We performed a comparison between Check Point Harmony Browse and Zscaler Internet Access based on real PeerSpot user reviews.
Find out in this report how the two Secure Web Gateways (SWG) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The solution is stable."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The product enforces the privacy of the users, which is good."
"This tool installs a very small agent in browsers. It does not cause performance problems on the host computer, which makes it less annoying for users."
"It gives our customers a sense of security they might not have found anywhere else."
"Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance."
"This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user."
"It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded."
"Its potential features of Threat Detection and Threat Emulation have helped businesses to browse securely hassle-free without any tension."
"It is easy to implement and has great security potential to avoid vulnerabilities through internet browsing."
"All internet access flows through the Zscaler proxy, regardless of whether people are in office or remote. I have greater control site access and I minimize the number of compromises that we experience to almost none."
"Zscaler Internet Access protects using data loss prevention. If you have a CASB exposing your cloud out into the network, then Zscaler Internet Access will go ahead and control that unknown cloud application in the CASB, protecting it. There is also data detection with exact data match. This improves the data coming into your cloud so you are protecting it."
"One on the main benefits is protection all time from anywhere."
"The most valuable feature is the ability to drop packets."
"The initial setup was straightforward. The biggest thing for us was to build our own policies. The deployment itself was only a few hours."
"The most valuable feature of Zscaler Internet Access is that it is a consolidated solution, it comes with many features, such as DLP."
"The best thing about Zscaler Internet Access is the website filtering. In the UAE it's quite an important feature because most of the malware comes through the SQL injection and through downloads from websites. Zscaler helps protect against that."
"The solution offers a distributed organization to master and to control all of the endpoints."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"More strengthening and robustness are required in zero-day threat prevention to ensure its efficiency at 100%."
"URL filtering could be better."
"More focus and emphasis is required on customization and real-time notification and alert system."
"The documentation of the most current applications is sometimes not so clear, and it is difficult to understand."
"The ease of handling should be improved, as it is currently intrusive and some users don't like it."
"It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow."
"Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."
"The only thing they should add or improve is the reporting series."
"Zscaler Internet Access needs to integrate more ISPs. It is good to have more than three ISPs."
"We'd like for them to include some sort of antivirus tool."
"An improvement would be if they could provide an out-of-the-box experience, like 20 to 30 features all ready to go. In comparison, LogRhythm offers out-of-the-box features. With Zscaler Internet Access, there is firewall IPS, multiple security services, filtering, DLP, and CASB browser isolation. These are things that all users are going to be using. However, when an administrator or architect would start building this, I would definitely need to engage professional services to help clients do it."
"Zscaler does not provide dedicated IPs to each customer. Hence, they share a pool of IPs provided by Zscaler. There is a chance of blacklisting these IPs. I also do not like the multi-management portal."
"The main issue with Zscaler Internet Access is proxy IP detection, which sometimes makes sites inaccessible."
"The OS capabilities and WSL support could be improved."
"The performance needs improvement. Some areas create performance issues and, depending on the use cases, require reconfiguration to perform again."
"Another thing that I would like to see is if Zscaler could have a separate product for direct access. I looked at a private access solution, but I understand there's a separate product that isn't integrated with this."
Check Point Harmony Browse is ranked 10th in Secure Web Gateways (SWG) with 17 reviews while Zscaler Internet Access is ranked 2nd in Secure Web Gateways (SWG) with 46 reviews. Check Point Harmony Browse is rated 9.0, while Zscaler Internet Access is rated 8.2. The top reviewer of Check Point Harmony Browse writes "Easy to install with excellent features and boosts productivity". On the other hand, the top reviewer of Zscaler Internet Access writes "Provides integrated CASB and file sandboxing but could be less expensive ". Check Point Harmony Browse is most compared with Cisco Umbrella, whereas Zscaler Internet Access is most compared with Cisco Umbrella, Microsoft Defender for Cloud Apps, Netskope , Prisma Access by Palo Alto Networks and FortiSASE . See our Check Point Harmony Browse vs. Zscaler Internet Access report.
See our list of best Secure Web Gateways (SWG) vendors.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.