Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Menlo Secure comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 15, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortinet FortiGate
Sponsored
Ranking in Firewalls
2nd
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
380
Ranking in other categories
Software Defined WAN (SD-WAN) Solutions (1st), WAN Edge (1st)
Check Point Harmony SASE (f...
Ranking in Firewalls
15th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
60
Ranking in other categories
Secure Web Gateways (SWG) (7th), Anti-Malware Tools (6th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (4th), ZTNA (2nd), Secure Access Service Edge (SASE) (6th)
Menlo Secure
Ranking in Firewalls
52nd
Average Rating
9.2
Reviews Sentiment
6.9
Number of Reviews
4
Ranking in other categories
Secure Web Gateways (SWG) (31st), ZTNA (27th), Cloud Security Remediation (8th)
 

Featured Reviews

Vasu Gala - PeerSpot reviewer
A stable solution with an intuitive interface and quick customer service
I have been working with Fortinet FortiGate, WatchGuard, Sophos, and SonicWall. I'm not as comfortable with SonicWall because of their UI and limitations. I prefer Fortinet above all other options. When it comes to configuration, I am confident in my ability to handle various tasks, including creating policies such as firewall rules, web policies, and application policies. Additionally, I can configure VPNs and implement load balancing, among other tasks. Overall, I feel much more comfortable working with Fortinet. Fortinet has made significant improvements by integrating AI with firewalls for threat analysis and prevention. In the past 2-3 years, they have launched FortiSASE and SIEM, and they also provide SOC services. Both Palo Alto and Fortinet FortiGate are excellent. While Fortinet FortiGate comes at higher prices, the functionality and support justify the cost. They promptly resolve firmware issues and inform all support providers about configuration changes.
Nasseer Qureshi - PeerSpot reviewer
Delivers seamless and secure remote access while enhancing security posture
Check Point Harmony SASE (formerly Perimeter 81) offers strong features, but there are areas that could be improved. One area for improvement is integration with third-party identity providers. It works with standard SAML and SSO, but we would prefer deeper integrations with solutions such as Ping for more advanced identity-based policies. Additionally, a mobile-specific client or lightweight agent would be helpful for securing access from smartphones, especially in BYOD environments. We would appreciate more granular reporting and analytics, including better drill-down capabilities to investigate specific users or app activity. The logs are comprehensive, but filtering them can sometimes feel messy. The user interface on the management portal could be more intuitive, especially when managing multiple sites or remote offices. Some of the policy configuration steps are nested and could be streamlined.
Olivier DALOY - PeerSpot reviewer
Secures users wherever they are and enable us to inspect SSL traffic, but we encountered too many issues
The solution should have no impact but it does have a bit of impact on end-users. For example, we encountered some issues in the downloads that took longer than they did without using Menlo. That is clearly not transparent for users. We expected not to have any latency when downloading anything from the internet with Menlo compared to without Menlo. We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution. In other words, we hope to get the same level of protection, while reducing the number of visible bugs, issues, latencies, impacts on performance, et cetera, that we have today with Menlo. We already solved most of them, but we still have too many such instances of issues with Menlo, even though it is protecting us for sure. The weak point of the solution is that it has consumed far too much of my team's time, taking them away from operations and projects and design. It took far too much time to implement it and get rid of all of the live issues that we encountered when our users started using the solution. The good point is that I'm sure it is protecting us and it's probably protecting us more than any other solution, which is something I appreciate a lot as a CISO. But on the other hand, the number of issues reported by the users, and the amount of time that has been necessary for either my team or the infrastructure team to spend diagnosing, troubleshooting, and fixing the issues that we had with the solution was too much. And that doesn't include the need to still use our previous solution, Blue Coat, that we have kept active so that whatever is not compatible or doesn't work with Menlo, can be handled by that other solution. It is far too demanding in terms of effort and workload and even cost, at the end of the day. That is why we decided to transition to another solution. If we had known in the beginning that we would not be able to get rid of Blue Coat, we probably would not have chosen Menlo because we were planning to replace Blue Coat with something that was at least able to do the same and more. We discovered that it was able to do more but it was not able to replace it, which is an issue. It is not only a matter of cost but is also a matter of not being able to reduce the number of partners that you have to deal with. In addition, they could enhance the ability to troubleshoot. Whenever a connection going through Menlo fails for any reason, being able to troubleshoot what the configuration of Menlo should be to allow it through would help, as would knowing what level of additional risk we would be taking with that configuration.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The license management is very valuable. You can get a new license each year, or you can enroll every two to four years. You can get the logs, and you will get the information on the risk in your network and the entire organization. With this information, you can take action on your actives, computers, or devices. You can bring your own device as an SSE."
"Mainly the FortiGate reporting system is very good. It guides us through all the expectations of security. Fortinet provides us all that we need for security. Also, Fortinet FortiGate is a next-generation firewall. It is much more advanced than others."
"On a scale of one to ten, I rate this solution 10 out of 10."
"Overall, the pricing of the solution is very good. The product offers good value."
"Their web interface to manage it is excellent, even compared with other providers."
"My clients appreciate it for its features. It is easy to install and manage, and it offers all-around protection, including web filtering, content filtering, IPS, and IDS."
"Fortinet FortiGate is good for helping you secure and protect mission-critical data."
"Layer-3 firewall and routing are the most valuable features."
"I find it very easy to implement and deploy in the organization."
"It is a very stable solution."
"Overall, the unified agent covers endpoints as well as prevents web browser attacks."
"The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
"While the higher cost and complexity may pose challenges for smaller companies without extensive IT resources, the value provided by Check Point's advanced capabilities and excellent 24/7 support justifies the investment. Overall, it is highly recommended that insurance firms prioritize data security and regulatory compliance, especially medium to large companies with the resources to manage and fully utilize its features."
"It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go."
"The solution provides us with an easy way to configure and join the VPN with Perimeter 81."
"Check Point provides high-quality technical support. The support was pretty quick."
"The fact that it is a cloud proxy solution is another feature we like. For example, if you acquire a new company, you can use it to protect that new company without the need to install anything physically on their networks."
"It has reduced security events to follow up on. While it is not 100%, there has been probably a 90% or more reduction. We were getting hit left, right, and center constantly from people browsing the Internet and hitting bad websites. It was not just bad websites that were stood up to be malicious, but good sites that were compromised."
"Accessing the internet with a proxy from anywhere is the most valuable feature. It ensures that users are only able to browse legitimate websites. If they happen to go to a legitimate website with a malicious payload, the isolation feature will take care of that."
"For us, the primary goal is protection on the web, and that's extremely important. We're not using any of the other services at this time. The web part is key to the success of the organization. It gives us the ability to protect. It can isolate. It opens the session in an isolated format so that the code isn't running locally. It is running over in the Menlo environment, not in ours. It is not running on the local computer, whereas if you were to go to a normal website, it would run Java or something else on the local machine and potentially execute the malicious code locally. So, it does give us that level of protection."
 

