# Check Point SASE Reviews
**Vendor:** Check Point Software Technologies  
**Category:** [Secure Access Service Edge (SASE) Platforms](https://www.g2.com/categories/secure-access-service-edge-sase-platforms)  
**Average Rating:** 4.5/5.0  
**Total Reviews:** 214
## About Check Point SASE
The internet is the new corporate network, leading organizations to transition to their network security to Secure Access Service Edge (SASE). However, current solutions break the user experience with slow connections and complex management. Check Point SASE is a game-changing solution that delivers 10x faster internet security, SaaS Security, and full mesh Zero Trust Access and optimized SD-WAN performance—all with an emphasis on streamlined management. Combining innovative on-device and cloud-delivered network protections, Check Point SASE offers a local browsing experience with tighter security and privacy, and an identity-centric zero trust access policy that accommodates everyone: employees, BYOD and third parties. Its SD-WAN solution unifies industry-leading threat prevention with optimized connectivity, automated steering for over 10,000 applications and seamless link failover for uninterrupted web conferencing. Using Check Point SASE, business can build a secure corporate network over a private global backbone in less than an hour. The service is managed from a unified console and is backed by an award-winning global support team that has you covered 24/7.



## Check Point SASE Pros & Cons
**What users like:**

- Users value the **strong zero-trust security model** of Check Point SASE, ensuring every connection is verified for safety. (46 reviews)
- Users find Check Point SASE to be **easy to use** , appreciating its straightforward interface and seamless connectivity. (39 reviews)
- Users appreciate the **secure access** provided by Check Point SASE, ensuring protection without compromising performance or user experience. (34 reviews)
- Users value the **comprehensive security** of Check Point SASE, enhancing protection for distributed workforces and daily operations. (26 reviews)
- Users highlight the **reliability** of Check Point SASE, noting minimal outages and consistent performance over time. (25 reviews)
- Users appreciate the **user-friendly interface and comprehensive support** of Check Point Harmony SASE for easy deployment. (21 reviews)
- Users appreciate the **secure internet and cloud access** of Check Point Harmony SASE, enhancing safety and productivity. (18 reviews)
- Speed (16 reviews)
- Users value the **seamless integrations** with SD-WAN solutions, enhancing security and simplifying network management significantly. (15 reviews)
- Remote Work (15 reviews)

**What users dislike:**

- Users find the **complex implementation** of Check Point SASE frustrating, causing delays and challenging configurations during setup. (28 reviews)
- Users face a **complex configuration** process that can be challenging, especially for those new to SASE. (24 reviews)
- Users find the **complex setup** of Check Point SASE to be time-consuming and challenging, impacting deployment efforts. (22 reviews)
- Users find the **high cost** of Check Point SASE a significant barrier for medium-sized businesses, impacting overall satisfaction. (17 reviews)
- Users face a **steep learning curve** with Check Point SASE, complicating initial setup and configuration adjustments. (17 reviews)
- Users often face a **difficult learning curve** with Check Point Harmony SASE, particularly during initial setup and configuration. (16 reviews)
- Difficult Configuration (12 reviews)
- Difficult Learning (11 reviews)
- Users find the **limited customization** of Check Point Harmony SASE restricts automation and advanced configurations significantly. (11 reviews)
- Users experience **integration issues** with DNS and legacy environments, complicating the setup and overall functionality. (10 reviews)

## Check Point SASE Reviews
  ### 1. Complex Setup, Fragmented Features, and Cost Concerns with Check Point SASE

**Rating:** 2.0/5.0 stars

**Reviewed by:** Arkajit D. | Chief Technology Officer, Information Technology and Services, Mid-Market (51-1000 emp.)

**Reviewed Date:** May 08, 2026

**What do you like best about Check Point SASE?**

What I like most about Check Point SASE is how it combines network security and secure remote access into a unified cloud-based platform. It provides consistent security policies across users, devices, and locations without relying heavily on traditional perimeter-based infrastructure, which is extremely valuable in hybrid and distributed work environments.

