We needed to grow a little more at a cloud level, which means that we have had more places in which we host information, and needed to protect it. We needed to allow users to have access from the different branches in the cloud to our main branch and to access remotely. As a result of these needs, we have been looking for solutions that allow us to have quick and efficient access no matter which branch we are going to access, and to have access allowed quickly and easily as if users were inside the perimeter area of our organization.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Good integration, great for remote access, and centralizes users effectively
Pros and Cons
- "We can integrate remote access to our branches through Check Point services."
- "We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
What is our primary use case?
How has it helped my organization?
Currently, Check Point is an ally that we have used within our organization to protect the perimeter area, the equipment, and other technologies. We have complete protection in one technology that we are using so that our users with greater frequency can access the data of our organization regardless of where they are. With this, they can have quick, simple access as if they were within the perimeter area. This has given us greater protection when it comes to having protected and verified access under user identity.
What is most valuable?
We can integrate remote access to our branches through Check Point services; however, those services come with a centralized identity, a domain identity, which does not work for the different logins. It only works for the login through the remote connection application. The user profile is centralized, verified, and filtered by the tool, thus being one of the characteristics that are very important to me since it shows any activity that the user is going to carry out.
What needs improvement?
We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution. This would allow us to have a tool that it is not only remote access for mobile devices but a remote access solution for virtual teams, including mobile devices such as cell phones, tablets, and other types of devices in IoT areas such as doors, houses, and medical equipment.
Buyer's Guide
Check Point Remote Access VPN
December 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
For how long have I used the solution?
I've been using the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at LTTS
Multi-factor authentication helps to securely provide access to company resources while working offsite
Pros and Cons
- "The most valuable feature is the seamless access."
- "We would like to see support for a layer seven VPN over UDP."
What is our primary use case?
The primary use case is to allow our employees to connect to the firewall on-premises, then they can access our office resources. This includes their respective computer, the intranet, shared files, and local applications, even if they are outside of the organization's network.
Our production will be locked down if my VPN stops working, leaving the company unable to work. As such, this is a crucial service for us and resources need to be available for each of our users when working remotely.
How has it helped my organization?
Prior to using Check Point Endpoint Remote Access VPN, our previous solution required installing certificates on every user's machine, which was a very difficult task.
Our old solution did not offer two-factor authentication, which we now have implemented. This helps secure against ongoing cyber theft and threats.
What is most valuable?
The most valuable feature is the seamless access. Using this, we control access to our on-premises resources, and our users who are working from outside are easily able to access their office area computers, file servers, and intranet applications.
This product allows us to provide WAN access for our users, whereas prior to this, we could not make the whole intranet available.
Multifactor authentication is very helpful for us.
What needs improvement?
We would like to see support for a layer seven VPN over UDP.-- currently some VPN solution are working on Layer 7 Platform.
The updates under Windows 10 are not always up to date, and we have trouble upgrading remote clients. We have also had trouble deploying new clients.-- The Check Point Remote VPN new client is giving trouble us during upgradation with older version of Windows 10
For how long have I used the solution?
We have been using the Check Point Endpoint Remote Access VPN for the past four years.
What do I think about the stability of the solution?
We have had no problems with stability and it is working smoothly.
What do I think about the scalability of the solution?
Scalability is good. We have more than 500 users who are working on it.
How are customer service and technical support?
The technical support is good.
Which solution did I use previously and why did I switch?
Earlier, we had a traditional VPN, which did not help in running our business seamlessly.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
A vendor team assisted us with implementation and deployment.
What was our ROI?
Its complete ROI, as expected.
What's my experience with pricing, setup cost, and licensing?
This is a very good solution for our employees who work outside of our organization.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Remote Access VPN
December 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
Senior Network Administrator at a transportation company with 1,001-5,000 employees
Enable employees to securely connect but has configuration limitations
Pros and Cons
- "Check Point Remote Access VPN has some useful features, and configuring it is relatively straightforward."
- "Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access."
What is our primary use case?
The main purpose of Check Point Remote Access VPN is to enable employees to securely connect to the corporate network when they work remotely, such as from home.
What is most valuable?
