The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control.
An intuitive solution that is easy to configure and use
Pros and Cons
- "The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
- "The main area for improvement is pricing. Another area could be integrating MFA authentication directly into the solution instead of using separate benchmark tools for implementation."
What is most valuable?
What needs improvement?
The main area for improvement is pricing. Another area could be integrating MFA authentication directly into the solution instead of using separate benchmark tools for implementation.
What do I think about the scalability of the solution?
Nearly all of the company's 700 users used the solution during the COVID-19 emergency.
How was the initial setup?
I rate the tool's ease of deployment an eight out of ten. Integrating the solution with the firewall is easy. Implementing a new user typically takes only five to ten minutes. You create the user in the firewall, install the client, and configure the username, making it ready to use.
Maintaining the solution is my responsibility. However, managing the firewall and VPN involves only two or three people. If you consider the entire security area, there are more people involved.
Buyer's Guide
Check Point Remote Access VPN
February 2025

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
What's my experience with pricing, setup cost, and licensing?
The product is expensive. I rate its pricing a ten out of ten. For the cost of one product, we could purchase two or three Fortinet solutions with the same amount of money.
What other advice do I have?
Our previous company used this product because it's an excellent solution in the cybersecurity community. It was particularly important in Peru, where we had a strong presence in major companies. We selected the solution and used it for approximately ten years. Even after I left the company, they continued using it because of its importance in Peru and its presence in significant companies.
Fortinet may have gained more presence in recent years than Check Point Remote Access VPN, likely due to its lower cost. However, during my time at the company, we continued to use it. The company may consider migrating to other solutions primarily for cost reasons, as Fortinet is cheaper. However, this decision might not be based on technical superiority but on price considerations.
I rate the product a ten out of ten. You can use it if you can afford the pricing.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Cyber Security Engineer at Natica IT Consulting at Natica IT Consulting
Easy to use and set up with good security
Pros and Cons
- "It is stable most of the time."
- "We have noted some stability issues."
What is our primary use case?
We primarily use the solution as a VPN for connection purposes. It helps us connect to corporate.
What is most valuable?
It is easy to use and easy to set up. The setup is very fast.
The security is pretty good.
It is stable most of the time.
What needs improvement?
It's becoming old-fashioned and slightly out of date. We're moving towards DNS.
We have noted some stability issues.
For how long have I used the solution?
I've used the solution for more than a year at this point. The company has maybe used it longer.
What do I think about the stability of the solution?
The stability is very good. I'd rate it nine out of ten. It could be a bit better. It might now work with all programs.
What do I think about the scalability of the solution?
The solution is scalable. We have 80 or 90 users on the product.
It is not extensively used.
How are customer service and support?
We do not need to use technical support. We are technical ourselves and can handle issues.
Which solution did I use previously and why did I switch?
I've used Palo Alto and Sophos, among other solutions. I've used a few different solutions.
How was the initial setup?
The initial setup is very fast and straightforward. It only takes about five to ten minutes.
You simply set up your firewall and handle settings and then send links to your IT team that can connect them.
What about the implementation team?
We were able to manage the setup in-house. We did not use a consultant or integrator.
What was our ROI?
I have not witnessed any ROI.
What's my experience with pricing, setup cost, and licensing?
The license is renewed yearly. I'm not sure of the exact price or if it is expensive.
What other advice do I have?
I'd rate the solution nine out of ten.
I would advise companies to make sure the configuration is correct on the firewall.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Remote Access VPN
February 2025

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Good integration, great for remote access, and centralizes users effectively
Pros and Cons
- "We can integrate remote access to our branches through Check Point services."
- "We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
What is our primary use case?
We needed to grow a little more at a cloud level, which means that we have had more places in which we host information, and needed to protect it. We needed to allow users to have access from the different branches in the cloud to our main branch and to access remotely. As a result of these needs, we have been looking for solutions that allow us to have quick and efficient access no matter which branch we are going to access, and to have access allowed quickly and easily as if users were inside the perimeter area of our organization.
How has it helped my organization?
Currently, Check Point is an ally that we have used within our organization to protect the perimeter area, the equipment, and other technologies. We have complete protection in one technology that we are using so that our users with greater frequency can access the data of our organization regardless of where they are. With this, they can have quick, simple access as if they were within the perimeter area. This has given us greater protection when it comes to having protected and verified access under user identity.
What is most valuable?
