Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs CyberArk Privileged Access Manager comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (7th), Internet Security (3rd), Web Content Filtering (3rd), Cloud Access Security Brokers (CASB) (8th), ZTNA as a Service (11th), Secure Access Service Edge (SASE) (9th)
Check Point Harmony SASE (f...
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
60
Ranking in other categories
Secure Web Gateways (SWG) (6th), Firewalls (16th), Anti-Malware Tools (8th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (5th), ZTNA (5th), Secure Access Service Edge (SASE) (7th)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
221
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

Secure Access Service Edge (SASE)
Privileged Access Management (PAM)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
reviewer8099174 - PeerSpot reviewer
Secure access with an intuitive design and straightforward controls
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a broader range of third-party tools would be beneficial for seamless compatibility with various existing systems. As for additional features in the next release, it would be great to see advanced threat detection and response capabilities integrated into the platform. This would further enhance security by proactively identifying and mitigating potential threats. Additionally, improved mobile device management features and more comprehensive user behavior analytics would be valuable additions to meet evolving cybersecurity needs.
Lasantha Wijesinghe - PeerSpot reviewer
We have visibility and control through real-time user behavior analytics
It took us some time to realize its benefits because there was a learning curve for us. It took us about a year to get our heads around this product and start effectively using it. It is a journey. It takes at least five years for any company to make this product very useful and reach maturity. It is not only the product's fault. The company needs to have a vision, and the company culture needs to go with it. Senior leadership needs to support the vision. You need to have lots of ingredients for success. If everything is in place, you will see success after one year. In the first year, it is a struggle for everybody. My company was bought by a bigger company, and they were very new to privileged access management. Everybody was struggling. The advice I would give is to have a good vision for privileged access management. You need dedicated teams, senior management support, and proper company policies and standards before implementing the solution. Start building knowledge slowly and avoid jumping into the deep end without preparation. I would rate CyberArk Privileged Access Manager a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The console is cloud-based, which is something I really appreciate."
"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"Technical support is pretty sharp and very responsive."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"Its initial setup was straightforward."
"iboss is among the few products providing inline filtering where no application is needed on the device."
"The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
"The solution offers ATP features and management features."
"It helps to quickly get access to the pages I need."
"Providing access and security allows our company employees to work from home and remotely."
"Customer service is excellent."
"The product has a reasonably high pricing."
"SD-WAN is one of the primary solutions offered by Perimeter 81."
"The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support."
"CyberArk Privileged Access Manager provides granularity. You can break things down into individual safes. You have specific access to safes by individual or group. The interface is with AD, with LDAP, or with local CyberArk passwords. You also have the ability to establish policies for your individual credentials."
"The tool has safe vaults. We keep our passwords in the Vault. The tool’s recording feature is also valuable for us."
"CyberArk is a pioneer for PAM; they've always been the leader in terms of research and development and bringing new capabilities to the PAM."
"Previously, we used to share passwords for service and normal admin accounts among team members. However, since we started managing it through the product, we've transitioned to individual admin accounts or implemented dual control for shared accounts. With dual control, exclusive checking and checkout options are available, and passwords are not stored in clear text anywhere in the credentials."
"The password management feature is valuable."
"The module called PTA, Privileged Threat Analytics, is very useful. When you give access to a user, it monitors and detects if the user's behavior is unusual. After giving access, it continually checks if the user is the same user."
"We utilize PTA, and we are now integrating that into our risk management program so we can identify the uses of the vault which are outside of the norm, e.g., people accessing after hours. It has reduced the amount of time that we are looking through logs and audit logs."
"We are maintaining compliance in PCI, SOX and HIPPA, which is a big thing. Auditors really like it, and it has made us stay compliant."
 

Cons

"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"The reporting feature needs improvement. It doesn't give you the expected results. It is quite difficult to get the specific reports needed, and it is not as intuitive as the rest of the platform."
"Its pricing could be better."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"If they could implement an extra security layer preventing access to iboss from the open internet, it would be great."
"One thing I would like to see differently with their Zero Trust platform is that some of the AI aspects related to high-risk activities have more false positives."
"The dashboards for local use could be better."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."
"Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."
"In the future, maybe P81 can improve the network traffic balancing and redundancy."
"Its initial setup process is complex for a hybrid environment."
"In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality."
"The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations."
"The solution's speed of upload and download is an area where it lacks"
"It would be nice to have a notification sound when Perimeter81 disconnects, as I sometimes don't notice when the icon shows that it's disconnected, and I end up wasting time waiting for my browser to load a page that shows an error, usually error 404."
"If CyberArk wants people to pay for cloud services, they need to make the cloud services much more real-time."
"It is web-based, but other competitors have apps. We need to get there. It is just smoother to have an app. You don't have all the bugs from having a browser, and people like them better, since you can get to them via mobile."
"New functionalities and discovered bugs take longer to patch. We would greatly appreciate quicker development of security patches and bug corrections."
"The price is high compared to Azure Key Vault. It's the most expensive solution."
"The stability depends on the infrastructure it is installed on, which is important because CyberArk does not have the hardware appliance."
"It is easily customized, and that customization makes it very easy to start trying to shoehorn the solution into roles it was never intended to fill."
"Transitioning from a traditional on-premises deployment to the privileged cloud has resulted in losing access to many logs and administrative tools typically available on the back end."
"When we are implementing it, it is quite tricky. It could be less complex for new users. The learning curve could be a little better."
 

Pricing and Cost Advice

"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is expensive compared to one of its competitors."
"The overall pricing for iboss is very competitive and transparent."
"It is probably in line with other solutions, but I do not deal with the financial side."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"The cost of the solution's licenses depends on the particular use cases."
"The product is reasonably priced."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"Annual licenses cost $30 to $40 each."
"The product is neither cheap nor expensive."
"The product's pricing model accommodates diverse needs and deployment sizes."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"The price of CyberArk Privileged Access Manager could be less expensive."
"I would rate the cost of CyberArk Privileged Access Manager seven out of ten with ten being the most expensive."
"CyberArk Privileged Access Manager is more expensive than its competitors, such as BeyondTrust, Delinea, and ManageEngine PAM360."
"I have heard from my leaders that CyberArk is costlier in terms of licensing. The support and maintenance are also costly. We use their premium support, but for the price we pay, we do not get the value."
"Its price can be reduced."
"CyberArk has been Gartner's number-one pick for the past ten years, so you can infer that their pricing is higher than everyone else. When you are the best, you will charge appropriately for it."
"Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
"The solution is available at a high price"
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
850,834 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
20%
Financial Services Firm
7%
Manufacturing Company
6%
Comms Service Provider
5%
Educational Organization
33%
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
I have a couple of thoughts for improvement, but usually when I address them with my rep, they put it into the featur...
What is your primary use case for iboss?
We use it primarily for simpler filtering because we're a K12 entity.
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
With the current model of licensing, for my use cases, sometimes it's hard to convince the management and get budget ...
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Rockwell Automation
Find out what your peers are saying about Palo Alto Networks, Zscaler, Cisco and others in Secure Access Service Edge (SASE). Updated: April 2025.
850,834 professionals have used our research since 2012.