Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.3
Organizations experienced varied ROI from Check Point Harmony SASE, noting security improvements, cost savings, and reduced VPN reliance.
Sentiment score
8.2
ThreatLocker enhances security and productivity with real-time protection, leading to revenue growth and improved efficiency in one year.
We are saving 40% of our time, which is good.
The measurable benefits of using ThreatLocker include ensuring real-time protection of organizational resources and maintaining user authentication and protection levels to reduce risks.
 

Customer Service

Sentiment score
7.3
Customer feedback on Check Point Harmony SASE's support is mixed, with praise for expertise and criticism for response times.
Sentiment score
8.4
ThreatLocker Zero Trust Endpoint Protection offers highly-rated, efficient customer service, with rapid response times and knowledgeable support, achieving user satisfaction.
ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent.
It could be better, especially with response times.
 

Scalability Issues

Sentiment score
8.2
Check Point Harmony SASE is scalable, adaptable, and easy to deploy, benefiting both small-scale and large-scale dynamic operations.
Sentiment score
8.3
ThreatLocker efficiently scales for all business sizes, seamlessly managing thousands of endpoints without issues, supporting diverse infrastructures.
I would rate it nine out of ten for scalability.
It is scalable to an extent, depending on where it is used.
 

Stability Issues

Sentiment score
7.9
Check Point Harmony SASE provides stable, reliable access, excelling in diverse environments despite occasional issues under heavy loads.
Sentiment score
6.8
ThreatLocker offers stable endpoint protection, with minimal issues that are quickly resolved, enhancing reliability and performance for users.
After the last improvement, I can say it is much more stable now.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
Stability can be improved as there are times it goes down or requires management to adjust policies.
 

Room For Improvement

Check Point Harmony SASE needs more features, better documentation, improved speed, integrations, user interface customization, and competitive pricing.
ThreatLocker could enhance its platform with flexible training, user interface improvements, better integrations, and more comprehensive support.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
The connectivity issue can be improved as at times it lags when connecting to their server.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
 

Setup Cost

Check Point Harmony SASE offers flexible, competitive pricing, but smaller companies may find minimum user licensing a challenge.
Enterprise users value ThreatLocker's cost-effective Zero Trust Platform for its comprehensive features, excellent support, and customizable tiered pricing.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
The pricing is reasonable and normal.
 

Valuable Features

Check Point Harmony SASE provides secure connections with easy setup, advanced security features, and efficient management, enhancing user security and accessibility.
ThreatLocker offers mobile access, zero trust protection, granular control, and support, enhancing security and reducing management costs.
The firewall management is the most valuable feature for me.
The best key features of Harmony are stabilization, private access, and Internet access.
ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files.
 

Categories and Ranking

Check Point Harmony SASE (f...
Ranking in ZTNA
3rd
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
59
Ranking in other categories
Secure Web Gateways (SWG) (5th), Firewalls (17th), Anti-Malware Tools (7th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (5th), Secure Access Service Edge (SASE) (6th)
ThreatLocker Zero Trust End...
Ranking in ZTNA
8th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (11th), Advanced Threat Protection (ATP) (8th), Application Control (4th), Ransomware Protection (5th)
 

Mindshare comparison

As of February 2025, in the ZTNA category, the mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 4.7%, down from 6.7% compared to the previous year. The mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 0.8%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
ZTNA
 

Featured Reviews

reviewer8099174 - PeerSpot reviewer
Secure access with an intuitive design and straightforward controls
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a broader range of third-party tools would be beneficial for seamless compatibility with various existing systems. As for additional features in the next release, it would be great to see advanced threat detection and response capabilities integrated into the platform. This would further enhance security by proactively identifying and mitigating potential threats. Additionally, improved mobile device management features and more comprehensive user behavior analytics would be valuable additions to meet evolving cybersecurity needs.
Musah Ibrahim - PeerSpot reviewer
Highly effective at controlling applications and securing our systems
As an architecture firm, we rely on TAISE’s Cybersecurity-as-a-Service (CaaS) to keep our systems safe from malware threats. TAISE introduced us to ThreatLocker, which has become essential in safeguarding our infrastructure by blocking unapproved applications and defending against unknown malware. Given our exposure to frequent malware, ThreatLocker, through TAISE's expert implementation, has proven invaluable ThreatLocker Protect is very simple and easy to understand. You do not need much technical knowledge to be able to use it. It is very good. Anybody with a bit of IT knowledge is able to handle it. Ringfencing adds an extra layer of defense. If an application is compromised, you can just exclude the computer and do your troubleshooting and find out what the problem was. It goes hand in hand with application whitelisting. It has been very helpful. It adds an extra security system which is very much needed for our infrastructure. ThreatLocker Protect has improved my organization greatly. Before using ThreatLocker Protect, we experienced a malware attack that caused significant damage, corrupting many of our files. Since implementing ThreatLocker Protect, we have not faced any such issues, and our operations have been smooth. We were able to realize its benefits immediately. No user can install any unknown applications or unauthorized applications on their own. I have been able to manage my systems effectively without any malware. ThreatLocker Protect has reduced our help desk tickets by about 40%, as every software they use is approved by me before use, limiting unauthorized installations. ThreatLocker Protect has freed up a lot of time. I do not have to do much with the help desk because our systems are protected with ThreatLocker Protect.
report
Use our free recommendation engine to learn which ZTNA solutions are best for your needs.
838,640 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Manufacturing Company
6%
Financial Services Firm
6%
Government
5%
Computer Software Company
37%
Retailer
8%
Financial Services Firm
5%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations: * Evaluate your needs * Understand pricing models * Request a quote * Compare ...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options wit...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users.
 

Also Known As

Check Point Quantum SASE
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Information Not Available
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. ThreatLocker Zero Trust Endpoint Protection Platform and other solutions. Updated: January 2025.
838,640 professionals have used our research since 2012.