Try our new research platform with insights from 80,000+ expert users
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Reseller
Top 5Leaderboard
Offers great performance and reliability
Pros and Cons
  • "The product's initial setup phase is very simple."
  • "When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end."

What is our primary use case?

In our company, Quantum SASE is available for namesake in our environment since we rely on Check Point Secure Web Gateway for its firewall functionalities. Most of our company's customers use firewalls from Check Point Software, Palo Alto, or Fortinet. The simple use case of the tool for our company's customers stems from the fact that they have a general internal network or many users for which a firewall is required to secure the network traffic flow and communications that happen from outside to inside the company.

What needs improvement?

When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end. There are no OEMs in the market that provide 100 percent security. The security of the product has to be improved.

For how long have I used the solution?

I have been using Check Point Quantum SASE for seven years.

What do I think about the stability of the solution?

The product's stability is very good. Stability-wise, I rate the solution a nine out of ten.

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
September 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,370 professionals have used our research since 2012.

What do I think about the scalability of the solution?

In firewall products, scalability is not required. If you set up the two firewall tools, no scalability is required. Scalability-wise, I rate the solution a nine out of ten.

My company deals with 20 or 30 customers of the tool.

My company's customers extensively use the product.

How are customer service and support?

The support from Check Point Quantum SASE is very good, and the response from the support team is fast. The support from Check Point Quantum SASE is customer-friendly and knowledgeable about troubleshooting issues.

How was the initial setup?

The product's initial setup phase is very simple.

The product's installation process consists of racking, stacking, and mounting, after which a user can directly start the appliance and configure the HA status and policies.

The solution is deployed on an on-premises model.

The solution can be deployed in two or three days.

One engineer is required to take care of one single deployment process.

What was our ROI?

The ROI of the tool can be calculated depending on the tool's ability to be used for multiple use cases and protect the confidential data of users. It is very simple to calculate the product's ROI. If you use Check Point Quantum SASE, then your internal users are protected from outside attackers.

What's my experience with pricing, setup cost, and licensing?

Check Point Quantum SASE provides SASE functionalities with all the required features. Check Point Quantum SASE's price is higher than what its competitors offer. The price of the product is something that depends on the requirements, and the purchase or order value of the customers.

The price of the tool depends on whether customers need SMTP, NGTP, or Check Point NG licenses.

I consider the product to be a medium-priced solution. There are no additional costs attached to the tool.

What other advice do I have?

The solution enhances the ability of our company's remote workforce to secure access to corporate resources since we use VPN to secure work-from-home users and domain users.

Check Point Quantum SASE offers all the features essential for threat prevention, threat emulation, threat extraction, anti-spam, and anti-malware.

In relation to Check Point Quantum SASE, I haven't worked with the part involving WAN architecture. I only handle cybersecurity for a portfolio with respect to the LAN segment, and not WAN segment.

I rate the tool's performance a ten out of ten.

Check Point Quantum SASE can be described as the world's best security product without a doubt since it is a market leader in its segment.

The performance and reliability offered by the tool depend on the customer environment, and after considering aspects like throughput, how many users, and how many concurrent connections, my company plans the sizing part of the tool.

The value of working with the tool is good, as it can secure users, environments, and applications.

I rate the tool a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
Daniel Goldfeld - PeerSpot reviewer
Vice President of Customer Success at Mine - The All-in-One Privacy Suite
Real User
Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions
Pros and Cons
  • "Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.)."
  • "The platform still lacks relevant dashboards and the ability to customize them based on our needs."

What is our primary use case?

We use the solution for secure remote access and access policy governance.

As part of our SOC2 Type 2 audit preparation, we wanted a solution that will be able to enforce secure passwords and two-factor authentication on our remote access to company development and production environments (hosted in GCP).

We were using a different VPN provider yet struggled with getting those policies in place. As timelines were very aggressive, we decided to look for a managed service or a SaaS offering, and Perimeter 81 was very quick to respond and provide a test account.

How has it helped my organization?

We were finalizing our SOC2 Type 2 audit and decided to move to a different remote access vendor.