I also appreciate the strong integration of security features like secure web gateway, zero trust access, threat prevention, and SD-WAN capabilities. Having these functions centralized improves visibility and simplifies management compared to handling multiple standalone security tools.

Another major advantage is the performance and scalability. Users can securely access applications and resources with a smoother experience while maintaining strong protection against threats. Overall, it helps improve both security posture and operational efficiency in modern cloud-driven environments.

**What do you dislike about Check Point SASE?**

One of the key problems that comes with Check Point SASE is the complexity of its operation in terms of managing the tool from the beginning of deployment up to the point where policies have been configured properly. In many instances, the software may seem a little too hard to understand, making it very challenging to use on a daily basis.
Performance can also be affected by various factors. For instance, users of Check Point SASE may sometimes face such problems as latency, unreliable connections, or slower access to applications due to passing traffic through several layers of security measures.
Moreover, some aspects of using Check Point SASE may seem fragmented, meaning that not all features have been well-integrated into the whole system. It may make troubleshooting harder since it will be difficult to solve the problem of any networking and security components.
Furthermore, the cost of using Check Point SASE may also be considered a disadvantage since licensing, advanced security features, and other aspects may require additional money. Also, the level of reporting and analysis provided by the product is not always satisfactory.

**What problems is Check Point SASE solving and how is that benefiting you?**

The Check Point SASE solution provides an answer to the problem of ensuring secure connections for remote users, cloud applications, and dispersed environments without depending on the conventional network perimeter approach. With the trend towards hybrid working models and cloud computing, it becomes tough to manage and coordinate the security process independently using various VPNs, firewalls, and point solutions.

This has been advantageous for us in many ways as it increases visibility and implements security policies uniformly. We can easily implement secure access from remote locations and eliminate the burden of managing multiple security systems separately.

  ### 2. Secure, Reliable Remote Access with Fast, Easy Deployment

**Rating:** 5.0/5.0 stars

**Reviewed by:** Jose M. | CyberSecurity Administrator, Enterprise (> 1000 emp.)

**Reviewed Date:** April 09, 2026

**What do you like best about Check Point SASE?**

Check Point SASE provides secure and reliable remote access to your IT environment, enhancing the user experience in a safe way. It enables full productivity with ease of use and fast implementation, especially if you are already a Check Point user.

**What do you dislike about Check Point SASE?**

In my experience, I suggest setting up a checkpoint environment to build a full-scale, robust service for your users, giving them a complete and secure way to access your organization’s assets.

**What problems is Check Point SASE solving and how is that benefiting you?**

A zero-trust posture that provides SASE enables a new way of working aligned with our security posture, helping ensure a secure, reliable, and robust approach to remote work and productivity in my business. It also makes it possible to enhance overall productivity across the business.

  ### 3. Versatile, Reliable Check Point Security Across Mobile and SandBlast Threat Emulation

**Rating:** 4.5/5.0 stars

**Reviewed by:** Verified User in Computer & Network Security | Enterprise (> 1000 emp.)

**Reviewed Date:** April 16, 2026

**What do you like best about Check Point SASE?**

What I like most is how versatile Check Point’s security solutions are across different environments. In my professional experience, I’ve used their mobile security features to enable safe access to corporate email on smartphones, and it provided strong protection against mobile threats. In another role, I used the SandBlast (Threat Emulation) sandbox for deeper file analysis and zero-day threat prevention. Across both situations, Check Point delivered consistent results—whether it was securing mobile communication or analyzing suspicious files in a controlled sandbox. Overall, it feels like a reliable ecosystem that supports a wide range of security needs.

**What do you dislike about Check Point SASE?**

The interface could be more user-friendly, since the management console feels somewhat complex and comes with a steep learning curve for new administrators. From a performance standpoint, both connection speeds and overall console responsiveness could be faster to improve day-to-day efficiency. Also, while the sandbox is powerful, it would be great to have a more optimized real-time analysis experience during file emulation. At times, the delay during deep analysis affects the user experience, so placing more emphasis on speed—without compromising security—would be a meaningful improvement.

