BeyondTrust Endpoint Privilege Management and Check Point Harmony SASE are leading solutions in the field of cloud security and network access. BeyondTrust shines in asset discovery and risk management, whereas Check Point Harmony SASE is a preferred choice for effective remote access and robust threat prevention.
Features: BeyondTrust Endpoint Privilege Management is recognized for its focus on Privileged Access Management and Vulnerability Management, including asset discovery, comprehensive session management, and password management capabilities. Check Point Harmony SASE provides Zero Trust Network Access, phishing protection, and URL filtering, ensuring secure remote access and advanced threat prevention.
Room for Improvement: BeyondTrust could improve integration with ticket management systems, add flexibility for non-Windows deployments, and enhance its reporting analytics and user interface. Check Point Harmony SASE would benefit from improved feature stability, seamless integration with SIEM systems, and addressing latency issues and geographical coverage for complex network demands.
Ease of Deployment and Customer Service: BeyondTrust is usually deployed on-premises or in public clouds, with users praising its robust but sometimes delayed support. Initial setups can be complex, though support is efficient. Check Point Harmony SASE supports diverse cloud options and is noted for responsive, knowledgeable staff, despite some delays in specific regions.
Pricing and ROI: BeyondTrust offers competitive pricing, though changes in licensing can make it seem expensive compared to competitors. It provides value through compliance and security enhancements. Check Point Harmony SASE is often described as higher priced yet reasonable for its advanced security features, delivering value especially to larger enterprises, with significant returns in compliance and security efficiency.
Money saving is the main part because every organization tries to reduce their costs.
Check Point Harmony SASE (formerly Perimeter 81) blocked access to those URLs at the network level before users could click through.
We are saving 40% of our time, which is good.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
I would rate support 10 out of 10.
After updating firmware, data utilization was visible for a few days before collapsing again.
The initial understanding of the environment is crucial, followed by a simple deployment process.
The cloud-native model ensures we are not tied to any specific location or hardware, which has been a great game changer in terms of agility.
The scalability of Check Point Harmony SASE (formerly Perimeter 81) is good, and I can add more users and devices easily as my organization grows.
I would rate it nine out of ten for scalability.
The appliances are stable, and there are no significant issues with backups or recovery.
Even the support team does not have a proper solution for this issue.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
An example of when the support cycle took longer than expected was when I had a ticket open for nearly six to seven months regarding a simple issue.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
One area for improvement is integration with third-party identity providers.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
My experience with pricing, setup cost, and licensing for Check Point Harmony SASE (formerly Perimeter 81) is that it is a rental service, but I find it satisfactory.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
The firewall management is the most valuable feature for me.
The Zero Trust Network Access (ZTNA) feature is a major highlight as it gives users seamless and secure access to internal resources without requiring a full-blown VPN, which improves both security and user experience.
The best key features of Harmony are stabilization, private access, and Internet access.
BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.
Key Solutions Include:
-ENTERPRISE PASSWORD SECURITY
Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.
-ENDPOINT LEAST PRIVILEGE
Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.
-SERVER PRIVILEGE MANAGEMENT
Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.
-A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS
Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.
Learn more at https://www.beyondtrust.com/privilege-management
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Perimeter 81 Benefits:
Perimeter 81 Features:
Reviews from Real Users
PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".
Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".
Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.