# Check Point SASE vs CyberArk Workforce Identity Comparison
---
## AI Generated Summary
- **G2 reviewers report** that both CyberArk Workforce Identity and Check Point Harmony SASE have received high ratings for user satisfaction, with both products scoring a solid 4.5 stars. However, CyberArk&#39;s recent user feedback highlights its intuitive platform and ease of implementation, with one user stating it was the &quot;easiest implementation&quot; they have ever participated in.
- **Users say** that CyberArk excels in streamlining the user access review process, significantly reducing reliance on spreadsheets. This modern UI and efficient access review capabilities are praised, making it a strong choice for organizations focused on access management.
- **Reviewers mention** that Check Point Harmony SASE stands out for its unified, cloud-native security approach, providing seamless access for remote users. Its Zero Trust model and strong threat prevention are particularly appreciated, ensuring consistent protection across various devices and networks.
- **According to verified reviews** , Check Point Harmony SASE offers centralized management that simplifies policy adjustments and provides clear visibility into user activity. Users appreciate that they can manage everything from one console without feeling a performance hit, which is crucial for maintaining productivity.
- **G2 reviewers highlight** that while both products have strong support ratings, CyberArk&#39;s customer support is noted for being particularly responsive and effective, with users expressing satisfaction in their interactions. This can be a deciding factor for organizations that prioritize support during implementation and ongoing use.
- **Users indicate** that while CyberArk is highly effective for access reviews, Check Point Harmony SASE may be more suitable for organizations looking for comprehensive security solutions that integrate seamlessly with existing tools. This makes it a compelling option for businesses prioritizing security in a remote work environment.



| | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Star Rating** | 4.5 out of 5 | 4.5 out of 5 | 
| **Total Reviews** | 215 | 130 | 
| **Largest Market Segment** | Mid-Market (48.6% of reviews) | Mid-Market (46.8% of reviews) | 
| **Entry Level Price** | No pricing available | Starting at $3.00 1 per user per month | 

---
## Top Pros & Cons

### Check Point SASE

Pros:
- Security (46 reviews)
- Ease of Use (39 reviews)

Cons:
- Complex Implementation (28 reviews)
- Complex Configuration (24 reviews)

### CyberArk Workforce Identity

Pros:
- Ease of Use (14 reviews)
- Access Management (6 reviews)

Cons:
- Missing Features (4 reviews)
- Integration Issues (2 reviews)

---
## Ratings Comparison
| Rating | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
  | **Meets Requirements** | 9.0 (167 reviews) | 9.0 (117 reviews) | 
  | **Ease of Use** | 9.0 (170 reviews) | 8.8 (120 reviews) | 
  | **Ease of Setup** | 8.4 (101 reviews) | 8.4 (100 reviews) | 
  | **Ease of Admin** | 8.9 (86 reviews) | 8.6 (100 reviews) | 
  | **Quality of Support** | 8.9 (155 reviews) | 9.0 (115 reviews) | 
  | **Has the product been a good partner in doing business?** | 8.8 (87 reviews) | 9.0 (98 reviews) | 
  | **Product Direction (% positive)** | 8.7 (153 reviews) | 9.2 (120 reviews) | 

---
## Pricing

### Check Point SASE

#### Entry-Level Pricing

No pricing available

#### Free Trial

Yes

### CyberArk Workforce Identity

#### Entry-Level Pricing

Plan: CyberArk Adaptive MFA

Price: Starting at $3.00 1 per user per month

Key Features:
- MFA Everywhere
- Authentication Factors
- Context-based

[Browse all 5 editions](https://www.g2.com/products/cyberark-workforce-identity/pricing)

#### Free Trial

Yes

---
## Features Comparison By Category

### Single Sign-On (SSO)

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | 9.1/10 | 38 |

#### Authentication Options

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Authentication User experience** | Not enough data | 9.1 (36 reviews) | 
| **Supports Required Authentication systems** | Not enough data | 9.2 (34 reviews) | 
| **Multi-Factor Authentication** | Not enough data | 9.1 (29 reviews) | 
| **Supports Required Authentication Methods/Protocols** | Not enough data | 9.1 (31 reviews) | 
| **Federation/SAML support (idp)** | Not enough data | 9.3 (30 reviews) | 
| **Federation/SAML support (sp)** | Not enough data | 9.2 (21 reviews) | 

