This product provides a secure connection to the corporate network from anywhere and safe traffic of data regardless of the possible threats in the WAN it's connected to. It also provides secure access to company apps and controls the traffic depending on each company's policies. Through it, we create layers that control or limit data traffic for specific users. I've been trained in the product and know it's one of the most effective in the business and admit to facilitating my customers to get it from our Check Point partners.
Cloud computing at Tech Data Limited
Easy to activate with full visibility and network control
Pros and Cons
- "The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out."
- "In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system."
What is our primary use case?
How has it helped my organization?
A clear example of the positive impact this license has had in my organization was back in 2020. The software was in use since before the pandemic hit so our personnel was familiarized with the product; the transition was smooth and secure from the office to work from home. Access policies were run through the active directory applied on all kinds of end points, from cell phones, tablets, laptops, desktops - you name it. Access could be restricted by location and using network security assessments that prevented connecting to corrupted networks.
What is most valuable?
We already use the Check Point Firewall and those are the ones the organization's employees connect to for the remote VPN and it made it really easy to activate this function as new hardware was not needed.
The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out. Be it if our users are at home or in the office the same policy applies to them allowing us to view the traffic within our organization.
What needs improvement?
In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system.
Also, this product has limitations with headcount addition, as there are performance limitations in each security gateway the software has.
The ability to allow split-tunneling while still following our corporate policy should be offered.
Some things like the compliance aspect of the VPN Client can be updated so the product stays up to speed with the ever-changing environment in software security.
Buyer's Guide
Check Point Remote Access VPN
November 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
For how long have I used the solution?
For the past eight years, I've been working at a company where I was first in software security sales for three years and then five years in hardware sales. Since I have a background in security, I've been part of training and sales where Check Point products are involved. I have tested most products Check Point offers due to our partnership.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Software Architect at Isecurex
Seamless connectivity through advanced application access and excellent support
Pros and Cons
- "The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay."
- "Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric."
What is our primary use case?
I use Remote Access VPN for clientless applications, setting up WireGuard tunnels, and WireGuard VPN as a service. It provides remote access for SIP setups, allowing users to connect securely through a VPN.
What is most valuable?
The most valuable features include application access, clientless application access, and WireGuard. These features make it easy to deploy and offer a user-friendly interface. The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay.
What needs improvement?
Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric. Improving this process could enhance the solution's scalability and efficiency.
For how long have I used the solution?
I have used Check Point Remote Access VPN for two and a half years.
What do I think about the stability of the solution?
Some connectivity issues arise occasionally, especially when accessing the internet or using other applications. The installed client sometimes reconnects, possibly due to conflicts with existing VPN solutions.
What do I think about the scalability of the solution?
The solution is extremely scalable, with an eight out of ten rating due to its mesh network and ability to build WireGuard tunnels. However, additional automation is required to enhance its enterprise features.
How are customer service and support?
Customer service is excellent. Support is integrated into the product, making it easy to access without needing to search for contact information. There is an icon in the portal for online support, and Check Point local support promptly replies to queries.
How would you rate customer service and support?
Positive
How was the initial setup?
On a scale of one to ten, I would rate the initial setup of Check Point Remote Access VPN as ten because it is super easy to set up.
What's my experience with pricing, setup cost, and licensing?
The pricing is rated eight to 8.5 out of ten. The costs increase with the purchase of advanced features. Licensing issues need to be sorted as different features require separate licenses.
What other advice do I have?
The best solution for small to medium businesses. Licensing issues need to be sorted out. For example, features like CASB and browser security should be bundled. Having automations will help scale to other scenarios.
I'd rate the solution ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: consultant
Last updated: Oct 16, 2024
Flag as inappropriateBuyer's Guide
Check Point Remote Access VPN
November 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
Implementation Specialist at NTT Security
Highly secure with good support and multiple factor authentication layers
Pros and Cons
- "It is easy to install the Endpoint Remote Access VPN client on different platforms."
- "Bug Fixes and enhancement requests should be remediated earlier."
What is our primary use case?
Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions.
We can connect anywhere in the world over possible ways to secure the infrastructure.
Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.
Also, we have multi-authentication so there is no chance of leakage.
How has it helped my organization?
Check Point Remote Access VPN provides multi-factor authentication layers.
We can make Data transfer more strict with Data Integrity, Encapsulation, DES,3DES, and Hashing Algorithm so that the level of security will be higher.
Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.
Multiple VPN connections can be established and share the data in a secure possible way.
What is most valuable?
It is easy to install the Endpoint Remote Access VPN client on different platforms. Within the company, we use it for Windows and macOS.
Built-in, centrally managed Compliance blade. We check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.
The stable VPN connection and uptime are also very good.
We have a centrally managed Firewall blade, which allows filtering traffic on the rule base to protect the requirement.
What needs improvement?
Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and Auditors are forced to have the latest patches in place.
Checkpoint Major version should have an extended time than the default time mentioned in the end-of-life policy document with additional prices.
Tools must be introduced and supportive in analyzing the data, flow, and threats.
We have to introduce the scripting part to work seamlessly.
For how long have I used the solution?
I've used the solution for more than four years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
The company offers the best support overall and we can trust their advice.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
This is the first time we are using this type of solution.
How was the initial setup?
The initial setup is straightforward, simple, and centralized.
What about the implementation team?
We handled the setup in-house.
What's my experience with pricing, setup cost, and licensing?
The product is better than any other product in the marketplace. Technically sounded techies all over the place. It is cost-effective and most importantly stable and secure.
Which other solutions did I evaluate?
We trust the Check Point Software technology.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Consultant at ITQS
Provides safe connection, good security, and remote access
Pros and Cons
- "The solution implemented in the cloud allows us to easily scale in cases of user increase."
- "Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."
What is our primary use case?
The company needs a tool that will provide users with the ability to connect from external addresses and that is where Check Point Endpoint Remote Access VPN services were contracted, which allows users to connect to our firewall. We also have Check Point firewalls in the cloud, to which people can also connect. They can then access the resources in our on-premises environment that they need to access, such as their computers, the Intranet, Salesforce, or our production applications, and have a 100% secure connection.
How has it helped my organization?
Check Point Remote Access VPN has helped us that our users and providers can connect to our network in a safe and efficient way, with the pandemic most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way, the solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase
What is most valuable?
Check Point Remote Access VPN has helped us in that our users and providers can connect to our network in a safe and efficient way. With the pandemic, most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way. The solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase
What needs improvement?
One of the parts where the improvement of Check Point Remote Access VPN can be forced is in the compliance analysis. Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines.
Another point to improve is to program a timeout if the VPN is disconnected due to an internet problem. One complication that we found is that the Linux machines do not have a complete client to do the installation and that has not delayed a bit with our users who use this type of operating system
For how long have I used the solution?
This solution has been used for approximately Three years in the company.
What do I think about the stability of the solution?
It's very stable in terms of downtime. The performance is very impressive.
What do I think about the scalability of the solution?
The solution can be easily scaled by adding a security gateway and general security and is very robust.
How are customer service and support?
On some occasions, we have had problems. Sometimes it takes a long time to resolve a case while on other occasions they resolve very quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
There was no type of tool that would supply these qualities.
How was the initial setup?
The configuration was very simple. The application is a very user-friendly tool apart from training and courses for implementation.
What about the implementation team?
A Check Point engineer who had a lot of experience in his work helped us with the implementation.
What was our ROI?
Mainly, it offers stability and detects behaviors, and gives users (and administrators) a level of trust as they go about their daily work. It introduces a lot of granularity to our policies.
Another feature that has been helpful is the sandbox feature. Many companies offer this type of thing now, however, Check Point has been offering it for quite some time.
What's my experience with pricing, setup cost, and licensing?
Check Point manages to provide good cost in its products and it is worth making the investment since this solution can prevent a collapse in the organization.
Which other solutions did I evaluate?
Check Point was always our first option with this type of solution since many security teams are from Check Point.
What other advice do I have?
One of the main aspects of importance in a company is the security of the computer platforms. When making an investment with these tools you are taking care of an important patrimony that will double your profits.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Web Developer at Netconomy Software & Consulting GmbH
Compatible across devices, reasonably priced, and secures confidential information
Pros and Cons
- "It keeps us safe when browsing the internet and when sharing confidential information with our colleagues."
- "Sometimes the application slows down the computing device, and this affects workflows."
What is our primary use case?
The remote VPN enables us to connect our devices under a controlled network infrastructure. It protects the channels for transferring data and confidential information.
It connects our managers with remote employees to enhance efficiency in the implementation of projects and tasks. Check Point Remote Access VPN blocks unauthorized access to our computing devices.
