No more typing reviews! Try our Samantha, our new voice AI agent.
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Feb 20, 2023
Easy to implement in branch and main office.
Pros and Cons
  • "The application control and granular access feature are very easy to use, intuitive, and effective."
  • "They could improve on the available public documentation."

What is our primary use case?

It provided us with the way to provide governance, control and monitoring of the visited sites, see vulnerabilities and find out how to deal with them in order to avoid cyber attacks. 

With this tool, we can guarantee that the equipment will not be an easy target for cybercriminals. It is really simple to implement.        

How has it helped my organization?

Checkpoint Harmony Connect helped us to guarantee the protection of equipment not covered by a Check Point Gateway. For example, when a vendor goes out and connects to the network from anywhere or is the target of cyber attacks (which can generate a loss of equipment functionality in addition to infiltrations or loss of company information that is confidential) which is why we decided to use this tool. It generated everything that was needed at the security level. It is an excellent tool.

What is most valuable?

The most valued features for us are:

The ease of implementation, of installation in the equipment, and the low performance of the equipment that the agent requires to provide security.

Its administration through a portal. Infinity Portal does not need to be implemented in an additional management server; rather, it is web-based and manageable from anywhere.

The application control and granular access feature are very easy to use, intuitive, and effective. It does not require equipment updates, policies are updated quickly.

What needs improvement?

They could improve on the available public documentation. The most modern applications or features of Check Point are difficult to find in their documentation for implementation. According to the manufacturer, sometimes it happens that the manual is applied, yet the desired implementation is not achieved.

Also, as seen in our support cases, it is somewhat slow to solve problems. There are other manufacturers that have better support. They can improve on that part and prevent customers from complaining about how they provide solutions.

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
May 2026
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,438 professionals have used our research since 2012.

For how long have I used the solution?

We have used this tool for about two years.

It is an excellent security tool that provides additional features to our existing GWs. We can provide web security with it.

Which solution did I use previously and why did I switch?

We had not really used other tools; when we had the need, we investigated, and we found Check Point Harmony Connect.

What's my experience with pricing, setup cost, and licensing?

The cost is difficult to find, however, our seller can solve these issues. The cost is normal. It is per protected user.

Which other solutions did I evaluate?

We validated some security solutions, however, Check Point Harmony Connect was perfectly suited to what we needed.

What other advice do I have?

It's a very modern tool and can be used to achieve security for old and new vulnerabilities.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2088609 - PeerSpot reviewer
Manager Cyber Security at a energy/utilities company with 5,001-10,000 employees
Real User
Feb 7, 2023
Is scalable, but integration from a management perspective needs improvement
Pros and Cons
  • "The scalability is good, and I'd give it an eight out of ten."
  • "The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."

What is our primary use case?

The primary use case has to do with the remote connectivity of sites.

What is most valuable?

I have found the IPsec VPN to be valuable.

What needs improvement?

The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass.

I would like to see the use of either GRE or non-IP tunnels in the next release.

For how long have I used the solution?

I've been working with Harmony Connect for about 18 months. I tested it but did not run it in production.

What do I think about the stability of the solution?

Stability wise, I'd rate Harmony Connect at seven out of ten. It could be more stable in some respects.

What do I think about the scalability of the solution?

The scalability is good, and I'd give it an eight out of ten.

How are customer service and support?

I found the technical support to be okay. Most of the technical support was geared to the regular equipment, and we had to find specialists within Check Point to look at Harmony Connect. Because of that, I would give technical support a rating of seven out of ten.

How would you rate customer service and support?

Neutral

How was the initial setup?

The initial setup is simple in some ways but complex in other ways. You need to know a lot about the Check Point side and the portal side to make it work.

What's my experience with pricing, setup cost, and licensing?

I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either.

Which other solutions did I evaluate?

We evaluated Silver Peak. Comprehensiveness was the main difference between Harmony Connect and Silver Peak. Harmony Connect is a little more suited for smaller branch offices as opposed to full-site connectivity.

What other advice do I have?