Check Point Remote Access VPN has some useful features, and configuring it is relatively straightforward. However, there are numerous issues, particularly with the SSL connection, including bugs and other problems.
What needs improvement?
Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access. While there is a feature called "Map multiple entry point," it is reported to be buggy and inadequate. This forces users to purchase additional licenses for separate central point management to achieve VPN access for different locations. Ideally, Check Point should enhance its system to allow for multiple VPN entries managed from a single server without additional licenses or workaround solutions.
For how long have I used the solution?
I have been using Check Point Remote Access VPN for three to four years.
What do I think about the stability of the solution?
The product is stable.
I rate the solution’s stability a seven out of ten because we had some problems before, but we resolved them.
What do I think about the scalability of the solution?
The solution is scalable. It is suitable for small and medium businesses.
I rate the solution’s scalability an eight out of ten.
How are customer service and support?
The documentation and support available for Check Point Remote Access VPN are pretty good. A smaller or medium-sized company don't communicate directly with Check Point. They can't open tickets with them directly, which is frustrating. Currently, we have to go through partners who sell us the product to open tickets, and there should be an option to communicate directly with Check Point. Opening tickets directly with the vendor would streamline the process and potentially reduce response times.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Optimization can be a bit more involved with Check Point. Initially, you'll need to perform optimization steps during the configuration process to achieve your desired outcome. Cisco's solution tends to be more straightforward from the outset, providing a robust VPN solution without requiring as much post-configuration tweaking. While Check Point is relatively easy to configure initially, you may deduce more time to optimization tasks afterward. However, once correctly configured and optimized, it functions effectively.
How was the initial setup?
It's easy to configure Check Point Remote Access VPN but It might not be suitable for certain configurations.
I rate the initial setup an eight out of ten, where one is difficult, and ten is easy.
What's my experience with pricing, setup cost, and licensing?
All the firewall solutions are expensive. Compared with the other vendors, Check Point's pricing is moderate.
What other advice do I have?
Like many IT solutions, equipment such as firewalls can be expensive, but Check Point's pricing is competitive compared to other vendors. Currently, Check Point may even be slightly cheaper than Palo Alto.
I recommend Check Point as a firewall solution due to its effectiveness and reliability. For VPN, I might lean towards Cisco because it tends to have fewer optimization issues and other potential complications with VPN deployment.
Overall, I rate the solution a six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: May 21, 2024
Flag as inappropriateSenior Ts Systems Integration Specialist at NTT Security
Highly secure with good support and multiple factor authentication layers
Pros and Cons
- "It is easy to install the Endpoint Remote Access VPN client on different platforms."
- "Bug Fixes and enhancement requests should be remediated earlier."
What is our primary use case?
Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions.
We can connect anywhere in the world over possible ways to secure the infrastructure.
Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.
Also, we have multi-authentication so there is no chance of leakage.
How has it helped my organization?
Check Point Remote Access VPN provides multi-factor authentication layers.
We can make Data transfer more strict with Data Integrity, Encapsulation, DES,3DES, and Hashing Algorithm so that the level of security will be higher.
Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.
Multiple VPN connections can be established and share the data in a secure possible way.
What is most valuable?
It is easy to install the Endpoint Remote Access VPN client on different platforms. Within the company, we use it for Windows and macOS.
Built-in, centrally managed Compliance blade. We check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.
The stable VPN connection and uptime are also very good.
We have a centrally managed Firewall blade, which allows filtering traffic on the rule base to protect the requirement.
What needs improvement?
Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and Auditors are forced to have the latest patches in place.
Checkpoint Major version should have an extended time than the default time mentioned in the end-of-life policy document with additional prices.
Tools must be introduced and supportive in analyzing the data, flow, and threats.
We have to introduce the scripting part to work seamlessly.
For how long have I used the solution?
I've used the solution for more than four years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
The company offers the best support overall and we can trust their advice.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
This is the first time we are using this type of solution.
How was the initial setup?
The initial setup is straightforward, simple, and centralized.
What about the implementation team?
We handled the setup in-house.
What's my experience with pricing, setup cost, and licensing?
The product is better than any other product in the marketplace. Technically sounded techies all over the place. It is cost-effective and most importantly stable and secure.
Which other solutions did I evaluate?
