Dell hardware). The Check Point client we use is version E86.10.0036.
We also have Check Point firewalls.
How has it helped my organization?
The disk encryption made our computers more secure for data leaks in the case of a stolen machine.
The Check Point VPN connection is way more stable than our previous software. Previously, when connecting/disconnecting from a VPN while we were on a call, the network would temporarily drop and then reconnect again. Using Check Point's VPN, this does not happen anymore.
Also, using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials.
Anti-malware scans are also very helpful.
What is most valuable?
The preboot VPN connection, in the case where users are locked remotely. is very useful
The disk encryption feature is important. The Check Point VPN connection process is quite simple when using the Microsoft MFA method.
Previously, when connecting/disconnecting from a VPN while we were on a call, the network would temporarily drop and then reconnect again. Using Check Point VPN, this does not happen anymore.
Also, using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials.
The anti-malware scan is very helpful.
The SSL VPN is great where we can use a browser for external partners.
What needs improvement?
There is an issue when installing the Check Point client. If the machine has RAID on mode for storage rather than AHCI, the disk encryption never begins and stays in the "setup protection" warning message. Changing mode from RAID to AHCI means a Windows format is required, which takes more time. On top of that, in the preboot screen, sometimes caps lock is on, and yet when someone types it's not in capitals. When that happens, many users get locked.
In addition to this, number lock should be automatically on as users think it is, and when they type they get locked again.
What do I think about the stability of the solution?
The solution is quite stable. There are minor bugs.
What do I think about the scalability of the solution?
The solution is pretty flexible.
Which solution did I use previously and why did I switch?
We did use a different solution. It was not our decision to switch (as it's managed by a group IT).
How was the initial setup?
I was not included in initial setup. The client setup on machines is easy.
What was our ROI?
We do not have any ROI details.
What's my experience with pricing, setup cost, and licensing?
Data is not available in terms of pricing.
Which other solutions did I evaluate?
Evaluations were not included in the process.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Project Management and Deployment Team Leader at Sefisa
User-friendly, easy to implement, and offers excellent integration capabilities
Pros and Cons
- "I find it very easy to implement and deploy in the organization."
- "Zero Trust Network Access can be a security breach if not used correctly."
What is our primary use case?
We needed to connect the branches with the users, and, in turn, we needed to connect the users with the applications of the organization. However, we needed to secure this connection since the users were at home. The branches had Citrix SD-WAN and therefore we needed a solution that would integrate with the current solution that connected the branches to the central site.
The client's requirements were that the solution could:
- Be designed to prevent the most evasive cyberattacks
- Have Zero-Trust network access to enterprise applications
- Secure Internet access for remote users
- Protect branch office (SD-WAN) connections to the Internet and the cloud
How has it helped my organization?
I have worked with Check Point Harmony Connect, which is a Secure Access Service Edge (SASE) solution, which unifies multiple cloud-delivered network security products to prevent sophisticated cyberattacks and simplify policy management.
I find it very easy to implement and deploy in the organization. One point to note is that it is a very user-centric solution.
The integration that this solution has with the different routers or perimeter equipment is exceptional. We were able to implement the solution on the same hardware as the SD-WAN equipment in each branch and central site.
What is most valuable?
One point to keep in mind is that it is a user-centric solution.
Additionally, the solution has an integration with Citrix SD-WAN that allows a remote implementation in each of the branches.
Mainly, Zero Trust Network Access is one of the most important features of this Check Point Harmony Connect solution. It's of the Secure Access Service Edge (SASE) type since it gives us secure access to the organization as if we were physically in the organization.
I find it very easy to implement and deploy in the organization.
What needs improvement?
A ZTNA architecture is designed to reduce cybersecurity risk by eliminating implicit trust within an organization's IT infrastructure.
Zero Trust Network Access can be a security breach if not used correctly. I have implemented it and it turns out that access to the organization's applications must be complemented with user awareness.
It is important to note that the Zero Trust Network Access feature is an important feature for the solution, however, at the same time, the organization's applications can be accessed if user access is available. A double authentication factor could solve this gap.
For how long have I used the solution?
I've been using the solution for almost two years.
What do I think about the stability of the solution?
Check Point Harmony Connect is quite stable in the implementation I did together with Citrix SD-WAN.
Citrix SD-WAN appliances are SDN/NFV-ready platforms designed to host virtualized network functions (VNFs).
Hosting a Check Point virtual machine (VM) on Citrix SD-WAN branch appliances provides customers with granular control of their security and data.
Together, the integrated SD-WAN and advanced Threat Prevention platform provide secure and optimized WAN connectivity over Internet links and WAN connections. By dramatically simplifying deployments and reducing costs, Check Point and Citrix SD-WAN provide enterprises with an affordable and secure remote branch office security solution.
What do I think about the scalability of the solution?
I find it very easy to implement and deploy in the organization.
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
What's my experience with pricing, setup cost, and licensing?
This is a SaaS. For this reason, the cost, pricing, and licensing depend according to your necessity.
Which other solutions did I evaluate?
I also looked into Forcepoint SASE.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Solution Archietect at Roost
A stable solution that offers good technical support along with great scalability options
Pros and Cons
- "It is a very stable solution."
- "The complex initial setup phase of the product is an area that can be improved"
What is our primary use case?
My company integrates the solution into other companies where we are required to do a project for them per the requirements. I had the opportunity to suggest Check Point Harmony Connect two years ago at the Bank of Brazil.
