Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Netskope Private Access comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in ZTNA as a Service
12th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
14
Ranking in other categories
Secure Web Gateways (SWG) (12th), Internet Security (4th), Web Content Filtering (4th), Cloud Access Security Brokers (CASB) (8th), Secure Access Service Edge (SASE) (10th)
Check Point Harmony SASE (f...
Ranking in ZTNA as a Service
4th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (5th), Firewalls (15th), Anti-Malware Tools (7th), Enterprise Infrastructure VPN (7th), ZTNA (3rd), Secure Access Service Edge (SASE) (6th)
Netskope Private Access
Ranking in ZTNA as a Service
7th
Average Rating
8.6
Reviews Sentiment
7.6
Number of Reviews
14
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
reviewer8099174 - PeerSpot reviewer
Secure access with an intuitive design and straightforward controls
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a broader range of third-party tools would be beneficial for seamless compatibility with various existing systems. As for additional features in the next release, it would be great to see advanced threat detection and response capabilities integrated into the platform. This would further enhance security by proactively identifying and mitigating potential threats. Additionally, improved mobile device management features and more comprehensive user behavior analytics would be valuable additions to meet evolving cybersecurity needs.
Christian Dagal - PeerSpot reviewer
Provides network visibility, infrastructure protection and advanced security protections, especially the DLP (Data Loss Protection)
Room for improvement is more on the policies offered for DLP. Netskope detects certain data or contents, but there are some limitations on how we can customize those policies for DLP. In the next release, I hope we can see more use cases for mobile devices, not just for laptops or servers but also for key features that will be available on mobile devices or smartphones.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"iboss has significantly lowered the number of security incidents. It is crazy how much it blocks and how much it is aware of the outside danger."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"It was a very easy product to install. It can be deployed very fast."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"HTTPS decryption is a valuable service and not always found in cloud-based secure web gateways."
"The product's initial setup phase is very simple."
"It has provided a seamless gateway to much-needed platforms."
"Overall, the unified agent covers endpoints as well as prevents web browser attacks."
"The Check Point portfolio showcases very strong products."
"The scalability is good, and I'd give it an eight out of ten."
"It keeps us all accountable and ensures secure internet connections while we all work remotely."
"The reports give a simple overview of the traffic pattern within the organization."
"It is a stable solution...It is a scalable solution."
"We can block and alert the ports and allow the public traffic software in our environment."
"In the VPN scenario, what was happening, the user would get back to the complete source. But in NPA, the application will go to the user. There is an outbound connection. There is no inbound. Storage providers are also not there. It's the best feature because it is the replacement of the VPN."
"The base features have been fantastic. The ability to be able to granularly assign application access to end-users has been really good."
"With private access or next-gen VPN, they are able to keep you secure, but they are invisible in terms of how they do it. Anybody working from home and trying to bring up VPN quickly can pretty much get VPN up and running in a matter of minutes because this doesn't require any VPN technology on-prem. All the VPN technologies that you're using to access applications on-premise can be eliminated by using their software. If you're accessing Microsoft 365 or salesforce.com, you can go straight out from your home office or home internet to that application rather than having to come through a VPN. It still has all the policies enforced, and it mitigates any business risks in terms of how that user is accessing that application and what they're doing inside of it. VPN piece is really critical, especially at this time of Covid, and your latency also goes down. Your latency gets better by using the platform because they're intercepting your traffic, routing it through their local data center, and then sending it to whichever SaaS service or whatever you're going to. It does it better, faster, and quicker with all your governance policies enforced, rather than you having to go through your data center. So, all the traffic gets hauls there, and then that traffic has got to route somewhere else, and then it has got to go up to the cloud. Your latency actually goes down. They can guarantee 15 milliseconds or less pretty much across anywhere on the planet for about 95% or 90% of it."
"Netskope enables users to securely access private applications remotely without a VPN."
"There are several valuable features, like advanced security protections, especially the DLP (Data Loss Protection), and there's also browser and web filtering, or content filtering for our users to protect them when accessing certain links or websites, ensuring their security and permission."
"The initial setup of Netskope Private Access is pretty simple and straightforward."
 

Cons

"To scale up, a new iboss Node Blade Chassis must be purchased."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"The reporting feature needs improvement. It doesn't give you the expected results. It is quite difficult to get the specific reports needed, and it is not as intuitive as the rest of the platform."
"The dashboards for local use could be better."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"The reporting feature needs improvement."
"Sometimes, obviously, there are bugs."
"Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."
"Providing USB control in a Linux environment will give more control over data security."
"In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity."
"One of our challenges is ensuring the security of our cloud-based operations."
"If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on."
"Harmony lacks this ability when anything more than a vanilla access policy is used (we use layers and source user objects in our policy which make this impossible according to Check Point)."
"As it is a new market solution, I still face some instabilities in access at certain times of the day when I have more than 150 users using it simultaneously."
"The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."
"The ability to provide more security around agentless access has room for improvement."
"The cost has room for improvement."
"Netskope detects certain data or contents, but there are some limitations on how we can customize those policies for DLP."
"Netskope Private Access only supports TCP and UDP ports and does not support ICMP or ping."
"We faced certain issues with China users as it can be rather challenging for them due to the presence of Great Firewall."
"I would rate the stability around seven out of ten. Sometimes, we face some difficulty, but it depends upon the complexity of the environment."
"Netskope needs to provide some kind of data protection strategy as well because, currently, if you connect through private access, we don't have any data protection policies or implementation."
"The solution needs to develop faster features. Its interoperability feature is not working. It takes six months to one year for any product to implement the improvements. However, the process should be faster to implement the changes quickly."
 

Pricing and Cost Advice

"It is expensive compared to one of its competitors."
"The overall pricing for iboss is very competitive and transparent."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is probably in line with other solutions, but I do not deal with the financial side."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
"Overall I am very happy with the solution’s flexibility and pricing."
"The product is neither cheap nor expensive."
"The cost of the solution's licenses depends on the particular use cases."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"It is significantly cost-effective compared to its contenders."
"I believe that the price for Netskope Private Access is included in the features or functionality my company purchased from NetSkope."
"The tool's price is normal. It is not very cheap but good compared to the competitors."
"Netskope Private Access is more inexpensive than other products."
"There was about 60% ROI, just in terms of savings. We had 40% to 60% reduction in monthly operational costs by using Netskope."
"When it comes to pricing, Netskope Private Access is relatively cheap compared to other solutions."
"It is not the most expensive option, being more affordable than Zscaler, but it's also not the most budget-friendly choice available."
"It is not cheap, but the value of the solution is there. It's worth the investment."
report
Use our free recommendation engine to learn which ZTNA as a Service solutions are best for your needs.
831,265 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
9%
Government
6%
Computer Software Company
20%
Manufacturing Company
6%
Financial Services Firm
6%
Government
5%
Computer Software Company
15%
Financial Services Firm
13%
Manufacturing Company
11%
Energy/Utilities Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
I have the same complaint about them that I have about other software companies. Sometimes when you call in support, ...
What is your primary use case for iboss?
We are a PreK-12 public school district, and we use iboss to filter internet content for our students at home and sta...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
What do you like most about Netskope Private Access?
Even without extensive training, if you're a proficient IT professional, you can easily configure it.
What needs improvement with Netskope Private Access?
The solution needs to develop faster features. Its interoperability feature is not working. It takes six months to on...
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
No data available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Evalueserve, Stroock, Apria, Ather Energy
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Netskope Private Access and other solutions. Updated: January 2025.
831,265 professionals have used our research since 2012.