Chief Executive Officer at Vincacyber
Real User
Top 20
Highly reliable and protects organizations from phishing attacks and downtime
Pros and Cons
  • "The installation is very easy."
  • "The tool could be more user-friendly."

What is our primary use case?

Check Point Quantum SASE is a next-generation email security solution. It can be used to protect users from phishing emails.

What is most valuable?

The tool connects as an API. The installation is very easy. The integration with the existing network was very easy. It is a good tool. We can rely on it.

What needs improvement?

The tool could be more user-friendly.

For how long have I used the solution?

I have been using the solution for more than a year.

Buyer's Guide
Check Point Quantum SASE
June 2024
Learn what your peers think about Check Point Quantum SASE. Get advice and tips from experienced pros sharing their opinions. Updated: June 2024.
772,649 professionals have used our research since 2012.

What do I think about the stability of the solution?

The tool is very stable and highly reliable. I rate the stability a ten out of ten.

What do I think about the scalability of the solution?

I rate the tool's scalability a ten out of ten. We have approximately 120 users. We have plans to increase the number of users. Our team members are experts. Anyone can deploy and maintain the solution.

How are customer service and support?

The support is good. The support personnel give prompt responses. They take ownership of our issues and communicate with us quickly. They try to get back to us quickly.

How was the initial setup?

The setup is very easy. The deployment can be done without much effort. It is done at the API level. It is deployed on the cloud.

What was our ROI?

I do not face phishing attacks and downtime due to the product.

What's my experience with pricing, setup cost, and licensing?

Check Point Quantum SASE is a SaaS-based product. We have to pay yearly. The product is reasonably priced. There are no additional costs associated with the tool.

Which other solutions did I evaluate?

I evaluated Microsoft Defender. Defender is a good solution, but it is not reliable.

What other advice do I have?

One of the biggest challenges organizations face is email threats. They are completely unknown. The users get deceived by them and tend to click on them. Previously, there was a solution called Avanan. It was one of the pioneers in email security that ensured no unwanted email came to our inbox. I will recommend the product to others. People must look at the solution very seriously. It will help them safeguard their organizations.

Overall, I rate the tool a ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Ashish Upadhyay - PeerSpot reviewer
Founder at BlockMosiac
Real User
Top 5Leaderboard
Helps to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements
Pros and Cons
  • "The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele."
  • "While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures."

What is our primary use case?

We utilize cryptographic techniques, leveraging the tool's capabilities in Blockchain, to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements. Integrating Quantum-resilient technology into our decentralized enterprise framework ensures the security of our clients' sensitive data. This proactive approach protects client data from potential threats associated with Quantum computing.

How has it helped my organization?

The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele.

What needs improvement?

While the product has been instrumental in enhancing security, continuous improvement is essential. Feedback from users and ongoing technological advancements should guide the refinement of these security measures. Exploring ways to streamline the integration process and optimize performance ensures a seamless experience for developers and users.

Additionally, fostering an open dialogue with the security community and staying attuned to emerging threats aids in identifying areas for improvement. Regular updates and patches to address vulnerabilities improve the tool's longevity and effectiveness.

What do I think about the stability of the solution?

I rate the product's stability an eight out of ten. While it is generally stable, occasional downtime issues arise, particularly during increased network workload or high server demand.

What do I think about the scalability of the solution?

I rate the tool's scalability a ten out of ten. My company has 1000 users. 

How are customer service and support?

The technical support and customer service for enterprise clients have been very good. They guide the users to solutions with expertise and understanding of the issues.

How would you rate customer service and support?

Positive

How was the initial setup?

My leadership executed the tool's initial deployment with precision and efficiency. Our dedicated team ensured a seamless integration process with clear documentation and comprehensive training modules, facilitating the onboarding of our developers. Collaborating with top-tier experts from Check Point Quantum SASE contributed to a smooth implementation, with any potential challenges being proactively addressed.

As a result, the transition to these advanced security measures was carried out to minimize disruptions to ongoing operations. The overall deployment took two to three hours to complete. 

What's my experience with pricing, setup cost, and licensing?

The product's pricing model accommodates diverse needs and deployment sizes. The licensing options include perpetual licenses, requiring a one-time fee for permanent feature access but excluding future updates, and subscription licenses, which grant customers access to the latest features through ongoing subscriptions.

