Try our new research platform with insights from 80,000+ expert users

Axis Security vs Check Point Harmony SASE (formerly Perimeter 81) comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 24, 2024
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
13th
Ranking in ZTNA as a Service
12th
Ranking in Secure Access Service Edge (SASE)
10th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
14
Ranking in other categories
Internet Security (4th), Web Content Filtering (4th), Cloud Access Security Brokers (CASB) (8th)
Axis Security
Ranking in Secure Web Gateways (SWG)
21st
Ranking in ZTNA as a Service
13th
Ranking in Secure Access Service Edge (SASE)
13th
Average Rating
9.6
Reviews Sentiment
7.7
Number of Reviews
5
Ranking in other categories
Cloud Access Security Brokers (CASB) (10th)
Check Point Harmony SASE (f...
Ranking in Secure Web Gateways (SWG)
5th
Ranking in ZTNA as a Service
4th
Ranking in Secure Access Service Edge (SASE)
6th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
57
Ranking in other categories
Firewalls (13th), Anti-Malware Tools (8th), Enterprise Infrastructure VPN (7th), ZTNA (3rd)
 

Mindshare comparison

As of December 2024, in the Secure Access Service Edge (SASE) category, the mindshare of iboss is 1.7%, up from 1.7% compared to the previous year. The mindshare of Axis Security is 2.3%, up from 1.4% compared to the previous year. The mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 4.1%, down from 5.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Access Service Edge (SASE)
 

Featured Reviews

Jack Hamm - PeerSpot reviewer
We experienced benefits immediately but the report generation is lagging
iboss excels on the networking side but lags slightly behind competitors like Zscaler and Netskope in terms of security feature parity. I'd like to see them accelerate development on the security side, particularly around data loss prevention. Using iboss for DLP instead of traditional endpoint solutions is preferable, but its current feature set requires some clunky workarounds. I'd also like to see better integration of DLP into the platform. Additionally, while it's improving, reporting can be slow at times. This is problematic when generating reports for executives who expect them immediately. I'd like to see further improvements in reporting speed and efficiency.
Robert Oglesbee - PeerSpot reviewer
Easy to deploy, improved reliability and performance of our connectivity, and greatly reduced costs
Atmos is good for securing infrastructure from end to end, detection and remediation of threats, but there may be a few features that could be added to make it a little easier for networking and security folks to analyze the traffic. There are bad actors out there and they may or may not show up through the tool. That's something they can add. They need to improve the networking and security tools a little in the troubleshooting and "bad-actor" areas to help us analyze security threats a little better. They have some things built in, but I would like to see more advanced tools. There are major vendors out there, and if you use their VPN connection that's not going to help you without buying one of their other products. So that's a similar type of situation. However, they do give you a little more bang for the buck when it comes to monitoring. So I can see an improvement there, in Atmos, in the future.
Daniel Goldfeld - PeerSpot reviewer
Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions
The platform still lacks relevant dashboards and the ability to customize them based on our needs. We would love to also see real-time usage and traffic data as well as be able to build reports. Adding better QoS and traffic shaping to the product will be a nice add-on as it'll allow our admins to prioritize some traffic over others and identify users that are heavy traffic users in the platform. We need the ability to connect the agent prior to computer login. The ability to allow a silent connection (i.e. the agent is completely invisible to the user) could be cool for bigger organizations.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"iboss is easy to use despite its complexity. Multiple engineers manage it, but it's significantly more straightforward to administer than traditional VPNs and web proxies."
"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"It was a very easy product to install. It can be deployed very fast."
"Technical support is pretty sharp and very responsive."
"Granular setup, which was able to set different levels of filters using the OUs in the AD."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can connect to the network. T"
"The way the access connectors work is valuable."
"The most valuable part so far has been Axis Security's ability to create identity connections to various servers, allowing users to access them. By doing so, we've managed to replace any old or existing VPN access with Axis Security. We are slowly but surely getting rid of our traditional VPN."
"I would give it an A-plus for securing access to our applications, devices, and network. It does an extremely good job. Our security folks have analyzed it and tried to find loopholes, but they found none."
"The entire suite and the entire ZTNA process are very valuable."
"Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.)."
"Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
"The reports give a simple overview of the traffic pattern within the organization."
"The product has a reasonably high pricing."
"Even after restarting, it tries to quickly reestablish connection which is very helpful."
"The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
"The solution offers ATP features and management features."
"It has provided a seamless gateway to much-needed platforms."
 

Cons

"File integrity monitoring would be very advantageous as an additional feature."
"The dashboards for local use could be better."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"The reporting feature needs improvement. It doesn't give you the expected results. It is quite difficult to get the specific reports needed, and it is not as intuitive as the rest of the platform."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"The reporting feature needs improvement."
"They need to improve the networking and security tools a little in the troubleshooting and 'bad-actor' areas to help us analyze security threats a little better. They have some things built-in, but I would like to see more advanced tools."
"I would like more statistics about what's going on in terms of usage. There is little-to-no usage reporting. That's one thing we've requested, and I think they're working on it."
"The support team should be more skilled in offering assistance."
"I would like more detailed logging in the Axis Security interface."
"I would appreciate more automated learning capabilities or increased integration with other security tools, allowing us to establish automation."
"I don't know if it is technically feasible, however, if the Desktop App could be used as a Web App or a Chrome Extension it would be very nice."
"What would be useful would be a notification/warning that a session is due to timeout after exceeding the default connection limit."
"The complex initial setup phase of the product is an area that can be improved"
"In order to be able to invite users, send the agent and implement it, the user input must be generated manually."
"One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."
"The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations."
"The overall UI could be improved and updated to bring a simpler feel to the application."
"The suspend feature needs more control."
 

Pricing and Cost Advice

"It is expensive compared to one of its competitors."
"It is probably in line with other solutions, but I do not deal with the financial side."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The overall pricing for iboss is very competitive and transparent."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The pricing is very competitive from what I've seen."
"The pricing is quite fair. It's better than what we gave up, which was Cisco AnyConnect."
"Regarding pricing, I can say that the more the number of users, the less they have to pay."
"Annual licenses cost $30 to $40 each."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
"Overall I am very happy with the solution’s flexibility and pricing."
"The cost of the solution's licenses depends on the particular use cases."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
824,129 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
9%
Government
6%
Computer Software Company
16%
Educational Organization
14%
Retailer
7%
Manufacturing Company
6%
Computer Software Company
20%
Financial Services Firm
6%
Manufacturing Company
6%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
I have the same complaint about them that I have about other software companies. Sometimes when you call in support, ...
What is your primary use case for iboss?
We are a PreK-12 public school district, and we use iboss to filter internet content for our students at home and sta...
What do you like most about Axis Security?
The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can conn...
What needs improvement with Axis Security?
The support team should be more skilled in offering assistance.
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
 

Also Known As

iBoss Cloud Platform
No data available
Check Point Quantum SASE
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Cardenas Markets, Armis, Alnylam Pharmaceuticals, Visionworks
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Find out what your peers are saying about Axis Security vs. Check Point Harmony SASE (formerly Perimeter 81) and other solutions. Updated: December 2024.
824,129 professionals have used our research since 2012.