We can integrate remote access to our branches through Check Point services; however, those services come with a centralized identity, a domain identity, which does not work for the different logins. It only works for the login through the remote connection application. The user profile is centralized, verified, and filtered by the tool, thus being one of the characteristics that are very important to me since it shows any activity that the user is going to carry out.
What needs improvement?
We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution. This would allow us to have a tool that it is not only remote access for mobile devices but a remote access solution for virtual teams, including mobile devices such as cell phones, tablets, and other types of devices in IoT areas such as doors, houses, and medical equipment.
For how long have I used the solution?
I've been using the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Manager at H2O Power Limited Partnership
Scalable with a unified platform and good integration
Pros and Cons
- "The solution has been solid for me for over five years."
- "The ability to allow split-tunneling while still following our corporate policy needs to be on the table."
What is our primary use case?
In our environment, we have many users working remotely. It's important to control the flow of traffic coming and going to these remote employees, and isolate traffic when used for business purposes. We have to allow our remote users to access services from home as though they were in the office. However, at the same time, we need to control that traffic and make sure it conforms to our policy. Our environment is complex and requires advanced policies to look at traffic in very unique ways from different users. Check Point's policy management has allowed us to do that.
How has it helped my organization?
At the beginning of the pandemic, everyone rushed to get their employees working from home. Luckily for us, we already had a strong structure around how remote access would work and had it set up for many employees.
With the groundwork in place, the transition to remote work was made easy by simply adjusting the policy (configuration). In part, this is because we were already prepared for a remote workforce, and that preparation came from within our organization, however, if it weren't for Check Point enabling us to adjust rapidly, then it would not have been an easy transition.
What is most valuable?
The unified platform view is great. Being able to manage NGFW alongside our Remote Access Policies allows us to control traffic in one way. Be it if our users are at home or in the office the same policy applies to them allowing us to have one corporate view on the traffic within our organization.
Being able to integrate the policy with things like Active Directory groups, Azure cloud objects, RADIUS integration, and load balancing capabilities is wonderful. All of these things are built into their NGFW policy which we leverage to implement on our Remote Access policy.
What needs improvement?
The ability to allow split-tunneling while still following our corporate policy needs to be on the table. Right now, in order to allow the same policy to apply, the users' traffic must be routed up to our NGFW before going out to the internet. Having a method to apply the same policy to the client for outbound traffic while connected to the VPN would be huge.
Some things like the compliance aspect of the VPN Client can be updated to bring it a little more modern. It's very useful for checking things like Windows Updates levels before connecting, however, it could use a facelift since it's still quite old-looking.
For how long have I used the solution?
I've been managing Check Point's Remote Access VPN for five years at my current employment, and had used it before at a previous employer.
What do I think about the stability of the solution?
The solution has been solid for me for over five years.
What do I think about the scalability of the solution?
I get the impression this could scale up to whatever you need. Scaling issues might only be moving to clustered resources and setting up load balancing on gateways. Once you get big enough you should be able to scale up to your needs.
How are customer service and support?
Support has been great 98% of the time. There's always one bad experience, yet, overall I wouldn't rate them based on that. If they need to get their experts online to help solve a problem, they have plenty and are willing to work through really deep subjects. I never worry with their support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
At our organization, we did not use another solution before this. That said, I have used other products in the past. It's been many years, so I'm sure those other vendors have had time to update their products too, however, since I've been managing Remote Access with Check Point, I've always been really impressed.
How was the initial setup?
Setting up the VPN Clients is simple once you've already got the gateway in place. If you have to setup the Gateway, it will take a bit of knowledge and expertise.
What about the implementation team?
Our in-house team set it up. That said, I have been working with network devices for a long time.
What was our ROI?
ROI on the VPN User license itself returns within a couple of months of you using it. However, if you have to make the investment into buying gateways for the product, then the ROI could be one year (if your whole organization is working from home), or up to three years if you barely use it.
What's my experience with pricing, setup cost, and licensing?
You need to be an NGFW customer already. Otherwise, you'll need to purchase the gateways in order to terminate the VPN. That much should be obvious to anyone. Once you have the gateway in place, there is a VPN User license you need to purchase, however, it is very minimal in cost compared to other infrastructure.
Which other solutions did I evaluate?
We inherited the Check Point when we took over. Then, when the topic of remote access came up, it made sense to use what we had and just buy additional licensing rather than buy a whole new product.
What other advice do I have?
