Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs CyberArk Identity comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (8th)
Check Point Harmony SASE (f...
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
62
Ranking in other categories
Secure Web Gateways (SWG) (7th), Firewalls (16th), Anti-Malware Tools (6th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (4th), ZTNA (3rd), Secure Access Service Edge (SASE) (5th)
CyberArk Identity
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
28
Ranking in other categories
Authentication Systems (10th), Identity Management (IM) (9th), Authorization Software (3rd), Enterprise Password Managers (8th), User Entity Behavior Analytics (UEBA) (9th), Access Management (5th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (6th)
 

Mindshare comparison

Secure Access Service Edge (SASE) Market Share Distribution
ProductMarket Share (%)
Check Point Harmony SASE (formerly Perimeter 81)3.9%
Prisma Access by Palo Alto Networks15.5%
Netskope12.3%
Other68.3%
Secure Access Service Edge (SASE)
Customer Identity and Access Management (CIAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Identity3.8%
Auth019.8%
Ping Identity Platform11.9%
Other64.5%
Customer Identity and Access Management (CIAM)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
Nasseer Qureshi - PeerSpot reviewer
Delivers seamless and secure remote access while enhancing security posture
Check Point Harmony SASE (formerly Perimeter 81) offers strong features, but there are areas that could be improved. One area for improvement is integration with third-party identity providers. It works with standard SAML and SSO, but we would prefer deeper integrations with solutions such as Ping for more advanced identity-based policies. Additionally, a mobile-specific client or lightweight agent would be helpful for securing access from smartphones, especially in BYOD environments. We would appreciate more granular reporting and analytics, including better drill-down capabilities to investigate specific users or app activity. The logs are comprehensive, but filtering them can sometimes feel messy. The user interface on the management portal could be more intuitive, especially when managing multiple sites or remote offices. Some of the policy configuration steps are nested and could be streamlined.
Jai Anand - PeerSpot reviewer
Has strengthened identity controls and improved regulatory compliance across global operations
The initial deployment is complex and requires many users, making it more suitable for larger enterprises. It requires a number of users to get it deployed, particularly for on-premises deployments. This typically involves a lot of initial planning, setup, and configuration. Another important consideration is the cost. It can be quite expensive, making it more suitable for larger enterprises rather than small businesses or startups. The learning curve is also significant due to the numerous features and configurations available. Some features necessitate a detailed analysis and understanding to effectively work with this solution. Additionally, the user interface needs some improvements. It appears outdated compared to the technology we are using in 2025. The UI seems like it's from the early 2000s, making it look considerably behind the times, about 20 to 25 years old.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"iboss has significantly lowered the number of security incidents. It is crazy how much it blocks and how much it is aware of the outside danger."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"Granular setup, which was able to set different levels of filters using the OUs in the AD."
"It was a very easy product to install. It can be deployed very fast."
"Content filtering is the most useful feature of iboss."
"Our primary use case for this product is DLP,"
"iboss is among the few products providing inline filtering where no application is needed on the device."
"The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
"The product has a reasonably high pricing."
"The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
"It keeps us all accountable and ensures secure internet connections while we all work remotely."
"Logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN."
"The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment."
"The scalability is good, and I'd give it an eight out of ten."
"Perimeter 81 is very pretty."
"I find the CyberArk Identity portal quite intuitive; it has changed a lot over the last year and a half and if you think logically and understand your environment, it is easy to establish a suitable setup for yourself and all your vendors."
"The most valuable feature of CyberArk Identity is the adaptive interface."
"Being able to integrate CyberArk Identity with Microsoft Defender is valuable."
"The features that I personally find most effective in terms of security stem from the fact that it is easy to integrate and also the adoption is faster."
"CyberArk Identity is a mature product."
"The initial setup of CyberArk Identity was straightforward."
"I found the solution to be stable."
"The UI is very simplified, and the documentation of CyberArk Identity is very crisp and clear."
 

Cons

"To scale up, a new iboss Node Blade Chassis must be purchased."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"Sometimes, obviously, there are bugs."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."
"As it is a new market solution, I still face some instabilities in access at certain times of the day when I have more than 150 users using it simultaneously."
"Zero Trust Network Access can be a security breach if not used correctly."
"The support is not very good."
"The tool could be more user-friendly."
"I would suggest adding more networking and security features that allow more customization within their platform."
"A Google Chrome extension would be handy instead of logging into the app."
"Sometimes downloading PDF files can be slow."
"I'm not sure what needs improvement. It is a good platform."
"Something they could improve is the management of multifactor authentication. When you translate the page from one language to another, it can be a difficult process."
"When you translate the page from one language to another, it can be a difficult process. The translation isn't always good, and it may have a completely different name. I've noticed this in the English to Spanish translation."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"We would like to see an improvement in the ability to manage mobile devices."
"Room for improvement for CyberArk Identity might be on the support side, as they constantly improve with new features and remove redundant ones, integrating multiple steps into a single one for easier use; however, this is not just CyberArk Identity, as many vendors start with basic troubleshooting services without recognizing that knowledgeable users often reach out after exhausting those options."
"The product needs to leverage the cloud more, especially in the financial sector, where cloud adoption might be limited. Proper reporting within the cloud is essential. The tool should be more user-friendly to expedite access for users. The current agent-based system poses challenges if a user loses access to the server, making tasks difficult to perform. It should also improve technical support."
"The tool has issues with the third-party SMS gateway. The solution has its own SMS gateway. Integration support is a challenge when we don’t use their SMS gateway. The tool also needs to improve its scalability."
 

Pricing and Cost Advice

"The overall pricing for iboss is very competitive and transparent."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is expensive compared to one of its competitors."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The product is reasonably priced."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
"Overall I am very happy with the solution’s flexibility and pricing."
"Annual licenses cost $30 to $40 each."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"I would rate the tool’s pricing a seven out of ten. The product’s pricing is expensive and is on a yearly basis. You will need to pay around 10,000 GBP for 500 users."
"CyberArk Identity is an expensive solution."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"The pricing of CyberArk Identity is competitive."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
867,836 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
15%
Financial Services Firm
6%
Comms Service Provider
6%
Government
6%
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise5
By reviewers
Company SizeCount
Small Business51
Midsize Enterprise20
Large Enterprise15
By reviewers
Company SizeCount
Small Business19
Midsize Enterprise4
Large Enterprise9
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user...
What needs improvement with CyberArk Identity?
The reporting functionality is somewhat complicated. While I would rate CyberArk Identity and Okta on the same level,...
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
Idaptive
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Find out what your peers are saying about Zscaler, Palo Alto Networks, Netskope and others in Secure Access Service Edge (SASE). Updated: August 2025.
867,836 professionals have used our research since 2012.