What is most valuable?
The most valuable features of the solution vary and depend on what our company does. For example, I may work with a big water distribution project where everything revolves around IoT. In general, I can say that everything depends on the type of project where I need to be working as an architect.
What needs improvement?
In our organization, we use two managed SaaS products or technology at a time when everything appears to be moving to the cloud, and we still work with tools like Check Point Harmony Connect that require a license since the problem related to the product lies in the licensing part, the aforementioned details should be considered to improve the product.
The complex initial setup phase of the product is an area that can be improved.
For how long have I used the solution?
I have experience with Check Point Harmony Connect.
What do I think about the stability of the solution?
It is a very stable solution.
What do I think about the scalability of the solution?
It is a scalable solution since the SaaS licensing part of the solution is by the number of users and not by the number of assets or people or everything you need to manage it.
How are customer service and support?
My company provides customer support. We have an operations center with all the tools to provide the necessary support to our clients. I remember that the technical team from Check Point was very supportive when I was working with the Bank of Brazil. I rate the technical support a nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup of Check Point Harmony Connect was very complex and complicated since our company had to integrate 17 different applications into one console.
What other advice do I have?
I rate the overall product a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Easy to implement in branch and main office.
Pros and Cons
- "The application control and granular access feature are very easy to use, intuitive, and effective."
- "They could improve on the available public documentation."
What is our primary use case?
It provided us with the way to provide governance, control and monitoring of the visited sites, see vulnerabilities and find out how to deal with them in order to avoid cyber attacks.
With this tool, we can guarantee that the equipment will not be an easy target for cybercriminals. It is really simple to implement.
How has it helped my organization?
Checkpoint Harmony Connect helped us to guarantee the protection of equipment not covered by a Check Point Gateway. For example, when a vendor goes out and connects to the network from anywhere or is the target of cyber attacks (which can generate a loss of equipment functionality in addition to infiltrations or loss of company information that is confidential) which is why we decided to use this tool. It generated everything that was needed at the security level. It is an excellent tool.
What is most valuable?
The most valued features for us are:
The ease of implementation, of installation in the equipment, and the low performance of the equipment that the agent requires to provide security.
Its administration through a portal. Infinity Portal does not need to be implemented in an additional management server; rather, it is web-based and manageable from anywhere.
The application control and granular access feature are very easy to use, intuitive, and effective. It does not require equipment updates, policies are updated quickly.
What needs improvement?
They could improve on the available public documentation. The most modern applications or features of Check Point are difficult to find in their documentation for implementation. According to the manufacturer, sometimes it happens that the manual is applied, yet the desired implementation is not achieved.
Also, as seen in our support cases, it is somewhat slow to solve problems. There are other manufacturers that have better support. They can improve on that part and prevent customers from complaining about how they provide solutions.
For how long have I used the solution?
We have used this tool for about two years.
It is an excellent security tool that provides additional features to our existing GWs. We can provide web security with it.
Which solution did I use previously and why did I switch?
We had not really used other tools; when we had the need, we investigated, and we found Check Point Harmony Connect.
What's my experience with pricing, setup cost, and licensing?
The cost is difficult to find, however, our seller can solve these issues. The cost is normal. It is per protected user.
Which other solutions did I evaluate?
We validated some security solutions, however, Check Point Harmony Connect was perfectly suited to what we needed.
What other advice do I have?
It's a very modern tool and can be used to achieve security for old and new vulnerabilities.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Manager Cyber Security at a energy/utilities company with 5,001-10,000 employees
Is scalable, but integration from a management perspective needs improvement
Pros and Cons
- "The scalability is good, and I'd give it an eight out of ten."
- "The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."
What is our primary use case?
The primary use case has to do with the remote connectivity of sites.
What is most valuable?
I have found the IPsec VPN to be valuable.
What needs improvement?
The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass.
I would like to see the use of either GRE or non-IP tunnels in the next release.
For how long have I used the solution?
I've been working with Harmony Connect for about 18 months. I tested it but did not run it in production.
What do I think about the stability of the solution?
Stability wise, I'd rate Harmony Connect at seven out of ten. It could be more stable in some respects.
What do I think about the scalability of the solution?
The scalability is good, and I'd give it an eight out of ten.
How are customer service and support?
I found the technical support to be okay. Most of the technical support was geared to the regular equipment, and we had to find specialists within Check Point to look at Harmony Connect. Because of that, I would give technical support a rating of seven out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup is simple in some ways but complex in other ways. You need to know a lot about the Check Point side and the portal side to make it work.
What's my experience with pricing, setup cost, and licensing?
I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either.
Which other solutions did I evaluate?
We evaluated Silver Peak. Comprehensiveness was the main difference between Harmony Connect and Silver Peak. Harmony Connect is a little more suited for smaller branch offices as opposed to full-site connectivity.
What other advice do I have?
Overall, I would rate this solution at seven on a scale from one to ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Firewalls Anti-Malware Tools Enterprise Infrastructure VPN ZTNA as a Service ZTNAPopular Comparisons
Prisma Access by Palo Alto Networks
Zscaler Zero Trust Exchange Platform
Cato SASE Cloud Platform
VMware VeloCloud SD-WAN
Akamai Enterprise Application Access
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?
- Why is Secure Access Service Edge (SASE) important for companies?