Try our new research platform with insights from 80,000+ expert users

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Check Point Harmony SASE (formerly Perimeter 81) significantly enhances security and privacy while maintaining strong internet performance.
The implementation and deployment process is straightforward, providing a user-friendly experience.
Check Point Harmony SASE offers advanced features such as Zero Trust and segmentation, crucial for protecting work-from-home environments.
Scalability and easy integration with other technologies are highlights of Check Point Harmony SASE, fostering seamless operations.
Check Point Harmony SASE utilizes its threat intelligence data from the cloud to manage threats effectively.

CONS

Check Point Harmony SASE requires improvement in networking and security features to offer more customization options.
The platform faces connectivity issues, especially when dealing with more than 150 users or during peak times.
There is a need for better integration with existing SIEM or security solutions for more effective alert management.
Check Point Harmony SASE's initial setup process is complex, particularly in a hybrid environment.
The pricing can be expensive, posing a challenge for smaller companies.
 

Check Point Harmony SASE (formerly Perimeter 81) Pros review quotes

reviewer1428267 - PeerSpot reviewer
VP Engineering at Loris.ai
Sep 28, 2020
Their split tunneling feature has been very valuable to our company since implementing the Perimeter 81 solution.
reviewer1751151 - PeerSpot reviewer
Customer Success Manager at inSided B.V.
Dec 21, 2021
It helps to quickly get access to the pages I need.
fnunez - PeerSpot reviewer
Release Manager at COPADO SOLUTIONS SL
Jan 5, 2022
The solution provides us with an easy way to configure and join the VPN with Perimeter 81.
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
reviewer1765167 - PeerSpot reviewer
Underwriter at GraceKennedy
Jan 19, 2022
It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go.
reviewer1783953 - PeerSpot reviewer
UX Analyst at AnswerLab
Feb 15, 2022
It keeps us all accountable and ensures secure internet connections while we all work remotely.
Mar 15, 2022
Perimeter 81 has increased my security and privacy while maintaining solid internet performance.
Cassio Silva - PeerSpot reviewer
Senior Network Administrator at eSales Solutions
Apr 6, 2022
The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment.
reviewer1830174 - PeerSpot reviewer
Information Security Analyst at SCANSEC
Apr 6, 2022
Now that we use Harmony Connect, the files are inspected and we are sure that no malicious content is inside the company.
reviewer1830183 - PeerSpot reviewer
Information Security Team Lead at Oregon State Treasury
Apr 6, 2022
HTTPS decryption is a valuable service and not always found in cloud-based secure web gateways.
Harold Suárez, MGP, PMP® - PeerSpot reviewer
Project Management and Deployment Team Leader at Sefisa
Apr 8, 2022
I find it very easy to implement and deploy in the organization.
 

Check Point Harmony SASE (formerly Perimeter 81) Cons review quotes

reviewer1428267 - PeerSpot reviewer
VP Engineering at Loris.ai
Sep 28, 2020
I would suggest adding more networking and security features that allow more customization within their platform.
reviewer1751151 - PeerSpot reviewer
Customer Success Manager at inSided B.V.
Dec 21, 2021
Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily.
fnunez - PeerSpot reviewer
Release Manager at COPADO SOLUTIONS SL
Jan 5, 2022
In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality.
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
reviewer1765167 - PeerSpot reviewer
Underwriter at GraceKennedy
Jan 19, 2022
If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on.
reviewer1783953 - PeerSpot reviewer
UX Analyst at AnswerLab
Feb 15, 2022
I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful.
Mar 15, 2022
The overall UI could be improved and updated to bring a simpler feel to the application.
Cassio Silva - PeerSpot reviewer
Senior Network Administrator at eSales Solutions
Apr 6, 2022
As it is a new market solution, I still face some instabilities in access at certain times of the day when I have more than 150 users using it simultaneously.
reviewer1830174 - PeerSpot reviewer
Information Security Analyst at SCANSEC
Apr 6, 2022
The access to the portal should be faster. It shouldn't crash a lot.
reviewer1830183 - PeerSpot reviewer
Information Security Team Lead at Oregon State Treasury
Apr 6, 2022
Harmony lacks this ability when anything more than a vanilla access policy is used (we use layers and source user objects in our policy which make this impossible according to Check Point).
Harold Suárez, MGP, PMP® - PeerSpot reviewer
Project Management and Deployment Team Leader at Sefisa
Apr 8, 2022
Zero Trust Network Access can be a security breach if not used correctly.