What users are saying about
3 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>Score 8.2 out of 100
Based on 3 reviews and ratings
41 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>Score 8.3 out of 100
Based on 41 reviews and ratings
Attribute Ratings
- Check Point Harmony Browse is rated higher in 1 area: Likelihood to Recommend
Likelihood to Recommend
9.0
Check Point Harmony Browse
90%
1 Rating
7.5
Keeper
75%
20 Ratings
Usability
Check Point Harmony Browse
N/A
0 Ratings
9.0
Keeper
90%
1 Rating
Support Rating
Check Point Harmony Browse
N/A
0 Ratings
10.0
Keeper
100%
4 Ratings
Likelihood to Recommend
Check Point Harmony Browse
Check Point Harmony Browse is particularly well suited for protecting against the various zero-day attack vectors, which is what it is designed to do. It offers very good protection against users visiting phishing sites, malware sites, downloading or opening ransomware, and just generally providing the safety net required in a corporate environment against users visiting potentially harmful websites.

Verified User
C-Level Executive in Information Technology
Computer Software Company, 11-50 employeesKeeper
It is great for the management of passwords across organizational departments or specific cross-functional teams. The sharing feature is well suited to this. It may get harder to administer effectively (i.e., feel like you are in control) when there are many, many groups. Also, if there are groups or departments with high staff turnover, the administration efforts may get more difficult, and the chances that someone may have access to something they shouldn't increases.
Computer and Information Systems Manager
Busch SystemsRenewables & Environment, 51-200 employees
Pros
Check Point Harmony Browse
- Protection from phishing.
- protection from malware.
- protection from ransomware.
- General protection against zero-day attack vectors.

Verified User
C-Level Executive in Information Technology
Computer Software Company, 11-50 employeesKeeper
- Easy to use - you can easily access it anywhere and anytime you want (it has mobile apps, web and desktop versions)
- High level of security - 2-step authentication with your phone number
- Simple to save and get passwords and login information. Keeper fills it in for you. It may create complex passwords for you
- Syncs across all devices
Junior Business Analyst / Consultant
Customertimes CorpComputer Software, 201-500 employees
Cons
Check Point Harmony Browse
- When inspecting traffic there can be a some performance degradation.
- We have had a few instances of protections interfering with legitimate traffic. Worth the trade-off though.

Verified User
C-Level Executive in Information Technology
Computer Software Company, 11-50 employeesKeeper
- I find that Keeper could use some work with their desktop interface, a sleeker and friendlier user interface would definitely benefit them.
- Keeper doesn’t have a Security Dashboard, which makes it more complicated to evaluate the strengths and weaknesses of your passwords.
- The automatic web form filling is somewhat limited at the time, but im sure they will improve it soon.
Product Marketing Specialist
DevolutionsComputer Software, 51-200 employees
Pricing Details
Check Point Harmony Browse
General
Free Trial
—Free/Freemium Version
—Premium Consulting/Integration Services
—Entry-level set up fee?
No
Starting Price
—Check Point Harmony Browse Editions & Modules
—
Additional Pricing Details
—Keeper
General
Free Trial
Yes
Free/Freemium Version
—Premium Consulting/Integration Services
—Entry-level set up fee?
No
Starting Price
$0
Keeper Editions & Modules
Edition
Keeper Business | $3.751 |
---|---|
Keeper Enterprise | Contact Keeper for pricing |
- per user, per month
- none
Additional Pricing Details
—Usability
Check Point Harmony Browse
No score
No answers yet
No answers on this topic
Keeper
Keeper 9.0
Based on 1 answer
It's just easy to use, plain and simple. It has the complexity and user-interface that gives you confidence in its build but the ease-of-use that keep things from getting too complicated. A huge plus when you have to onboard new members of the team or summer interns when you need them to step in and make orders on your behalf.

Verified User
Manager in Marketing
Real Estate Company, 201-500 employeesSupport Rating
Check Point Harmony Browse
No score
No answers yet
No answers on this topic
Keeper
Keeper 10.0
Based on 4 answers
Because it is so good. It always works, has not crashed even in 3 years; I have a lot of data in it (never any problems).
Specialist VR360 Photography Company
SitgesVRPhotography, 1-10 employees
Alternatives Considered
Check Point Harmony Browse
We were already in the Check Point ecosystem and therefore did not look into alternatives like CrowdStrike or Kaspersky. Looking back, Check Point stacks up very nicely with the competitors on the market in terms of features, but I can't speak to actual real work performance having not used the others.

Verified User
C-Level Executive in Information Technology
Computer Software Company, 11-50 employeesKeeper
I have used the Apple cloud, but if you forget your password into that, once again, you’re at the mercy of calling customer service. With Keeper, you can use the thumbprint option to log on, and there’s any of your needed passwords. It’s fast and simple, and you don’t have to wait online to unlock the app you’ve locked yourself out of.
Senior Schedule Maintenance Coordinator
Kaiser PermanenteHospital & Health Care, 10,001+ employees
Return on Investment
Check Point Harmony Browse
- Improved security posture overall with reduced risk.
- Relatively low cost and easy implementation easily recouped by allowing us to shift resources to other priorities and away from manual monitoring tasks.
- Peace of mind for our users knowing they have a safety net in place.

Verified User
C-Level Executive in Information Technology
Computer Software Company, 11-50 employeesKeeper
- The spreadsheets and printed papers being passed around the office with passwords on them have gone! This is a huge security hole plugged.
- Users actively use the software which says something - it is easy to use and intuitive. When software is not intuitive, it tends to not get used.
- It gives IT control over who does what with passwords, and while difficult to quantify it is certainly a dramatically positive impact on the organization.
Computer and Information Systems Manager
Busch SystemsRenewables & Environment, 51-200 employees