We were able to implement Perimeter 81 within an hour with all the required services (SSO) and infrastructure (GCP and SaaS applications).

Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.).

The team is now evaluating the Firewall-as-a-Service capabilities as well as the Secure Web Gateways to see if we require any additional policies in place as we're rapidly growing.

What is most valuable?

The multiple geographical access points with dedicated IP addresses allow the team to deploy site-2-site tunnels with specific IP restrictions as well as configure IP whitelisting on many of our SaaS applications. 

The plug-and-play Wireguard site-2-site connector was a great add-on as it allowed the team to just run a script and have our entire GCP network get connected to Perimeter 81 without any manual configuration. 

SAML and SCIM support made our life much easier as every new user just logs into the account, gets the correct permissions based on their SSO group enrolment, and is immediately able to access relevant resources, SaaS applications, and environments.

What needs improvement?

The platform still lacks relevant dashboards and the ability to customize them based on our needs. 

We would love to also see real-time usage and traffic data as well as be able to build reports. 

Adding better QoS and traffic shaping to the product will be a nice add-on as it'll allow our admins to prioritize some traffic over others and identify users that are heavy traffic users in the platform.

We need the ability to connect the agent prior to computer login. The ability to allow a silent connection (i.e. the agent is completely invisible to the user) could be cool for bigger organizations.

For how long have I used the solution?

I've used the solution for over a month.

What do I think about the stability of the solution?

So far, the solution looks good and stable. There are no downtimes or disconnections.

How are customer service and support?

They offer great chat support. Technical support is responding within minutes with helpful answers.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've used NordVPN, Cisco AnyConnect, OpenVPN, and FortiClient.

How was the initial setup?

The initial setup is very easy to set up thanks to a helpful and intuitive UI as well as plug-and-play connectors for the site-2-site deployment.

What was our ROI?

The ROI is very good, as we were able to do a cut-off within a week and using it since.

What's my experience with pricing, setup cost, and licensing?

It was great to be able to implement everything without any assistance and within an hour.

Which other solutions did I evaluate?

We evaluated FortiClient, NordVPN, and OpenVPN.

What other advice do I have?

The solution has great UI/UX and a super helpful support and documentation center.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
September 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,370 professionals have used our research since 2012.
Works at Miller Insurance Services LLP
User
Top 20
Its user-friendly interface and seamless integration with existing IT systems allow for minimal disruption and quick deployment
Pros and Cons
  • "While the higher cost and complexity may pose challenges for smaller companies without extensive IT resources, the value provided by Check Point's advanced capabilities and excellent 24/7 support justifies the investment. Overall, it is highly recommended that insurance firms prioritize data security and regulatory compliance, especially medium to large companies with the resources to manage and fully utilize its features."
  • "Although the interface is user-friendly, further simplification and customization options tailored for non-technical users would benefit smaller firms without dedicated IT teams. Intuitive dashboards and guided setups can help in reducing the learning curve."

What is our primary use case?

We are a company that is rapidly expanding our presence across multiple regions and moving key operations to a hybrid cloud model and needed a scalable, prevention-first security platform to bolster its security stack. 

Check Point Security Tooling by Check Point Software Technologies offers a robust and comprehensive cybersecurity solution tailored for the insurance industry. With features like advanced threat detection using AI and machine learning, firewalls, intrusion prevention, and endpoint protection, it ensures the security of sensitive customer data and compliance with industry regulations. Its user-friendly interface and seamless integration with existing IT systems allow for minimal disruption and quick deployment, making it adaptable to both small and large insurance firms.

How has it helped my organization?

The solution has improved our organization by providing a scalable, prevention-first security platform to better protect critical applications and sensitive client data, and meet industry compliance requirements. We chose Check Point Quantum Security Gateways and Check Point CloudGuard Network Security to protect our on-premises and cloud-based assets. The Quantum gateways in the data center are paired with a cluster of CloudGuard cores in the cloud, safeguarding assets and services in both environments with next-generation threat prevention. 

