Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs ReversingLabs comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony SASE (f...
Ranking in Anti-Malware Tools
7th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
59
Ranking in other categories
Secure Web Gateways (SWG) (5th), Firewalls (16th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (5th), ZTNA (4th), Secure Access Service Edge (SASE) (7th)
ReversingLabs
Ranking in Anti-Malware Tools
18th
Average Rating
9.2
Reviews Sentiment
7.1
Number of Reviews
4
Ranking in other categories
Application Security Tools (25th), Container Security (26th), Software Composition Analysis (SCA) (12th), Threat Intelligence Platforms (12th), Software Supply Chain Security (13th)
 

Mindshare comparison

As of May 2025, in the Anti-Malware Tools category, the mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 0.5%, up from 0.4% compared to the previous year. The mindshare of ReversingLabs is 0.9%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Anti-Malware Tools
 

Featured Reviews

reviewer8099174 - PeerSpot reviewer
Secure access with an intuitive design and straightforward controls
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a broader range of third-party tools would be beneficial for seamless compatibility with various existing systems. As for additional features in the next release, it would be great to see advanced threat detection and response capabilities integrated into the platform. This would further enhance security by proactively identifying and mitigating potential threats. Additionally, improved mobile device management features and more comprehensive user behavior analytics would be valuable additions to meet evolving cybersecurity needs.
Jesse Harris - PeerSpot reviewer
Comes with a large sample size and helps t stay on top of emerging threats
The solution helps to stay on top of emerging threats with easy integration with other products.  ReversingLabs has a large sample size.  The solution needs to improve integrations.  I have been using the solution for four to five years.  ReversingLabs' stability is excellent.  I rate the…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The setup is really easy...I rate the support team a ten out of ten."
"Providing access and security allows our company employees to work from home and remotely."
"The application control and granular access feature are very easy to use, intuitive, and effective."
"The features are excellent, particularly the user interface and user accessibility."
"The product’s ability to block phishing sites is valuable."
"Its software solution also ensures connectivity and protects against NSF filtering."
"It is a very stable solution."
"SD-WAN is one of the primary solutions offered by Perimeter 81."
"ReversingLabs has a large sample size."
"The automated static analysis of malware is the most valuable feature. Its detection abilities are very good. It hits all of the different platforms out there, platforms that see the items in the wild."
"As far as static analysis information is concerned, we use most of the information that is available in order to determine whether or not we might be dealing with a malware variant. This includes information that is related to Java rules. This is also related to malware families indicated or specific malicious software variants that are labeled by name."
"It offers reports on a great many more file types than the other analysis solutions we have. It can give us a more in-depth analysis and better reporting on a larger number of file types. It also gives us a more comprehensive score on a number of things as well, and that's why we're using it as a front-end filter. It gives us more information... It's valuable because of its depth of information, as well as the breadth it gives us. There aren't a lot of tools that cover all of the different file types."
"As far as the malware repository is concerned, it's extensive. It's a good source for finding samples, where we are unable to find them on other channels or by leveraging other sources."
 

Cons

"The solution requires you to buy a minimum of 50 licenses and that is not practical."
"Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."
"Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."
"In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity."
"The connectivity issue can be improved as at times it lags when connecting to their server."
"One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."
"One of our challenges is ensuring the security of our cloud-based operations."
"While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures."
"We would really like further integration with our threat intelligence platform, which is called ThreatConnect. We would also really like further integrations with an endpoint protection product we use called Tanium. The reason I mentioned both of these is that ReversingLabs claims to have extensive integrations with both of them, but they did not work for us."
"While the company is very helpful, it would be very much appreciated to have extensive proof of concept scripts for the different APIs available, though not for all the APIs that we have purchased. Respective scripts are available, but those scripts which are available are typically not of very high quality."
"The solution needs to improve integrations."
"I would like to see if we could do a little bit more of bulk uploading of hash sets. Right now, I can only do them individually."
"The product support could be better at times. Sometimes, the resources that they provide could be of higher quality."
 

Pricing and Cost Advice

"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"Regarding pricing, I can say that the more the number of users, the less they have to pay."
"The product's pricing model accommodates diverse needs and deployment sizes."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
"Annual licenses cost $30 to $40 each."
"The cost of the solution's licenses depends on the particular use cases."
"Overall I am very happy with the solution’s flexibility and pricing."
"Currently, the license number of lookups that we purchased has not been reached yet, because the integration has only recently been completed. However, our usage is expected and planned to increase over the next couple of months."
"We have a yearly contract based on the number of queries and malicious programs which can be processed."
report
Use our free recommendation engine to learn which Anti-Malware Tools solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Financial Services Firm
6%
Manufacturing Company
6%
Comms Service Provider
5%
Computer Software Company
18%
Financial Services Firm
17%
Insurance Company
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations: * Evaluate your needs * Understand pricing models * Request a quote * Compare ...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options wit...
 

Also Known As

Check Point Quantum SASE
ReversingLabs Titanium, ReversingLabs secure.software
 

Overview

 

Sample Customers

Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Financial services, healthcare, government, manufacturing, oil & gas, telecommunications, information technology
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. ReversingLabs and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.