Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Browse vs Zscaler Internet Access comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 4, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
5th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (8th)
Check Point Harmony Browse
Ranking in Secure Web Gateways (SWG)
13th
Average Rating
9.0
Reviews Sentiment
7.2
Number of Reviews
29
Ranking in other categories
Enterprise Browsers (4th)
Zscaler Internet Access
Ranking in Secure Web Gateways (SWG)
3rd
Average Rating
8.4
Reviews Sentiment
6.7
Number of Reviews
57
Ranking in other categories
Internet Security (2nd)
 

Mindshare comparison

As of September 2025, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 2.1%, up from 1.8% compared to the previous year. The mindshare of Check Point Harmony Browse is 0.6%, up from 0.4% compared to the previous year. The mindshare of Zscaler Internet Access is 14.2%, down from 17.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG) Market Share Distribution
ProductMarket Share (%)
Zscaler Internet Access14.2%
iboss2.1%
Check Point Harmony Browse0.6%
Other83.1%
Secure Web Gateways (SWG)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
AndreiBo - PeerSpot reviewer
Real-time threat intelligence enhances security and user confidence
At this point, I do not have any suggestions for improvements to Check Point Harmony Browse because I haven't encountered anything that would need changing. If a solution is installed correctly, it usually won't fail. It's hard to suggest new features for Check Point Harmony Browse because it's a sub-component of a larger Harmony Endpoint Security solution, which is handled separately under specific situations, and while it has many options, it already scans and delivers files efficiently. Regarding the scanning of large files in Check Point Harmony Browse, the process typically involves sending the file to Check Point cloud for scanning and returning the clean file to the user, which is inherently complex and I do not see how it could be optimized to be faster.
Mohan Janarthanan - PeerSpot reviewer
User access management and threat prevention are enhanced with user-friendly controls
The best features Zscaler Internet Access offers include application control, tenant segregation, and PoP center regions which have low availability zones. The internet access is very successful and bandwidth speed is excellent. It also has application-based control, URL-based control, and SSL inspection capabilities, which are very useful. Additionally, the in-depth CASB segregation is very beneficial to us. One unique feature I found helpful is the tenant level restrictions, which we use to only access our organization's tenant level mail IDs, drives, and specific tenant level access while restricting public access. Zscaler Internet Access has positively impacted our organization as we have noticed substantial outputs and income. It has improved our security environment control and endpoint protection. It prevents numerous web attacks through its AI/ML incorporated capability which identifies malware, threats, and viruses. It has a toggle button to enable features entirely at the tenant level for all users onboarded into Zscaler Internet Access, resulting in much better outcomes.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"iboss has significantly lowered the number of security incidents. It is crazy how much it blocks and how much it is aware of the outside danger."
"iboss is easy to use despite its complexity. Multiple engineers manage it, but it's significantly more straightforward to administer than traditional VPNs and web proxies."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"I would rate the technical support of iboss a solid 10 without a shadow of a doubt."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"iboss is among the few products providing inline filtering where no application is needed on the device."
"The product enforces the privacy of the users, which is good."
"Implementing Check Point Harmony Browse has significantly strengthened our company's web security by reducing exposure to phishing and malware attacks."
"The real-time Threat Intelligence feature powered by Check Point's ThreatCloud is impressive because ThreatCloud integrates and correlates all malicious data from Check Point installations globally, collecting and analyzing this data with AI and machine learning to help prevent zero-day attacks effectively."
"Among its most important features is the integration of its analytics."
"Check Point Harmony Browse has positively impacted my organization by providing great enterprise-class security to our customers."
"It provides end-to-end encryption for the communication between the user's device and the remote browser, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks."
"All the features of Harmony Browse improve the security of an organization."
"It is easy to implement and has great security potential to avoid vulnerabilities through internet browsing."
"Zscaler Internet Access's roaming user feature is most valuable and is much better compared to other secure web gateways."
"The initial setup was straightforward. The biggest thing for us was to build our own policies. The deployment itself was only a few hours."
"The most valuable features of Zscaler Internet Access are it's on the cloud, high network performance, and the interception of users is very easy."
"The most valuable feature of the solution is SWG traffic."
"The initial setup is very straightforward."
"Overall, we're very happy with our product."
"We like Zscaler's traffic filtering, web security, DLP, and IPS features. The real-time threat protection is excellent."
"We don't have to buy equipment to use it. And when our engineers set it up on our side, we just configured a few settings and we were in."
 