#### Access Control Types

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Endpoint access** | Not enough data | 8.9 (23 reviews) | 
| **Local Access** | Not enough data | 9.2 (25 reviews) | 
| **Remote Access** | Not enough data | 9.1 (24 reviews) | 
| **Partner Access** | Not enough data | 9.2 (14 reviews) | 
| **Supports BYOD users** | Not enough data | 8.9 (19 reviews) | 

#### Administration

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Ease of installation on server** | Not enough data | 9.5 (30 reviews) | 
| **Password Policy Enforcement** | Not enough data | 9.4 (29 reviews) | 
| **Administration Console** | Not enough data | 9.3 (34 reviews) | 
| **Ease of connecting applications** | Not enough data | 9.0 (34 reviews) | 
| **Self Service Password Administration** | Not enough data | 9.1 (27 reviews) | 

#### Platform

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Multiple Operating system support** | Not enough data | 9.2 (31 reviews) | 
| **Multi-Domain Support** | Not enough data | 9.4 (21 reviews) | 
| **Cross Browser support** | Not enough data | 9.3 (30 reviews) | 
| **Fail over protection** | Not enough data | 8.8 (20 reviews) | 
| **Reporting** | Not enough data | 8.3 (28 reviews) | 
| **Auditing** | Not enough data | 8.6 (28 reviews) | 
| **Third Party Web Services support** | Not enough data | 8.8 (19 reviews) | 

### User Provisioning and Governance Tools

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | 8.2/10 | 42 |

#### User on/off Boarding

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Self Service Access requests** | Not enough data | 7.9 (21 reviews) ✓ Verified | 
| **Smart/Automated Provisioning** | Not enough data | 8.3 (34 reviews) ✓ Verified | 
| **Role Management** | Not enough data | 8.8 (38 reviews) ✓ Verified | 
| **Policy Management** | Not enough data | 8.4 (34 reviews) ✓ Verified | 
| **Access Termination** | Not enough data | 8.7 (34 reviews) ✓ Verified | 
| **Approval Workflows** | Not enough data | 7.4 (23 reviews) ✓ Verified | 

#### User Maintenance

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Self Service Password Reset** | Not enough data | 9.1 (29 reviews) ✓ Verified | 
| **Bulk Changes** | Not enough data | 8.2 (29 reviews) ✓ Verified | 
| **Bi-directional Identity Synchronization** | Not enough data | 8.4 (27 reviews) ✓ Verified | 

#### Governance

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Identifies and Alerts for Threats** | Not enough data | 7.9 (26 reviews) ✓ Verified | 
| **Compliance Audits** | Not enough data | 8.5 (26 reviews) ✓ Verified | 

#### Administration

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Reporting** | Not enough data | 7.9 (37 reviews) ✓ Verified | 
| **Mobile App** | Not enough data | 6.9 (24 reviews) ✓ Verified | 
| **Ease of set up for target systems** | Not enough data | 8.2 (38 reviews) ✓ Verified | 
| **APIs** | Not enough data | 7.7 (25 reviews) ✓ Verified | 

### Multi-Factor Authentication (MFA)

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Authentication type

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **SMS-Based** | Not enough data | Not enough data | 
| **Voice-Based Telephony** | Not enough data | Not enough data | 
| **Email-Based** | Not enough data | Not enough data | 
| **Hardware Token-Based** | Not enough data | Not enough data | 
| **Software Token** | Not enough data | Not enough data | 
| **Biometric Factor** | Not enough data | Not enough data | 
| **Mobile-Push** | Not enough data | Not enough data | 
| **Risk-Based Authentication** | Not enough data | Not enough data | 

#### Functionality

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Multi-Device Sync** | Not enough data | Feature Not Available | 
| **Backup** | Not enough data | Feature Not Available | 

#### Implementation

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Easy Setup** | Not enough data | Not enough data | 
| **Mobile SDK** | Not enough data | Not enough data | 
| **Web SDK** | Not enough data | Not enough data | 

### Unified Threat Management (UTM)

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Security - Unified Threat Management