Cons

"Fortinet FortiGate needs to improve to be on par with its competitors, such as Palo Alto and Sophos. They are the market leaders. Fortinet FortiGate needs to improve its capabilities. However, we are happy with Fortinet FortiGate."
"They could do more work on FortiAnalyzer in terms of the data and the information coming from it."
"Areas that have room for improvement in Fortinet FortiGate include support and GUI enhancement."
"Their support can be better, and there should be better policies for immediate replacement in critical situations."
"I wish that they could integrate zero-trust technology into Fortinet FortiGate. I am not sure whether it has been done already, but if they could implement that, it would help significantly."
"With FortiGate, the main complaint that I have heard is about the technical support."
"From my experience, I see that the datasheets of the Fortinet FortiGate portfolio need to be more accurate because correct sizing is essential. The datasheets should provide clear information when deploying features."
"I wish that they could integrate zero-trust technology into Fortinet FortiGate. I am not sure whether it has been done already, but if they could implement that, it would help significantly."
"There is a very small amount of downtime."
"The platform's pricing can be an issue for smaller companies, as the cost may be higher than for larger organizations."
"Although the interface is user-friendly, further simplification and customization options tailored for non-technical users would benefit smaller firms without dedicated IT teams. Intuitive dashboards and guided setups can help in reducing the learning curve."
"There is a hefty cost"
"Sometimes, the product is very slow."
"The platform still lacks relevant dashboards and the ability to customize them based on our needs."
"Harmony lacks this ability when anything more than a vanilla access policy is used (we use layers and source user objects in our policy which make this impossible according to Check Point)."
"Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists. I have numerous entries, but are they all still needed? A report that would show me my list of who is allowed and whether we're actually using it would be useful because I can then go clean up my list. It would be easier to manage. We would eliminate the vulnerability of unused services."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"In the best of all worlds, we wouldn't have to make any exceptions. However, that is a big ask because a lot of that depends on how websites are constructed. For example, there are some very complex, application-oriented sites that we end up making exceptions for. It is really not that big an issue for us to make the exceptions. We feel like we are doing that without a huge impact on our security posture, but we do have to make some exceptions for complex sites, e.g., mostly SaaS-type sites and applications."
"The user monitoring could still be improved."
 

