No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Harmony Browse vs Zscaler Internet Access comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 4, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
5th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
21
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (8th)
Check Point Harmony Browse
Ranking in Secure Web Gateways (SWG)
11th
Average Rating
9.0
Reviews Sentiment
7.2
Number of Reviews
29
Ranking in other categories
Enterprise Browsers (4th)
Zscaler Internet Access
Ranking in Secure Web Gateways (SWG)
3rd
Average Rating
8.4
Reviews Sentiment
6.6
Number of Reviews
59
Ranking in other categories
Internet Security (2nd)
 

Mindshare comparison

As of April 2026, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 2.8%, up from 1.9% compared to the previous year. The mindshare of Check Point Harmony Browse is 0.8%, up from 0.6% compared to the previous year. The mindshare of Zscaler Internet Access is 10.9%, down from 15.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG) Mindshare Distribution
ProductMindshare (%)
Zscaler Internet Access10.9%
iboss2.8%
Check Point Harmony Browse0.8%
Other85.5%
Secure Web Gateways (SWG)
 

Featured Reviews

Ashok Ananthula - PeerSpot reviewer
Senior Consultant Proxy Engineering at a financial services firm with 10,001+ employees
Cloud gateway has strengthened remote web security and now needs better Mac and ISP support
The problem our organization had is that iboss failed for the Mac devices. It is not able to give a successful agent for the Mac agents. That is where in 2025, we had to migrate to the Palo Alto-based platform. If your use case is for just Windows laptops,you can consider this platform as an option One issue is the data center resiliency part. In India especially, they are not tied up with the Tier 1 ISPs like Tata or Airtel; they were having Tier 2 ISPs and encountered many issues reaching few major sites that my organization depends on, and they were having problems that they could not fix quickly. They also lack a mechanism to route that traffic within their data center; rather, they ask customers to make a pac file change to route it to Singapore explicitly. It would be better if they route from their backend , i mean even if I send it to India DC, they should be able to route it internally to make that work; however, they fail to do that and ask the customer to route it in the pac file. Another suggestion is that in China, they do not have the proper setup; they used to have numerous problems with slowness and lack of premium circuits in China as well. That leads to multiple sites working slowly with latency-related issues. So the main issue is the ISP-related problems that need to be solved.
AndreiBo - PeerSpot reviewer
Security Solution Architect at TD SYNNEX
Real-time threat intelligence enhances security and user confidence
At this point, I do not have any suggestions for improvements to Check Point Harmony Browse because I haven't encountered anything that would need changing. If a solution is installed correctly, it usually won't fail. It's hard to suggest new features for Check Point Harmony Browse because it's a sub-component of a larger Harmony Endpoint Security solution, which is handled separately under specific situations, and while it has many options, it already scans and delivers files efficiently. Regarding the scanning of large files in Check Point Harmony Browse, the process typically involves sending the file to Check Point cloud for scanning and returning the clean file to the user, which is inherently complex and I do not see how it could be optimized to be faster.
Mohan Janarthanan - PeerSpot reviewer
Associate Vice President at Novac Technology Solutions
User access management and threat prevention are enhanced with user-friendly controls
The best features Zscaler Internet Access offers include application control, tenant segregation, and PoP center regions which have low availability zones. The internet access is very successful and bandwidth speed is excellent. It also has application-based control, URL-based control, and SSL inspection capabilities, which are very useful. Additionally, the in-depth CASB segregation is very beneficial to us. One unique feature I found helpful is the tenant level restrictions, which we use to only access our organization's tenant level mail IDs, drives, and specific tenant level access while restricting public access. Zscaler Internet Access has positively impacted our organization as we have noticed substantial outputs and income. It has improved our security environment control and endpoint protection. It prevents numerous web attacks through its AI/ML incorporated capability which identifies malware, threats, and viruses. It has a toggle button to enable features entirely at the tenant level for all users onboarded into Zscaler Internet Access, resulting in much better outcomes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"First of all, the security policies are essential. I do not have to rely solely on Active Directory for our users."
"Our primary use case for this product is DLP,"
"iboss is among the few products providing inline filtering where no application is needed on the device."
"Check Point's technical support is very impressive."
"It completely restricts and blocks phishing attacks and any threat entry into the system and keeps the work pace fast and secure without showing any signs of lag or latency."
"The initial setup process for Check Point Harmony Browse was really smooth; that was the main advantage."
"The real-time Threat Intelligence feature powered by Check Point's ThreatCloud is impressive because ThreatCloud integrates and correlates all malicious data from Check Point installations globally, collecting and analyzing this data with AI and machine learning to help prevent zero-day attacks effectively."
"The real-time Threat Intelligence feature powered by Check Point's ThreatCloud is impressive because ThreatCloud integrates and correlates all malicious data from Check Point installations globally, collecting and analyzing this data with AI and machine learning to help prevent zero-day attacks effectively."
"Implementing Check Point Harmony Browse has significantly strengthened our company's web security by reducing exposure to phishing and malware attacks."
"Since deploying Check Point Harmony Browse, we have seen a 40-50% drop in browser-based security incidents, especially phishing attempts and drive-by download attacks."
"It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded."
"We have seen a lot of traction in the market and a lot of users adopting this solution, and we're able to control or manage all the remote locations from one place."
"For our needs, the cloud-native proxy architecture is a very good solution. We are moving away from on-prem appliances and moving more toward cloud-based solutions. Zscaler is a good fit for our strategy. This architecture helps with cyber threats because we inspect most of the traffic and we can see that a lot of threats are stopped directly in the secure web gateway."
"Zscaler Internet Access is very scalable, and requests for scalable solutions are met quickly."
"Zscaler covers all the features needed to replace a VPN or proxy solution; they are good, and they've been on the market for 15 years now, so they are mature enough."
"Zscaler is an expensive solution, but it's worth the price."
"The most valuable features of Zscaler Internet Access are it's on the cloud, high network performance, and the interception of users is very easy."
"Zscaler Internet Access is less expensive than competitors like Palo Alto, offering a premium service justified by security enhancements and cost-effective scalability."
"Zscaler Internet Access protects using data loss prevention. If you have a CASB exposing your cloud out into the network, then Zscaler Internet Access will go ahead and control that unknown cloud application in the CASB, protecting it. There is also data detection with exact data match. This improves the data coming into your cloud so you are protecting it."
 

