Try our new research platform with insights from 80,000+ expert users
reviewer2114514 - PeerSpot reviewer
Web Developer at Netconomy Software & Consulting GmbH
User
Top 20
Compatible across devices, reasonably priced, and secures confidential information
Pros and Cons
  • "It keeps us safe when browsing the internet and when sharing confidential information with our colleagues."
  • "Sometimes the application slows down the computing device, and this affects workflows."

What is our primary use case?

The remote VPN enables us to connect our devices under a controlled network infrastructure. It protects the channels for transferring data and confidential information. 

It connects our managers with remote employees to enhance efficiency in the implementation of projects and tasks. Check Point Remote Access VPN blocks unauthorized access to our computing devices. 

It is easy to install and use this VPN for any new user. It keeps all the teams under the same collaboration and networking channel safe. Information encryption secures end-to-end conversation among teams.

How has it helped my organization?

I have experienced the most benefits while using this product in the organization. 

It keeps us safe when browsing the internet and when sharing confidential information with our colleagues. 

When working on joint projects and tasks this product prevents external cyber attacks from attacking our privacy. 

Teams operating from remote areas can customize the location features and set suitable IP addresses that serve them well. 

The speed and reliability enable us to achieve the set targets and initiate trade-offs.

What is most valuable?

It has a simple user interface that is easy to operate and set up. 

The customer support staff provides 24/7 customer support services that enhance effective service delivery. 

The premium version provides the most advanced services that are always effective. 

The cost of maintenance and privacy policies suits our daily demands. 

It is compatible with most devices and can easily integrate with most applications in the organization. 

There is no apparent IP leak and it connects firmly without disconnecting.

What needs improvement?

This version has comprehensive features that provide reliable services based on the organization's requirements. 

Sometimes the application slows down the computing device, and this affects workflows. 

Most modern VPNs offer more features that are more powerful as compared to the ones set up in this system. 

The focus of the next release should be on the compatibility and speed of this platform so that it can easily compete with other products.

It should be customized to accept more languages and more locations.

Buyer's Guide
Check Point Remote Access VPN
January 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for 14 months.

What do I think about the stability of the solution?

The operations and stability have been firm and reliable.

What do I think about the scalability of the solution?

This is great and scalable product.

How are customer service and support?

The customer support staff offers great services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with different solutions.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is increased ROI from its reliable performance.

What's my experience with pricing, setup cost, and licensing?

It is cost-effective.

Which other solutions did I evaluate?

I have only had experience with this VPN.

What other advice do I have?

The performance has been good and I recommend it to other business enterprises.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Top 5
Easy to set up with good remote access and a flexible to configure VPN
Pros and Cons
  • "This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers."
  • "Connection of devices from various locations is efficient though there are a few challenges when there is a network failure."

What is our primary use case?

Remote Access VPN helps my team to connect our devices remotely without any limitations. It is easy to establish a secure connection among teams and connect efficiently with maximum security. 

Teams can share files effectively under secure networking infrastructure. When implementing projects and tasks, it conveniently troubleshoots technical issues that can affect information traffic. 

I can now share large size of documents with my colleagues from a remote location without any interference. It is easy to facilitate remote workers and engage them.

How has it helped my organization?

This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers. The organization has benefited from a secure network that cyber attacks cannot compromise. We can safely access our servers from anywhere, anytime, without fear of losing confidential information. 

It gives the IT team an opportunity to monitor the performance of devices and control their operations. We can freely connect with our clients from remote areas and give them guidelines without physical appearance under a secure connection.

What is most valuable?

Secure remote access has enabled teams to focus on productive meetings without fear of being attacked by external ransomware attacks. Device access from remote networks has enhanced the efficient connection of teams from various areas. 

The setup process is simple, and new users can set it without any challenges. The cost and maintenance charges are relatively low as compared to most products in the market. 

Configuration of the VPN with other applications is flexible with productive performance. Identity and access management enables the IT team to categorize devices and channel them to effective network infrastructure.

What needs improvement?

My experience with the set features has always been excellent. The secure connection networking system has enabled each team to connect effectively with colleagues from anywhere. 

Connection of devices from various locations is efficient though there are a few challenges when there is a network failure. Disconnection due to internet failure may affect the entire connection and slow down the workflow. 

The setup process requires skilled manpower and dedicated teams to get the best results from the entire connection system. 

Integration of more powerful kill switch tools will enhance secure connection. 

Additional server locations can boost service delivery and cut the cost of connecting computing devices from different areas.

For how long have I used the solution?

I've used the solution for 11 months.

What do I think about the stability of the solution?

The secure connection is stable.

What do I think about the scalability of the solution?

I am impressed by the performance of this tool.

How are customer service and support?

The customer support operations have been excellent throughout.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with another VPN.

How was the initial setup?

