Check Point Harmony SASE Features
Usage (6)
Multi-Device Usage
Enables the use of the VPN on multiple Devices. 50 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Multiple Concurrent Connections
Based on 45 Check Point Harmony SASE reviews. Allows use of the VPN on multiple connections at the same time.
Protocol Choices
Enables the user to choose which protocol to use such as OpenVPN or PPTP. 41 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Unlimited Bandwidth
Provides unlimited bandwidth for the user. This feature was mentioned in 43 Check Point Harmony SASE reviews.
Varied Server Locations
Provides servers in many different locations. This feature was mentioned in 42 Check Point Harmony SASE reviews.
Unlimited Server Switches
Based on 38 Check Point Harmony SASE reviews. Enables you to switch between servers an unlimited number of times.
Miscellaneous (2)
Live Customer Support
Based on 45 Check Point Harmony SASE reviews. Provides live customer support.
Multiple Payment Methods
As reported in 37 Check Point Harmony SASE reviews. Allows multiple payment methods such as credit card or cryptocurrency.
Security - Unified Threat Management (6)
Antivirus
Tools to protect a system from viruses by scanning and quarantining any threats.
Whitelists
The ability to green light a specific URL or system to bypass the scanning process.
Antispam Filtering
Tools to prevent spam emails and other spam from entering the network.
Content Filtering
Tools to filter specific content based on the MME type or file extension.
Web Filtering
Tools to block certain websites from being viewed by those in a network.
Firewall
Tools to block off a network or system from outside networks or systems to protect the data within.
Administration (8)
Reports & Analytics
The ability to digest a large amount of data into visual representations and analytics.
Dashboard
The ability to view a large amount of data in one place using customizable widgets.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Administration Console -
Provides a centralized console for administation tasks and unified control.
API / integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Network Segmentation
Based on 21 Check Point Harmony SASE reviews. Allows administrative control over network components, mapping, and segmentation.
Scalability
Based on 22 Check Point Harmony SASE reviews. Provides features to allow scaling for large organizations and user bases.
Global Access
Based on 21 Check Point Harmony SASE reviews. Extends SDP network access to users regardless of their physical location.
Prevention (5)
Intrusion Prevention
Enforces security paramaters to prevent unauthorized access.
Firewall
Protects servers, data center infrastructure and information from a variety of attacks and malware threats.
Encryption
Provide some level of encryption of information, protecting sensitive data while it exists within the data center.
Security hardening
Facilitates system and network security by identifying and remediating vulnerabilities
Cloud Data Protection
Provides high quality and wide scope of in-cloud and offline data security capabilities.
Detection (3)
Intrusion Detection
Detects unauthorized access and use of privileged systems.
Security Monitoring
Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Anti-Malware / Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Network Management (3)
Network Segmentation
Allows administrative control over network components, mapping, and segmentation. 31 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Network Mapping
Allows visual display of networks segmented components and their connected resources. 31 reviewers of Check Point Harmony SASE have provided feedback on this feature.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. 24 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Security (5)
Application Security
As reported in 24 Check Point Harmony SASE reviews. Protects application access and data. Prompts additional authentication for suspicious users.
Governance
Allows users to create, edit, and relinquish user access privileges.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Data Encryption/Security
Manages policies for user data access and data encryption.
Access Control
Supports LDAP Protocol to enable access control and governance.
Identity Management (2)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network. 32 reviewers of Check Point Harmony SASE have provided feedback on this feature.
User Monitoring
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components. This feature was mentioned in 34 Check Point Harmony SASE reviews.
Functionality (3)
SSO
Provides a single access point for users to access multiple cloud products without multiple logins.
Cloud Registry
Details SaaS products the cloud security product can integrate with and provide security for.
Mobile Device Mangement
Offers the ability to set standards for types of mobile devices and networks capable of accessing data.
Protection (7)
Policy Enforcement
Based on 23 Check Point Harmony SASE reviews. Allows administrators to set policies for security and governance.