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Antivirus** | Not enough data | Not enough data | 
| **Whitelists** | Not enough data | Not enough data | 
| **Antispam Filtering** | Not enough data | Not enough data | 
| **Content Filtering** | Not enough data | Not enough data | 
| **Web Filtering** | Not enough data | Not enough data | 
| **Firewall** | Not enough data | Not enough data | 

#### Administration

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Reports &amp; Analytics** | Not enough data | Not enough data | 
| **Dashboard** | Not enough data | Not enough data | 

### Data Center Security Solutions

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Prevention

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Intrusion Prevention** | Feature Not Available | Not enough data | 
| **Firewall** | Feature Not Available | Not enough data | 
| **Encryption** | Feature Not Available | Not enough data | 
| **Security hardening** | Feature Not Available | Not enough data | 
| **Cloud Data Protection** | Feature Not Available | Not enough data | 

#### Detection

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Intrusion Detection** | Not enough data | Not enough data | 
| **Security Monitoring** | Not enough data | Not enough data | 
| **Anti-Malware / Malware Detection** | Not enough data | Not enough data | 

#### Administration

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Compliance** | Not enough data | Not enough data | 
| **Administration Console -** | Not enough data | Not enough data | 
| **API / integrations** | Not enough data | Not enough data | 

### Zero Trust Networking

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | 8.1/10 | 42 |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Network Management

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Network Segmentation** | 8.4 (32 reviews) | Feature Not Available | 
| **Network Mapping** | 8.4 (33 reviews) | Feature Not Available | 
| **API/Integrations** | 8.1 (25 reviews) | Feature Not Available | 

#### Security

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Security Automation** | Feature Not Available | Not enough data | 
| **Application Security** | 8.1 (25 reviews) | Not enough data | 
| **Workload Protection** | Feature Not Available | Not enough data | 
| **Data Protection** | Feature Not Available | Not enough data | 

#### Identity Management

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Adaptive Access Control** | 8.3 (33 reviews) | Not enough data | 
| **Identity Scoring** | Feature Not Available | Not enough data | 
| **User Monitoring** | 8.1 (35 reviews) | Not enough data | 

#### Generative AI

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **AI Text Summarization** | 7.6 (16 reviews) | Not enough data | 
| **AI Text Generation** | 7.8 (16 reviews) | Not enough data | 

### Cloud Access Security Broker (CASB)

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | 7.7/10 | 7 |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Analysis

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **User Analytics** | Feature Not Available | Not enough data | 
| **Cloud Gap Analytics** | Feature Not Available | Not enough data | 
| **Anomoly Detection** | Feature Not Available | Not enough data | 

#### Functionality

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **SSO** | 8.1 (6 reviews) | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | 
| **Mobile Device Mangement** | 7.1 (7 reviews) | Not enough data | 

#### Security

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Governance** | 7.5 (6 reviews) | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | 
| **Data Encryption/Security** | 7.8 (6 reviews) | Not enough data | 
| **Access Control** | 8.1 (6 reviews) | Not enough data | 

### Cloud Directory Services

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Access Control

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Role Management** | Not enough data | Not enough data | 
| **Access Termination** | Not enough data | Not enough data | 
| **Remote Access** | Not enough data | Not enough data | 
| **Partner Access** | Not enough data | Not enough data | 

#### Administration

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Smart/Automated Provisioning** | Not enough data | Not enough data | 
| **Policy Management** | Not enough data | Not enough data | 
| **On-premise identity repositories supported** | Not enough data | Not enough data | 
| **Ease of Connecting Applications** | Not enough data | Not enough data | 

#### Functionality

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **SSO** | Not enough data | Not enough data | 
| **Multi-Factor Authentication** | Not enough data | Not enough data | 
| **Supports Required Authentication systems** | Not enough data | Not enough data | 

### Biometric Authentication

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Integration

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Uses Open Standards** | Not enough data | Not enough data | 
| **Mobile SDK** | Not enough data | Not enough data | 
| **Workforce Authentication** | Not enough data | Not enough data | 
| **Customer Authentication** | Not enough data | Not enough data | 

#### Administration

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Encryption** | Not enough data | Not enough data | 
| **Audit Trails** | Not enough data | Not enough data | 
| **Regulatory Compliance** | Not enough data | Not enough data | 