The initial setup was successful.

What about the implementation team?

Implementation was through the vendor.

What was our ROI?

The ROI has been positive since we deployed this tool.

What's my experience with pricing, setup cost, and licensing?

The setup and licensing terms are effective.

Which other solutions did I evaluate?

This is the best solution that I have come across.

What other advice do I have?

For secure device connection and team collaboration, this is the best solution.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
January 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port
User
Excellent support with great multi-factor authentication and compliance checks
Pros and Cons
  • "It offers a simple configuration and setup."
  • "It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices."

What is our primary use case?

We primarily use the solution for work from home. Our main goal is to provide users with the ability to access their workstation from anywhere in the world.

We provided remote access to more than 500 users during the pandemic. Check Point Remote Access VPN has worked smoothly as our appliance is capable of supporting 1000+ users.

We deployed a VPN client-based solution with multi-factor authentication. The compliance check feature is useful.

It is compatible with several operating systems, and it has great protection against malware.

It offers a simple configuration and setup.

How has it helped my organization?

We developed work-from-home policies for our organization during the pandemic due to the rise in COVID cases. As network security engineers, it's challenging for us to manage users' personal laptops and computers which are not up to date (OS, Antivirus ..etc). However, when it comes to the Check Point VPN solution, we overcame all the challenges and successfully implemented our infrastructure. Logs are helping us to monitor each user's activity. We can also isolate user laptops or PCs from the internet when its gets connected to our network.

What is most valuable?

The remote access blade is built in on the firewall, so it is easy to activate through the Smart Console.

Only the VPN client supports only the Windows and Apple Mac operating systems, which also support iOS and Android mobile platforms. The Check Point development team deserves praise for a flawless experience.

Multi-factor authentication and compliance checks help us to ensure maximum security.

VPN logs give us complete visibility and track unusual activities.

The VPN client user interface is simple and perfect.

The VPN client software is lightweight.

What needs improvement?

It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices.

The configuration of a VPN requires a distinct VPN Tab. Once the VPN blade has been activated, after activating VPN blade, we need to make some configurations in the gateway option settings and others in the VPN communities section. It would be preferable if these two things came together in one place.

Apart from this, it operates flawlessly. To improve our IT Services, we poll our users. The majority of people say how excellent the remote access VPN service is. Additionally, they stated that once connected to a VPN service, they never experience connectivity problems.

For how long have I used the solution?

I've used the solution for more than two years.

How are customer service and support?

The product offers excellent customer service and support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used a different solution that did not satisfy us in terms of security. As a result, we decided to deploy Check Point for enhanced security.

Before migrating to the Check Point firewall, we conducted market research and solicited feedback from my contacts who are already Check Point NGFW customers. We decided to use Check Point.

How was the initial setup?

The VPN Setup and initial configuration are tricky and not straightforward. For example, you need to:

1. Do some configuration in the gateway option, then:

2. VPN Communities

It would be preferable if step 1 and step 2 were available in one place.

3- Lastly, you must apply the firewall policy

What about the implementation team?

We implemented this solution ourselves.

What was our ROI?

We now have a reliable VPN solution to offer our staff, which is a significant return on investment.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Easy to activate with full visibility and network control
Pros and Cons
  • "The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out."
  • "In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system."

What is our primary use case?

This product provides a secure connection to the corporate network from anywhere and safe traffic of data regardless of the possible threats in the WAN it's connected to. It also provides secure access to company apps and controls the traffic depending on each company's policies. Through it, we create layers that control or limit data traffic for specific users. I've been trained in the product and know it's one of the most effective in the business and admit to facilitating my customers to get it from our Check Point partners.

How has it helped my organization?

A clear example of the positive impact this license has had in my organization was back in 2020. The software was in use since before the pandemic hit so our personnel was familiarized with the product; the transition was smooth and secure from the office to work from home. Access policies were run through the active directory applied on all kinds of end points, from cell phones, tablets, laptops, desktops - you name it. Access could be restricted by location and using network security assessments that prevented connecting to corrupted networks. 

What is most valuable?

We already use the Check Point Firewall and those are the ones the organization's employees connect to for the remote VPN and it made it really easy to activate this function as new hardware was not needed. 

The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out. Be it if our users are at home or in the office the same policy applies to them allowing us to view the traffic within our organization.

What needs improvement?

In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system. 

Also, this product has limitations with headcount addition, as there are performance limitations in each security gateway the software has. 

The ability to allow split-tunneling while still following our corporate policy should be offered. 

Some things like the compliance aspect of the VPN Client can be updated so the product stays up to speed with the ever-changing environment in software security.

For how long have I used the solution?

