We performed a comparison between Check Point Harmony Browse and Zscaler Internet Access based on real PeerSpot user reviews.
Find out in this report how the two Secure Web Gateways (SWG) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is stable."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"It has content filtering, which has helped us a lot in being able to apply the necessary filtering policies where we can allow or block websites."
"Its potential features of Threat Detection and Threat Emulation have helped businesses to browse securely hassle-free without any tension."
"Check Point Harmony Browse has a feature that allows users to check the extensions installed in their browser. This feature is valuable because hackers may install malicious extensions on a target computer without the user's knowledge. When browsing, users are often less aware of the extensions installed in their browsers, making it easier for malicious extensions to go unnoticed. By providing visibility into installed extensions, Check Point Harmony Browse enhances security by allowing users to identify and remove potentially harmful extensions."
"It is easy to implement and has great security potential to avoid vulnerabilities through internet browsing."
"Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance."
"The downloaded protection as it scans and emulates the files on a browser level is great."
"This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user."
"The product enforces the privacy of the users, which is good."
"I like the granularity of the control of all the traffic, including SSL inspection. I also like the fact that the user interface is intuitive. The latencies with Zscaler are minimal compared to those of any other competitor. Other competitors do not really have the global scale that Zscaler has and cannot promise low latencies."
"The most valuable features I found in Zscaler Internet Access are the restriction of users for a particular URL, the security feature related to stopping DDoS, and the VPN."
"The initial setup is very straightforward."
"We use ZIA for outbound internet connectivity. The internet traffic of on-prem users will be directed to the ZIA cloud for security checks and web filtering."
"The scanning feature is impressive, because they do not introduce a big latency to the traffic."
"The most valuable feature of Zscaler Internet Access is that it is a consolidated solution, it comes with many features, such as DLP."
"The solution has reduced cyberattacks."
"The policies are very intuitive and easy to configure, with very little possibility of messing things up."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"One of the new features I would like to see is the possibility that these tools can be brought to mobile devices such as tablets and cell phones in iOS or Android applications."
"URL filtering could be better."
"The ease of handling should be improved, as it is currently intrusive and some users don't like it."
"Support must be faster in solving problems."
"They should focus on new areas of product. In the last year, they have not released any updates with improvements or extra options."
"Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."
"The URL filtering database should be improved."
"The only thing they should add or improve is the reporting series."
"Currently, the solution's interface is not that user-friendly."
"The reporting functionality could be a bit easier to use. There is a reporting function, but it's quite hard to do any good reporting, from a user-management perspective. For example, if a department manager wants to know how his department is using the web, there is a way to get the data, but it's quite cumbersome to get it and show it well. And that's true for comparing between departments."
"They block Zscaler IPs when the traffic origin is from Zscaler IPs. They've been blocked by certain government organizations so the end users are not able to visit those websites unless we ask them to unblock those IP. This is a bit problematic."
"Zscaler Internet Access needs to integrate more ISPs. It is good to have more than three ISPs."
"What could be improved in Zscaler Internet Access is its price. It could be cheaper."
"Do not expect to pay for the service and start using it, like Gmail. Zscaler requires a proper implementation to be done to make it successful."
"When you have appliances, SSL inspection is always a headache due to poor performance and/or lack of ciphers implemented. "
"Zscaler needs to add client-to-client communication. It's always client-to-server communication. The cloud and branch connectors could be improved because we're still dependent on traditional firewalls. They should eliminate this. They should also provide WAN devices should to compete with the SD-WAN solutions also."
Check Point Harmony Browse is ranked 8th in Secure Web Gateways (SWG) with 18 reviews while Zscaler Internet Access is ranked 2nd in Secure Web Gateways (SWG) with 47 reviews. Check Point Harmony Browse is rated 9.0, while Zscaler Internet Access is rated 8.2. The top reviewer of Check Point Harmony Browse writes "Easy to install with excellent features and boosts productivity". On the other hand, the top reviewer of Zscaler Internet Access writes "Provides integrated CASB and file sandboxing but could be less expensive ". Check Point Harmony Browse is most compared with Cisco Umbrella, whereas Zscaler Internet Access is most compared with Cisco Umbrella, Microsoft Defender for Cloud Apps, Netskope , Prisma Access by Palo Alto Networks and FortiSASE . See our Check Point Harmony Browse vs. Zscaler Internet Access report.
See our list of best Secure Web Gateways (SWG) vendors.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.