Check Point Harmony SASE and Palo Alto Networks PA-Series are two leading network security solutions. Users find that Palo Alto Networks PA-Series offers superior features that justify its higher price.
Features: Check Point Harmony SASE is praised for ease of use, comprehensive integration capabilities, and overall user experience. Palo Alto Networks PA-Series receives high marks for advanced threat detection, customizable security policies, and robust security features.
Room for Improvement: Check Point Harmony SASE users often request enhanced reporting features, better scalability options, and more robust analytics. Palo Alto Networks PA-Series users mention the need for a more intuitive management system, reduced complexity, and improved user interface.
Ease of Deployment and Customer Service: Check Point Harmony SASE is generally praised for its straightforward deployment process and responsive customer service. Users of Palo Alto Networks PA-Series appreciate the product’s thorough documentation but report a steeper learning curve and varying levels of customer support.
Pricing and ROI: Check Point Harmony SASE is often highlighted for its cost-effectiveness and positive ROI. Conversely, Palo Alto Networks PA-Series, though more expensive, is seen as a valuable long-term investment due to its advanced security features.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
Check Point Harmony SASE (formerly Perimeter 81) blocked access to those URLs at the network level before users could click through.
We are saving 40% of our time, which is good.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
I would rate support 10 out of 10.
After updating firmware, data utilization was visible for a few days before collapsing again.
Initially, it took one or two hours to get a Palo Alto engineer, which is quite slow.
I am happy with the technical support from Palo Alto.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
The cloud-native model ensures we are not tied to any specific location or hardware, which has been a great game changer in terms of agility.
The scalability of Check Point Harmony SASE (formerly Perimeter 81) is good, and I can add more users and devices easily as my organization grows.
I would rate it nine out of ten for scalability.
The solution can handle more than ten thousand users in my organization.
There are no restrictions in scalability.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
The solution is very stable.
Even the support team does not have a proper solution for this issue.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
The constant daily revisions necessitate meticulous identification of the relevant documents to prevent the use of outdated information that could jeopardize our environment.
While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security.
An example of when the support cycle took longer than expected was when I had a ticket open for nearly six to seven months regarding a simple issue.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
One area for improvement is integration with third-party identity providers.
The interface of Palo Alto Networks PA-Series should be made much more user-friendly.
For the next release of the Palo Alto Networks PA-Series firewall, I would like to see logs monitoring included.
FortiGate is priced lower than Palo Alto.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It is about 20% cheaper.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
My experience with pricing, setup cost, and licensing for Check Point Harmony SASE (formerly Perimeter 81) is that it is a rental service, but I find it satisfactory.
The firewall is expensive for every company, but the cost is worth it to ensure maximum security.
The price of Palo Alto Networks PA-Series is expensive.
Regarding value for money, we brought this Palo Alto Networks PA-Series firewall last month, and we have taken up to 3 year renewals.
In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.
FortiGate has helped reduce the risk of cyberattacks that might disrupt our client's production.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
The firewall management is the most valuable feature for me.
The Zero Trust Network Access (ZTNA) feature is a major highlight as it gives users seamless and secure access to internal resources without requiring a full-blown VPN, which improves both security and user experience.
The best key features of Harmony are stabilization, private access, and Internet access.
The most effective features of the solution are its Magic Quadrant positioning, making it a leading firewall on perimeter areas and internet edges.
The most valuable feature of Palo Alto Networks PA-Series is that it is highly customizable.
The best features of the Palo Alto Networks PA-Series firewall include Global protector VPN workings.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Perimeter 81 Benefits:
Perimeter 81 Features:
Reviews from Real Users
PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".
Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".
Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
Palo Alto Networks PA-Series is essential for firewall implementation, perimeter defense, securing infrastructure boundaries, web filtering, VPN, and threat prevention. Organizations deploy it for secure cloud connections, internet security, and managing network devices.
Companies trust Palo Alto Networks PA-Series to protect corporate networks from external threats, control traffic between networks, and meet regulatory compliance. Integrating well with applications, it offers centralized management and advanced security features such as IDS, IPS, and GlobalProtect. It ensures stable performance, application-based policy enforcement, and decryption of SSL traffic while providing efficient resource usage and comprehensive logging.
What are the key features?Palo Alto Networks PA-Series is implemented across industries like healthcare, finance, retail, and manufacturing. In healthcare, it ensures patient data protection and compliance with HIPAA. Financial institutions utilize it to secure transactions and meet regulatory standards. Retailers benefit from protecting customer information and securing online payments. Manufacturing companies deploy it to safeguard intellectual property and control plant floor operations.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.