Try our new research platform with insights from 80,000+ expert users
Sr. Software Architect at Isecurex
Real User
Seamless connectivity through advanced application access and excellent support
Pros and Cons
  • "The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay."
  • "Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric."

What is our primary use case?

I use Remote Access VPN for clientless applications, setting up WireGuard tunnels, and WireGuard VPN as a service. It provides remote access for SIP setups, allowing users to connect securely through a VPN.

What is most valuable?

The most valuable features include application access, clientless application access, and WireGuard. These features make it easy to deploy and offer a user-friendly interface. The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay.

What needs improvement?

Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric. Improving this process could enhance the solution's scalability and efficiency.

For how long have I used the solution?

I have used Check Point Remote Access VPN for two and a half years.

Buyer's Guide
Check Point Remote Access VPN
December 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.

What do I think about the stability of the solution?

Some connectivity issues arise occasionally, especially when accessing the internet or using other applications. The installed client sometimes reconnects, possibly due to conflicts with existing VPN solutions.

What do I think about the scalability of the solution?

The solution is extremely scalable, with an eight out of ten rating due to its mesh network and ability to build WireGuard tunnels. However, additional automation is required to enhance its enterprise features.

How are customer service and support?

Customer service is excellent. Support is integrated into the product, making it easy to access without needing to search for contact information. There is an icon in the portal for online support, and Check Point local support promptly replies to queries.

How would you rate customer service and support?

Positive

How was the initial setup?

On a scale of one to ten, I would rate the initial setup of Check Point Remote Access VPN as ten because it is super easy to set up.

What's my experience with pricing, setup cost, and licensing?

The pricing is rated eight to 8.5 out of ten. The costs increase with the purchase of advanced features. Licensing issues need to be sorted as different features require separate licenses.

What other advice do I have?

The best solution for small to medium businesses. Licensing issues need to be sorted out. For example, features like CASB and browser security should be bundled. Having automations will help scale to other scenarios.

I'd rate the solution ten out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: consultant
Flag as inappropriate
PeerSpot user
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Great VPN connection that helps extend infrastructure and is perfect for remote worker access
Pros and Cons
  • "Scalability is great. We have been able to grow as a corporation due in part to this type of solution."
  • "Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."

What is our primary use case?

Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client. 

Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.

How has it helped my organization?

Connection through VPN has helped us with the connection to corporate. This type of connection has been very useful to us since, as infrastructure personnel, we can establish a connection to our corporate to make a connection either RDP or directly to services in order to be able to carry out any work activity or review any report by the operational part in order to speed up response times. We can connect to our network equipment by SSH, RDP, or via the web, however, only when we have this type of secure connection.

What is most valuable?

One of the features that has helped us the most with our solutions has been the P2P connection through an IPsec VPN. It has allowed us to extend our infrastructure and grow with new clients. Previously, we had around 15 corporate clients. Through the COVID-19 pandemic, we have managed to grow and now have around 35 new corporate clients and more than 6 people connected by VPN. This has forced us to increase our infrastructure to be able to support all these connections and to have a stable, reliable, and, above all, scalable solution that can interconnect more clients.

What needs improvement?

We have not migrated to the R81 version and I do not doubt that it will have some improvements compared to the version we use today. 

Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor. This type of integration would undoubtedly give it a better reach and greater market with new security trends top of mind. 

I know that everything is moving to a cloud environment, however, for all those corporates that still do not trust such an environment, it would be favorable to offer a 2MFA service in a solution tested through a blade or in the cloud. 

For how long have I used the solution?

I've used the solution for more than five years.

What do I think about the stability of the solution?

The remote workers were experiencing issues like disconections, no IP avaliables from the DHCP, or unable to connect because the server didnt responde to a ping, however this issue was fix after we instlalled the JHF 125 on each gateway and after the upgrade, everythig has been working OK, but before that Check Point didn´t have a fix for that manner.

What do I think about the scalability of the solution?

Scalability is great. We have been able to grow as a corporation due in part to this type of solution.

How are customer service and support?

They have been with us when we needed help. We don't have any complaints about their level of service.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did use a different solution and we switched due to the fact that Check Point is more secure and has more features for the type of connections we need.

How was the initial setup?

It was a straightforward setup.

What about the implementation team?

The product was integrated with in-house personnel.

What was our ROI?

We've seen about a 40% ROI.

What's my experience with pricing, setup cost, and licensing?