**What problems is Check Point SASE solving and how is that benefiting you?**

Check Point SASE solves the problem of securing a distributed workforce by providing Zero Trust access and advanced threat prevention. It benefits me by ensuring safe corporate email access on mobile devices and protecting our network through SandBlast sandbox analysis. This unified approach simplifies security management and effectively blocks zero-day attacks before they can cause any damage.

  ### 4. What I Like Best About Check Point SASE

**Rating:** 4.5/5.0 stars

**Reviewed by:** Arya S. | Cybersecurity Lead, Computer & Network Security, Enterprise (> 1000 emp.)

**Reviewed Date:** March 03, 2026

**What do you like best about Check Point SASE?**

What I like best about Check Point SASE is its ability to provide consistent security and centralized control for remote and hybrid users. It simplifies policy management, offers good visibility into traffic, and delivers stable performance once configured, making day‑to‑day security operations easier to manage.

**What do you dislike about Check Point SASE?**

The main drawback is the initial setup which can feel complex for the new users. Some configurations require prior knowledge and clearer onboarding guidance would make adoption easier.

**What problems is Check Point SASE solving and how is that benefiting you?**

Check Point SASE helps solve challenges related to securing remote access and managing security consistently across users and locations. It centralizes access control and security policies, reducing manual effort and improving visibility. This has benefited us by simplifying management, improving security posture, and ensuring reliable access for users without compromising performance.

  ### 5. Centralized Security with a Learning Curve

**Rating:** 4.0/5.0 stars

**Reviewed by:** ibram a. | Founder &amp; Chief Technology Officer (CTO), Small-Business (50 or fewer emp.)

**Reviewed Date:** March 24, 2026

**What do you like best about Check Point SASE?**

I like how Check Point SASE simplifies things without compromising on security. Everything is centralized, making it much easier to manage policies and monitor users compared to juggling multiple tools. The zero trust approach is a big plus, as it properly limits access instead of exposing the whole network. It's also smooth for remote users, which makes adoption easier without constant issues or complaints.

**What do you dislike about Check Point SASE?**

One thing that could be improved is the initial setup, it can take some time to get everything configured the way you want, especially if you’re migrating from multiple tools. Also, some parts of the interface could be more intuitive. It’s powerful, but not always the easiest to navigate at first. At times, troubleshooting can be a bit tricky, especially when trying to trace issues across different layers. There's still room to make it more user friendly.

**What problems is Check Point SASE solving and how is that benefiting you?**

I use Check Point SASE to centralize security, simplify policy management, and secure remote access. It reduces the complexity of managing multiple tools and improves safety by limiting user access to only what's needed.

  ### 6. Zero-Latency Global Backbone with Powerful, Prevention-First Security

**Rating:** 4.0/5.0 stars

**Reviewed by:** Tareq M. | Network &amp; Security Specialist, Enterprise (> 1000 emp.)

**Reviewed Date:** March 08, 2026

**What do you like best about Check Point SASE?**

The "Zero-Latency" Global Backbone

True Convergence and a prevention-first DNA. Most security tools slow down the connection because traffic has to travel to a distant server to be inspected. Check Point instead uses a massive global network of Points of Presence (PoPs).

The benefit is that it can route traffic along the fastest path possible, so users often feel like they’re on a local network even when they’re working from a coffee shop halfway across the world.

**What do you dislike about Check Point SASE?**

While Check Point Harmony SASE is a powerhouse, the main drawback is its initial complexity. Because it offers such deep, granular security controls, the setup process can be quite steep, and if not configured perfectly, it can lead to "false positives" that accidentally block legitimate employee traffic

**What problems is Check Point SASE solving and how is that benefiting you?**

The "VPN Slowness" Problem
• The Problem: Traditional VPNs "backhaul" traffic—meaning if you’re in Dubai trying to access a cloud app, your traffic might first travel to a data center in London just to be checked, causing massive lag.  
• The Benefit to You: It uses a Global Private Backbone with over 50 "on-ramps" (PoPs) worldwide. Your connection is routed through the nearest point, giving you lightning-fast access (often under 50ms latency). It feels like you’re on the office network even when you’re at home.