Cons

"Its pricing could be better."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"Our iboss subscription access should be more secure with an OTP or VPN etc. It is easy to gain access if, for example, hackers obtain my username and password."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"File integrity monitoring would be very advantageous as an additional feature."
"The reporting feature needs improvement."
"In terms of improvements for Check Point Harmony Browse, we felt that it could have more customizable integration, especially with non-Check Point products, because in some environments, they are not 100% Check Point."
"Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."
"security solution for users Devices and Access" What is our primary use case? The application is good as its lightweight and its functions are really similar to a browser extension. It offers real-time protection for internet users by addressing active concerns. Moreover, it incorporates a reputation feature to ensure swift access to websites within a second. The effectiveness of Harmony Browse’s capabilities is really an advantage. What is most valuable? The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete. What needs improvement? Regarding the Harmony Browse, I call it "Kuna" which is accurate. The quantum product serves as my primary focus due to its project cost, and I aim to introduce support in this area. This is because firewall implementation holds significant importance for organizations. I want to improve more on the quantum losses. There's a concept I'd like to include in Harmony Browse, known as automatic catching. This mechanism comes into play when an individual closes their browser while possessing sensitive information, like monetary data. To counteract potential risks, we employ a browser cache-clearing process to minimize the cache's accumulation. This action ensures that malicious entities can't exploit the cached data for attacks. To enhance this further, there's potential for the implementation of a self-cleaning technology. For instance, when a user exits the browser, an automatic action could be initiated to clear the browser cache, serving as an additional layer of security. This can be helpful if added."
"One suggestion for improvement is if the Check Point Browse team can add more plugins to support more third-party browsers such as Opera and Safari."
"The URL filtering database should be improved."
"There is always scope for improvement for Check Point Harmony Browse, particularly in the user interface and adding the IOC checklist or feature modifications."
"The solution needs greater automation to reduce the need for manual configuration and management."
"The initial policy setup can feel a bit complex, particularly when trying to customize controls for different user groups."
"Zscaler Internet Access needs to integrate more ISPs. It is good to have more than three ISPs."
"The performance needs improvement. Some areas create performance issues and, depending on the use cases, require reconfiguration to perform again."
"The OS capabilities and WSL support could be improved."
"One thing that they could improve is the ability to import rules from other platforms."
"If they can also integrate with the multi-factor authentication to prompt users to do another, second-factor authentication, that would be ideal."
"The pricing is an issue. It is expensive if you have all of your users in the same location. It is expensive compared to other firewalls on the market."
"There are many functionalities in Zscaler Internet Access that need improvements, such as an advanced firewall and logging capabilities to track calls."
"Zscaler does not provide dedicated IPs to each customer. Hence, they share a pool of IPs provided by Zscaler. There is a chance of blacklisting these IPs. I also do not like the multi-management portal."
 

Pricing and Cost Advice

"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is probably in line with other solutions, but I do not deal with the financial side."
"The overall pricing for iboss is very competitive and transparent."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is expensive compared to one of its competitors."
"The price is not very expensive for our organisation, but for others, it might be a little expensive."
"The product has a reasonable pricing."
"The price of Zscaler Internet Access should improve, it is expensive."
"​Be aware that you will need to invest some time and money to adapt your environment for Zscaler (traffic redirection, software deployment, authentication, etc).​"
"Because it's a cloud solution, we pay on a yearly basis. It is affordable and includes tech support and all features."
"There are multiple bundles: enterprise, business, and transformation. Transformation includes all the features, but recently I've seen a few more line items that are additional costs. Overall, it's expensive."
"ZIA follows a subscription model pricing and charges you based on the number of users. I would say its price is good."
"Zscaler is transparent about its pricing model."
"Zscaler is an expensive solution, but it's worth the price. Their services are unmatched by competitors. Some may come with half the features that Zscaler can offer and be much cheaper. However, they do not have the global coverage that Zscaler has, and they will not provide the same low latencies and the same speeds that Zscaler can."
"If we need any extra features, the price will increase."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
867,783 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Financial Services Firm
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
32%
Manufacturing Company
8%
Security Firm
8%
Financial Services Firm
6%
Computer Software Company
15%
Manufacturing Company
11%
Financial Services Firm
10%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise5
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise16
Large Enterprise5
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise8
Large Enterprise39
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What needs improvement with Check Point Harmony Browse?
One suggestion for improvement is if the Check Point Browse team can add more plugins to support more third-party bro...
What is your primary use case for Check Point Harmony Browse?
My main use case for Check Point Harmony Browse is to help customers related to providing security from managed and u...
Which is the better security solution - Cisco Umbrella or Zscaler?
Cisco Umbrella and Zscaler Internet Access are two broad-spectrum Internet security solutions that I have tried. Zs...
Which is better, Zscaler internet access or Netsckope CASB?
We researched Netskope but ultimately chose Zscaler. Netskope is a cloud access security broker that helps identify ...
 

Also Known As

iBoss Cloud Platform
No data available
ZIA
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Information Not Available
Ulster-Greene ARC, BanRegio, HDFC, Ralcorp Holdings Inc., British American Tobacco, Med America Billing Services Inc., Lanco Group, Aquafil, Telefonica, Swisscom, Brigade Group
Find out what your peers are saying about Check Point Harmony Browse vs. Zscaler Internet Access and other solutions. Updated: September 2025.
867,783 professionals have used our research since 2012.