Try our new research platform with insights from 80,000+ expert users

Check Point Harmony SASE (formerly Perimeter 81) vs Netskope comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Access Service Edge (SASE)
10th
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Secure Web Gateways (SWG) (10th), Internet Security (4th), Web Content Filtering (3rd), Cloud Access Security Brokers (CASB) (8th), ZTNA as a Service (11th)
Check Point Harmony SASE (f...
Ranking in Secure Access Service Edge (SASE)
7th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
59
Ranking in other categories
Secure Web Gateways (SWG) (5th), Firewalls (16th), Anti-Malware Tools (7th), Enterprise Infrastructure VPN (7th), ZTNA as a Service (5th), ZTNA (4th)
Netskope
Ranking in Secure Access Service Edge (SASE)
4th
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
42
Ranking in other categories
Cloud Access Security Brokers (CASB) (4th)
 

Mindshare comparison

As of April 2025, in the Secure Access Service Edge (SASE) category, the mindshare of iboss is 1.6%, up from 1.2% compared to the previous year. The mindshare of Check Point Harmony SASE (formerly Perimeter 81) is 3.5%, down from 4.5% compared to the previous year. The mindshare of Netskope is 10.8%, up from 9.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Access Service Edge (SASE)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
reviewer8099174 - PeerSpot reviewer
Secure access with an intuitive design and straightforward controls
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity. Additionally, expanding integration options with a broader range of third-party tools would be beneficial for seamless compatibility with various existing systems. As for additional features in the next release, it would be great to see advanced threat detection and response capabilities integrated into the platform. This would further enhance security by proactively identifying and mitigating potential threats. Additionally, improved mobile device management features and more comprehensive user behavior analytics would be valuable additions to meet evolving cybersecurity needs.
Valan Arasu - PeerSpot reviewer
Provides good visibility, integrates well with other components, and enables organizations to protect their data
Netskope’s CASB provides good visibility of the applications being used. We can use Shadow IT based on the traffic. DLP and CASB are valuable features. The tool provides extensive DLP features. We can create any level of policies and protect our data on-premise or cloud. The tool integrates with all the components very well.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"Our primary use case for this product is DLP,"
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"Its initial setup was straightforward."
"iboss is among the few products providing inline filtering where no application is needed on the device."
"iboss is pretty scalable. They provide good support. The case managers you work with to coordinate what you need are pretty good."
"The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele."
"Check Point provides high-quality technical support. The support was pretty quick."
"The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
"Its software solution also ensures connectivity and protects against NSF filtering."
"The DRP is the most valuable feature."
"Our operators can work from home without any problems."
"The product’s ability to block phishing sites is valuable."
"It is a scalable solution."
"In Azure, we have multiple subscriptions and with every subscription, we add some kind of instance ID. We can work with the instance ID so that we allow all of the instances containing nodules. Everything else, we block. This way, if you go to outlook.com and check your email, if you log in with your company account, the instance ID will show. The network will take action according to the instance ID and say, "You are using the enterprise email. I'll let you surf. I'll let you see your email." But when you try to log in with your own email address, like Hotmail or Gmail, the instance ID will be different. This way we are not completely blocking Outlook, but we are blocking people from accessing their Outlook. We are only allowing the enterprise-level emails, and we are not allowing user-based emails."
"The most useful feature of this solution is Cloud Control, which allows me to schedule cloud uploads."
"The initial setup of Netskope CASB is easy, it is not complex."
"The most valuable features were related to discovery, data protection, and ensuring compliance with regulations."
"They are very good at CASB as compared to other players."
"We use Cisco VPN for remote access. Additionally, we have started implementing Netskope with a strong focus on security. Our primary goal is to protect users from accessing malicious sites. We also plan to implement DLP based on our data, as data security is our main concern."
"It's one of the top-ranking solutions in the market, and it's very responsive. We are using Netskope, and Netskope provides a load of features for SQL, STP, and traffic control."
"Netskope started with a cloud-first approach, which makes it adaptable to the day-to-day changes that the cloud will generate."
 