Security Audit
Allows for deep examination into network-connected devices, policies, and protocols. This feature was mentioned in 23 Check Point Harmony SASE reviews.
Access Control
Based on 23 Check Point Harmony SASE reviews. Supports LDAP Protocol to enable access control and governance.
User Authentication
Authenticates users prior to granting access to networks, applciations, and systems. 26 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Firewall-as-a-Service
As reported in 31 Check Point Harmony SASE reviews. Managed, cloud-delivered firewall that protects devices, assets, networks, and other cloud services from web-based threats.
Web Gateway
Provides a private web gateway for secure internet browsing. This feature was mentioned in 31 Check Point Harmony SASE reviews.
Adaptive Access Control
Based on 29 Check Point Harmony SASE reviews. Provides a risk-based approach to determining trust within the network.
Monitoring (4)
Configuration Monitoring
Based on 21 Check Point Harmony SASE reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Observability
As reported in 21 Check Point Harmony SASE reviews. Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Data Center Networking
As reported in 31 Check Point Harmony SASE reviews. Provides advanced data center network services to deliver multiple high-speed IP.
Anomaly Detection
Based on 30 Check Point Harmony SASE reviews. Constantly monitors system to detect anomalies in real time.
Management (1)
Policy Enforcement
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes 30 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Generative AI (2)
AI Text Summarization
Condenses long documents or text into a brief summary. 16 reviewers of Check Point Harmony SASE have provided feedback on this feature.
AI Text Generation
Allows users to generate text based on a text prompt. This feature was mentioned in 16 Check Point Harmony SASE reviews.
Web Content and Traffic Filtering - Secure Web Gateways (5)
SSL/TLS Inspection
Decrypts and inspects encrypted web traffic to detect and block threats hidden within encrypted connections.
Content Filtering
Analyzes web content to filter out malicious code, malware, and inappropriate material.
URL Filtering
Blocks access to known malicious or unauthorized websites based on predefined policies.
Real-Time Traffic Inspection
Inspects and analyzes inbound and outbound web traffic in real-time for threats and compliance.
Ad and Tracker Blocking
Blocks ads and trackers to enhance user privacy and reduce exposure to potential threats.
Data Protection and Loss Prevention - Secure Web Gateways (4)
Data Loss Prevention (DLP)
Monitors outgoing web traffic to prevent sensitive data from being leaked or exfiltrated.
Phishing Protection
Detects and blocks phishing attempts to protect users from fraudulent websites and email links.
Malware Protection
Uses signature-based scanning, heuristic analysis, and sandboxing to detect and block malware threats.
Cloud Access Security
Monitors and controls access to cloud applications and services to prevent unauthorized use and data leakage.
Access Control and Authentication - Secure Web Gateways (3)
Application Control
Regulates access to web-based applications and services as per organizational policies.
Authentication and Access Control
Verifies users' identities and enforces access control policies to ensure only authorized users can access permitted web resources.
User and Group Policies
Supports the creation of policies based on user roles, groups, or other attributes for more granular control.
Performance and Management - Secure Web Gateways (5)
Customizable Policy Enforcement
Allows organizations to create and enforce custom web usage policies tailored to their specific needs.
Bandwidth Management
Prioritizes and allocates network resources based on predefined policies to optimize performance.
Integration Capabilities
Integrates with other security tools and systems, such as firewalls, SIEMs, and endpoint security solutions.
Reporting and Logging
Provides comprehensive reports and logs of web activity, including sites visited, user activity, security events, and policy violations.
Threat Intelligence Integration
Leverages threat intelligence feeds to stay updated on the latest threats and enhance protection.