Check Point is an expensive solution, however, it has more features and is more secure than other options.

Which other solutions did I evaluate?

Ae evaluated AnyConnect and Palo Alto.

What other advice do I have?

We would like them to add a 2MFA feature in the future. This is our direct request.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
December 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Provides safe connection, good security, and remote access
Pros and Cons
  • "The solution implemented in the cloud allows us to easily scale in cases of user increase."
  • "Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."

What is our primary use case?

The company needs a tool that will provide users with the ability to connect from external addresses and that is where Check Point Endpoint Remote Access VPN services were contracted, which allows users to connect to our firewall. We also have Check Point firewalls in the cloud, to which people can also connect. They can then access the resources in our on-premises environment that they need to access, such as their computers, the Intranet, Salesforce, or our production applications, and have a 100% secure connection.

How has it helped my organization?

Check Point Remote Access VPN has helped us that our users and providers can connect to our network in a safe and efficient way, with the pandemic most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way, the solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

What is most valuable?

Check Point Remote Access VPN has helped us in that our users and providers can connect to our network in a safe and efficient way. With the pandemic, most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way. The solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

What needs improvement?

One of the parts where the improvement of Check Point Remote Access VPN can be forced is in the compliance analysis. Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines.

Another point to improve is to program a timeout if the VPN is disconnected due to an internet problem. One complication that we found is that the Linux machines do not have a complete client to do the installation and that has not delayed a bit with our users who use this type of operating system

For how long have I used the solution?

This solution has been used for approximately Three years in the company.

What do I think about the stability of the solution?

It's very stable in terms of downtime. The performance is very impressive.

What do I think about the scalability of the solution?

The solution can be easily scaled by adding a security gateway and general security and is very robust.

How are customer service and support?

On some occasions, we have had problems. Sometimes it takes a long time to resolve a case while on other occasions they resolve very quickly.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no type of tool that would supply these qualities.

How was the initial setup?

The configuration was very simple. The application is a very user-friendly tool apart from training and courses for implementation.

What about the implementation team?

A Check Point engineer who had a lot of experience in his work helped us with the implementation.

What was our ROI?

Mainly, it offers stability and detects behaviors, and gives users (and administrators) a level of trust as they go about their daily work. It introduces a lot of granularity to our policies.

Another feature that has been helpful is the sandbox feature. Many companies offer this type of thing now, however, Check Point has been offering it for quite some time.

What's my experience with pricing, setup cost, and licensing?

Check Point manages to provide good cost in its products and it is worth making the investment since this solution can prevent a collapse in the organization.

Which other solutions did I evaluate?

Check Point was always our first option with this type of solution since many security teams are from Check Point.

What other advice do I have?

One of the main aspects of importance in a company is the security of the computer platforms. When making an investment with these tools you are taking care of an important patrimony that will double your profits.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2114514 - PeerSpot reviewer
Web Developer at Netconomy Software & Consulting GmbH
User
Top 20
Compatible across devices, reasonably priced, and secures confidential information
Pros and Cons
  • "It keeps us safe when browsing the internet and when sharing confidential information with our colleagues."
  • "Sometimes the application slows down the computing device, and this affects workflows."

What is our primary use case?

The remote VPN enables us to connect our devices under a controlled network infrastructure. It protects the channels for transferring data and confidential information. 

It connects our managers with remote employees to enhance efficiency in the implementation of projects and tasks. Check Point Remote Access VPN blocks unauthorized access to our computing devices. 

It is easy to install and use this VPN for any new user. It keeps all the teams under the same collaboration and networking channel safe. Information encryption secures end-to-end conversation among teams.

How has it helped my organization?

I have experienced the most benefits while using this product in the organization. 

It keeps us safe when browsing the internet and when sharing confidential information with our colleagues. 

When working on joint projects and tasks this product prevents external cyber attacks from attacking our privacy. 

Teams operating from remote areas can customize the location features and set suitable IP addresses that serve them well. 

The speed and reliability enable us to achieve the set targets and initiate trade-offs.

What is most valuable?

It has a simple user interface that is easy to operate and set up. 

The customer support staff provides 24/7 customer support services that enhance effective service delivery. 

The premium version provides the most advanced services that are always effective. 

The cost of maintenance and privacy policies suits our daily demands. 

It is compatible with most devices and can easily integrate with most applications in the organization. 

There is no apparent IP leak and it connects firmly without disconnecting.

