The primary use case has to do with the remote connectivity of sites.
Manager Cyber Security at a energy/utilities company with 5,001-10,000 employees
Is scalable, but integration from a management perspective needs improvement
Pros and Cons
- "The scalability is good, and I'd give it an eight out of ten."
- "The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."
What is our primary use case?
What is most valuable?
I have found the IPsec VPN to be valuable.
What needs improvement?
The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass.
I would like to see the use of either GRE or non-IP tunnels in the next release.
For how long have I used the solution?
I've been working with Harmony Connect for about 18 months. I tested it but did not run it in production.
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
February 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
What do I think about the stability of the solution?
Stability wise, I'd rate Harmony Connect at seven out of ten. It could be more stable in some respects.
What do I think about the scalability of the solution?
The scalability is good, and I'd give it an eight out of ten.
How are customer service and support?
I found the technical support to be okay. Most of the technical support was geared to the regular equipment, and we had to find specialists within Check Point to look at Harmony Connect. Because of that, I would give technical support a rating of seven out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup is simple in some ways but complex in other ways. You need to know a lot about the Check Point side and the portal side to make it work.
What's my experience with pricing, setup cost, and licensing?
I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either.
Which other solutions did I evaluate?
We evaluated Silver Peak. Comprehensiveness was the main difference between Harmony Connect and Silver Peak. Harmony Connect is a little more suited for smaller branch offices as opposed to full-site connectivity.
What other advice do I have?
Overall, I would rate this solution at seven on a scale from one to ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.

It replaces some older products and also adds features, like DLP (Data Loss Protection), and security gateway
Pros and Cons
- "The DRP is the most valuable feature."
- "My customers want more remote functionality. They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this."
What is our primary use case?
For the past two months, we have been evaluating Harmony Connect because it has some limitations on routing and account control, so we are testing it for three customers to check this function. In some areas, Harmony Connect can replace older VPN products and also add some features, like DRP and security gateway.
What is most valuable?
The DLP (Data Loss Protection) is the most valuable feature.
What needs improvement?
My customers want more remote functionality. They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this.
For how long have I used the solution?
This solution is new to Taiwan, so I haven't been using it for very long. I started using Harmony Connect in Q3 2022.
What do I think about the stability of the solution?
Harmony Connect has been stable so far, but this is still a test.
What do I think about the scalability of the solution?
There are some limitations on redundancy, and it takes about 30 minutes to switch. This is a significant limitation. Competitors like Palo Alto can do it in around five minutes. It's more appropriate for enterprises because they sell the product license in packages of 50 accounts at least.
How are customer service and support?
I rate Check Point customer service nine out of 10. It is excellent, especially on the customer side.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
Check Point Taiwan provides me with a lot of flexibility in pricing. If I'm trying to secure a customer, they can give me a good discount on this product. The price is about 350 HKD annually.
What other advice do I have?
I rate Check Point Harmony Connect eight out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
February 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Assosiate Vice President at Novac Technology Solutions
Great real-time phishing blocking, great zero-day sandboxing, and effectively minimizes threats
Pros and Cons
- "Overall, the unified agent covers endpoints as well as prevents web browser attacks."
- "Providing USB control in a Linux environment will give more control over data security."
What is our primary use case?
We use the solution as an endpoint protection platform, which supports the next-generation antivirus. It offers endpoint detection and response and will help on addressing a single agent that will support multiple features.
This helps IT Security operations front to minimize the security threats. Also, we can map the MITRE ATT&CK framework in a single dashboard which provides complete endpoint device visibility.
The solution offers runtime protection against ransomware, malware, and file-less attacks, with instant and full remediation features that give good insights into the organization's threat landscape.
How has it helped my organization?
The unified agent helps in addressing the system usage. Instead of installing different agents and real-time protection, the platform provides greater visibility to the operation team to see incidents in real-time, instead of creating a lot of false positives. The vaulted space features give more controls on signed processes. In case the malware attempts to perform a shadow copy deletion, the machine will not lose any data. We can also take a backup of the file.
Phishing protection gives good insights about credential theft and zero phishing.
Overall, the unified agent covers endpoints as well as prevents web browser attacks.
What is most valuable?
Phishing sites are blocked in real-time and protect against previously unknown phishing sites and corporate credential re-use. This will prevent the business end-user from being compromised by attacks.
Zero-day sandboxing is an additional feature that can provide greater visibility on the sandboxing end and gives more control on the threat front. We can sanitize the files if we want, using a threat extraction process with infected files that can be cleaned in the process and provides a safe environment.
What needs improvement?
The remote browser isolation is not part of the unified agent, as of now. It could protect more on threat intel sources and could give a broader view of threat hunting.
Soon, the unified agent should take more CPU processing in the systems-deployed Check Point agent.
Providing USB control in a Linux environment will give more control over data security. Few other OEMs provide Linux USB control. If Check Point could adopt the technology in near future, it would give more of a value add to existing customers.
For how long have I used the solution?
