Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs CyberArk Privileged Access Manager comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.4
Number of Reviews
8
Ranking in other categories
Secure Web Gateways (SWG) (23rd), Internet Security (8th), Web Content Filtering (5th), Cloud Access Security Brokers (CASB) (11th), ZTNA as a Service (15th), Secure Access Service Edge (SASE) (15th)
Check Point Harmony SASE (f...
Average Rating
8.8
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (5th), Firewalls (14th), Anti-Malware Tools (9th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (3rd), ZTNA (2nd), Secure Access Service Edge (SASE) (4th)
CyberArk Privileged Access ...
Average Rating
8.6
Number of Reviews
193
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (3rd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

Secure Access Service Edge (SASE)
Privileged Access Management (PAM)
 

Featured Reviews

GZ
Sep 25, 2021
Stable and quick to set up but needs more clear status information for end users
The solution is a corporate proxy server, an intelligence proxy From a corporate perspective, I understand that it's important to keep the company data safe. From a corporate point of view, it's a good solution. The solution is stable. The solution can scale.  It was a very easy product to…
reviewer8099174 - PeerSpot reviewer
Oct 6, 2023
Secure access with an intuitive design and straightforward controls
My primary use case for Perimeter 81 is to have a secure remote workforce. With colleagues stationed across the globe, it ensures a secure network connection, enabling seamless remote work.  This is particularly vital for our multinational operations, as it guarantees that our team can access…
reviewer0275214 - PeerSpot reviewer
Sep 13, 2023
Good reporting and MFA with easy integration capabilities
In my organization, we are using CyberArk Privileged Access Manager to enhance the security of an organization's critical systems, mainly by securing privileged accounts (e.g. administrator passwords, SSH keys, and API tokens).  We are also using Cyber-Ark for access control by ensuring that only…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Granular setup, which was able to set different levels of filters using the OUs in the AD."
"Our primary use case for this product is DLP,"
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"Content filtering is the most useful feature of iboss."
"It was a very easy product to install. It can be deployed very fast."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"Technical support is pretty sharp and very responsive."
"Check Point provides high-quality technical support. The support was pretty quick."
"Its software solution also ensures connectivity and protects against NSF filtering."
"Logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN."
"The monitoring and granular policies are very helpful."
"The Check Point portfolio showcases very strong products."
"Perimeter 81 provides a very secure and non-disruptive experience."
"The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
"The DRP is the most valuable feature."
"The risk of lost password and forbidden access to resources has been drastically reduced which increased the security level for the entire company,"
"It is a robust product."
"You can easily manage more than 4000 accounts with one PSM."
"Our go-to solution for securing against the pass the hash attack vector and auditing privileged account usage."
"When we started with RPA, there was a requirement that every credential and the bots themselves be protected through the PAM system. From the get-go, we've had CyberArk in the middle... We've got a pretty robust RPA implementation with our PAM platform. Users, bots, the credentials — everything is managed via our PAM solution."
"It's a highly flexible solution that can adapt to each customer's needs."
"It allows users to self-provision access to the accounts that they need."
"Securely protects our TAP/NUID and privileged access accounts within the company."
 

Cons

"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"Sometimes, obviously, there are bugs."
"Its pricing could be better."
"The dashboards for local use could be better."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"File integrity monitoring would be very advantageous as an additional feature."
"To scale up, a new iboss Node Blade Chassis must be purchased."
"Although the interface is user-friendly, further simplification and customization options tailored for non-technical users would benefit smaller firms without dedicated IT teams. Intuitive dashboards and guided setups can help in reducing the learning curve."
"When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end."
"A Google Chrome extension would be handy instead of logging into the app."
"In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality."
"The main problem with Harmony Connect is that, because it's in a new category of offerings by Check Point, there's very little marketing of the product so far, and this means that many potential users don't even know this kind of solution is available. There are also few testimonials or case studies talking about people who have used the product and fell in love with it, for example."
"The access to the portal should be faster. It shouldn't crash a lot."
"I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful."
"The support is not very good."
"The installation process should be easier and more user-friendly so that you don't need to hire a third party to deploy it."
"New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
"It should be easier to install. It is a comprehensive product, which makes it difficult to install. You need to have their consulting services in order to get it all installed and set up correctly because there is so much going on. It would be nice if there were an easier way to do the installation without professional services. I suspect they get a fair amount of their money from professional services. So, there is not a huge incentive."
"I would like to see better usability for non-technical people."
"It can be made user-friendly, in the sense of the console is pretty outdated."
"It should be easy to use for non-technical people. Its interface can be a bit difficult. Some parts of its interface are not very intuitive. Some of the controls are hidden, and instead of having a screen with all the controls for that account on it, you have to use menus and other similar things."
"CyberArk has to continue to evolve with that threat landscape to make sure that they're still protecting those credentials that are owned by those that have privileged accounts in the firms."
"The greatest area of improvement is with the user interface of the Password Vault Web Access component."
 

Pricing and Cost Advice

"It is expensive compared to one of its competitors."
"The product is neither cheap nor expensive."
"The product is reasonably priced."
"Annual licenses cost $30 to $40 each."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"The product's pricing model accommodates diverse needs and deployment sizes."
"It is in line with its competitors, but all such solutions cost too much money."
"I would rate the tool’s pricing a six out of ten."
"The price of this solution is expensive."
"The solution is available at a high price"
"CyberArk DNA is free if you purchase the CyberArk solution. There is no additional charge for CyberArk DNA, which is great."
"The main problem for the tool is its licensing. I work for a really big company. When you try to develop this as a service, usually you work with leverage teams who are formed with dozens of members. You might dedicate one FTE, or less, for something, e.g., an antivirus administrator. You might have half an FTE's effort dedicated to administering the antivirus, but then you have a team of about 30 users who might access that ticket. The problem is that CyberArk eliminated the possibility of concurrent users years ago. This is a big problem for companies who work with leverage teams. You need to pay for everyone. 40 licenses are used by 20 or 30 people. This is a big problem because licenses are not precisely cheap."
"This solution is considered to be more expensive than others out there on the market today."
"Payments have to be made on a yearly basis toward the licensing costs of the solution."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
801,634 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
11%
Manufacturing Company
10%
Educational Organization
7%
Computer Software Company
21%
Manufacturing Company
7%
Financial Services Firm
6%
Government
5%
Educational Organization
28%
Financial Services Firm
13%
Computer Software Company
12%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
Sometimes the agent stops working in iboss, and we have to reinstall the agent. This is a hiccup that iboss should im...
What is your primary use case for iboss?
We use iboss for the proxy solution. I used iboss in my organization to block a few sites for a few of my employees.
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Rockwell Automation
Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Secure Access Service Edge (SASE). Updated: September 2024.
801,634 professionals have used our research since 2012.