BeyondTrust Endpoint Privilege Management and Check Point Harmony SASE are leading solutions in the field of cloud security and network access. BeyondTrust shines in asset discovery and risk management, whereas Check Point Harmony SASE is a preferred choice for effective remote access and robust threat prevention.
Features: BeyondTrust Endpoint Privilege Management is recognized for its focus on Privileged Access Management and Vulnerability Management, including asset discovery, comprehensive session management, and password management capabilities. Check Point Harmony SASE provides Zero Trust Network Access, phishing protection, and URL filtering, ensuring secure remote access and advanced threat prevention.
Room for Improvement: BeyondTrust could improve integration with ticket management systems, add flexibility for non-Windows deployments, and enhance its reporting analytics and user interface. Check Point Harmony SASE would benefit from improved feature stability, seamless integration with SIEM systems, and addressing latency issues and geographical coverage for complex network demands.
Ease of Deployment and Customer Service: BeyondTrust is usually deployed on-premises or in public clouds, with users praising its robust but sometimes delayed support. Initial setups can be complex, though support is efficient. Check Point Harmony SASE supports diverse cloud options and is noted for responsive, knowledgeable staff, despite some delays in specific regions.
Pricing and ROI: BeyondTrust offers competitive pricing, though changes in licensing can make it seem expensive compared to competitors. It provides value through compliance and security enhancements. Check Point Harmony SASE is often described as higher priced yet reasonable for its advanced security features, delivering value especially to larger enterprises, with significant returns in compliance and security efficiency.
We are saving 40% of our time, which is good.
They offer support around the clock, and responses are generally quick.
Support is critical, especially when challenges arise related to PAM.
The initial understanding of the environment is crucial, followed by a simple deployment process.
I would rate it nine out of ten for scalability.
The appliances are stable, and there are no significant issues with backups or recovery.
After the last improvement, I can say it is much more stable now.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
There is a need for better MQ integration with DevOps and improvements in architecture.
The ability to view recorded live sessions of specific users is a crucial benefit.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
The connectivity issue can be improved as at times it lags when connecting to their server.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
The firewall management is the most valuable feature for me.
The best key features of Harmony are stabilization, private access, and Internet access.
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
Key Solutions Include:
-ENTERPRISE PASSWORD SECURITY
Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.
-ENDPOINT LEAST PRIVILEGE
Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.
-SERVER PRIVILEGE MANAGEMENT
Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.
-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS
Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.
Learn more at https://www.beyondtrust.com/privilege-management
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Perimeter 81 Benefits:
Perimeter 81 Features:
Reviews from Real Users
PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".
Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".
Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.