Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Browse vs Netskope Next Gen Secure Web Gateway comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 4, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
5th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (8th)
Check Point Harmony Browse
Ranking in Secure Web Gateways (SWG)
8th
Average Rating
9.0
Reviews Sentiment
7.2
Number of Reviews
30
Ranking in other categories
Enterprise Browsers (3rd)
Netskope Next Gen Secure We...
Ranking in Secure Web Gateways (SWG)
20th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
14
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 2.2%, up from 1.8% compared to the previous year. The mindshare of Check Point Harmony Browse is 0.7%, up from 0.4% compared to the previous year. The mindshare of Netskope Next Gen Secure Web Gateway is 2.2%, up from 2.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG) Market Share Distribution
ProductMarket Share (%)
iboss2.2%
Check Point Harmony Browse0.7%
Netskope Next Gen Secure Web Gateway2.2%
Other94.9%
Secure Web Gateways (SWG)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
AndreiBo - PeerSpot reviewer
Real-time threat intelligence enhances security and user confidence
At this point, I do not have any suggestions for improvements to Check Point Harmony Browse because I haven't encountered anything that would need changing. If a solution is installed correctly, it usually won't fail. It's hard to suggest new features for Check Point Harmony Browse because it's a sub-component of a larger Harmony Endpoint Security solution, which is handled separately under specific situations, and while it has many options, it already scans and delivers files efficiently. Regarding the scanning of large files in Check Point Harmony Browse, the process typically involves sending the file to Check Point cloud for scanning and returning the clean file to the user, which is inherently complex and I do not see how it could be optimized to be faster.
Ernst (Eric) Goldman - PeerSpot reviewer
Designed to enforce architecture governance, ensuring traceable SaaS traffic
Netskope provides vigorous policy enforcement for SaaS platforms based on how we configure it, but its vulnerability management and threat intelligence capabilities could be stronger. We rely on external sources to become aware of vulnerabilities in major SaaS platforms, which highlights a gap. It would be beneficial if Netskope offered more robust vulnerability management or integrated threat intelligence through in-house development or partnerships. This would allow for a better policy setup without needing external threat intelligence to configure Netskope. Adding these features would enhance its overall value. I would suggest making some minor improvements to the interface to make it more intuitive, but those are primarily cosmetic. In terms of actual features, the only significant enhancement I could think of, besides better threat intelligence, would be for Netskope to assess the general SaaS landscape. This could include a scorecard showing the security posture of various SaaS platforms based on their track record with breaches and vulnerabilities. I understand this could create friction with SaaS providers if some receive poor scores, which might impact their relationship with Netskope. If Netskope were to harness machine learning more effectively and share those models transparently with enterprise customers, this could include making traffic data they already collect available for deeper analytics, allowing customers to gain better insights into employee traffic patterns. It could also assist with network operations by helping to fine-tune performance based on traffic flow, even though the primary purpose of analyzing that data is security-related. Providing more advanced analytics using existing data could significantly enhance its value to enterprises.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"Technical support is pretty sharp and very responsive."
"It was a very easy product to install. It can be deployed very fast."
"Granular setup, which was able to set different levels of filters using the OUs in the AD."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"iboss is among the few products providing inline filtering where no application is needed on the device. It operates on the network side and is not device-based. This feature was one of the main reasons why we stayed with them for so long."
"iboss is among the few products providing inline filtering where no application is needed on the device."
"Check Point Harmony Browse has greatly impacted our organization positively."
"The product enforces the privacy of the users, which is good."
"Its content filtering is great."
"Check Point's technical support is very impressive."
"This solution has improved my organization by providing enhanced web security."
"It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded."
"The real-time Threat Intelligence feature powered by Check Point's ThreatCloud is impressive because ThreatCloud integrates and correlates all malicious data from Check Point installations globally, collecting and analyzing this data with AI and machine learning to help prevent zero-day attacks effectively."
"The product is stable."
"The solution's CASB, DLP, and threat protection features are very good."
"We can connect cloud apps and monitor them."
"The most valuable features of the solution are its three modules, which are SWG, ZTNA, and CASB."
"The solution offers good security functionality."
"There are a lot of features, but the groups that are created for the policy groups available with Netskope are already relevant to any industry. So grouping the policies is the easiest part and a valuable feature."
"Prevents data leakage and protects data."
"One of the valuable features of the solution is that everything is on the cloud. It has no on-premise hardware to deal with."
"We've found the solution to be quite stable."
 

Cons

"File integrity monitoring would be very advantageous as an additional feature."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"The dashboards for local use could be better."
"The reporting feature needs improvement. It doesn't give you the expected results. It is quite difficult to get the specific reports needed, and it is not as intuitive as the rest of the platform."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"The pricing for Check Point Harmony Browse can be a bit pricey sometimes, depending on the project."
"Check Point Harmony Browse can be improved by reducing false positive reports."
"URL filtering could be better."
"More strengthening and robustness are required in zero-day threat prevention to ensure its efficiency at 100%."
"Support must be faster in solving problems."
"Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."
"One suggestion for improvement is if the Check Point Browse team can add more plugins to support more third-party browsers such as Opera and Safari."
"They should focus on new areas of product. In the last year, they have not released any updates with improvements or extra options."
"Netskope Next Gen Secure Web Gateway needs to integrate IoT, which can help to control devices."
"Cost competitiveness is its area of improvement. They will have to figure out how can they strategically price it because there are a few players in the game who have been doing it for a long time. They will have to figure out how to go to market on the pricing."
"The initial setup is a bit complex in that it takes a lot of time. In order to get the product to work as you need it to, there is a lot of configuration required."
"The solution could improve the features for Zero Trust Network Access. They should add more security components to that module."
"The solution needs to improve its on-premise detection technique."
"Netskope can only provide the high level related to threats."
"Improvement in the solution is required in certain areas where the product does not provide access to its direct end users, who use the portal as an administrator."
"There is room for improvement in streamlining policies. So what happens is that when you apply a specific Netskope policy, you never know the kind of content it will automatically block, or it will allow."
 

Pricing and Cost Advice

"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The overall pricing for iboss is very competitive and transparent."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is probably in line with other solutions, but I do not deal with the financial side."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The product has a reasonable pricing."
"The price is not very expensive for our organisation, but for others, it might be a little expensive."
"The product is cheap."
"The license model is based on the number of users. You have the possibility to have 10,000 users if you wish."
"The solution's overall cost is cheaper than regular web security solutions."
"The price is average. Because the license is user-based, you can increase it as per the user quantity."
"We pay a licensing fee of $10,000 on a yearly basis."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
30%
Manufacturing Company
10%
Security Firm
8%
Financial Services Firm
7%
Financial Services Firm
13%
Computer Software Company
12%
Manufacturing Company
10%
Insurance Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise5
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise16
Large Enterprise5
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise3
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What needs improvement with Check Point Harmony Browse?
I believe that more granular customization, improved user feedback, expanded integration, and performance optimizatio...
What is your primary use case for Check Point Harmony Browse?
The primary use case for Check Point Harmony Browse in our organization is to enhance web security by protecting user...
Which lesser known firewall product has the best chance at unseating the market leaders?
Netscope, Zscaler if they continue route they are on now. FIrewalls needs great deal of automation on each end, datac...
Which lesser known firewall product has the best chance at unseating the market leaders?
Those firewalls that allow extend the perimeter. Nowadays, there is a issue with the static perimeter and all is goin...
What do you like most about Netskope Next Gen Secure Web Gateway?
There are a lot of features, but the groups that are created for the policy groups available with Netskope are alread...
 

Also Known As

iBoss Cloud Platform
No data available
No data available
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Information Not Available
Arrow, Cloudrise, Sainsbury, Evalueserve, Stroock, Apria, Ather Energy, CSA, AVX Corporation Nuna, City of San Diego Case, Genomic Health Case Study, Oak Hill Advisors, MaRS Discovery District.
Find out what your peers are saying about Check Point Harmony Browse vs. Netskope Next Gen Secure Web Gateway and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.