Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs CyberArk Privileged Access Manager comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
14
Ranking in other categories
Secure Web Gateways (SWG) (13th), Internet Security (4th), Web Content Filtering (4th), Cloud Access Security Brokers (CASB) (8th), ZTNA as a Service (13th), Secure Access Service Edge (SASE) (10th)
Check Point Harmony SASE (f...
Average Rating
8.8
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (5th), Firewalls (14th), Anti-Malware Tools (10th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (3rd), ZTNA (3rd), Secure Access Service Edge (SASE) (6th)
CyberArk Privileged Access ...
Average Rating
8.6
Number of Reviews
193
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (3rd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

Secure Access Service Edge (SASE)
Privileged Access Management (PAM)
 

Featured Reviews

Jack Hamm - PeerSpot reviewer
Sep 20, 2024
We experienced benefits immediately but the report generation is lagging
iboss excels on the networking side but lags slightly behind competitors like Zscaler and Netskope in terms of security feature parity. I'd like to see them accelerate development on the security side, particularly around data loss prevention. Using iboss for DLP instead of traditional endpoint solutions is preferable, but its current feature set requires some clunky workarounds. I'd also like to see better integration of DLP into the platform. Additionally, while it's improving, reporting can be slow at times. This is problematic when generating reports for executives who expect them immediately. I'd like to see further improvements in reporting speed and efficiency.
reviewer8099174 - PeerSpot reviewer
Oct 6, 2023
Secure access with an intuitive design and straightforward controls
My primary use case for Perimeter 81 is to have a secure remote workforce. With colleagues stationed across the globe, it ensures a secure network connection, enabling seamless remote work.  This is particularly vital for our multinational operations, as it guarantees that our team can access…
SatishIyer - PeerSpot reviewer
Jun 21, 2022
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Content filtering is the most useful feature of iboss."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"Technical support is pretty sharp and very responsive."
"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"It was a very easy product to install. It can be deployed very fast."
"iboss is easy to use despite its complexity. Multiple engineers manage it, but it's significantly more straightforward to administer than traditional VPNs and web proxies."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"Now that we use Harmony Connect, the files are inspected and we are sure that no malicious content is inside the company."
"It keeps us all accountable and ensures secure internet connections while we all work remotely."
"The solution has many valuable aspects, including anti-Phishing, which blocks phishing attacks in all applications (email, messaging, and social networks)."
"The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment."
"The solution offers ATP features and management features."
"The characteristics that I have liked the most are the ease of implementation and administration."
"One of the most valuable features found using Harmony is being able to monitor in a simple and orderly way."
"Review of exported and imported packages and protection and content filtering have been useful."
"The password rotation and cyber gateway have been quite useful."
"We have accomplished our security goals. We have two-factor authenticated and vaulted our important accounts, so people can't just steal stuff from us."
"Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
"CyberArk makes our environment more secure and prevents possible attacks by compromised accounts."
"CyberArk probably has probably the best vault on the market because of the multiple layered security and each password getting its own encryption."
"This is a complete solution that can detect cyber attacks well."
"Their legacy of more than 20 years is very valuable. It brings a lot of stability to the product and a wide variety of integration with the ecosystem. Because of these factors, it has also been very successful in deployment. So, the legacy and integration with other technologies make the PAM platform very stable and strong. In terms of features, most of the other vendors are still focusing just on the privileged access management or session recording, but CyberArk has incorporated artificial intelligence to make PAM a more proactive system. They have implemented threat analytics into this, and there is also a lot of focus on domain controller production, Windows Server protection, and stuff like that. They have also further advanced it with the security on the cloud and DevOps systems. They have a bundle licensing model, which really helps. They don't have a complex licensing model. Even though in our market, people say CyberArk is expensive as compared to some of the other products, but in terms of overall value and as a bundling solution, it is an affordable and highly scalable product."
"It is scalable."
 

Cons

"File integrity monitoring would be very advantageous as an additional feature."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"The reporting feature needs improvement. It doesn't give you the expected results. It is quite difficult to get the specific reports needed, and it is not as intuitive as the rest of the platform."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"The reporting feature needs improvement."
"The solution requires you to buy a minimum of 50 licenses and that is not practical."
"One of our challenges is ensuring the security of our cloud-based operations."
"The main problem with Harmony Connect is that, because it's in a new category of offerings by Check Point, there's very little marketing of the product so far, and this means that many potential users don't even know this kind of solution is available. There are also few testimonials or case studies talking about people who have used the product and fell in love with it, for example."
"It would be nice to have a notification sound when Perimeter81 disconnects, as I sometimes don't notice when the icon shows that it's disconnected, and I end up wasting time waiting for my browser to load a page that shows an error, usually error 404."
"In order to be able to invite users, send the agent and implement it, the user input must be generated manually."
"In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity."
"Branding could be better."
"Automation and scalability are areas where the solution lacks and needs to improve."
"We need a bit more education for our user community because they are not using it to its capabilities."
"The only problem involves granting access to people who are authorized to view it."
"Over the past seven years, I have seen a lot of ups and downs with the product."
"The web interface has come a long way, but the PrivateArk client seems clunky and not intuitive. It could use an update to be brought up to speed with the usability of PVWA."
"The support services could act faster when people reach out to resolve issues."
"The interface could be improved it is not user-friendly, but they have improved but it could still improve. In the policies configuration, it would be a benefit to have more details."
"There is a learning curve when it comes to planning out the deployment strategy, but once it is defined, it runs itself."
"There are upwards of six components you need to set it up. And you might need anywhere from two to five servers. It takes some work to set that up, especially in a larger environment."
 

Pricing and Cost Advice

"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is probably in line with other solutions, but I do not deal with the financial side."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The overall pricing for iboss is very competitive and transparent."
"It is expensive compared to one of its competitors."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"The product is reasonably priced."
"Annual licenses cost $30 to $40 each."
"The product is neither cheap nor expensive."
"The product's pricing model accommodates diverse needs and deployment sizes."
"Regarding pricing, I can say that the more the number of users, the less they have to pay."
"The cost of the solution's licenses depends on the particular use cases."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"The solution is cost-effective for the features."
"The cost is high compared to other products."
"I believe that this solution is priced well. It's the market leader and I think that it's the best solution."
"I do not have any opinions to add about the pricing of the product."
"Pricing and licensing depend on the environment."
"Network and security licenses are currently being managed by other outsource vendors, so they are facing some type of problems in the digital aspect."
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"Payments have to be made on a yearly basis toward the licensing costs of the solution."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
13%
Manufacturing Company
9%
Government
6%
Computer Software Company
20%
Financial Services Firm
6%
Manufacturing Company
6%
Government
5%
Educational Organization
31%
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
I have the same complaint about them that I have about other software companies. Sometimes when you call in support, ...
What is your primary use case for iboss?
We are a PreK-12 public school district, and we use iboss to filter internet content for our students at home and sta...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Rockwell Automation
Find out what your peers are saying about Palo Alto Networks, Zscaler, Cisco and others in Secure Access Service Edge (SASE). Updated: October 2024.
815,854 professionals have used our research since 2012.