Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Forcepoint ONE comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
23rd
Ranking in Secure Access Service Edge (SASE)
15th
Average Rating
8.4
Number of Reviews
8
Ranking in other categories
Internet Security (8th), Web Content Filtering (5th), Cloud Access Security Brokers (CASB) (11th), ZTNA as a Service (15th)
Check Point Harmony SASE (f...
Ranking in Secure Web Gateways (SWG)
5th
Ranking in Secure Access Service Edge (SASE)
4th
Average Rating
8.8
Number of Reviews
57
Ranking in other categories
Firewalls (14th), Anti-Malware Tools (9th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (3rd), ZTNA (2nd)
Forcepoint ONE
Ranking in Secure Web Gateways (SWG)
26th
Ranking in Secure Access Service Edge (SASE)
18th
Average Rating
8.4
Number of Reviews
12
Ranking in other categories
Cloud Access Security Brokers (CASB) (10th)
 

Featured Reviews

GZ
Sep 25, 2021
Stable and quick to set up but needs more clear status information for end users
The solution is a corporate proxy server, an intelligence proxy From a corporate perspective, I understand that it's important to keep the company data safe. From a corporate point of view, it's a good solution. The solution is stable. The solution can scale.  It was a very easy product to…
Ashish Upadhyay - PeerSpot reviewer
Jan 30, 2024
Helps to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements
We utilize cryptographic techniques, leveraging the tool's capabilities in Blockchain, to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements. Integrating Quantum-resilient technology into our decentralized enterprise framework…
Edwin Eze-Osiago - PeerSpot reviewer
Feb 24, 2023
Easy to deploy, stable, and scalable
We use Bitglass for real-time scanning and its unique VM that enables reverse proxy capabilities. Bitglass can also act as an IDP for us when we don't have an identity provider The solution enforces our devices no matter where it is located even across our cloud devices reducing the manual work…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Granular setup, which was able to set different levels of filters using the OUs in the AD."
"Its initial setup was straightforward."
"Our primary use case for this product is DLP,"
"Content filtering is the most useful feature of iboss."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"It was a very easy product to install. It can be deployed very fast."
"Technical support is pretty sharp and very responsive."
"The installation is very easy."
"Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
"The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele."
"Our operators can work from home without any problems."
"The setup is really easy...I rate the support team a ten out of ten."
"The solution offers ATP features and management features."
"Even after restarting, it tries to quickly reestablish connection which is very helpful."
"What I like about Harmony Connect is that every packet through the network is screened and filtered so that only clean packets can enter the PC. This is useful for a variety of security reasons because you no longer need to worry about things like DDoS attacks."
"We are able to verify what is getting saved out onto the cloud. It allows us to have some DLP rules, since we have to be HIPAA compliant. If some personal health information has been uploaded to Office 365, then we are able to detect that sort of thing and account for it. We have set up rules to prevent people from doing that."
"The biggest thing that I like about this product is that it's easy to use and teach. When we have somebody new starting to work with the product, it's easy to teach them. It's also easy to use the product as it does so much."
"Forcepoint ONE is okay for me, and I find it a very good solution. Its most valuable feature is monitoring. Its monitoring is very good, and it can communicate with a SIEM system. I also find the DLP feature of Forcepoint ONE good."
"By default without a policy, Bitglass has the capability to notify the admin of multiple or simultaneous logins across a wide range of geographical regions."
"The most valuable features of Forcepoint include Zero Trust Network Access and remote user protection for private applications."
"The initial setup was straightforward, which was a huge win. That mostly goes to the fact that they are agentless. We didn't have to sit there deploying thousands of agents and all the things that go along with that type of deployment. We were up and running very quickly."
"The solution is very good when it comes to securing us against data leakage, because of the other proxy. It also has API scanning or data at rest. It inspects data in motion, which is the proxy, and then it has the data at rest, which is the API scanning. We can inspect for anything we want: file fingerprinting, PHI-sensitive data, PCI-sensitive data. It does not matter. We can usually find it and block it in transit and do our remediation with it. It could either be block, encrypt, or allow and watermark the file to follow it and see where it goes. It allows for those different scenarios."
"The solution’s AJAX-VM provides constant reverse proxy uptime. It has been very positive for our security operations. When people are trying to access the SaaS solution, it protects us from downloading any of that data and experiencing any type of attacks"
 

