Check Point Harmony SASE and Microsoft Defender for Endpoint are prominent contenders in the cybersecurity category. Check Point Harmony SASE generally has an edge due to split tunneling and MFA features, while Microsoft Defender for Endpoint excels in native integration with Microsoft products, making it particularly advantageous for users within the Microsoft ecosystem.
Features: Check Point Harmony SASE includes split tunneling, MFA integration, zero trust network access, and compatibility with multiple platforms. Microsoft Defender for Endpoint boasts AI-driven threat detection, vulnerability management, integration with Windows and Microsoft 365, and strong antivirus capabilities. Check Point’s split tunneling and MFA are valued for ease of use and enhanced security.
Room for Improvement: Check Point Harmony SASE could improve in real-time alerts, network integration (such as SD-WAN), and documentation and support. Microsoft Defender for Endpoint needs better ransomware detection, enhanced reporting features, and third-party integration. Both products could improve user interfaces and automation, with Microsoft needing streamlined deployment and Check Point requiring better scalability and portal performance.
Ease of Deployment and Customer Service: Check Point Harmony SASE offers straightforward deployment across hybrid and cloud environments but experiences slow support at times. Microsoft Defender for Endpoint integrates well within the Microsoft ecosystem, though configuration can be complex for large enterprises. Check Point is sometimes praised for responsive support, while Microsoft tends to provide stronger support but may struggle with complex issues.
Pricing and ROI: Check Point Harmony SASE has a higher price but provides significant security value and potential ROI through security and management savings, appealing to those wanting streamlined operations. Microsoft Defender for Endpoint is cost-effective as part of Microsoft 365, offering a lower-cost comprehensive security solution with favorable ROI from reduced threats and integration benefits.
We are saving 40% of our time, which is good.
The return on investment is primarily in time savings and better observability of what's happening.
Due to our size, we don't have access to direct technical support, but the knowledge base, Microsoft Learn, and the articles available are really good.
I rate Microsoft support 10 out of 10.
The level-one support seems disconnected from subject matter experts.
I would rate it nine out of ten for scalability.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
It's pretty easy to scale with Microsoft, as they make it easy if you look into the documentation.
Defender's scalability is phenomenal, and it's going to be one of the keys to resolving issues for the SOC.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
Defender for Endpoint is extremely stable.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
The connectivity issue can be improved as at times it lags when connecting to their server.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
We have multiple endpoints, and we want to look for signals across tenants.
An additional feature that could be included in the next release is free Copilot.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
The pricing, setup, and licensing were very easy and simple.
The firewall management is the most valuable feature for me.
The best key features of Harmony are stabilization, private access, and Internet access.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
Attack surface reduction and limiting attack surface vectors are valuable features.
Web filtering is the most valuable feature of Microsoft Defender for Endpoint because it effectively maintains security for website access.
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Perimeter 81 Benefits:
Perimeter 81 Features:
Reviews from Real Users
PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".
Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".
Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
Microsoft Defender for Endpoint is a comprehensive security solution that provides advanced threat protection for organizations. It offers real-time protection against various types of cyber threats, including malware, viruses, ransomware, and phishing attacks.
With its powerful machine-learning capabilities, it can detect and block sophisticated attacks before they can cause any harm. The solution also includes endpoint detection and response (EDR) capabilities, allowing organizations to quickly investigate and respond to security incidents. It provides detailed insights into the attack timeline, enabling security teams to understand the scope and impact of an incident.
Microsoft Defender for Endpoint also offers proactive threat hunting, allowing organizations to proactively search for and identify potential threats within their network. It integrates seamlessly with other Microsoft security solutions, such as Microsoft Defender XDR, to provide a unified and holistic security approach. With its centralized management console, organizations can easily deploy, configure, and monitor the security solution across their entire network.
Microsoft Defender for Endpoint is a robust and scalable security solution that helps organizations protect their endpoints and data from evolving cyber threats.
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.