### Risk-Based Authentication (RBA)

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Administration

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Bi-Directional Identity Synchronization** | Not enough data | Not enough data | 
| **Policy Management** | Not enough data | Not enough data | 
| **Cloud Directory** | Not enough data | Not enough data | 
| **Application Integrations** | Not enough data | Not enough data | 

### Customer Identity and Access Management (CIAM)

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Functionality

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Self-registration and self-service** | Not enough data | Not enough data | 
| **Authentication** | Not enough data | Not enough data | 
| **Scalability** | Not enough data | Not enough data | 
| **Consent and preference management** | Not enough data | Not enough data | 
| **Social login** | Not enough data | Not enough data | 
| **Customer data linking** | Not enough data | Not enough data | 

#### AI Authentication Risk Management - Customer Identity and Access Management (CIAM)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Adaptive MFA** | Not enough data | Not enough data | 
| **Anomaly Detection** | Not enough data | Not enough data | 
| **Fraudulent Login Detection** | Not enough data | Not enough data | 
| **Adaptive Authentication Policies** | Not enough data | Not enough data | 
| **Risk-Based Authentication** | Not enough data | Not enough data | 

#### AI Biometric &amp; Behavioral Analysis - Customer Identity and Access Management (CIAM)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Behavioral Biometric Analysis** | Not enough data | Not enough data | 
| **Liveness Detection** | Not enough data | Not enough data | 

#### AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Account Recovery Assistants** | Not enough data | Not enough data | 
| **Constraint Enforcement** | Not enough data | Not enough data | 

### Passwordless Authentication

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Functionality

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **FIDO2-compliant** | Not enough data | Not enough data | 
| **Works with hardware security keys** | Not enough data | Not enough data | 
| **Multiple authentication methods** | Not enough data | Not enough data | 
| **Offline or no-phone solution** | Not enough data | Not enough data | 

### Identity and Access Management (IAM)

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | 8.3/10 | 21 |

#### Functionality

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **User provisioning** | Not enough data | 8.7 (10 reviews) | 
| **Password manager** | Not enough data | 9.4 (8 reviews) | 
| **Single Sign-on** | Not enough data | 9.0 (12 reviews) | 
| **Enforces policies** | Not enough data | 8.9 (11 reviews) | 
| **Authentication** | Not enough data | 8.8 (11 reviews) | 
| **Multi-factor authentication** | Not enough data | 8.6 (11 reviews) | 

####  Type

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **On-premises solution** | Not enough data | Feature Not Available | 
| **Cloud-solution** | Not enough data | 8.7 (19 reviews) | 

####  Reporting

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Tracking** | Not enough data | 8.9 (18 reviews) | 
| **Reporting** | Not enough data | 8.4 (18 reviews) | 
| **Access &amp; Permission Change Reporting** | Not enough data | Not enough data | 
| **Compliance &amp; Audit Trail Export** | Not enough data | Not enough data | 

#### Authentication &amp; Authorization - Identity and Access Management (IAM)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Adaptive &amp; Contextual Access Control** | Not enough data | Not enough data | 

#### Administration &amp; Governance - Identity and Access Management (IAM)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Identity Lifecycle Management** | Not enough data | Not enough data | 
| **Self‑Service Account Management** | Not enough data | Not enough data | 

#### Generative AI - Identity and Access Management (IAM)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **AI‑Driven Access Anomaly Detection** | Not enough data | Not enough data | 
| **Automated Policy Tuning** | Not enough data | Not enough data | 
| **Predictive Role Recommendations** | Not enough data | Not enough data | 

### Software-Defined Perimeter (SDP)

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | 8.5/10 | 31 |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Administration

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Network Segmentation** | 8.8 (21 reviews) | Not enough data | 
| **Scalability** | 8.7 (23 reviews) | Not enough data | 
| **Global Access** | 8.7 (21 reviews) | Not enough data | 

#### Protection

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Policy Enforcement** | 8.8 (24 reviews) | Not enough data | 
| **Security Audit** | 8.1 (24 reviews) | Not enough data | 
| **Access Control** | 8.5 (24 reviews) | Not enough data | 
| **User Authentication** | 8.6 (27 reviews) | Not enough data | 