It is easy to install and use this VPN for any new user. It keeps all the teams under the same collaboration and networking channel safe. Information encryption secures end-to-end conversation among teams.
How has it helped my organization?
I have experienced the most benefits while using this product in the organization.
It keeps us safe when browsing the internet and when sharing confidential information with our colleagues.
When working on joint projects and tasks this product prevents external cyber attacks from attacking our privacy.
Teams operating from remote areas can customize the location features and set suitable IP addresses that serve them well.
The speed and reliability enable us to achieve the set targets and initiate trade-offs.
What is most valuable?
It has a simple user interface that is easy to operate and set up.
The customer support staff provides 24/7 customer support services that enhance effective service delivery.
The premium version provides the most advanced services that are always effective.
The cost of maintenance and privacy policies suits our daily demands.
It is compatible with most devices and can easily integrate with most applications in the organization.
There is no apparent IP leak and it connects firmly without disconnecting.
What needs improvement?
This version has comprehensive features that provide reliable services based on the organization's requirements.
Sometimes the application slows down the computing device, and this affects workflows.
Most modern VPNs offer more features that are more powerful as compared to the ones set up in this system.
The focus of the next release should be on the compatibility and speed of this platform so that it can easily compete with other products.
It should be customized to accept more languages and more locations.
For how long have I used the solution?
I've used the solution for 14 months.
What do I think about the stability of the solution?
The operations and stability have been firm and reliable.
What do I think about the scalability of the solution?
This is great and scalable product.
How are customer service and support?
The customer support staff offers great services.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not worked with different solutions.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
The implementation took place through the vendor.
What was our ROI?
There is increased ROI from its reliable performance.
What's my experience with pricing, setup cost, and licensing?
It is cost-effective.
Which other solutions did I evaluate?
I have only had experience with this VPN.
What other advice do I have?
The performance has been good and I recommend it to other business enterprises.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Project Manager at Digitas APAC
Easy to set up with good remote access and a flexible to configure VPN
Pros and Cons
- "This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers."
- "Connection of devices from various locations is efficient though there are a few challenges when there is a network failure."
What is our primary use case?
Remote Access VPN helps my team to connect our devices remotely without any limitations. It is easy to establish a secure connection among teams and connect efficiently with maximum security.
Teams can share files effectively under secure networking infrastructure. When implementing projects and tasks, it conveniently troubleshoots technical issues that can affect information traffic.
I can now share large size of documents with my colleagues from a remote location without any interference. It is easy to facilitate remote workers and engage them.
How has it helped my organization?
This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers. The organization has benefited from a secure network that cyber attacks cannot compromise. We can safely access our servers from anywhere, anytime, without fear of losing confidential information.
It gives the IT team an opportunity to monitor the performance of devices and control their operations. We can freely connect with our clients from remote areas and give them guidelines without physical appearance under a secure connection.
What is most valuable?
Secure remote access has enabled teams to focus on productive meetings without fear of being attacked by external ransomware attacks. Device access from remote networks has enhanced the efficient connection of teams from various areas.
The setup process is simple, and new users can set it without any challenges. The cost and maintenance charges are relatively low as compared to most products in the market.
Configuration of the VPN with other applications is flexible with productive performance. Identity and access management enables the IT team to categorize devices and channel them to effective network infrastructure.
What needs improvement?
My experience with the set features has always been excellent. The secure connection networking system has enabled each team to connect effectively with colleagues from anywhere.
Connection of devices from various locations is efficient though there are a few challenges when there is a network failure. Disconnection due to internet failure may affect the entire connection and slow down the workflow.
The setup process requires skilled manpower and dedicated teams to get the best results from the entire connection system.
Integration of more powerful kill switch tools will enhance secure connection.
Additional server locations can boost service delivery and cut the cost of connecting computing devices from different areas.
For how long have I used the solution?
I've used the solution for 11 months.
What do I think about the stability of the solution?
The secure connection is stable.
What do I think about the scalability of the solution?
I am impressed by the performance of this tool.
How are customer service and support?
The customer support operations have been excellent throughout.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not worked with another VPN.
How was the initial setup?
The initial setup was successful.
What about the implementation team?
Implementation was through the vendor.
What was our ROI?
The ROI has been positive since we deployed this tool.
What's my experience with pricing, setup cost, and licensing?
The setup and licensing terms are effective.
Which other solutions did I evaluate?