  ### 7. Solid Security with Some UI Challenges

**Rating:** 4.0/5.0 stars

**Reviewed by:** Mahidhar P. | SDE, Enterprise (> 1000 emp.)

**Reviewed Date:** March 07, 2026

**What do you like best about Check Point SASE?**

I like most about Check Point SASE is the ability to manage security and access policies from a single centralized platform, which simplifies the process of securing remote users and applications without relying heavily on traditional VPN setups. I find the visibility into user traffic and applications very useful for managing, monitoring, and enforcing security policies. The features I value the most include zero trust network access, secure web gateway capabilities, and centralized policy management. The ZTNA allows us to securely provide access to internal applications without exposing the network or entirely relying on VPN access, offering strong security capabilities.

**What do you dislike about Check Point SASE?**

The initial policy configuration can be somewhat complex, especially for teams new to cloud security environments. A clearer set of guidance would make development easier. The user interface could be a bit more intuitive when navigating between different security policies and monitoring sections. There's a learning curve, particularly when defining access policies or security rules.

**What problems is Check Point SASE solving and how is that benefiting you?**

I use Check Point SASE to securely provide remote access to internal applications and cloud resources. It enforces security policies consistently across locations, reducing reliance on traditional VPNs.

  ### 8. Efficient but Needs Improvement

**Rating:** 3.5/5.0 stars

**Reviewed by:** Vishal S. | Sr. Network Security Engineer, Small-Business (50 or fewer emp.)

**Reviewed Date:** March 16, 2026

**What do you like best about Check Point SASE?**

I like Check Point SASE because the installation is fast, and I can manage everything from a single dashboard, which saves a lot of headaches. The most important feature for me is that it hides our private data from the public. It makes it easy to set up a secure network in minutes. Managing everything from one simple and single screen is a big plus, and privacy is paramount.

**What do you dislike about Check Point SASE?**

To be honest, initial hardware setup could be little complex for beginners, so can make it more easy also internet failover can be glitchy sometimes. One more addition for troubleshooting is- the logs can provide more information and detailed view.

**What problems is Check Point SASE solving and how is that benefiting you?**

I use Check Point SASE for zero trust access, limiting network exposure by granting specific app access. It simplifies management with a single dashboard, ensures fast setup, and hides private data from public access.

  ### 9. Unified Security Solution with Impressive Cloud-Native Performance

**Rating:** 4.5/5.0 stars

**Reviewed by:** Ujjal K. | Senior Software Engineer, Mid-Market (51-1000 emp.)

**Reviewed Date:** February 27, 2026

**What do you like best about Check Point SASE?**

I like the simplicity of the management console as it's incredibly intuitive for setting up a new ZTNA policy or onboarding users through our IDP. The 'single pane of glass' feature actually works and saves significant time, cutting our administrative overhead by at least 30%. I love the Global Private Backbone, which has almost entirely eliminated 'the VPN is slow' complaints by providing local 'on-ramps' for our distributed team in Europe and Asia. The latency reduction is a standout advantage, making connections feel native and stopping the 'slow network' tickets overnight. It's great that Check Point SASE provides secure, low-latency access for our remote team and consolidates all our needs into an 'all in one' solution, handling our Zero Trust Network Access (ZTNA) to internal apps and our Secure Web Gateway.

**What do you dislike about Check Point SASE?**

The initial onboarding and policy configuration is easy at first, but has a bit of a learning curve. If you have a complex hybrid setup, getting the tunnels and identity-based rules exactly right makes some trial and error, and I wish the documentation was a bit more 'step-by-step' for those specific edge cases. Also, the reporting dashboard could be more granular. While the high-level data is great for a quick check, sometimes digging into specific user logs for troubleshooting requires more clicks than it should. The main thing is filtering logic. If I am trying to investigate a specific user's connection issues from three days ago, I have to do too much manual drilling down to get to the raw logs. It would be great to have more pre-built templates for things like compliance audits or 'Top 10 blocked domain' that I could just export as a clean PDF for my manager. I would also love to see more granular data on GenAI usage. It tells me people are using ChatGPT or Gemini, but I would like more detailed breakdown of data upload volumes or specific risk categories without having to cross-reference multiple screens. Basically, the data is all there, and I just need a more 'one-click' way to get it out of the system and into a report.