Cons

"The reporting feature needs improvement."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"The area I would like to see improvement in is the ability with in the reporter to navigate directly to the content the user is traversing. It is kind of there, but it's not perfect. Quite frequently, I receive links that lead me to pages with error messages."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"Its pricing could be better."
"To scale up, a new iboss Node Blade Chassis must be purchased."
"The connectivity issue can be improved as at times it lags when connecting to their server."
"The solution's speed of upload and download is an area where it lacks"
"I would suggest adding more networking and security features that allow more customization within their platform."
"While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures."
"A Google Chrome extension would be handy instead of logging into the app."
"When it comes to firewall configuration, sometimes we encounter issues."
"In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality."
"The platform still lacks relevant dashboards and the ability to customize them based on our needs."
"Setting up policies is something that we having been doing, and if the vendor were to provide example use cases that included different implementation options then it would be very useful for us."
"The CSPM model needs to improve."
"If we need to allow a process that is blocked by Netskope, we have to manually check the logs to see why it is blocked. This can be time-consuming and inefficient"
"It needed some fine-tuning on core business sites that we used, which were sensitive to what we term a man-in-the-middle certificate by design. Some sites were not tolerant because they presented as potentially malicious. So, we just had to make some tweaks so that it would bypass or interpret it."
"They could add endpoint security features."
"I would like to have an identity theft protection function."
"The configuration in the cloud model could be improved upon."
"There should be some granular custom roles that are not available. However, this is on the road map. There are many devices that do not have the Zero Trust feature and other enhancements available which they should have."
 

Pricing and Cost Advice

"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"The overall pricing for iboss is very competitive and transparent."
"It is probably in line with other solutions, but I do not deal with the financial side."
"It is expensive compared to one of its competitors."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"The product is neither cheap nor expensive."
"I would rate Harmony Connect's pricing at six out of ten. It wasn't particularly expensive, but it wasn't super cheap either."
"The solution's pricing model may not be suitable for smaller companies, as they might find it expensive. Larger companies tend to receive more value due to many users."
"The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
"The pricing of Check Point is relatively high when compared to other competitors like Palo Alto and Fortinet. While Palo Alto may be on the higher side in terms of cost, Check Point's pricing is similar to that of Fortinet. In some cases, Check Point offers better value for the features it provides. We initially considered other options but ultimately decided to purchase hardware that came with three years of iOS. This approach eliminated the need for any additional costs associated with Check Point. I would rate it 10 out of 10."
"Regarding pricing, I can say that the more the number of users, the less they have to pay."
"The cost of the solution's licenses depends on the particular use cases."
"The product is reasonably priced."
"Pricing is a little expensive but it is affordable."
"I rate the product's price a six on a scale of one to ten, where one is expensive, and ten is low price."
"They should work on licensing costs."
"I wasn't involved in the initial discussions about its cost. However, within the next year, by around June, I'll need to review the vendors' quotes. Typically, our procurement team handles the process by issuing an RFP to vendors to get quotes. From there, we evaluate based on pricing and may conduct a proof of concept to assess value."
"There is a license required for this solution and there are many licensing models available. For example, what applications are covered as part of the license."
"On a scale from one to ten, where one is expensive, and ten is cheap, I rate the solution's pricing a six out of ten."
"The product's price is average."
"The pricing is competitive."
report
Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
9%
Government
6%
Computer Software Company
21%
Financial Services Firm
6%
Manufacturing Company
6%
Government
5%
Computer Software Company
17%
Financial Services Firm
14%
Manufacturing Company
9%
Insurance Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
I have the same complaint about them that I have about other software companies. Sometimes when you call in support, ...
What is your primary use case for iboss?
We are a PreK-12 public school district, and we use iboss to filter internet content for our students at home and sta...
What do you like most about Perimeter 81?
Even after restarting, it tries to quickly reestablish connection which is very helpful.
What is your experience regarding pricing and costs for Perimeter 81?
It's essential to consider the organization's specific requirements and budget. Here are some general recommendations...
What needs improvement with Perimeter 81?
In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed...
Which is better, Zscaler internet access or Netsckope CASB?
We researched Netskope but ultimately chose Zscaler. Netskope is a cloud access security broker that helps identify ...
What do you like most about Netskope CASB?
The product's analytics part is pretty fine.
What is your experience regarding pricing and costs for Netskope CASB?
Netskope is cost-effective compared to similar solutions like Zscaler.
 

Also Known As

iBoss Cloud Platform
Check Point Quantum SASE
Netskope CASB
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
NetApp, Genomic Health, Caterpillar, Apollo, Pandora, Continental Resources, Fractal, infinera, Tesla
Find out what your peers are saying about Check Point Harmony SASE (formerly Perimeter 81) vs. Netskope and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.