Overall, I would rate this solution at seven on a scale from one to ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
May 2026
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,438 professionals have used our research since 2012.
Eric Liao - PeerSpot reviewer
Solution Manager at DYXnet Group
MSP
Top 5
Jan 6, 2023
It replaces some older products and also adds features, like DLP (Data Loss Protection), and security gateway
Pros and Cons
  • "The DRP is the most valuable feature."
  • "My customers want more remote functionality. They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this."

What is our primary use case?

For the past two months, we have been evaluating Harmony Connect because it has some limitations on routing and account control, so we are testing it for three customers to check this function. In some areas, Harmony Connect can replace older VPN products and also add some features, like DRP and security gateway.

What is most valuable?

The DLP (Data Loss Protection) is the most valuable feature. 

What needs improvement?

My customers want more remote functionality.  They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this.

For how long have I used the solution?

This solution is new to Taiwan, so I haven't been using it for very long. I started using Harmony Connect in Q3 2022.  

What do I think about the stability of the solution?

Harmony Connect has been stable so far, but this is still a test. 

What do I think about the scalability of the solution?

There are some limitations on redundancy, and it takes about 30 minutes to switch. This is a significant limitation. Competitors like Palo Alto can do it in around five minutes. It's more appropriate for enterprises because they sell the product license in packages of 50 accounts at least.

How are customer service and support?

I rate Check Point customer service nine out of 10. It is excellent, especially on the customer side. 

How would you rate customer service and support?

Positive

What's my experience with pricing, setup cost, and licensing?

Check Point Taiwan provides me with a lot of flexibility in pricing. If I'm trying to secure a customer, they can give me a good discount on this product. The price is about 350 HKD annually. 

What other advice do I have?

I rate Check Point Harmony Connect eight out of 10.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
reviewer1843137 - PeerSpot reviewer
Technical Support Specialist at a tech company with 201-500 employees
User
Apr 25, 2022
Secure and easy to use with problem-free connectivity
Pros and Cons
  • "Perimeter 81 provides a very secure and non-disruptive experience."
  • "Perimeter 81 provides a very secure and non-disruptive experience."
  • "What would be useful would be a notification/warning that a session is due to timeout after exceeding the default connection limit."
  • "What would be useful would be a notification/warning that a session is due to timeout after exceeding the default connection limit."

What is our primary use case?

This is a VPN solution that caters to remote working. I rely on this software heavily in order to connect to my company's internal network. Compared to my last job, which used a different VPN vendor, Perimeter 81 has caused no issues whatsoever. 

I'd easily recommend Perimeter to any businesses that are interested in purchasing the software. As an end-user, speaking from experience, I've found no issues whatsoever with this VPN. Changing between different networks is very easy and straightforward to do.

How has it helped my organization?

Perimeter 81 provides a very secure and non-disruptive experience. At my last job, we used a VPN vendor which would interrupt vital connections to the network. Whereas using Perimeter 81 in my new job has been a very stress-free experience without having to worry about disconnections. It's made my working relationship with my new employer easier without having to worry about dropped connections. What I would say is this has improved our organization via its simple and easy-to-use UI. Other users can easily troubleshoot and provide remedies to each other if issues do occur, which are very rare.

What is most valuable?

The easy but secure way of logging into the VPN makes mornings easier when logging in. It's a straightforward, 30-second sign-in process without any hassle required. I also found the lack of configuration required by end-users a much-appreciated touch. It's incredibly important that my connection is always stable and reliable. That is what I'd say is valuable about Perimeter 81. I rarely see any complaints on Perimeter 81 amongst other colleagues. This wasn't the case with the last vendor we used at my previous place of employment.

What needs improvement?

I am struggling to find improvements in particular that would benefit users. What would be useful would be a notification/warning that a session is due to timeout after exceeding the default connection limit. This can help me prepare for imminent disconnection due to my existing organizational connection limit. However, that being said, it could be a setting somewhere but I thought I'd add this as a point anyway. In terms of constructive feedback, I can't find any other improvements or suggestions from an end-user point of view.

For how long have I used the solution?

