Compare BetterCloud and Check Point Harmony SASE

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
BetterCloud
BetterCloud
Star Rating
(480)4.4 out of 5
Market Segments
Mid-Market (59.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us 1 User Per Year
Browse all 3 pricing plans
Check Point Harmony SASE
Check Point Harmony SASE
Star Rating
(195)4.5 out of 5
Market Segments
Mid-Market (51.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Harmony SASE
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Check Point Harmony SASE excels in providing a unified, cloud-native security solution, allowing seamless access for users working remotely. Its Zero Trust approach and strong threat prevention are frequently highlighted as key benefits, ensuring consistent protection across all devices and networks.
  • Users say BetterCloud shines in its automation capabilities, with many praising its ability to manage repetitive IT tasks without the need for coding. Reviewers appreciate how it centralizes IT services, making processes like policy enforcement and onboarding much more efficient.
  • According to verified reviews, Check Point Harmony SASE offers clear visibility into user activity and centralized management, which saves time and simplifies policy adjustments. Users have noted that this ease of management contributes to a smoother experience, especially for remote teams.
  • Reviewers mention that BetterCloud's robust security system is a standout feature, with many users feeling confident in its ability to handle various IT services effectively. The platform's focus on automation is particularly beneficial for businesses looking to streamline their operations.
  • G2 reviewers highlight that while both products have strong support ratings, BetterCloud edges out slightly with a higher quality of support score. Users have expressed satisfaction with the assistance they receive, which is crucial for navigating complex IT environments.
  • Users note that Check Point Harmony SASE maintains a slight edge in overall user satisfaction, reflected in its higher G2 Score. This suggests that while both products are well-regarded, Check Point may offer a more polished experience for users seeking comprehensive security solutions.
Pricing
Entry-Level Pricing
BetterCloud
BetterCloud for Google
Contact Us
1 User Per Year
Browse all 3 pricing plans
Check Point Harmony SASE
No pricing available
Free Trial
BetterCloud
Free Trial is available
Check Point Harmony SASE
No trial information available
Ratings
Meets Requirements
8.6
381
9.1
155
Ease of Use
8.7
392
9.1
158
Ease of Setup
8.6
332
8.7
89
Ease of Admin
8.9
342
8.9
79
Quality of Support
9.2
357
9.0
143
Has the product been a good partner in doing business?
9.1
328
8.8
80
Product Direction (% positive)
8.8
367
8.7
142
Features by Category
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
8.3
155
Not enough data
User on/off Boarding
8.1
86
|
Verified
Not enough data
8.7
124
|
Verified
Not enough data
8.5
124
|
Verified
Not enough data
8.5
123
|
Verified
Not enough data
9.1
134
|
Verified
Not enough data
8.6
106
|
Verified
Not enough data
User Maintenance
7.8
83
|
Verified
Not enough data
8.4
131
|
Verified
Not enough data
7.8
96
|
Verified
Not enough data
Governance
8.3
110
|
Verified
Not enough data
8.2
101
|
Verified
Not enough data
Administration
8.2
130
|
Verified
Not enough data
Feature Not Available
Not enough data
8.4
124
|
Verified
Not enough data
8.1
106
|
Verified
Not enough data
8.3
90
Not enough data
Tracking
9.1
65
Not enough data
8.5
65
Not enough data
7.2
24
Not enough data
Management
8.3
36
Not enough data
8.4
59
Not enough data
8.9
82
Not enough data
Insights
8.5
69
Not enough data
8.1
54
Not enough data
7.6
39
Not enough data
8.3
66
Not enough data
Agentic AI - SaaS Spend Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Unified Threat Management (UTM)Hide 8 FeaturesShow 8 Features
Not enough data
Not enough data
