No more typing reviews! Try our Samantha, our new voice AI agent.
Mohan Janarthanan - PeerSpot reviewer
Associate Vice President at Novac Technology Solutions
Real User
Top 5Leaderboard
Apr 9, 2022
Great real-time phishing blocking, great zero-day sandboxing, and effectively minimizes threats
Pros and Cons
  • "Overall, the unified agent covers endpoints as well as prevents web browser attacks."
  • "Overall, the unified agent covers endpoints as well as prevents web browser attacks."
  • "Providing USB control in a Linux environment will give more control over data security."
  • "The remote browser isolation is not part of the unified agent, as of now."

What is our primary use case?

We use the solution as an endpoint protection platform, which supports the next-generation antivirus. It offers endpoint detection and response and will help on addressing a single agent that will support multiple features. 

This helps IT Security operations front to minimize the security threats. Also, we can map the MITRE ATT&CK framework in a single dashboard which provides complete endpoint device visibility.

The solution offers runtime protection against ransomware, malware, and file-less attacks, with instant and full remediation features that give good insights into the organization's threat landscape.

How has it helped my organization?

The unified agent helps in addressing the system usage. Instead of installing different agents and real-time protection, the platform provides greater visibility to the operation team to see incidents in real-time, instead of creating a lot of false positives. The vaulted space features give more controls on signed processes. In case the malware attempts to perform a shadow copy deletion, the machine will not lose any data. We can also take a backup of the file.

Phishing protection gives good insights about credential theft and zero phishing.

Overall, the unified agent covers endpoints as well as prevents web browser attacks.

What is most valuable?

Phishing sites are blocked in real-time and protect against previously unknown phishing sites and corporate credential re-use. This will prevent the business end-user from being compromised by attacks.

Zero-day sandboxing is an additional feature that can provide greater visibility on the sandboxing end and gives more control on the threat front. We can sanitize the files if we want, using a threat extraction process with infected files that can be cleaned in the process and provides a safe environment.

What needs improvement?

The remote browser isolation is not part of the unified agent, as of now. It could protect more on threat intel sources and could give a broader view of threat hunting. 

Soon, the unified agent should take more CPU processing in the systems-deployed Check Point agent. 

Providing USB control in a Linux environment will give more control over data security. Few other OEMs provide Linux USB control. If Check Point could adopt the technology in near future, it would give more of a value add to existing customers. 

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
May 2026
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,438 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for more than six months. We are using the Check Point Harmony end point solution.

Which solution did I use previously and why did I switch?

We switched in order to avoid multiple agents.

What's my experience with pricing, setup cost, and licensing?

Pricing is purely based on their industry and company decisions.

Which other solutions did I evaluate?

We did look at the Sentinel product.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1831461 - PeerSpot reviewer
Senior Information Security Manager at Adidas
User
Apr 9, 2022
Secure, with good support and an openness to constructive feedback
Pros and Cons
  • "The Check Point portfolio showcases very strong products."
  • "The product is great as it allows users to deliver the most security value at the fastest speed."
  • "An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia."
  • "An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia."

What is our primary use case?

We are using the product to secure roaming users who work outside the office as well for protecting a variety of company locations. 

It is great that Check Point continues to be a visionary in the network security market and delivers such anticipated products which allow users to cope with ongoing security challenges and trends.

It is used to protect offices and retail stores and it is a step forward from the traditional connectivity architecture which lacks flexibility and prevents business to advance at the desired pace.

How has it helped my organization?

It is great from an operational point of view. There is no need to procure and install HW; a new location could be secured almost instantly.

There is no need to talk about security. It comes from a team of talented developers and has a historic record. The Check Point portfolio showcases very strong products. 

The support from Check Point's side is great as it always and allows you to understand the product, produce and secure design as well as deploy and test it. Furthermore, the product owners are actively looking for feedback. This allows you to express your opinion and shape the product to improve it according to your needs.

What is most valuable?

The product is great as it allows users to deliver the most security value at the fastest speed. It reduces an operational load in terms of provision, installation, management, patching, and hardware replacement by increasing uptime and reducing the time to deliver to market. It also provides cloud-native availability and allows you not to bother with the sizing and location capacity as long as you stick with Harmony Connect. The price is reasonable.

Last but not least, there is an option to manage Harmony Connect from the centralized management station which allows users to apply existing policies while having a single pane of glass for network security.

What needs improvement?

An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia. Some PoP locations might create complicated traffic flows and impact the latency and load on network infrastructure even further.

Advanced details of log information are missing. However, the Check Point team is definitely open to constructive advice and is happy to make any requested changes.