I've used the solution for less than one year.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1832316 - PeerSpot reviewer
Senior Security Architect at a energy/utilities company with 1,001-5,000 employees
Real User
Apr 14, 2022
Great anti-phishing, anti-bot, and URL filtering features
Pros and Cons
  • "The solution has many valuable aspects, including anti-Phishing, which blocks phishing attacks in all applications (email, messaging, and social networks)."
  • "Harmony Mobile has enabled us to provide the necessary information for the evaluation and analysis of the risks, threats, and security vulnerabilities to which mobile devices are currently exposed, as well as the technology used to address these risks."
  • "The product needs to work on the integration of alerts with different SIEM or security solutions."
  • "The product needs to work on the integration of alerts with different SIEM or security solutions."

What is our primary use case?

The development of mobile devices and wireless technologies in recent years has revolutionized the way people work and communicate. The growing use of these technologies makes mobile devices one of the main targets of cyber threats. 

The proliferation of mobile devices in recent years, together with the increase in their capabilities, features, and possibilities of use, makes it necessary to evaluate in-depth the security offered by this type of device. On top of that, the mechanisms for protecting the information they manage, within the Information and communications technology environments are key.

How has it helped my organization?

Harmony Mobile has enabled us to provide the necessary information for the evaluation and analysis of the risks, threats, and security vulnerabilities to which mobile devices are currently exposed, as well as the technology used to address these risks.

In addition, the document presents a list of general security recommendations aimed at protecting mobile devices, their communications and the information and data they manage and store.

We are using malicious application detection to identify known and unknown threats through threat emulation, advanced static code analysis, application reputation, and machine learning. The solution captures apps as they are downloaded to devices and runs them in a cloud-based virtual environment to analyze how safe they are.

What is most valuable?

The solution has many valuable aspects, including:

Anti-Phishing, which blocks phishing attacks in all applications (email, messaging, and social networks).

Safe Browsing, which blocks access to malicious sites in all browsers based on dynamic security intelligence provided by Check Point ThreatCloudTM, the world's largest threat database.

Conditional Access, which blocks infected devices from accessing corporate applications and data, regardless of UEM solutions.

Anti-Bot, which detects bot-infected devices and automatically blocks their communication with command and control (C&C) servers.

URL filtering, which prevents access to websites deemed inappropriate by an organization's corporate policies. It allows companies to blacklist and whitelist websites at a granular level of detail, and to enforce policies on mobile devices across all browser applications as well as non-browser-specific applications.

Wi-Fi network security, which detects malicious network behavior and man-in-the-middle attacks and automatically disables connections to malicious networks.

What needs improvement?

The product needs to work on the integration of alerts with different SIEM or security solutions. Harmony provides visibility of device security, yet, precisely due to the growth of attacks and threats on these technologies, it is important to integrate the information it generates with the rest of the intelligence handled by cybersecurity areas.

In the same vein, it would be important to have detailed information on the type of threats and new intelligence that the platform is providing, so that it is easy to alert users when it provides value.

For how long have I used the solution?

I've used the solution for one year.

How are customer service and support?

The solution offers excellent support service.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution. Instead, we were just using an MDM solution but although we can make configurations oriented to protect the devices, it is far from being a complete solution like Harmony. 

How was the initial setup?

The initial setup is easy.

What about the implementation team?

We handled the implementation in-house.

What's my experience with pricing, setup cost, and licensing?

I'd advise a potential new user to talk with their account manager.

Which other solutions did I evaluate?

We also evaluated McAfee and Cortex, but Harmony fixes better with my company requisites in order to run in background for end user.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1833354 - PeerSpot reviewer
Network & Information Security Expert at Malam-Team
User
Apr 13, 2022
Offer excellent anti-malware, URL filtering, and anti-ransomware features
Pros and Cons
  • "It's improved the security of every single OS in the organization as well as the visibility and security capabilities."
  • "Harmony Endpoint gives us a complete security package with a lot of security features that regularly require a lot of separate security products and a lot of overhead management."
  • "More report and alert options would be useful."
  • "More report and alert options would be useful. The reports are not capable of giving important information from some parts of the system - like inventory details, etc."

What is our primary use case?