#### Monitoring

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Compliance Monitoring** | Feature Not Available | Not enough data | 
| **Vulnerability Monitoring** | Feature Not Available | Not enough data | 
| **Configuration Monitoring** | 8.3 (22 reviews) | Not enough data | 
| **Observability** | 8.3 (21 reviews) | Not enough data | 

### Cloud Edge Security

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | 8.4/10 | 39 |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Management

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Multicloud Management** | Feature Not Available | Not enough data | 
| **DLP Configuration** | 8.5 (16 reviews) | Not enough data | 
| **Dynamic Scaling** | Feature Not Available | Not enough data | 
| **Policy Enforcement** | 8.2 (31 reviews) | Not enough data | 

#### Monitoring

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Data Center Networking** | Feature Not Available | Not enough data | 
| **Multicloud Visibility** | 8.2 (15 reviews) | Not enough data | 
| **Anomaly Detection** | Feature Not Available | Not enough data | 

#### Protection

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Firewall-as-a-Service** | 8.6 (32 reviews) | Not enough data | 
| **Cloud Application Brokerage** | Feature Not Available | Not enough data | 
| **Web Gateway** | 8.7 (32 reviews) | Not enough data | 
| **Adaptive Access Control** | 8.2 (29 reviews) | Not enough data | 

### Identity Threat Detection and Response (ITDR)

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Monitoring

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Investigate** | Not enough data | Not enough data | 
| **Monitoring** | Not enough data | Not enough data | 
| **Misconfigurations** | Not enough data | Not enough data | 
| **Integrate** | Not enough data | Not enough data | 
| **Visability** | Not enough data | Not enough data | 

#### Remediation

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Remediation** | Not enough data | Not enough data | 
| **Audit** | Not enough data | Not enough data | 

### Secure Web Gateways

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Web Content and Traffic Filtering - Secure Web Gateways

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **SSL/TLS Inspection** | Not enough data | Not enough data | 
| **Content Filtering** | Not enough data | Not enough data | 
| **URL Filtering** | Not enough data | Not enough data | 
| **Real-Time Traffic Inspection** | Not enough data | Not enough data | 
| **Ad and Tracker Blocking** | Not enough data | Not enough data | 

#### Data Protection and Loss Prevention - Secure Web Gateways

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Data Loss Prevention (DLP)** | Not enough data | Not enough data | 
| **Phishing Protection** | Not enough data | Not enough data | 
| **Malware Protection** | Not enough data | Not enough data | 
| **Cloud Access Security** | Not enough data | Not enough data | 

#### Access Control and Authentication - Secure Web Gateways

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Application Control** | Not enough data | Not enough data | 
| **Authentication and Access Control** | Not enough data | Not enough data | 
| **User and Group Policies** | Not enough data | Not enough data | 

#### Performance and Management - Secure Web Gateways

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Customizable Policy Enforcement** | Not enough data | Not enough data | 
| **Bandwidth Management** | Not enough data | Not enough data | 
| **Integration Capabilities** | Not enough data | Not enough data | 
| **Reporting and Logging** | Not enough data | Not enough data | 
| **Threat Intelligence Integration** | Not enough data | Not enough data | 

### Network as a Service (NaaS) Platforms

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Scalability &amp; Deployment - Network as a Service (NaaS)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Cloud-Based Management** | Not enough data | Not enough data | 
| **Multi-Cloud &amp; Hybrid Support** | Not enough data | Not enough data | 
| **On-Demand Scalability** | Feature Not Available | Not enough data | 

#### Security &amp; Compliance - Network as a Service (NaaS)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Integrated Security Features** | Not enough data | Not enough data | 
| **Compliance &amp; Regulatory Support** | Not enough data | Not enough data | 
| **DDoS Protection &amp; Threat Intelligence** | Not enough data | Not enough data | 

#### Network Performance &amp; Optimization - Network as a Service (NaaS)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Quality of Service (QoS) &amp; Analytics** | Not enough data | Not enough data | 
| **SD-WAN Functionality** | Not enough data | Not enough data | 
| **Zero-Touch Provisioning** | Not enough data | Not enough data | 

