I use Perimeter 81 mostly for remote work. I work in a fast-paced, customer-centric environment overseeing a team of about four or five people who regularly need urgent assistance. I also host group meetings that require me to use other applications that need a VPN. Perimeter 81 has helped me stay connected right around the clock with almost no need for IT app support each day. Dealing with clients online requires good VPN hosting, and Perimeter 81 has provided that
Underwriter at GraceKennedy
It connects quickly and stays connected
Pros and Cons
- "It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go."
- "If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on."
What is our primary use case?
How has it helped my organization?
Perimeter 81 has been a game-changer at my company. Service delivery has improved internally and externally. We had lots of dropped VPN signals with our previous provider, so it was refreshing when we started testing Perimeter 81. We are now considering switching all of our remote employees to Perimeter 81 based on the experiences that the initial users shared during our bi-weekly department and company meetings.
What is most valuable?
It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go. There is also a diagnostic feature that helps you troubleshoot any issue you have, but I've never had to use this because I haven't had any issues.
What needs improvement?
If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on.
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
June 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
For how long have I used the solution?
I've been using Perimeter 81 for about six months
What do I think about the stability of the solution?
Perimeter 81 is highly stable.
What do I think about the scalability of the solution?
Perimeter 81 is highly scalable.
Which solution did I use previously and why did I switch?
Our previous VPN provider dropped the signal too often.
How was the initial setup?
Setting up Perimeter 81 wasn't complex.
What about the implementation team?
We deployed Perimeter 81 in-house.
What other advice do I have?
I rate Perimeter 81 10 out of 10.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:

Easy to configure, simple to find connection problems, and makes access easier
Pros and Cons
- "The solution provides us with an easy way to configure and join the VPN with Perimeter 81."
- "In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality."
What is our primary use case?
In order to connect to our applications like our own GitLab solution or our logs tracking system, we need to connect using the Perimeter 81 application. Before that, we needed to have installed the Amazon Workspaces solution and joined it to that one, so every developer or person who needed access to Gitlab. With Perimeter81, each user that needs Gitlab or logs access has a user created.
The maintenance of this solution is easier and we also decrease the problems related to workspace scenarios
How has it helped my organization?
In the past, we needed to use Amazon workspaces in order to connect to the 'VPN', and, after that, we were able to have access to our private Gitlab solution and logs.
This was a mess as each developer or person who needed access to Gitlab needed a Workspace created for that use - even if only you needed to access it just for one day and did not use it anymore. Even in these cases, we needed someone from the infrastructure team to create that particular workspace. With Perimeter 81, we only need to create a user and install the Perimeter81 application on the computer.
What is most valuable?
The solution provides us with:
- An easy way to configure and join the VPN with Perimeter 81. Previously, we were using Amazon workspaces and it took too much time in order to configure the workspace properly in order to just access our Gitlab repository or our logs for just one or two times of use.
- An easy way to find connection problems. You can easily contact Perimeter 81 or check https://status.perimeter81.com to see if some incidents are related to the issue that you have.
What needs improvement?
In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality. I'm using a Mac and we don't have that functionality. On the other hand, in order to connect with an application, we could have the opportunity to use a Google Chrome application/extension. That will make it easy to use and we can skip situations related to admin permissions in order to install the application on some laptops and computers.
For how long have I used the solution?
I've used the solution for six to seven months.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
June 2025

Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Consultant at ITQS
User-friendly, easy to install, and helps with monitoring
Pros and Cons
- "One of the most valuable features found using Harmony is being able to monitor in a simple and orderly way."
- "The support is not very good."
What is our primary use case?
It was implemented at work to be able to monitor collaborators and know what pages they are using and thus be able to take the necessary actions to block pages that are not authorized in the company and also know in which pages collaborators spend more time and be able to measure their work performance and thus be more effective in our company, on the other hand it helps a lot to improve the traffic and performance of the network, which is one of the points where it helps a lot.
Once all the security breaches of our collaborators have been detected, we can determine which options to mitigate in the company and improve security.
How has it helped my organization?
Harmony has improved the organization in being able to better monitor the use of internet bandwidth, accesses, pages, restrict pages, and allow sites, however, it has also been found that it makes machines a bit inefficient, this is because the program consumes many resources of the device where it is connected, sometimes causing slowness and starting to see many jams in the programs or processes that are being executed.
