Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs F5 BIG-IP Local Traffic Manager (LTM) comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.4
Number of Reviews
8
Ranking in other categories
Secure Web Gateways (SWG) (23rd), Internet Security (8th), Web Content Filtering (5th), Cloud Access Security Brokers (CASB) (11th), ZTNA as a Service (15th), Secure Access Service Edge (SASE) (15th)
Check Point Harmony SASE (f...
Average Rating
8.8
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (5th), Firewalls (14th), Anti-Malware Tools (9th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (3rd), ZTNA (2nd), Secure Access Service Edge (SASE) (4th)
F5 BIG-IP Local Traffic Man...
Average Rating
8.2
Number of Reviews
118
Ranking in other categories
Application Delivery Controllers (ADC) (1st)
 

Mindshare comparison

Secure Access Service Edge (SASE)
Application Delivery Controllers (ADC)
 

Featured Reviews

GZ
Sep 25, 2021
Stable and quick to set up but needs more clear status information for end users
The solution is a corporate proxy server, an intelligence proxy From a corporate perspective, I understand that it's important to keep the company data safe. From a corporate point of view, it's a good solution. The solution is stable. The solution can scale.  It was a very easy product to…
LuisPerez9 - PeerSpot reviewer
Apr 25, 2024
Prevents threats, provides global network protection, and manages API evaluations
One use case of SASE is for a partner customer who needs a secure and fast connection for their employees to access the final customer's data center and cloud. Green protection and security measures enable access to all information, including the data center's applications and networks Harmony…
AA
Jun 3, 2024
Policies and machine learning are one of a kind, efficient, and provide minimal disturbance to the servers
From an ASM perspective, the most valuable feature was the DOS protection, SQL injection protection, bot protection, bot URLs, and many other features. There were a lot of good features. The most beneficial for maintaining server health included the algorithms for the virtual IP, which segment traffic between servers, authentication profiles, and many other things. The load-balancing capabilities have increased efficiency because servers can handle connection requests one at a time. There are no dropped connections, and the server health is always under the threshold. Moreover, AI enhances LTM's performance in network management. It made it much more secure and efficient by understanding normal traffic patterns and learning the behavior of traffic within the environment. Any suspicious traffic is captured and flagged.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Our primary use case for this product is DLP,"
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"It was a very easy product to install. It can be deployed very fast."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"Its initial setup was straightforward."
"Granular setup, which was able to set different levels of filters using the OUs in the AD."
"Content filtering is the most useful feature of iboss."
"Our investment in quality hardware has proven to provide a better customer experience. They heavily rely on Check Point Firewall and Check Point SaaS Connect to safeguard their networks from external threats and attacks."
"Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
"What I like about Harmony Connect is that every packet through the network is screened and filtered so that only clean packets can enter the PC. This is useful for a variety of security reasons because you no longer need to worry about things like DDoS attacks."
"Check Point provides high-quality technical support. The support was pretty quick."
"Perimeter 81 is very pretty."
"SD-WAN is one of the primary solutions offered by Perimeter 81."
"Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.)."
"Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
"The solution has good load balancing capabilities."
"F5's attack signatures and automation are the most valuable features. The disaster recovery capabilities are also excellent. You don't need to do anything. It has automatic failover from production."
"It is a stable product from a stable company. Recently, they have been more focused on security as well."
"F5 BIG-IP Local Traffic Manager is a stable and reliable solution."
"It supports APIs and virtual additions for cloud and VMware."
"The most valuable features are the WAF and the big IP."
"We plan to create packages of services from which it will be possible to build comprehensive tailor-made solutions."
"This is a solution that does what it's supposed to do at the price point."
 

Cons

"The dashboards for local use could be better."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"To scale up, a new iboss Node Blade Chassis must be purchased."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"File integrity monitoring would be very advantageous as an additional feature."
"Sometimes, obviously, there are bugs."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"There is a hefty cost"
"Sometimes, the product is very slow."
"The solution's speed of upload and download is an area where it lacks"
"The Point locations need to improve the latency and speed."
"The solution requires you to buy a minimum of 50 licenses and that is not practical."
"The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."
"The overall UI could be improved and updated to bring a simpler feel to the application."
"Sometimes downloading PDF files can be slow."
"The license terms for "non-commercial" will be a challenge for us."
"It is a hardware load balancer, and its installation procedure is more complex than a software load balancer. There are pros and cons of using hardware load balancing. You have to have specific hardware deployed in your data center to activate this load balancer. They never came up with any software-based load balancing solution. It is all hardware-based."
"I would like to see F-5 implement a regular routing like in other Linux-based devices. When we try and integrate in some complex networks, we have to use some additional routing scenarios from a Layer 3 perspective, then we have some problems. It would be great if this were fixed somehow."
"Needs to provide a visual interface to follow a customer's activity (from client to BIG-IP to SNAT IP to the chosen server, then back). Today, we are still performing packet captures."
"The UI could be improved."
"There is room for improvement in the user interface."
"Based on my experience using F5 and by only taking into consideration the last seven years, I have found that the reporting mechanism is bad."
"F5 could improve the rule-setting capabilities in the GUI, and they need to simplify web management. For example, the menus in the Citrix GUI are easier to navigate, with a clean structure and layout."
 

Pricing and Cost Advice

"It is expensive compared to one of its competitors."
"The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users."
"Annual licenses cost $30 to $40 each."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"The product is neither cheap nor expensive."
"Overall I am very happy with the solution’s flexibility and pricing."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"The cost is high for this product, so it's not suitable for small customers, e.g. those with small environments."
"The licensing strategy for F5 is good."
"I am not aware of the exact cost of the product. However, it is expensive."
"Compared to using open-source products, the prices are not cheap."
"The solution is more expensive than one of its competitors."
"It's not a cheap product, but there are no other replacements for what we do with it."
"The only area that has room for improvement would be pricing, so its competitors do not have a say."
"The licensing pricing seems relatively easy enough to get your head around. I would advise anyone to ensure that you have a conversation with an F5 consultant before purchasing, as you would with most products."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
801,634 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
11%
Manufacturing Company
10%
Educational Organization
7%
Computer Software Company
21%
Manufacturing Company
7%
Financial Services Firm
6%
Government
5%
Financial Services Firm
17%
Computer Software Company
15%
Government
9%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
Sometimes the agent stops working in iboss, and we have to reinstall the agent. This is a hiccup that iboss should im...
What is your primary use case for iboss?
We use iboss for the proxy solution. I used iboss in my organization to block a few sites for a few of my employees.
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
What do you like most about F5 BIG-IP?
The support from F5 BIG-IP LTM is good.
What is your experience regarding pricing and costs for F5 BIG-IP?
There are a few licensing options available for F5 BIG-IP LTM. You can have a perpetual license which is a lifetime l...
What needs improvement with F5 BIG-IP?
In the LTM solution, it would be beneficial to have more algorithms for traffic segmentation or the ability to create...
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
F5 BIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery Controller, BIG IP
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Riken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.
Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Secure Access Service Edge (SASE). Updated: September 2024.
801,634 professionals have used our research since 2012.