Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Browse vs Netskope Next Gen Secure Web Gateway comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 4, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
7th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (8th)
Check Point Harmony Browse
Ranking in Secure Web Gateways (SWG)
12th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
26
Ranking in other categories
Enterprise Browsers (4th)
Netskope Next Gen Secure We...
Ranking in Secure Web Gateways (SWG)
18th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
14
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 2.1%, up from 1.8% compared to the previous year. The mindshare of Check Point Harmony Browse is 0.7%, up from 0.3% compared to the previous year. The mindshare of Netskope Next Gen Secure Web Gateway is 2.4%, up from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
AndreiBosinceanu - PeerSpot reviewer
Real-time threat intelligence enhances security and user confidence
At this point, I do not have any suggestions for improvements to Check Point Harmony Browse because I haven't encountered anything that would need changing. If a solution is installed correctly, it usually won't fail. It's hard to suggest new features for Check Point Harmony Browse because it's a sub-component of a larger Harmony Endpoint Security solution, which is handled separately under specific situations, and while it has many options, it already scans and delivers files efficiently. Regarding the scanning of large files in Check Point Harmony Browse, the process typically involves sending the file to Check Point cloud for scanning and returning the clean file to the user, which is inherently complex and I do not see how it could be optimized to be faster.
Ernst (Eric) Goldman - PeerSpot reviewer
Designed to enforce architecture governance, ensuring traceable SaaS traffic
Netskope provides vigorous policy enforcement for SaaS platforms based on how we configure it, but its vulnerability management and threat intelligence capabilities could be stronger. We rely on external sources to become aware of vulnerabilities in major SaaS platforms, which highlights a gap. It would be beneficial if Netskope offered more robust vulnerability management or integrated threat intelligence through in-house development or partnerships. This would allow for a better policy setup without needing external threat intelligence to configure Netskope. Adding these features would enhance its overall value. I would suggest making some minor improvements to the interface to make it more intuitive, but those are primarily cosmetic. In terms of actual features, the only significant enhancement I could think of, besides better threat intelligence, would be for Netskope to assess the general SaaS landscape. This could include a scorecard showing the security posture of various SaaS platforms based on their track record with breaches and vulnerabilities. I understand this could create friction with SaaS providers if some receive poor scores, which might impact their relationship with Netskope. If Netskope were to harness machine learning more effectively and share those models transparently with enterprise customers, this could include making traffic data they already collect available for deeper analytics, allowing customers to gain better insights into employee traffic patterns. It could also assist with network operations by helping to fine-tune performance based on traffic flow, even though the primary purpose of analyzing that data is security-related. Providing more advanced analytics using existing data could significantly enhance its value to enterprises.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"iboss is among the few products providing inline filtering where no application is needed on the device."
"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"I would rate the technical support of iboss a solid 10 without a shadow of a doubt."
"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"It was a very easy product to install. It can be deployed very fast."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"Its initial setup was straightforward."
"The product enforces the privacy of the users, which is good."
"The real-time Threat Intelligence feature powered by Check Point's ThreatCloud is impressive because ThreatCloud integrates and correlates all malicious data from Check Point installations globally, collecting and analyzing this data with AI and machine learning to help prevent zero-day attacks effectively."
"The software is easy to install and deploy across any business environment and it is becoming a game changer for us."
"The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete."
"Check Point Harmony Browse has a feature that allows users to check the extensions installed in their browser. This feature is valuable because hackers may install malicious extensions on a target computer without the user's knowledge. When browsing, users are often less aware of the extensions installed in their browsers, making it easier for malicious extensions to go unnoticed. By providing visibility into installed extensions, Check Point Harmony Browse enhances security by allowing users to identify and remove potentially harmful extensions."
"Check Point's technical support is very impressive."
"Its content filtering is great."
"It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded."
"The solution offers good security functionality."
"Web filtering and DLP are good features."
"The solution's CASB, DLP, and threat protection features are very good."
"There are a lot of features, but the groups that are created for the policy groups available with Netskope are already relevant to any industry. So grouping the policies is the easiest part and a valuable feature."
"We've found the solution to be quite stable."
"Overall, the product is nice, and I like the URL filtering, CASB, and other security stacks like threat prevention."
"We can connect cloud apps and monitor them."
"The solution has some useful features, such as microservices. They have sandboxing that allows the prevention, encryption, and remote browser isolation."
 