What other advice do I have?

I rate the overall product an eight out of ten. Its implementation has been very effective, enhancing our organization's security and increasing client confidence. This improvement has led to a broader adoption of enterprise solutions, fostering extended partnerships and growing our user base. The increased market share and client adoption further highlight the substantial return on investment (ROI) derived from the strategic integration of Check Point Quantum SASE.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Quantum SASE
June 2024
Learn what your peers think about Check Point Quantum SASE. Get advice and tips from experienced pros sharing their opinions. Updated: June 2024.
772,649 professionals have used our research since 2012.
Security Consultant at Synergy
Reseller
Top 5
An easy-to-use and set-up cloud solution for security
Pros and Cons
  • "The tool is easy to use and set up."
  • "The product has a reasonably high pricing."

    What is our primary use case?

    We use the solution for security.

    What is most valuable?

    The tool is easy to use and set up.

    What needs improvement?

    Harmony Connect has two components: one for accessing the internet and the other for accessing the corporate network. The Access intelligence lab is particularly useful because it eliminates the need to purchase a separate firewall for the branch office. Instead, you can connect the Check Point VPN, providing you with Check Point Harmony Connect firewall functionality for monitoring traffic.

    The setup is easy, but it depends on the router configuration. The router configuration, in turn, will depend on the specific releases. The configuration could be improved.

    For how long have I used the solution?

    I have been using Check Point Harmony Connect for two to three years.

    What do I think about the stability of the solution?

    The product is stable.

    What do I think about the scalability of the solution?

    What are your impressions of the scalability of this solution?

    The solution is scalable.

    Which solution did I use previously and why did I switch?

    Since I trust the Check Point security, I trust Harmony Connect.

    How was the initial setup?

    The initial setup is easy and may take a half hour to complete if you’ve experience.

    I rate the initial setup a ten out of ten, where one is difficult and ten is easy.

    What's my experience with pricing, setup cost, and licensing?

    The product has a reasonably high pricing.

    What other advice do I have?

    Overall, I rate the solution an eight out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
    Flag as inappropriate
    PeerSpot user
    Founder at Softnetx
    Real User
    Top 5
    Along with an excellent UI, the solution also provides a good UX
    Pros and Cons
    • "Check Point provides high-quality technical support. The support was pretty quick."
    • "Automation and scalability are areas where the solution lacks and needs to improve."

    What is our primary use case?

    Regarding use cases, I can say that the solution's user experience is very good. Also, the solution's UI is excellent. In general, we use it for SASE use cases, and to access VPN, ZTNA etcetera.

    What is most valuable?

    I am working on automation upstream for Harmony Connect Check Point. There are a bunch of integrations like RDP integrations and active directory integration. Also, its security policy management is seamless.

    What needs improvement?

    Automation and scalability are areas where the solution lacks and needs to improve.

    For how long have I used the solution?

    I have been using Check Point Harmony ConnectCheck Point Harmony Connect for a year. My company has a partnership with Check Point. Also, I don't remember the version of the solution I am using.

    What do I think about the stability of the solution?

    The stability of the solution is not bad. Stability-wise, I rate the solution an eight out of ten.

    What do I think about the scalability of the solution?

    There are a lot of hidden features, so I can't really give you a rating. We are working on it, so it is a work in progress.

    The scalability of the tool is pretty good. However, we need to do some work on it to improve it. Scalability-wise, I rate the solution a six or seven out of ten.

    In the next release of the solution, I would like to see more automation features.

    The number of users using the solution depends and varies from client to client. It can scale from a small and simple number of 20 to 30 users to almost 10,000. It could be more than 10,000 users. However, it could be more from other partners.

    How are customer service and support?

    Check Point provides high-quality technical support. The support was pretty quick. I rate the technical support a nine out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have been out of Cisco domain for quite some time since I used it in my previous company. I am not using high-end Cisco technologies anymore. However, I may use it in the future.

    How was the initial setup?

    I rate the setup phase an eight on a scale of one to ten, where one is difficult, and ten is an easy setup. Also, it's hard to generalize since it depends on what we have to do.

