Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Lookout comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
6th
Ranking in ZTNA as a Service
10th
Ranking in Secure Access Service Edge (SASE)
9th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th)
Check Point Harmony SASE (f...
Ranking in Secure Web Gateways (SWG)
7th
Ranking in ZTNA as a Service
4th
Ranking in Secure Access Service Edge (SASE)
6th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
60
Ranking in other categories
Firewalls (15th), Anti-Malware Tools (6th), Enterprise Infrastructure VPN (7th), ZTNA (2nd)
Lookout
Ranking in Secure Web Gateways (SWG)
26th
Ranking in ZTNA as a Service
19th
Ranking in Secure Access Service Edge (SASE)
21st
Average Rating
7.2
Reviews Sentiment
7.1
Number of Reviews
6
Ranking in other categories
Mobile Data Protection (3rd), Cloud Access Security Brokers (CASB) (15th), Threat Intelligence Platforms (23rd), Endpoint Detection and Response (EDR) (44th), Mobile Threat Defense (2nd), ZTNA (15th)
 

Mindshare comparison

As of July 2025, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 2.1%, up from 1.7% compared to the previous year. The mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 2.2%, up from 2.2% compared to the previous year. The mindshare of Lookout is 0.7%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
Nasseer Qureshi - PeerSpot reviewer
Delivers seamless and secure remote access while enhancing security posture
Check Point Harmony SASE (formerly Perimeter 81) offers strong features, but there are areas that could be improved. One area for improvement is integration with third-party identity providers. It works with standard SAML and SSO, but we would prefer deeper integrations with solutions such as Ping for more advanced identity-based policies. Additionally, a mobile-specific client or lightweight agent would be helpful for securing access from smartphones, especially in BYOD environments. We would appreciate more granular reporting and analytics, including better drill-down capabilities to investigate specific users or app activity. The logs are comprehensive, but filtering them can sometimes feel messy. The user interface on the management portal could be more intuitive, especially when managing multiple sites or remote offices. Some of the policy configuration steps are nested and could be streamlined.
DB
Enhanced mobile security with visibility into app and website usage, but installation challenges remain
We use Lookout for mobile devices, such as phones It has reduced our risk around mobile devices. I like the security features and being able to see what apps and websites people are using. There is nothing we have come across that we've desired. We have been using Lookout for one year. The…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"First of all, the security policies are essential. I do not have to rely solely on Active Directory for our users."
"We chose iboss for both zero trust and proxy (SWG) because their SWG was superior."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"I would definitely recommend iboss for web filtering purposes to other organizations or individuals."
"Our primary use case for this product is DLP,"
"I would rate the technical support of iboss a solid 10 without a shadow of a doubt."
"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"iboss is easy to use despite its complexity. Multiple engineers manage it, but it's significantly more straightforward to administer than traditional VPNs and web proxies."
"Protection against threats like ransomware is very effective."
"I rate the overall product as ten out of ten."
"It has centralized management that allows administrators to supervise and control the security of the entire network."
"Now that we use Harmony Connect, the files are inspected and we are sure that no malicious content is inside the company."
"The application control and granular access feature are very easy to use, intuitive, and effective."
"The characteristics that I have liked the most are the ease of implementation and administration."
"It is a very stable solution."
"Harmony SASE helps us to manage compliance by regulating the amount of access to each department and user. We control the relevant apps and websites, which can be accessed from company-owned devices. Harmony SASE uses its own threat intelligence data from the cloud for threat prevention, and detect and manage threats with their own threat intelligence data and SASE firewall features."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"We have not had any issues with bugs or breakdowns."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The solution is stable."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
 

Cons

"Sometimes, obviously, there are bugs."
"Our iboss subscription access should be more secure with an OTP or VPN etc. It is easy to gain access if, for example, hackers obtain my username and password."
"File integrity monitoring would be very advantageous as an additional feature."
"To scale up, a new iboss Node Blade Chassis must be purchased."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"The reporting feature needs improvement."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"One thing I would like to see differently with their Zero Trust platform is that some of the AI aspects related to high-risk activities have more false positives."
"The connectivity issue can be improved as at times it lags when connecting to their server."
"The solution requires you to buy a minimum of 50 licenses and that is not practical."
"Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."
"Zero Trust Network Access can be a security breach if not used correctly."
"When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end."
"The support is not very good."
"A Google Chrome extension would be handy instead of logging into the app."
"There is an issue when installing the Check Point client."
"The initial setup requires a little bit of experience with configuration."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
 

Pricing and Cost Advice

"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is probably in line with other solutions, but I do not deal with the financial side."
"The overall pricing for iboss is very competitive and transparent."
"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"Overall I am very happy with the solution’s flexibility and pricing."
"The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users."
"The product is reasonably priced."
"The product is neither cheap nor expensive."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"Lookout is definitely on the lower end when it comes to price point and that seems to be the only differentiator. The technology is in place in this space and it's really about who is coming in at the better price point now."
"The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For example, Lookout costs 2/3rd of Prisma's licensing price."
"The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it."
"In terms of feature performance versus cost, they're a good value."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
862,077 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
9%
Government
6%
Computer Software Company
18%
Financial Services Firm
7%
Manufacturing Company
6%
Comms Service Provider
5%
Computer Software Company
19%
Manufacturing Company
10%
Financial Services Firm
10%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
What is your experience regarding pricing and costs for Lookout?
The pricing is a little expensive. We are currently looking at comparisons with other solutions, including Umbrella.
What needs improvement with Lookout?
There is nothing we have come across that we've desired.
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
CipherCloud
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Information Not Available
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Lookout and other solutions. Updated: June 2025.
862,077 professionals have used our research since 2012.