We performed a comparison between Check Point Quantum SASE and Zscaler Zero Trust Exchange based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Secure Access Service Edge (SASE)."On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The solution is stable."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"Our investment in quality hardware has proven to provide a better customer experience. They heavily rely on Check Point Firewall and Check Point SaaS Connect to safeguard their networks from external threats and attacks."
"The monitoring and granular policies are very helpful."
"The scalability is good, and I'd give it an eight out of ten."
"The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support."
"The product has a reasonably high pricing."
"The tool is easy to use and set up."
"The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment."
"One of the most valuable features found using Harmony is being able to monitor in a simple and orderly way."
"It is easy to use."
"The VPN is great for the stability on offer and for the cloud updates and insights you can get."
"The most valuable features of this solution are the CASB solutions, which is protecting their Office 365."
"The ZPA is a unique feature which offers VPN along with all the additional security needed."
"Zscaler Private Access is a platform that eliminates the complexity of VPN configuration."
"The most valuable features of Zscaler Private Access are its ability to integrate with multiple IDPs and application segmentation."
"Sandboxing, DLP, and SSL inspection engine are the most valuable features of Zscaler SASE."
"The product's most valuable features are cloud-based services and secure internet access. We don't have to set up any physical appliances."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"Harmony lacks this ability when anything more than a vanilla access policy is used (we use layers and source user objects in our policy which make this impossible according to Check Point)."
"Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us."
"When it comes to firewall configuration, sometimes we encounter issues."
"Automation and scalability are areas where the solution lacks and needs to improve."
"They could improve on the available public documentation."
"Sometimes, the product is very slow."
"The solution requires you to buy a minimum of 50 licenses and that is not practical."
"The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."
"The granularity in blocking is not sufficient, as new domains are automatically blocked for 30 days without further information."
"We would like to extend the SASE applications for Zscaler."
"We'd like to have two-factor authentication that is quite simple."
"It's an expensive solution."
"The DX layer could be better if it had improved visibility."
"The menu for the ZIA portal could be organized a little bit differently. The most-used modules should be at the top of the menus, not somewhere near the bottom, some of them are not organized well in my opinion."
"To enhance their offering, it is advisable for them to focus on strengthening the foundation of their architecture. Additionally, they should consider integrating a broader range of services that go beyond what managed service providers typically offer independently."
"It has massive room for improvement. The Zscaler product itself is okay, but it doesn't give enough granularity for us as an organization to stipulate rules or processes, especially for data-driven services. For instance, we can stick on SSL inspection, but it's just a click box. It doesn't allow us to go any further into the detail of the SSL inspection. We also can't pull it out without having an additional logging server. It just doesn't give us enough granularity. They should give us more control over the interfaces because it is all backend. They weren't very open to discussing their backend architecture with us in terms of their own data centers. They can maybe a little bit more open about what components are there and how the backend infrastructure works alongside Zscaler. Its licensing can be better. Some of the additional licensing costs are quite high, and they should have certain features ready and available as a baseline rather than having to purchase additional licenses for it. Their support should also be improved. I initially had a consultant from Zscaler for its deployment, but the support that I had throughout the deployment of the project wasn't the best."
Check Point Quantum SASE is ranked 8th in Secure Access Service Edge (SASE) with 30 reviews while Zscaler Zero Trust Exchange is ranked 3rd in Secure Access Service Edge (SASE) with 34 reviews. Check Point Quantum SASE is rated 8.4, while Zscaler Zero Trust Exchange is rated 8.4. The top reviewer of Check Point Quantum SASE writes "Very agile with a granular level of control over users ". On the other hand, the top reviewer of Zscaler Zero Trust Exchange writes "Allows for strict access control, granting access to specific applications at a URL level rather than at the physical IP level". Check Point Quantum SASE is most compared with Prisma Access by Palo Alto Networks, Perimeter 81, Cisco Umbrella and Netskope , whereas Zscaler Zero Trust Exchange is most compared with Prisma Access by Palo Alto Networks, Cato SASE Cloud Platform, Axis Security, Cloudflare Access and Cisco AnyConnect Secure Mobility Client.
See our list of best Secure Access Service Edge (SASE) vendors.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.