Scalability & Deployment - Network as a Service (NaaS) (3)
Cloud-Based Management
Provides centralized control and monitoring via API or dashboard
Multi-Cloud & Hybrid Support
Ensures compatibility with various cloud infrastructures
On-Demand Scalability
Dynamically adjusts network resources based on business needs
Security & Compliance - Network as a Service (NaaS) (3)
Integrated Security Features
Includes encryption, firewalls, Zero Trust, and compliance policies
Compliance & Regulatory Support
Adheres to industry regulations like HIPAA, GDPR, and SOC 2
DDoS Protection & Threat Intelligence
Provides real-time attack detection and mitigation
Network Performance & Optimization - Network as a Service (NaaS) (3)
Quality of Service (QoS) & Analytics
Monitors performance in real-time and prioritizes critical applications
SD-WAN Functionality
Enhances traffic routing, load balancing, and overall efficiency
Zero-Touch Provisioning
Automates network setup and reduces manual intervention
Remote Connectivity & Access - Network as a Service (NaaS) (6)
AI-Powered Policy Management
Adapts security and network policies dynamically based on user behavior
Adaptive Network Security
Uses AI to continuously assess and respond to emerging threats
AI-Driven Network Optimization
Uses AI and ML to predict congestion and optimize traffic
Secure Remote Access
Provides VPN-like encrypted connectivity without physical hardware
5G & Private LTE Support
Enables high-speed, low-latency connections for enterprise networks
Edge Computing Integration
Extends network services to the edge for lower latency
AI-Driven & Adaptive Features - Network as a Service (NaaS) (3)
AI-Powered Policy Management
Adapts security and network policies dynamically based on user behavior
Adaptive Network Security
Uses AI to continuously assess and respond to emerging threats
AI-Driven Network Optimization
Uses AI and ML to predict congestion and optimize traffic
Components - Secure Access Service Edge (SASE) (5)
Zero Trust Network Access (ZTNA)
Based on 16 Check Point Harmony SASE reviews. Enforces zero trust access rules.
Wide Area Network (WAN)
Integrates wide area network (WAN) capabilities, such as SD-WAN. 15 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Cloud Access Security Broker (CASB)
Based on 15 Check Point Harmony SASE reviews. Enforces security requirements and secures connections with cloud resources.
Secure Web Gateway (SWG)
Prevents unauthorized web domains from entering a network and protects against web-based threats. This feature was mentioned in 15 Check Point Harmony SASE reviews.
Firewall as a Service
Provides cloud-based firewall protection. 15 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Artificial Intelligence - Secure Access Service Edge (SASE) (3)
Predictive Capabilities
Uses predictive analytics to anticipate emerging threats. 15 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Real-Time Threat Detection
Based on 16 Check Point Harmony SASE reviews. Utilizes AI algorithms to identify anomolies and block access to malicious sites.
Automation
Automates common workflows and remediation tasks. This feature was mentioned in 15 Check Point Harmony SASE reviews.
Agentic AI - Secure Access Service Edge (SASE) Platforms (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input 15 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Cross-system Integration
As reported in 16 Check Point Harmony SASE reviews. Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting 15 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Decision Making
Makes informed choices based on available data and objectives 15 reviewers of Check Point Harmony SASE have provided feedback on this feature.
Components - Secure Service Edge (SSE) (4)
Secure Web Gateway (SWG)
Prevents unauthorized web domains from entering a network and protects against web-based threats.
Firewall as a Service
Provides cloud-based firewall protection.
Zero Trust Network Access (ZTNA)
Enforces zero trust access rules.
Cloud Access Security Broker (CASB)
Enforces security requirements and secures connections with cloud resources.
Artificial Intelligence -Secure Service Edge (SSE) (3)
Automation
Automates common workflows and remediation tasks.
Predictive Capabilities
Uses predictive analytics to anticipate emerging threats.
Real-Time Threat Detection
Utilizes AI algorithms to identify anomolies and block access to malicious sites.
Agentic AI - Secure Service Edge (SSE) (4)
Decision Making
Makes informed choices based on available data and objectives.
Autonomous Task Execution
Capability to perform complex tasks without constant human input.
Cross-system Integration
Works across multiple software systems or databases.
Proactive Assistance
Anticipates needs and offers suggestions without prompting.
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.