    The solution is deployed on the cloud.

    The initial deployment was done using Check Point's UI for us, so it was five hours.

    Regarding the steps for deployment, I would say that there is a deployment software that you have to onboard. Then, you have to do the initial registration, and once you do the initial registration, you'll have to integrate Azure. After Azure is integrated, you have to deploy the users for the applications.

    What's my experience with pricing, setup cost, and licensing?

    Regarding pricing, I can say that the more the number of users, the less they have to pay.

    What other advice do I have?

    I would tell others planning to use the solution that the solution has simplicity and good UX. Also, people will have to wait for future automation rollouts.

    I rate the overall solution a nine out of ten.

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Microsoft Azure
    Disclosure: My company has a business relationship with this vendor other than being a customer: partner
    PeerSpot user
    Mitesh D Patel - PeerSpot reviewer
    Senior Technical Consultant- Cyber Security at Ivalue Infosolution
    Real User
    Top 5Leaderboard
    Offers great performance and reliability
    Pros and Cons
    • "The product's initial setup phase is very simple."
    • "When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end."

    What is our primary use case?

    In our company, Quantum SASE is available for namesake in our environment since we rely on Check Point Secure Web Gateway for its firewall functionalities. Most of our company's customers use firewalls from Check Point Software, Palo Alto, or Fortinet. The simple use case of the tool for our company's customers stems from the fact that they have a general internal network or many users for which a firewall is required to secure the network traffic flow and communications that happen from outside to inside the company.

    What needs improvement?

    When it comes to Check Point Quantum SASE, though the OEM provides security, it is not 100 percent full-fledged to meet the requirements from the customers' end. There are no OEMs in the market that provide 100 percent security. The security of the product has to be improved.

    For how long have I used the solution?

    I have been using Check Point Quantum SASE for seven years.

    What do I think about the stability of the solution?

    The product's stability is very good. Stability-wise, I rate the solution a nine out of ten.

    What do I think about the scalability of the solution?

    In firewall products, scalability is not required. If you set up the two firewall tools, no scalability is required. Scalability-wise, I rate the solution a nine out of ten.

    My company deals with 20 or 30 customers of the tool.

    My company's customers extensively use the product.

    How are customer service and support?

    The support from Check Point Quantum SASE is very good, and the response from the support team is fast. The support from Check Point Quantum SASE is customer-friendly and knowledgeable about troubleshooting issues.

    How was the initial setup?

    The product's initial setup phase is very simple.

    The product's installation process consists of racking, stacking, and mounting, after which a user can directly start the appliance and configure the HA status and policies.

    The solution is deployed on an on-premises model.

    The solution can be deployed in two or three days.

    One engineer is required to take care of one single deployment process.

    What was our ROI?

    The ROI of the tool can be calculated depending on the tool's ability to be used for multiple use cases and protect the confidential data of users. It is very simple to calculate the product's ROI. If you use Check Point Quantum SASE, then your internal users are protected from outside attackers.

    What's my experience with pricing, setup cost, and licensing?

    Check Point Quantum SASE provides SASE functionalities with all the required features. Check Point Quantum SASE's price is higher than what its competitors offer. The price of the product is something that depends on the requirements, and the purchase or order value of the customers.

    The price of the tool depends on whether customers need SMTP, NGTP, or Check Point NG licenses.

    I consider the product to be a medium-priced solution. There are no additional costs attached to the tool.

    What other advice do I have?

    The solution enhances the ability of our company's remote workforce to secure access to corporate resources since we use VPN to secure work-from-home users and domain users.

    Check Point Quantum SASE offers all the features essential for threat prevention, threat emulation, threat extraction, anti-spam, and anti-malware.

    In relation to Check Point Quantum SASE, I haven't worked with the part involving WAN architecture. I only handle cybersecurity for a portfolio with respect to the LAN segment, and not WAN segment.

    I rate the tool's performance a ten out of ten.

    Check Point Quantum SASE can be described as the world's best security product without a doubt since it is a market leader in its segment.

    The performance and reliability offered by the tool depend on the customer environment, and after considering aspects like throughput, how many users, and how many concurrent connections, my company plans the sizing part of the tool.

    The value of working with the tool is good, as it can secure users, environments, and applications.