Security - Unified Threat Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Data Center Security SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Detection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
8.6
62
Not enough data
Administration
8.7
49
Not enough data
8.5
42
Not enough data
8.7
53
Not enough data
Governance
8.9
45
Not enough data
8.6
48
Not enough data
8.8
52
Not enough data
Security
8.4
33
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.2
33
Not enough data
8.4
22
8.1
40
Network Management
Feature Not Available
8.4
31
Feature Not Available
8.3
31
Feature Not Available
Feature Not Available
7.4
16
8.0
24
Security
9.0
17
Feature Not Available
8.7
18
8.1
24
Feature Not Available
Feature Not Available
8.3
15
Feature Not Available
Identity Management
Feature Not Available
8.2
32
Feature Not Available
Feature Not Available
8.8
15
8.1
34
Generative AI
Feature Not Available
7.6
16
Feature Not Available
7.8
16
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
7.7
6
Analysis
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Functionality
Not enough data
8.1
6
Not enough data
Not enough data
Not enough data
6.9
6
Security
Not enough data
7.5
6
Not enough data
Not enough data
Not enough data
7.8
6
Not enough data
8.1
6
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
8.5
44
Not enough data
Security
7.9
21
Not enough data
8.3
26
Not enough data
8.3
33
Not enough data
8.4
36
Not enough data
Administration
8.5
39
Not enough data
8.2
33
Not enough data
8.7
37
Not enough data
Access Control
9.0
38
Not enough data
9.0
38
Not enough data
8.3
33
Not enough data
8.6
33
Not enough data
Sensitive Data DiscoveryHide 14 FeaturesShow 14 Features
8.5
25
Not enough data
Functionality
Feature Not Available
Not enough data
8.6
18
Not enough data
7.9
15
Not enough data
7.7
13
Not enough data
Feature Not Available
Not enough data
8.6
19
Not enough data
Feature Not Available
Not enough data
8.8
23
Not enough data
8.7
21
Not enough data
9.0
24
Not enough data
Agentic AI - Sensitive Data Discovery
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
8.6
30
Administration
Not enough data
8.8
21
Not enough data
8.9
22
Not enough data
8.7
21
Protection
Not enough data
8.9
23
Not enough data
8.3
23
Not enough data
8.6
23
Not enough data
8.8
26
Monitoring
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.5
21
Not enough data
8.3
21
Insider Threat Management (ITM)Hide 9 FeaturesShow 9 Features
8.5
29
Not enough data
Functionality
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.6
25
Not enough data
8.7
26
Not enough data
8.3
24
Not enough data
Feature Not Available
Not enough data
Monitoring
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
8.2
37
Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.3
30
Monitoring
Not enough data
7.8
31
Not enough data
Feature Not Available
Not enough data
7.8
30
Protection
Not enough data
8.6
31
Not enough data
Feature Not Available
Not enough data
8.7
31
Not enough data
8.2
29
Not enough data
Not enough data
Web Content and Traffic Filtering - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Protection and Loss Prevention - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access Control and Authentication - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Performance and Management - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network as a Service (NaaS) PlatformsHide 18 FeaturesShow 18 Features
Not enough data
Not enough data
Scalability & Deployment - Network as a Service (NaaS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security & Compliance - Network as a Service (NaaS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Performance & Optimization - Network as a Service (NaaS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remote Connectivity & Access - Network as a Service (NaaS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI-Driven & Adaptive Features - Network as a Service (NaaS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Secure Access Service Edge (SASE) PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.5