Cons

"The reporting feature needs improvement."
"Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern."
"One thing I would like to see differently with their Zero Trust platform is that some of the AI aspects related to high-risk activities have more false positives."
"It is stable, but due to growth, it can sometimes be less stable than wanted."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"The dashboards for local use could be better."
"If they could implement an extra security layer preventing access to iboss from the open internet, it would be great."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow."
"The initial policy setup can feel a bit complex, particularly when trying to customize controls for different user groups."
"security solution for users Devices and Access" What is our primary use case? The application is good as its lightweight and its functions are really similar to a browser extension. It offers real-time protection for internet users by addressing active concerns. Moreover, it incorporates a reputation feature to ensure swift access to websites within a second. The effectiveness of Harmony Browse’s capabilities is really an advantage. What is most valuable? The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete. What needs improvement? Regarding the Harmony Browse, I call it "Kuna" which is accurate. The quantum product serves as my primary focus due to its project cost, and I aim to introduce support in this area. This is because firewall implementation holds significant importance for organizations. I want to improve more on the quantum losses. There's a concept I'd like to include in Harmony Browse, known as automatic catching. This mechanism comes into play when an individual closes their browser while possessing sensitive information, like monetary data. To counteract potential risks, we employ a browser cache-clearing process to minimize the cache's accumulation. This action ensures that malicious entities can't exploit the cached data for attacks. To enhance this further, there's potential for the implementation of a self-cleaning technology. For instance, when a user exits the browser, an automatic action could be initiated to clear the browser cache, serving as an additional layer of security. This can be helpful if added."
"Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."
"More strengthening and robustness are required in zero-day threat prevention to ensure its efficiency at 100%."
"More focus and emphasis is required on customization and real-time notification and alert system."
"The ease of handling should be improved, as it is currently intrusive and some users don't like it."
"Support must be faster in solving problems."
"Technical support could be better."
"We'd like for them to include some sort of antivirus tool."
"Do not expect to pay for the service and start using it, like Gmail. Zscaler requires a proper implementation to be done to make it successful."
"In terms of usage, here in the GCC, it's still growing a growing market, so the combination of DLP, data leak prevention, to a certain extent is fine. But what it requires is user-based access or role-based access. The solution needs to grow into that, which definitely takes time. There's not an easy way to integrate it, when you have a cloud-based solution."
"The OS capabilities and WSL support could be improved."
"The solution is expensive. They recently revised the pricing and packaging."
"​When you have appliances, SSL inspection is always a headache due to poor performance and/or lack of ciphers implemented. ​"
"They could provide more time for the onboarding the training of an IT person."
 

