Check Point Harmony SASE and Check Point Harmony Browse compete in the security and connectivity category. Harmony SASE appears to have the upper hand with its comprehensive network security, offering essential features and robust deployment options.
Features: Harmony SASE includes Zero Trust Network Access, split tunneling, and geographic access points, enabling secure remote access. It supports VPN functionality and streamlines login with single sign-on and always-on VPN features. Harmony Browse, on the other hand, delivers browser-level security, effectively tackling zero-day threats and phishing through Threat Emulation and URL filtering to protect web browsing activities.
Room for Improvement: Harmony SASE could benefit from expanded integration with additional security features, enhanced reporting capabilities, and more effective centralized policy management. Users also suggest improvements in remote access and performance in challenging regions. Harmony Browse might reduce false positives and achieve better integration with third-party applications while optimizing content filtering and URL grouping for improved efficiency.
Ease of Deployment and Customer Service: Harmony SASE offers flexibility across a range of environments, including private and hybrid clouds, providing broader cloud support. Users generally report positive experiences with Harmony SASE's customer service, especially in response times, while Harmony Browse users mention slow technical support but commend efficient chat support. Consistency in customer support could be improved for Harmony Browse.
Pricing and ROI: Harmony SASE, although not the most budget-friendly option, delivers significant value for its advanced security features, leading to long-term savings by minimizing VPN infrastructure costs. Harmony Browse presents a cost-effective solution for businesses focused on web security. Both products are reported to offer positive ROI, with Harmony SASE reducing security management expenses and Harmony Browse praised for straightforward licensing and setup.
Check Point Harmony SASE (formerly Perimeter 81) blocked access to those URLs at the network level before users could click through.
We are saving 40% of our time, which is good.
The phone and email support provide efficient results with direct reachability to support engineers.
Typically, I do not need to reach out to Check Point support because the solutions work well after installation.
For technical support, I would rate it nine out of ten.
I would rate support 10 out of 10.
After updating firmware, data utilization was visible for a few days before collapsing again.
It is scalable as we monitor and manage endpoints and overall users across the system.
Check Point Harmony Browse is virtually infinite in terms of scalability, and I've seen install bases of up to 5,000 users.
The cloud-native model ensures we are not tied to any specific location or hardware, which has been a great game changer in terms of agility.
The scalability of Check Point Harmony SASE (formerly Perimeter 81) is good, and I can add more users and devices easily as my organization grows.
I would rate it nine out of ten for scalability.
Check Point Harmony Browse is very stable with no communication or other issues encountered on my end.
Even the support team does not have a proper solution for this issue.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
The user interface can be better, and selecting the action for monitored or watch-listed IOCs can be more refined.
Another area of improvement is extension compatibility since it currently works best with Chrome and Edge, but having wider browser support for Firefox and Safari would be beneficial for mixed environments.
Integrating with Fortinet, Palo Alto, or third-party SIEM products such as Splunk would be a seamless advantage.
An example of when the support cycle took longer than expected was when I had a ticket open for nearly six to seven months regarding a simple issue.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
One area for improvement is integration with third-party identity providers.
Smaller projects tend to be more expensive due to fewer licenses, while larger projects of 500 to 2,000 users benefit from better pricing and discounts.
It is not too high compared to what we expected, but it is not too cheap either, which is why I rate it five.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
My experience with pricing, setup cost, and licensing for Check Point Harmony SASE (formerly Perimeter 81) is that it is a rental service, but I find it satisfactory.
Everything is handled directly within the browser using a lightweight extension, delivering real-time threat prevention, including protection against zero-day phishing and malicious downloads without impacting user productivity.
The isolated environment in Check Point Harmony Browse is the best feature we provide, giving a separate, isolated environment for the production applications and company applications, which is really valuable.
The real-time Threat Intelligence feature powered by Check Point's ThreatCloud is impressive because ThreatCloud integrates and correlates all malicious data from Check Point installations globally, collecting and analyzing this data with AI and machine learning to help prevent zero-day attacks effectively.
The firewall management is the most valuable feature for me.
The Zero Trust Network Access (ZTNA) feature is a major highlight as it gives users seamless and secure access to internal resources without requiring a full-blown VPN, which improves both security and user experience.
The best key features of Harmony are stabilization, private access, and Internet access.
Check Point Harmony Browse is a secure web browsing solution that provides users with a safe and seamless browsing experience. It is designed to protect users from web-based threats such as malware, phishing, and other cyber attacks. Harmony Browse uses advanced threat prevention technologies to detect and block malicious websites and downloads in real-time. It also provides users with a secure connection to the internet, ensuring that their online activities are not intercepted or monitored by cybercriminals.
Harmony Browse is easy to deploy and manage, with a simple and intuitive user interface that allows administrators to set policies and monitor user activity. With Harmony Browse, organizations can ensure that their employees are protected from web-based threats, while also maintaining productivity and compliance.
Check Point Harmony Browse Benefits:
Check Point Harmony Browse Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by Check Point Harmony Browse users.
Shrinkhala Jain, Project Consultant at a consultancy, states that "The software is easy to install and deploy across any business environment and it is becoming a game changer for us."
Anuj Kumar, Senior Manager at IRMA Anand, writes that "It completely restricts and blocks phishing attacks and any threat entry into the system and keeps the work pace fast and secure without showing any signs of lag or latency."
Javier Aguado Benito, Coordinador at OESIA, says that"This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user."
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Perimeter 81 Benefits:
Perimeter 81 Features:
Reviews from Real Users
PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".
Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".
Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.