We needed to grow a little more at a cloud level, which means that we have had more places in which we host information, and needed to protect it. We needed to allow users to have access from the different branches in the cloud to our main branch and to access remotely. As a result of these needs, we have been looking for solutions that allow us to have quick and efficient access no matter which branch we are going to access, and to have access allowed quickly and easily as if users were inside the perimeter area of our organization.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Good integration, great for remote access, and centralizes users effectively
Pros and Cons
- "We can integrate remote access to our branches through Check Point services."
- "We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
What is our primary use case?
How has it helped my organization?
Currently, Check Point is an ally that we have used within our organization to protect the perimeter area, the equipment, and other technologies. We have complete protection in one technology that we are using so that our users with greater frequency can access the data of our organization regardless of where they are. With this, they can have quick, simple access as if they were within the perimeter area. This has given us greater protection when it comes to having protected and verified access under user identity.
What is most valuable?
We can integrate remote access to our branches through Check Point services; however, those services come with a centralized identity, a domain identity, which does not work for the different logins. It only works for the login through the remote connection application. The user profile is centralized, verified, and filtered by the tool, thus being one of the characteristics that are very important to me since it shows any activity that the user is going to carry out.
What needs improvement?
We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution. This would allow us to have a tool that it is not only remote access for mobile devices but a remote access solution for virtual teams, including mobile devices such as cell phones, tablets, and other types of devices in IoT areas such as doors, houses, and medical equipment.
Buyer's Guide
Check Point Remote Access VPN
October 2025

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
870,701 professionals have used our research since 2012.
For how long have I used the solution?
I've been using the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Administrador Junior Level 1 at Compuguana
Easy to install, and makes it quick and easy to connect
Pros and Cons
- "Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
- "It would be good to have Remote Access VPN solutions for Check Point edge services."
What is our primary use case?
Currently, as we are a company that constantly imports and exports solutions. We have needed to give our salespeople access to our executives since that part of retail is constantly on the move inside and outside our organization. This makes it somewhat necessary to figure out how everyone can access data since the information is being used and managed every day inside and outside of our institution. We have come to use the Check Point security services so that users can have the same access as we have inside when they are outside the organization.
How has it helped my organization?
The capacity that Check Point Remote Access VPN offers is one of the best. It has made it easier for us and the team to have great mobility inside and outside the organization. If anyone must consult the services internally, they can connect quickly and simply. The agent that allows the connection is very fast to install and very fast to configure. It has streamlined a lot of the complexity that we had faced before.
What is most valuable?
Among its most valuable features is how it quickly and easily connects everyone to the VPN service. It quickly installs an agent on the computers, so that our users do not have to worry about their mobile devices being configured. It is easy to install and can run and install as a client on devices whether the user has Mac or Windows.
What needs improvement?
In the future, if this service could be installed in a faster and simpler way (rather than having it directly connected to the appliances), that would be ideal. Today, many of the solutions are not what was needed when we had perimeter security. It would be good to have Remote Access VPN solutions for Check Point edge services.
For how long have I used the solution?
We have been using the solution for three months.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Remote Access VPN
October 2025

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
870,701 professionals have used our research since 2012.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
Great VPN connection that helps extend infrastructure and is perfect for remote worker access
Pros and Cons
- "Scalability is great. We have been able to grow as a corporation due in part to this type of solution."
- "Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."
What is our primary use case?
Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client.
Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.
How has it helped my organization?
Connection through VPN has helped us with the connection to corporate. This type of connection has been very useful to us since, as infrastructure personnel, we can establish a connection to our corporate to make a connection either RDP or directly to services in order to be able to carry out any work activity or review any report by the operational part in order to speed up response times. We can connect to our network equipment by SSH, RDP, or via the web, however, only when we have this type of secure connection.
What is most valuable?
One of the features that has helped us the most with our solutions has been the P2P connection through an IPsec VPN. It has allowed us to extend our infrastructure and grow with new clients. Previously, we had around 15 corporate clients. Through the COVID-19 pandemic, we have managed to grow and now have around 35 new corporate clients and more than 6 people connected by VPN. This has forced us to increase our infrastructure to be able to support all these connections and to have a stable, reliable, and, above all, scalable solution that can interconnect more clients.
