We performed a comparison between Check Point Quantum SASE and Perimeter 81 based on real PeerSpot user reviews.
Find out in this report how the two Secure Access Service Edge (SASE) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The solution is stable."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The tool's implementation marks a significant step forward among our enterprise clients, showcasing our commitment to staying ahead in the rapidly evolving landscape of blockchain technology. The robust security measures implemented not only protect the integrity of financial transactions but also contribute to maintaining the trust and credibility of our clientele."
"Protection against threats like ransomware is very effective."
"The product has a reasonably high pricing."
"The application control and granular access feature are very easy to use, intuitive, and effective."
"I find it very easy to implement and deploy in the organization."
"It has centralized management that allows administrators to supervise and control the security of the entire network."
"The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment."
"The characteristics that I have liked the most are the ease of implementation and administration."
"The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way."
"Scaling Perimeter 81 was easy to do."
"Even after restarting, it tries to quickly reestablish connection which is very helpful."
"Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.)."
"It is a scalable solution."
"Providing access and security allows our company employees to work from home and remotely."
"Our operators can work from home without any problems."
"Perimeter 81 is very pretty."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"Zero Trust Network Access can be a security breach if not used correctly."
"My customers want more remote functionality. They need another routing option after they connect to the enterprise intranet. For example, let's say a user tries to connect to a remote branch office and headquarters through Harmony Connect. They need a local breakout after connecting to the headquarters, especially in China. They need to put local breakout in the Chinese internet. The current version cannot do something like this."
"As it is a new market solution, I still face some instabilities in access at certain times of the day when I have more than 150 users using it simultaneously."
"Regarding the support, the schedules can be improved since they are generally in another geographical area, and it is difficult to solve the problems with the time differences between them and us."
"The integration from a management perspective could be improved so that the management can, from an existing Check Point firewall, manage a Harmony firewall through one pane of glass."
"In mobile devices, there is also sometimes a bit of tear when it is via LTE, however, that must be due to connectivity."
"Support is one of the points of improvement."
"The access to the portal should be faster. It shouldn't crash a lot."
"The overall UI could be improved and updated to bring a simpler feel to the application."
"In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality."
"Its initial setup process is complex for a hybrid environment."
"One of our challenges is ensuring the security of our cloud-based operations."
"Offering in-app explanations detailing what each feature does, its benefits and potential use cases can help users better understand and utilize the tool to its full potential."
"It would be nice to have a notification sound when Perimeter81 disconnects, as I sometimes don't notice when the icon shows that it's disconnected, and I end up wasting time waiting for my browser to load a page that shows an error, usually error 404."
"In the future, maybe P81 can improve the network traffic balancing and redundancy."
"If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on."
Check Point Quantum SASE is ranked 8th in Secure Access Service Edge (SASE) with 31 reviews while Perimeter 81 is ranked 6th in Secure Access Service Edge (SASE) with 22 reviews. Check Point Quantum SASE is rated 8.4, while Perimeter 81 is rated 9.2. The top reviewer of Check Point Quantum SASE writes "Very agile with a granular level of control over users ". On the other hand, the top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". Check Point Quantum SASE is most compared with Prisma Access by Palo Alto Networks, Cisco Umbrella, Netskope and Zscaler Zero Trust Exchange, whereas Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Fortinet FortiClient. See our Check Point Quantum SASE vs. Perimeter 81 report.
See our list of best Secure Access Service Edge (SASE) vendors.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.