This is the best solution that I have come across.
What other advice do I have?
For secure device connection and team collaboration, this is the best solution.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Soporte técnico superior at Acobo
Good encryption, secure login capabilities and easy to install
Pros and Cons
- "A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme."
- "A characteristic to improve is the communication service under the SMTP scheme."
What is our primary use case?
We wanted to give employees the possibility to work from anywhere outside of the organization, being a house or another remote location of offices. We wanted this capability with the possibility and ease to grant them access to our perimeter network so that they could access the data or internal applications for the use of each of its functions. We wanted faster, safer, and more efficient transactions that are going to be shared within our organization based on the business.
How has it helped my organization?
This tool gave us the possibility and the benefit of being able to establish that all users, according to their geographical location, need to transfer, manage, execute, validate, and maintain data. We are always in contact with all users within and outside. It is strong, fast, easy to install, and extremely secure for each of the functions that it is designed for. Important to note is that one of the features uses a single sign-on approach.
What is most valuable?
Among other features, advantages, and services that the solution provides us, it is important to understand that it gives us the possibility, capacity, and management for establishing that each of the resources is accessed through encrypted communication tunnels. A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme. This goes beyond a simple password, giving us the possibility of integrating more than one service.
What needs improvement?
A characteristic to improve is the communication service under the SMTP scheme. In some cases, it is quite complex when it comes to managing, configuring, forwarding, and integrating mail services. It consumes a lot of processing and RAM memory. We want a solution that allows us to use current resources so that high processing peaks demanded by the virtual or physical equipment do not occur.
For how long have I used the solution?
I've used the solution for four years.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Planning Analyst at Ovato
A powerful VPN that is secure and reliable
Pros and Cons
- "The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked."
- "The cost of maintenance is high compared to most products in the market."
What is our primary use case?
The Remote Access VPN provides security to all computing devices across the organization. I can securely log in from a remote area and access the organization's data without physical appearance.
It is easy to collaborate with colleagues in the same networking area from different locations.
When interacting with our customers, I can easily change my IP address to correspond with a client's.
This platform has saved the company a lot of resources that are being used to set up remote offices.
How has it helped my organization?
This application provides total data security across the enterprise networking infrastructure. Remote interactions with my colleagues are encrypted to enhance safety and prevent threats.
The organization of virtual events is always secure due to efficient security measures deployed in the organization.
A powerful VPN has lowered the cost of team engagements and interactions in the field.
The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked.
What is most valuable?
The set of security features that prevent data leakages has saved resources.
The customer support team responds faster when contacted to provide solutions for technical failures.
The application does not affect the storage and functionalities of the operating system.
The UI enables new users to understand the working criteria of the features easily.
The performance of this tool does not affect the performance of other applications when deployed on mobile or desktop devices.
All the set features have a great impact on protection from data leakages and have saved our organization from threats.
What needs improvement?
Sometimes it may mislead the user based on the requested location due to poor networking.
Most features have capable performance that responds quickly to user requests.
The cost of maintenance is high compared to most products in the market.
Integrations with some applications are difficult due to poor compatibility tools. The development team should focus more on updates and integration features.
I am impressed by the current performance despite the few challenges. The overall performance has been excellent, and I recommend it to others
For how long have I used the solution?
I've used the solution for six months.
What do I think about the stability of the solution?
The product performance is efficient.
What do I think about the scalability of the solution?
The performance is excellent.
How are customer service and support?
The customer support staff is reliable.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have no experience with any similar solution.
How was the initial setup?
The setup was straightforward.
What about the implementation team?
Implementation was handled in-house.
What was our ROI?
We have gained positive ROI since we deployed it.
What's my experience with pricing, setup cost, and licensing?
The setup process is not complex.
Which other solutions did I evaluate?
I evaluated other VPNs, however, in those cases, the performance was not stable.
What other advice do I have?
This is the best VPN I have worked with so far.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
Microsoft Intune
Fortinet FortiClient
Prisma Access by Palo Alto Networks
Zscaler Zero Trust Exchange Platform
Microsoft Remote Desktop Services
OpenVPN Access Server
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
F5 BIG-IP Local Traffic Manager (LTM)
Cisco Secure Client (including AnyConnect)
Microsoft Azure VPN Gateway
Check Point Harmony SASE (formerly Perimeter 81)
Claroty Platform
Ivanti Connect Secure
Appgate SDP
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices