Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Browse vs Prisma Access by Palo Alto Networks comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 4, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
5th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (8th)
Check Point Harmony Browse
Ranking in Secure Web Gateways (SWG)
8th
Average Rating
9.0
Reviews Sentiment
7.2
Number of Reviews
30
Ranking in other categories
Enterprise Browsers (3rd)
Prisma Access by Palo Alto ...
Ranking in Secure Web Gateways (SWG)
4th
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
64
Ranking in other categories
Cloud Access Security Brokers (CASB) (1st), Enterprise Infrastructure VPN (6th), ZTNA as a Service (2nd), Secure Access Service Edge (SASE) (2nd)
 

Mindshare comparison

As of October 2025, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 2.2%, up from 1.8% compared to the previous year. The mindshare of Check Point Harmony Browse is 0.7%, up from 0.4% compared to the previous year. The mindshare of Prisma Access by Palo Alto Networks is 10.8%, up from 10.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG) Market Share Distribution
ProductMarket Share (%)
Prisma Access by Palo Alto Networks10.8%
iboss2.2%
Check Point Harmony Browse0.7%
Other86.3%
Secure Web Gateways (SWG)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
AndreiBo - PeerSpot reviewer
Real-time threat intelligence enhances security and user confidence
At this point, I do not have any suggestions for improvements to Check Point Harmony Browse because I haven't encountered anything that would need changing. If a solution is installed correctly, it usually won't fail. It's hard to suggest new features for Check Point Harmony Browse because it's a sub-component of a larger Harmony Endpoint Security solution, which is handled separately under specific situations, and while it has many options, it already scans and delivers files efficiently. Regarding the scanning of large files in Check Point Harmony Browse, the process typically involves sending the file to Check Point cloud for scanning and returning the clean file to the user, which is inherently complex and I do not see how it could be optimized to be faster.
Amar-Patil - PeerSpot reviewer
Enables seamless policy management and supports secure remote work
Our primary use case for Prisma Access by Palo Alto Networks is to control the internet and serve as an internet proxy. Additionally, we use it for secure remote work One of the most valuable features of Prisma Access by Palo Alto Networks is the ability to manage on-premise firewalls. We can…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"I would rate the technical support of iboss a solid 10 without a shadow of a doubt."
"iboss has significantly lowered the number of security incidents. It is crazy how much it blocks and how much it is aware of the outside danger."
"Content filtering is the most useful feature of iboss."
"Technical support is pretty sharp and very responsive."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance."
"Implementing Check Point Harmony Browse has significantly strengthened our company's web security by reducing exposure to phishing and malware attacks."
"Check Point Harmony Browse has greatly impacted our organization positively."
"Its content filtering is great."
"It has content filtering, which has helped us a lot in being able to apply the necessary filtering policies where we can allow or block websites."
"The product enforces the privacy of the users, which is good."
"Since using Check Point Harmony Browse, we have noticed a significant drop in security incidents, approximately 30 to 40% fewer phishing and malware cases, which has saved our IT team a lot of time on incident response and helped avoid costly downtime."
"It completely restricts and blocks phishing attacks and any threat entry into the system and keeps the work pace fast and secure without showing any signs of lag or latency."
"This solution provides a DLP on the cloud and very few people have a scanning device for data at rest."
"Prisma Access protects all app traffic, so that users can gain access to all apps and that's very important because we need to be able to access everything. It also allows us to access non-web apps; anything internal that we need access to, we can access."
"Prisma integrates well with Cortex XDR and Cortex Data Lake. My company has been also using Prisma Access in-house for nearly a year, and it integrates seamlessly."
"There is a system for monitoring the traffic. You can monitor the traffic of the connected people and point out any issues on the connection part."
"Its frontend is user-friendly. It is easy to use for us."
"The protection for web-based applications was helpful for my colleagues who didn't want a particular application on their devices. And the non-web access protection was more for our developers because they were writing and building code on their computers. Prisma Access was able to protect them."
"The tool's consolidation is pretty quick."
"It is easy to use, easy to integrate, and is stable. It's scalable as well."
 