For the past eight years, I've been working at a company where I was first in software security sales for three years and then five years in hardware sales. Since I have a background in security, I've been part of training and sales where Check Point products are involved. I have tested most products Check Point offers due to our partnership.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Provides safe connection, good security, and remote access
Pros and Cons
  • "The solution implemented in the cloud allows us to easily scale in cases of user increase."
  • "Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."

What is our primary use case?

The company needs a tool that will provide users with the ability to connect from external addresses and that is where Check Point Endpoint Remote Access VPN services were contracted, which allows users to connect to our firewall. We also have Check Point firewalls in the cloud, to which people can also connect. They can then access the resources in our on-premises environment that they need to access, such as their computers, the Intranet, Salesforce, or our production applications, and have a 100% secure connection.

How has it helped my organization?

Check Point Remote Access VPN has helped us that our users and providers can connect to our network in a safe and efficient way, with the pandemic most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way, the solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

What is most valuable?

Check Point Remote Access VPN has helped us in that our users and providers can connect to our network in a safe and efficient way. With the pandemic, most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way. The solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

What needs improvement?

One of the parts where the improvement of Check Point Remote Access VPN can be forced is in the compliance analysis. Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines.

Another point to improve is to program a timeout if the VPN is disconnected due to an internet problem. One complication that we found is that the Linux machines do not have a complete client to do the installation and that has not delayed a bit with our users who use this type of operating system

For how long have I used the solution?

This solution has been used for approximately Three years in the company.

What do I think about the stability of the solution?

It's very stable in terms of downtime. The performance is very impressive.

What do I think about the scalability of the solution?

The solution can be easily scaled by adding a security gateway and general security and is very robust.

How are customer service and support?

On some occasions, we have had problems. Sometimes it takes a long time to resolve a case while on other occasions they resolve very quickly.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no type of tool that would supply these qualities.

How was the initial setup?

The configuration was very simple. The application is a very user-friendly tool apart from training and courses for implementation.

What about the implementation team?

A Check Point engineer who had a lot of experience in his work helped us with the implementation.

What was our ROI?

Mainly, it offers stability and detects behaviors, and gives users (and administrators) a level of trust as they go about their daily work. It introduces a lot of granularity to our policies.

Another feature that has been helpful is the sandbox feature. Many companies offer this type of thing now, however, Check Point has been offering it for quite some time.

What's my experience with pricing, setup cost, and licensing?

Check Point manages to provide good cost in its products and it is worth making the investment since this solution can prevent a collapse in the organization.

Which other solutions did I evaluate?

Check Point was always our first option with this type of solution since many security teams are from Check Point.

What other advice do I have?

One of the main aspects of importance in a company is the security of the computer platforms. When making an investment with these tools you are taking care of an important patrimony that will double your profits.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2024712 - PeerSpot reviewer
Planning Analyst at Ovato
User
Top 5
A powerful VPN that is secure and reliable
Pros and Cons
  • "The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked."
  • "The cost of maintenance is high compared to most products in the market."

What is our primary use case?

The Remote Access VPN provides security to all computing devices across the organization. I can securely log in from a remote area and access the organization's data without physical appearance. 

It is easy to collaborate with colleagues in the same networking area from different locations. 

When interacting with our customers, I can easily change my IP address to correspond with a client's. 

This platform has saved the company a lot of resources that are being used to set up remote offices. 

How has it helped my organization?

This application provides total data security across the enterprise networking infrastructure. Remote interactions with my colleagues are encrypted to enhance safety and prevent threats. 

The organization of virtual events is always secure due to efficient security measures deployed in the organization. 

A powerful VPN has lowered the cost of team engagements and interactions in the field. 

The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked.

What is most valuable?

The set of security features that prevent data leakages has saved resources. 

The customer support team responds faster when contacted to provide solutions for technical failures. 

The application does not affect the storage and functionalities of the operating system. 

The UI enables new users to understand the working criteria of the features easily. 

The performance of this tool does not affect the performance of other applications when deployed on mobile or desktop devices. 

All the set features have a great impact on protection from data leakages and have saved our organization from threats.

What needs improvement?

Sometimes it may mislead the user based on the requested location due to poor networking. 

Most features have capable performance that responds quickly to user requests. 

The cost of maintenance is high compared to most products in the market. 

Integrations with some applications are difficult due to poor compatibility tools. The development team should focus more on updates and integration features. 

I am impressed by the current performance despite the few challenges. The overall performance has been excellent, and I recommend it to others 

For how long have I used the solution?

I've used the solution for six months.

What do I think about the stability of the solution?

The product performance is efficient.

What do I think about the scalability of the solution?

The performance is excellent.

How are customer service and support?

The customer support staff is reliable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with any similar solution.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation was handled in-house.

What was our ROI?

We have gained positive ROI since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The setup process is not complex.

Which other solutions did I evaluate?

I evaluated other VPNs, however, in those cases, the performance was not stable.

What other advice do I have?

