Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Palo Alto Networks K2-Series comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiGate
Sponsored
Ranking in Firewalls
1st
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
575
Ranking in other categories
Secure Web Gateways (SWG) (2nd), Intrusion Detection and Prevention Software (IDPS) (1st), Software Defined WAN (SD-WAN) Solutions (1st), WAN Edge (1st), ZTNA (2nd), Unified Threat Management (UTM) (1st)
Check Point Harmony SASE (f...
Ranking in Firewalls
16th
Average Rating
8.8
Reviews Sentiment
7.1
Number of Reviews
62
Ranking in other categories
Secure Web Gateways (SWG) (7th), Anti-Malware Tools (6th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (4th), ZTNA (3rd), Secure Access Service Edge (SASE) (5th)
Palo Alto Networks K2-Series
Ranking in Firewalls
36th
Average Rating
8.4
Reviews Sentiment
7.7
Number of Reviews
34
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Firewalls category, the mindshare of Fortinet FortiGate is 20.4%, up from 19.1% compared to the previous year. The mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 0.2%, up from 0.1% compared to the previous year. The mindshare of Palo Alto Networks K2-Series is 0.1%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Firewalls Market Share Distribution
ProductMarket Share (%)
Fortinet FortiGate20.4%
Check Point Harmony SASE (formerly Perimeter 81)0.2%
Palo Alto Networks K2-Series0.1%
Other79.3%
Firewalls
 

Featured Reviews

Vasu Gala - PeerSpot reviewer
A stable solution with an intuitive interface and quick customer service
I have been working with Fortinet FortiGate, WatchGuard, Sophos, and SonicWall. I'm not as comfortable with SonicWall because of their UI and limitations. I prefer Fortinet above all other options. When it comes to configuration, I am confident in my ability to handle various tasks, including creating policies such as firewall rules, web policies, and application policies. Additionally, I can configure VPNs and implement load balancing, among other tasks. Overall, I feel much more comfortable working with Fortinet. Fortinet has made significant improvements by integrating AI with firewalls for threat analysis and prevention. In the past 2-3 years, they have launched FortiSASE and SIEM, and they also provide SOC services. Both Palo Alto and Fortinet FortiGate are excellent. While Fortinet FortiGate comes at higher prices, the functionality and support justify the cost. They promptly resolve firmware issues and inform all support providers about configuration changes.
Nasseer Qureshi - PeerSpot reviewer
Delivers seamless and secure remote access while enhancing security posture
Check Point Harmony SASE (formerly Perimeter 81) offers strong features, but there are areas that could be improved. One area for improvement is integration with third-party identity providers. It works with standard SAML and SSO, but we would prefer deeper integrations with solutions such as Ping for more advanced identity-based policies. Additionally, a mobile-specific client or lightweight agent would be helpful for securing access from smartphones, especially in BYOD environments. We would appreciate more granular reporting and analytics, including better drill-down capabilities to investigate specific users or app activity. The logs are comprehensive, but filtering them can sometimes feel messy. The user interface on the management portal could be more intuitive, especially when managing multiple sites or remote offices. Some of the policy configuration steps are nested and could be streamlined.
Krishnakumar M - PeerSpot reviewer
One of the best tools for the prevention of evasive threats
There is a feature called granular application controls, which I liked. Instead of relying on ports and IP addresses, they use AMP ID. This kind of solution is very good. Another valuable feature is the prevention of evasive threats, which is one of the best tools I've encountered. SSL decryption and app ID-based SSL decryption are also impressive, along with the integration with user ID. Identity-based policies ensuring only authorized users can access specific resources are excellent features. Normally, there is something called SIM or SCIM in IDA IDM, but this feature is provided on the box, which is exemplary.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The multi-threat protection feature helps us secure our organization."
"The next-generation firewall is great."
"This solution has solid UTM features combined with a nice GUI."
"The most valuable feature is the web filter."
"We purchased Fortinet because of the pricing, its functionality, because it met our requirements, and the total cost of ownership over five years was quite reasonable. In the market, Fortinet is rated quite well."
"The most valuable feature is the SSL VPN, as it allows us to connect and it separates this product from other firewalls."
"My clients appreciate it for its features. It is easy to install and manage, and it offers all-around protection, including web filtering, content filtering, IPS, and IDS."
"I find the ease of configuring specific policies to be the most valuable feature of the Fortinet FortiGate firewall."
"Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.)."
"One of the most valuable features found using Harmony is being able to monitor in a simple and orderly way."
"The monitoring and granular policies are very helpful."
"The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment."
"Customer service is excellent."
"The product’s ability to block phishing sites is valuable."
"Overall, the unified agent covers endpoints as well as prevents web browser attacks."
"The product has a reasonably high pricing."
"This firewall is very good for our customers because they don't have to write their own rules for adding an application."
"It is a stable solution."
"We've found the solution offers us good stability."
"Mainly, it is very easy to understand, and the logs are very good."
"I have found the threat profile feature valuable."
"The most valuable features are the virtualization of the firewall and the antivirus."
"The most valuable feature of Palo Alto Networks K2-Series is the performance which is above their competitors. The throughput they have delivered is good. When we used other solutions they failed the deployment when we were using different rules. They have a theory perform performance light and performance degradation. However, Palo Alto Networks K2-Series never fails in that scenario."
"As long as the solution is kept updated, it's pretty stable."
 