Check Point’s unified security management made it easy to implement controls and access real-time security data for on-premises and cloud environments. Since the rollout, Quantum's anti-bot, antivirus and SandBlast capabilities have delivered consistent protection. 

What is most valuable?

The following features provide consistent protection and make it easy to ensure security everywhere.

  • SandBlast Zero-Day Protection in the Quantum Security Gateways, which defends against the latest cyber threats.
  • Advanced threat prevention, the Intrusion Prevention System, and threat extraction defend against the latest cyber threats.
  • The unified security management made it easy to implement controls and access real-time security data for on-premises and cloud environments.

While the higher cost and complexity may pose challenges for smaller companies without extensive IT resources, the value provided by Check Point's advanced capabilities and excellent 24/7 support justifies the investment. Overall, it is highly recommended that insurance firms prioritize data security and regulatory compliance, especially medium to large companies with the resources to manage and fully utilize its features.

What needs improvement?

Although the interface is user-friendly, further simplification and customization options tailored for non-technical users would benefit smaller firms without dedicated IT teams. Intuitive dashboards and guided setups can help in reducing the learning curve.

Increasing the automation capabilities for threat detection, response, and reporting can help reduce the manual workload on IT staff. Automated compliance reporting tailored to regulatory requirements could be particularly beneficial.

For how long have I used the solution?

I have been using it for a year.

What do I think about the stability of the solution?

Stability is excellent.

What do I think about the scalability of the solution?

Scalability is excellent.

How are customer service and support?

The customer support is excellent.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup was straightforward using the unified security management modules.

What about the implementation team?

We implemented it in-house.

What was our ROI?

It is difficult to calculate ROI, as it mitigates risk.

What's my experience with pricing, setup cost, and licensing?

It is an expensive solution, but worth the cost.

Which other solutions did I evaluate?

We looked at various options.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS
Real User
Top 5Leaderboard
Good threat protection and VPN authentification with real-time visibility
Pros and Cons
  • "It has centralized management that allows administrators to supervise and control the security of the entire network."
  • "Support is one of the points of improvement."

What is our primary use case?

This tool was acquired when the organization made the decision to move the entire infrastructure to the cloud. It was going to handle different types of schemes such as IaaS and SaaS up to Office 365, so all these schemes were going to meet the need for accessibility by users. We needed a tool with complex, centralized management that would help us prevent all types of malicious attacks both from inside and outside in order to guarantee security and reliability for all our clients.

How has it helped my organization?

Since the implementation of Harmony, we managed to establish excellent communication in all environments. It has helped us a lot in preventing cyber attacks from anywhere, such as remote users, internet SaaS, and IaaS. In addition, it provides us with real-time information so we can make decisions immediately and achieve complete analysis to be able to carry out compliance management for the corresponding audits.

What is most valuable?

The tool has many valuable features - such as protection against threats. It also has centralized management that allows administrators to supervise and control the security of the entire network. The VPN and authentication functions guarantee secure and efficient connections from anywhere in the country, device, or network. Due to these characteristics, the tool is one of the best on the market.

What needs improvement?

They should improve certain features, although they have a modern graphical interface. They can centralize the options or have faster access to options, in addition to improving the authentication to the tool since sometimes it presents problems when entering. In a future version of the tool, they could add a space where information on common errors is shown so that there would not be much dependence on the support they offer.

For how long have I used the solution?

I managed to use it for approximately two years.

What do I think about the stability of the solution?

It is a stable tool; I very rarely have problems.

What do I think about the scalability of the solution?

Regarding scalability, it is very good. It behaves and integrates very well with other tools.

How are customer service and support?

Support is one of the points of improvement. They should focus on this part as they are not complying with the SLAs.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no solution implemented previously. This was done when it was decided to implement a cloud implementation.

How was the initial setup?

The implementation is a little complicated at first; its learning curve is intermediate.

What about the implementation team?

The implementation was carried out with the vendor who demonstrated considerable skill in managing the solution.

What was our ROI?

It is an investment that must be considered and looked at very carefully. You need to understand what type of tool is needed since it is an important contribution to online safety.