#### Remote Connectivity &amp; Access - Network as a Service (NaaS)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **AI-Powered Policy Management** | Not enough data | Not enough data | 
| **Adaptive Network Security** | Not enough data | Not enough data | 
| **AI-Driven Network Optimization** | Not enough data | Not enough data | 
| **Secure Remote Access** | Not enough data | Not enough data | 
| **5G &amp; Private LTE Support** | Not enough data | Not enough data | 
| **Edge Computing Integration** | Not enough data | Not enough data | 

#### AI-Driven &amp; Adaptive Features - Network as a Service (NaaS)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **AI-Powered Policy Management** | Not enough data | Not enough data | 
| **Adaptive Network Security** | Not enough data | Not enough data | 
| **AI-Driven Network Optimization** | Not enough data | Not enough data | 

### Secure Access Service Edge (SASE) Platforms

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | 8.6/10 | 27 |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Components - Secure Access Service Edge (SASE)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Zero Trust Network Access (ZTNA)** | 9.0 (22 reviews) | Not enough data | 
| **Wide Area Network (WAN)** | 8.3 (19 reviews) | Not enough data | 
| **Cloud Access Security Broker (CASB)** | 8.5 (17 reviews) | Not enough data | 
| **Secure Web Gateway (SWG)** | 8.9 (19 reviews) | Not enough data | 
| **Firewall as a Service** | 9.0 (17 reviews) | Not enough data | 

#### Artificial Intelligence - Secure Access Service Edge (SASE)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Predictive Capabilities** | 8.4 (15 reviews) | Not enough data | 
| **Real-Time Threat Detection** | 9.4 (16 reviews) | Not enough data | 
| **Automation** | 8.6 (15 reviews) | Not enough data | 

#### Agentic AI - Secure Access Service Edge (SASE) Platforms

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Autonomous Task Execution** | 8.2 (15 reviews) | Not enough data | 
| **Cross-system Integration** | 8.3 (17 reviews) | Not enough data | 
| **Proactive Assistance** | 8.3 (15 reviews) | Not enough data | 
| **Decision Making** | 8.4 (15 reviews) | Not enough data | 

### User and Entity Behavior Analytics (UEBA)

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Agentic AI - User and Entity Behavior Analytics (UEBA)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | 

#### Analysis

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Continuous Analysis** | Not enough data | Not enough data | 
| **Behavioral Analysis** | Not enough data | Not enough data | 
| **Data Context** | Not enough data | Not enough data | 
| **Activity Logging** | Not enough data | Not enough data | 

#### Detection

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Anomaly Detection** | Not enough data | Not enough data | 
| **Incident Alerts** | Not enough data | Not enough data | 
| **Activity Monitoring** | Not enough data | Not enough data | 

### AWS Marketplace

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Agentic AI - AWS Marketplace

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | 

### Secure Service Edge (SSE) Solutions

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Components - Secure Service Edge (SSE)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Secure Web Gateway (SWG)** | Not enough data | Not enough data | 
| **Firewall as a Service** | Not enough data | Not enough data | 
| **Zero Trust Network Access (ZTNA)** | Not enough data | Not enough data | 
| **Cloud Access Security Broker (CASB)** | Not enough data | Not enough data | 

#### Artificial Intelligence -Secure Service Edge (SSE)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Automation** | Not enough data | Not enough data | 
| **Predictive Capabilities** | Not enough data | Not enough data | 
| **Real-Time Threat Detection** | Not enough data | Not enough data | 

#### Agentic AI - Secure Service Edge (SSE)

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Decision Making** | Not enough data | Not enough data | 
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Cloud Visibility

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | 

#### Security

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Data Security** | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | 

#### Identity

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **SSO** | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | 

### Business VPN

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | 8.9/10 | 58 |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Usage

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Multi-Device Usage** | 9.2 (51 reviews) | Not enough data | 
| **Multiple Concurrent Connections** | 9.2 (46 reviews) | Not enough data | 
| **Protocol Choices** | 8.9 (41 reviews) | Not enough data | 
| **Unlimited Bandwidth** | 9.1 (44 reviews) | Not enough data | 
| **No Log Storage** | Feature Not Available | Not enough data | 
| **Varied Server Locations** | 8.8 (43 reviews) | Not enough data | 
| **Unlimited Server Switches** | 8.6 (39 reviews) | Not enough data | 

