Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Prisma Access by Palo Alto Networks comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
5th
Ranking in ZTNA as a Service
8th
Ranking in Secure Access Service Edge (SASE)
8th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th)
Check Point Harmony SASE (f...
Ranking in Secure Web Gateways (SWG)
7th
Ranking in ZTNA as a Service
4th
Ranking in Secure Access Service Edge (SASE)
5th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
62
Ranking in other categories
Firewalls (16th), Anti-Malware Tools (6th), Enterprise Infrastructure VPN (7th), ZTNA (3rd)
Prisma Access by Palo Alto ...
Ranking in Secure Web Gateways (SWG)
4th
Ranking in ZTNA as a Service
2nd
Ranking in Secure Access Service Edge (SASE)
2nd
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
64
Ranking in other categories
Cloud Access Security Brokers (CASB) (1st), Enterprise Infrastructure VPN (6th)
 

Mindshare comparison

As of September 2025, in the Secure Access Service Edge (SASE) category, the mindshare of iboss is 2.0%, up from 1.2% compared to the previous year. The mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 3.9%, down from 4.7% compared to the previous year. The mindshare of Prisma Access by Palo Alto Networks is 15.5%, down from 18.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Access Service Edge (SASE) Market Share Distribution
ProductMarket Share (%)
Prisma Access by Palo Alto Networks15.5%
Check Point Harmony SASE (formerly Perimeter 81)3.9%
iboss2.0%
Other78.6%
Secure Access Service Edge (SASE)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
Nasseer Qureshi - PeerSpot reviewer
Delivers seamless and secure remote access while enhancing security posture
Check Point Harmony SASE (formerly Perimeter 81) offers strong features, but there are areas that could be improved. One area for improvement is integration with third-party identity providers. It works with standard SAML and SSO, but we would prefer deeper integrations with solutions such as Ping for more advanced identity-based policies. Additionally, a mobile-specific client or lightweight agent would be helpful for securing access from smartphones, especially in BYOD environments. We would appreciate more granular reporting and analytics, including better drill-down capabilities to investigate specific users or app activity. The logs are comprehensive, but filtering them can sometimes feel messy. The user interface on the management portal could be more intuitive, especially when managing multiple sites or remote offices. Some of the policy configuration steps are nested and could be streamlined.
Amar-Patil - PeerSpot reviewer
Enables seamless policy management and supports secure remote work
Our primary use case for Prisma Access by Palo Alto Networks is to control the internet and serve as an internet proxy. Additionally, we use it for secure remote work One of the most valuable features of Prisma Access by Palo Alto Networks is the ability to manage on-premise firewalls. We can…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"iboss is among the few products providing inline filtering where no application is needed on the device. It operates on the network side and is not device-based. This feature was one of the main reasons why we stayed with them for so long."
"iboss is easy to use despite its complexity. Multiple engineers manage it, but it's significantly more straightforward to administer than traditional VPNs and web proxies."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"The console is cloud-based, which is something I really appreciate."
"We chose iboss for both zero trust and proxy (SWG) because their SWG was superior."
"It was a very easy product to install. It can be deployed very fast."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"It keeps us all accountable and ensures secure internet connections while we all work remotely."
"Scaling Perimeter 81 was easy to do."
"The solution has many valuable aspects, including anti-Phishing, which blocks phishing attacks in all applications (email, messaging, and social networks)."
"Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
"Using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials."
"The characteristics that I have liked the most are the ease of implementation and administration."
"It has provided a seamless gateway to much-needed platforms."
"The tool is easy to use and set up."
"You have the ability to create your own expressions for your data. Palo Alto understands that DLP is not the same for all consumers. You might have a particular need to fulfill, and they give you the opportunity to create a custom expression to match the specific format that you have. For a confidential file property that you have in your files, you can add a metadata field. It gives you that opportunity to create that."
"Monitoring is the most valuable feature because we can easily monitor all kinds of stuff coming over the network. We can check the dashboard and work accordingly."
"The tool's consolidation is pretty quick."
"The protection for web-based applications was helpful for my colleagues who didn't want a particular application on their devices. And the non-web access protection was more for our developers because they were writing and building code on their computers. Prisma Access was able to protect them."
"The most valuable feature is the ability to change the gateway. For example, if there's a problem with a specific region or vendor, we can make modifications. The solution is scalable, and there are different gateways that can be created depending on the demand."
"The visibility perspective is pretty cool. If I want to know how much data is being used for a specific project, I can look at how much data has been used, from which region, and which users have been connected. That visibility is very good so that I can see how many licenses we have and how many are used."
"Prisma Access gives us security from a single point. It controls mobile users and determines how secure their networks will be, including from where they will get internet access. We can optimize things and add security profiles centrally."
"Security is absolutely spot-on, really top-notch. It's the result of all the components that come together, such as the HIP [Host Information Profile] and components like Forcepoint, providing end-user content inspection, and antivirus. It incorporates DLP features and that's fantastic because Prisma Access makes sure that all of the essential prerequisites are in place before a user can log in or can be tunneled into."
 

