Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 20
Excellent product - HC modern security tool
Pros and Cons
  • "Protection against threats like ransomware is very effective."
  • "Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us."

What is our primary use case?

This tool is of great help and allows us to provide security assistance to our users who work remotely. They connect from any site, secure or insecure, accessing applications and business email without protection as they are outside the company perimeter.

It gives us granular security through web control policies, reports, and monitoring. We manage to avoid user vulnerabilities from anywhere. It is managed with Harmony Connect in the Check Point Infinity Portal, a very good tool.

Users are quite happy with the applied security performance.

How has it helped my organization?

Check Point Harmony Connect has improved the protection of computers outside the office. It offers implementation that is simple. 

Also, with the monitoring dashboard, we can make decisions to improve the control policies and web access so that we can better protect our teams.

This tool does not require being on the same network. Everything is verified thanks to a small Check Point protection agent that is installed on the client.

Protection against threats like ransomware is very effective.

What is most valuable?

We really liked the Check Point Harmony Connect tool and the monitoring, since we can make the right decisions thanks to the records observed in a simple way through the dashboard. The portal is really very intuitive.

The policies applied to users are quite granular, which helps a lot with the differential protection of users, generating managerial profiles and normal profiles efficiently.

We have also put VPNs into practice through harmony connect, having secure user connectivity. It is a very robust, modern, and secure tool.

What needs improvement?

They should include the ease of implementation or installation of the agent through an Excel list, where all the users can be loaded and added to be able to send the agent by mail.

I would also like it if they could include more documentation from the manufacturer to be able to implement it more efficiently and follow all the best practices.

Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us.

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
August 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.

For how long have I used the solution?

We have been using this tool for approximately two years now. It is an excellent security tool to protect telecommuting users.

What do I think about the scalability of the solution?

This is an excellent cloud-managed Check Point tool; no server is required.

How are customer service and support?

Problems are always solved, however, with modern security applications, specifically those that are in the Check Point Infinity Portal, it is a little more difficult to solve with support.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We have not had a modern solution like this before. Check Point has innovated our processes.

What's my experience with pricing, setup cost, and licensing?

It is important to associate you company with a partner who can work with prices and documentation in order to find the security application that best suits the company's requirements.

Which other solutions did I evaluate?

Before acquiring any company-level security tool, we undertake the task of investigating several solutions. In this case, Check Point was the best.

What other advice do I have?

All Harmony solutions are excellent. I really recommend this option.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Easy to implement in branch and main office.
Pros and Cons
  • "The application control and granular access feature are very easy to use, intuitive, and effective."
  • "They could improve on the available public documentation."

What is our primary use case?

It provided us with the way to provide governance, control and monitoring of the visited sites, see vulnerabilities and find out how to deal with them in order to avoid cyber attacks. 

With this tool, we can guarantee that the equipment will not be an easy target for cybercriminals. It is really simple to implement.        

How has it helped my organization?

Checkpoint Harmony Connect helped us to guarantee the protection of equipment not covered by a Check Point Gateway. For example, when a vendor goes out and connects to the network from anywhere or is the target of cyber attacks (which can generate a loss of equipment functionality in addition to infiltrations or loss of company information that is confidential) which is why we decided to use this tool. It generated everything that was needed at the security level. It is an excellent tool.

What is most valuable?

The most valued features for us are:

The ease of implementation, of installation in the equipment, and the low performance of the equipment that the agent requires to provide security.

Its administration through a portal. Infinity Portal does not need to be implemented in an additional management server; rather, it is web-based and manageable from anywhere.

The application control and granular access feature are very easy to use, intuitive, and effective. It does not require equipment updates, policies are updated quickly.

What needs improvement?

They could improve on the available public documentation. The most modern applications or features of Check Point are difficult to find in their documentation for implementation. According to the manufacturer, sometimes it happens that the manual is applied, yet the desired implementation is not achieved.

Also, as seen in our support cases, it is somewhat slow to solve problems. There are other manufacturers that have better support. They can improve on that part and prevent customers from complaining about how they provide solutions.

For how long have I used the solution?

We have used this tool for about two years.

It is an excellent security tool that provides additional features to our existing GWs. We can provide web security with it.

Which solution did I use previously and why did I switch?

We had not really used other tools; when we had the need, we investigated, and we found Check Point Harmony Connect.

What's my experience with pricing, setup cost, and licensing?

The cost is difficult to find, however, our seller can solve these issues. The cost is normal. It is per protected user.

Which other solutions did I evaluate?

We validated some security solutions, however, Check Point Harmony Connect was perfectly suited to what we needed.

What other advice do I have?