I've used the solution for more than six months. We are using the Check Point Harmony end point solution.
Which solution did I use previously and why did I switch?
We switched in order to avoid multiple agents.
What's my experience with pricing, setup cost, and licensing?
Pricing is purely based on their industry and company decisions.
Which other solutions did I evaluate?
We did look at the Sentinel product.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security IT at a tech services company with 51-200 employees
Excellent product - HC modern security tool
Pros and Cons
- "Protection against threats like ransomware is very effective."
- "Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us."
What is our primary use case?
This tool is of great help and allows us to provide security assistance to our users who work remotely. They connect from any site, secure or insecure, accessing applications and business email without protection as they are outside the company perimeter.
It gives us granular security through web control policies, reports, and monitoring. We manage to avoid user vulnerabilities from anywhere. It is managed with Harmony Connect in the Check Point Infinity Portal, a very good tool.
Users are quite happy with the applied security performance.
How has it helped my organization?
Check Point Harmony Connect has improved the protection of computers outside the office. It offers implementation that is simple.
Also, with the monitoring dashboard, we can make decisions to improve the control policies and web access so that we can better protect our teams.
This tool does not require being on the same network. Everything is verified thanks to a small Check Point protection agent that is installed on the client.
Protection against threats like ransomware is very effective.
What is most valuable?
We really liked the Check Point Harmony Connect tool and the monitoring, since we can make the right decisions thanks to the records observed in a simple way through the dashboard. The portal is really very intuitive.
The policies applied to users are quite granular, which helps a lot with the differential protection of users, generating managerial profiles and normal profiles efficiently.
We have also put VPNs into practice through harmony connect, having secure user connectivity. It is a very robust, modern, and secure tool.
What needs improvement?
They should include the ease of implementation or installation of the agent through an Excel list, where all the users can be loaded and added to be able to send the agent by mail.
I would also like it if they could include more documentation from the manufacturer to be able to implement it more efficiently and follow all the best practices.
Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us.
For how long have I used the solution?
We have been using this tool for approximately two years now. It is an excellent security tool to protect telecommuting users.
What do I think about the scalability of the solution?
This is an excellent cloud-managed Check Point tool; no server is required.
How are customer service and support?
Problems are always solved, however, with modern security applications, specifically those that are in the Check Point Infinity Portal, it is a little more difficult to solve with support.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We have not had a modern solution like this before. Check Point has innovated our processes.
What's my experience with pricing, setup cost, and licensing?
It is important to associate you company with a partner who can work with prices and documentation in order to find the security application that best suits the company's requirements.
Which other solutions did I evaluate?
Before acquiring any company-level security tool, we undertake the task of investigating several solutions. In this case, Check Point was the best.
What other advice do I have?
All Harmony solutions are excellent. I really recommend this option.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Harmony Connect has great functionality and protects against attacks
Pros and Cons
- "The monitoring and granular policies are very helpful."
- "In order to be able to invite users, send the agent and implement it, the user input must be generated manually."
What is our primary use case?
Check Point Harmony Connect is a modern security tool from the prestigious brand that helps us provide web filter or web gateway security to our employees, from the office or anywhere they can be covered with the security of this application.
It is a tool with great potential. It gave us access to security and user control to enhance productivity.
In the company, we are pleased with the functionalities and benefits provided by Check Point Harmony Connect. It is an excellent option and an excellent tool.
How has it helped my organization?
It helps us daily with access and restrictions due to business policies, generating access and restriction profiles, we have guaranteed greater productivity and better security for the institution's teams.
This has helped mitigate the latest attacks, malware, and even ransomware that are all too common these days.
Thanks to this tool, we managed to solve all these vulnerabilities quickly. It offers a clean implementation and a Check Point agent that does not cause any concern at the level of requirements on the server.
What is most valuable?
There are too many positive things that I could mention. Some of them are more impressive than others, however, the best include:
- The ease of implementation. It offers easy steps for the implementation of security tools, all through a web portal (Infinity Portal from Check Point).
- It has comfortable licensing. It adapts per user and really for all the functionalities they are of great value. It is worth implementing and acquiring.
- The monitoring and granular policies are very helpful. We can generate site blocking policies and specific applications for some user profiles. Monitoring is incredible. It helps decision-making and security improvements in an easy and intuitive way.
What needs improvement?
Check Point Harmony Connect has basic improvement areas, such as the following:
- In order to be able to invite users, send the agent and implement it, the user input must be generated manually. It would be easier if we could add them automatically via automation.
- The guides for some capabilities are limited or do not represent the reality of the application. It is difficult to find 100% reliable documentation. It is not always possible to perform all the steps due to some problems. Some manuals are not so intuitive.
For how long have I used the solution?
This is an excellent modern security application. From the web portal, it is easily accessible.
We've used it for more than a year and have been satisfied.
Which solution did I use previously and why did I switch?
We have not previously used such a complete tool.
What's my experience with pricing, setup cost, and licensing?
