- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Harmony SASE is not “a VPN in the cloud.” It is a SASE platform with a global PoP/Region mesh acting as policy enforcement points for two primary planes:
Internet Access (SWG) for web/SaaS
Private Access (ZTNA) for private applications (on-prem / cloud)
The operational differentiator is a centralized governance and policy model, combined with site-to-cloud connectivity (tunnels) and routed interconnectivity (when required).
Policies, objects, users, and rules are managed in the Infinity Portal (Harmony SASE Admin Portal).
Examples:
Internet Access Policy (SWG)
Data Loss Prevention (DLP)
Private Access rules
Directory integrations (AD / Azure AD / SCIM) and automation APIs
Remote users, branches, and workloads establish connectivity to the PoP/Region mesh.
Traffic is routed to:
Internet Access (SWG): secure access to web/SaaS
Private Access (ZTNA): secure access to private applications (on-prem or cloud)
Remote Users (Agent / on-device) → Harmony SASE PoP → Web/SaaS
Remote Users / BYOD (Agentless) → Harmony SASE PoP → Private Apps (DC/Cloud)
Offices / DC / Cloud workloads (IPsec/WireGuard/OpenVPN) → Harmony SASE PoP → Interconnectivity / routing (when applicable)
Critical note: “Full mesh” refers to any-to-any connectivity via the SASE backbone, but site-to-site interconnectivity requires explicit routing — it is not automatic.
Harmony SASE operates through globally distributed PoPs.
The PoP is the policy enforcement point for Internet Access and Private Access.
Region selection directly impacts latency, user experience, and resiliency.
Three tunnel types are supported to connect sites/resources into the mesh:
IPsec Site-to-Site VPN
WireGuard Connector
OpenVPN
To interconnect sites through the SASE mesh, you must configure routes in the Route Table, including:
each site’s subnets, and
the mesh subnet (e.g., 10.255.0.0/16)
Operational caution:
In policy-based environments, interconnectivity may require multiple Phase II SAs and not all routers support this model; route-based IPsec is recommended for interconnectivity use cases.
By default, the WireGuard Connector is installed in accessor mode, which does not allow resource-to-resource traffic without specific configuration/re-installation.
This is a classic root cause of “tunnel is up, but no lateral traffic.”
The typical design is to start with Internet Access Policy and, when needed, define bypass rules for critical applications—especially apps with certificate pinning.
Important: enforcement of Threat Prevention / DLP / inspection can impact performance and compatibility; rollout should be controlled, with baselines and monitoring.
Secure access to private applications (e.g., SSH, RDP, Web, Database) via agent or agentless portal.
Enables onboarding for BYOD and third parties without requiring agent deployment/management in specific scenarios.
Integrated DLP module with policies scoped by members/groups and management of Data Types / Data Groups.
Integration with Microsoft Purview Sensitivity Labels for data governance.
Ability to protect uninstallation with a code (“Uninstall is Protected”), reducing control evasion and posture/enforcement drift.
Tunnel UP, no traffic (site ↔ site)
Almost always missing explicit routes in the Route Table for remote subnets + the mesh subnet.
WireGuard Connector with no lateral traffic
Default accessor mode blocks resource-to-resource unless reconfigured.
Application breaks after inspection (SSL / SWG)
Most commonly certificate pinning → requires a bypass rule.
Data exfiltration via SaaS/AI
Without DLP or correct group/risk scoping, sensitive data escapes via uploads/web apps.
Operations without governance
Lack of logging/telemetry and metrics turns troubleshooting into trial-and-error and MTTR spikes.
Pros
Fast initial deployment
Operational familiarity
Cons
Expanded attack surface (network exposure)
Low per-application granularity
Fragmented governance and observability
Harder to enforce identity-driven Zero Trust
Pros
Reduces exposure with application-level access
Good incremental evolution path
Cons
Multiple consoles and policy stacks
More complex integrations/troubleshooting
Hard to unify logs and governance
Pros
Centralized policy/governance model
PoPs/Regions as global enforcement points
ZTNA/agentless + DLP + Threat Prevention under unified governance
Support for IPsec/WireGuard/OpenVPN
Cons
Interconnectivity requires explicit routing design (route-based recommended)
Controlled rollout required (bypass/pinning/tuning)
Subnet planning needed to avoid overlaps
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY