Try our new research platform with insights from 80,000+ expert users

Axis Security vs Check Point Harmony Browse comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 4, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
7th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (11th), Secure Access Service Edge (SASE) (10th)
Axis Security
Ranking in Secure Web Gateways (SWG)
11th
Average Rating
9.6
Reviews Sentiment
7.7
Number of Reviews
6
Ranking in other categories
Cloud Access Security Brokers (CASB) (9th), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (11th)
Check Point Harmony Browse
Ranking in Secure Web Gateways (SWG)
15th
Average Rating
8.8
Reviews Sentiment
7.5
Number of Reviews
26
Ranking in other categories
Enterprise Browsers (4th)
 

Mindshare comparison

As of June 2025, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 2.1%, up from 1.6% compared to the previous year. The mindshare of Axis Security is 0.9%, up from 0.9% compared to the previous year. The mindshare of Check Point Harmony Browse is 0.7%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
Robert Oglesbee - PeerSpot reviewer
Easy to deploy, improved reliability and performance of our connectivity, and greatly reduced costs
Atmos is good for securing infrastructure from end to end, detection and remediation of threats, but there may be a few features that could be added to make it a little easier for networking and security folks to analyze the traffic. There are bad actors out there and they may or may not show up through the tool. That's something they can add. They need to improve the networking and security tools a little in the troubleshooting and "bad-actor" areas to help us analyze security threats a little better. They have some things built in, but I would like to see more advanced tools. There are major vendors out there, and if you use their VPN connection that's not going to help you without buying one of their other products. So that's a similar type of situation. However, they do give you a little more bang for the buck when it comes to monitoring. So I can see an improvement there, in Atmos, in the future.
Nasseer Qureshi - PeerSpot reviewer
Securing web browsing activities with effective threat prevention
There is room for improvement in Check Point Harmony Browse. While it is effective, the management portal could use some refinement. For instance, we would like to see more advanced filtering options and clearer reporting for policy violations. Although reporting exists, it sometimes isn't granular enough to quickly identify user-level activity. Another area of improvement is extension compatibility since it currently works best with Chrome and Edge, but having wider browser support for Firefox and Safari would be beneficial for mixed environments. I would also appreciate more flexible customization of policies, especially for different departments with varying needs, allowing for more granular rule-based policies directly from the dashboard. When we receive alerts, sometimes they turn out to be false positives. For example, we encountered a false positive recently and sought to fine-tune our policies to reduce these occurrences, but we didn't have options for that level of fine-tuning. I would like to see improvements in alert tuning that would help reduce unnecessary notifications, especially for low-risk events. Overall, it's a strong out-of-the-box solution, but a few enhancements would refine the experience and make it easier to scale.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"First of all, the security policies are essential. I do not have to rely solely on Active Directory for our users."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"Technical support is pretty sharp and very responsive."
"The console is cloud-based, which is something I really appreciate."
"We chose iboss for both zero trust and proxy (SWG) because their SWG was superior."
"iboss is among the few products providing inline filtering where no application is needed on the device."
"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"I would give it an A-plus for securing access to our applications, devices, and network. It does an extremely good job. Our security folks have analyzed it and tried to find loopholes, but they found none."
"I rate Axis Security ten out of ten."
"The way the access connectors work is valuable."
"The entire suite and the entire ZTNA process are very valuable."
"The most valuable part so far has been Axis Security's ability to create identity connections to various servers, allowing users to access them. By doing so, we've managed to replace any old or existing VPN access with Axis Security. We are slowly but surely getting rid of our traditional VPN."
"The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can connect to the network. T"
"This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user."
"Among its most important features is the integration of its analytics."
"Its potential features of Threat Detection and Threat Emulation have helped businesses to browse securely hassle-free without any tension."
"The downloaded protection as it scans and emulates the files on a browser level is great."
"Check Point's technical support is very impressive."
"The product enforces the privacy of the users, which is good."
"It provides end-to-end encryption for the communication between the user's device and the remote browser, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks."
"The real-time Threat Intelligence feature powered by Check Point's ThreatCloud is impressive because ThreatCloud integrates and correlates all malicious data from Check Point installations globally, collecting and analyzing this data with AI and machine learning to help prevent zero-day attacks effectively."
 