What needs improvement?
We have not migrated to the R81 version and I do not doubt that it will have some improvements compared to the version we use today.
Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor. This type of integration would undoubtedly give it a better reach and greater market with new security trends top of mind.
I know that everything is moving to a cloud environment, however, for all those corporates that still do not trust such an environment, it would be favorable to offer a 2MFA service in a solution tested through a blade or in the cloud.
For how long have I used the solution?
I've used the solution for more than five years.
What do I think about the stability of the solution?
The remote workers were experiencing issues like disconections, no IP avaliables from the DHCP, or unable to connect because the server didnt responde to a ping, however this issue was fix after we instlalled the JHF 125 on each gateway and after the upgrade, everythig has been working OK, but before that Check Point didn´t have a fix for that manner.
What do I think about the scalability of the solution?
Scalability is great. We have been able to grow as a corporation due in part to this type of solution.
How are customer service and support?
They have been with us when we needed help. We don't have any complaints about their level of service.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did use a different solution and we switched due to the fact that Check Point is more secure and has more features for the type of connections we need.
How was the initial setup?
It was a straightforward setup.
What about the implementation team?
The product was integrated with in-house personnel.
What was our ROI?
We've seen about a 40% ROI.
What's my experience with pricing, setup cost, and licensing?
Check Point is an expensive solution, however, it has more features and is more secure than other options.
Which other solutions did I evaluate?
Ae evaluated AnyConnect and Palo Alto.
What other advice do I have?
We would like them to add a 2MFA feature in the future. This is our direct request.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr. Network Security Engineer at Digital Track Solutions Pvt Ltd
Good support, easy connection, and helpful multi-factor authentication
Pros and Cons
- "The most valuable point is that it provides multi-factor authentication (MFA), which increases security by requiring an add-on verification method and ensures that only authorized users have access to the network."
- "The knowledge base can be improved for advanced troubleshooting."
What is our primary use case?
Our primary use case is to provide a remote access VPN to organization users so that they can access the organization servers or resources easily from anywhere.
How has it helped my organization?
With the help of Remote Access VPN, our organization's users can connect to our network easily and access servers. This has increased employee productivity.
What is most valuable?
The most valuable point is that it provides multi-factor authentication (MFA), which increases security by requiring an add-on verification method and ensures that only authorized users have access to the network.
What needs improvement?
The knowledge base can be improved for advanced troubleshooting. For new users, configurations might be complex. This can be also improved.
For how long have I used the solution?
We have been using this solution for the last year.
What do I think about the stability of the solution?
The stability is excellent.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and support?
Our experience with customer service and support is excellent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using the same solution.
How was the initial setup?
The initial setup was very easy and straightforward.
What about the implementation team?
We implemented it through an in-house team.
What's my experience with pricing, setup cost, and licensing?
As per the market, everything looks good.
Which other solutions did I evaluate?
No, we haven't evaluated other option
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network and Security Engineer at a security firm with 11-50 employees
A stable tool that provides easy-to-use policies and safe infrastructure for remote access
Pros and Cons
- "The policies are easy to use."
- "The product’s architecture is a bit distributed."
What is our primary use case?
We use the solution for our customers. Whenever the users work from home, they connect to the solution and are redirected to their network. It is very simple. They install the client, and the client makes a tunnel to the product. Once they are connected, they can enter into the network.
What is most valuable?
The policies are easy to use. Once we are connected, the entire infrastructure is safe, irrespective of the device we are using. There is no need to worry about safety. It's a secure tunnel that helps us access the network. It is a very useful feature. We can access the internal resources once we are connected to a VPN. We need not be in the office. The solution performs well.
What needs improvement?
The product’s architecture is a bit distributed. It should consolidate the architecture to make everything available on a single dashboard.
For how long have I used the solution?
I have been using the solution for two and a half years.
