Try our new research platform with insights from 80,000+ expert users

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Check Point Remote Access VPN allows seamless remote work by enabling secure access to on-premise applications and internal systems from anywhere, significantly enhancing productivity.
Integration with existing infrastructure like Active Directory and Check Point firewall makes Check Point Remote Access VPN deployment straightforward without requiring additional hardware.
Advanced security features in Check Point Remote Access VPN, such as multi-factor authentication and encryption, ensure data protection and reduce unauthorized access risks.
Check Point Remote Access VPN's scalability supports adding more users and has helped organizations grow by facilitating remote connectivity across branches and sites.
Technical support for Check Point Remote Access VPN is highly rated, providing reliability and assistance during implementations or upgrades.

CONS

Check Point Remote Access VPN struggles with complexity and requires simplification, especially in configuration and management tasks.
Support for Linux systems is limited, creating challenges for users of this operating system.
Updating and deploying the Check Point client is difficult, particularly for remote machines.
Integration with third-party services, including MFA, is cumbersome and could be streamlined.
Scalability issues arise when handling a larger number of users, impacting performance and stability.
 

Check Point Remote Access VPN Pros review quotes

Adriano-Simao - PeerSpot reviewer
Chief Technology Officer at Triana Business Solutions Lda
Oct 13, 2019
The ability to create your trigger data domains is the solution's most valuable feature.
reviewer1232001 - PeerSpot reviewer
IT Tech Security Management at a logistics company with 1,001-5,000 employees
Nov 26, 2019
The management of the solution is very simple. It allows for a single view of all the endpoints.
CK
Senior System Engineer at Thai Transmission Industry
Jan 26, 2020
The initial set up is not complex.
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,455 professionals have used our research since 2012.
reviewer1144182 - PeerSpot reviewer
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees
Apr 19, 2020
Our users find the interface very comfortable to use.
reviewer1398543 - PeerSpot reviewer
Network Security Engineer at a financial services firm with 51-200 employees
Aug 3, 2020
It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now.
OP
Senior Network/Security Engineer at Skywind Group
Feb 28, 2022
It is easy to install the Endpoint Remote Access VPN client to different platforms.
KP
Network Engineer at LTTS
Sep 17, 2020
The most valuable feature is the seamless access.
reviewer1098015 - PeerSpot reviewer
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Oct 25, 2020
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.
reviewer1591110 - PeerSpot reviewer
ICT at a manufacturing company with 501-1,000 employees
May 31, 2021
For us, it was essential to integrate with Active Directory, which is our credentials repository.
BD
Chief Information Security Officer at Abcl
May 31, 2021
Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live.
 

Check Point Remote Access VPN Cons review quotes

Adriano-Simao - PeerSpot reviewer
Chief Technology Officer at Triana Business Solutions Lda
Oct 13, 2019
The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.
reviewer1232001 - PeerSpot reviewer
IT Tech Security Management at a logistics company with 1,001-5,000 employees
Nov 26, 2019
I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not.
CK
Senior System Engineer at Thai Transmission Industry
Jan 26, 2020
They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
879,455 professionals have used our research since 2012.
reviewer1144182 - PeerSpot reviewer
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees
Apr 19, 2020
There is always room for innovation and the addition of new features.
reviewer1398543 - PeerSpot reviewer
Network Security Engineer at a financial services firm with 51-200 employees
Aug 3, 2020
When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client.
OP
Senior Network/Security Engineer at Skywind Group
Feb 28, 2022
The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed.
KP
Network Engineer at LTTS
Sep 17, 2020
We would like to see support for a layer seven VPN over UDP.
reviewer1098015 - PeerSpot reviewer
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Oct 25, 2020
We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved.
reviewer1591110 - PeerSpot reviewer
ICT at a manufacturing company with 501-1,000 employees
May 31, 2021
In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems.
BD
Chief Information Security Officer at Abcl
May 31, 2021
The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access.