Pricing and Cost Advice

"It is probably in line with other solutions, but I do not deal with the financial side."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"The overall pricing for iboss is very competitive and transparent."
"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The product has a reasonable pricing."
"The price is not very expensive for our organisation, but for others, it might be a little expensive."
"Because it's a cloud solution, we pay on a yearly basis. It is affordable and includes tech support and all features."
"ZIA follows a subscription model pricing and charges you based on the number of users. I would say its price is good."
"​Be aware that you will need to invest some time and money to adapt your environment for Zscaler (traffic redirection, software deployment, authentication, etc).​"
"It is a few pounds per user per month."
"The pricing is fair based on its competitive market."
"The pricing for Zscaler Internet Access could be made cheaper."
"Our monthly fee is around R3000."
"Zscaler is transparent about its pricing model."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
886,976 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
9%
Manufacturing Company
9%
Construction Company
7%
Computer Software Company
15%
Security Firm
14%
Outsourcing Company
11%
Healthcare Company
6%
Computer Software Company
11%
Financial Services Firm
11%
Manufacturing Company
11%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business7
Midsize Enterprise7
Large Enterprise8
By reviewers
Company SizeCount
Small Business19
Midsize Enterprise16
Large Enterprise6
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise10
Large Enterprise37
 

Questions from the Community

What needs improvement with iboss?
iboss can increase security in cyberspace. I have heard they are doing DDoS filtering, but I am not certain if they a...
What is your primary use case for iboss?
I use iboss for corporate VPN and all the corporate VRF, with basically all user traffic proxying to the internet.
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What needs improvement with Check Point Harmony Browse?
The browsing speed of Check Point Harmony Browse can be improved. The user interface and compatibility are good, but ...
What is your primary use case for Check Point Harmony Browse?
Check Point Harmony Browse serves as our primary browser. Since browsers are the first point of contact for any issue...
What is your experience regarding pricing and costs for Check Point Harmony Browse?
The pricing and setup cost of Check Point Harmony Browse are affordable for my organization.
Which is the better security solution - Cisco Umbrella or Zscaler?
Cisco Umbrella and Zscaler Internet Access are two broad-spectrum Internet security solutions that I have tried. Zs...
Which is better, Zscaler internet access or Netsckope CASB?
We researched Netskope but ultimately chose Zscaler. Netskope is a cloud access security broker that helps identify ...
What is your experience regarding pricing and costs for Zscaler Internet Access?
It is only for big companies currently and they only focus on that. That is one of the problems to get into the marke...
 

Also Known As

iBoss Cloud Platform
No data available
ZIA
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Information Not Available
Ulster-Greene ARC, BanRegio, HDFC, Ralcorp Holdings Inc., British American Tobacco, Med America Billing Services Inc., Lanco Group, Aquafil, Telefonica, Swisscom, Brigade Group
Find out what your peers are saying about Check Point Harmony Browse vs. Zscaler Internet Access and other solutions. Updated: April 2026.
886,976 professionals have used our research since 2012.