Try our new research platform with insights from 80,000+ expert users
reviewer2080848 - PeerSpot reviewer
Senior Customer Success Manager at BigHand
User
User-friendly with a seamless login experience and can scale well
Pros and Cons
  • "Logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN."
  • "One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources."

What is our primary use case?

My work started using Perimeter 81 as a replacement for our previous VPN provider. Our previous solution was Sophos. 

We are a company that is around 75% fully remote, and we are an ISO 27001 Certified legal tech solution provider to some of the largest law firms and health care providers in the UK and North America. For that reason, ensuring our internal and client data is of the highest priority. 

We use the Perimeter 81 solution to secure all of our internal cloud-based systems as well as the demo system for the products we sell to our customers.

How has it helped my organization?

With the previous solution, we had to have an app on our phone that would generate PIN numbers that would auto-generate. It was cumbersome and not very user-friendly. 

This solution has allowed for a more seamless login experience when accessing my files, and from a user standpoint, it is fantastic. I am barely cognizant of the fact that Perimeter is running in the background. This was not the case with our previous VPN solution. 

What is most valuable?

Direct login using Microsoft network credentials and no extra applications or manual inputting of PIN codes is probably the best feature of using Perimeter 81. Our last VPN solution required that users manually input PIN codes to confirm two-factor authentication, and the process was not very user-friendly. Moreover, logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN. Of course, having to regain access to the VPN is kind of annoying, however, it is still a much better user experience than our previous solution.

What needs improvement?

One of the more negative experiences using Perimeter 81 is the fact that I am logged off after a pre-determined amount of time which cuts off access to some of my company's resources. It's probably a configuration thing on our end, yet frustrating nonetheless. If there was a way to have quicker access to the Perimeter login page, that would probably be of great assistance when re-logging into the VPN. For instance, if the pop-up for Perimeter 81 allowed me to log in from there, that would probably streamline the process.

Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
June 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,632 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for about six months.

What do I think about the stability of the solution?

The product seems stable to me!

What do I think about the scalability of the solution?

The solution is very scalable.

How are customer service and support?

I have not interacted with customer service.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Sophos and switched. I am not sure why.

How was the initial setup?

I am not sure how the setup process was handled. 

What was our ROI?

I have no idea if we have looked into monitoring for ROI.

What's my experience with pricing, setup cost, and licensing?

I do not advise anyone at my company on any of those topics. 

Which other solutions did I evaluate?

I am not aware of the other options that were evaluated if any.

What other advice do I have?

I really like Perimeter 81 as opposed to our previous VPN solution. It is a much more streamlined and user-friendly experience.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
CLAUDIO SANTOS - PeerSpot reviewer
Operation Director at GLOBALIP
Reseller
Top 5Leaderboard
Provides a valuable multi-factor authentication functionality and an effective feature for controlling employee access to specific applications
Pros and Cons
  • "Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process."
  • "The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations."

What is our primary use case?

The platform manages remote access by allowing employees to log into a secure portal, where they are only given access to the specific applications they are authorized to use. This access is based on an HTTPS connection, ensuring security.

What is most valuable?

All product features are valuable, but multi-factor authentication (MFA) is especially critical for securing remote work environments. Without two-factor authentication, there is a heightened risk of security breaches. 

Another key feature is the ability to control the time frame for employee access to applications, allowing for greater security and control.

What needs improvement?

The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations.

For how long have I used the solution?

I have been working with Check Point Quantum SASE for three years. Currently, I am providing it to three customers and implementing it for a fourth. My clients have used it for varying periods, from six months to two years.

What do I think about the stability of the solution?

The solution is very stable and requires minimal maintenance. Once configured and exposed through the portal, it generally does not present issues related to the security service itself.

What do I think about the scalability of the solution?

The product is designed to be scalable, particularly as a SASE (Secure Access Service Edge) product. Its architecture supports easy scaling and can handle increasing users without issues.

How are customer service and support?

The support is comprehensive, and the channel ecosystem effectively assists with resolving complex issues. I can escalate problems to Check Point's research and development teams for further assistance.

How would you rate customer service and support?

Positive

What was our ROI?

The return on investment typically depends on the size of the customer. Most customers find the solution's benefits outweigh the costs, and the return is usually balanced.

What's my experience with pricing, setup cost, and licensing?

The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users.

What other advice do I have?

The solution's cost-effectiveness depends on the size of the business and the specific problems it needs to address.

Its most effective feature is controlling employee access to specific applications. I can manage and monitor every step of the access process.

It already comes with all the necessary features. When you purchase it, you get the full package. However, different levels of coverage are offered for endpoint solutions.

