Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs CyberArk Privileged Access Manager comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (8th)
Check Point Harmony SASE (f...
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
62
Ranking in other categories
Secure Web Gateways (SWG) (7th), Firewalls (16th), Anti-Malware Tools (6th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (4th), ZTNA (3rd), Secure Access Service Edge (SASE) (5th)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
227
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

Secure Access Service Edge (SASE) Market Share Distribution
ProductMarket Share (%)
Check Point Harmony SASE (formerly Perimeter 81)3.9%
Prisma Access by Palo Alto Networks15.3%
Netskope12.2%
Other68.6%
Secure Access Service Edge (SASE)
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager15.8%
WALLIX Bastion7.2%
Delinea Secret Server7.1%
Other69.9%
Privileged Access Management (PAM)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
Nasseer Qureshi - PeerSpot reviewer
Delivers seamless and secure remote access while enhancing security posture
Check Point Harmony SASE (formerly Perimeter 81) offers strong features, but there are areas that could be improved. One area for improvement is integration with third-party identity providers. It works with standard SAML and SSO, but we would prefer deeper integrations with solutions such as Ping for more advanced identity-based policies. Additionally, a mobile-specific client or lightweight agent would be helpful for securing access from smartphones, especially in BYOD environments. We would appreciate more granular reporting and analytics, including better drill-down capabilities to investigate specific users or app activity. The logs are comprehensive, but filtering them can sometimes feel messy. The user interface on the management portal could be more intuitive, especially when managing multiple sites or remote offices. Some of the policy configuration steps are nested and could be streamlined.
Atul-Gujar - PeerSpot reviewer
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"iboss is among the few products providing inline filtering where no application is needed on the device. It operates on the network side and is not device-based. This feature was one of the main reasons why we stayed with them for so long."
"iboss has significantly lowered the number of security incidents. It is crazy how much it blocks and how much it is aware of the outside danger."
"The console is cloud-based, which is something I really appreciate."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"Its initial setup was straightforward."
"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"We chose iboss for both zero trust and proxy (SWG) because their SWG was superior."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"The best key features of Harmony are stabilization, private access, and Internet access."
"Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
"While the higher cost and complexity may pose challenges for smaller companies without extensive IT resources, the value provided by Check Point's advanced capabilities and excellent 24/7 support justifies the investment. Overall, it is highly recommended that insurance firms prioritize data security and regulatory compliance, especially medium to large companies with the resources to manage and fully utilize its features."
"The characteristics that I have liked the most are the ease of implementation and administration."
"The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way."
"It has centralized management that allows administrators to supervise and control the security of the entire network."
"Its software solution also ensures connectivity and protects against NSF filtering."
"I find it very easy to implement and deploy in the organization."
"They just released Marketplace, and they are constantly releasing updates to the components and adding new components, like Conjur. This is something that we ran into with Secret Server and DevOps, so it is already scalable, but becoming more so in the future."
"In terms of stability, there are no complaints."
"Creating policies and the password rotation feature have been valuable. We don't have to memorize our password for the ADM account."
"DVR like video recording and text-based recording for easier audits."
"CyberArk has helped us to identify, store, protect, and monitor the usage of privileged accounts."
"Session monitoring is excellent. It may be the solution's most valuable aspect."
"If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
"The best feature of CyberArk Privileged Access Manager is its core function: automatically managing and securing credentials."
 

Cons

"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"Our iboss subscription access should be more secure with an OTP or VPN etc. It is easy to gain access if, for example, hackers obtain my username and password."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"File integrity monitoring would be very advantageous as an additional feature."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"The support is not very good."
"The product needs to work on the integration of alerts with different SIEM or security solutions."
"Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us."
"Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."
"The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."
"There is a hefty cost"
"The connectivity issue can be improved as at times it lags when connecting to their server."
"The suspend feature needs more control."
"The initial setup could be simpler but it may not be as effective."
"CyberArk Enterprise Password Vault must incorporate connectors for password and session managers in the marketplace."
"CyberArk PAM is a very broad product as everyone's requirements for implementation are different. In our particular case, the initial implementation was planned and developed by people who didn't know our specific network requirements, so the initial implementation needed to be tweaked over time. While this is normal, at the time all these "major" changes required CyberArk professional services to come in-plant and "assist" with the changes."
"Make it easier to deploy."
"One thing that could be improved is to create of a better alternative for fixing group policy fees. We currently use Microsoft, but they have introduced new policies that may not be compatible."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"Over the past seven years, I have seen a lot of ups and downs with the product."
"Stability is a huge concern right now. We are on a version which is very unstable. We have to upgrade to stabilize it. It is fine, but the problem is we have to hire CyberArk to do the upgrade. This costs money, and it is their bug."
 

Pricing and Cost Advice

"The overall pricing for iboss is very competitive and transparent."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The product is neither cheap nor expensive."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"Overall I am very happy with the solution’s flexibility and pricing."
"The cost of the solution's licenses depends on the particular use cases."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
"The product is reasonably priced."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"Our risk is definitely significantly lower. Also, our resources are low."
"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"Licensing fees are paid on a yearly basis."
"This solution is expensive."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"I believe that this solution is priced well. It's the market leader and I think that it's the best solution."
"There are additional features added to our CyberArk Privileged Access Manager license. For example, features that allow us to integrate into various kinds of platforms."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
15%
Financial Services Firm
6%
Government
6%
Comms Service Provider
6%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
10%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise5
By reviewers
Company SizeCount
Small Business53
Midsize Enterprise18
Large Enterprise15
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise41
Large Enterprise171
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
Regarding costs, CyberArk Privileged Access Manager is not a cheap product; hence, many companies struggle with its h...
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Rockwell Automation
Find out what your peers are saying about Zscaler, Palo Alto Networks, Netskope and others in Secure Access Service Edge (SASE). Updated: October 2025.
869,566 professionals have used our research since 2012.