Cons

"To scale up, a new iboss Node Blade Chassis must be purchased."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"The dashboards for local use could be better."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"Sometimes, obviously, there are bugs."
"File integrity monitoring would be very advantageous as an additional feature."
"They could improve on the available public documentation."
"They should work towards the WAN intergration."
"There are a few areas where the solution could be improved. For instance, we sometimes encounter connectivity issues, which can be problematic. Recently, I experienced a connectivity issue while trying to move to Azure. Connectivity issues can be quite frustrating."
"Although the interface is user-friendly, further simplification and customization options tailored for non-technical users would benefit smaller firms without dedicated IT teams. Intuitive dashboards and guided setups can help in reducing the learning curve."
"Its initial setup process is complex for a hybrid environment."
"Branding could be better."
"When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end."
"There is an issue when installing the Check Point client."
"We encounter challenges in determining whether certain features for blocking certain file types or preventing automatic downloads are functioning correctly."
"The solution's integration with other products needs improvement."
"Their new SASE (secure access service edge) product would have been the one thing I would have requested. Now that they have that platform, I'd like to see it as integrated and seamless as possible with the core product. That's what they're working towards and that's where we're seeing the advancements."
"I wish they would advance more into the endpoint DLP solution. Currently they do not do anything around endpoint, they're still strictly cloud-based. The forward proxy is really the only thing they do. What I would like to see them do is to scan machines, workstations and servers, for information we might not want on those machines. That would be huge."
"Areas for improvement for the platform include addressing scalability and architecture concerns, especially for large deployments involving more than 500 or 1,000 users."
"Bitglass integration with some IDP providers needs improvement."
"In our environment, when an Active Directory password changes, we tend to have some latency issues with access. It takes about 15 minutes before that password is accessible through Bitglass after the change. That would be the major thing I see as a negative."
"One area for improvement in Forcepoint ONE is that you'll need more training to install the solution yourself. I practiced in a laboratory and I needed more technical information to do the installation."
 

Pricing and Cost Advice

"It is expensive compared to one of its competitors."
"Annual licenses cost $30 to $40 each."
"Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
"The product's pricing model accommodates diverse needs and deployment sizes."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"The cost of the solution's licenses depends on the particular use cases."
"The product is reasonably priced."
"The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"When considering only the cost, the solution may appear to be costly; however, when evaluated in terms of commercial value, Bitglass is not expensive."
"There is training involved. If you're going to add more people to it, such as cross train more of your group, there's a cost. Other than that, that's it. We have paid exactly what the invoices have said. We signed a three-year contract and not gone above it."
"The licensing cost for Forcepoint ONE would depend on the features, but the pricing is very competitive here in Brazil. The solution offers a good price, and I would rate it a three or a four in terms of pricing. I don't have information on whether there are additional costs apart from the standard licensing fees for Forcepoint ONE."
"We have our pricing by user. We do our pricing agreements annually. There are also additional costs for maintenance."
"The product is reasonably priced compared to other vendors. I rate the pricing a two or three."
"Typically, the longer you price forward, the better off you're going to be. They have been very willing to work with us on pricing."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
801,634 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
11%
Manufacturing Company
10%
Educational Organization
7%
Computer Software Company
21%
Manufacturing Company
7%
Financial Services Firm
6%
Government
5%
Computer Software Company
15%
Financial Services Firm
13%
Government
10%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
Sometimes the agent stops working in iboss, and we have to reinstall the agent. This is a hiccup that iboss should im...
What is your primary use case for iboss?
We use iboss for the proxy solution. I used iboss in my organization to block a few sites for a few of my employees.
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
What do you like most about Forcepoint ONE?
The platform's feature that has been most beneficial for our web security is its capability to replicate rules.
What is your experience regarding pricing and costs for Forcepoint ONE?
The product is reasonably priced compared to other vendors. I rate the pricing a two or three.
What needs improvement with Forcepoint ONE?
The solution's integration with other products needs improvement.
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
Bitglass
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
UNC-Charlotte
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Forcepoint ONE and other solutions. Updated: September 2024.
801,634 professionals have used our research since 2012.