It has also been possible to determine that, for use on a Mac PC it is not very complicated to do the installation. You must have very robust equipment.
What is most valuable?
One of the most valuable features found using Harmony is being able to monitor in a simple and orderly way.
The panel configuration and agent installation on each of the machines is very practical and quickly distributed. Furthermore, all the equipment that does not have an agent installed can be viewed in the administration panel and have better control of each of the devices.
Another valuable characteristic is the configuration of reporting and information of each of the users. This report is quite complete, and it is possible to determine what actions to take in the organization and be able to present a report to high command.
What needs improvement?
One of the areas that must be improved is the ability to make the software less burdensome for the devices since they consume a lot of resources which makes it necessary to make an economic investment in the device itself such as servers, desktop laptops. that handle a relatively normal performance according to the functions it performs since, if used with a high-performance computer, Harmony behaves well and does not cause slowness.
This made us uninstall the product on several collaborating machines since the PC's performance dropped a lot. Some programs, like Teams, do not work and this causes us problems where we cannot monitor those machines.
For how long have I used the solution?
He used the product for 5 years.
What do I think about the stability of the solution?
The stability is very good, however, it harms a little of the performance of the PC.
What do I think about the scalability of the solution?
The scalability has been very good, it has helped us a lot to be able to improve our company.
How are customer service and support?
The support needs to improve lately it is very average they do not respond quickly they do not always comply with the SLA
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
Implementation is now easier since we have considerable experience using the tool.
What about the implementation team?
The installation was carried out with the tool vendor since we did not have much knowledge, today we have managed to have that learning curve and we have been able to do our own installations.
What was our ROI?
The investment in a security product will always have a return, not directly economical, but indirectly since all our information is secured.
What's my experience with pricing, setup cost, and licensing?
The cost is very accessible and the installation is very easy to implement.
Which other solutions did I evaluate?
We did not evaluate other options.
What other advice do I have?
It is very user-friendly. The panel is easy to use.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security IT at a tech services company with 51-200 employees
Excellent product - HC modern security tool
Pros and Cons
- "Protection against threats like ransomware is very effective."
- "Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us."
What is our primary use case?
This tool is of great help and allows us to provide security assistance to our users who work remotely. They connect from any site, secure or insecure, accessing applications and business email without protection as they are outside the company perimeter.
It gives us granular security through web control policies, reports, and monitoring. We manage to avoid user vulnerabilities from anywhere. It is managed with Harmony Connect in the Check Point Infinity Portal, a very good tool.
Users are quite happy with the applied security performance.
How has it helped my organization?
Check Point Harmony Connect has improved the protection of computers outside the office. It offers implementation that is simple.
Also, with the monitoring dashboard, we can make decisions to improve the control policies and web access so that we can better protect our teams.
This tool does not require being on the same network. Everything is verified thanks to a small Check Point protection agent that is installed on the client.
Protection against threats like ransomware is very effective.
What is most valuable?
We really liked the Check Point Harmony Connect tool and the monitoring, since we can make the right decisions thanks to the records observed in a simple way through the dashboard. The portal is really very intuitive.
The policies applied to users are quite granular, which helps a lot with the differential protection of users, generating managerial profiles and normal profiles efficiently.
We have also put VPNs into practice through harmony connect, having secure user connectivity. It is a very robust, modern, and secure tool.
What needs improvement?
They should include the ease of implementation or installation of the agent through an Excel list, where all the users can be loaded and added to be able to send the agent by mail.
I would also like it if they could include more documentation from the manufacturer to be able to implement it more efficiently and follow all the best practices.
Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us.
For how long have I used the solution?
We have been using this tool for approximately two years now. It is an excellent security tool to protect telecommuting users.
What do I think about the scalability of the solution?
This is an excellent cloud-managed Check Point tool; no server is required.
How are customer service and support?
Problems are always solved, however, with modern security applications, specifically those that are in the Check Point Infinity Portal, it is a little more difficult to solve with support.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We have not had a modern solution like this before. Check Point has innovated our processes.
What's my experience with pricing, setup cost, and licensing?
It is important to associate you company with a partner who can work with prices and documentation in order to find the security application that best suits the company's requirements.
Which other solutions did I evaluate?
