Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Cisco Duo comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 23, 2024
 

Categories and Ranking

iboss
Sponsored
Ranking in ZTNA as a Service
15th
Average Rating
8.4
Number of Reviews
8
Ranking in other categories
Secure Web Gateways (SWG) (23rd), Internet Security (8th), Web Content Filtering (5th), Cloud Access Security Brokers (CASB) (11th), Secure Access Service Edge (SASE) (15th)
Check Point Harmony SASE (f...
Ranking in ZTNA as a Service
3rd
Average Rating
8.8
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (5th), Firewalls (14th), Anti-Malware Tools (9th), Enterprise Infrastructure VPN (7th), ZTNA (2nd), Secure Access Service Edge (SASE) (4th)
Cisco Duo
Ranking in ZTNA as a Service
4th
Average Rating
8.8
Number of Reviews
57
Ranking in other categories
Single Sign-On (SSO) (2nd), Authentication Systems (2nd), Cisco Security Portfolio (7th), Multi-Factor Authentication (MFA) (1st)
 

Featured Reviews

GZ
Sep 25, 2021
Stable and quick to set up but needs more clear status information for end users
The solution is a corporate proxy server, an intelligence proxy From a corporate perspective, I understand that it's important to keep the company data safe. From a corporate point of view, it's a good solution. The solution is stable. The solution can scale.  It was a very easy product to…
AshleyMorales - PeerSpot reviewer
Nov 3, 2023
Good threat protection and VPN authentification with real-time visibility
This tool was acquired when the organization made the decision to move the entire infrastructure to the cloud. It was going to handle different types of schemes such as IaaS and SaaS up to Office 365, so all these schemes were going to meet the need for accessibility by users. We needed a tool with…
JS
Jun 15, 2023
Provides security and flexibility, and comes with great support and at-par licensing
Duo Security helps with multi-factor authentication. It gives another level of security for authentication and logging devices. It's just more secure. It does a very good job of securing our infrastructure. It enables us to be more secure and provides another level for our users and admins. It definitely increases security in our work environment. I've also used it at school for logging into my system there. It's good for both scenarios. It's very user-friendly. It's very good for user authentication and device verification for helping to prevent identity-based attacks. The only thing would be if you lose your phone or something like that, then it breaks the whole setup, so it has been very successful in that. Now that it has been implemented, it has freed up our IT staff's time. It has mostly been set up and go. We then forget about it till we have to update it. It's very good for establishing trust for every access request, no matter where it comes from. Duo Security considers all resources to be external which is an important aspect because of the way our network is set up. We've remote sites, and everyone at those sites also has the requirement to use Duo Security. It's another level of the security level mechanism that we have. At this point, the way cybersecurity is going, adding more options that are not very heavy lifting for a user is very important.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Granular setup, which was able to set different levels of filters using the OUs in the AD."
"Its initial setup was straightforward."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"Content filtering is the most useful feature of iboss."
"Technical support is pretty sharp and very responsive."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"Our primary use case for this product is DLP,"
"The Check Point portfolio showcases very strong products."
"The solution has many valuable aspects, including anti-Phishing, which blocks phishing attacks in all applications (email, messaging, and social networks)."
"The solution offers ATP features and management features."
"The DRP is the most valuable feature."
"Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process."
"What I like about Harmony Connect is that every packet through the network is screened and filtered so that only clean packets can enter the PC. This is useful for a variety of security reasons because you no longer need to worry about things like DDoS attacks."
"Using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials."
"Our investment in quality hardware has proven to provide a better customer experience. They heavily rely on Check Point Firewall and Check Point SaaS Connect to safeguard their networks from external threats and attacks."
"Multifactor authentication is the most valuable feature."
"We get fewer threats to remediate due to the two-factor authentication, which does not allow as many threats through."
"The administrator tool in the dashboard is the most valuable feature. It's really easy to quickly see if users are locked out from their device, firmware code, or just all the little dashboards and reports I can run to give the security for monthly reports. The dashboard's really good."
"If you have to log in to something, you must go to Duo Security to confirm that you're who you are on your phone."
"The flexibility is the most valuable feature. We use it for the app on the phone. When we're at different locations, the phone is usually there, so we can use that. It has just been a very flexible option."
"It's easy to use for the security part, and it helps to improve our security posture."
"I love Duo Security's push notifications. It's simple, fast, and secure. From the user's perspective, the solution is seamless. The security aspect is great."
"It was a simple way of providing two-factor authentication for remote access when we hit the COVID pandemic. It was very easy and quick to get it going."
 