What needs improvement?

This version has comprehensive features that provide reliable services based on the organization's requirements. 

Sometimes the application slows down the computing device, and this affects workflows. 

Most modern VPNs offer more features that are more powerful as compared to the ones set up in this system. 

The focus of the next release should be on the compatibility and speed of this platform so that it can easily compete with other products.

It should be customized to accept more languages and more locations.

For how long have I used the solution?

I've used the solution for 14 months.

What do I think about the stability of the solution?

The operations and stability have been firm and reliable.

What do I think about the scalability of the solution?

This is great and scalable product.

How are customer service and support?

The customer support staff offers great services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with different solutions.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is increased ROI from its reliable performance.

What's my experience with pricing, setup cost, and licensing?

It is cost-effective.

Which other solutions did I evaluate?

I have only had experience with this VPN.

What other advice do I have?

The performance has been good and I recommend it to other business enterprises.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Top 5
Easy to set up with good remote access and a flexible to configure VPN
Pros and Cons
  • "This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers."
  • "Connection of devices from various locations is efficient though there are a few challenges when there is a network failure."

What is our primary use case?

Remote Access VPN helps my team to connect our devices remotely without any limitations. It is easy to establish a secure connection among teams and connect efficiently with maximum security. 

Teams can share files effectively under secure networking infrastructure. When implementing projects and tasks, it conveniently troubleshoots technical issues that can affect information traffic. 

I can now share large size of documents with my colleagues from a remote location without any interference. It is easy to facilitate remote workers and engage them.

How has it helped my organization?

This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers. The organization has benefited from a secure network that cyber attacks cannot compromise. We can safely access our servers from anywhere, anytime, without fear of losing confidential information. 

It gives the IT team an opportunity to monitor the performance of devices and control their operations. We can freely connect with our clients from remote areas and give them guidelines without physical appearance under a secure connection.

What is most valuable?

Secure remote access has enabled teams to focus on productive meetings without fear of being attacked by external ransomware attacks. Device access from remote networks has enhanced the efficient connection of teams from various areas. 

The setup process is simple, and new users can set it without any challenges. The cost and maintenance charges are relatively low as compared to most products in the market. 

Configuration of the VPN with other applications is flexible with productive performance. Identity and access management enables the IT team to categorize devices and channel them to effective network infrastructure.

What needs improvement?

My experience with the set features has always been excellent. The secure connection networking system has enabled each team to connect effectively with colleagues from anywhere. 

Connection of devices from various locations is efficient though there are a few challenges when there is a network failure. Disconnection due to internet failure may affect the entire connection and slow down the workflow. 

The setup process requires skilled manpower and dedicated teams to get the best results from the entire connection system. 

Integration of more powerful kill switch tools will enhance secure connection. 

Additional server locations can boost service delivery and cut the cost of connecting computing devices from different areas.

For how long have I used the solution?

I've used the solution for 11 months.

What do I think about the stability of the solution?

The secure connection is stable.

What do I think about the scalability of the solution?

I am impressed by the performance of this tool.

How are customer service and support?

The customer support operations have been excellent throughout.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with another VPN.

How was the initial setup?

The initial setup was successful.

What about the implementation team?

Implementation was through the vendor.

What was our ROI?

The ROI has been positive since we deployed this tool.

What's my experience with pricing, setup cost, and licensing?

The setup and licensing terms are effective.

Which other solutions did I evaluate?

This is the best solution that I have come across.

What other advice do I have?

For secure device connection and team collaboration, this is the best solution.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Top 5Leaderboard
Good encryption, secure login capabilities and easy to install
Pros and Cons
  • "A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme."
  • "A characteristic to improve is the communication service under the SMTP scheme."

What is our primary use case?

We wanted to give employees the possibility to work from anywhere outside of the organization, being a house or another remote location of offices. We wanted this capability with the possibility and ease to grant them access to our perimeter network so that they could access the data or internal applications for the use of each of its functions. We wanted faster, safer, and more efficient transactions that are going to be shared within our organization based on the business.

How has it helped my organization?

This tool gave us the possibility and the benefit of being able to establish that all users, according to their geographical location, need to transfer, manage, execute, validate, and maintain data. We are always in contact with all users within and outside. It is strong, fast, easy to install, and extremely secure for each of the functions that it is designed for. Important to note is that one of the features uses a single sign-on approach.

What is most valuable?