#### Miscellaneous

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Live Customer Support** | 8.7 (46 reviews) | Not enough data | 
| **Open Source Code** | Feature Not Available | Not enough data | 
| **Multiple Payment Methods** | 8.6 (38 reviews) | Not enough data | 

### Data Security

| Product | Score | Reviews |
|---|---|---|
| **Check Point SASE** | N/A | N/A |
| **CyberArk Workforce Identity** | N/A | N/A |

#### Compliance

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Access Management** | Not enough data | Not enough data | 
| **At-Risk Analysis** | Not enough data | Not enough data | 
| **DLP Configuration** | Not enough data | Not enough data | 
| **Sensitive Data Compliance** | Not enough data | Not enough data | 

#### Administration

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Database Management** | Not enough data | Not enough data | 
| **Deduplication ** | Not enough data | Not enough data | 
| **Backup** | Not enough data | Not enough data | 
| **API / integrations** | Not enough data | Not enough data | 

#### Security 

| Feature | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Multi-Factor Authentication** | Not enough data | Not enough data | 
| **Data Transport** | Not enough data | Not enough data | 
| **Data Types** | Not enough data | Not enough data | 
| **Security Tools** | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (1):** [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking)

**Unique to Check Point SASE (11):** [Network as a Service (NaaS) Platforms](https://www.g2.com/categories/network-as-a-service-naas-platforms), [Cloud Edge Security Software](https://www.g2.com/categories/cloud-edge-security), [Software-Defined Perimeter (SDP) Software](https://www.g2.com/categories/software-defined-perimeter-sdp), [Business VPN Software](https://www.g2.com/categories/business-vpn), [Cloud Access Security Broker (CASB) Software](https://www.g2.com/categories/cloud-access-security-broker-casb), [Secure Access Service Edge (SASE) Platforms](https://www.g2.com/categories/secure-access-service-edge-sase-platforms), [Data Center Security Solutions](https://www.g2.com/categories/data-center-security-solutions), [SD-WAN Solutions](https://www.g2.com/categories/sd-wan), [Secure Service Edge (SSE) Solutions](https://www.g2.com/categories/secure-service-edge-sse-solutions), [Secure Web Gateway Software](https://www.g2.com/categories/secure-web-gateways), [Unified Threat Management Software](https://www.g2.com/categories/unified-threat-management-utm)

**Unique to CyberArk Workforce Identity (12):** [Identity Threat Detection and Response (ITDR)  Software](https://www.g2.com/categories/identity-threat-detection-and-response-itdr), [AWS Marketplace Software](https://www.g2.com/categories/aws-marketplace), [Passwordless Authentication Software](https://www.g2.com/categories/passwordless-authentication), [User and Entity Behavior Analytics (UEBA) Software](https://www.g2.com/categories/user-and-entity-behavior-analytics-ueba), [Biometric Authentication Software](https://www.g2.com/categories/biometric-authentication), [Cloud Directory Services](https://www.g2.com/categories/cloud-directory-services), [Customer Identity and Access Management (CIAM) Software](https://www.g2.com/categories/customer-identity-and-access-management-ciam), [Risk-Based Authentication Software](https://www.g2.com/categories/risk-based-authentication-rba), [Multi-Factor Authentication (MFA) Software](https://www.g2.com/categories/multi-factor-authentication-mfa), [Identity and Access Management (IAM) Software](https://www.g2.com/categories/identity-and-access-management-iam), [User Provisioning and Governance Tools](https://www.g2.com/categories/user-provisioning-and-governance-tools), [Single Sign-On (SSO) Solutions](https://www.g2.com/categories/single-sign-on-sso)


---
## Reviewer Demographics

### By Company Size

| Segment | Check Point SASE | CyberArk Workforce Identity | 
|---|---|---|
| **Small-Business** | 34.6% | 6.3% | 
| **Mid-Market** | 48.6% | 46.8% | 
| **Enterprise** | 16.8% | 46.8% | 

### By Industry

#### Check Point SASE

- **Information Technology and Services:** 19.6%
- **Computer &amp; Network Security:** 14.1%
- **Computer Software:** 10.1%
- **Marketing and Advertising:** 5.0%
- **Hospital &amp; Health Care:** 4.5%
- **Financial Services:** 4.0%
- **Insurance:** 3.5%
- **Banking:** 3.5%
- **Pharmaceuticals:** 2.5%
- **Defense &amp; Space:** 2.0%
- **Other:** 31.2%