**What problems is Check Point SASE solving and how is that benefiting you?**

Check Point SASE provides secure, low-latency access for my remote team, replacing old slow VPNs and solving latency issues. The single management console reduces my troubleshooting time and administrative overhead significantly while improving security visibility.

  ### 10. All-in-One Security Platform That Boosts Productivity

**Rating:** 4.5/5.0 stars

**Reviewed by:** Cristopher Z. | Networking Admin, Mid-Market (51-1000 emp.)

**Reviewed Date:** November 21, 2025

**What do you like best about Check Point SASE?**

A more secure experience when connecting users and applications. What we value most is having everything on a single platform, with clear policies and real-time protection without impacting performance. In practice, we've seen fewer incidents and increased productivity, confirming that the solution delivers on its promises.

**What do you dislike about Check Point SASE?**

Initial setup and policy configuration can be complex. Report generation could also be more intuitive, as some dashboards require several clicks to find the necessary information. Overall, the platform is powerful, but it takes time and experience to fully leverage its potential.

**What problems is Check Point SASE solving and how is that benefiting you?**

It unifies network security and access control on a single platform, eliminating the need for multiple tools to protect different environments. This has reduced complexity, improved visibility, and decreased the administrative burden. 


The benefit for us is faster, more secure connectivity for employees everywhere, as well as fewer incidents and more time to focus on strategic projects instead of troubleshooting.


## Check Point SASE Discussions
  - [Is perimeter 81 a VPN?](https://www.g2.com/discussions/is-perimeter-81-a-vpn) - 1 comment
  - [How does perimeter 81 work?](https://www.g2.com/discussions/how-does-perimeter-81-work) - 1 comment
  - [What are the capabilities of software perimeter solution?](https://www.g2.com/discussions/perimeter-81-what-are-the-capabilities-of-software-perimeter-solution) - 1 comment
  - [What services do perimeter 81 provide?](https://www.g2.com/discussions/what-services-do-perimeter-81-provide) - 1 comment

- [View Check Point SASE pricing details and edition comparison](https://www.g2.com/products/check-point-harmony-sase/reviews/check-point-harmony-sase-review-6924813?section=pricing&secure%5Bexpires_at%5D=2026-05-12+23%3A19%3A18+-0500&secure%5Bsession_id%5D=3f870446-adb4-42e3-94bb-8e3eaa8a0546&secure%5Btoken%5D=513a7b826a9326ebeb41007c5ea008f0dbec7a6d404623c7500b58f37c47a4fc&format=llm_user)
## Check Point SASE Integrations
  - [CheckPoint](https://www.g2.com/products/checkpoint/reviews)
  - [Citrix Gateway](https://www.g2.com/products/citrix-gateway/reviews)
  - [Microsoft 365](https://www.g2.com/products/microsoft365/reviews)
  - [Palo Alto Networks GlobalProtect](https://www.g2.com/products/palo-alto-networks-globalprotect/reviews)

## Check Point SASE Features
**Security - Unified Threat Management**
- Antivirus
- Whitelists
- Antispam Filtering
- Content Filtering
- Web Filtering
- Firewall

**Network Management**
- Network Segmentation
- Network Mapping
- API/Integrations

**Administration**
- Network Segmentation
- Scalability
- Global Access

**Management**
- DLP Configuration
- Policy Enforcement

**Web Content and Traffic Filtering - Secure Web Gateways**
- SSL/TLS Inspection
- Content Filtering
- URL Filtering
- Real-Time Traffic Inspection
- Ad and Tracker Blocking

**Scalability & Deployment - Network as a Service (NaaS)**
- Cloud-Based Management
- Multi-Cloud & Hybrid Support

**Components - Secure Access Service Edge (SASE)**
- Zero Trust Network Access (ZTNA)
- Wide Area Network (WAN)
- Cloud Access Security Broker (CASB)
- Secure Web Gateway (SWG)
- Firewall as a Service