Finding a Check Point vendor or partner who can provide you with costs and advice on current tools is best.
Which other solutions did I evaluate?
We evaluated the requirements of the company. However, after seeing the different options we understood that Check Point is the best option on the market.
What other advice do I have?
I really liked this application. I would recommend it without hesitation.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Customer Success Manager at inSided B.V.
Helpful technical support with great single sign-on functionality and a seamless login experience
Pros and Cons
- "It helps to quickly get access to the pages I need."
- "Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."
What is our primary use case?
The solution provides access to our own environments. Our environments are usually restricted by IP from external access, so I cannot access it from a regular internet connection. I can with this product.
We also have a system in place that allows us to access to our own SSO login for our customer environments, without having to use individual logins for all of our customers. By doing so, we protect our customer environments from external public access, which is vital to our customers - especially in the onboarding phase of the lifecycle.
How has it helped my organization?
It helps to quickly get access to the pages I need.
The overall login experience is seamless and usually also has no issues. I rarely have to restart the service.
The service offers decent speed without interruptions, which allows me to work and focus without distractions or interruptions to what I am trying to achieve. This is reducing my work stress a lot as switching focus constantly has a negative impact on the quality of our products and services, which would affect our customer sentiment in a negative way.
What is most valuable?
The tool does offer a single sign-on for businesses. This means that I no longer have to remember a separate, individual password for this tool. Other tools require that, which is a big downside as I used to have to retrieve this password from my mails every time that I attempted to perform a login to the service.
With single sign-on, the system will automatically detect who I am and which organization I belong to. This speeds up the process and even a restart of the system will not require me to lose time.
What needs improvement?
There is not much to improve.
Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily. This could also be solved, however, this issue might be related to the way in which we have set up our current implementation of this service. This does not have to be a global shortcoming when using this service.
For how long have I used the solution?
We've used the solution for about two years.
What do I think about the stability of the solution?
The product is very stable so far. We have been connected for 36 hours without issue.
What do I think about the scalability of the solution?
The solution is very scalable; it is easy to add more seats.
How are customer service and support?
Support was quick and able to help with my query.
How would you rate customer service and support?
Positive
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Software Engineer at Peristent Systems
A user-friendly solution with easy maintenance, but complex for new users
What is most valuable?
The solution’s UI is more user-friendly and has more functions.
What needs improvement?
The solution is very complicated for new people. The solution could add more connectors.
For how long have I used the solution?
I have been using Perimeter 81 for two months.
What do I think about the stability of the solution?
The product is stable.
What do I think about the scalability of the solution?
The solution is scalable. Around 30-40 users are using this solution.
How was the initial setup?
The initial setup is easy. We must first install it on a machine and then access the connection for deployment. If you go with the standard setup, it won’t take much time, but with a database, it takes some time.
What's my experience with pricing, setup cost, and licensing?
The solution is expensive.
What other advice do I have?
The solution’s maintenance is easy. Since the data collector is free, they don’t provide any support. Web filtering is paid, so they provide support for it.
Before you go with the solution, ensure to check the certificate.
Overall, I rate the solution a seven out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer at Down To Earth Technologies Ltd.
The product protects organizations from phishing and malware, but the support team takes time to respond to queries
Pros and Cons
- "The product’s ability to block phishing sites is valuable."
- "Sometimes, the product is very slow."
What is our primary use case?
I'm using the solution on my laptop and desktop in the office.
What is most valuable?
The product’s ability to block phishing sites is valuable. It protects me from malware.
What needs improvement?
The product is a bit heavy on the machine. Sometimes, the product is very slow. When we connect an external hard disk, it takes the product quite some time to go through the files and allow us to access them.
For how long have I used the solution?
I have been using the solution for more than six months.
What do I think about the stability of the solution?
I rate the tool’s stability a seven out of ten.
What do I think about the scalability of the solution?
The tool is quite scalable. We have around eight users.
How are customer service and support?
We have had a couple of issues for which we contacted the technical support team. It takes long for the team to respond. It takes some time before the initial point of contact, but after that, it is fine.
How would you rate customer service and support?
Neutral
How was the initial setup?
The deployment is quite easy and fast. I rate the ease of deployment an eight out of ten. The solution is deployed on the cloud. The deployment took us an hour.
What's my experience with pricing, setup cost, and licensing?
The product is neither cheap nor expensive. However, it is a bit more on the expensive side. I rate the pricing a seven out of ten.
What other advice do I have?
People who want to use the solution must start with the minimal features possible and scale up slowly, depending on how it interacts with their system. Overall, I rate the tool a seven and a half out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Firewalls Anti-Malware Tools Enterprise Infrastructure VPN ZTNA as a Service ZTNAPopular Comparisons
Prisma Access by Palo Alto Networks
Zscaler Zero Trust Exchange Platform
Cato SASE Cloud Platform
VMware VeloCloud SD-WAN
Akamai Enterprise Application Access
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?
- Why is Secure Access Service Edge (SASE) important for companies?