17
Components - Secure Access Service Edge (SASE)
Not enough data
8.8
16
Not enough data
8.3
15
Not enough data
8.3
15
Not enough data
8.6
15
Not enough data
8.9
15
Artificial Intelligence - Secure Access Service Edge (SASE)
Not enough data
8.4
15
Not enough data
9.4
16
Not enough data
8.6
15
Agentic AI - Secure Access Service Edge (SASE) Platforms
Not enough data
8.2
15
Not enough data
8.2
16
Not enough data
8.3
15
Not enough data
8.4
15
SaaS Management Platforms (SMP)Hide 24 FeaturesShow 24 Features
8.6
9
Not enough data
App Management
8.8
8
Not enough data
9.3
9
Not enough data
8.3
6
Not enough data
7.5
6
Not enough data
8.7
9
Not enough data
8.3
8
Not enough data
Security
8.1
7
Not enough data
9.2
8
Not enough data
9.1
9
Not enough data
AI Features
8.6
6
Not enough data
8.6
6
Not enough data
Spend Management
8.5
8
Not enough data
8.9
6
Not enough data
8.6
6
Not enough data
8.3
6
Not enough data
8.3
6
Not enough data
8.6
6
Not enough data
Agentic AI - SaaS Management Platforms (SMP)
9.1
9
Not enough data
8.6
6
Not enough data
8.8
7
Not enough data
8.6
6
Not enough data
8.3
6
Not enough data
8.6
6
Not enough data
8.9
6
Not enough data
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.9
57
Usage
Not enough data
9.3
50
Not enough data
9.3
45
Not enough data
8.9
41
Not enough data
9.2
43
Not enough data
Feature Not Available
Not enough data
8.9
42
Not enough data
8.7
38
Miscellaneous
Not enough data
8.8
45
Not enough data
Feature Not Available
Not enough data
8.7
37
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
BetterCloud
BetterCloud
Small-Business(50 or fewer emp.)
12.0%
Mid-Market(51-1000 emp.)
59.5%
Enterprise(> 1000 emp.)
28.5%
Check Point Harmony SASE
Check Point Harmony SASE
Small-Business(50 or fewer emp.)
35.8%
Mid-Market(51-1000 emp.)
51.3%
Enterprise(> 1000 emp.)
12.8%
Reviewers' Industry
BetterCloud
BetterCloud
Information Technology and Services
17.1%
Computer Software
14.7%
Financial Services
6.5%
Marketing and Advertising
5.1%
Education Management
4.8%
Other
51.8%
Check Point Harmony SASE
Check Point Harmony SASE
Information Technology and Services
19.8%
Computer & Network Security
13.9%
Computer Software
10.7%
Marketing and Advertising
5.3%
Hospital & Health Care
4.8%
Other
45.5%
Alternatives
BetterCloud
BetterCloud Alternatives
Okta
Okta
Add Okta
Zluri
Zluri
Add Zluri
Torii
Torii
Add Torii
JumpCloud
JumpCloud
Add JumpCloud
Check Point Harmony SASE
Check Point Harmony SASE Alternatives
NordLayer
NordLayer
Add NordLayer
Twingate
Twingate
Add Twingate
Zscaler Internet Access
Zscaler Internet Access
Add Zscaler Internet Access
Cato SASE Cloud
Cato SASE Cloud
Add Cato SASE Cloud
Discussions
BetterCloud
BetterCloud Discussions
Do you have other means of providing support to admins?
1 Comment
Merry M.
MM
Hi Nikki! This is Merry from G2.com. BetterCloud has two areas that might be of interest to you -- 1.) BetterCloud Help Center, which is a knowledge...Read more
Using BetterCloud is easy to use, does it ever get hard?
1 Comment
Jerin R.
JR
Simplified daily operations, its never hard.Read more
What is BetterCloud used for?
1 Comment
Jonathan T.
JT
Drive - investigation, enforce document settings with wild card settings, enforce specific security for certain docs or accounts, sharing docs when owner is...Read more
Check Point Harmony SASE
Check Point Harmony SASE Discussions
What services do perimeter 81 provide?
1 Comment
Boaz A.
BA
Perimeter 81's service consists of the Zero Trust Network Platform which provides services such as SSL Inspection, Identity provider (IdP) integration,...Read more
What are the capabilities of software perimeter solution?
1 Comment
Boaz A.
BA
A Software Defined Perimeter (SDP) enables secure connectivity of remote users to the corporate network. This type of solution is also knows as Zero Trust...Read more
How does perimeter 81 work?
1 Comment
Boaz A.
BA
Perimeter 81 is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem or...Read more