**Components - Secure Service Edge (SSE)**
- Secure Web Gateway (SWG)
- Firewall as a Service
- Zero Trust Network Access (ZTNA)
- Cloud Access Security Broker (CASB)

**Cloud Visibility**
- Data Discovery
- Cloud Registry

**Usage**
- Multi-Device Usage
- Multiple Concurrent Connections
- Protocol Choices
- Unlimited Bandwidth
- Varied Server Locations
- Unlimited Server Switches

**Compliance**
- Access Management
- At-Risk Analysis
- DLP Configuration
- Sensitive Data Compliance

**Administration**
- Reports & Analytics
- Dashboard

**Detection**
- Intrusion Detection
- Security Monitoring
- Anti-Malware / Malware Detection

**Security**
- Application Security

**Functionality**
- SSO
- Cloud Registry
- Mobile Device Mangement

**Protection**
- Policy Enforcement
- Security Audit
- Access Control
- User Authentication

**Monitoring**
- Multicloud Visibility

**Data Protection and Loss Prevention - Secure Web Gateways**
- Data Loss Prevention (DLP)
- Phishing Protection
- Malware Protection
- Cloud Access Security

**Security & Compliance - Network as a Service (NaaS)**
- Integrated Security Features
- Compliance & Regulatory Support
- DDoS Protection & Threat Intelligence

**Artificial Intelligence - Secure Access Service Edge (SASE)**
- Predictive Capabilities
- Real-Time Threat Detection
- Automation

**Artificial Intelligence -Secure Service Edge (SSE)**
- Automation
- Predictive Capabilities
- Real-Time Threat Detection

**Security**
- Data loss Prevention

**Miscellaneous**
- Live Customer Support
- Multiple Payment Methods

**Administration**
- Database Management
- Deduplication 
- Backup
- API / integrations

**Administration**
- Compliance
- Administration Console -
- API / integrations

**Identity Management**
- Adaptive Access Control
- User Monitoring

**Security**
- Governance
- Data loss Prevention
- Data Encryption/Security
- Access Control

**Monitoring**
- Configuration Monitoring
- Observability

**Protection**
- Firewall-as-a-Service
- Web Gateway
- Adaptive Access Control

**Access Control and Authentication - Secure Web Gateways**
- Application Control
- Authentication and Access Control
- User and Group Policies

**Network Performance & Optimization - Network as a Service (NaaS)**
- Quality of Service (QoS) & Analytics
- SD-WAN Functionality
- Zero-Touch Provisioning

**Agentic AI - Secure Access Service Edge (SASE) Platforms**
- Autonomous Task Execution
- Cross-system Integration
- Proactive Assistance
- Decision Making

**Agentic AI - Secure Service Edge (SSE)**
- Decision Making
- Autonomous Task Execution
- Cross-system Integration
- Proactive Assistance

**Identity**
- SSO
- Governance
- User Analytics

**Security **
- Multi-Factor Authentication
- Data Transport
- Data Types
- Security Tools

**Generative AI**
- AI Text Summarization
- AI Text Generation

**Performance and Management - Secure Web Gateways**
- Customizable Policy Enforcement
- Bandwidth Management
- Integration Capabilities
- Reporting and Logging
- Threat Intelligence Integration

**Remote Connectivity & Access - Network as a Service (NaaS)**
- AI-Powered Policy Management
- Adaptive Network Security
- AI-Driven Network Optimization
- Secure Remote Access
- 5G & Private LTE Support
- Edge Computing Integration

**AI-Driven & Adaptive Features - Network as a Service (NaaS)**
- AI-Powered Policy Management
- Adaptive Network Security
- AI-Driven Network Optimization

## Top Check Point SASE Alternatives
  - [NordLayer](https://www.g2.com/products/nordlayer/reviews) - 4.3/5.0 (126 reviews)
  - [Zscaler Internet Access](https://www.g2.com/products/zscaler-internet-access/reviews) - 4.4/5.0 (186 reviews)
  - [Twingate](https://www.g2.com/products/twingate/reviews) - 4.7/5.0 (73 reviews)

