Introducing G2.ai, the future of software buying.Try now

Compare AWS VPN and Check Point Harmony SASE

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
AWS VPN
AWS VPN
Star Rating
(24)4.7 out of 5
Market Segments
Mid-Market (52.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about AWS VPN
Check Point Harmony SASE
Check Point Harmony SASE
Star Rating
(195)4.5 out of 5
Market Segments
Mid-Market (51.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Harmony SASE
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Check Point Harmony SASE excels in providing a unified, cloud-native security experience, allowing seamless access for users working remotely. Its Zero Trust approach and strong threat prevention are frequently highlighted as key benefits, ensuring consistent protection across all devices and networks.
  • Users say that AWS VPN is easy to set up and straightforward, making it a good choice for those who may not be tech-savvy. Reviewers appreciate its simplicity, noting that it effectively facilitates access to partner platforms that require specific IP addresses.
  • According to verified reviews, Check Point Harmony SASE offers centralized management that saves time and simplifies policy adjustments. Users have praised the platform for its ability to integrate seamlessly with existing tools, providing clear visibility into user activity without compromising performance.
  • Reviewers mention that while AWS VPN provides a robust set of features for secure connectivity, it may lack some of the advanced security functionalities that Check Point Harmony SASE offers. Users appreciate the fully managed nature of AWS VPN's services, but some feel it doesn't match the comprehensive security capabilities of its competitor.
  • Users highlight that Check Point Harmony SASE scores higher in ease of administration, with many finding it easier to manage than AWS VPN. The platform's user-friendly interface and clear access policies contribute to a more efficient administrative experience.
  • G2 reviewers note that while both products serve the mid-market well, Check Point Harmony SASE has a larger volume of reviews, indicating a broader user base and potentially more reliable feedback. This suggests that users may find more diverse experiences and insights when considering Check Point's offerings.
Pricing
Entry-Level Pricing
AWS VPN
No pricing available
Check Point Harmony SASE
No pricing available
Free Trial
AWS VPN
No trial information available
Check Point Harmony SASE
No trial information available
Ratings
Meets Requirements
9.0
22
9.1
155
Ease of Use
8.9
22
9.1
158
Ease of Setup
8.3
16
8.7
89
Ease of Admin
8.7
14
8.9
79
Quality of Support
9.1
21
9.0
143
Has the product been a good partner in doing business?
8.7
14
8.8
80
Product Direction (% positive)
9.4
21
8.7
142
Features by Category
Unified Threat Management (UTM)Hide 8 FeaturesShow 8 Features
Not enough data
Not enough data
Security - Unified Threat Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Data Center Security SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Detection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.1
40
Network Management
Not enough data
8.4
31
Not enough data
8.3
31
Not enough data
Feature Not Available
Not enough data
8.0
24
Security
Not enough data
Feature Not Available
Not enough data
8.1
24
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Identity Management
Not enough data
8.2
32
Not enough data
Feature Not Available
Not enough data
8.1
34
Generative AI
Not enough data
7.6
16
Not enough data
7.8
16
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
7.7
6
Analysis
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Functionality
Not enough data
8.1
6
Not enough data
Not enough data
Not enough data
6.9
6
Security
Not enough data
7.5
6
Not enough data
Not enough data
Not enough data
7.8
6
Not enough data
8.1
6
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
8.6
30
Administration
Not enough data
8.8
21
Not enough data
8.9
22
Not enough data
8.7
21
Protection
Not enough data
8.9
23
Not enough data
8.3
23
Not enough data
8.6
23
Not enough data
8.8
26
Monitoring
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.5
21
Not enough data
8.3
21
Not enough data
8.2
37
Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.3
30
Monitoring
Not enough data
7.8
31
Not enough data
Feature Not Available
Not enough data
7.8
30
Protection
Not enough data
8.6
31
Not enough data
Feature Not Available
Not enough data
8.7
31
Not enough data
8.2
29
Not enough data
Not enough data
Web Content and Traffic Filtering - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Protection and Loss Prevention - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access Control and Authentication - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Performance and Management - Secure Web Gateways
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network as a Service (NaaS) PlatformsHide 18 FeaturesShow 18 Features
Not enough data
Not enough data
Scalability & Deployment - Network as a Service (NaaS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security & Compliance - Network as a Service (NaaS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Performance & Optimization - Network as a Service (NaaS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remote Connectivity & Access - Network as a Service (NaaS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI-Driven & Adaptive Features - Network as a Service (NaaS)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Secure Access Service Edge (SASE) PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.5
17
Components - Secure Access Service Edge (SASE)
Not enough data
8.8
16
Not enough data
8.3
15
Not enough data
8.3
15
Not enough data
8.6
15
Not enough data
8.9
15
Artificial Intelligence - Secure Access Service Edge (SASE)
Not enough data
8.4
15
Not enough data
9.4
16
Not enough data
8.6
15
Agentic AI - Secure Access Service Edge (SASE) Platforms
Not enough data
8.2
15
Not enough data
8.2
16
Not enough data
8.3
15
Not enough data
8.4
15
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.6
21
8.9
57
Usage
8.8
20
9.3
50
8.8
19
9.3
45
9.2
19
8.9
41
9.3
19
9.2
43
8.0
19
Feature Not Available
8.9
19
8.9
42
8.9
19
8.7
38
Miscellaneous
9.0
19
8.8
45
7.5
19
Feature Not Available
7.8
19
8.7
37
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
AWS VPN
AWS VPN
Check Point Harmony SASE
Check Point Harmony SASE
AWS VPN and Check Point Harmony SASE are categorized as Business VPN
Reviews
Reviewers' Company Size
AWS VPN
AWS VPN
Small-Business(50 or fewer emp.)
34.8%
Mid-Market(51-1000 emp.)
52.2%
Enterprise(> 1000 emp.)
13.0%
Check Point Harmony SASE
Check Point Harmony SASE
Small-Business(50 or fewer emp.)
35.8%
Mid-Market(51-1000 emp.)
51.3%
Enterprise(> 1000 emp.)
12.8%
Reviewers' Industry
AWS VPN
AWS VPN
Information Technology and Services
30.4%
Computer & Network Security
17.4%
Computer Software
13.0%
Telecommunications
4.3%
Marketing and Advertising
4.3%
Other
30.4%
Check Point Harmony SASE
Check Point Harmony SASE
Information Technology and Services
19.8%
Computer & Network Security
13.9%
Computer Software
10.7%
Marketing and Advertising
5.3%
Hospital & Health Care
4.8%
Other
45.5%
Alternatives
AWS VPN
AWS VPN Alternatives
Netgate pfSense
Netgate pfSense
Add Netgate pfSense
OpenVPN Access Server
OpenVPN Access Server
Add OpenVPN Access Server
Absolute Secure Access
Absolute Secure Access
Add Absolute Secure Access
NordLayer
NordLayer
Add NordLayer
Check Point Harmony SASE
Check Point Harmony SASE Alternatives
NordLayer
NordLayer
Add NordLayer
Twingate
Twingate
Add Twingate
Zscaler Internet Access
Zscaler Internet Access
Add Zscaler Internet Access
Cato SASE Cloud
Cato SASE Cloud
Add Cato SASE Cloud
Discussions
AWS VPN
AWS VPN Discussions
Monty the Mongoose crying
AWS VPN has no discussions with answers
Check Point Harmony SASE
Check Point Harmony SASE Discussions
What services do perimeter 81 provide?
1 Comment
Boaz A.
BA
Perimeter 81's service consists of the Zero Trust Network Platform which provides services such as SSL Inspection, Identity provider (IdP) integration,...Read more
What are the capabilities of software perimeter solution?
1 Comment
Boaz A.
BA
A Software Defined Perimeter (SDP) enables secure connectivity of remote users to the corporate network. This type of solution is also knows as Zero Trust...Read more
How does perimeter 81 work?
1 Comment
Boaz A.
BA
Perimeter 81 is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem or...Read more