Before acquiring any company-level security tool, we undertake the task of investigating several solutions. In this case, Check Point was the best.
What other advice do I have?
All Harmony solutions are excellent. I really recommend this option.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Easy to implement in branch and main office.
Pros and Cons
- "The application control and granular access feature are very easy to use, intuitive, and effective."
- "They could improve on the available public documentation."
What is our primary use case?
It provided us with the way to provide governance, control and monitoring of the visited sites, see vulnerabilities and find out how to deal with them in order to avoid cyber attacks.
With this tool, we can guarantee that the equipment will not be an easy target for cybercriminals. It is really simple to implement.
How has it helped my organization?
Checkpoint Harmony Connect helped us to guarantee the protection of equipment not covered by a Check Point Gateway. For example, when a vendor goes out and connects to the network from anywhere or is the target of cyber attacks (which can generate a loss of equipment functionality in addition to infiltrations or loss of company information that is confidential) which is why we decided to use this tool. It generated everything that was needed at the security level. It is an excellent tool.
What is most valuable?
The most valued features for us are:
The ease of implementation, of installation in the equipment, and the low performance of the equipment that the agent requires to provide security.
Its administration through a portal. Infinity Portal does not need to be implemented in an additional management server; rather, it is web-based and manageable from anywhere.
The application control and granular access feature are very easy to use, intuitive, and effective. It does not require equipment updates, policies are updated quickly.
What needs improvement?
They could improve on the available public documentation. The most modern applications or features of Check Point are difficult to find in their documentation for implementation. According to the manufacturer, sometimes it happens that the manual is applied, yet the desired implementation is not achieved.
Also, as seen in our support cases, it is somewhat slow to solve problems. There are other manufacturers that have better support. They can improve on that part and prevent customers from complaining about how they provide solutions.
For how long have I used the solution?
We have used this tool for about two years.
It is an excellent security tool that provides additional features to our existing GWs. We can provide web security with it.
Which solution did I use previously and why did I switch?
We had not really used other tools; when we had the need, we investigated, and we found Check Point Harmony Connect.
What's my experience with pricing, setup cost, and licensing?
The cost is difficult to find, however, our seller can solve these issues. The cost is normal. It is per protected user.
Which other solutions did I evaluate?
We validated some security solutions, however, Check Point Harmony Connect was perfectly suited to what we needed.
What other advice do I have?
It's a very modern tool and can be used to achieve security for old and new vulnerabilities.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager Cyber Security at a energy/utilities company with 5,001-10,000 employees
Is scalable, but integration from a management perspective needs improvement
Pros and Cons
- "The scalability is good, and I'd give it an eight out of ten."
- "The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."
What is our primary use case?
The primary use case has to do with the remote connectivity of sites.
What is most valuable?
I have found the IPsec VPN to be valuable.
What needs improvement?
The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass.
I would like to see the use of either GRE or non-IP tunnels in the next release.
For how long have I used the solution?
I've been working with Harmony Connect for about 18 months. I tested it but did not run it in production.
What do I think about the stability of the solution?
Stability wise, I'd rate Harmony Connect at seven out of ten. It could be more stable in some respects.
What do I think about the scalability of the solution?
The scalability is good, and I'd give it an eight out of ten.
How are customer service and support?
I found the technical support to be okay. Most of the technical support was geared to the regular equipment, and we had to find specialists within Check Point to look at Harmony Connect. Because of that, I would give technical support a rating of seven out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup is simple in some ways but complex in other ways. You need to know a lot about the Check Point side and the portal side to make it work.
What's my experience with pricing, setup cost, and licensing?
I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either.
Which other solutions did I evaluate?
We evaluated Silver Peak. Comprehensiveness was the main difference between Harmony Connect and Silver Peak. Harmony Connect is a little more suited for smaller branch offices as opposed to full-site connectivity.
What other advice do I have?
Overall, I would rate this solution at seven on a scale from one to ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
It replaces some older products and also adds features, like DLP (Data Loss Protection), and security gateway
Pros and Cons
- "The DRP is the most valuable feature."
- "My customers want more remote functionality. They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this."
What is our primary use case?
For the past two months, we have been evaluating Harmony Connect because it has some limitations on routing and account control, so we are testing it for three customers to check this function. In some areas, Harmony Connect can replace older VPN products and also add some features, like DRP and security gateway.
