We performed a comparison between Check Point Harmony Browse and Zscaler Internet Access based on real PeerSpot user reviews.
Find out in this report how the two Secure Web Gateways (SWG) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is stable."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance."
"Check Point Harmony Browse has a feature that allows users to check the extensions installed in their browser. This feature is valuable because hackers may install malicious extensions on a target computer without the user's knowledge. When browsing, users are often less aware of the extensions installed in their browsers, making it easier for malicious extensions to go unnoticed. By providing visibility into installed extensions, Check Point Harmony Browse enhances security by allowing users to identify and remove potentially harmful extensions."
"It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded."
"Its potential features of Threat Detection and Threat Emulation have helped businesses to browse securely hassle-free without any tension."
"The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete."
"The product is stable."
"The downloaded protection as it scans and emulates the files on a browser level is great."
"The product enforces the privacy of the users, which is good."
"It is easy to set up the solution."
"Whether you are in a hotel somewhere, or in Africa, it does not matter. You will get the Zscaler protection presence anywhere."
"The solution has reduced cyberattacks."
"One on the main benefits is protection all time from anywhere."
"SSL inspection is a valuable feature."
"All internet access flows through the Zscaler proxy, regardless of whether people are in office or remote. I have greater control site access and I minimize the number of compromises that we experience to almost none."
"The solution’s customer service is good."
"The solution is scalable and stable."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."
"One of the new features I would like to see is the possibility that these tools can be brought to mobile devices such as tablets and cell phones in iOS or Android applications."
"It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow."
"More focus and emphasis is required on customization and real-time notification and alert system."
"A slight reduction in the cost subscription model can prove to be a game changer."
"The solution needs greater automation to reduce the need for manual configuration and management."
"I would like the solution to be implemented more easily for teams and directly on Android or iOS devices."
"Support must be faster in solving problems."
"An improvement would be if they could provide an out-of-the-box experience, like 20 to 30 features all ready to go. In comparison, LogRhythm offers out-of-the-box features. With Zscaler Internet Access, there is firewall IPS, multiple security services, filtering, DLP, and CASB browser isolation. These are things that all users are going to be using. However, when an administrator or architect would start building this, I would definitely need to engage professional services to help clients do it."
"The main issue with Zscaler Internet Access is proxy IP detection, which sometimes makes sites inaccessible."
"Zscaler needs to add client-to-client communication. It's always client-to-server communication. The cloud and branch connectors could be improved because we're still dependent on traditional firewalls. They should eliminate this. They should also provide WAN devices should to compete with the SD-WAN solutions also."
"I don't know whether it's Zscaler or not, however, sometimes I can't access my time management. I need to wait and try again a few hours later. Typically, if I let some time pass, I can access it again."
"Zscaler Internet Access can improve by adding traffic filtering based on the DNS."
"In terms of usage, here in the GCC, it's still growing a growing market, so the combination of DLP, data leak prevention, to a certain extent is fine. But what it requires is user-based access or role-based access. The solution needs to grow into that, which definitely takes time. There's not an easy way to integrate it, when you have a cloud-based solution."
"Zscaler does not provide dedicated IPs to each customer. Hence, they share a pool of IPs provided by Zscaler. There is a chance of blacklisting these IPs. I also do not like the multi-management portal."
"Sometimes, support isn't available."
Check Point Harmony Browse is ranked 10th in Secure Web Gateways (SWG) with 18 reviews while Zscaler Internet Access is ranked 2nd in Secure Web Gateways (SWG) with 46 reviews. Check Point Harmony Browse is rated 9.0, while Zscaler Internet Access is rated 8.2. The top reviewer of Check Point Harmony Browse writes "Easy to install with excellent features and boosts productivity". On the other hand, the top reviewer of Zscaler Internet Access writes "Provides integrated CASB and file sandboxing but could be less expensive ". Check Point Harmony Browse is most compared with Cisco Umbrella, whereas Zscaler Internet Access is most compared with Cisco Umbrella, Microsoft Defender for Cloud Apps, Netskope , Prisma Access by Palo Alto Networks and FortiSASE . See our Check Point Harmony Browse vs. Zscaler Internet Access report.
See our list of best Secure Web Gateways (SWG) vendors.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.