Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs Check Point Harmony SASE (formerly Perimeter 81) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.9
BeyondTrust ensures compliance and security, improving ROI, particularly during transitions to zero-trust models on platforms like Azure.
Sentiment score
6.3
Organizations experienced varied ROI from Check Point Harmony SASE, noting security improvements, cost savings, and reduced VPN reliance.
 

Customer Service

Sentiment score
7.1
BeyondTrust's support is efficient with quick resolutions, though timezone delays and escalations can sometimes slow responses.
Sentiment score
7.3
Customer feedback on Check Point Harmony SASE's support is mixed, with praise for expertise and criticism for response times.
They offer support around the clock, and responses are generally quick.
Support is critical, especially when challenges arise related to PAM.
 

Scalability Issues

Sentiment score
7.4
BeyondTrust Endpoint Privilege Management efficiently supports up to 100,000 devices, praised for scalability, reliability, and seamless expansion.
Sentiment score
8.2
Check Point Harmony SASE is scalable, adaptable, and easy to deploy, benefiting both small-scale and large-scale dynamic operations.
The initial understanding of the environment is crucial, followed by a simple deployment process.
I would rate it nine out of ten for scalability.
 

Stability Issues

Sentiment score
7.6
BeyondTrust Endpoint Privilege Management is stable and reliable, with minor issues, often attributed to user environments rather than the system.
Sentiment score
7.9
Check Point Harmony SASE provides stable, reliable access, excelling in diverse environments despite occasional issues under heavy loads.
The appliances are stable, and there are no significant issues with backups or recovery.
After the last improvement, I can say it is much more stable now.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
 

Room For Improvement

BeyondTrust needs UI, integration, and support improvements, streamlined deployment, simpler licensing, AI expansion, and better documentation.
Check Point Harmony SASE needs more features, better documentation, improved speed, integrations, user interface customization, and competitive pricing.
There is a need for better MQ integration with DevOps and improvements in architecture.
The ability to view recorded live sessions of specific users is a crucial benefit.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
The connectivity issue can be improved as at times it lags when connecting to their server.
 

Setup Cost

BeyondTrust Endpoint Privilege Management is costly yet feature-rich, with varied licensing and setup costs across different platforms.
Check Point Harmony SASE offers flexible, competitive pricing, but smaller companies may find minimum user licensing a challenge.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
 

Valuable Features

BeyondTrust offers robust security through Privilege Management, integration with other platforms, and ease of cloud or on-premises implementation.
Check Point Harmony SASE provides secure connections with easy setup, advanced security features, and efficient management, enhancing user security and accessibility.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
The firewall management is the most valuable feature for me.
The best key features of Harmony are stabilization, private access, and Internet access.
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Ranking in Anti-Malware Tools
10th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
30
Ranking in other categories
Privileged Access Management (PAM) (9th)
Check Point Harmony SASE (f...
Ranking in Anti-Malware Tools
7th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
59
Ranking in other categories
Secure Web Gateways (SWG) (5th), Firewalls (16th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (5th), ZTNA (4th), Secure Access Service Edge (SASE) (7th)
 

Mindshare comparison

As of April 2025, in the Anti-Malware Tools category, the mindshare of BeyondTrust Endpoint Privilege Management is 1.6%, down from 2.3% compared to the previous year. The mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 0.5%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Anti-Malware Tools
 

Featured Reviews

Prashant Uppuluri - PeerSpot reviewer
Provides critical application control and ensures security with a flexible setup process
Regarding the feedback scenario, it's a tough question as I have thoroughly gone through the entire partner portal and library of BeyondTrust, as well as BeyondTrust University. I have also interacted with support whenever a ticket is raised, ranging from P1 to P3 or P2. Most end users and partners seem happy and content with BeyondTrust. The deployment of the solution is generally easy, flexible, and scalable. However, it can be challenging in certain environments, especially regarding management. Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users. In some cases of competition, I have noted specific use cases where the recording of sessions was an endpoint for BeyondTrust, providing an edge for higher management. The ability to view recorded live sessions of specific users is a crucial benefit.
reviewer8099174 - PeerSpot reviewer
Secure access with an intuitive design and straightforward controls
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a broader range of third-party tools would be beneficial for seamless compatibility with various existing systems. As for additional features in the next release, it would be great to see advanced threat detection and response capabilities integrated into the platform. This would further enhance security by proactively identifying and mitigating potential threats. Additionally, improved mobile device management features and more comprehensive user behavior analytics would be valuable additions to meet evolving cybersecurity needs.
report
Use our free recommendation engine to learn which Anti-Malware Tools solutions are best for your needs.
846,617 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
14%
Manufacturing Company
10%
Government
8%
Computer Software Company
21%
Financial Services Firm
6%
Manufacturing Company
6%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
Setup costs vary depending on the scenario. Sometimes we win orders, and other times we lose due to partner preferences or deal scenarios. Customers may negotiate on price, understanding that quali...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations: * Evaluate your needs * Understand pricing models * Request a quote * Compare ...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options wit...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
Check Point Quantum SASE
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. Check Point Harmony SASE (formerly Perimeter 81) and other solutions. Updated: March 2025.
846,617 professionals have used our research since 2012.