    I rate the tool a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
    Flag as inappropriate
    PeerSpot user
    Srini Krish - PeerSpot reviewer
    Business Development Sales Engineer at Orca Tech
    User
    Top 10
    Simple, easy to manage policies, and offers good reports
    Pros and Cons
    • "The reports give a simple overview of the traffic pattern within the organization."
    • "Branding could be better."

    What is our primary use case?

    The solution is predominantly used for Internet access when mobile. In the office, we have already deployed a Quantum Spark appliance, and this was focused on mobile users. 

    We don't have on-premise applications or servers, so there is no use case for Remote access. However, we were keen to try it out from an evaluation perspective by bridging to the existing Check Point gateway at the site. 

    Simplicity was needed, and importantly, we wanted something to not be too intrusive to mobile users. The interface has a few simple options, and it makes it easier.

    How has it helped my organization?

    We believe in defense in depth, and Harmony connect SASE adds another layer of protection for internet access. 

    We have already deployed the entire Harmony suite, from Email & Collab protection to Harmony Endpoint. This adds a layer on top. Being a mobile user, securing Internet access was very important, and the product's pricing was simple enough and unlike other multiple add-ons on top of the base products from other vendors.

    The reports give a simple overview of the traffic pattern within the organization. Though we don't use it to track user productivity, we can if necessary. There are reports specific to SaaS applications as well, which do come in handy.

    What is most valuable?

    The simplicity is good. It's good for consolidating security and being manageable from the Infinity portal with other Harmony solutions and makes management easy. We can use this instead of managing multiple-point solutions. It has a unified policy for private and internet access, making it easier to manage policies. 

    The weekly reports have been informative as well. We are also keen on trying clientless access to provide restricted access to applications for third-party users.

    Deployment was a breeze. We just key in the target users' email, and the rest is easy.

    What needs improvement?

    Branding could be better. Not many Check Point users realize there is a SASE offering at all. Policies could have layers as they do with their Firewalls, though I understand that's more of a functionality within the Smart dashboard. The threat prevention profiles like IPS, file, and URL protections could have more fine-tuning options.

    Though all the policies are managed from the Infinity portal, we still have to manually configure different solutions. It would be nice to know how the new XDR option will bridge this gap.

    Also, for Multi-factor authentication, there was an option for G-auth. However, I'm not sure about other forms of authentication they offer in their gateways. Bringing the backend closer to the gateway management would make it more granular.

    For how long have I used the solution?

    I've been using Harmony Connect for more than three months now. 

    What do I think about the stability of the solution?

    We haven't had any glitches or issues with it at all. It's very transparent to the user.

    What do I think about the scalability of the solution?

    It's very scalable and easy to deploy. It's scalable with users and it's scalable with the existing CP gateway deployments as well. There isn't much information on how it integrates with other end-point solutions. We had a full Check Point environment and it was clean.

    How are customer service and support?

    We haven't run into any issues so far. We did need some assistance during the initial policy configuration, and the Check Point solutions team was there to assist.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We did not use any other SASE offering before. 

    How was the initial setup?

    It's a simple setup; we just key in the end user's email address and it sends an invite to download the client. 

    What about the implementation team?

    We implemented it in-house with the assistance of Check Point's solutions team.

    What was our ROI?

    The ROI is better than using a traditional VPN to connect back to the office gateway. We needed something that was light and transparent without the hassle of having to connect manually. We aren't planning to remove the gateway yet, however, in the long run, we will consider it, and that should negate the gateway costs.

    What's my experience with pricing, setup cost, and licensing?

    Setup is a breeze. You key in the target user's email, and the rest is a click away. Pricing is competitive compared to the top players in the SASE market. 

    Also, there is no concept of add-ons which makes it easier. 

    Licensing with a minimum of 50 users could be a show-stopper for smaller organizations. However, a small company has probably got to do it with the infra in the backend to make it worthwhile.

    Which other solutions did I evaluate?

    Since we were keen on consolidating, we did not focus on multiple options.

    What other advice do I have?

