Try our new research platform with insights from 80,000+ expert users
Ashish Upadhyay - PeerSpot reviewer
Founder at BlockMosiac
Real User
Top 5Leaderboard
Helps to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements
Pros and Cons
  • "The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele."
  • "While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures."

What is our primary use case?

We utilize cryptographic techniques, leveraging the tool's capabilities in Blockchain, to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements. Integrating Quantum-resilient technology into our decentralized enterprise framework ensures the security of our clients' sensitive data. This proactive approach protects client data from potential threats associated with Quantum computing.

How has it helped my organization?

The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele.

What needs improvement?

While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures. Exploring ways to streamline the integration process and optimize performance ensures a seamless experience for developers and users.

Additionally, fostering an open dialogue with the security community and staying attuned to emerging threats aids in identifying areas for improvement. Regular updates and patches to address vulnerabilities improve the tool's longevity and effectiveness.

What do I think about the stability of the solution?

I rate the product's stability an eight out of ten. While it is generally stable, occasional downtime issues arise, particularly during increased network workload or high server demand.

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
June 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.

What do I think about the scalability of the solution?

I rate the tool's scalability a ten out of ten. My company has 1000 users. 

How are customer service and support?

The technical support and customer service for enterprise clients have been very good. They guide the users to solutions with expertise and understanding of the issues.

How would you rate customer service and support?

Positive

How was the initial setup?

My leadership executed the tool's initial deployment with precision and efficiency. Our dedicated team ensured a seamless integration process with clear documentation and comprehensive training modules, facilitating the onboarding of our developers. Collaborating with top-tier experts from Check Point Quantum SASE contributed to a smooth implementation, with any potential challenges being proactively addressed.

As a result, the transition to these advanced security measures was carried out to minimize disruptions to ongoing operations. The overall deployment took two to three hours to complete. 

What's my experience with pricing, setup cost, and licensing?

The product's pricing model accommodates diverse needs and deployment sizes. The licensing options include perpetual licenses, requiring a one-time fee for permanent feature access but excluding future updates, and subscription licenses, which grant customers access to the latest features through ongoing subscriptions.

What other advice do I have?

I rate the overall product an eight out of ten. Its implementation has been very effective, enhancing our organization's security and increasing client confidence. This improvement has led to a broader adoption of enterprise solutions, fostering extended partnerships and growing our user base. The increased market share and client adoption further highlight the substantial return on investment (ROI) derived from the strategic integration of Check Point Quantum SASE.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2080848 - PeerSpot reviewer
Senior Customer Success Manager at BigHand
User
User-friendly with a seamless login experience and can scale well
Pros and Cons
  • "Logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN."
  • "One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."

What is our primary use case?

My work started using Perimeter 81 as a replacement for our previous VPN provider. Our previous solution was Sophos. 

We are a company that is around 75% fully remote, and we are an ISO 27001 Certified legal tech solution provider to some of the largest law firms and health care providers in the UK and North America. For that reason, ensuring our internal and client data is of the highest priority. 

We use the Perimeter 81 solution to secure all of our internal cloud-based systems as well as the demo system for the products we sell to our customers.

How has it helped my organization?

With the previous solution, we had to have an app on our phone that would generate PIN numbers that would auto-generate. It was cumbersome and not very user-friendly. 

This solution has allowed for a more seamless login experience when accessing my files, and from a user standpoint, it is fantastic. I am barely cognizant of the fact that Perimeter is running in the background. This was not the case with our previous VPN solution. 

What is most valuable?

Direct login using Microsoft network credentials and no extra applications or manual inputting of PIN codes is probably the best feature of using Perimeter 81. Our last VPN solution required that users manually input PIN codes to confirm two-factor authentication, and the process was not very user-friendly. Moreover, logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN. Of course, having to regain access to the VPN is kind of annoying, however, it is still a much better user experience than our previous solution.

What needs improvement?

