Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Safe-T Secure Application Access comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 24, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Netgate TNSR
Sponsored
Average Rating
7.0
Number of Reviews
1
Ranking in other categories
Virtual Routers (3rd)
Check Point Harmony SASE (f...
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
57
Ranking in other categories
Secure Web Gateways (SWG) (5th), Firewalls (15th), Anti-Malware Tools (7th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (4th), ZTNA (3rd), Secure Access Service Edge (SASE) (6th)
Safe-T Secure Application A...
Average Rating
7.8
Reviews Sentiment
7.7
Number of Reviews
8
Ranking in other categories
Enterprise Infrastructure VPN (43rd), Access Management (28th), ZTNA (27th)
 

Featured Reviews

reviewer1642500 - PeerSpot reviewer
Good performance, stable, but price could be reduced
I am using Netgate TNSR for personal network security The solution has good performance. I have been using Netgate TNSR for approximately two years. The solution is stable. The scalability could improve. I have not needed to use technical support. The installation is very simple, all you…
reviewer8099174 - PeerSpot reviewer
Secure access with an intuitive design and straightforward controls
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a broader range of third-party tools would be beneficial for seamless compatibility with various existing systems. As for additional features in the next release, it would be great to see advanced threat detection and response capabilities integrated into the platform. This would further enhance security by proactively identifying and mitigating potential threats. Additionally, improved mobile device management features and more comprehensive user behavior analytics would be valuable additions to meet evolving cybersecurity needs.
it_user790473 - PeerSpot reviewer
The architecture is open to integration and development, making the product very flexible
We have a lot of in-house applications that we must integrate with a secure email system. We are a financial institute, so we must use it to send emails to our customers securely, because these emails contain sensitive customer data. The architecture of the product is very open to development, plug-ins and integration with in-house systems. We have been able integrate this system into our CRM and other operational systems. We didn't find that kind of flexibility in other secure email products. We have also been able to customize the user interface so it is branded and able to "talk" our marketing language. There is also a local Israeli vendor that helps us to improve the product, add the new features.
report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
831,020 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Comms Service Provider
8%
Manufacturing Company
8%
Financial Services Firm
6%
Computer Software Company
20%
Manufacturing Company
6%
Financial Services Firm
6%
Government
5%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What do you like most about Netgate TNSR?
It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled.
What is your experience regarding pricing and costs for Netgate TNSR?
The product is very cost-effective and has no requirement for additional licenses. The setup is not easy. Users need ...
What is your primary use case for Netgate TNSR?
THe solution is used as a primary gateway with two lease lines of 450 Mbps total. Around 200 users are under it. Ther...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
Ask a question
Earn 20 points
 

Also Known As

TNSR
Check Point Quantum SASE
Safe-T SDA, Safe-T, Safe-T Software-Defined Access
 

Overview

 

Sample Customers

US Army, TrustCo Bank, Arkansas State University
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Safe-T Secure Application Access and other solutions. Updated: December 2024.
831,020 professionals have used our research since 2012.