There are still some limitations that exist while using centralized management with Harmony Connect.

For how long have I used the solution?

I've used the solution for six months.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
May 2026
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,438 professionals have used our research since 2012.
Harold Suárez, MGP, PMP® - PeerSpot reviewer
Project Management and Deployment Team Leader at Sefisa
MSP
Apr 8, 2022
User-friendly, easy to implement, and offers excellent integration capabilities
Pros and Cons
  • "I find it very easy to implement and deploy in the organization."
  • "I find it very easy to implement and deploy in the organization."
  • "Zero Trust Network Access can be a security breach if not used correctly."
  • "Zero Trust Network Access can be a security breach if not used correctly."

What is our primary use case?

We needed to connect the branches with the users, and, in turn, we needed to connect the users with the applications of the organization. However, we needed to secure this connection since the users were at home. The branches had Citrix SD-WAN and therefore we needed a solution that would integrate with the current solution that connected the branches to the central site.

The client's requirements were that the solution could:

  • Be designed to prevent the most evasive cyberattacks
  • Have Zero-Trust network access to enterprise applications
  • Secure Internet access for remote users
  • Protect branch office (SD-WAN) connections to the Internet and the cloud

How has it helped my organization?

I have worked with Check Point Harmony Connect, which is a Secure Access Service Edge (SASE) solution, which unifies multiple cloud-delivered network security products to prevent sophisticated cyberattacks and simplify policy management.

I find it very easy to implement and deploy in the organization. One point to note is that it is a very user-centric solution.

The integration that this solution has with the different routers or perimeter equipment is exceptional. We were able to implement the solution on the same hardware as the SD-WAN equipment in each branch and central site.

What is most valuable?

One point to keep in mind is that it is a user-centric solution. 

Additionally, the solution has an integration with Citrix SD-WAN that allows a remote implementation in each of the branches. 

Mainly, Zero Trust Network Access is one of the most important features of this Check Point Harmony Connect solution. It's of the Secure Access Service Edge (SASE) type since it gives us secure access to the organization as if we were physically in the organization. 

I find it very easy to implement and deploy in the organization.

What needs improvement?

A ZTNA architecture is designed to reduce cybersecurity risk by eliminating implicit trust within an organization's IT infrastructure.

Zero Trust Network Access can be a security breach if not used correctly. I have implemented it and it turns out that access to the organization's applications must be complemented with user awareness.

It is important to note that the Zero Trust Network Access feature is an important feature for the solution, however, at the same time, the organization's applications can be accessed if user access is available. A double authentication factor could solve this gap.

For how long have I used the solution?

I've been using the solution for almost two years.

What do I think about the stability of the solution?

Check Point Harmony Connect is quite stable in the implementation I did together with Citrix SD-WAN.

Citrix SD-WAN appliances are SDN/NFV-ready platforms designed to host virtualized network functions (VNFs).

Hosting a Check Point virtual machine (VM) on Citrix SD-WAN branch appliances provides customers with granular control of their security and data.

Together, the integrated SD-WAN and advanced Threat Prevention platform provide secure and optimized WAN connectivity over Internet links and WAN connections. By dramatically simplifying deployments and reducing costs, Check Point and Citrix SD-WAN provide enterprises with an affordable and secure remote branch office security solution.

What do I think about the scalability of the solution?

I find it very easy to implement and deploy in the organization.

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

What's my experience with pricing, setup cost, and licensing?

This is a SaaS. For this reason, the cost, pricing, and licensing depend according to your necessity.

Which other solutions did I evaluate?

I also looked into Forcepoint SASE.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cassio Silva - PeerSpot reviewer
Senior Network Administrator at eSales Solutions
Real User
Apr 7, 2022
Reasonably priced with an easy initial setup and great centralization capabilities
Pros and Cons
  • "The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment."
  • "The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment."
  • "As it is a new market solution, I still face some instabilities in access at certain times of the day when I have more than 150 users using it simultaneously."
  • "As it is a new market solution, I still face some instabilities in access at certain times of the day when I have more than 150 users using it simultaneously."

What is our primary use case?

My production environment today is hybrid and I use several cloud solutions and more than one on-premise data center. The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment. It does all this with an additional gain of the possibility of auditing some accesses to the environment.

What needs improvement?

As it is a new market solution, I still face some instabilities in access at certain times of the day when I have more than 150 users using it simultaneously. It would be interesting for the solution to have something that monitors and scales more resources by itself so that these instabilities do not occur. 

Another problem faced is that, regarding the audit, native RDP sessions, as well as the database, are not recorded and it is not possible to audit the use by the collaborators. 

These two points would be important for the evolution of the tool.

