

Intercept X Endpoint and Check Point Harmony SASE are two leading competitors in the cybersecurity market. Intercept X has an advantage with its ease of use and machine learning features, while Harmony SASE excels in integration options and cloud-native capabilities.
Features: Intercept X Endpoint offers robust machine learning capabilities, synchronized security features, and centralized management, making it well-suited for effective threat detection and real-time monitoring. Its anti-ransomware capabilities further enhance its appeal. Check Point Harmony SASE presents a comprehensive security solution with Zero Trust Network Access, advanced threat prevention, and cloud and endpoint protection, providing a valuable package for cloud-native security needs.
Room for Improvement: Intercept X Endpoint could benefit from improved real-time event management and better integration with third-party solutions. Some users have noted performance impacts on older machines. Check Point Harmony SASE should work on improving its documentation and resource management, as well as integration with existing network environments, to optimize system usage.
Ease of Deployment and Customer Service: Intercept X is praised for its deployment flexibility in various cloud environments, although on-premises setups can be complex. Customer service is generally responsive but occasionally slow. Check Point Harmony SASE offers an effective cloud-centric deployment, with challenges primarily in on-premises integration. Its support is comprehensive, despite some feedback on response times and quality needing enhancement.
Pricing and ROI: Intercept X pricing is competitive, varying with features and user numbers, positively influencing ROI through cost-effectiveness and threat prevention. It offers annual or multi-year licensing. Check Point Harmony SASE is seen as slightly costly but worth it due to its extensive features, providing substantial security benefits. Both solutions are recognized for delivering significant value in their respective offerings.
Check Point Harmony SASE (formerly Perimeter 81) blocked access to those URLs at the network level before users could click through.
We are saving 40% of our time, which is good.
I would rate support 10 out of 10.
People working really hard, listening to every issue and request, and replying within hours.
Technical support from Sophos is rated as nine out of ten, which represents high quality.
There are issues with onboarding technical engineers to resolve problems, which causes delays.
When you are in real deep trouble, you just want to get out of it; you don't need so many jargons.
The cloud-native model ensures we are not tied to any specific location or hardware, which has been a great game changer in terms of agility.
I would rate it nine out of ten for scalability.
Check Point Harmony SASE's scalability is good; it can handle growth easily, allowing me to easily add another region and gateway to have more people join in.
The tool's scalability is good, and I would rate it an eight out of ten.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
Check Point Harmony SASE is stable most of the time, but there are still some issues that are hard to troubleshoot.
In terms of stability, I would rate Intercept X Endpoint an eight out of ten.
To improve Intercept X Endpoint performance, upgrades in RAM and other system features are needed.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
One area for improvement is integration with third-party identity providers.
The product is lacking features that other competitors have, making it quite challenging to migrate customers to this solution because it feels very much unfinished.
There should be a profile where I can see what files Sophos is scanning.
Intercept X Endpoint's anti-ransomware capabilities failed us during a bad attack, and just because of our own backup policies, we could restore our normal operations.
Intercept X Endpoint sometimes slows down machines due to high CPU utilization and significant RAM consumption during scanning.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
The cost is a bit expensive for most users.
It is a bit expensive.
It is quite costly when measuring Intercept X Endpoint's protective capabilities against zero-day attacks.
The pricing of Intercept X Endpoint is a bit high.
I would describe it as economical, but not much cheaper than other solutions.
The firewall management is the most valuable feature for me.
The Zero Trust Network Access (ZTNA) feature is a major highlight as it gives users seamless and secure access to internal resources without requiring a full-blown VPN, which improves both security and user experience.
The Zero Trust and segmentation have helped my team and our customers significantly because we are able to protect every scope and allow the work-from-home users to access internal resources while passing through a threat prevention gateway, ensuring that everything is safe.
The stronger the AI/ML in an endpoint, the better the protection against unknown threats.
Intercept X Endpoint is the only endpoint security product I know that provides content filtering and application controls.
Intercept X Endpoint has been stable, and I appreciate the centralized management and the reporting feature.
| Product | Market Share (%) |
|---|---|
| Check Point Harmony SASE (formerly Perimeter 81) | 5.5% |
| Intercept X Endpoint | 1.2% |
| Other | 93.3% |

| Company Size | Count |
|---|---|
| Small Business | 53 |
| Midsize Enterprise | 19 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 73 |
| Midsize Enterprise | 22 |
| Large Enterprise | 22 |
Check Point Harmony SASE, formerly Perimeter 81, offers robust security features like split tunneling, MFA, and Zero Trust Network Access focused on secure remote access and optimized connectivity for remote teams.
Check Point Harmony SASE delivers advanced security through a user-friendly interface, efficient VPN connections, and a centralized management console. It enhances security with real-time threat intelligence from ThreatCloud and traffic management via built-in optimization. Firewall as a Service and Secure Web Gateway safeguard against unauthorized access and phishing. While users seek enhanced networking customizations and better integration with identity providers, there's an emphasis on improving reporting, real-time analytics, and policy management. Requests also include a Chrome extension, traffic balancing, and simplified configuration to address some resource-intensive aspects.
What are the key features of Check Point Harmony SASE?
How can organizations benefit from using Check Point Harmony SASE?
Check Point Harmony SASE is used across industries for secure remote access and connectivity, protecting sensitive data, and managing access to corporate resources. It is ideal for those with hybrid cloud models and requires comprehensive security measures combined with existing IT infrastructures to meet specific industry demands.
Sophos Intercept X Endpoint is a comprehensive cybersecurity solution that combines the power of artificial intelligence (AI) with Sophos' deep expertise in cybersecurity to provide unmatched protection against sophisticated cyber threats, including ransomware, malware, exploits, and zero-day vulnerabilities. Sophos Intercept X Endpoint stands out for its innovative approach to endpoint security, leveraging advanced technologies and expert services to provide comprehensive protection. Its focus on prevention, detection, and response, combined with ease of use and scalability, makes it a preferred choice for organizations looking to strengthen their cybersecurity defenses.
Harness the Power of a Deep Learning Neural Network
Achieve unmatched endpoint threat prevention. Intercept X uses deep learning, an advanced form of machine learning to detect both known and unknown malware without relying on signatures.
Deep learning makes Intercept X smarter, more scalable, and more effective against never-seen-before threats. Intercept X leverages deep learning to outperform endpoint security solutions that use traditional machine learning or signature-based detection alone.
Stop Ransomware in Its Tracks
Block ransomware attacks before they wreak havoc on your organization. Intercept X with XDR includes anti-ransomware technology that detects malicious encryption processes and shuts them down before they can spread across your network. It prevents both file-based and master boot record ransomware.
Any files that were encrypted are rolled back to a safe state, meaning your employees can continue working uninterrupted, with minimal impact to business continuity. You get detailed post-cleanup information, so you can see where the threat got in, what it touched, and when it was blocked.
Intelligent Endpoint Detection and Response (EDR)
The first EDR designed for security analysts and IT administrators
Intercept X Advanced with EDR allows you to ask any question about what has happened in the past, and what is happening now on your endpoints. Hunt threats to detect active adversaries, or leverage for IT operations to maintain IT security hygiene. When an issue is found remotely respond with precision. By starting with the strongest protection, Intercept X stops breaches before they start. It cuts down the number of items to investigate and saves you time.
Extended Detection and Response (XDR)
Intercept X Advanced with XDR is the industry’s only XDR solution that synchronizes native endpoint, server, firewall, email, cloud and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation and response for both dedicated SOC teams and IT admins.
Managed Detection and Response
We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.