Cons

"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"The dashboards for local use could be better."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"File integrity monitoring would be very advantageous as an additional feature."
"To scale up, a new iboss Node Blade Chassis must be purchased."
"Its pricing could be better."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"I have found that the log-in/out process takes quite some time."
"The product needs to work on the integration of alerts with different SIEM or security solutions."
"The suspend feature needs more control."
"There is an issue when installing the Check Point client."
"The complex initial setup phase of the product is an area that can be improved"
"While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures."
"When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end."
"The platform still lacks relevant dashboards and the ability to customize them based on our needs."
"Integration with a product such as Microsoft Sentinel would be great. As the product continually improves, I'm unsure if this feature is available."
"There might be a little slowness, but that could be my connection."
"We have a 24 hour timer for our Duo cookie and we would like to reduce this to a shorter time when using Duo."
"There is a little bit of apprehension for some users thinking, well, "How do I know this app is not collecting personal information from my personal device?""
"I wouldn't mind seeing some options for remembering a device for a short period of time or a specific login, particularly for administrative engineering staff, as we may be logging in to four or five different services."
"Most of my colleagues from other companies use the Microsoft MFA solution because it's included in Office 365. Few people are considering Cisco Duo. That's the primary problem in our area. It's a solution mostly adopted by Cisco users."
"Removing the need for a password would be a positive change as well as the ability to cover all the different enterprise applications. They don't have coverage for everything."
"The product price needs improvement."
 

Pricing and Cost Advice

"It is expensive compared to one of its competitors."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"The product is neither cheap nor expensive."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"The product is reasonably priced."
"I am not aware of the pricing. There are two departments, and I don't have any information about them."
"I believe the licensing model is excellent as it offers flexibility to our customers, allowing them to adopt a crawl, walk, or run approach."
"I rate the product pricing a seven out of ten."
"It falls in line with everything else."
"It is affordable for what's coming to the table with it, but in this day and age, the cost is looked at under a microscope, and companies need to very finely define what is needed versus what is critical. In some cases, it might not be cost-effective for a company to have it. In a lot of other cases, it is the cost of doing business."
"It has a fair pricing model. I know they have different tiers, but it would be nice to have different types of licenses for certain groups of users in our organization. That way, we wouldn't have to lump everybody into one group. That would be also one complaint."
"Duo Security is free."
"Cisco has the most expensive products because market leaders tend to charge a lot."
report
Use our free recommendation engine to learn which ZTNA as a Service solutions are best for your needs.
801,394 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
12%
Manufacturing Company
9%
Educational Organization
7%
Computer Software Company
21%
Manufacturing Company
7%
Financial Services Firm
6%
Government
6%
Computer Software Company
27%
Manufacturing Company
8%
Government
7%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
Sometimes the agent stops working in iboss, and we have to reinstall the agent. This is a hiccup that iboss should im...
What is your primary use case for iboss?
We use iboss for the proxy solution. I used iboss in my organization to block a few sites for a few of my employees.
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
How does Duo Security compare with Microsoft Authenticator?
We switched to Duo Security for identity verification. We’d been using a competitor but got the chance to evaluate Du...
What do you like most about Duo Security?
They are users who, as mentioned before, utilize RDPAP and MDPAP. It includes functionalities related to finance, spe...
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
Duo Security
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Cisco Duo and other solutions. Updated: September 2024.
801,394 professionals have used our research since 2012.