One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources. It's probably a configuration thing on our end, yet frustrating nonetheless. If there was a way to have quicker access to the Perimeter login page, that would probably be of great assistance when re-logging into the VPN. For instance, if the pop-up for Perimeter 81 allowed me to log in from there, that would probably streamline the process.

For how long have I used the solution?

I've used the solution for about six months.

What do I think about the stability of the solution?

The product seems stable to me!

What do I think about the scalability of the solution?

The solution is very scalable.

How are customer service and support?

I have not interacted with customer service.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Sophos and switched. I am not sure why.

How was the initial setup?

I am not sure how the setup process was handled. 

What was our ROI?

I have no idea if we have looked into monitoring for ROI.

What's my experience with pricing, setup cost, and licensing?

I do not advise anyone at my company on any of those topics. 

Which other solutions did I evaluate?

I am not aware of the other options that were evaluated if any.

What other advice do I have?

I really like Perimeter 81 as opposed to our previous VPN solution. It is a much more streamlined and user-friendly experience.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
June 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
CLAUDIO SANTOS - PeerSpot reviewer
Operation Director at GLOBALIP
Reseller
Top 5Leaderboard
Provides a valuable multi-factor authentication functionality and an effective feature for controlling employee access to specific applications
Pros and Cons
  • "Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process."
  • "The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations."

What is our primary use case?

The platform manages remote access by allowing employees to log into a secure portal, where they are only given access to the specific applications they are authorized to use. This access is based on an HTTPS connection, ensuring security.

What is most valuable?

All product features are valuable, but multi-factor authentication (MFA) is especially critical for securing remote work environments. Without two-factor authentication, there is a heightened risk of security breaches. 

Another key feature is the ability to control the time frame for employee access to applications, allowing for greater security and control.

What needs improvement?

The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations.

For how long have I used the solution?

I have been working with Check Point Quantum SASE for three years. Currently, I am providing it to three customers and implementing it for a fourth. My clients have used it for varying periods, from six months to two years.

What do I think about the stability of the solution?

The solution is very stable and requires minimal maintenance. Once configured and exposed through the portal, it generally does not present issues related to the security service itself.

What do I think about the scalability of the solution?

The product is designed to be scalable, particularly as a SASE (Secure Access Service Edge) product. Its architecture supports easy scaling and can handle increasing users without issues.

How are customer service and support?

The support is comprehensive, and the channel ecosystem effectively assists with resolving complex issues. I can escalate problems to Check Point's research and development teams for further assistance.

How would you rate customer service and support?

Positive

What was our ROI?

The return on investment typically depends on the size of the customer. Most customers find the solution's benefits outweigh the costs, and the return is usually balanced.

What's my experience with pricing, setup cost, and licensing?

The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users.

What other advice do I have?

The solution's cost-effectiveness depends on the size of the business and the specific problems it needs to address.

Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process.

It already comes with all the necessary features. When you purchase it, you get the full package. However, different levels of coverage are offered for endpoint solutions.

I rate it a nine out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Salim Hebada - PeerSpot reviewer
Huawei IP Pre-sales Solution Manager at MC3
Real User
Leaderboard
Highly scalable and unique advantage of SD-WAN
Pros and Cons
  • "SD-WAN is one of the primary solutions offered by Perimeter 81."
  • "One of our challenges is ensuring the security of our cloud-based operations."

What is our primary use case?

I use Perimeter 81 primarily for VPN connections and work and home banking. Additionally, I use it for some oil and gas applications. You should also consider using it for SD-WAN solutions. In fact, SD-WAN is one of the primary solutions offered by Perimeter 81.

In order to minimize costs, you can use a zero-trust security model. We also use VPN to interconnect many branches, for example, here in Nigeria, for an operator in the oil and gas industry. We have a high frequency in our network.

What is most valuable?

For us, SD-WAN is the most valuable feature. They provide a unique advantage for banking purposes and are also different from other solutions. VPN is good for security.

