Check Point Harmony SASE and ThreatLocker Zero Trust Endpoint Protection Platform compete in the cybersecurity space, focusing respectively on network and application security. Harmony SASE seems to have an edge in VPN and access management, while ThreatLocker excels in application security and allowlisting.
Features: Check Point Harmony SASE offers advanced features like split tunneling, MFA integration, and zero trust network access, focusing on VPN and secure network connectivity. ThreatLocker boasts allowlisting and application control with features such as ring-fencing and storage control, emphasizing a zero trust approach to application security.
Room for Improvement: Check Point Harmony SASE users recommend improvements in SD-WAN integration and portal performance, along with better documentation and flexible policy options. ThreatLocker users suggest enhancing UI, offering more training flexibility, and better PSA integration, with a focus on improving custom rule handling.
Ease of Deployment and Customer Service: Check Point Harmony SASE supports diverse environments, including private and hybrid clouds, with responsive, albeit sometimes slow, support service. ThreatLocker mirrors this deployment flexibility across cloud models, with user-reported quick and helpful support but notes of slower response times on occassion.
Pricing and ROI: Check Point Harmony SASE is positioned at a premium price, offering high ROI through security enhancements and incident reduction, yet seen as costly for smaller companies. ThreatLocker provides a flexible pricing model seen as reasonable with significant cost control, offering positive ROI through application security improvements and cost savings.
We are saving 40% of our time, which is good.
The measurable benefits of using ThreatLocker include ensuring real-time protection of organizational resources and maintaining user authentication and protection levels to reduce risks.
ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent.
It could be better, especially with response times.
I would rate it nine out of ten for scalability.
It is scalable to an extent, depending on where it is used.
After the last improvement, I can say it is much more stable now.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
Stability can be improved as there are times it goes down or requires management to adjust policies.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
The connectivity issue can be improved as at times it lags when connecting to their server.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
The pricing is reasonable and normal.
The firewall management is the most valuable feature for me.
The best key features of Harmony are stabilization, private access, and Internet access.
ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files.
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Perimeter 81 Benefits:
Perimeter 81 Features:
Reviews from Real Users
PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".
Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".
Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
ThreatLocker Zero Trust Endpoint Protection Platform offers robust endpoint security through application control and allowlisting, safeguarding servers and workstations from unauthorized software execution.
ThreatLocker Zero Trust Endpoint Protection Platform provides extensive application control with features like ring-fencing and selective elevation, ensuring meticulous execution management. Offering learning mode and extensive support, it integrates threat detection and activity monitoring to enhance compliance, reduce costs, and bolster cybersecurity through alerts and approvals. Despite its strengths, there are areas for improvement in training flexibility, policy updates, and interface enhancements, along with challenges in handling non-digitally signed software. Deployed across environments, it works well with existing cybersecurity instruments for real-time threat prevention.
What are the top features of ThreatLocker?ThreatLocker Zero Trust Endpoint Protection Platform is widely implemented to safeguard IT infrastructures against unauthorized access and application use. In sectors where data security is paramount, this platform enables users to prevent unauthorized software installations and control device applications, ensuring real-time threat prevention and compliance with industry regulations.
We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.