Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Safe-T Secure Application Access comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony SASE (f...
Ranking in Enterprise Infrastructure VPN
7th
Ranking in ZTNA
2nd
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
61
Ranking in other categories
Secure Web Gateways (SWG) (7th), Firewalls (15th), Anti-Malware Tools (6th), ZTNA as a Service (4th), Secure Access Service Edge (SASE) (6th)
Safe-T Secure Application A...
Ranking in Enterprise Infrastructure VPN
44th
Ranking in ZTNA
21st
Average Rating
7.8
Reviews Sentiment
7.7
Number of Reviews
8
Ranking in other categories
Access Management (27th)
 

Mindshare comparison

As of July 2025, in the Enterprise Infrastructure VPN category, the mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 2.2%, up from 2.0% compared to the previous year. The mindshare of Safe-T Secure Application Access is 0.3%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Infrastructure VPN
 

Featured Reviews

Nasseer Qureshi - PeerSpot reviewer
Delivers seamless and secure remote access while enhancing security posture
Check Point Harmony SASE (formerly Perimeter 81) offers strong features, but there are areas that could be improved. One area for improvement is integration with third-party identity providers. It works with standard SAML and SSO, but we would prefer deeper integrations with solutions such as Ping for more advanced identity-based policies. Additionally, a mobile-specific client or lightweight agent would be helpful for securing access from smartphones, especially in BYOD environments. We would appreciate more granular reporting and analytics, including better drill-down capabilities to investigate specific users or app activity. The logs are comprehensive, but filtering them can sometimes feel messy. The user interface on the management portal could be more intuitive, especially when managing multiple sites or remote offices. Some of the policy configuration steps are nested and could be streamlined.
it_user787671 - PeerSpot reviewer
Needs to be easier to configure and to display logs more simply
We use only it for scanning files for viruses. That's the only feature we use in this product It needs to be easier to configure, it should be something that's working well with other sources. It should be something that allows me to see the logs simply. One to three years. Sometimes it doesn't…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution offers ATP features and management features."
"Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process."
"While the higher cost and complexity may pose challenges for smaller companies without extensive IT resources, the value provided by Check Point's advanced capabilities and excellent 24/7 support justifies the investment. Overall, it is highly recommended that insurance firms prioritize data security and regulatory compliance, especially medium to large companies with the resources to manage and fully utilize its features."
"The installation is very easy."
"The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
"The scalability is good, and I'd give it an eight out of ten."
"The setup is really easy...I rate the support team a ten out of ten."
"The Check Point portfolio showcases very strong products."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"Safe-T is very good for users because it has plug-in for Outlook."
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
 

Cons

"There is a very small amount of downtime."
"Sometimes downloading PDF files can be slow."
"What would be useful would be a notification/warning that a session is due to timeout after exceeding the default connection limit."
"The connectivity issue can be improved as at times it lags when connecting to their server."
"They should work towards the WAN intergration."
"Check Point Harmony SASE (formerly Perimeter 81) can be improved in several areas. I encounter many bugs that prevent me from seeing daily, monthly, and weekly data utilization, and despite updating to the latest firmware, I still experience issues."
"Harmony lacks this ability when anything more than a vanilla access policy is used (we use layers and source user objects in our policy which make this impossible according to Check Point)."
"One of our challenges is ensuring the security of our cloud-based operations."
"The Outlook agent is not working well for installing it in the entire office."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
 

Pricing and Cost Advice

"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"Annual licenses cost $30 to $40 each."
"The product is reasonably priced."
"The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users."
"The cost of the solution's licenses depends on the particular use cases."
"The product is neither cheap nor expensive."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
Information not available
report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
864,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
7%
Manufacturing Company
6%
Government
5%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations: * Evaluate your needs * Understand pricing models * Request a quote * Compare ...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options wit...
Ask a question
Earn 20 points
 

Also Known As

Check Point Quantum SASE
Safe-T SDA, Safe-T, Safe-T Software-Defined Access
 

Overview

 

Sample Customers

Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Safe-T Secure Application Access and other solutions. Updated: July 2025.
864,053 professionals have used our research since 2012.