Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Skyhigh Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
6th
Ranking in ZTNA as a Service
10th
Ranking in Secure Access Service Edge (SASE)
9th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th)
Check Point Harmony SASE (f...
Ranking in Secure Web Gateways (SWG)
7th
Ranking in ZTNA as a Service
4th
Ranking in Secure Access Service Edge (SASE)
6th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
60
Ranking in other categories
Firewalls (15th), Anti-Malware Tools (6th), Enterprise Infrastructure VPN (7th), ZTNA (2nd)
Skyhigh Security
Ranking in Secure Web Gateways (SWG)
20th
Ranking in ZTNA as a Service
16th
Ranking in Secure Access Service Edge (SASE)
17th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
56
Ranking in other categories
Data Loss Prevention (DLP) (28th), Cloud Access Security Brokers (CASB) (11th)
 

Mindshare comparison

As of July 2025, in the Secure Access Service Edge (SASE) category, the mindshare of iboss is 1.7%, up from 1.2% compared to the previous year. The mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 3.4%, down from 4.4% compared to the previous year. The mindshare of Skyhigh Security is 1.8%, down from 2.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Access Service Edge (SASE)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
Nasseer Qureshi - PeerSpot reviewer
Delivers seamless and secure remote access while enhancing security posture
Check Point Harmony SASE (formerly Perimeter 81) offers strong features, but there are areas that could be improved. One area for improvement is integration with third-party identity providers. It works with standard SAML and SSO, but we would prefer deeper integrations with solutions such as Ping for more advanced identity-based policies. Additionally, a mobile-specific client or lightweight agent would be helpful for securing access from smartphones, especially in BYOD environments. We would appreciate more granular reporting and analytics, including better drill-down capabilities to investigate specific users or app activity. The logs are comprehensive, but filtering them can sometimes feel messy. The user interface on the management portal could be more intuitive, especially when managing multiple sites or remote offices. Some of the policy configuration steps are nested and could be streamlined.
Santiago Gomez - PeerSpot reviewer
Has improved the organization's PCI compliance with data loss prevention
I use the solution on a Macintosh computer and it has issues and does not work when I try to log in from the Safari Browser, but it works fine when I log in from the Google Chrome browser. The console has issues when the login is done through a Safari Browser. The console has to be more competitive and the compatibility of the browser needs to be better. I want to know about Skyhigh's competitiveness with other brands and about the vulnerability assessment and micro segmentations. I know Skyhigh has other products, but right now, I am studying what this new product is about. They only have English support, so I would like for them to add some Spanish support.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It was a very easy product to install. It can be deployed very fast."
"First of all, the security policies are essential. I do not have to rely solely on Active Directory for our users."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"iboss is among the few products providing inline filtering where no application is needed on the device."
"iboss is among the few products providing inline filtering where no application is needed on the device. It operates on the network side and is not device-based. This feature was one of the main reasons why we stayed with them for so long."
"We chose iboss for both zero trust and proxy (SWG) because their SWG was superior."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"The product has a reasonably high pricing."
"It's improved the security of every single OS in the organization as well as the visibility and security capabilities."
"The installation is very easy."
"The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
"The product’s ability to block phishing sites is valuable."
"The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment."
"The tool is easy to use and set up."
"The features are excellent, particularly the user interface and user accessibility."
"The initial setup is fairly straightforward and easy to perform."
"I personally don't have any issues with the performance or the stability of the solution."
"They were very, very aggressive in the market to get a new market share or to take over market share while other companies were being broken up."
"The solution significantly helps in enhancing security management."
"Skyhigh Security is user-friendly in terms of configuration and UI."
"The threat protection capabilities are very strong."
"It is easy to configure rules."
"All the information available on each service, including its risk assessment."
 

Cons

"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"File integrity monitoring would be very advantageous as an additional feature."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"The support is not very good."
"Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."
"The complex initial setup phase of the product is an area that can be improved"
"Sometimes, the product is very slow."
"The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."
"The overall UI could be improved and updated to bring a simpler feel to the application."
"In order to be able to invite users, send the agent and implement it, the user input must be generated manually."
"There is a hefty cost"
"An area for improvement in Skyhigh Security is its UI. It needs to be enhanced and made more user-friendly. Right now, the UI of Skyhigh Security is sometimes confusing. For example, my company is deploying Skyhigh Security for a client and integrating it on the cloud, from an on-premises deployment to a hybrid deployment. Though the experience isn't bad, there needs to be more enhancements. Another room for improvement in Skyhigh Security is the limited training resources, especially when you compare it with Cisco, which has many study materials in the market, even free training resources. You'll get limited resources if you search for Skyhigh Security tutorials on Google and YouTube. Because of high-security requirements and the training material for Skyhigh Security not being available, most engineers and architects avoid the product because there'd be a lack of knowledge in configuring and achieving the goals you'd want to reach via the use of Skyhigh Security. The NOC team deploying the product is having difficulty getting training resources for Skyhigh Security. You'll be charged an enormous amount if you search the market for training because of the limited resources available. Skyhigh Security needs to work on marketing and awareness as an improvement to the product."
"The solution is hard to configure, our team does not have specific training requirements for McAfee making it difficult."
"The tool could improve flexibility with the creation of reports/querying data."
"McAfee Web Gateway could improve the reporting. We have the reporting on a separate server and sometimes the database becomes full. These aspects could improve."
"It is an expensive solution."
"I think that the User Interface could be improved."
"The initial setup was challenging, and the documentation could be improved to make it easier."
"It would be nice to be able to get more advanced search functions to filter out data and quickly obtain the data that we need."
 

Pricing and Cost Advice

"We have not priced the solution recently, but they were competitive with other vendors in the past."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"The overall pricing for iboss is very competitive and transparent."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is expensive compared to one of its competitors."
"It is probably in line with other solutions, but I do not deal with the financial side."
"Overall I am very happy with the solution’s flexibility and pricing."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"The product is reasonably priced."
"The product is neither cheap nor expensive."
"Annual licenses cost $30 to $40 each."
"The cost of the solution's licenses depends on the particular use cases."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
"Pricing is not out of reach."
"Some of our clients have a perpetual license and pay additional support yearly."
"Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost."
"The solution's hardware is expensive."
"They definitely charge a huge amount. All the security service providers charge a huge amount."
"This is an expensive product, although it is made for larger enterprises and not for small organizations."
"The licensing fees are based on what environments you are monitoring."
"Have a risk-based approach towards pricing."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
861,803 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
18%
Financial Services Firm
7%
Manufacturing Company
6%
Comms Service Provider
5%
Educational Organization
14%
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
What do you like most about McAfee Web Gateway?
Data loss prevention and user behavior analysis are two valuable features.
What needs improvement with McAfee Web Gateway?
The solution has room for improvement in its DDoS protection. Additionally, the documentation needs enhancement to pr...
What is your primary use case for McAfee Web Gateway?
The typical use case for our clients is cloud security.
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
McAfee MVISION Cloud, McAfee MVISION Unified Cloud Edge, McAfee Web Gateway, McAfee MVISION CNAPP, and Skyhigh Networks, McAfee Web Gateway
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Western Union.Aetna.DirecTV.Adventist.Equinix.Perrigo.Goodyear.HP.Cargill.Sony.Bank of the West.Prudential.
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Skyhigh Security and other solutions. Updated: June 2025.
861,803 professionals have used our research since 2012.