We use the EDR solution for servers and endpoints for a lot of customers. The use case is for offering protection at the OS level. 

We wanted a better solution than legacy antivirus to secure each OS in the organization. Harmony Endpoint gives us a complete security package with a lot of security features that regularly require a lot of separate security products and a lot of overhead management. 

The environments include on-premise servers - mostly Windows - as well as laptops and desktops with Windows and Mac OS. We also have some cloud services in Azure and AWS.

How has it helped my organization?

It's improved the security of every single OS in the organization as well as the visibility and security capabilities. With Harmony Endpoint, we give each computer advanced anti-malware protection and internet browsing protection (like proxy protection), and advanced phishing protection inside websites. 

It takes care of the concern about ransomware. Today, it's more important to secure each endpoint in the organization at the OS level rather than the organization network level as users are connecting from everywhere. This is why Harmony is so important to us.

What is most valuable?

The solution offers very good features including anti-malware, URL filtering, and anti-ransomware. The product offers a complete solution in one package and it's on every single OS. 

The most valuable part of this product is the complete security package in one single endpoint that includes the legacy anti-virus protection, advanced anti-malware protection, browsing protection, and even firewall capabilities at the OS level. 

In a lot of cases, when we want to give all these security features to every endpoint, we need to implement a lot of separate security products.

What needs improvement?

More report and alert options would be useful. The reports are not good enough and alerts are not usable. 

We need more user-friendly alerts and more options for the alerts. The reports are not capable of giving important information from some parts of the system - like inventory details, etc. 

Also, the logs in the product are not very usable. If you have any blocking of a legitimate app or some problem you will have a hard time finding a log about it and most of the time you will not find any information. 

The product doesn't have an automatic shutdown switch. You must uninstall it in order to shut it down.

For how long have I used the solution?

I've used the solution for about one year.

What do I think about the stability of the solution?

It's very stable. However, they need to resolve some bugs and feature requests.

What do I think about the scalability of the solution?

It's a cloud solution. We are using the cloud-managed solution which makes it very scalable.

How are customer service and support?

The solution offers the best customer service and support in the market.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Symantec and we wanted to move forward to an EDR solution that gives a more complete security solution for today's needs.

How was the initial setup?

The initial setup is very straightforward.

What about the implementation team?

We implemented it in-house. We learned how to do it by ourselves.

What's my experience with pricing, setup cost, and licensing?

There are only two types of licenses. If you don't need sandbox features, you can take the basic license and it includes everything.

Which other solutions did I evaluate?

We tried Sentinal ONE, CrowdStrike, Microsoft, Trend Micro, and McAfee.

What other advice do I have?

It's the perfect solution for endpoint protection and has a lot of features included.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1832247 - PeerSpot reviewer
Sr. IT Network & Security Manager at Cloud Seven Trading and Contracting Co.
User
Apr 13, 2022
Good pricing, easy to use, and very secure
Pros and Cons
  • "The integration that this solution has with the different routers or perimeter equipment is exceptional."
  • "The solution is secure, scalable, and easy to handle with good support The Check Point portfolio showcases very strong products."
  • "The suspend feature needs more control."
  • "The suspend feature needs more control."

What is our primary use case?

We are using Harmony Connect (clientless and client) with Harmony Mobile, Harmony End Point, Harmony Office security.

Before we were using Fortinet Client with Token and we are now using Harmony Connect in Saudi Arabia. 

We use Check Point for application control, IPS, and web filter on-premises and wanted an in-kind solution for off-prem users. The primary requirement was for the Harmony policy to be able to be managed from the same SmartConsole instance as our on-premises gateways are managed.

How has it helped my organization?

The solution is secure, scalable, and easy to handle with good support

The Check Point portfolio showcases very strong products.

It very easily allows users to leverage their home office via safe access. If they had any type of issue with the machine, the disk is already encrypted.

The client's requirements were that the solution could:

  • Be designed to prevent the most evasive cyberattacks
  • Have Zero-Trust network access to enterprise applications
  • Secure Internet access for remote users
  • Protect branch office (SD-WAN) connections to the Internet and the cloud

What is most valuable?

