Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Browse vs Prisma Access by Palo Alto Networks comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 4, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
7th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (8th)
Check Point Harmony Browse
Ranking in Secure Web Gateways (SWG)
12th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
26
Ranking in other categories
Enterprise Browsers (4th)
Prisma Access by Palo Alto ...
Ranking in Secure Web Gateways (SWG)
3rd
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
64
Ranking in other categories
Cloud Access Security Brokers (CASB) (1st), Enterprise Infrastructure VPN (6th), ZTNA as a Service (2nd), Secure Access Service Edge (SASE) (2nd)
 

Mindshare comparison

As of August 2025, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 2.1%, up from 1.8% compared to the previous year. The mindshare of Check Point Harmony Browse is 0.7%, up from 0.3% compared to the previous year. The mindshare of Prisma Access by Palo Alto Networks is 10.8%, up from 9.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
AndreiBosinceanu - PeerSpot reviewer
Real-time threat intelligence enhances security and user confidence
At this point, I do not have any suggestions for improvements to Check Point Harmony Browse because I haven't encountered anything that would need changing. If a solution is installed correctly, it usually won't fail. It's hard to suggest new features for Check Point Harmony Browse because it's a sub-component of a larger Harmony Endpoint Security solution, which is handled separately under specific situations, and while it has many options, it already scans and delivers files efficiently. Regarding the scanning of large files in Check Point Harmony Browse, the process typically involves sending the file to Check Point cloud for scanning and returning the clean file to the user, which is inherently complex and I do not see how it could be optimized to be faster.
Amar-Patil - PeerSpot reviewer
Enables seamless policy management and supports secure remote work
Our primary use case for Prisma Access by Palo Alto Networks is to control the internet and serve as an internet proxy. Additionally, we use it for secure remote work One of the most valuable features of Prisma Access by Palo Alto Networks is the ability to manage on-premise firewalls. We can…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Technical support is pretty sharp and very responsive."
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"iboss is among the few products providing inline filtering where no application is needed on the device. It operates on the network side and is not device-based. This feature was one of the main reasons why we stayed with them for so long."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"iboss is easy to use despite its complexity. Multiple engineers manage it, but it's significantly more straightforward to administer than traditional VPNs and web proxies."
"I would rate the technical support of iboss a solid 10 without a shadow of a doubt."
"It was a very easy product to install. It can be deployed very fast."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user."
"Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance."
"The product enforces the privacy of the users, which is good."
"All the features of Harmony Browse improve the security of an organization."
"The product is stable."
"It provides end-to-end encryption for the communication between the user's device and the remote browser, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks."
"The real-time Threat Intelligence feature powered by Check Point's ThreatCloud is impressive because ThreatCloud integrates and correlates all malicious data from Check Point installations globally, collecting and analyzing this data with AI and machine learning to help prevent zero-day attacks effectively."
"The downloaded protection as it scans and emulates the files on a browser level is great."
"Prisma Access provides comprehensive security. It provides URL filtering, application control, SSL, DLP, etc. It provides complete security for the cloud environment."
"Overall, the cost savings, ease of deployment, and better VPN user experience and performance are valuable."
"Its hands-off security and the fact that we don't have to maintain it are the most valuable features."
"We have an application called ADEM that helps us troubleshoot network-related issues. It helps us to isolate an issue whether it is on the ISP level, endpoint level, or system access level."
"Prisma helped us build a moat around our production systems. It's now impossible to log into our production from a non-MDM laptop. Prisma Access provides decent security overall."
"It's great that we can make sure a machine meets the minimum requirements before users are allowed to log in."
"The solution is not very complex and is easy to manage for people who may or may not have knowledge about Palo Alto Networks."
"This solution provides a DLP on the cloud and very few people have a scanning device for data at rest."
 