What do I think about the stability of the solution?
The tool is stable.
What do I think about the scalability of the solution?
The tool is scalable. We may need to opt for higher boxes. We work with enterprise customers.
How are customer service and support?
The technical support is hardly good. The support team must improve its response time. It should also improve follow-ups through email.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have worked with Sophos and Array Networks. Check Point’s stability is better compared to other tools. I have frequently faced disconnection and other issues with other products.
How was the initial setup?
The initial setup is not easy. We need to be skilled in Check Point to install the solution. The time taken for deployment depends upon the number of boxes we install. If we install one or two boxes, one or two weeks is sufficient.
Our customer needed to install more than 100 boxes in every region. It takes months to deploy the product at that scale. We need a team of 20 people to implement the tool for an enterprise. Once the installation is done, maintenance is easy. The product runs smoothly.
What other advice do I have?
I recommend the solution to every vendor with Check Point as a firewall because it has great stability and security. We can terminate our VPN services to the same box if we're already using Check Point VPN. Overall, I rate the product a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. MSP
Deputy Head of IT department at UkrGasBank
Provides users with secure, seamless remote access to corporate networks
Pros and Cons
- "It operates effectively, particularly during challenges like adversities or infrastructure issues."
- "There were some issues with automation and instability."
What is our primary use case?
In the context of general user remote access, we utilize Check Point VPN concentrators that serve as both Internet firewalls and error ID locations. Our remote access system, constructed on a Check Point foundation, consists of four systems.
What is most valuable?
Currently, I'm part of the network team, and my primary concern revolves around maintaining a stable connectivity setup. It's important for this connectivity solution to have provisions, possibly within AWS, that enhance security measures and provide more security-related advantages. From my standpoint, our solution serves a general purpose. It operates effectively, particularly during challenges like adversities or infrastructure issues. Overall, it suits our needs well.
What needs improvement?
There were some issues with automation and instability. But overall, these self-integrated products offer exceptional support and prove highly beneficial from an administrative standpoint. It isn't overwhelming, as seen with instances like in other vendors. The platform is convenient to manage and scalable.
For how long have I used the solution?
I have been working with Check Point Remote Access VPN for one year.
What do I think about the scalability of the solution?
The solution is scalable. I rate the scalability a nine out of ten.
How are customer service and support?
Technical support is essential in our case. We encountered a few instances related to next-generation firewalls, though they might not be of direct interest.
In general, the response rate to our inquiries has been quick. Our cases are categorized as server-to-server or critical solutions, resulting in immediate internet connectivity for addressing the issue. The level of support we receive is of a very high standard.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Cisco AnyConnect. Both solutions are similar. However, the difference lies in the security features rather than the networking aspects.
Ultimately, the decision was made to expand and implement Check Point for the entire user base. This choice was reasonable based on the circumstances and the initial security in Check Point. We also had a phase where we utilized both solutions simultaneously. Eventually, due to our requirements, switching solely to Check Point proved to be the more precise decision, aligning with our corporate requirements.
How was the initial setup?
The initial setup is not very easy and we are partnered with highly qualified engineers to deploy the solution. The process involves designing the overall network module, carrying out installations, configuring appropriately, and initiating the initial setup. The array agent is then deployed to individual personal computers. It takes almost one quarter.
What about the implementation team?
We had a partnered team with highly qualified engineers to deploy the solution.
What's my experience with pricing, setup cost, and licensing?
What other advice do I have?
When working with remote access, the goal is to define the exact issue we aim to resolve. Identifying a suitable solution for discussions is crucial while focusing on establishing a high-level solution design. Following this, the implementation can proceed. Formulating a solid architecture utilizing Check Point isn't overly complex. The service switches provided within the system confer a sophisticated level of functionality.
Based on these, I would rate it a nine out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber Security Engineer at Natica IT Consulting at Natica IT Consulting
Easy to use and set up with good security
Pros and Cons
- "It is stable most of the time."
- "We have noted some stability issues."
What is our primary use case?