Cons

"Sometimes, obviously, there are bugs."
"Its pricing could be better."
"The reporting feature needs improvement."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"I would like more detailed logging in the Axis Security interface."
"I would like more statistics about what's going on in terms of usage. There is little-to-no usage reporting. That's one thing we've requested, and I think they're working on it."
"They need to improve the networking and security tools a little in the troubleshooting and 'bad-actor' areas to help us analyze security threats a little better. They have some things built-in, but I would like to see more advanced tools."
"I would appreciate more automated learning capabilities or increased integration with other security tools, allowing us to establish automation."
"The support team should be more skilled in offering assistance."
"There should be a notification alarm with geofencing."
"The solution needs greater automation to reduce the need for manual configuration and management."
"Check Point Harmony Browse can be improved by reducing false positive reports."
"One of the new features I would like to see is the possibility that these tools can be brought to mobile devices such as tablets and cell phones in iOS or Android applications."
"There is always scope for improvement for Check Point Harmony Browse, particularly in the user interface and adding the IOC checklist or feature modifications."
"The only thing they should add or improve is the reporting series."
"security solution for users Devices and Access" What is our primary use case? The application is good as its lightweight and its functions are really similar to a browser extension. It offers real-time protection for internet users by addressing active concerns. Moreover, it incorporates a reputation feature to ensure swift access to websites within a second. The effectiveness of Harmony Browse’s capabilities is really an advantage. What is most valuable? The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete. What needs improvement? Regarding the Harmony Browse, I call it "Kuna" which is accurate. The quantum product serves as my primary focus due to its project cost, and I aim to introduce support in this area. This is because firewall implementation holds significant importance for organizations. I want to improve more on the quantum losses. There's a concept I'd like to include in Harmony Browse, known as automatic catching. This mechanism comes into play when an individual closes their browser while possessing sensitive information, like monetary data. To counteract potential risks, we employ a browser cache-clearing process to minimize the cache's accumulation. This action ensures that malicious entities can't exploit the cached data for attacks. To enhance this further, there's potential for the implementation of a self-cleaning technology. For instance, when a user exits the browser, an automatic action could be initiated to clear the browser cache, serving as an additional layer of security. This can be helpful if added."
"More strengthening and robustness are required in zero-day threat prevention to ensure its efficiency at 100%."
"The ease of handling should be improved, as it is currently intrusive and some users don't like it."
 

Pricing and Cost Advice

"The overall pricing for iboss is very competitive and transparent."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The pricing is quite fair. It's better than what we gave up, which was Cisco AnyConnect."
"The pricing is very competitive from what I've seen."
"The price is not very expensive for our organisation, but for others, it might be a little expensive."
"The product has a reasonable pricing."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
859,129 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
15%
Educational Organization
15%
Retailer
8%
University
6%
Computer Software Company
31%
Manufacturing Company
8%
Security Firm
7%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What do you like most about Axis Security?
The most valuable aspect is its ability to restrict unauthorized access, ensuring that only approved devices can conn...
What is your experience regarding pricing and costs for Axis Security?
Axis Security is affordable. While I cannot provide financial specifics, we have never had complaints about pricing.
What needs improvement with Axis Security?
There should be a notification alarm with geofencing. When a person is at the gate, a notification alarm should alert...
What needs improvement with Check Point Harmony Browse?
There is always scope for improvement for Check Point Harmony Browse, particularly in the user interface and adding t...
What is your primary use case for Check Point Harmony Browse?
We are working in a SOC environment as an MSSP ( /categories/managed-security-services-providers-mssp ) SOC. Our clie...
 

Also Known As

iBoss Cloud Platform
No data available
No data available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Cardenas Markets, Armis, Alnylam Pharmaceuticals, Visionworks
Information Not Available
Find out what your peers are saying about Axis Security vs. Check Point Harmony Browse and other solutions. Updated: June 2025.
859,129 professionals have used our research since 2012.