We trust the Check Point Software technology.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Engineer at Natica IT Consulting at Natica IT Consulting
Easy to use and set up with good security
Pros and Cons
- "It is stable most of the time."
- "We have noted some stability issues."
What is our primary use case?
We primarily use the solution as a VPN for connection purposes. It helps us connect to corporate.
What is most valuable?
It is easy to use and easy to set up. The setup is very fast.
The security is pretty good.
It is stable most of the time.
What needs improvement?
It's becoming old-fashioned and slightly out of date. We're moving towards DNS.
We have noted some stability issues.
For how long have I used the solution?
I've used the solution for more than a year at this point. The company has maybe used it longer.
What do I think about the stability of the solution?
The stability is very good. I'd rate it nine out of ten. It could be a bit better. It might now work with all programs.
What do I think about the scalability of the solution?
The solution is scalable. We have 80 or 90 users on the product.
It is not extensively used.
How are customer service and support?
We do not need to use technical support. We are technical ourselves and can handle issues.
Which solution did I use previously and why did I switch?
I've used Palo Alto and Sophos, among other solutions. I've used a few different solutions.
How was the initial setup?
The initial setup is very fast and straightforward. It only takes about five to ten minutes.
You simply set up your firewall and handle settings and then send links to your IT team that can connect them.
What about the implementation team?
We were able to manage the setup in-house. We did not use a consultant or integrator.
What was our ROI?
I have not witnessed any ROI.
What's my experience with pricing, setup cost, and licensing?
The license is renewed yearly. I'm not sure of the exact price or if it is expensive.
What other advice do I have?
I'd rate the solution nine out of ten.
I would advise companies to make sure the configuration is correct on the firewall.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd
Has great security features, including zero-day protection, malware protection, and anti-phishing
Pros and Cons
- "The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera."
- "There was complexity in the initial setup."
What is our primary use case?
The solution is primarily used for secure access for remote users. It's deployed as a SaaS over the cloud.
What is most valuable?
The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera.
What needs improvement?
If you are new to deploying the solution, the initial setup might be difficult the first time around. I had trouble setting the policies and then resetting the device.
For how long have I used the solution?
I joined my company eight or nine months ago and have been dealing with the solution since then.
What do I think about the stability of the solution?
I don't have much information on the stability aspect of the product. I haven't spoken to customers about their experience.
What do I think about the scalability of the solution?
I haven't discussed scalability with customers to get their take on how easy it is.
How are customer service and support?
We haven't referred to the technical support of Check Point just yet. We did have a replacement engineer assist us in deployment, and they handled it quite well.
How would you rate customer service and support?
Positive
How was the initial setup?
There was complexity in the initial setup. With one client, once we installed it and then tried to set the policies, the firewall was not responding very well. I was doing it for the first time, so we were unable to do it. The customer was not pleased with that, so we had to send another engineer to deploy that device. That's not to say it's overly hard - it was just my first attempt at an installation.
We had three engineers handling the initial setup. We deployed it over two days.
I'm hoping that the next time I'm deploying it, it should be done perfectly, without any support from any other engineer.
What about the implementation team?
We do the implementation for our clients.
What's my experience with pricing, setup cost, and licensing?
I'm not aware of the exact licensing costs associated with the product.
What other advice do I have?
We are in the business of selling firewalls. We're resellers and Check Point partners.
I personally have sold just the Check Point solution to only one customer. We are also selling data storage solutions, data backup, and cyber security solutions.
We are dealing with the latest version of the solution.
The solution is available both on-premises and in the cloud.
I'd rate the solution nine out of ten. I'd recommend it to other users and companies.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH
Great scalability, good technical support, and integrates extremely well with the Check Point firewall
Pros and Cons
- "The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
- "For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
What is our primary use case?
We use Check Point Remote Access VPN to provide access to employees, vendors, and advisors. They access the company resources - especially now that most people are working from home over the course of the last year. We also use it for specific companies that give us remote support to some applications, such as our parent company. Our admins access our company servers and resources. We're using Remote Access VPN with specific profiles for them that only give access to some resources.
We have three distinct environments. Server, DMZ, and User/SHOP. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.
How has it helped my organization?
