We performed a comparison between Check Point Quantum SASE and Perimeter 81 based on real PeerSpot user reviews.
Find out in this report how the two Secure Access Service Edge (SASE) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The solution is stable."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"Check Point provides high-quality technical support. The support was pretty quick."
"Our investment in quality hardware has proven to provide a better customer experience. They heavily rely on Check Point Firewall and Check Point SaaS Connect to safeguard their networks from external threats and attacks."
"The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele."
"The product’s ability to block phishing sites is valuable."
"The product's initial setup phase is very simple."
"Protection against threats like ransomware is very effective."
"The scalability is good, and I'd give it an eight out of ten."
"HTTPS decryption is a valuable service and not always found in cloud-based secure web gateways."
"The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
"The setup is really easy...I rate the support team a ten out of ten."
"SD-WAN is one of the primary solutions offered by Perimeter 81."
"It helps to quickly get access to the pages I need."
"Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.)."
"It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go."
"Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution."
"Perimeter 81 provides a very secure and non-disruptive experience."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity."
"Automation and scalability are areas where the solution lacks and needs to improve."
"While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures."
"Harmony lacks this ability when anything more than a vanilla access policy is used (we use layers and source user objects in our policy which make this impossible according to Check Point)."
"My customers want more remote functionality. They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this."
"The support is not very good."
"More report and alert options would be useful."
"There is an issue when installing the Check Point client."
"A Google Chrome extension would be handy instead of logging into the app."
"I have found that the log-in/out process takes quite some time."
"The overall UI could be improved and updated to bring a simpler feel to the application."
"The platform still lacks relevant dashboards and the ability to customize them based on our needs."
"I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful."
"If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on."
"In the future, maybe P81 can improve the network traffic balancing and redundancy."
"One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."
Check Point Quantum SASE is ranked 7th in Secure Access Service Edge (SASE) with 30 reviews while Perimeter 81 is ranked 6th in Secure Access Service Edge (SASE) with 22 reviews. Check Point Quantum SASE is rated 8.4, while Perimeter 81 is rated 9.2. The top reviewer of Check Point Quantum SASE writes "Very agile with a granular level of control over users ". On the other hand, the top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". Check Point Quantum SASE is most compared with Prisma Access by Palo Alto Networks, Cisco Umbrella, Netskope and Zscaler Zero Trust Exchange, whereas Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Fortinet FortiClient. See our Check Point Quantum SASE vs. Perimeter 81 report.
See our list of best Secure Access Service Edge (SASE) vendors.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.