What needs improvement?

One of our challenges is ensuring the security of our cloud-based operations. We place a high priority on security and take measures to protect our data. We avoid using public cloud services and instead rely on data centers to collect data for both small and large branches.

In the next release, I would like to see more improvement in security capabilities.

For how long have I used the solution?

I have been using Perimeter 81 for ten years. I am working with the latest version.

What do I think about the stability of the solution?

It is a very stable solution. It efficiently ensures security. We also use VPN to touch cloud and ensure secure information. However, for a specific company, we may need to improve security. The code is updated biweekly.

What do I think about the scalability of the solution?

The scalability of Perimeter 81 depends on your equipment and routers. Different solutions may require different approaches. It is also a PLS to control.

How are customer service and support?

The customer service was good. We needed to make some configurations, and it was the same as with other providers because it's a solution we use.

How was the initial setup?

The initial setup is easy. The deployment process is different for each project, and it depends on the project's scope, such as the type of network and the kind of project. If you use IP and POS, it's different from if you don't use them.

What about the implementation team?

It's possible to implement it in-house, or we can get some help. As for the technical aspects, we have six people who are required for the deployment and maintenance. We plan to increase the number of users for Permieter 81 in our company.

What was our ROI?

The system should think about how to maximize the ROI and minimize the OpEx cost for the customer. When you use a good solution, you can decrease your supply costs, increase engineering, reduce repair costs, and increase product stability. It's a win-win solution where the customer wins, and you win.

What other advice do I have?

I would definitely recommend using Perimeter 81. Overall, I would rate the product a nine out of ten, but I would like to improve its security.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Sales Manager, Checkpoint at South Asian Technologies
Reseller
Top 5
Very agile with a granular level of control over users
Pros and Cons
  • "The solution offers both client and clientless versions for good remote access."
  • "The solution requires you to buy a minimum of 50 licenses and that is not practical."

What is our primary use case?

Our company installed the solution locally to test it and gain user experience. In the future, we plan to sell the solution to customers. 

The solution provides internet access, network access, and security. Both on-premises and cloud versions are available. 

Initially, we installed the on-premises version but are now testing the cloud version. 

What is most valuable?

The solution offers both client and clientless versions for good remote access. We don't like to give our credentials to BYOD devices, non-permanent cadres, or contractors so having two remote access options is a huge benefit. 

There is a granular level of control over users with regard to internet or network access. The virtual firewalls for remote connectivity are almost like having a firewall in-house. 

The solution is an agile product with very good technology. 

What needs improvement?

The solution requires you to buy a minimum of 50 licenses and that is not practical. 

For how long have I used the solution?

I have been using the solution for five months. 

What do I think about the stability of the solution?

The solution is stable so I rate stability a ten out of ten. 

What do I think about the scalability of the solution?

The solution is scalable so I rate scalability a ten out of ten. 

Which solution did I use previously and why did I switch?

I have been selling Check Point firewalls for four years. Previously, I sold Fortinet.

I am happier with the solution because my customers are giving me very good feedback. 

How was the initial setup?

The setup is easy so I rate it a ten out of ten. 

What about the implementation team?

We implemented the solution in-house. We set up our Active Directory and our admin sent the docker through email. We clicked the docker, installed it, and received connection to the solution. 

It took about four months for rollout to all of our our engineers and salespeople.

What's my experience with pricing, setup cost, and licensing?

I am not very happy about the pricing because the solution requires you to buy a minimum of 50 licenses. Annual licenses cost $30 to $40 each. 

The pricing is not practical in Sri Lanka because we have small customers who need only 10 to 20 licenses. There should be packages for 10, 20, and even 30 licenses. 

Which other solutions did I evaluate?

In Sri Lanka, there is a lot of competition with endpoint or process solutions. I think the solution is going to be a very good brand in the near future because we have been promoting it and most of our customers want to buy it. 

What other advice do I have?