Among other features, advantages, and services that the solution provides us, it is important to understand that it gives us the possibility, capacity, and management for establishing that each of the resources is accessed through encrypted communication tunnels. A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme. This goes beyond a simple password, giving us the possibility of integrating more than one service. 

What needs improvement?

A characteristic to improve is the communication service under the SMTP scheme. In some cases, it is quite complex when it comes to managing, configuring, forwarding, and integrating mail services. It consumes a lot of processing and RAM memory. We want a solution that allows us to use current resources so that high processing peaks demanded by the virtual or physical equipment do not occur. 

For how long have I used the solution?

I've used the solution for four years.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2024712 - PeerSpot reviewer
Planning Analyst at Ovato
User
Top 5
A powerful VPN that is secure and reliable
Pros and Cons
  • "The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked."
  • "The cost of maintenance is high compared to most products in the market."

What is our primary use case?

The Remote Access VPN provides security to all computing devices across the organization. I can securely log in from a remote area and access the organization's data without physical appearance. 

It is easy to collaborate with colleagues in the same networking area from different locations. 

When interacting with our customers, I can easily change my IP address to correspond with a client's. 

This platform has saved the company a lot of resources that are being used to set up remote offices. 

How has it helped my organization?

This application provides total data security across the enterprise networking infrastructure. Remote interactions with my colleagues are encrypted to enhance safety and prevent threats. 

The organization of virtual events is always secure due to efficient security measures deployed in the organization. 

A powerful VPN has lowered the cost of team engagements and interactions in the field. 

The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked.

What is most valuable?

The set of security features that prevent data leakages has saved resources. 

The customer support team responds faster when contacted to provide solutions for technical failures. 

The application does not affect the storage and functionalities of the operating system. 

The UI enables new users to understand the working criteria of the features easily. 

The performance of this tool does not affect the performance of other applications when deployed on mobile or desktop devices. 

All the set features have a great impact on protection from data leakages and have saved our organization from threats.

What needs improvement?

Sometimes it may mislead the user based on the requested location due to poor networking. 

Most features have capable performance that responds quickly to user requests. 

The cost of maintenance is high compared to most products in the market. 

Integrations with some applications are difficult due to poor compatibility tools. The development team should focus more on updates and integration features. 

I am impressed by the current performance despite the few challenges. The overall performance has been excellent, and I recommend it to others 

For how long have I used the solution?

I've used the solution for six months.

What do I think about the stability of the solution?

The product performance is efficient.

What do I think about the scalability of the solution?

The performance is excellent.

How are customer service and support?

The customer support staff is reliable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with any similar solution.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation was handled in-house.

What was our ROI?

We have gained positive ROI since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The setup process is not complex.

Which other solutions did I evaluate?

I evaluated other VPNs, however, in those cases, the performance was not stable.

What other advice do I have?

This is the best VPN I have worked with so far.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Great encryption and MFA with helps improve a company's security posture
Pros and Cons
  • "It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents."
  • "Improved scalability would allow the solution to handle larger numbers of users and devices without a significant impact on performance."

What is our primary use case?

Check Point Remote Access VPN is a VPN solution that allows users to securely connect to corporate networks from remote locations. It enables users to access corporate resources such as files, applications, and network devices as if they were on the corporate network.

The primary use case of Check Point Remote Access VPN is to provide secure remote access for employees, contractors, and partners who need to access corporate resources while working remotely. This can include employees working from home, traveling, or working in a remote office location. 

How has it helped my organization?

It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents. 

It also can improve the organization's security posture by providing secure remote access with multi-factor authentication, encryption, and other security features.

It is important to note that the results of the solution will depend on the organization's specific environment and configuration as well as how well it is implemented and managed.

What is most valuable?

Some of the features that are considered most valuable in Check Point Remote Access VPN include: 

Multi-factor authentication. This feature allows organizations to use a combination of authentication methods such as certificates, tokens, biometric authentication, and user credentials to secure remote access connections.

Encryption. This feature provides end-to-end encryption for remote access connections, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks. 

What needs improvement?

The solution needs:

Advanced monitoring and reporting capabilities in order to have a more detailed visibility into security incidents and events. It's important to note that the areas of improvement and additional features will vary depending on the specific use case and the organization's security needs, so it is recommended to contact the vendor to know more details about their roadmap and the next releases of the product. 

Improved scalability to allow the solution to handle larger numbers of users and devices without a significant impact on performance. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.