The headache of connecting has been removed. It's very stable and we don't have any issues with it connecting. We have a large majority of people that were using nothing and always coming to the office. However, since the last year, we have a whopping 75% of users that have switched to using Check Point Remote Access VPN. The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.
What is most valuable?
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.
The integration with two-factor authentication for remote access users is another valuable feature. In our case we use RSA.
Those two are the most valuable aspects that we have on the solution. It also gives us the possibility to securely connect to the company resources, without Check Point security measures.
Another great thing is that we already have all the logs from the firewall on the SmartPortal as the remote VPN also integrates into the firewall. We can see all the logs on the same tool because we also have a fully secure solution for Remote Access VPN. For full operational security, we need to manage the different hardware from the firewalls and the logs that are not in the same place. This is another valuable aspect of this solution.
Having access to those logs affects our security operations because if a user calls the support but does not have access to the VPN, we can see on the same tool on the SmartPortal and troublshoot.
What needs improvement?
We don't have any specific complaints. We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in right from the software itself. For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent. The documentation of the software needs to be more accessible. If an end-user wants to have access to customized training from the company, that should be able to be built-in. I would add that feature.
For how long have I used the solution?
I've been using the solution for around 1.5 years.
What do I think about the stability of the solution?
The stability is good. It's a never-fail.
What do I think about the scalability of the solution?
The scalability is great. We deploy to 5000+ users.
How are customer service and technical support?
It's second to none but we haven't needed it a lot.
Which solution did I use previously and why did I switch?
We used to use Fortinet. We switched because it was hard to deploy.
How was the initial setup?
Just pull the trigger on a 3rd party. Not complex at all.
What about the implementation team?
We used both a vendor and in-house talent.
What was our ROI?
The ROI was instant and around 54%.
What's my experience with pricing, setup cost, and licensing?
Go with a third party and get it set up correctly. It may be costly but it's worth it.
Which other solutions did I evaluate?
We didn't evaluate anything else. I knew a vendor and had used the software before.
What other advice do I have?
Get this software installed as soon as possible. It's a smart move.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
An intuitive solution that is easy to configure and use
Pros and Cons
- "The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
- "The main area for improvement is pricing. Another area could be integrating MFA authentication directly into the solution instead of using separate benchmark tools for implementation."
What is most valuable?
The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control.
What needs improvement?
The main area for improvement is pricing. Another area could be integrating MFA authentication directly into the solution instead of using separate benchmark tools for implementation.
What do I think about the scalability of the solution?
Nearly all of the company's 700 users used the solution during the COVID-19 emergency.
How was the initial setup?
I rate the tool's ease of deployment an eight out of ten. Integrating the solution with the firewall is easy. Implementing a new user typically takes only five to ten minutes. You create the user in the firewall, install the client, and configure the username, making it ready to use.
Maintaining the solution is my responsibility. However, managing the firewall and VPN involves only two or three people. If you consider the entire security area, there are more people involved.
What's my experience with pricing, setup cost, and licensing?
The product is expensive. I rate its pricing a ten out of ten. For the cost of one product, we could purchase two or three Fortinet solutions with the same amount of money.
What other advice do I have?
Our previous company used this product because it's an excellent solution in the cybersecurity community. It was particularly important in Peru, where we had a strong presence in major companies. We selected the solution and used it for approximately ten years. Even after I left the company, they continued using it because of its importance in Peru and its presence in significant companies.
Fortinet may have gained more presence in recent years than Check Point Remote Access VPN, likely due to its lower cost. However, during my time at the company, we continued to use it. The company may consider migrating to other solutions primarily for cost reasons, as Fortinet is cheaper. However, this decision might not be based on technical superiority but on price considerations.
I rate the product a ten out of ten. You can use it if you can afford the pricing.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Apr 11, 2024
Flag as inappropriateBuyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
Microsoft Intune
Microsoft Remote Desktop Services
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
Claroty Platform
F5 BIG-IP Access Policy Manager (APM)
TeamViewer Tensor
Rocket Exceed TurboX
BeyondTrust Privileged Remote Access
BeyondTrust Remote Support
VNC Connect
LogMeIn Rescue
Parallels Access
Apache Guacamole
ConnectWise ScreenConnect
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices