We performed a comparison between Check Point Remote Access VPN and TeamViewer Tensor based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The secure hotspot access for enabling good network connectivity is great."
"Setting policies allow, block, and limit users' access."
"This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers."
"It keeps us safe when browsing the internet and when sharing confidential information with our colleagues."
"The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera."
"The initial set up is not complex."
"One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure."
"Check Point Remote Access VPN has some useful features, and configuring it is relatively straightforward."
"Remote desktop sharing is one valuable feature of the solution."
"This product is very simple to use and you can connect whether you are behind a firewall or not."
"The most valuable feature of TeamViewer Tensor is the remote access."
"Generally, the license is included with the Check Point gateway licensing, however, in terms of the number of users that can be activated for use, it is generally five users."
"We have noted some stability issues."
"The main area for improvement is pricing. Another area could be integrating MFA authentication directly into the solution instead of using separate benchmark tools for implementation."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"We would like to implement HTML5 (clientless access) in the product without installing any additional software."
"Sometimes the application slows down the computing device, and this affects workflows."
"Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience."
"In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system."
"The SSO feature of the solution may sometimes not function perfectly…Pricing might be improved for TeamViewer Tensor."
"The solution could include more AI (Artificial Intelligence)."
"Having the ability to create subgroups and delegate permissions to the group members would be a helpful addition."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 5th in Remote Access with 62 reviews while TeamViewer Tensor is ranked 8th in Remote Access with 4 reviews. Check Point Remote Access VPN is rated 8.8, while TeamViewer Tensor is rated 8.6. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of TeamViewer Tensor writes "A user-friendly and stable solution providing remote desktop sharing functionality to its users". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Zscaler Zero Trust Exchange, whereas TeamViewer Tensor is most compared with TeamViewer, TeamViewer Pilot, BeyondTrust Remote Support, Parallels Access and LogMeIn Rescue. See our Check Point Remote Access VPN vs. TeamViewer Tensor report.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.