The solution provides a secure tunnel for controlling users while maintaining stability. Security is an important component because you need to prevent hacks and issues with data accessibility. Without a secure tunnel, someone might get into your networks, take credentials or databases, and destroy your data centers. 

The solution is fast and provides 100% security, especially for remote users. 

I rate the solution a ten out of ten. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
drzmachado - PeerSpot reviewer
Frontend Developer at Limelight Networks
Real User
Great user experience, available on mobile, and is easy to set up
Pros and Cons
  • "Perimeter 81 is very pretty."
  • "I don't know if it is technically feasible, however, if the Desktop App could be used as a Web App or a Chrome Extension it would be very nice."

What is our primary use case?

I'm using it for the VPN, I work from a home office and need to access data from different websites. I'm a front-end web developer for a famous brand, working remotely from another country, and the content I have to access must be from different countries. There are some internal tools we must use too, and we must access them with a VPN. Some of these tools are on mobile too, so we also have to install VPN solutions on mobile phones. I have to use a tool that we can access multiple VPNs and switch regions with ease.

How has it helped my organization?

We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile. The other solutions have more steps to set up, are more complicated and it was not a good experience. Unfortunately, I can't use Perimeter 81 for all VPN use cases, due to the company's policy, however, when I can, I always choose it. 

I have to use it on my phone too, and my smartphone was not compatible with the other VPN solutions (old Android version), but Perimeter 81 works on old mobile phones and is very light. 

What is most valuable?

The best points of Perimeter 81 are the:

- User experience
- Design
- Ease of use
- Support for mobile and desktop
- Very light mobile app

The other VPN tools have some old interface with a not great user experience. I use a Mac and the interface looks like an old Windows App. Perimeter 81 is very pretty. My phone is an old Android version (I cannot upgrade right now) and I could not use the other tools to access the VPN because their two-step authentication app could not run on my phone. Perimeter 81 app works on old phones and is very lightweight. The battery consumption is very low. 

What needs improvement?

I am very satisfied with the product right now. I don't know if it is technically feasible, however, if the Desktop App could be used as a Web App or a Chrome Extension it would be very nice. It would help a lot if I could click a link with the right-click and select from a range of options like: "Open a with VPN: Network main" and that tab would open with VPN activated only on that. And then I could refresh the tab with the VPN on or off. When I access a URL, the Extension could have an option like: "Reload current tab with VPN".

For how long have I used the solution?

I've used the solution for two months.

What do I think about the stability of the solution?

I didn't have to deal with any bugs so far.

What do I think about the scalability of the solution?

Our team is big, from people all around the world. Everybody is using a VPN. It scales well.

How are customer service and support?

Until now, I have not needed to reach out for service support.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Yes, I did use a different solution, however, I didn't make a full switch as some tools we use can only be accessed with specific VPN tools. That said, when I can choose, I prefer Perimeter 81 due to its ease of use.

How was the initial setup?

It was very easy to set up.

What about the implementation team?

Our IT team provided a step-by-step to setup the solution.

What was our ROI?

I don't deal with the billing.

What's my experience with pricing, setup cost, and licensing?

I don't deal with billing, however, it would be nice to have a time trial.

Which other solutions did I evaluate?

IT selects the tools we use. I did not evaluate others.

What other advice do I have?

I'd advise others to use it if you need to access VPN for both desktop and mobile.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Chief Executive Officer at Vincacyber
Real User
Top 20
Highly reliable and protects organizations from phishing attacks and downtime
Pros and Cons
  • "The installation is very easy."
  • "The tool could be more user-friendly."

What is our primary use case?

Check Point Quantum SASE is a next-generation email security solution. It can be used to protect users from phishing emails.

What is most valuable?

The tool connects as an API. The installation is very easy. The integration with the existing network was very easy. It is a good tool. We can rely on it.

What needs improvement?

The tool could be more user-friendly.

For how long have I used the solution?

I have been using the solution for more than a year.

What do I think about the stability of the solution?