Harmony Connect Client is very powerful tool.

I find it very easy to implement and deploy in the organization. One point to note is that it is a very user-centric solution.

The integration that this solution has with the different routers or perimeter equipment is exceptional. We were able to implement the solution on the same hardware as the SD-WAN equipment in each branch and central site.

Mainly, Zero Trust Network Access is one of the most important features of this Check Point Harmony Connect solution. It's of the Secure Access Service Edge (SASE) type since it gives us secure access to the organization as if we were physically in the organization.

What needs improvement?

The suspend feature needs more control.

Zero Trust Network Access can be a security breach if not used correctly. I have implemented it and it turns out that access to the organization's applications must be complemented with user awareness.

It is important to note that the Zero Trust Network Access feature is an important feature for the solution, however, at the same time, the organization's applications can be accessed if user access is available. A double authentication factor could solve this gap.

For how long have I used the solution?

I've been using the solution for one year.

Which solution did I use previously and why did I switch?

We were using Fortinet Client Token Solution. We switched as CP gives more control and visibility.

What's my experience with pricing, setup cost, and licensing?

The tool is very handy at a good price.

Which other solutions did I evaluate?

We did not look at other options.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1832313 - PeerSpot reviewer
Associate IT Engineer at Qualco
User
Apr 10, 2022
Great anti-malware scans with excellent disk encryption but it's difficult to install the Check Point client
Pros and Cons
  • "Using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials."
  • "The Check Point VPN connection is way more stable than our previous software."
  • "There is an issue when installing the Check Point client."
  • "There is an issue when installing the Check Point client."

What is our primary use case?

We are using Check Point Endpoint Security as an application for all corporate users. 

The main features are antivirus (antimalware, antiphishing), disk preboot encryption, and VPN connection. We also use SSL VPN (a VPN connection using a browser) for our external partners. 

We have about 250 active machines (both desktops and laptops), running Windows 10 Pro 64bit, an i5 or i7 processor with 8GB RAM or more, and SSD drives (all Dell hardware). The Check Point client we use is version E86.10.0036. 

We also have Check Point firewalls.

How has it helped my organization?

The disk encryption made our computers more secure for data leaks in the case of a stolen machine. 

The Check Point VPN connection is way more stable than our previous software. Previously, when connecting/disconnecting from a VPN while we were on a call, the network would temporarily drop and then reconnect again. Using Check Point's VPN, this does not happen anymore. 

Also, using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials. 

Anti-malware scans are also very helpful.

What is most valuable?

The preboot VPN connection, in the case where users are locked remotely. is very useful 

The disk encryption feature is important. The Check Point VPN connection process is quite simple when using the Microsoft MFA method. 

Previously, when connecting/disconnecting from a VPN while we were on a call, the network would temporarily drop and then reconnect again. Using Check Point VPN, this does not happen anymore. 

Also, using the preboot VPN option, we can reset a user who is working remotely that has forgotten their Windows login credentials. 

The anti-malware scan is very helpful. 

The SSL VPN is great where we can use a browser for external partners.

What needs improvement?

There is an issue when installing the Check Point client. If the machine has RAID on mode for storage rather than AHCI, the disk encryption never begins and stays in the "setup protection" warning message. Changing mode from RAID to AHCI means a Windows format is required, which takes more time. On top of that, in the preboot screen, sometimes caps lock is on, and yet when someone types it's not in capitals. When that happens, many users get locked. 

In addition to this, number lock should be automatically on as users think it is, and when they type they get locked again.

What do I think about the stability of the solution?

The solution is quite stable. There are minor bugs.

What do I think about the scalability of the solution?

The solution is pretty flexible.

Which solution did I use previously and why did I switch?

We did use a different solution. It was not our decision to switch (as it's managed by a group IT).

How was the initial setup?

I was not included in initial setup. The client setup on machines is easy.

What was our ROI?

We do not have any ROI details. 

What's my experience with pricing, setup cost, and licensing?

Data is not available in terms of pricing. 

Which other solutions did I evaluate?

Evaluations were not included in the process.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2026
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.