Check Point Harmony SASE vs. Cisco Secure Access

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Harmony SASE
Score 9.3 out of 10
N/A
Check Point Harmony SASE, based on Perimeter 81 which was acquired by Check Point in late 2023, is designed to simplify secure network, cloud and application access for the modern and distributed workforce.
$10
per month per user
Cisco Secure Access
Score 8.7 out of 10
N/A
A cloud-delivered security service edge (SSE) solution, grounded in zero trust, designed to give users an exceptional user experience and protected access from any device to anywhere.N/A
Pricing
Check Point Harmony SASECisco Secure Access
Editions & Modules
Essentials
$10
per month per user
Premium
$15
per month per user
Premium Plus
$20
per month per user
Enterprise
Custom
No answers on this topic
Offerings
Pricing Offerings
Harmony SASECisco Secure Access
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details+$50 per month per gateway. Discounts available for annual pricing.
More Pricing Information
Community Pulse
Check Point Harmony SASECisco Secure Access
Features
Check Point Harmony SASECisco Secure Access
Identity Management
Comparison of Identity Management features of Product A and Product B
Check Point Harmony SASE
10.0
1 Ratings
12% above category average
Cisco Secure Access
-
Ratings
Multi-Factor Authentication10.01 Ratings00 Ratings
Zero Trust Security
Comparison of Zero Trust Security features of Product A and Product B
Check Point Harmony SASE
9.8
1 Ratings
11% above category average
Cisco Secure Access
-
Ratings
Continuous Verification10.01 Ratings00 Ratings
Secure Web Gateways10.01 Ratings00 Ratings
Segmentation Leveraging9.01 Ratings00 Ratings
Admin Access Control10.01 Ratings00 Ratings
Best Alternatives
Check Point Harmony SASECisco Secure Access
Small Businesses
ThreatLocker
ThreatLocker
Score 9.4 out of 10

No answers on this topic

Medium-sized Companies
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.3 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.3 out of 10
Enterprises
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.3 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point Harmony SASECisco Secure Access
Likelihood to Recommend
7.9
(2 ratings)
8.6
(11 ratings)
User Testimonials
Check Point Harmony SASECisco Secure Access
Likelihood to Recommend
Check Point Software Technologies
I'd suggest that Perimeter81 is recommended when you want something that is easy to administrate, with little maintenance, unlike a VPN/secure network that you host and manage internally. We've had incidents when there has been downtime at Perimeter81, which has effectively locked us out of some of our secure services (anything locked down via IP). They have made improvements to their infrastructure and it seems to have improved in recent months, but this is something to keep in mind for critical connections
Read full review
Cisco
Cisco Secure Access has allowed us to monitor and adjust access to web-based resources. We have been able to manage and provide granular rules to allow access to required resources. We are now transitioning to a more zero-trust approach, and so far, the product has demonstrated its capabilities, allowing us to move forward with this approach.
Read full review
Pros
Check Point Software Technologies
  • Simple easy to read icon.
  • You can hover over and see if you are logged in via the systems tray on your computer.
  • Easy to switch between regions around the world.
Read full review
Cisco
  • It offers various security capabilities, including ZTNA, FWaaS, VPNaaS, DNS Security, Data loss prevention, advanced malware protection, etc., all in a single comprehensive solution.
  • It enables your employees to access SaaS applications and internet securely
  • By isolating sensitive applications and data into smaller segments, it reduces potential damage from a security breach.
Read full review
Cons
Check Point Software Technologies
  • Customer support was lacking before, now seems better.
  • Had much difficulty using Chrome as my browser to install the app.
  • Increase the throughput speeds at time would be nicer.
Read full review
Cisco
  • The integration into the Meraki dashboard is not yet complete, you have to use several interfaces to complete the configuration, the services should be fully integrated to provide better handling
  • Integration of firewall rules onprem and cloud should be standardized
  • Better user management / import
Read full review
Alternatives Considered
Check Point Software Technologies
In the beginning, it was a bit rough getting it to work and getting any kind of quality support from customer service. But recently they really improved their service and customer service. I believe they raise 100M in new funding which provides them the resources to make a better product with better tools and a better help desk.
Read full review
Cisco
We selected Cisco Secure Access due to the intuitive GUI and ease of use. The agent deployment was simple and easy to maintain. Any additional updates or changes were quickly deployed, and users found the customized block messages useful. From analytics and management, the Secure Access Product has been simple to manage and provides a robust level of security and flexibility that we haven't found in any other product yet.
Read full review
Return on Investment
Check Point Software Technologies
  • I think it is just a cost of doing business.
  • I don't think the cost is too prohibitive.
  • We also use it as an example of what a small cost can provide big protection for your security.
Read full review
Cisco
  • It helped us minimize potential damage from a security breach by isolating sensitive applications and data into smaller segments
  • It offered us seamless and secure access to SaaS applications and the internet
  • It provides us a unified console for managing all security components from one place.
Read full review
ScreenShots