It's a very modern tool and can be used to achieve security for old and new vulnerabilities.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
August 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
reviewer2088609 - PeerSpot reviewer
Manager Cyber Security at a energy/utilities company with 5,001-10,000 employees
Real User
Is scalable, but integration from a management perspective needs improvement
Pros and Cons
  • "The scalability is good, and I'd give it an eight out of ten."
  • "The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."

What is our primary use case?

The primary use case has to do with the remote connectivity of sites.

What is most valuable?

I have found the IPsec VPN to be valuable.

What needs improvement?

The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass.

I would like to see the use of either GRE or non-IP tunnels in the next release.

For how long have I used the solution?

I've been working with Harmony Connect for about 18 months. I tested it but did not run it in production.

What do I think about the stability of the solution?

Stability wise, I'd rate Harmony Connect at seven out of ten. It could be more stable in some respects.

What do I think about the scalability of the solution?

The scalability is good, and I'd give it an eight out of ten.

How are customer service and support?

I found the technical support to be okay. Most of the technical support was geared to the regular equipment, and we had to find specialists within Check Point to look at Harmony Connect. Because of that, I would give technical support a rating of seven out of ten.

How would you rate customer service and support?

Neutral

How was the initial setup?

The initial setup is simple in some ways but complex in other ways. You need to know a lot about the Check Point side and the portal side to make it work.

What's my experience with pricing, setup cost, and licensing?

I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either.

Which other solutions did I evaluate?

We evaluated Silver Peak. Comprehensiveness was the main difference between Harmony Connect and Silver Peak. Harmony Connect is a little more suited for smaller branch offices as opposed to full-site connectivity.

What other advice do I have?

Overall, I would rate this solution at seven on a scale from one to ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Eric Liao - PeerSpot reviewer
Solution Manager at DYXnet Group
MSP
Top 5
It replaces some older products and also adds features, like DLP (Data Loss Protection), and security gateway
Pros and Cons
  • "The DRP is the most valuable feature."
  • "My customers want more remote functionality. They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this."

What is our primary use case?

For the past two months, we have been evaluating Harmony Connect because it has some limitations on routing and account control, so we are testing it for three customers to check this function. In some areas, Harmony Connect can replace older VPN products and also add some features, like DRP and security gateway.

What is most valuable?

The DLP (Data Loss Protection) is the most valuable feature. 

What needs improvement?

My customers want more remote functionality.  They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this.

For how long have I used the solution?

This solution is new to Taiwan, so I haven't been using it for very long. I started using Harmony Connect in Q3 2022.  

What do I think about the stability of the solution?

Harmony Connect has been stable so far, but this is still a test. 

What do I think about the scalability of the solution?

There are some limitations on redundancy, and it takes about 30 minutes to switch. This is a significant limitation. Competitors like Palo Alto can do it in around five minutes. It's more appropriate for enterprises because they sell the product license in packages of 50 accounts at least.

How are customer service and support?

I rate Check Point customer service nine out of 10. It is excellent, especially on the customer side. 

How would you rate customer service and support?

Positive

What's my experience with pricing, setup cost, and licensing?

Check Point Taiwan provides me with a lot of flexibility in pricing. If I'm trying to secure a customer, they can give me a good discount on this product. The price is about 350 HKD annually. 

What other advice do I have?

I rate Check Point Harmony Connect eight out of 10.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
reviewer1911213 - PeerSpot reviewer
Accounts Payable Specialist at Simera
User
Good security and privacy capabilities with excellent support
Pros and Cons
  • "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
  • "I have found that the log-in/out process takes quite some time."

What is our primary use case?

I needed the solution to attach it to the vendor's file in our accounting software. The customer service team provided such an efficient and fast service. We have an account manager, which is great as we get personalized attention. I asked for the W-9 form once, and it was provided to me. I was not able to download it and then forgot about it. I asked for it again, and without any hesitation, the team provided it again. They were not rude about it. I later realized and apologized for asking for it twice.

How has it helped my organization?

Our organization is more secure with Perimeter81's Virtual Private Network (VPN). We manage sensitive information of clients. In my department, we manage bank and credit card information. It is a lot of responsibility to have access to that kind of data. Now that our company has implemented Perimeter81's services with the VPN, personally, I feel more secure when navigating through these different platforms. It is a great investment for today's workplaces - especially when we handle critical information virtually.

What is most valuable?

The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online. 

Similarly, I find that the work that Perimeter 81's customer service team does is very valuable. I have heard from our IT department that Perimeter 81's team is quite knowledgeable and efficient. These are important traits and they describe not only the company's service but the quality of its product as well. So far, our company is very happy with the product.

What needs improvement?

