We performed a comparison between Check Point Remote Access VPN and OpenText Exceed TurboX based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
"It is easy to install the Endpoint Remote Access VPN client to different platforms."
"The most valuable feature is the seamless access."
"The clients of the customers have a facility to access the enterprise network."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
"It operates effectively, particularly during challenges like adversities or infrastructure issues."
"We can integrate remote access to our branches through Check Point services."
"Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
"The most helpful feature of OpenText Exceed TurboX (ETX) is that it allows you to consume heavy applications that usually have a lot of latency. I also like that the solution is fast and has a friendly UI."
"The solution is perfect for Linux users."
"Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access."
"The Linux version may have an app (similar to Windows) instead of a shell script."
"Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte."
"You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable MEP function is not so easy to size the gateway licenses."
"The main feature that would be improved within Check Point Remote Access is its operation within Linux OS, as it currently does not have many features for that OS."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"We would like to see support for a layer seven VPN over UDP."
"It would be good to have Remote Access VPN solutions for Check Point edge services."
"The performance of the graphical interface needs improvement. They should add some CPU to speed graphic acceleration."
"An area for improvement in OpenText Exceed TurboX (ETX) is the installation process because you need some technical knowledge to install it. What's lacking in OpenText Exceed TurboX (ETX) is a help portal for users to ask questions and seek assistance."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 5th in Remote Access with 62 reviews while OpenText Exceed TurboX is ranked 11th in Remote Access with 2 reviews. Check Point Remote Access VPN is rated 8.8, while OpenText Exceed TurboX is rated 8.6. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of OpenText Exceed TurboX writes "Fast and has a friendly UI; allows you to consume heavy applications". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Zscaler Zero Trust Exchange, whereas OpenText Exceed TurboX is most compared with VNC Connect, Citrix Workspace, Microsoft Remote Desktop Services, VMware Horizon and Citrix DaaS (formerly Citrix Virtual Apps and Desktops service). See our Check Point Remote Access VPN vs. OpenText Exceed TurboX report.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.