For how long have I used the solution?

I've used the solution for just over two years.

What do I think about the stability of the solution?

As mentioned, some improvements are needed in regard to stability.

What do I think about the scalability of the solution?

It is a solution that is meeting expectations well - even though there are some points to improve.

How are customer service and support?

Technical support is a little slow most of the time.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Previously I used a VPN solution. I changed it for ease of management and centralization of access.

How was the initial setup?

The initial setup was simple.

What about the implementation team?

The implementation was executed using a hybrid form.

What was our ROI?

ROI hasn't been calculated yet.

What's my experience with pricing, setup cost, and licensing?

Values ​​are within market expectations.

Which other solutions did I evaluate?

I haven't considered other options.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
User
Mar 17, 2022
Easy to use, fast, and secure
Pros and Cons
  • "Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
  • "Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
  • "The overall UI could be improved and updated to bring a simpler feel to the application."
  • "The overall UI could be improved and updated to bring a simpler feel to the application."

What is our primary use case?

Primarily I use the product for work purposes. My work environment is currently remote, therefore, I tend to move between private and public networks pretty often. Having this solution for public networks is key in ensuring that you are staying secure while browsing or using work-related software or services. While working from home, people tend to travel and never realize that public networks are very insecure and they allow hackers to access information from your computer very easily, especially if you don't have a VPN service.

How has it helped my organization?

Perimeter 81 has increased my security and privacy while maintaining solid internet performance. 

Without this software, I tend to always be concerned with security and privacy while browsing the web, however, when I'm using this software, I tend to feel more comfortable browsing knowing that I'm covered. It has made working from home feel more secure while not impacting computer performance. 

Many other services that I've used heavily affect the overall performance of my computer, however Perimeter 81 doesn't affect it at all.

What is most valuable?

The Perimeter 81 VPN is fast and secure. It also is very easy to use, with a simple yet elegant UI. I like how this software will automatically turn on my VPN and connect whenever I hop on my machine. The Always On VPN really can't be beaten. 

While I'm using this service, I never even notice that I'm using it (due to the overall performance of the program), which is really what you want when you're using a VPN. This has to be the most valuable part of this software, along with the user-friendly interface. 

What needs improvement?

I don't think that this service can be improved. Speed and privacy could always be improved, however, the current product doesn't lack these criteria. I also think that the overall UI could be improved and updated to bring a simpler feel to the application, but again, the software doesn't truly lack in this category. 

Aside from this, the service is really pleasant to use and I've never once had the thought of uninstalling the application. While it would be great to have the ability to move the location of the VPN, I don't think that this is required to increase the overall performance.

For how long have I used the solution?

I've used this solution for about two months.

What do I think about the stability of the solution?

I've gotten a great first impression in terms of stability.

What do I think about the scalability of the solution?

The scalability has given me a great first impression.

How are customer service and support?

I haven't had to reach out to support.

Which solution did I use previously and why did I switch?

I've used other services. That said, I didn't have a great experience with their UI and performance lacking abilities.

How was the initial setup?

The setup was a breeze.

What about the implementation team?

I'm not too sure if we had assistance or not.

What's my experience with pricing, setup cost, and licensing?

This service is very affordable and worth it for what you actually get out of the software.

Which other solutions did I evaluate?

I didn't look into other options before choosing this service, however, I don't think there is a need to at the moment.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1783953 - PeerSpot reviewer
UX Analyst at AnswerLab
User
Feb 16, 2022
Great for remote access and security with the ability to have multiple networks
Pros and Cons
  • "It keeps us all accountable and ensures secure internet connections while we all work remotely."
  • "Having Perimeter 81 as a solution in those instances to keep our team secure has been really great."
  • "I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful."
  • "I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful."

What is our primary use case?

I work from home primarily, however, in a multi-unit complex. I often worry about internet security. From time to time, I also work from a coffee shop and that's when I really lean on Perimeter 81

It's definitely nice to know that no matter where I am I can use Perimeter 81 to make my connection more secure. Sometimes there is sensitive information or documents I work with and this extra layer of protection gives me a lot of peace of mind while I'm working (though I still tend to only work from home in those cases). 

How has it helped my organization?

It keeps us all accountable and ensures secure internet connections while we all work remotely. 

We have team members that live all over the country and some that chose to work abroad or in different locations periodically (since the pandemic). Having Perimeter 81 as a solution in those instances to keep our team secure has been really great. 

We eventually will have even more employees that are working remotely, and maybe even some international employees, so I'm sure we'll find it even more useful then. 

What is most valuable?

I would say the multiple networks are the most valuable aspects. I think it's cool that, depending on where I'm located, I can join a network with a specific gateway for my region. 