The tool is very stable and highly reliable. I rate the stability a ten out of ten.

What do I think about the scalability of the solution?

I rate the tool's scalability a ten out of ten. We have approximately 120 users. We have plans to increase the number of users. Our team members are experts. Anyone can deploy and maintain the solution.

How are customer service and support?

The support is good. The support personnel give prompt responses. They take ownership of our issues and communicate with us quickly. They try to get back to us quickly.

How was the initial setup?

The setup is very easy. The deployment can be done without much effort. It is done at the API level. It is deployed on the cloud.

What was our ROI?

I do not face phishing attacks and downtime due to the product.

What's my experience with pricing, setup cost, and licensing?

Check Point Quantum SASE is a SaaS-based product. We have to pay yearly. The product is reasonably priced. There are no additional costs associated with the tool.

Which other solutions did I evaluate?

I evaluated Microsoft Defender. Defender is a good solution, but it is not reliable.

What other advice do I have?

One of the biggest challenges organizations face is email threats. They are completely unknown. The users get deceived by them and tend to click on them. Previously, there was a solution called Avanan. It was one of the pioneers in email security that ensured no unwanted email came to our inbox. I will recommend the product to others. People must look at the solution very seriously. It will help them safeguard their organizations.

Overall, I rate the tool a ten out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Sonali Dhende - PeerSpot reviewer
Cyber Security Engineer at Valuepoint Systems
Real User
Top 20
Provides high performance along with ATP prevention and policy management but firewall configuration could be improved
Pros and Cons
  • "The solution offers ATP features and management features."
  • "The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support."
  • "When it comes to firewall configuration, sometimes we encounter issues."

What is our primary use case?

The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support. We have all these features integrated into our security gateway for every business year, like the SASE model. Cyber threats are becoming increasingly sophisticated nowadays. We have this next-generation firewall, to protect all your network, cloud, data centre, IoT devices, and remote connections. Due to these reasons, we prefer Check Point's network solution. It helps improve the remote workforce security.

What is most valuable?

The solution offers ATP features and management features. We have a smart console and GIA portal. We used to manage all policies on the smart console. We do have the URL filtering and prevention part. We used to do the policy databases and all that configuration from the GIA portal. We have intrusion prevention, application consultant, filtering options and web filtering. It works as a next-gen firewall.

What needs improvement?

Firstly, there are different consoles involved. If someone is selling another product that already has a single console for managing everything, that would be better.

For how long have I used the solution?

I have been using Check Point Quantum SASE for 6 months.

How are customer service and support?

Support is handling requests via email. Additionally, they share documents. We haven't encountered any major issues requiring support. They are available 24hr/day along with alerts, reports or security issues.

How was the initial setup?

The initial setup depends on the organisation. Let's say they are currently using FortiGate, but they want to migrate to Check Point Quantum SASE. We have different options for migration. We can either perform the migration manually or upload existing tests. Manual deployment can be time-consuming. We have two types of configurations: basic and advanced. Basic configuration can be completed quickly, but advanced configurations may take more time. Our deployment process is relatively easy, but managing traffic and other aspects can be challenging. We need to align with the organisation's flow during this process.

Deployment takes about a month depending on the number of firewalls.

What other advice do I have?

The zero trust aspect is being used for VPN purposes. It replaces your VPN, assisting anyone trying to access VPNs.

We are using it for large organisations and enterprises. For instance, if some organisations are using Check Point hardware for their firewalls but don't want to switch to other vendors, they can opt for this solution. Especially for big organisations with data centres facing numerous network issues, it's highly scalable. When it comes to firewall configuration, sometimes we encounter issues, but we can't always blame the firewall.

Check Point offers SmartConsole and other tools. If you compare Quantum with FortiGate, FortiGate doesn't have separate controls for various functions like policy publishing and control. In FortiGate, within one console, you can manage everything by enabling features.

Overall, I rate the solution a 7 out of 10.

Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.