Pricing and Cost Advice

"The value is the capability of having multiple services with one unique license, not having the limitation per user licensing schema, like other vendors."
"If the customer is looking for SD-WAN, it comes free with FortiGate."
"​We saved a bundle by not needing all the past appliances from an NGFW.​"
"Fortinet has more device options that are affordable for small businesses than Palo Alto, and its enterprise-level models are also cheaper. Palo Alto also has a separate license for VPN connections and SD-WAN, but FortiGate offers these features standard."
"Compared to Palo Alto, which we have used in the past, pricing and licensing are okay."
"The pricing is very reasonable."
"Fortinet Secure SD-WAN delivered the lowest total cost of ownership (TCO) per Mbps among all other vendors."
"You need to pay a license for this solution. Our licensing is now done in our subsidiary."
"The product is neither cheap nor expensive."
"The pricing is good, especially when you compare it to other firewall or UTM solutions from FortiGate or SonicWall, where you would have to invest about four hundred thousand rupees for 100 users over a three-year period."
"Annual licenses cost $30 to $40 each."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
"The product is reasonably priced."
"I consider the product to be a medium-priced solution. There are no additional costs attached to the tool."
"Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
"Regarding pricing, I can say that the more the number of users, the less they have to pay."
"The solution is expensive. It's more expensive than the solution I previously used. Compared with the other cloud-based solutions, it's very competitive."
"It is appropriately priced for what they're doing for us. Considering the protection provided, I feel their pricing is spot-on."
"We save a ton of money and time. Previously, the numerous hits that we were receiving from our security tools, prior to implementing them, had to all be chased down, dispositioned, and endpoints had to be reimaged. It was just a ton of effort to do all that. That is where the savings from time and money come in."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
861,524 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Educational Organization
9%
Comms Service Provider
8%
Manufacturing Company
7%
Computer Software Company
18%
Financial Services Firm
7%
Manufacturing Company
6%
Comms Service Provider
5%
Computer Software Company
19%
Manufacturing Company
10%
Financial Services Firm
10%
Retailer
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Which is the better NGFW: Fortinet Fortigate or Cisco Firepower?
When you compare these firewalls you can identify them with different features, advantages, practices and usage a...
What is the biggest difference between Sophos XG and FortiGate?
From my experience regarding both the Sophos and FortiGate firewalls, I personally would rather use FortiGate. I know...
What are the biggest technical differences between Sophos UTM and Fortinet FortiGate?
As a solution, Sophos UTM offers a lot of functionality, it scales well, and the stability and performance are quite ...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
Ask a question
Earn 20 points
 

Also Known As

FortiGate 60b, FortiGate 60c, FortiGate 80c, FortiGate 50b, FortiGate 200b, FortiGate 110c, FortiGate, Fortinet Firewall
Check Point Quantum SASE
Menlo Security Web Security, Menlo Web Security
 

Overview

 

Sample Customers

Amazon Web Services, Microsoft, IBM, Cisco, Dell, HP, Oracle, Verizon, AT&T, T-Mobile, Sprint, Vodafone, Orange, BT Group, Telstra, Deutsche Telekom, Comcast, Time Warner Cable, CenturyLink, NTT Communications, Tata Communications, SoftBank, China Mobile, Singtel, Telus, Rogers Communications, Bell Canada, Telkom Indonesia, Telkom South Africa, Telmex, Telia Company, Telkom Kenya
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
Information Not Available
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Menlo Secure and other solutions. Updated: July 2025.
861,524 professionals have used our research since 2012.