What is most valuable?
The DLP (Data Loss Protection) is the most valuable feature.
What needs improvement?
My customers want more remote functionality. They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this.
For how long have I used the solution?
This solution is new to Taiwan, so I haven't been using it for very long. I started using Harmony Connect in Q3 2022.
What do I think about the stability of the solution?
Harmony Connect has been stable so far, but this is still a test.
What do I think about the scalability of the solution?
There are some limitations on redundancy, and it takes about 30 minutes to switch. This is a significant limitation. Competitors like Palo Alto can do it in around five minutes. It's more appropriate for enterprises because they sell the product license in packages of 50 accounts at least.
How are customer service and support?
I rate Check Point customer service nine out of 10. It is excellent, especially on the customer side.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
Check Point Taiwan provides me with a lot of flexibility in pricing. If I'm trying to secure a customer, they can give me a good discount on this product. The price is about 350 HKD annually.
What other advice do I have?
I rate Check Point Harmony Connect eight out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Administrador de Office 365 y Azure at ITQS
Easy to implement with good visibility and helpful audit reports
Pros and Cons
- "The characteristics that I have liked the most are the ease of implementation and administration."
- "Sometimes downloading PDF files can be slow."
What is our primary use case?
We are a company of around 30-50 people who have been working from home since the pandemic began. Our environment is completely cloud-based and all our computers are managed by our organization.
We needed a solution that would help us protect users and the information that is handled in our company. This solution had to comply with characteristics such as the protection of network connections, prevention of threats such as malware and phishing, data protection, and, above all, it had to be easy to implement and manage. This is why we implemented Check Point Harmony Connect.
How has it helped my organization?
Check Point Harmony Connect helped us create a more secure environment in our organization, since our users can be safer when browsing and not being attacked by malicious actors who try to affect them with phishing or malware. On the other hand, administrators have more visibility of the sites to which users navigate and be able to control them, they can also access audit reports that allow them to make better decisions on security rules that must be applied. The protection of data in our company is the most important.
What is most valuable?
The characteristics that I have liked the most are the ease of implementation and administration. It is a cloud-based service it can be configured easily and very quickly and the administration center is very friendly for administrator users who do not know or have used the product.
In addition, it is a cloud-based service that helps prevent cyber attacks by ensuring internet access for our users who work remotely, facilitating access control.
Another valuable feature is that company information is kept protected by internet access control, applications to be managed, and URL filtering protection.
What needs improvement?
Sometimes downloading PDF files can be slow. It may take a while to scan the downloaded files. On some computers, the Check Point Harmony Connect agent can be a bit heavy to run in terms of CPU and Memory resources.
Transparency to end-users could be improved.
More compatible applications can be included.
The support provided could be improved for when problems arise that require support from the Check Point team. Check Point is an expensive product so support should be more adequate.
Some EDR features may still be under development and may need more time to be ready for use on a larger scale.
For how long have I used the solution?
I've used the solution for one year.
What do I think about the stability of the solution?
Stability is 90% good. File scanning and web console stability could be improved.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
Support is good, however, in some cases, they could improve the response time.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have not used any other option before.
How was the initial setup?
The initial configuration was very easy to perform; the installation on the endpoints was very simple for the users.
What about the implementation team?
The initial setup was handled by an internal team with supervision or support from the provider.
What was our ROI?
There have been savings related to the number of hours of implementation and administration.
What's my experience with pricing, setup cost, and licensing?
I recommend that you evaluate using Check Point Harmony Connect, since, although its price may be a little more expensive, it is a solution that adds advanced security to the organization.
Which other solutions did I evaluate?
I only evaluated Microsoft and evaluated if Fortinet had any product that met the requirements.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Firewalls Anti-Malware Tools Enterprise Infrastructure VPN ZTNA as a Service ZTNAPopular Comparisons
Fortinet FortiGate
Microsoft Defender for Endpoint
Cisco Secure Firewall
Prisma Access by Palo Alto Networks
Fortinet FortiClient
Zscaler Zero Trust Exchange Platform
Microsoft Exchange Online Protection (EOP)
OpenVPN Access Server
Cato SASE Cloud Platform
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?
- Why is Secure Access Service Edge (SASE) important for companies?