Citrix Gateway and Perimeter 81 compete in the secure access market. Perimeter 81 seems to have the upper hand due to its advanced feature set, despite Citrix's advantages in pricing and support.
Features: Citrix Gateway users value its comprehensive security protocols, integration capabilities, and manageability. Perimeter 81 is recognized for its innovative VPN-as-a-service model, seamless remote access, and advanced security features. Perimeter 81's edge comes from its user-friendly and extensive feature set.
Room for Improvement: Citrix Gateway users seek simpler configuration, better mobile compatibility, and more intuitive interfaces. Perimeter 81 users desire better customer support response times, more detailed documentation, and enhanced troubleshooting tools. Each product has areas requiring improvement, focusing on their respective needs.
Ease of Deployment and Customer Service: Citrix Gateway's deployment is complex but manageable with good customer service. Perimeter 81 offers straightforward deployment with some reported support delays. While Perimeter 81 is easier to deploy, Citrix Gateway provides more reliable customer service.
Pricing and ROI: Citrix Gateway features a higher upfront setup cost but offers substantial ROI through robust capabilities. Perimeter 81 is cost-effective, providing good value for its price. Differences highlight Perimeter 81's cost-efficiency against Citrix Gateway's long-term ROI.
Check Point Harmony SASE (formerly Perimeter 81) blocked access to those URLs at the network level before users could click through.
We are saving 40% of our time, which is good.
Citrix Gateway secures our environment from potential threats, which can save substantial financial resources, especially in preventing data breaches or ransomware attacks.
I would rate support 10 out of 10.
After updating firmware, data utilization was visible for a few days before collapsing again.
While there are multiple support tiers with priority response times of around 30 minutes, there appears to be a limitation in the number of technical teams who can immediately understand and resolve issues.
The cloud-native model ensures we are not tied to any specific location or hardware, which has been a great game changer in terms of agility.
The scalability of Check Point Harmony SASE (formerly Perimeter 81) is good, and I can add more users and devices easily as my organization grows.
I would rate it nine out of ten for scalability.
The solution features high availability, supporting both active-passive and active-active deployments to ensure constant product availability.
I believe that the scalability of Citrix Gateway depends on the project's requirements, as it can vary from simple load balancing to extensive Web Application Firewall implementations.
Even the support team does not have a proper solution for this issue.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
I find Citrix products to be very stable.
An example of when the support cycle took longer than expected was when I had a ticket open for nearly six to seven months regarding a simple issue.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
One area for improvement is integration with third-party identity providers.
At this time it costs 35% more than other solutions.
The main purpose of Citrix Gateway is to enforce the appropriate level of access to the correct user on the proper device under the correct conditions.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
My experience with pricing, setup cost, and licensing for Check Point Harmony SASE (formerly Perimeter 81) is that it is a rental service, but I find it satisfactory.
I consider Citrix Gateway to be an expensive solution, generally ranging from $5,000 to $15,000 yearly, depending on the model.
The firewall management is the most valuable feature for me.
The Zero Trust Network Access (ZTNA) feature is a major highlight as it gives users seamless and secure access to internal resources without requiring a full-blown VPN, which improves both security and user experience.
The best key features of Harmony are stabilization, private access, and Internet access.
The product effectively helps me protect the organization's network from potential threats, thereby securing our environment from hackers and ransomware attacks.
It's easy to scale and easy to implement.
Secure SaaS access is particularly valuable as it ensures that SaaS-based applications are delivered securely.
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Perimeter 81 Benefits:
Perimeter 81 Features:
Reviews from Real Users
PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".
Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".
Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
Citrix Gateway is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform. Citrix Gateway provides users with secure access and single sign-on to all the virtual, SaaS and web applications they need to be productive.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.