Overall the product is very efficient. However, personally, there is something that I dislike. I have found that the log-in/out process takes quite some time. I usually click on the app, and it asks me to login in through the web, and then after I log in it takes me back to the app. It seems to me that I should be able to log out without having to leave the app. I do like that it connects automatically/logs in as soon as I sign on. I am not sure why login in is easier than logout. 

For how long have I used the solution?

The resolution took a couple of hours to be solved, around six hours.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

The experience with technical support was great. The team is professional, polite, and efficient.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time that we used a VPN in the company.

How was the initial setup?

I'm not able to say what the setup is like.

What about the implementation team?

I'm not able to say if we had any outside assistance.

What was our ROI?

I'm not able to say what the ROI would be.

What's my experience with pricing, setup cost, and licensing?

I am not able to advise on the cost/pricing.

Which other solutions did I evaluate?

This decision was made by the IT department, however, naturally, they did evaluate other vendors

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company has a business relationship with this vendor other than being a customer. Simera, the company I work, is the client. I am an user.
PeerSpot user
Karol Méndez - PeerSpot reviewer
Administrador de Office 365 y Azure at ITQS
User
Easy to implement with good visibility and helpful audit reports
Pros and Cons
  • "The characteristics that I have liked the most are the ease of implementation and administration."
  • "Sometimes downloading PDF files can be slow."

What is our primary use case?

We are a company of around 30-50 people who have been working from home since the pandemic began. Our environment is completely cloud-based and all our computers are managed by our organization. 

We needed a solution that would help us protect users and the information that is handled in our company. This solution had to comply with characteristics such as the protection of network connections, prevention of threats such as malware and phishing, data protection, and, above all, it had to be easy to implement and manage. This is why we implemented Check Point Harmony Connect.

How has it helped my organization?

Check Point Harmony Connect helped us create a more secure environment in our organization, since our users can be safer when browsing and not being attacked by malicious actors who try to affect them with phishing or malware. On the other hand, administrators have more visibility of the sites to which users navigate and be able to control them, they can also access audit reports that allow them to make better decisions on security rules that must be applied. The protection of data in our company is the most important.

What is most valuable?

The characteristics that I have liked the most are the ease of implementation and administration. It is a cloud-based service it can be configured easily and very quickly and the administration center is very friendly for administrator users who do not know or have used the product. 

In addition, it is a cloud-based service that helps prevent cyber attacks by ensuring internet access for our users who work remotely, facilitating access control. 

Another valuable feature is that company information is kept protected by internet access control, applications to be managed, and URL filtering protection.

What needs improvement?

Sometimes downloading PDF files can be slow. It may take a while to scan the downloaded files. On some computers, the Check Point Harmony Connect agent can be a bit heavy to run in terms of CPU and Memory resources. 

Transparency to end-users could be improved. 

More compatible applications can be included. 

The support provided could be improved for when problems arise that require support from the Check Point team. Check Point is an expensive product so support should be more adequate. 

Some EDR features may still be under development and may need more time to be ready for use on a larger scale.

For how long have I used the solution?

I've used the solution for one year.

What do I think about the stability of the solution?

Stability is 90% good. File scanning and web console stability could be improved.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Support is good, however, in some cases, they could improve the response time.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have not used any other option before.

How was the initial setup?

The initial configuration was very easy to perform; the installation on the endpoints was very simple for the users.

What about the implementation team?

The initial setup was handled by an internal team with supervision or support from the provider.

What was our ROI?

There have been savings related to the number of hours of implementation and administration.

What's my experience with pricing, setup cost, and licensing?

I recommend that you evaluate using Check Point Harmony Connect, since, although its price may be a little more expensive, it is a solution that adds advanced security to the organization.

Which other solutions did I evaluate?

I only evaluated Microsoft and evaluated if Fortinet had any product that met the requirements.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1833354 - PeerSpot reviewer
Network & Information Security Expert at Malam-Team
User
Offer excellent anti-malware, URL filtering, and anti-ransomware features
Pros and Cons
  • "It's improved the security of every single OS in the organization as well as the visibility and security capabilities."
  • "More report and alert options would be useful."

What is our primary use case?

We use the EDR solution for servers and endpoints for a lot of customers. The use case is for offering protection at the OS level. 

We wanted a better solution than legacy antivirus to secure each OS in the organization. Harmony Endpoint gives us a complete security package with a lot of security features that regularly require a lot of separate security products and a lot of overhead management. 

The environments include on-premise servers - mostly Windows - as well as laptops and desktops with Windows and Mac OS. We also have some cloud services in Azure and AWS.

How has it helped my organization?

