No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Harmony SASE (formerly Perimeter 81) vs CyberArk Privileged Access Manager comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
20
Ranking in other categories
Secure Web Gateways (SWG) (5th), Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (7th), Secure Access Service Edge (SASE) (8th)
Check Point Harmony SASE (f...
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
62
Ranking in other categories
Secure Web Gateways (SWG) (7th), Firewalls (16th), Anti-Malware Tools (7th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (5th), ZTNA (2nd), Secure Access Service Edge (SASE) (7th)
CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

Secure Access Service Edge (SASE) Mindshare Distribution
ProductMindshare (%)
Check Point Harmony SASE (formerly Perimeter 81)5.2%
Prisma Access by Palo Alto Networks11.8%
Cato SASE Cloud Platform9.8%
Other73.2%
Secure Access Service Edge (SASE)
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager11.4%
Delinea Secret Server4.9%
One Identity Safeguard4.4%
Other79.3%
Privileged Access Management (PAM)
 

Featured Reviews

reviewer2701851 - PeerSpot reviewer
Managing Director
Enhances web security with a single pane of glass and flexible deployment
I don't see any need for improvement; one of the really good things about iboss as a company is that they listen to customer feedback. I have suggested enhancements, and they are responsive, making changes for the better, and they do a lot of testing. To improve iboss, although we haven't used it, we considered the VPN solution that comes with the highest tier licensing, which includes DLP and various other add-ons. We prefer using another product which automatically logs you back onto your network when turning on your PC. With iboss, the connection is manual, which doesn't meet our needs. Additionally, sizing can be tricky because, although the initial recommendations may seem adequate, actual usage may require more gateways than anticipated.
Nasseer Qureshi - PeerSpot reviewer
Pre Sales Consultant at Redington Group
Delivers seamless and secure remote access while enhancing security posture
Check Point Harmony SASE (formerly Perimeter 81) offers strong features, but there are areas that could be improved. One area for improvement is integration with third-party identity providers. It works with standard SAML and SSO, but we would prefer deeper integrations with solutions such as Ping for more advanced identity-based policies. Additionally, a mobile-specific client or lightweight agent would be helpful for securing access from smartphones, especially in BYOD environments. We would appreciate more granular reporting and analytics, including better drill-down capabilities to investigate specific users or app activity. The logs are comprehensive, but filtering them can sometimes feel messy. The user interface on the management portal could be more intuitive, especially when managing multiple sites or remote offices. Some of the policy configuration steps are nested and could be streamlined.
Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"First of all, the security policies are essential. I do not have to rely solely on Active Directory for our users."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"From a corporate perspective, I understand that it's important to keep the company data safe."
"Content filtering is the most useful feature of iboss."
"One of the most valuable features found using Harmony is being able to monitor in a simple and orderly way."
"Setup is a breeze; you key in the target user's email, and the rest is a click away."
"I rate the overall product as ten out of ten."
"Overall, the unified agent covers endpoints as well as prevents web browser attacks."
"The installation is very easy."
"The tool is easy to use and set up."
"Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
"Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
"There are no issues with scalability, and our clients are very happy to use the product."
"The product is the best in the market at the moment."
"Implementing the CyberArk solution helps these companies to think about their privileged accounts, organize them in the CyberArk solution, and then get control of their privileged accounts to safely store and manage these, knowing that only the correct persons can access these accounts and that the different devices can only be managed via one central entry point to the datacenter."
"We have demoted a lot of domain admins and taken a lot of that away from people, giving it a shared account structure."
"What I found most valuable in CyberArk Privileged Access Manager is the Session Manager as it allows you to split the connection between the administrator site and the target site. I also found the Password Manager valuable as it lets you rotate the passwords of privileged users."
"We have been able to manage application credentials in CyberArk, whether they come as a custom plugin or straight out-of-the-box."
"The solution is stable and reliable."
"The most valuable aspects of the solution include password management and Rest API retrieval of vaulted credentials."
 

Cons

"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"It is stable, but due to growth, it can sometimes be less stable than wanted."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"The dashboards for local use could be better."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"The endpoint-type solution is an area that needs some improvement."
"SSL decryption: We had issues with learners using apps instead of using web browsers."
"I have found that the log-in/out process takes quite some time."
"The support is not very good."
"Automation and scalability are areas where the solution lacks and needs to improve."
"The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."
"When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end."
"The overall UI could be improved and updated to bring a simpler feel to the application."
"In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application."
"It would be nice to have a notification sound when Perimeter81 disconnects, as I sometimes don't notice when the icon shows that it's disconnected, and I end up wasting time waiting for my browser to load a page that shows an error, usually error 404."
"The lead product has a slow process."
"We don't often contact technical support, but when we do it, the response could be faster and better."
"Perhaps improve the user registry integration. User registry integration is atypical in the sense that the product creates a copy of the user inside the product itself."
"It needs better documentation with more examples for the configuration files and API/REST integration"
"Earlier in 9.0 version I faced some stability issues, yes there are some stability issues with CyberArk such as memory leakage, password unsync etc. These are some common problems but frustrating."
"Over the past seven years, I have seen a lot of ups and downs with the product, but now I am happy with the version that we are using now."
"I would like to see improvement in the custom connector for integration with different devices."
"We require IAM (identify and access management) capability at the administrator level because we need more identification."
 

Pricing and Cost Advice

"The overall pricing for iboss is very competitive and transparent."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is expensive compared to one of its competitors."
"It is probably in line with other solutions, but I do not deal with the financial side."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users."
"Annual licenses cost $30 to $40 each."
"The cost of the solution's licenses depends on the particular use cases."
"The product is neither cheap nor expensive."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
"If you are looking at implementing this solution, buy the training and go to it."
"Our risk is definitely significantly lower. Also, our resources are low."
"The solution is very expensive and requires a license. We pay for an enterprise license."
"The solution is available at a high price"
"The solution is costly but we get what we pay for."
"It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"I hope to learn how the pricing works so that I can understand it better, but I am certain it is not inexpensive."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
885,728 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
9%
Manufacturing Company
9%
Construction Company
7%
Construction Company
10%
Computer Software Company
9%
Comms Service Provider
7%
Financial Services Firm
5%
Financial Services Firm
13%
Manufacturing Company
10%
Computer Software Company
8%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise7
Large Enterprise6
By reviewers
Company SizeCount
Small Business53
Midsize Enterprise20
Large Enterprise13
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What do you like most about Harmony Connect?
The product's initial setup phase is very simple.
What is your experience regarding pricing and costs for Harmony Connect?
I am not aware of the pricing, setup cost, and licensing, but I would say the setup cost is our resource, and we have...
What needs improvement with Harmony Connect?
When I'm raising a ticket for Check Point Harmony SASE (formerly Perimeter 81), it's a bit technical for non-technica...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If the...
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Rockwell Automation
Find out what your peers are saying about Palo Alto Networks, Cato Networks, Netskope and others in Secure Access Service Edge (SASE). Updated: March 2026.
885,728 professionals have used our research since 2012.