Cons

"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"One thing I would like to see differently with their Zero Trust platform is that some of the AI aspects related to high-risk activities have more false positives."
"Sometimes, obviously, there are bugs."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"The reporting feature needs improvement."
"The dashboards for local use could be better."
"File integrity monitoring would be very advantageous as an additional feature."
"The cost is a bit expensive for most users."
"One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."
"The support is not very good."
"Check Point Harmony SASE needs improvement as it is a very new product that lacks very basic features, and it can start working more with the customer for better implementation."
"More report and alert options would be useful."
"Sometimes downloading PDF files can be slow."
"Harmony lacks this ability when anything more than a vanilla access policy is used (we use layers and source user objects in our policy which make this impossible according to Check Point)."
"They could improve on the available public documentation."
"When it comes to the VPN, it uses the global protect VPN functionality to connect remotely, but it has a feature limitation for assigning multiple IP sub-links to different user groups. It would be much better if we are able to assign the current IP blocks for the sub-links based on the user groups."
"GlobalProtect can face challenges with latency, especially when remote workers connect to centralized locations."
"Palo Alto's operational and support model needs improvement since we have faced issues with resolving problems."
"There is a lack of integration with third-party solutions like CrowdStrike or SentinelOne in Prisma Access by Palo Alto Networks. Although they have a tight ecosystem with their products, opening up for integration with other solutions would be beneficial."
"The one thing that I've been a little bit disappointed with is when we have had to open cases with Palo Alto about Prisma Access issues. Versus their other platforms, like their firewalls, where we tend to get really quick responses and very definitive answers, the few tickets I've had to open for Prisma Access have taken them longer to respond to. And they haven't necessarily given me the kind of answer I was looking for, meaning a fix to the problem."
"Though the monitoring is fine, the solution should improve its application graphs and interface monitoring."
"They can add some new characteristics. For example, when an incident triggers, they can automatically send a template for a particular match that is related to the policy. We don't have that right now. It is something to improve. There could be more automation for certain actions. For example, for a particular group, it can send an administrator alert to their manager. It was one of the concerns of our customers."
"Its security is good. Everything is good, but the way the dashboard responds can be improved. It takes time to implement a policy. If you change only two or three lines and push the policy to make the change work, it takes 20 to 30 minutes even for a small change. That is something very irritating from the implementation perspective."
 

Pricing and Cost Advice

"It is probably in line with other solutions, but I do not deal with the financial side."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The overall pricing for iboss is very competitive and transparent."
"It is expensive compared to one of its competitors."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users."
"Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"Overall I am very happy with the solution’s flexibility and pricing."
"The product is neither cheap nor expensive."
"Regarding pricing, I can say that the more the number of users, the less they have to pay."
"The product is reasonably priced."
"The price has been good for the ROI during these difficult times for the cruise industry. There are no hidden costs; what the product offers is what you get."
"We have to pay additional costs for maintenance and support services."
"The solution is expensive."
"This is not an expensive product and everything is included with one license."
"Based on what I have heard from others, it is a pricey solution as compared to its peers, but I am not sure. However, considering the features that it offers, it is a break-even point. You get whatever they are promising."
"Prisma Access by Palo Alto Networks has flexible licensing models with different categories. It comes with different features which can be removed if not needed. However, its pricing is high."
"Prisma SaaS is more expensive than similar solutions but I think it's worth it."
"The pricing for this solution is on the higher end."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
867,676 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Financial Services Firm
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
15%
Financial Services Firm
7%
Comms Service Provider
6%
Government
6%
Computer Software Company
12%
Manufacturing Company
12%
Financial Services Firm
12%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise5
By reviewers
Company SizeCount
Small Business51
Midsize Enterprise20
Large Enterprise15
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise21
Large Enterprise28
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What do you like most about Prisma Access by Palo Alto Networks?
The most valuable features of the solution are in the areas of the secure remote access it provides while also being ...
What is your experience regarding pricing and costs for Prisma Access by Palo Alto Networks?
From my experience, Palo Alto is more expensive compared to solutions like Netskope and Triscale.
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
Palo Alto Networks Prisma Access, Prisma Access, GlobalProtect, Palo Alto GlobalProtect Mobile Security Manager, Prisma SaaS by Palo Alto Networks, Prisma Access
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Concord Hospital, State of Colorado, Essilor International, RheinLand Versicherungsgruppe, University of Westminster, Universidade Nove de Julho, SPAR Austria, CAME Group, ZipRealty, Greenhill & Co., IKT Agder, Aviva Stadium, Animal Logic, Management & Training Corporation, Brigham Young University Hawaii, School District of Chilliwack
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Prisma Access by Palo Alto Networks and other solutions. Updated: September 2025.
867,676 professionals have used our research since 2012.