Try our new research platform with insights from 80,000+ expert users

Acronis Cyber Protect Home Office vs Check Point Harmony SASE (formerly Perimeter 81) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Acronis Cyber Protect Home ...
Ranking in Anti-Malware Tools
24th
Average Rating
9.0
Reviews Sentiment
6.7
Number of Reviews
3
Ranking in other categories
Backup and Recovery (38th)
Check Point Harmony SASE (f...
Ranking in Anti-Malware Tools
6th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
61
Ranking in other categories
Secure Web Gateways (SWG) (6th), Firewalls (15th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (4th), ZTNA (2nd), Secure Access Service Edge (SASE) (6th)
 

Mindshare comparison

As of June 2025, in the Anti-Malware Tools category, the mindshare of Acronis Cyber Protect Home Office is 0.7%, up from 0.4% compared to the previous year. The mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 0.5%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Anti-Malware Tools
 

Featured Reviews

BH
Reliable backup tool ensures quick restoration and peace of mind
I use Acronis for backups. I use it to back up to other drives on the network, back up the entire system, including system images of the Windows C drive and all the data drives. This is for a small business, just myself The reliable tool allows for quick restoration from backup copies, meaning I…
Nasseer Qureshi - PeerSpot reviewer
Delivers seamless and secure remote access while enhancing security posture
Check Point Harmony SASE (formerly Perimeter 81) offers strong features, but there are areas that could be improved. One area for improvement is integration with third-party identity providers. It works with standard SAML and SSO, but we would prefer deeper integrations with solutions such as Ping for more advanced identity-based policies. Additionally, a mobile-specific client or lightweight agent would be helpful for securing access from smartphones, especially in BYOD environments. We would appreciate more granular reporting and analytics, including better drill-down capabilities to investigate specific users or app activity. The logs are comprehensive, but filtering them can sometimes feel messy. The user interface on the management portal could be more intuitive, especially when managing multiple sites or remote offices. Some of the policy configuration steps are nested and could be streamlined.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The malware feature is most valuable."
"The customer service and support are excellent."
"Acronis schedules in the background and does incremental images so it doesn’t take forever to backup."
"The reliable tool allows for quick restoration from backup copies, meaning I do not have to reload Windows or programs."
"Its software solution also ensures connectivity and protects against NSF filtering."
"The product's initial setup phase is very simple."
"The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support."
"The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
"SD-WAN is one of the primary solutions offered by Perimeter 81."
"Scaling Perimeter 81 was easy to do."
"HTTPS decryption is a valuable service and not always found in cloud-based secure web gateways."
"The installation is very easy."
 

Cons

"The configuration needs improvement."
"I originally intended to use Acronis for cloud backup, however, the cloud backup had major problems. After struggling with it for about two years, I switched to Carbonite and have not gone back."
"I had a couple of false positives, but that’s it."
"I originally intended to use Acronis for cloud backup, however, the cloud backup had major problems."
"An improvement could be made in terms of achieving better coverage in such complicated regions as the Asia Pacific, China, and Russia."
"The product needs to work on the integration of alerts with different SIEM or security solutions."
"I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful."
"One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."
"Its initial setup process is complex for a hybrid environment."
"The connectivity issue can be improved as at times it lags when connecting to their server."
"The platform still lacks relevant dashboards and the ability to customize them based on our needs."
"The complex initial setup phase of the product is an area that can be improved"
 

Pricing and Cost Advice

Information not available
"Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
"The cost of the solution's licenses depends on the particular use cases."
"Annual licenses cost $30 to $40 each."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"Regarding pricing, I can say that the more the number of users, the less they have to pay."
"The product is reasonably priced."
"Overall I am very happy with the solution’s flexibility and pricing."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
report
Use our free recommendation engine to learn which Anti-Malware Tools solutions are best for your needs.
856,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
36%
Computer Software Company
14%
Performing Arts
6%
Manufacturing Company
5%
Computer Software Company
19%
Financial Services Firm
7%
Manufacturing Company
6%
Comms Service Provider
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Acronis Cyber Protect Home Office?
I originally intended to use Acronis for cloud backup, however, the cloud backup had major problems. After struggling with it for about two years, I switched to Carbonite and have not gone back.
What is your primary use case for Acronis Cyber Protect Home Office?
I use Acronis for backups. I use it to back up to other drives on the network, back up the entire system, including system images of the Windows C drive and all the data drives. This is for a small...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations: * Evaluate your needs * Understand pricing models * Request a quote * Compare ...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options wit...
 

Also Known As

No data available
Check Point Quantum SASE
 

Overview

 

Sample Customers

Information Not Available
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Find out what your peers are saying about Acronis Cyber Protect Home Office vs. Check Point Harmony SASE (formerly Perimeter 81) and other solutions. Updated: June 2025.
856,873 professionals have used our research since 2012.