It's improved the security of every single OS in the organization as well as the visibility and security capabilities. With Harmony Endpoint, we give each computer advanced anti-malware protection and internet browsing protection (like proxy protection), and advanced phishing protection inside websites. 

It takes care of the concern about ransomware. Today, it's more important to secure each endpoint in the organization at the OS level rather than the organization network level as users are connecting from everywhere. This is why Harmony is so important to us.

What is most valuable?

The solution offers very good features including anti-malware, URL filtering, and anti-ransomware. The product offers a complete solution in one package and it's on every single OS. 

The most valuable part of this product is the complete security package in one single endpoint that includes the legacy anti-virus protection, advanced anti-malware protection, browsing protection, and even firewall capabilities at the OS level. 

In a lot of cases, when we want to give all these security features to every endpoint, we need to implement a lot of separate security products.

What needs improvement?

More report and alert options would be useful. The reports are not good enough and alerts are not usable. 

We need more user-friendly alerts and more options for the alerts. The reports are not capable of giving important information from some parts of the system - like inventory details, etc. 

Also, the logs in the product are not very usable. If you have any blocking of a legitimate app or some problem you will have a hard time finding a log about it and most of the time you will not find any information. 

The product doesn't have an automatic shutdown switch. You must uninstall it in order to shut it down.

For how long have I used the solution?

I've used the solution for about one year.

What do I think about the stability of the solution?

It's very stable. However, they need to resolve some bugs and feature requests.

What do I think about the scalability of the solution?

It's a cloud solution. We are using the cloud-managed solution which makes it very scalable.

How are customer service and support?

The solution offers the best customer service and support in the market.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Symantec and we wanted to move forward to an EDR solution that gives a more complete security solution for today's needs.

How was the initial setup?

The initial setup is very straightforward.

What about the implementation team?

We implemented it in-house. We learned how to do it by ourselves.

What's my experience with pricing, setup cost, and licensing?

There are only two types of licenses. If you don't need sandbox features, you can take the basic license and it includes everything.

Which other solutions did I evaluate?

We tried Sentinal ONE, CrowdStrike, Microsoft, Trend Micro, and McAfee.

What other advice do I have?

It's the perfect solution for endpoint protection and has a lot of features included.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mohan Janarthanan - PeerSpot reviewer
Assosiate Vice President at Novac Technology Solutions
Real User
Top 5
Great real-time phishing blocking, great zero-day sandboxing, and effectively minimizes threats
Pros and Cons
  • "Overall, the unified agent covers endpoints as well as prevents web browser attacks."
  • "Providing USB control in a Linux environment will give more control over data security."

What is our primary use case?

We use the solution as an endpoint protection platform, which supports the next-generation antivirus. It offers endpoint detection and response and will help on addressing a single agent that will support multiple features. 

This helps IT Security operations front to minimize the security threats. Also, we can map the MITRE ATT&CK framework in a single dashboard which provides complete endpoint device visibility.

The solution offers runtime protection against ransomware, malware, and file-less attacks, with instant and full remediation features that give good insights into the organization's threat landscape.

How has it helped my organization?

The unified agent helps in addressing the system usage. Instead of installing different agents and real-time protection, the platform provides greater visibility to the operation team to see incidents in real-time, instead of creating a lot of false positives. The vaulted space features give more controls on signed processes. In case the malware attempts to perform a shadow copy deletion, the machine will not lose any data. We can also take a backup of the file.

Phishing protection gives good insights about credential theft and zero phishing.

Overall, the unified agent covers endpoints as well as prevents web browser attacks.

What is most valuable?

Phishing sites are blocked in real-time and protect against previously unknown phishing sites and corporate credential re-use. This will prevent the business end-user from being compromised by attacks.

Zero-day sandboxing is an additional feature that can provide greater visibility on the sandboxing end and gives more control on the threat front. We can sanitize the files if we want, using a threat extraction process with infected files that can be cleaned in the process and provides a safe environment.

What needs improvement?

The remote browser isolation is not part of the unified agent, as of now. It could protect more on threat intel sources and could give a broader view of threat hunting. 

Soon, the unified agent should take more CPU processing in the systems-deployed Check Point agent. 

Providing USB control in a Linux environment will give more control over data security. Few other OEMs provide Linux USB control. If Check Point could adopt the technology in near future, it would give more of a value add to existing customers. 

For how long have I used the solution?

I've used the solution for more than six months. We are using the Check Point Harmony end point solution.

Which solution did I use previously and why did I switch?

We switched in order to avoid multiple agents.

What's my experience with pricing, setup cost, and licensing?

Pricing is purely based on their industry and company decisions.

Which other solutions did I evaluate?

We did look at the Sentinel product.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.