Check Point products are typically not cheap, however, I've found it's often due to the fact that you can do a lot with it.
I recommend Check Point products to anyone who is going to have the time and expertise to administer them. You're going to be able to do what you want to do, engineer a design that works for you. If you want to just plug it in and forget about it, then this might not be the product for you. That said, for those who do just want to plug something in and forget about it, I warn you to be cautious. When it comes to Remote Access, you don't want to ignore this. You want to be looking at it and you want to monitor it, otherwise attackers will take advantage of that weakness. This is where Check Point allows you to monitor the edge, while granularly controlling it.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Software Architect at Isecurex
Seamless connectivity through advanced application access and excellent support
Pros and Cons
- "The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay."
- "Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric."
What is our primary use case?
I use Remote Access VPN for clientless applications, setting up WireGuard tunnels, and WireGuard VPN as a service. It provides remote access for SIP setups, allowing users to connect securely through a VPN.
What is most valuable?
The most valuable features include application access, clientless application access, and WireGuard. These features make it easy to deploy and offer a user-friendly interface. The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay.
What needs improvement?
Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric. Improving this process could enhance the solution's scalability and efficiency.
For how long have I used the solution?
I have used Check Point Remote Access VPN for two and a half years.
What do I think about the stability of the solution?
Some connectivity issues arise occasionally, especially when accessing the internet or using other applications. The installed client sometimes reconnects, possibly due to conflicts with existing VPN solutions.
What do I think about the scalability of the solution?
The solution is extremely scalable, with an eight out of ten rating due to its mesh network and ability to build WireGuard tunnels. However, additional automation is required to enhance its enterprise features.
How are customer service and support?
Customer service is excellent. Support is integrated into the product, making it easy to access without needing to search for contact information. There is an icon in the portal for online support, and Check Point local support promptly replies to queries.
How would you rate customer service and support?
Positive
How was the initial setup?
On a scale of one to ten, I would rate the initial setup of Check Point Remote Access VPN as ten because it is super easy to set up.
What's my experience with pricing, setup cost, and licensing?
The pricing is rated eight to 8.5 out of ten. The costs increase with the purchase of advanced features. Licensing issues need to be sorted as different features require separate licenses.
What other advice do I have?
The best solution for small to medium businesses. Licensing issues need to be sorted out. For example, features like CASB and browser security should be bundled. Having automations will help scale to other scenarios.
I'd rate the solution ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: consultant
Last updated: Oct 16, 2024
Flag as inappropriateCloud Engineer at ITQS
Good security, protects identity, and allows full access even in different regions
Pros and Cons
- "The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
- "The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately."
What is our primary use case?
Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data.
Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.
How has it helped my organization?
The solution is giving us security when it comes to sharing our data safely through the private and secure tunnel that is created when creating the VPN. The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet. Online hackers won't be able to use your real IP address to discover your personal data, and government surveillance agencies and ISPs won't be able to monitor what you do online by snooping on your traffic.
In addition to helping you avoid government surveillance, it also helps keep your privacy safe from advertisers.
What is most valuable?
In terms of the way they ensure traffic, an example is when we use Wi-Fi in public areas.
WiFi is everywhere nowadays and it is extremely convenient to use, especially if you have a tight mobile data plan. The only problem with free WiFi is that it's often unsecured, which means you're putting your personal data at risk every time you use it. After all, cybercriminals can find out a lot about you, which can lead to them stealing your:
- Credit card details
- Bank account details
- Email login credentials
However, if you use a VPN, you won't have to worry about those dangers. A VPN uses encryption to protect your online communications, making sure no one can monitor it. Basically, if a hacker tried to see your connection traffic, they would just see nonsense.
What needs improvement?
That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.
For how long have I used the solution?
I've used the solution for about 2 years.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT
A flexible gateway with good security and helpful technical support
Pros and Cons
- "We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway."
- "In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."
What is our primary use case?
Since SARS-COV2, most users went to work from their home office, so we needed to have an robust, secure, and stable VPN connection. We implemented Check Point VPN and we have had no problems with it. We are almost 50 users working from home securely. Also, the access rules based on VLANs have helped many users get access depending on which connection they have. For example, some users with VPN connections can only access some specific servers and ports, however, when they are on an internal LAN, they have access to the entire network.
How has it helped my organization?
We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway.