This is the best VPN I have worked with so far.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Creates a dynamic network with great mobility and excellent stability
Pros and Cons
  • "The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
  • "The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."

What is our primary use case?

We have always worked within the office. However, the COVID pandemic changed the course of our work in terms of where we had to implement new solutions so that we could all work from home. That was when I encountered Check Point; we had years with this solution in the facilities, yet, only during the pandemic did we have to innovate for a home environment. Today we have more than 6000 users working from home thanks to Check Point. This is possible due to the fact that, with a certificate and the client for this connection, every person can connect to our environment as if they were at the office.

How has it helped my organization?

We still have many areas of opportunity in which we must work, however, this has required us to improve our infrastructure in order to accommodate remote work. Since the beginning of the pandemic, we have had this solution and we have had many challenges since there are more than 6000 people who work from home. For security, we have an expiration time of the .p12 certificates and that requires updating passwords. Today, we are integrating this solution with a 2MFA system to give much more security to corporate.

What is most valuable?

The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic for connection to corporate due to the integration we have of Check Point via our AC or LDAP. 

We are creating rules by user and not by IP (which could be done both ways). We stick more to mobility inside and outside the corporate environment. Since then, corporate has been increasing security and keeping our workers happier.

What needs improvement?

The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application. We'd be able to give a better experience to companies that already have a contract or Check Point services that deal with a work-from-home environment, giving greater scope and coverage from a single centralized dashboard.

For how long have I used the solution?

I've used the solution for more than two years

What do I think about the stability of the solution?

The stability is the best.

What do I think about the scalability of the solution?

The scalability is great.

How are customer service and support?

 We have witnessed a fast response from the support team.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution.

How was the initial setup?

The initial setup was not overly complex.

What about the implementation team?

We handled the installation in-house.

What was our ROI?

We've witnessed a 40% ROI.

What's my experience with pricing, setup cost, and licensing?

The price is a little high, however, the solution is something that we recommend often.

Which other solutions did I evaluate?

We did evaluate other options.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2396205 - PeerSpot reviewer
Senior Network Administrator at a transportation company with 1,001-5,000 employees
Real User
Enable employees to securely connect but has configuration limitations
Pros and Cons
  • "Check Point Remote Access VPN has some useful features, and configuring it is relatively straightforward."
  • "Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access."

What is our primary use case?

The main purpose of Check Point Remote Access VPN is to enable employees to securely connect to the corporate network when they work remotely, such as from home.

What is most valuable?

Check Point Remote Access VPN has some useful features, and configuring it is relatively straightforward. However, there are numerous issues, particularly with the SSL connection, including bugs and other problems. 

What needs improvement?

Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access. While there is a feature called "Map multiple entry point," it is reported to be buggy and inadequate. This forces users to purchase additional licenses for separate central point management to achieve VPN access for different locations. Ideally, Check Point should enhance its system to allow for multiple VPN entries managed from a single server without additional licenses or workaround solutions.

For how long have I used the solution?

I have been using Check Point Remote Access VPN for three to four years.

What do I think about the stability of the solution?

The product is stable.

I rate the solution’s stability a seven out of ten because we had some problems before, but we resolved them.

What do I think about the scalability of the solution?

The solution is scalable. It is suitable for small and medium businesses.

I rate the solution’s scalability an eight out of ten.

How are customer service and support?

The documentation and support available for Check Point Remote Access VPN are pretty good. A smaller or medium-sized company don't communicate directly with Check Point. They can't open tickets with them directly, which is frustrating. Currently, we have to go through partners who sell us the product to open tickets, and there should be an option to communicate directly with Check Point. Opening tickets directly with the vendor would streamline the process and potentially reduce response times.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Optimization can be a bit more involved with Check Point. Initially, you'll need to perform optimization steps during the configuration process to achieve your desired outcome. Cisco's solution tends to be more straightforward from the outset, providing a robust VPN solution without requiring as much post-configuration tweaking. While Check Point is relatively easy to configure initially, you may deduce more time to optimization tasks afterward. However, once correctly configured and optimized, it functions effectively.

How was the initial setup?

It's easy to configure Check Point Remote Access VPN but It might not be suitable for certain configurations.

I rate the initial setup an eight out of ten, where one is difficult, and ten is easy.

What's my experience with pricing, setup cost, and licensing?

All the firewall solutions are expensive. Compared with the other vendors, Check Point's pricing is moderate.

What other advice do I have?

Like many IT solutions, equipment such as firewalls can be expensive, but Check Point's pricing is competitive compared to other vendors. Currently, Check Point may even be slightly cheaper than Palo Alto.

I recommend Check Point as a firewall solution due to its effectiveness and reliability. For VPN, I might lean towards Cisco because it tends to have fewer optimization issues and other potential complications with VPN deployment. 

Overall, I rate the solution a six out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2025
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.