Cons

"The reporting feature needs improvement. It doesn't give you the expected results. It is quite difficult to get the specific reports needed, and it is not as intuitive as the rest of the platform."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"Our iboss subscription access should be more secure with an OTP or VPN etc. It is easy to gain access if, for example, hackers obtain my username and password."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"If they could implement an extra security layer preventing access to iboss from the open internet, it would be great."
"For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company ExxonMobil."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"The dashboards for local use could be better."
"Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."
"The URL filtering database should be improved."
"security solution for users Devices and Access" What is our primary use case? The application is good as its lightweight and its functions are really similar to a browser extension. It offers real-time protection for internet users by addressing active concerns. Moreover, it incorporates a reputation feature to ensure swift access to websites within a second. The effectiveness of Harmony Browse’s capabilities is really an advantage. What is most valuable? The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete. What needs improvement? Regarding the Harmony Browse, I call it "Kuna" which is accurate. The quantum product serves as my primary focus due to its project cost, and I aim to introduce support in this area. This is because firewall implementation holds significant importance for organizations. I want to improve more on the quantum losses. There's a concept I'd like to include in Harmony Browse, known as automatic catching. This mechanism comes into play when an individual closes their browser while possessing sensitive information, like monetary data. To counteract potential risks, we employ a browser cache-clearing process to minimize the cache's accumulation. This action ensures that malicious entities can't exploit the cached data for attacks. To enhance this further, there's potential for the implementation of a self-cleaning technology. For instance, when a user exits the browser, an automatic action could be initiated to clear the browser cache, serving as an additional layer of security. This can be helpful if added."
"I believe that more granular customization, improved user feedback, expanded integration, and performance optimization would improve Check Point Harmony Browse."
"I would like the solution to be implemented more easily for teams and directly on Android or iOS devices."
"One suggestion for improvement is if the Check Point Browse team can add more plugins to support more third-party browsers such as Opera and Safari."
"The initial policy setup can feel a bit complex, particularly when trying to customize controls for different user groups."
"More strengthening and robustness are required in zero-day threat prevention to ensure its efficiency at 100%."
"The cloud setup is straightforward, and the onboarding process is much better, but the on-premises initial setup is slightly complex."
"The frequency of updates could be reduced."
"When we deploy firewall rules via Panorama, we find it's a little bit slow. We have a global environment and might have 100 gateways or VPNs in the cloud. When we deploy something, it tries to deploy it one-by-one, and that can be slow."
"GlobalProtect can face challenges with latency, especially when remote workers connect to centralized locations."
"They can add some new characteristics. For example, when an incident triggers, they can automatically send a template for a particular match that is related to the policy. We don't have that right now. It is something to improve. There could be more automation for certain actions. For example, for a particular group, it can send an administrator alert to their manager. It was one of the concerns of our customers."
"It applies commits to the firewalls slowly. There isn't an API you can use for anything. We've previously had trouble with the egress IP addresses though we expressed to engineering that those mustn't change. They changed several times without warning, causing a lot of headaches."
"It wasn't so satisfying to work with it. There is room for improvement in the policy management. It is difficult to cover the entire scenery through Palo Alto products."
"It's not very easy to use. Sometimes it's buggy and there are problems when doing updates. The user interface is okay, but some configuration items are difficult. I would like it to be less buggy and easier to configure, to better streamline the user experience."
 

Pricing and Cost Advice

"We have not priced the solution recently, but they were competitive with other vendors in the past."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is expensive compared to one of its competitors."
"The overall pricing for iboss is very competitive and transparent."
"The product has a reasonable pricing."
"The price is not very expensive for our organisation, but for others, it might be a little expensive."
"The licensing fees are paid on a yearly basis and for what we get, the price is good."
"I'm still comparing, but the solution is quite expensive."
"They price their products using credit modules."
"It is a little expensive. Because it is one of the best in the market, it is a little bit more expensive than other vendors."
"Prisma Access by Palo Alto Networks has flexible licensing models with different categories. It comes with different features which can be removed if not needed. However, its pricing is high."
"There's no reason not to buy the enterprise version that gives you unlimited PoPs, but you must understand the limitations you impose on yourself if you do that. If you go crazy, that allowlist will be too big for Kubernetes clusters."
"Prisma Access is one of the best compared to other products on the market. The cost is favorable, and Palo Alto provides a simple architecture, so I recommend the solution to anyone using a different product. There are no hidden costs besides the license; what you see is what you get."
"The solution requires a license and the technical support has extra costs. The licensing model could improve."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
869,095 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
30%
Manufacturing Company
10%
Security Firm
8%
Educational Organization
6%
Computer Software Company
12%
Financial Services Firm
12%
Manufacturing Company
12%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise5
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise16
Large Enterprise5
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise21
Large Enterprise28
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What needs improvement with Check Point Harmony Browse?
I believe that more granular customization, improved user feedback, expanded integration, and performance optimizatio...
What is your primary use case for Check Point Harmony Browse?
The primary use case for Check Point Harmony Browse in our organization is to enhance web security by protecting user...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What do you like most about Prisma Access by Palo Alto Networks?
The most valuable features of the solution are in the areas of the secure remote access it provides while also being ...
What is your experience regarding pricing and costs for Prisma Access by Palo Alto Networks?
From my experience, Palo Alto is more expensive compared to solutions like Netskope and Triscale.
 

Also Known As

iBoss Cloud Platform
No data available
Palo Alto Networks Prisma Access, Prisma Access, GlobalProtect, Palo Alto GlobalProtect Mobile Security Manager, Prisma SaaS by Palo Alto Networks, Prisma Access
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Information Not Available
Concord Hospital, State of Colorado, Essilor International, RheinLand Versicherungsgruppe, University of Westminster, Universidade Nove de Julho, SPAR Austria, CAME Group, ZipRealty, Greenhill & Co., IKT Agder, Aviva Stadium, Animal Logic, Management & Training Corporation, Brigham Young University Hawaii, School District of Chilliwack
Find out what your peers are saying about Check Point Harmony Browse vs. Prisma Access by Palo Alto Networks and other solutions. Updated: September 2025.
869,095 professionals have used our research since 2012.