I don't exactly know what other features I could be using. Getting more of a tutorial or walkthrough would be awesome. I know our IT team doesn't have time for that kind of thing, however, so I would think it best to come from the solution's team. Even if it was just a quick video or animations that show you new features as you're getting acquainted with the product, that would be great. I wouldn't want a lot of emails, however, maybe a banner pop-up would work from time to time.

What needs improvement?

I don't know all the other ways I could be using the product, so I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful. I wouldn't want anything too exhaustive or frequent - just something that could share some high-level features that may be helpful for at-home workers or even security tips. I'm not super-versed in that kind of thing, so I would find that valuable. I would love a little tutorial that's quick. 

For how long have I used the solution?

I've been using it for about four months and I really love it. Not only is it easy to use but it adds some peace of mind. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1765167 - PeerSpot reviewer
Underwriter at GraceKennedy
User
Jan 24, 2022
It connects quickly and stays connected
Pros and Cons
  • "It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go."
  • "Perimeter 81 has been a game-changer at my company."
  • "If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on."

What is our primary use case?

I use Perimeter 81 mostly for remote work. I work in a fast-paced, customer-centric environment overseeing a team of about four or five people who regularly need urgent assistance. I also host group meetings that require me to use other applications that need a VPN. Perimeter 81 has helped me stay connected right around the clock with almost no need for IT app support each day. Dealing with clients online requires good VPN hosting, and Perimeter 81 has provided that

How has it helped my organization?

Perimeter 81 has been a game-changer at my company. Service delivery has improved internally and externally. We had lots of dropped VPN signals with our previous provider, so it was refreshing when we started testing Perimeter 81. We are now considering switching all of our remote employees to Perimeter 81 based on the experiences that the initial users shared during our bi-weekly department and company meetings. 

What is most valuable?

It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go. There is also a diagnostic feature that helps you troubleshoot any issue you have, but I've never had to use this because I haven't had any issues. 

What needs improvement?

If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on. 

For how long have I used the solution?

I've been using Perimeter 81 for about six months

What do I think about the stability of the solution?

Perimeter 81 is highly stable.

What do I think about the scalability of the solution?

Perimeter 81 is highly scalable.

Which solution did I use previously and why did I switch?

Our previous VPN provider dropped the signal too often.

How was the initial setup?

Setting up Perimeter 81 wasn't complex.

What about the implementation team?

We deployed Perimeter 81 in-house.

What other advice do I have?

I rate Perimeter 81 10 out of 10.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1751151 - PeerSpot reviewer
Customer Success Manager at inSided B.V.
User
Jan 4, 2022
Helpful technical support with great single sign-on functionality and a seamless login experience
Pros and Cons
  • "It helps to quickly get access to the pages I need."
  • "The service offers decent speed without interruptions, which allows me to work and focus without distractions or interruptions to what I am trying to achieve."
  • "Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."
  • "Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."

What is our primary use case?

The solution provides access to our own environments. Our environments are usually restricted by IP from external access, so I cannot access it from a regular internet connection. I can with this product. 

We also have a system in place that allows us to access to our own SSO login for our customer environments, without having to use individual logins for all of our customers. By doing so, we protect our customer environments from external public access, which is vital to our customers - especially in the onboarding phase of the lifecycle.

How has it helped my organization?

It helps to quickly get access to the pages I need. 

The overall login experience is seamless and usually also has no issues. I rarely have to restart the service. 

The service offers decent speed without interruptions, which allows me to work and focus without distractions or interruptions to what I am trying to achieve. This is reducing my work stress a lot as switching focus constantly has a negative impact on the quality of our products and services, which would affect our customer sentiment in a negative way.

What is most valuable?

The tool does offer a single sign-on for businesses. This means that I no longer have to remember a separate, individual password for this tool. Other tools require that, which is a big downside as I used to have to retrieve this password from my mails every time that I attempted to perform a login to the service. 

With single sign-on, the system will automatically detect who I am and which organization I belong to. This speeds up the process and even a restart of the system will not require me to lose time.

What needs improvement?

There is not much to improve. 

Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily. This could also be solved, however, this issue might be related to the way in which we have set up our current implementation of this service. This does not have to be a global shortcoming when using this service.

For how long have I used the solution?

We've used the solution for about two years.

What do I think about the stability of the solution?

The product is very stable so far. We have been connected for 36 hours without issue.

What do I think about the scalability of the solution?

The solution is very scalable; it is easy to add more seats.

How are customer service and support?

Support was quick and able to help with my query.

How would you rate customer service and support?

Positive

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2026
Buyer's Guide
Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.