What's my experience with pricing, setup cost, and licensing?

The installation is simple once you know how to do it. At first, it is somewhat complicated- especially the configuration. Once you learn, it's very easy. The cost was one of the best quotes we found with the features we needed.

Which other solutions did I evaluate?

We explored several tools on the market, such as Barracuda CloudGen Firewall, Sophos XG Firewall, and Fortinet FortiGate.

What other advice do I have?

It is a very complete and competitive tool in the marketplace.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Rahul Kamble. - PeerSpot reviewer
Business Director at One Networks
Reseller
Top 5
Comprehensive solution in one package
Pros and Cons
  • "Our investment in quality hardware has proven to provide a better customer experience. They heavily rely on Check Point Firewall and Check Point SaaS Connect to safeguard their networks from external threats and attacks."
  • "They should work towards the WAN intergration."

What is our primary use case?

Customers employ Check Point Diagnostics for their multi-branch solutions. They're also using Foundation Firewall with Blade Security and Check Point Harmony Connect. Their primary focus is on prevention, particularly in terms of access to ServiceEdge. This approach ensures the safety of packets and applications for our IT customers. Consequently, we are investing in quality hardware to support these secure solutions.

What is most valuable?

Our investment in quality hardware has proven to provide a better customer experience. They heavily rely on Check Point Firewall and Check Point SaaS Connect to safeguard their networks from external threats and attacks.

What needs improvement?

They should work towards the WAN intergration.

For how long have I used the solution?

A cloud service that unifies multiple network security products and deploys within minutes.

What do I think about the stability of the solution?

Check Point has proven to be an exceptionally stable solution. We've been deploying these devices to our customers since around 2013-2014, and during this period, we haven't received any RMA requests or hardware-related field requests from our customers. There have been no reported issues or failures on the customer side. From our perspective, Check Point devices are known for their robustness and granularity in the market. When it comes to stability, we would rate Check Point ten out of ten.

What do I think about the scalability of the solution?

The solution is very scalable, so I would rate it 10 out of 10.

How are customer service and support?

The quality of service can vary depending on your SLA (Service Level Agreement) and the specific services you receive from Check Point. In our case, we've had a positive experience. Depending on the level of support, such as 24/7 availability, we've consistently received responses within the agreed SLA timeframe. This has been a satisfactory aspect of our service with Check Point.

How would you rate customer service and support?

Positive

How was the initial setup?

We've determined the most optimal days for MAC setups at our customers' locations. We rely on our in-house experts rather than seeking assistance from Check Point's site. Our expert team takes charge of ticket management and ensures smooth customer implementations. To date, we've successfully deployed this solution for numerous customers, including approximately 2,500 customers with endpoints and over 50 branch locations. One noteworthy customer in the software industry, known as SIM Contact Modules, also received our support for their deployment needs.We've successfully implemented various security measures, including data protection, cloud DLP (Data Loss Prevention), granular policy enforcement, and Jira integration. Additionally, we've set up sandboxing and connected to Azure for protection against phishing and malware threats. Throughout this deployment, we encountered some minor issues, but overall, managing and configuring the deployment process was relatively straightforward. It takes almost one day. 


It's very easy to set up it and I would rate it 9 out of 10.

What's my experience with pricing, setup cost, and licensing?

The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point.

I would rate it 10 out of 10.

What other advice do I have?

We will suggest the Check Point solution to customers and other partners. This way, they can obtain a comprehensive solution in one package, addressing all their needs. Whether it's deploying data with Jira, setting up cluster attacks, or utilizing various features through a single connection, this approach ensures customer satisfaction and contributes to our business success.

I would rate it 9 out of 10. 

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
LuisPerez9 - PeerSpot reviewer
PM at MPS Mayorista de Colombia S.A.
Real User
Top 10
Prevents threats, provides global network protection, and manages API evaluations
Pros and Cons
  • "Its software solution also ensures connectivity and protects against NSF filtering."
  • "There is a hefty cost"

What is our primary use case?