Cons

"The initial setup and configuration are not intuitive and require training."
"It is very expensive, and their support is not very good. I hope that their technical support will be better in the future."
"The UTM filtering needs improvement."
"The scalability could be better."
"The main thing they have to improve in Fortinet FortiGate is the technical support; the rest of the features are good enough. We can handle them, but sometimes you really need support, and in that case, we are not getting it at the proper time."
"At the moment, if you don't integrate any third-party solution with a simple Fortinet FortiGate box, the box would not function as expected for superb protection."
"I would like the deployment and integration of this product to be easier. We should be able to deploy the features more easily and have different types of access. It should be easier to integrate. Currently, we need to develop APIs to use this interface."
"WAN load-balancing could be a lot better at detecting when a link is poor or inconsistent, and not just flat out dead."
"The main problem with Harmony Connect is that, because it's in a new category of offerings by Check Point, there's very little marketing of the product so far, and this means that many potential users don't even know this kind of solution is available. There are also few testimonials or case studies talking about people who have used the product and fell in love with it, for example."
"Its initial setup process is complex for a hybrid environment."
"The complex initial setup phase of the product is an area that can be improved"
"I would suggest adding more networking and security features that allow more customization within their platform."
"Check Point Harmony SASE (formerly Perimeter 81) could be improved as there's complexity during initial configuration, and there's a learning curve."
"In the future, maybe P81 can improve the network traffic balancing and redundancy."
"My customers want more remote functionality. They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this."
"Although the interface is user-friendly, further simplification and customization options tailored for non-technical users would benefit smaller firms without dedicated IT teams. Intuitive dashboards and guided setups can help in reducing the learning curve."
"The product should get frequent updates allowing us to add new signatures."
"Palo Alto has many other products. It would be nice for these products to be centralized under one tool"
"I would like to see the threat intelligence capability integrated with other vendors such as Cisco and Forcepoint."
"It would be really helpful to have dashboards that provide information on IOC blockings such as where and how many. It will also be good to know how many hashing files have been reported. It would also be nice to have easy access to this information. Otherwise, it's a painful, manual task."
"The scalability of Palo Alto Networks K2-Series is good. It is good for larger environments over smaller ones."
"The password function of the solution could be improved. Additionally, some of the processes take too long to complete."
"It would be nice if it could easily be integrated with Elasticsearch or Nagios."
"The technical support, and how they provide it to the client, needs to be improved."
 