Cons

"Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern."
"For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company ExxonMobil."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"One thing I would like to see differently with their Zero Trust platform is that some of the AI aspects related to high-risk activities have more false positives."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"The URL filtering database should be improved."
"The pricing for Check Point Harmony Browse can be a bit pricey sometimes, depending on the project."
"One of the new features I would like to see is the possibility that these tools can be brought to mobile devices such as tablets and cell phones in iOS or Android applications."
"Having local support everywhere in the world would be helpful."
"Check Point Harmony Browse can be improved by reducing false positive reports."
"security solution for users Devices and Access" What is our primary use case? The application is good as its lightweight and its functions are really similar to a browser extension. It offers real-time protection for internet users by addressing active concerns. Moreover, it incorporates a reputation feature to ensure swift access to websites within a second. The effectiveness of Harmony Browse’s capabilities is really an advantage. What is most valuable? The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete. What needs improvement? Regarding the Harmony Browse, I call it "Kuna" which is accurate. The quantum product serves as my primary focus due to its project cost, and I aim to introduce support in this area. This is because firewall implementation holds significant importance for organizations. I want to improve more on the quantum losses. There's a concept I'd like to include in Harmony Browse, known as automatic catching. This mechanism comes into play when an individual closes their browser while possessing sensitive information, like monetary data. To counteract potential risks, we employ a browser cache-clearing process to minimize the cache's accumulation. This action ensures that malicious entities can't exploit the cached data for attacks. To enhance this further, there's potential for the implementation of a self-cleaning technology. For instance, when a user exits the browser, an automatic action could be initiated to clear the browser cache, serving as an additional layer of security. This can be helpful if added."
"It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow."
"The only thing they should add or improve is the reporting series."
"Cost competitiveness is its area of improvement. They will have to figure out how can they strategically price it because there are a few players in the game who have been doing it for a long time. They will have to figure out how to go to market on the pricing."
"Netskope Next Gen Secure Web Gateway needs to integrate IoT, which can help to control devices."
"The accuracy could be improved."
"The solution could improve the features for Zero Trust Network Access. They should add more security components to that module."
"The initial setup is a bit complex in that it takes a lot of time. In order to get the product to work as you need it to, there is a lot of configuration required."
"Netskope can only provide the high level related to threats."
"Since they have the Netskope client, adding some functionality in the endpoint would be good."
"There is room for improvement in streamlining policies. So what happens is that when you apply a specific Netskope policy, you never know the kind of content it will automatically block, or it will allow."
 

Pricing and Cost Advice

"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is probably in line with other solutions, but I do not deal with the financial side."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is expensive compared to one of its competitors."
"The overall pricing for iboss is very competitive and transparent."
"The product has a reasonable pricing."
"The price is not very expensive for our organisation, but for others, it might be a little expensive."
"The solution's overall cost is cheaper than regular web security solutions."
"We pay a licensing fee of $10,000 on a yearly basis."
"The price is average. Because the license is user-based, you can increase it as per the user quantity."
"The product is cheap."
"The license model is based on the number of users. You have the possibility to have 10,000 users if you wish."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
9%
Healthcare Company
6%
Computer Software Company
31%
Manufacturing Company
9%
Security Firm
8%
Financial Services Firm
6%
Manufacturing Company
12%
Computer Software Company
11%
Financial Services Firm
11%
Construction Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What needs improvement with Check Point Harmony Browse?
In terms of improvements for Check Point Harmony Browse, we felt that it could have more customizable integration, es...
What is your primary use case for Check Point Harmony Browse?
We wanted to provide users secure access to their applications. Currently, we are not in the live environment but in ...
Which lesser known firewall product has the best chance at unseating the market leaders?
Netscope, Zscaler if they continue route they are on now. FIrewalls needs great deal of automation on each end, datac...
Which lesser known firewall product has the best chance at unseating the market leaders?
Those firewalls that allow extend the perimeter. Nowadays, there is a issue with the static perimeter and all is goin...
What do you like most about Netskope Next Gen Secure Web Gateway?
There are a lot of features, but the groups that are created for the policy groups available with Netskope are alread...
 

Also Known As

iBoss Cloud Platform
No data available
No data available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Information Not Available
Arrow, Cloudrise, Sainsbury, Evalueserve, Stroock, Apria, Ather Energy, CSA, AVX Corporation Nuna, City of San Diego Case, Genomic Health Case Study, Oak Hill Advisors, MaRS Discovery District.
Find out what your peers are saying about Check Point Harmony Browse vs. Netskope Next Gen Secure Web Gateway and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.