One use case of SASE is for a partner customer who needs a secure and fast connection for their employees to access the final customer's data center and cloud. Green protection and security measures enable access to all information, including the data center's applications and networks.

How has it helped my organization?

Harmony SASE can prevent threats, provide global network protection, and manage API evaluations of user posture. Its software solution also ensures connectivity and protects against NSF filtering.

What is most valuable?

Check Point complements our more robust solution with Harmony SASE. This solution allows me to see Harmony SASE as an additional layer of security. It profiles security for users connecting remotely, whether working from another branch, a hotel, or an airport. In this case, we needed to protect these connections quickly, so we deployed it as the fastest solution for this customer.

What needs improvement?

There is a hefty cost, but it has excellent coverage. We need SASE management for five websites, including streamlining, logging, and monitoring. The solution offers the final customer three cloud coverage options and an excellent price point. Our competitors are Palo Alto, Cisco, Symantec, and Solar.

If the dashboard allows the PMS administrator to easily and quickly deploy configurations, it will facilitate the solution's faster deployment.

What do I think about the stability of the solution?

It is stable. It brings strong stability to the program, including updates to protect against new ransomware attacks.

What do I think about the scalability of the solution?


How are customer service and support?

Check Point's support is on par with the best in the market. Check Point Harmony SASE is a leading solution in both the local and global markets.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Unlike Cisco, Microsoft Azure, and similar solutions, SASE Insight offers limited visibility. It is slow in detecting and reacting to threats at the point of entry in real-time. Microsoft’s solution is focused on protection but doesn’t provide comprehensive security management. Although it deploys easily, Microsoft’s approach to security isn’t sufficient for robust threat prevention, especially against ransomware. Check Point's Harmony SASE is a more effective solution as it includes several advanced tools and sandboxing capabilities for thorough threat prevention and management.

How was the initial setup?

The deployment is easy, but financial customers must have a comprehensive protection solution. Check Point's Harmony provides complex protection with its firewalls and other features.

What was our ROI?

The return of the SASE web addresses the void in the quality of information protection clients have in their employment. We can check the information, ensuring higher value and effective deployment, ultimately benefiting us. It is crucial to verify the quantum of protection provided and the conditions and access to private information. 

What's my experience with pricing, setup cost, and licensing?

Harmony SASE may not be the cheapest solution but offers more value. It provides enhanced capabilities and features that justify its cost. We are conducting several trials with the new rigs in the silver packs to evaluate their effectiveness.

What other advice do I have?

I recommend Check Point's solution, including various verticals like Quantum, CloudGuard, and Harmony. Harmony SASE, in particular, covers mobile endpoints, email, and collaboration. It's known for easy and fast deployment, as well as efficient administration through the portal. This solution provides organizations with real-time protection and is considered one of the best in the market.

Overall, I rate the solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
PeerSpot user
reviewer0927579 - PeerSpot reviewer
GoCanvas at Canvas Solutions, Inc.
User
Simple and easy to use with good connectivity for remote work
Pros and Cons
  • "It has provided a seamless gateway to much-needed platforms."
  • "It would be nice to have a notification sound when Perimeter81 disconnects, as I sometimes don't notice when the icon shows that it's disconnected, and I end up wasting time waiting for my browser to load a page that shows an error, usually error 404."

What is our primary use case?

I work remotely from quite a remote location in South Africa, for a US-based Software company (GoCanvas/Device Magic). GoCanvas and Device Magic are 2 software platforms used for data collection on mobile devices. In order for me to access platforms such as Salesforce and Cornerstone, I need to be connected to the Perimeter81 GoCanvas VPN. Salesforce is an important integration to our entire organization, and I need to be connected to the Perimeter81 GoCanvas VPN to access my own shared Salesforce account.

How has it helped my organization?

Perimeter81 has made it easy and hassle-free for South African employees to access certain platforms needed to do our work on a daily basis. 

Before having the pleasure of being on the Perimeter81 GoCanvas VPN, it was very frustrating. I had many hassles with JumpCloud and I could not get onto the platforms I needed to be working on to get my work done.