    The product seems to be transparent to the users. It lacks application segmentation options which some competitors offer.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: We are Checkpoint Distributor as well but the comments are based on my experience with the product.
    PeerSpot user
    Security Engineer at Down To Earth Technologies Ltd.
    Real User
    Top 20
    The product protects organizations from phishing and malware, but the support team takes time to respond to queries
    Pros and Cons
    • "The product’s ability to block phishing sites is valuable."
    • "Sometimes, the product is very slow."

    What is our primary use case?

    I'm using the solution on my laptop and desktop in the office.

    What is most valuable?

    The product’s ability to block phishing sites is valuable. It protects me from malware.

    What needs improvement?

    The product is a bit heavy on the machine. Sometimes, the product is very slow. When we connect an external hard disk, it takes the product quite some time to go through the files and allow us to access them.

    For how long have I used the solution?

    I have been using the solution for more than six months.

    What do I think about the stability of the solution?

    I rate the tool’s stability a seven out of ten.

    What do I think about the scalability of the solution?

    The tool is quite scalable. We have around eight users.

    How are customer service and support?

    We have had a couple of issues for which we contacted the technical support team. It takes long for the team to respond. It takes some time before the initial point of contact, but after that, it is fine.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    The deployment is quite easy and fast. I rate the ease of deployment an eight out of ten. The solution is deployed on the cloud. The deployment took us an hour.

    What's my experience with pricing, setup cost, and licensing?

    The product is neither cheap nor expensive. However, it is a bit more on the expensive side. I rate the pricing a seven out of ten.

    What other advice do I have?

    People who want to use the solution must start with the minimal features possible and scale up slowly, depending on how it interacts with their system. Overall, I rate the tool a seven and a half out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    Flag as inappropriate
    PeerSpot user
    Diana Alvarado - PeerSpot reviewer
    Security Admin at a tech services company with 51-200 employees
    Real User
    Top 5Leaderboard
    Excellent product - HC modern security tool
    Pros and Cons
    • "Protection against threats like ransomware is very effective."
    • "Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us."

    What is our primary use case?

    This tool is of great help and allows us to provide security assistance to our users who work remotely. They connect from any site, secure or insecure, accessing applications and business email without protection as they are outside the company perimeter.

    It gives us granular security through web control policies, reports, and monitoring. We manage to avoid user vulnerabilities from anywhere. It is managed with Harmony Connect in the Check Point Infinity Portal, a very good tool.

    Users are quite happy with the applied security performance.

    How has it helped my organization?

    Check Point Harmony Connect has improved the protection of computers outside the office. It offers implementation that is simple. 

    Also, with the monitoring dashboard, we can make decisions to improve the control policies and web access so that we can better protect our teams.

    This tool does not require being on the same network. Everything is verified thanks to a small Check Point protection agent that is installed on the client.

    Protection against threats like ransomware is very effective.

    What is most valuable?

    We really liked the Check Point Harmony Connect tool and the monitoring, since we can make the right decisions thanks to the records observed in a simple way through the dashboard. The portal is really very intuitive.

    The policies applied to users are quite granular, which helps a lot with the differential protection of users, generating managerial profiles and normal profiles efficiently.

    We have also put VPNs into practice through harmony connect, having secure user connectivity. It is a very robust, modern, and secure tool.

    What needs improvement?

    They should include the ease of implementation or installation of the agent through an Excel list, where all the users can be loaded and added to be able to send the agent by mail.

    I would also like it if they could include more documentation from the manufacturer to be able to implement it more efficiently and follow all the best practices.

    Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us.

    For how long have I used the solution?

    We have been using this tool for approximately two years now. It is an excellent security tool to protect telecommuting users.

    What do I think about the scalability of the solution?

    This is an excellent cloud-managed Check Point tool; no server is required.

    How are customer service and support?

    Problems are always solved, however, with modern security applications, specifically those that are in the Check Point Infinity Portal, it is a little more difficult to solve with support.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We have not had a modern solution like this before. Check Point has innovated our processes.

    What's my experience with pricing, setup cost, and licensing?

    It is important to associate you company with a partner who can work with prices and documentation in order to find the security application that best suits the company's requirements.

    Which other solutions did I evaluate?

    Before acquiring any company-level security tool, we undertake the task of investigating several solutions. In this case, Check Point was the best.

    What other advice do I have?

    All Harmony solutions are excellent. I really recommend this option.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user