Pricing and Cost Advice

"Compared to other firewall products, it's a little cheaper in terms of pricing."
"The price of Fortinet FortiGate when compared to other solutions is high. However, my knowledge of the price is from third parties and I am not sure how accurate it is. I typically work in the technical area of my organization."
"It is very cost-effective. You get features similar to other firewalls, such as Palo Alto, but at a lower price."
"Fortinet has one or two license types, and the VPN numbers are only limited by the hardware chassis make."
"The price is really low. It's cheap in comparison to the cost of Cisco or CheckPoint, for example."
"Fortinet is the least expensive solution."
"Its price is good."
"The price of the license and warranty can be better because it is very expensive."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
"Annual licenses cost $30 to $40 each."
"The cost of the solution's licenses depends on the particular use cases."
"The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users."
"The product is neither cheap nor expensive."
"Overall I am very happy with the solution’s flexibility and pricing."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"Products by the leader in the field are justifiably a bit more expensive compared to other vendors."
"It would be nice if they lowered their prices for small businesses."
"This is an expensive solution, although you will get value for the price."
"Palo Alto Networks K2-Series is an expensive solution, the price could be reduced. They are more expensive than some of their competitors."
"The overall price of Palo Alto Networks K2-Series could be reduced."
"The price of the solution is expensive."
"The pricing is expensive."
"It is an expensive solution."
report
Use our free recommendation engine to learn which Firewalls solutions are best for your needs.
869,095 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Comms Service Provider
9%
Manufacturing Company
8%
Financial Services Firm
6%
Computer Software Company
15%
Financial Services Firm
6%
Government
6%
Comms Service Provider
6%
Performing Arts
23%
Computer Software Company
16%
Manufacturing Company
9%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business350
Midsize Enterprise130
Large Enterprise187
By reviewers
Company SizeCount
Small Business53
Midsize Enterprise18
Large Enterprise15
By reviewers
Company SizeCount
Small Business13
Midsize Enterprise8
Large Enterprise13
 

Questions from the Community

Which is the better NGFW: Fortinet Fortigate or Cisco Firepower?
When you compare these firewalls you can identify them with different features, advantages, practices and usage a...
What is the biggest difference between Sophos XG and FortiGate?
From my experience regarding both the Sophos and FortiGate firewalls, I personally would rather use FortiGate. I know...
What are the biggest technical differences between Sophos UTM and Fortinet FortiGate?
As a solution, Sophos UTM offers a lot of functionality, it scales well, and the stability and performance are quite ...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
Features comparison between Palo Alto and Fortinet firewalls
In the best tradition of these questions, Feature-wise both are quite similar, but each has things it's better at, it...
What is your experience regarding pricing and costs for Palo Alto Networks K2-Series?
The pricing for the Palo Alto Networks K2-Series solution is affordable and there are no complaints about the licensing.
What needs improvement with Palo Alto Networks K2-Series?
The graphical user interface is a little complex and difficult to manage. L1 engineers cannot work on the Palo Alto N...
 

Also Known As

No data available
Check Point Quantum SASE
No data available
 

Overview

 

Sample Customers

Amazon Web Services, Microsoft, IBM, Cisco, Dell, HP, Oracle, Verizon, AT&T, T-Mobile, Sprint, Vodafone, Orange, BT Group, Telstra, Deutsche Telekom, Comcast, Time Warner Cable, CenturyLink, NTT Communications, Tata Communications, SoftBank, China Mobile, Singtel, Telus, Rogers Communications, Bell Canada, Telkom Indonesia, Telkom South Africa, Telmex, Telia Company, Telkom Kenya
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
State of North Dakota, SEGA, Alameda County Office of Education, Temple University, VERGE, CAME
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Palo Alto Networks K2-Series and other solutions. Updated: September 2025.
869,095 professionals have used our research since 2012.