Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs F5 BIG-IP Access Policy Manager (APM) comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
10th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
17
Ranking in other categories
Internet Security (4th), Web Content Filtering (3rd), Cloud Access Security Brokers (CASB) (8th), ZTNA as a Service (11th), Secure Access Service Edge (SASE) (10th)
Check Point Harmony SASE (f...
Ranking in Secure Web Gateways (SWG)
5th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
59
Ranking in other categories
Firewalls (16th), Anti-Malware Tools (7th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (5th), ZTNA (4th), Secure Access Service Edge (SASE) (7th)
F5 BIG-IP Access Policy Man...
Ranking in Secure Web Gateways (SWG)
17th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
17
Ranking in other categories
Network Access Control (NAC) (8th), SSL VPN (5th), Remote Access (10th), Access Management (10th)
 

Mindshare comparison

As of May 2025, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 2.1%, up from 1.7% compared to the previous year. The mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 2.1%, up from 2.1% compared to the previous year. The mindshare of F5 BIG-IP Access Policy Manager (APM) is 1.1%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
reviewer8099174 - PeerSpot reviewer
Secure access with an intuitive design and straightforward controls
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a broader range of third-party tools would be beneficial for seamless compatibility with various existing systems. As for additional features in the next release, it would be great to see advanced threat detection and response capabilities integrated into the platform. This would further enhance security by proactively identifying and mitigating potential threats. Additionally, improved mobile device management features and more comprehensive user behavior analytics would be valuable additions to meet evolving cybersecurity needs.
Ashish Kumar Rai - PeerSpot reviewer
Offers remote access control, good GUI and easy to configure
I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal. In the APM interface itself, they could add direct hyperlinks to relevant online documentation. This would provide easy access to admin guides and other resources when working within the GUI.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"iboss is among the few products providing inline filtering where no application is needed on the device."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"The iboss system is highly reliable. The false positive rates are small compared to some other systems we've experienced through other partner agencies who use competing solutions."
"Our primary use case for this product is DLP,"
"First of all, the security policies are essential. I do not have to rely solely on Active Directory for our users."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"The best key features of Harmony are stabilization, private access, and Internet access."
"It's improved the security of every single OS in the organization as well as the visibility and security capabilities."
"The monitoring and granular policies are very helpful."
"Check Point provides high-quality technical support. The support was pretty quick."
"The characteristics that I have liked the most are the ease of implementation and administration."
"Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process."
"It helps to quickly get access to the pages I need."
"While the higher cost and complexity may pose challenges for smaller companies without extensive IT resources, the value provided by Check Point's advanced capabilities and excellent 24/7 support justifies the investment. Overall, it is highly recommended that insurance firms prioritize data security and regulatory compliance, especially medium to large companies with the resources to manage and fully utilize its features."
"The most valuable feature is the virtual IP creation. It's our most frequently used feature."
"Our organization is small - a college with about 3,500 students. We use F5 BIG-IP Access Policy Manager to protect our site, especially from the Iranian attacks we faced last year. We restrict access to only inside the country."
"The load balancing features are valuable."
"In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options and policy configuration tools in the GUI. It's good and good enough to work."
"The portal access was very good."
"We have seen a return on investment from F5 BIG-IP Access Policy Manager. It provided access at a time when we didn't have it."
"The tool is reliable and easy to configure."
"F5 BIG-IP APM is relatively easy to use."
 

Cons

"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"The reporting feature needs improvement."
"I'd like to see them accelerate development on the security side, particularly around data loss prevention."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"Sometimes, obviously, there are bugs."
"Harmony lacks this ability when anything more than a vanilla access policy is used (we use layers and source user objects in our policy which make this impossible according to Check Point)."
"Sometimes downloading PDF files can be slow."
"It would be nice to have a notification sound when Perimeter81 disconnects, as I sometimes don't notice when the icon shows that it's disconnected, and I end up wasting time waiting for my browser to load a page that shows an error, usually error 404."
"If Harmony SASE supported bidirectional traffic and the UDP protocol, it would be better."
"The product needs to work on the integration of alerts with different SIEM or security solutions."
"In the future, maybe P81 can improve the network traffic balancing and redundancy."
"A Google Chrome extension would be handy instead of logging into the app."
"The main problem with Harmony Connect is that, because it's in a new category of offerings by Check Point, there's very little marketing of the product so far, and this means that many potential users don't even know this kind of solution is available. There are also few testimonials or case studies talking about people who have used the product and fell in love with it, for example."
"The main improvement needed for F5 BIG-IP Access Policy Manager (APM) is to integrate into the cloud-delivered services from F5."
"In my opinion, the GUI side needs some improvement based on my usage. Sometimes, it doesn't work as efficiently as the CLI side."
"F5 BIG-IP Access Policy Manager (APM) does not have a direction for SaaS."
"We do not have knowledgeable support teams locally."
"The price of this product can be improved."
"Cloud services are something that F5 Access Policy Manager could do better"
"If I could copy and paste objects instead of picking and configuring them from scratch each time, it would be great."
"I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal."
 

Pricing and Cost Advice

"It is probably in line with other solutions, but I do not deal with the financial side."
"The overall pricing for iboss is very competitive and transparent."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"The product is neither cheap nor expensive."
"The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"The product is reasonably priced."
"Annual licenses cost $30 to $40 each."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
"The product's pricing model accommodates diverse needs and deployment sizes."
"I rate the tool's pricing an eight out of ten."
"The product is very expensive."
"The tool is a little bit expensive."
"Recently, they have simplified the licensing"
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
9%
Government
6%
Computer Software Company
21%
Financial Services Firm
6%
Manufacturing Company
6%
Comms Service Provider
5%
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
11%
Government
11%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
Our biggest problem with their service was it did not recognize the device and filtering did not always work correctl...
What is your primary use case for iboss?
We used it for student and faculty filtering on campus.
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
What do you like most about F5 BIG-IP Access Policy Manager (APM)?
In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options ...
What is your experience regarding pricing and costs for F5 BIG-IP Access Policy Manager (APM)?
F5 products are more expensive than other solutions but are valued for their quality and reliability, akin to purchas...
What needs improvement with F5 BIG-IP Access Policy Manager (APM)?
F5 BIG-IP Access Policy Manager (APM ( /categories/application-performance-monitoring-apm-and-observability )) does n...
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
F5 Access Policy Manager
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.