I'm the IT manager for the company, and my work has been improved due to the fact that, in conjunction with VPN, we implemented the Endpoint Security client so we can manage our client's computers even if they are not physically in the office. When we need to remove some users from a VPN connection we just need to lock the account and use the assets console to disable the feature from the client's computer.
What is most valuable?
The combination of the user accounts for the VPN with the access rules provided by the security gateway gives you more control and specificity about who has access to what. For external users, we can offer a solution based on the internet needs and we are able to share information on a secure channel. We can specifically point to the desired resources in the organization without the need to install any additional software on external client machines.
What needs improvement?
It needs to improve the capability of the Secure browser VPN connections. Some in-house applications didn't work due to the use of JScript and the backend and front end technology for the applications. In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers.
For how long have I used the solution?
I've used the solution for over two years.
What do I think about the stability of the solution?
It's very stable, however, I recommend some scheduled restarts for cleaning connections and processes.
What do I think about the scalability of the solution?
It is very easy to manage the solution and also the integration.
How are customer service and support?
I have had a good experience with the support tickets that I have dealt with.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previous to Check Point, we didn't have any gateway security.
How was the initial setup?
The initial setup was a little complex as it was the first time working with Check Point.
What about the implementation team?
The implementation was handled by an in-house team.
What was our ROI?
We expect that investments is recovered in two years.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair and the support team is good.
Which other solutions did I evaluate?
We were evaluating Fortinet as well.
What other advice do I have?
Check Point is very reliable and secure.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH
Great scalability, good technical support, and integrates extremely well with the Check Point firewall
Pros and Cons
- "The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
- "For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
What is our primary use case?
We use Check Point Remote Access VPN to provide access to employees, vendors, and advisors. They access the company resources - especially now that most people are working from home over the course of the last year. We also use it for specific companies that give us remote support to some applications, such as our parent company. Our admins access our company servers and resources. We're using Remote Access VPN with specific profiles for them that only give access to some resources.
We have three distinct environments. Server, DMZ, and User/SHOP. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.
How has it helped my organization?
The headache of connecting has been removed. It's very stable and we don't have any issues with it connecting. We have a large majority of people that were using nothing and always coming to the office. However, since the last year, we have a whopping 75% of users that have switched to using Check Point Remote Access VPN. The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.
What is most valuable?
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.
The integration with two-factor authentication for remote access users is another valuable feature. In our case we use RSA.
Those two are the most valuable aspects that we have on the solution. It also gives us the possibility to securely connect to the company resources, without Check Point security measures.
Another great thing is that we already have all the logs from the firewall on the SmartPortal as the remote VPN also integrates into the firewall. We can see all the logs on the same tool because we also have a fully secure solution for Remote Access VPN. For full operational security, we need to manage the different hardware from the firewalls and the logs that are not in the same place. This is another valuable aspect of this solution.
Having access to those logs affects our security operations because if a user calls the support but does not have access to the VPN, we can see on the same tool on the SmartPortal and troublshoot.
What needs improvement?
We don't have any specific complaints. We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in right from the software itself. For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent. The documentation of the software needs to be more accessible. If an end-user wants to have access to customized training from the company, that should be able to be built-in. I would add that feature.
For how long have I used the solution?
I've been using the solution for around 1.5 years.
What do I think about the stability of the solution?
The stability is good. It's a never-fail.
What do I think about the scalability of the solution?
The scalability is great. We deploy to 5000+ users.
How are customer service and technical support?
It's second to none but we haven't needed it a lot.
Which solution did I use previously and why did I switch?
We used to use Fortinet. We switched because it was hard to deploy.
How was the initial setup?
Just pull the trigger on a 3rd party. Not complex at all.
What about the implementation team?
We used both a vendor and in-house talent.
What was our ROI?
The ROI was instant and around 54%.
What's my experience with pricing, setup cost, and licensing?
Go with a third party and get it set up correctly. It may be costly but it's worth it.
Which other solutions did I evaluate?
We didn't evaluate anything else. I knew a vendor and had used the software before.
What other advice do I have?
Get this software installed as soon as possible. It's a smart move.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Popular Comparisons
Microsoft Intune
Microsoft Remote Desktop Services
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
Claroty Platform
F5 BIG-IP Access Policy Manager (APM)
TeamViewer Tensor
Rocket Exceed TurboX
BeyondTrust Privileged Remote Access
BeyondTrust Remote Support
VNC Connect
Apache Guacamole
LogMeIn Rescue
Parallels Access
ConnectWise ScreenConnect
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices