


Check Point Harmony SASE (formerly Perimeter 81) and Google Cloud Identity-Aware Proxy compete in the network security category, each offering distinct advantages. Based on our comparisons, Check Point Harmony SASE leads in security features, while Google Cloud Identity-Aware Proxy shines in integration and scalability within the Google ecosystem.
Features: Check Point Harmony SASE provides Zero Trust Network Access, a Secure Web Gateway, and centralized policy management. It is known for data loss prevention and traffic optimization. Google Cloud Identity-Aware Proxy is notable for its seamless integration with Google's ecosystem, effective authentication capabilities, and asset control.
Room for Improvement: Check Point Harmony SASE could improve integration with third-party identity providers and offer more intuitive management portals. Users would benefit from enhanced reporting and a mobile-specific client. Google Cloud Identity-Aware Proxy could enhance its storage options and user-friendliness, while expanded application integration and improved AI capabilities would add further value.
Ease of Deployment and Customer Service: Both Check Point Harmony SASE and Google Cloud Identity-Aware Proxy support deployment across various cloud environments, including private, public, and hybrid clouds. However, technical support for Check Point Harmony SASE receives mixed reviews with some delays reported. Users of Google Cloud Identity-Aware Proxy appreciate prompt support but desire more comprehensive guidance for non-technical users.
Pricing and ROI: Check Point Harmony SASE is perceived as relatively expensive but provides significant value and ROI for larger enterprises through its extensive features. Google Cloud Identity-Aware Proxy is generally seen as reasonably priced for users within Google's ecosystems, though some consider it more costly than alternatives. It often results in cost savings, especially when replacing on-prem solutions, though detailed ROI evaluations are still pending for some users.


| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 6 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 53 |
| Midsize Enterprise | 19 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 12 |
| Large Enterprise | 19 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
Check Point Harmony SASE, formerly Perimeter 81, offers robust security features like split tunneling, MFA, and Zero Trust Network Access focused on secure remote access and optimized connectivity for remote teams.
Check Point Harmony SASE delivers advanced security through a user-friendly interface, efficient VPN connections, and a centralized management console. It enhances security with real-time threat intelligence from ThreatCloud and traffic management via built-in optimization. Firewall as a Service and Secure Web Gateway safeguard against unauthorized access and phishing. While users seek enhanced networking customizations and better integration with identity providers, there's an emphasis on improving reporting, real-time analytics, and policy management. Requests also include a Chrome extension, traffic balancing, and simplified configuration to address some resource-intensive aspects.
What are the key features of Check Point Harmony SASE?
How can organizations benefit from using Check Point Harmony SASE?
Check Point Harmony SASE is used across industries for secure remote access and connectivity, protecting sensitive data, and managing access to corporate resources. It is ideal for those with hybrid cloud models and requires comprehensive security measures combined with existing IT infrastructures to meet specific industry demands.
Google Cloud Identity-Aware Proxy offers scalable, user-friendly identity management with efficient data processing and seamless integration, providing reliable access management and collaboration across platforms.
Identity-Aware Proxy by Google Cloud provides a secure and intuitive interface for managing user identities and controlling access to applications. It integrates with platforms like Amazon and Microsoft to facilitate real-time collaboration. With support for Kubernetes, CI/CD, and BigQuery, it enhances performance by enabling secure and efficient data processing. Users find the pricing appealing as it allows for flexible deployments. Despite its strengths, improvements are sought in user intuitiveness, enhanced security, and documentation. Challenges such as stability, regional availability, and data management persist, highlighting the need for more refined integration and storage options.
What are the key features of Google Cloud Identity-Aware Proxy?In industries leveraging Google Cloud Identity-Aware Proxy, companies manage identities to enhance security and streamline operations. Educational institutions apply its secure online teaching capabilities, while tech firms utilize its integration with CI/CD for deploying container platforms. Enterprises harness its potential for managing resources, automating processes, and hosting applications, ensuring seamless data access across devices for collaborative projects.
We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.