I rate it a nine out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
Buyer's Guide
Check Point Harmony SASE (formerly Perimeter 81)
June 2025
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,632 professionals have used our research since 2012.
Salim Hebada - PeerSpot reviewer
Huawei IP Pre-sales Solution Manager at MC3
Real User
Leaderboard
Highly scalable and unique advantage of SD-WAN
Pros and Cons
  • "SD-WAN is one of the primary solutions offered by Perimeter 81."
  • "One of our challenges is ensuring the security of our cloud-based operations."

What is our primary use case?

I use Perimeter 81 primarily for VPN connections and work and home banking. Additionally, I use it for some oil and gas applications. You should also consider using it for SD-WAN solutions. In fact, SD-WAN is one of the primary solutions offered by Perimeter 81.

In order to minimize costs, you can use a zero-trust security model. We also use VPN to interconnect many branches, for example, here in Nigeria, for an operator in the oil and gas industry. We have a high frequency in our network.

What is most valuable?

For us, SD-WAN is the most valuable feature. They provide a unique advantage for banking purposes and are also different from other solutions. VPN is good for security.

What needs improvement?

One of our challenges is ensuring the security of our cloud-based operations. We place a high priority on security and take measures to protect our data. We avoid using public cloud services and instead rely on data centers to collect data for both small and large branches.

In the next release, I would like to see more improvement in security capabilities.

For how long have I used the solution?

I have been using Perimeter 81 for ten years. I am working with the latest version.

What do I think about the stability of the solution?

It is a very stable solution. It efficiently ensures security. We also use VPN to touch cloud and ensure secure information. However, for a specific company, we may need to improve security. The code is updated biweekly.

What do I think about the scalability of the solution?

The scalability of Perimeter 81 depends on your equipment and routers. Different solutions may require different approaches. It is also a PLS to control.

How are customer service and support?

The customer service was good. We needed to make some configurations, and it was the same as with other providers because it's a solution we use.

How was the initial setup?

The initial setup is easy. The deployment process is different for each project, and it depends on the project's scope, such as the type of network and the kind of project. If you use IP and POS, it's different from if you don't use them.

What about the implementation team?

It's possible to implement it in-house, or we can get some help. As for the technical aspects, we have six people who are required for the deployment and maintenance. We plan to increase the number of users for Permieter 81 in our company.

What was our ROI?

The system should think about how to maximize the ROI and minimize the OpEx cost for the customer. When you use a good solution, you can decrease your supply costs, increase engineering, reduce repair costs, and increase product stability. It's a win-win solution where the customer wins, and you win.

What other advice do I have?

I would definitely recommend using Perimeter 81. Overall, I would rate the product a nine out of ten, but I would like to improve its security.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Sales Manager, Checkpoint at South Asian Technologies
Reseller
Top 20
Very agile with a granular level of control over users
Pros and Cons
  • "The solution offers both client and clientless versions for good remote access."
  • "The solution requires you to buy a minimum of 50 licenses and that is not practical."

What is our primary use case?

Our company installed the solution locally to test it and gain user experience. In the future, we plan to sell the solution to customers. 

The solution provides internet access, network access, and security. Both on-premises and cloud versions are available. 

Initially, we installed the on-premises version but are now testing the cloud version. 

What is most valuable?

The solution offers both client and clientless versions for good remote access. We don't like to give our credentials to BYOD devices, non-permanent cadres, or contractors so having two remote access options is a huge benefit. 

There is a granular level of control over users with regard to internet or network access. The virtual firewalls for remote connectivity are almost like having a firewall in-house. 

The solution is an agile product with very good technology. 

What needs improvement?

The solution requires you to buy a minimum of 50 licenses and that is not practical. 

For how long have I used the solution?

I have been using the solution for five months. 

What do I think about the stability of the solution?

The solution is stable so I rate stability a ten out of ten. 

What do I think about the scalability of the solution?

The solution is scalable so I rate scalability a ten out of ten. 

Which solution did I use previously and why did I switch?

I have been selling Check Point firewalls for four years. Previously, I sold Fortinet.

I am happier with the solution because my customers are giving me very good feedback. 

How was the initial setup?

The setup is easy so I rate it a ten out of ten. 

What about the implementation team?

We implemented the solution in-house. We set up our Active Directory and our admin sent the docker through email. We clicked the docker, installed it, and received connection to the solution. 

It took about four months for rollout to all of our our engineers and salespeople.

What's my experience with pricing, setup cost, and licensing?

I am not very happy about the pricing because the solution requires you to buy a minimum of 50 licenses. Annual licenses cost $30 to $40 each. 

The pricing is not practical in Sri Lanka because we have small customers who need only 10 to 20 licenses. There should be packages for 10, 20, and even 30 licenses. 

Which other solutions did I evaluate?

In Sri Lanka, there is a lot of competition with endpoint or process solutions. I think the solution is going to be a very good brand in the near future because we have been promoting it and most of our customers want to buy it. 

What other advice do I have?

The solution provides a secure tunnel for controlling users while maintaining stability. Security is an important component because you need to prevent hacks and issues with data accessibility. Without a secure tunnel, someone might get into your networks, take credentials or databases, and destroy your data centers. 

The solution is fast and provides 100% security, especially for remote users. 

I rate the solution a ten out of ten. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Chief Executive Officer at Vincacyber
Real User
Top 20
Highly reliable and protects organizations from phishing attacks and downtime
Pros and Cons
  • "The installation is very easy."
  • "The tool could be more user-friendly."

What is our primary use case?

Check Point Quantum SASE is a next-generation email security solution. It can be used to protect users from phishing emails.

What is most valuable?

The tool connects as an API. The installation is very easy. The integration with the existing network was very easy. It is a good tool. We can rely on it.

What needs improvement?

The tool could be more user-friendly.

For how long have I used the solution?

I have been using the solution for more than a year.

What do I think about the stability of the solution?

The tool is very stable and highly reliable. I rate the stability a ten out of ten.

What do I think about the scalability of the solution?

I rate the tool's scalability a ten out of ten. We have approximately 120 users. We have plans to increase the number of users. Our team members are experts. Anyone can deploy and maintain the solution.

How are customer service and support?

The support is good. The support personnel give prompt responses. They take ownership of our issues and communicate with us quickly. They try to get back to us quickly.

How was the initial setup?

The setup is very easy. The deployment can be done without much effort. It is done at the API level. It is deployed on the cloud.

What was our ROI?

I do not face phishing attacks and downtime due to the product.

What's my experience with pricing, setup cost, and licensing?

Check Point Quantum SASE is a SaaS-based product. We have to pay yearly. The product is reasonably priced. There are no additional costs associated with the tool.

Which other solutions did I evaluate?

I evaluated Microsoft Defender. Defender is a good solution, but it is not reliable.

What other advice do I have?

One of the biggest challenges organizations face is email threats. They are completely unknown. The users get deceived by them and tend to click on them. Previously, there was a solution called Avanan. It was one of the pioneers in email security that ensured no unwanted email came to our inbox. I will recommend the product to others. People must look at the solution very seriously. It will help them safeguard their organizations.

Overall, I rate the tool a ten out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Sonali Dhende - PeerSpot reviewer
Cyber Security Engineer at Valuepoint Systems
Real User
Top 20
Provides high performance along with ATP prevention and policy management but firewall configuration could be improved
Pros and Cons
  • "The solution offers ATP features and management features."
  • "The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support."
  • "When it comes to firewall configuration, sometimes we encounter issues."

What is our primary use case?

The solution provides high performance along with ATP prevention, policy management, remote activity, and IoT support. We have all these features integrated into our security gateway for every business year, like the SASE model. Cyber threats are becoming increasingly sophisticated nowadays. We have this next-generation firewall, to protect all your network, cloud, data centre, IoT devices, and remote connections. Due to these reasons, we prefer Check Point's network solution. It helps improve the remote workforce security.

What is most valuable?

The solution offers ATP features and management features. We have a smart console and GIA portal. We used to manage all policies on the smart console. We do have the URL filtering and prevention part. We used to do the policy databases and all that configuration from the GIA portal. We have intrusion prevention, application consultant, filtering options and web filtering. It works as a next-gen firewall.

What needs improvement?

Firstly, there are different consoles involved. If someone is selling another product that already has a single console for managing everything, that would be better.

For how long have I used the solution?

I have been using Check Point Quantum SASE for 6 months.

How are customer service and support?

Support is handling requests via email. Additionally, they share documents. We haven't encountered any major issues requiring support. They are available 24hr/day along with alerts, reports or security issues.

How was the initial setup?

The initial setup depends on the organisation. Let's say they are currently using FortiGate, but they want to migrate to Check Point Quantum SASE. We have different options for migration. We can either perform the migration manually or upload existing tests. Manual deployment can be time-consuming. We have two types of configurations: basic and advanced. Basic configuration can be completed quickly, but advanced configurations may take more time. Our deployment process is relatively easy, but managing traffic and other aspects can be challenging. We need to align with the organisation's flow during this process.

Deployment takes about a month depending on the number of firewalls.

What other advice do I have?

The zero trust aspect is being used for VPN purposes. It replaces your VPN, assisting anyone trying to access VPNs.

We are using it for large organisations and enterprises. For instance, if some organisations are using Check Point hardware for their firewalls but don't want to switch to other vendors, they can opt for this solution. Especially for big organisations with data centres facing numerous network issues, it's highly scalable. When it comes to firewall configuration, sometimes we encounter issues, but we can't always blame the firewall.

Check Point offers SmartConsole and other tools. If you compare Quantum with FortiGate, FortiGate doesn't have separate controls for various functions like policy publishing and control. In FortiGate, within one console, you can manage everything by enabling features.

Overall, I rate the solution a 7 out of 10.

Disclosure: My company has a business relationship with this vendor other than being a customer. partner
PeerSpot user
Security Consultant at Synergy
Reseller
Top 5Leaderboard
An easy-to-use and set-up cloud solution for security
Pros and Cons
  • "The tool is easy to use and set up."
  • "The product has a reasonably high pricing."

    What is our primary use case?

    We use the solution for security.

    What is most valuable?

    The tool is easy to use and set up.

    What needs improvement?

    Harmony Connect has two components: one for accessing the internet and the other for accessing the corporate network. The Access intelligence lab is particularly useful because it eliminates the need to purchase a separate firewall for the branch office. Instead, you can connect the Check Point VPN, providing you with Check Point Harmony Connect firewall functionality for monitoring traffic.

    The setup is easy, but it depends on the router configuration. The router configuration, in turn, will depend on the specific releases. The configuration could be improved.

    For how long have I used the solution?

    I have been using Check Point Harmony Connect for two to three years.

    What do I think about the stability of the solution?

    The product is stable.

    What do I think about the scalability of the solution?

    What are your impressions of the scalability of this solution?

    The solution is scalable.

    Which solution did I use previously and why did I switch?

    Since I trust the Check Point security, I trust Harmony Connect.

    How was the initial setup?

    The initial setup is easy and may take a half hour to complete if you’ve experience.

    I rate the initial setup a ten out of ten, where one is difficult and ten is easy.

    What's my experience with pricing, setup cost, and licensing?

    The product has a reasonably high pricing.

    What other advice do I have?

    Overall, I rate the solution an eight out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
    PeerSpot user
    reviewer1911213 - PeerSpot reviewer
    Accounts Payable Specialist at Simera
    User
    Good security and privacy capabilities with excellent support
    Pros and Cons
    • "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
    • "I have found that the log-in/out process takes quite some time."

    What is our primary use case?

    I needed the solution to attach it to the vendor's file in our accounting software. The customer service team provided such an efficient and fast service. We have an account manager, which is great as we get personalized attention. I asked for the W-9 form once, and it was provided to me. I was not able to download it and then forgot about it. I asked for it again, and without any hesitation, the team provided it again. They were not rude about it. I later realized and apologized for asking for it twice.

    How has it helped my organization?

    Our organization is more secure with Perimeter81's Virtual Private Network (VPN). We manage sensitive information of clients. In my department, we manage bank and credit card information. It is a lot of responsibility to have access to that kind of data. Now that our company has implemented Perimeter81's services with the VPN, personally, I feel more secure when navigating through these different platforms. It is a great investment for today's workplaces - especially when we handle critical information virtually.

    What is most valuable?

    The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online. 

    Similarly, I find that the work that Perimeter 81's customer service team does is very valuable. I have heard from our IT department that Perimeter 81's team is quite knowledgeable and efficient. These are important traits and they describe not only the company's service but the quality of its product as well. So far, our company is very happy with the product.

    What needs improvement?

    Overall the product is very efficient. However, personally, there is something that I dislike. I have found that the log-in/out process takes quite some time. I usually click on the app, and it asks me to login in through the web, and then after I log in it takes me back to the app. It seems to me that I should be able to log out without having to leave the app. I do like that it connects automatically/logs in as soon as I sign on. I am not sure why login in is easier than logout. 

    For how long have I used the solution?

    The resolution took a couple of hours to be solved, around six hours.

    What do I think about the stability of the solution?

    The stability is good.

    What do I think about the scalability of the solution?

    The scalability is good.

    How are customer service and support?

    The experience with technical support was great. The team is professional, polite, and efficient.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    This is the first time that we used a VPN in the company.

    How was the initial setup?

    I'm not able to say what the setup is like.

    What about the implementation team?

    I'm not able to say if we had any outside assistance.

    What was our ROI?

    I'm not able to say what the ROI would be.

    What's my experience with pricing, setup cost, and licensing?

    I am not able to advise on the cost/pricing.

    Which other solutions did I evaluate?

    This decision was made by the IT department, however, naturally, they did evaluate other vendors

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Google
    Disclosure: My company has a business relationship with this vendor other than being a customer. Simera, the company I work, is the client. I am an user.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.
    Updated: June 2025
    Buyer's Guide
    Download our free Check Point Harmony SASE (formerly Perimeter 81) Report and get advice and tips from experienced pros sharing their opinions.