BeyondTrust Endpoint Privilege Management and Check Point Harmony SASE are leading solutions in the field of cloud security and network access. BeyondTrust shines in asset discovery and risk management, whereas Check Point Harmony SASE is a preferred choice for effective remote access and robust threat prevention.
Features: BeyondTrust Endpoint Privilege Management is recognized for its focus on Privileged Access Management and Vulnerability Management, including asset discovery, comprehensive session management, and password management capabilities. Check Point Harmony SASE provides Zero Trust Network Access, phishing protection, and URL filtering, ensuring secure remote access and advanced threat prevention.
Room for Improvement: BeyondTrust could improve integration with ticket management systems, add flexibility for non-Windows deployments, and enhance its reporting analytics and user interface. Check Point Harmony SASE would benefit from improved feature stability, seamless integration with SIEM systems, and addressing latency issues and geographical coverage for complex network demands.
Ease of Deployment and Customer Service: BeyondTrust is usually deployed on-premises or in public clouds, with users praising its robust but sometimes delayed support. Initial setups can be complex, though support is efficient. Check Point Harmony SASE supports diverse cloud options and is noted for responsive, knowledgeable staff, despite some delays in specific regions.
Pricing and ROI: BeyondTrust offers competitive pricing, though changes in licensing can make it seem expensive compared to competitors. It provides value through compliance and security enhancements. Check Point Harmony SASE is often described as higher priced yet reasonable for its advanced security features, delivering value especially to larger enterprises, with significant returns in compliance and security efficiency.
Money saving is the main part because every organization tries to reduce their costs.
Check Point Harmony SASE (formerly Perimeter 81) blocked access to those URLs at the network level before users could click through.
We are saving 40% of our time, which is good.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
I would rate support 10 out of 10.
People working really hard, listening to every issue and request, and replying within hours.
After updating firmware, data utilization was visible for a few days before collapsing again.
The initial understanding of the environment is crucial, followed by a simple deployment process.
The cloud-native model ensures we are not tied to any specific location or hardware, which has been a great game changer in terms of agility.
The scalability of Check Point Harmony SASE (formerly Perimeter 81) is good, and I can add more users and devices easily as my organization grows.
I would rate it nine out of ten for scalability.
The appliances are stable, and there are no significant issues with backups or recovery.
Even the support team does not have a proper solution for this issue.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
An example of when the support cycle took longer than expected was when I had a ticket open for nearly six to seven months regarding a simple issue.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
One area for improvement is integration with third-party identity providers.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
My experience with pricing, setup cost, and licensing for Check Point Harmony SASE (formerly Perimeter 81) is that it is a rental service, but I find it satisfactory.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
The firewall management is the most valuable feature for me.
The Zero Trust Network Access (ZTNA) feature is a major highlight as it gives users seamless and secure access to internal resources without requiring a full-blown VPN, which improves both security and user experience.
The Zero Trust and segmentation have helped my team and our customers significantly because we are able to protect every scope and allow the work-from-home users to access internal resources while passing through a threat prevention gateway, ensuring that everything is safe.
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
Key Solutions Include:
-ENTERPRISE PASSWORD SECURITY
Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.
-ENDPOINT LEAST PRIVILEGE
Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.
-SERVER PRIVILEGE MANAGEMENT
Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.
-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS
Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.
Learn more at https://www.beyondtrust.com/privilege-management
Check Point Harmony SASE, formerly Perimeter 81, offers robust security features like split tunneling, MFA, and Zero Trust Network Access focused on secure remote access and optimized connectivity for remote teams.
Check Point Harmony SASE delivers advanced security through a user-friendly interface, efficient VPN connections, and a centralized management console. It enhances security with real-time threat intelligence from ThreatCloud and traffic management via built-in optimization. Firewall as a Service and Secure Web Gateway safeguard against unauthorized access and phishing. While users seek enhanced networking customizations and better integration with identity providers, there's an emphasis on improving reporting, real-time analytics, and policy management. Requests also include a Chrome extension, traffic balancing, and simplified configuration to address some resource-intensive aspects.
What are the key features of Check Point Harmony SASE?
How can organizations benefit from using Check Point Harmony SASE?
Check Point Harmony SASE is used across industries for secure remote access and connectivity, protecting sensitive data, and managing access to corporate resources. It is ideal for those with hybrid cloud models and requires comprehensive security measures combined with existing IT infrastructures to meet specific industry demands.
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.