I like the Harmony SASE Hybrid protection model that combines on-device and cloud-based security to deliver 10x faster internet access without compromising safety. Its zero-trust private access ensures secure and granular connectivity for users whether remote or on-site. It also provides us a unified cloud dashboard that simplifies management across the network. Review collected by and hosted on G2.com.
Integration with AWS transit gateway requires extra modules and the lack of kill switch or full API support limits automation and advanced configuarations. Review collected by and hosted on G2.com.
The best things about Checkpoint can be collaborated to its approach to security and access control. the seamless integration ZTNA with SWG and on top of that threat prevention into a single cloud driven platform. the continuous device checks and real time intelligence plus monitoring gives us the user and someone who is into solution selling a confidence that it's going to protect hybrid workplaces. the ease of use is for sure the USP once the system is fully configured and up & running. Review collected by and hosted on G2.com.
The unfamiliarity with Checkpoint ecosystem can sometimes be an initial problem owing to its complexity and configurations. learning curve towards fine tuning could be new and steep for some users as reported. The solution may not be a good fit for budget conscious organizations. Review collected by and hosted on G2.com.
I found Check Point Harmony SASE extremely effective at delivering secure access to both cloud and on-premise applications. The cloud-native approach meant that users connected through a unified platform without the overheads of traditional VPN infrastructure. I particularly liked the granular control available for identity-based policies and the ease of integrating with existing security ecosystems like Microsoft and Okta. Review collected by and hosted on G2.com.
The policy setup process took longer than expected initially, mainly because there were so many options for defining access conditions. Although powerful, it needed careful planning and testing to avoid blocking legitimate business activities. Reporting and dashboarding were solid, but I would have liked even more real-time custom reporting without exporting data. Review collected by and hosted on G2.com.
1. Allows for scalability and flexibility, making it suitable for modern, distributed work environments
2. Provides seamless access to applications while maintaining high security,
3. Offers a unified dashboard for monitoring and managing security policies across all endpoints and networks, streamlining operations Review collected by and hosted on G2.com.
1. Complexity of setup
2. Higher cost
3. Steep learning curve Review collected by and hosted on G2.com.
its granular identity based access control to every application makes it more secure and also feel safe to access internet through it. Review collected by and hosted on G2.com.
since it is a new one some features from some components is not fully featured like SD-WAN.
And also a little bit complex the integration process with the legacy enviroment. Review collected by and hosted on G2.com.
Check Point is what I like best. Zero Trust Security is their all-encompassing and integrated cybersecurity strategy, which is based on the fundamental Zero Trust tenet of "never trust, always verify. Review collected by and hosted on G2.com.
It has a steep learning curve, can be difficult to setup and administer, and occasionally costs more than more straightforward options. Review collected by and hosted on G2.com.
Inexpensive solution that does exactly what we need with very few hiccups ever. Using this as a cloud VPN for users to access company network. Seamless, very easy to set up and use. Support is always responsive when I have a question. Online chat works really well when I have a quick question. We only have a dozen users that need it. It requires little maintenance. It just works. Review collected by and hosted on G2.com.
Had troubles setting it up to work with our DNS. It was only working with IP addresses and not with the names (e.g., to RDP to a server you had to use the IP address; server name wasn't working). Most of the issue was with our infrastructure, not Check Point. Support helped us get it working. Review collected by and hosted on G2.com.
Seamless cloud VPN connectivity, strong Zero Trust Network Access (ZTNA) and Secure Gateway features, and smooth integration with third-party SD-WAN solutions like Azure and Cisco Review collected by and hosted on G2.com.
Complex setup, and occasional connectivity issues. Review collected by and hosted on G2.com.
It has enhanced a unified security architecture, and it also has granular access control. Review collected by and hosted on G2.com.
Complexity in deployment and management, and cost. Review collected by and hosted on G2.com.
Their sales process sold us lies about compatibility with IOS and Android when they never had it. And I have mentioned it isn't on the roadmap anymore for next year. Review collected by and hosted on G2.com.
No Split tunneling of traffic available on Android and iOS platforms
Logs cannot be exported to external logging services.
Entra AD integration is only supported through SAML and not SCIM. SCIM process needs to be controlled manually.
No Tunnel Monitoring Logs
There is no direct Integration with the AWS transit gateway. You have to buy additional modules for this.
Network segmentation is not possible depending on the Entra group
Limited Device posture check
Client logging is not available
DLP monitoring is not available
Minimal support for iAC or Terraform. Everything is point and click, thus not supporting a baseline configuration.
No API
No Alerting for tunnel status
No Up-to-date Terraform provider
Limited egress logging
Ad-blocking and/or Malware Protection is a separate module you must purchase.
No Kill Switch Review collected by and hosted on G2.com.