I'm using the solution on my laptop and desktop in the office.
Security Engineer at Down To Earth Technologies Ltd.
The product protects organizations from phishing and malware, but the support team takes time to respond to queries
Pros and Cons
- "The product’s ability to block phishing sites is valuable."
- "Sometimes, the product is very slow."
What is our primary use case?
What is most valuable?
The product’s ability to block phishing sites is valuable. It protects me from malware.
What needs improvement?
The product is a bit heavy on the machine. Sometimes, the product is very slow. When we connect an external hard disk, it takes the product quite some time to go through the files and allow us to access them.
For how long have I used the solution?
I have been using the solution for more than six months.
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
March 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,672 professionals have used our research since 2012.
What do I think about the stability of the solution?
I rate the tool’s stability a seven out of ten.
What do I think about the scalability of the solution?
The tool is quite scalable. We have around eight users.
How are customer service and support?
We have had a couple of issues for which we contacted the technical support team. It takes long for the team to respond. It takes some time before the initial point of contact, but after that, it is fine.
How would you rate customer service and support?
Neutral
How was the initial setup?
The deployment is quite easy and fast. I rate the ease of deployment an eight out of ten. The solution is deployed on the cloud. The deployment took us an hour.
What's my experience with pricing, setup cost, and licensing?
The product is neither cheap nor expensive. However, it is a bit more on the expensive side. I rate the pricing a seven out of ten.
What other advice do I have?
People who want to use the solution must start with the minimal features possible and scale up slowly, depending on how it interacts with their system. Overall, I rate the tool a seven and a half out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Presales Consultant Cybersecurity at ZONES PVT LTD
It efficiently provides network security and implementation of multicast authentication
Pros and Cons
- "It is a scalable solution."
- "Its initial setup process is complex for a hybrid environment."
What is our primary use case?
Our customers use the solution to segment and secure traffic for internal and external users.
What is most valuable?
The solution works best for user security, implementation of multicast authentication, and zero trust access.
What needs improvement?
The solution could be more user-friendly for managing dashboard consoles.
For how long have I used the solution?
We have been using the solution for nine years.
What do I think about the stability of the solution?
It is a stable solution.
What do I think about the scalability of the solution?
It is a scalable solution.
How was the initial setup?
The solution's initial setup process is complex for a hybrid environment. We face difficulties in establishing a VPN tunnel between the servers of two branches. The virtual firewall protection makes it challenging to connect them. The time taken for deployment depends on the integration. In general, the process gets completed within four to five days.
What about the implementation team?
Our developers work with customers' development teams while implementing the solution.
What's my experience with pricing, setup cost, and licensing?
The cost of the solution's licenses depends on the particular use cases of the customers.
What other advice do I have?
I rate the solution as an eight.
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
March 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,672 professionals have used our research since 2012.
Information Security Analyst at SCANSEC
Allow control of internet access and file downloads while offering good security
Pros and Cons
- "Now that we use Harmony Connect, the files are inspected and we are sure that no malicious content is inside the company."
- "The access to the portal should be faster. It shouldn't crash a lot."
What is our primary use case?
Even with our old anti-virus solution, users were able to download files and receive it through e-mail with no inspection or emulation. Also, they were able to use external pen drives or external HDs with no control of the data that was being transferred and where it was going to.
The internet navigation had no filter and even the traffic to porn websites or malicious websites was passing normally with no inspection.
If one of the machines were stolen or lost we did not have something to block access to the data inside the disk, sensitive information could have been lost.
How has it helped my organization?
Now that we use Harmony Connect, the files are inspected and we are sure that no malicious content is inside the company. Before installing Harmony Connect all the downloads were made by anyone with no check on that information.
Anyone could download something malicious and as we use shared folders with sensitive information one infected machine could go to any other server or user machine and cause a big data loss or machine infection.
Now, it very easily allows users on home office safe access. If they had any type of issue with the machine, the disk is already encrypted.
What is most valuable?
Emulation of files, control of USB connections, and full disk encryption are great features. Due to the coronavirus pandemic, we were not confident in having everybody working from home with an unsecured system where the user could, for example, copy all data from the computer to an external HD or Pendrive. if they did, we would not even know that it happened.
Now, after using the Harmony Connect Endpoint, we have full control of the actions that the user does with the company data and we can also monitor/block their access to the internet.
What needs improvement?
We have noticed that sometimes even performing just a few changes in the portal, the installation takes a long time to finish.
The access to the portal should be faster. It shouldn't crash a lot. We have a lot of crashes right now.
We noticed that, for some days of the month, the portal would be down and not accessible depending on the time that we tested. Sometimes we performed some changes after work or at dawn to minimize the impact that it could cause to the users. However, sometimes the portal is not online as we expect it to be or we need to reload the page a few times before it works.
I would give it a score of eight out of ten due to the portal being slow.
For how long have I used the solution?
I've been using the product for about six months.
What do I think about the stability of the solution?
The stability is not that good; sometimes the portal fails.
What do I think about the scalability of the solution?
In terms of scalability, it's easy to increase the users/licenses in the environment.
How are customer service and support?
Check Point support takes a long time to resolve issues.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used the Kaspersky antivirus.
How was the initial setup?
The initial setup was not straightforward.
What about the implementation team?
We had a vendor assist with the implementation and we had a very good experience.
What was our ROI?
We have seen an ROI.
What's my experience with pricing, setup cost, and licensing?
Usually, other products are cheaper than Check Point.
Which other solutions did I evaluate?
We evaluated all other antivirus/endpoint sollutions.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Firewalls Anti-Malware Tools Enterprise Infrastructure VPN ZTNA as a Service ZTNAPopular Comparisons
Prisma Access by Palo Alto Networks
Zscaler Zero Trust Exchange Platform
Cato SASE Cloud Platform
VMware VeloCloud SD-WAN
Akamai Enterprise Application Access
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?
- Why is Secure Access Service Edge (SASE) important for companies?