Cons

"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"Its pricing could be better."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"Sometimes, obviously, there are bugs."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"While it is effective, the management portal could use some refinement. For instance, we would like to see more advanced filtering options and clearer reporting for policy violations."
"The only thing they should add or improve is the reporting series."
"security solution for users Devices and Access" What is our primary use case? The application is good as its lightweight and its functions are really similar to a browser extension. It offers real-time protection for internet users by addressing active concerns. Moreover, it incorporates a reputation feature to ensure swift access to websites within a second. The effectiveness of Harmony Browse’s capabilities is really an advantage. What is most valuable? The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete. What needs improvement? Regarding the Harmony Browse, I call it "Kuna" which is accurate. The quantum product serves as my primary focus due to its project cost, and I aim to introduce support in this area. This is because firewall implementation holds significant importance for organizations. I want to improve more on the quantum losses. There's a concept I'd like to include in Harmony Browse, known as automatic catching. This mechanism comes into play when an individual closes their browser while possessing sensitive information, like monetary data. To counteract potential risks, we employ a browser cache-clearing process to minimize the cache's accumulation. This action ensures that malicious entities can't exploit the cached data for attacks. To enhance this further, there's potential for the implementation of a self-cleaning technology. For instance, when a user exits the browser, an automatic action could be initiated to clear the browser cache, serving as an additional layer of security. This can be helpful if added."
"The solution needs greater automation to reduce the need for manual configuration and management."
"The ease of handling should be improved, as it is currently intrusive and some users don't like it."
"One of the new features I would like to see is the possibility that these tools can be brought to mobile devices such as tablets and cell phones in iOS or Android applications."
"Support must be faster in solving problems."
"Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."
"The solution needs to be more compatible with other solutions. This is specifically a problem for us when it comes to healthcare applications. They have proprietary connection types and things of that nature that make compatibility a challenge sometimes."
"Better integration with the MDM solution would be useful."
"Lacks a hybrid model which has API plus in-line security."
"It is a managed firewall. When you run into issues and have to troubleshoot, there is a fair amount of restriction. You run into a couple of restrictions where you don't have any visibility on what is happening on the Palo Alto managed infrastructure, and you need to get on a call to get technical assistance from Palo Alto's technical support. You have to get them to work with you to fix the problem. I would definitely like them to work on the visibility into what happens inside Palo Alto's infrastructure. It is not about getting our hands onto their infrastructure to do troubleshooting or fixing problems; it is just about getting more visibility. This will help us in guiding technical support folks to the area where they need to work."
"Prisma Access by Palo Alto Networks should consolidate the portals into a single portal. It is slow and takes more than ten seconds to load a page."
"GlobalProtect can face challenges with latency, especially when remote workers connect to centralized locations."
"It's not really Prisma's fault, but when you try to create exceptions you don't really have those abilities. You cannot say, on the management platform, "Hey, for these users I want to create these exceptions." That is one thing that I have gotten some complaints about, and we have faced some challenges there."
"The documentation is generally good, but they could provide a more detailed description of all the configuration steps. I have to search for information or call support. Palo Alto could add more knowledge base articles about configuration with screenshots and walkthroughs. That would be helpful. When configuring a product, you want to see examples of how it is done."
 

Pricing and Cost Advice

"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The overall pricing for iboss is very competitive and transparent."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is expensive compared to one of its competitors."
"The product has a reasonable pricing."
"The price is not very expensive for our organisation, but for others, it might be a little expensive."
"The licensing model for this product is complicated and changes all the time, making it very hard for the user to comprehend the configuration."
"It is not cheap. It is expensive. The good thing is that you are able to pay for what you need, but overall, it is not cheap. The pricing is not based on packages. You pay based on the features. If you want DLP, you only pay for DLP. They are very flexible. It is not cheap, but the licensing is flexible. There are no additional costs in addition to the standard licensing fees."
"As compared to other solutions, Prisma Access is much cheaper. It is probably 30% to 40% cheaper than other solutions, but I do not know the exact cost."
"They price their products using credit modules."
"Prisma Access is a little bit expensive."
"In terms of pricing, considering that it is a two or three years old solution, they should apply big discounts for the next two or three years. This approach will be better for them to capture the market."
"The pricing is very friendly. It's not confusing to figure out your workload and how much you'd be paying for the solution."
"We have to pay additional costs for maintenance and support services."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
9%
Healthcare Company
6%
Computer Software Company
31%
Manufacturing Company
9%
Security Firm
8%
Financial Services Firm
6%
Computer Software Company
13%
Manufacturing Company
12%
Financial Services Firm
12%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What needs improvement with Check Point Harmony Browse?
In terms of improvements for Check Point Harmony Browse, we felt that it could have more customizable integration, es...
What is your primary use case for Check Point Harmony Browse?
We wanted to provide users secure access to their applications. Currently, we are not in the live environment but in ...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What do you like most about Prisma Access by Palo Alto Networks?
The most valuable features of the solution are in the areas of the secure remote access it provides while also being ...
What is your experience regarding pricing and costs for Prisma Access by Palo Alto Networks?
From my experience, Palo Alto is more expensive compared to solutions like Netskope and Triscale.
 

Also Known As

iBoss Cloud Platform
No data available
Palo Alto Networks Prisma Access, Prisma Access, GlobalProtect, Palo Alto GlobalProtect Mobile Security Manager, Prisma SaaS by Palo Alto Networks, Prisma Access
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Information Not Available
Concord Hospital, State of Colorado, Essilor International, RheinLand Versicherungsgruppe, University of Westminster, Universidade Nove de Julho, SPAR Austria, CAME Group, ZipRealty, Greenhill & Co., IKT Agder, Aviva Stadium, Animal Logic, Management & Training Corporation, Brigham Young University Hawaii, School District of Chilliwack
Find out what your peers are saying about Check Point Harmony Browse vs. Prisma Access by Palo Alto Networks and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.