#### CyberArk Workforce Identity

- **Information Technology and Services:** 20.6%
- **Financial Services:** 8.7%
- **Computer &amp; Network Security:** 5.6%
- **Insurance:** 4.8%
- **Hospital &amp; Health Care:** 4.8%
- **Banking:** 3.2%
- **Education Management:** 3.2%
- **Consumer Goods:** 2.4%
- **Hospitality:** 2.4%
- **Oil &amp; Energy:** 2.4%
- **Other:** 42.1%

---
## Alternatives

### Alternatives to Check Point SASE

- [NordLayer](https://www.g2.com/products/nordlayer/reviews) — 4.3/5 stars (126 reviews)
- [Zscaler Internet Access](https://www.g2.com/products/zscaler-internet-access/reviews) — 4.4/5 stars (195 reviews)
- [Twingate](https://www.g2.com/products/twingate/reviews) — 4.7/5 stars (76 reviews)
- [Cato SASE Cloud](https://www.g2.com/products/cato-networks-cato-sase-cloud/reviews) — 4.5/5 stars (83 reviews)
- [Okta](https://www.g2.com/products/okta/reviews) — 4.5/5 stars (1226 reviews)
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) — 4.5/5 stars (514 reviews)
- [Netskope One Platform](https://www.g2.com/products/netskope-one-platform/reviews) — 4.4/5 stars (74 reviews)
- [BetterCloud](https://www.g2.com/products/bettercloud/reviews) — 4.4/5 stars (482 reviews)
- [ThreatLocker Allowlisting](https://www.g2.com/products/threatlocker-allowlisting/reviews) — 4.8/5 stars (474 reviews)
- [OpenVPN Access Server](https://www.g2.com/products/openvpn-access-server/reviews) — 4.5/5 stars (339 reviews)

### Alternatives to CyberArk Workforce Identity

- [Okta](https://www.g2.com/products/okta/reviews) — 4.5/5 stars (1226 reviews)
- [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews) — 4.5/5 stars (514 reviews)
- [OneLogin](https://www.g2.com/products/onelogin/reviews) — 4.4/5 stars (290 reviews)
- [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews) — 4.5/5 stars (908 reviews)
- [Auth0](https://www.g2.com/products/auth0/reviews) — 4.3/5 stars (264 reviews)
- [JumpCloud](https://www.g2.com/products/jumpcloud/reviews) — 4.5/5 stars (3968 reviews)
- [LastPass](https://www.g2.com/products/lastpass/reviews) — 4.5/5 stars (2043 reviews)
- [1Password](https://www.g2.com/products/1password/reviews) — 4.6/5 stars (1791 reviews)
- [Ping Identity](https://www.g2.com/products/ping-identity/reviews) — 4.4/5 stars (115 reviews)
- [Google Authenticator](https://www.g2.com/products/google-authenticator/reviews) — 4.6/5 stars (577 reviews)

---
## Top Discussions

### Check Point SASE

- Title: [Is perimeter 81 a VPN?](https://www.g2.com/discussions/is-perimeter-81-a-vpn) — 1 comment
  > **Top comment:** "It is a managed VPN replacement solution"
- Title: [How does perimeter 81 work?](https://www.g2.com/discussions/how-does-perimeter-81-work) — 1 comment
  > **Top comment:** "Perimeter 81 is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem or..."
- Title: [What are the capabilities of software perimeter solution?](https://www.g2.com/discussions/perimeter-81-what-are-the-capabilities-of-software-perimeter-solution) — 1 comment
  > **Top comment:** "A Software Defined Perimeter (SDP) enables secure connectivity of remote users to the corporate network. This type of solution is also knows as Zero Trust..."
- Title: [What services do perimeter 81 provide?](https://www.g2.com/discussions/what-services-do-perimeter-81-provide) — 1 comment
  > **Top comment:** "Perimeter 81&#39;s service consists of the Zero Trust Network Platform which provides services such as SSL Inspection, Identity provider (IdP) integration,..."

### CyberArk Workforce Identity

No discussions available for this product.

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/check-point-sase-vs-cyberark-workforce-identity)