I never have any issues with Perimeter81, it really is simple and easy to use.

It really has provided a seamless gateway to much-needed platforms.

What is most valuable?

I work on a Macbook Air M1, and I love the small icon at the top of my screen that allows me to see when I am connected to the VPN or not. I don't have to open the app to connect to the VPN - I can just click on the small icon and a small tab opens wherein I can click "Connect". It's simple, easy, and convenient.

What needs improvement?

It would be nice to have a notification sound when Perimeter81 disconnects, as I sometimes don't notice when the icon shows that it's disconnected, and I end up wasting time waiting for my browser to load a page that shows an error, usually error 404.

For how long have I used the solution?

I've used the solution for 18 months.

What do I think about the stability of the solution?

The solution is very, very stable. I never have issues with Perimter81.

What do I think about the scalability of the solution?

The scale on which this platform can be used is vast. I work remotely in a remote location in South Africa. We have 400 people in our town (it's a tiny place), and yet, Perimeter81 connects me to a VPN that allows me to access US-based platforms.

How are customer service and support?

I have never had to contact customer service or support for Permieter81.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I am not sure which solution was used before the company started using Perimeter81.

How was the initial setup?

The initial setup was very straightforward.

Our IT team set me up; I received an email and followed the prompts.

What about the implementation team?

My understanding is the initial setup was handled in-house.

What was our ROI?

I cannot speak to the ROI.

What's my experience with pricing, setup cost, and licensing?

I do not know the details of the cost or licensing.

Which other solutions did I evaluate?

I did not evaluate other options.

What other advice do I have?

I'm overall super happy with this product.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2080848 - PeerSpot reviewer
Senior Customer Success Manager at BigHand
User
User-friendly with a seamless login experience and can scale well
Pros and Cons
  • "Logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN."
  • "One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."

What is our primary use case?

My work started using Perimeter 81 as a replacement for our previous VPN provider. Our previous solution was Sophos. 

We are a company that is around 75% fully remote, and we are an ISO 27001 Certified legal tech solution provider to some of the largest law firms and health care providers in the UK and North America. For that reason, ensuring our internal and client data is of the highest priority. 

We use the Perimeter 81 solution to secure all of our internal cloud-based systems as well as the demo system for the products we sell to our customers.

How has it helped my organization?

With the previous solution, we had to have an app on our phone that would generate PIN numbers that would auto-generate. It was cumbersome and not very user-friendly. 

This solution has allowed for a more seamless login experience when accessing my files, and from a user standpoint, it is fantastic. I am barely cognizant of the fact that Perimeter is running in the background. This was not the case with our previous VPN solution. 

What is most valuable?

Direct login using Microsoft network credentials and no extra applications or manual inputting of PIN codes is probably the best feature of using Perimeter 81. Our last VPN solution required that users manually input PIN codes to confirm two-factor authentication, and the process was not very user-friendly. Moreover, logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN. Of course, having to regain access to the VPN is kind of annoying, however, it is still a much better user experience than our previous solution.

What needs improvement?

One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources. It's probably a configuration thing on our end, yet frustrating nonetheless. If there was a way to have quicker access to the Perimeter login page, that would probably be of great assistance when re-logging into the VPN. For instance, if the pop-up for Perimeter 81 allowed me to log in from there, that would probably streamline the process.

For how long have I used the solution?

I've used the solution for about six months.

What do I think about the stability of the solution?

The product seems stable to me!

What do I think about the scalability of the solution?

The solution is very scalable.

How are customer service and support?

I have not interacted with customer service.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Sophos and switched. I am not sure why.

How was the initial setup?

I am not sure how the setup process was handled. 

What was our ROI?

I have no idea if we have looked into monitoring for ROI.

What's my experience with pricing, setup cost, and licensing?

I do not advise anyone at my company on any of those topics. 

Which other solutions did I evaluate?

I am not aware of the other options that were evaluated if any.

What other advice do I have?

I really like Perimeter 81 as opposed to our previous VPN solution. It is a much more streamlined and user-friendly experience.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.