We primarily use the solution as a VPN for connection purposes. It helps us connect to corporate.
What is most valuable?
It is easy to use and easy to set up. The setup is very fast.
The security is pretty good.
It is stable most of the time.
What needs improvement?
It's becoming old-fashioned and slightly out of date. We're moving towards DNS.
We have noted some stability issues.
For how long have I used the solution?
I've used the solution for more than a year at this point. The company has maybe used it longer.
What do I think about the stability of the solution?
The stability is very good. I'd rate it nine out of ten. It could be a bit better. It might now work with all programs.
What do I think about the scalability of the solution?
The solution is scalable. We have 80 or 90 users on the product.
It is not extensively used.
How are customer service and support?
We do not need to use technical support. We are technical ourselves and can handle issues.
Which solution did I use previously and why did I switch?
I've used Palo Alto and Sophos, among other solutions. I've used a few different solutions.
How was the initial setup?
The initial setup is very fast and straightforward. It only takes about five to ten minutes.
You simply set up your firewall and handle settings and then send links to your IT team that can connect them.
What about the implementation team?
We were able to manage the setup in-house. We did not use a consultant or integrator.
What was our ROI?
I have not witnessed any ROI.
What's my experience with pricing, setup cost, and licensing?
The license is renewed yearly. I'm not sure of the exact price or if it is expensive.
What other advice do I have?
I'd rate the solution nine out of ten.
I would advise companies to make sure the configuration is correct on the firewall.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Web Developer at Netconomy Software & Consulting GmbH
Compatible across devices, reasonably priced, and secures confidential information
Pros and Cons
- "It keeps us safe when browsing the internet and when sharing confidential information with our colleagues."
- "Sometimes the application slows down the computing device, and this affects workflows."
What is our primary use case?
The remote VPN enables us to connect our devices under a controlled network infrastructure. It protects the channels for transferring data and confidential information.
It connects our managers with remote employees to enhance efficiency in the implementation of projects and tasks. Check Point Remote Access VPN blocks unauthorized access to our computing devices.
It is easy to install and use this VPN for any new user. It keeps all the teams under the same collaboration and networking channel safe. Information encryption secures end-to-end conversation among teams.
How has it helped my organization?
I have experienced the most benefits while using this product in the organization.
It keeps us safe when browsing the internet and when sharing confidential information with our colleagues.
When working on joint projects and tasks this product prevents external cyber attacks from attacking our privacy.
Teams operating from remote areas can customize the location features and set suitable IP addresses that serve them well.
The speed and reliability enable us to achieve the set targets and initiate trade-offs.
What is most valuable?
It has a simple user interface that is easy to operate and set up.
The customer support staff provides 24/7 customer support services that enhance effective service delivery.
The premium version provides the most advanced services that are always effective.
The cost of maintenance and privacy policies suits our daily demands.
It is compatible with most devices and can easily integrate with most applications in the organization.
There is no apparent IP leak and it connects firmly without disconnecting.
What needs improvement?
This version has comprehensive features that provide reliable services based on the organization's requirements.
Sometimes the application slows down the computing device, and this affects workflows.
Most modern VPNs offer more features that are more powerful as compared to the ones set up in this system.
The focus of the next release should be on the compatibility and speed of this platform so that it can easily compete with other products.
It should be customized to accept more languages and more locations.
For how long have I used the solution?
I've used the solution for 14 months.
What do I think about the stability of the solution?
The operations and stability have been firm and reliable.
What do I think about the scalability of the solution?
This is great and scalable product.
How are customer service and support?
The customer support staff offers great services.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not worked with different solutions.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
The implementation took place through the vendor.
What was our ROI?
There is increased ROI from its reliable performance.
What's my experience with pricing, setup cost, and licensing?
It is cost-effective.
Which other solutions did I evaluate?
I have only had experience with this VPN.
What other advice do I have?
The performance has been good and I recommend it to other business enterprises.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2025
Popular Comparisons
Microsoft Intune
Prisma Access by Palo Alto Networks
Fortinet FortiClient
Workspace ONE UEM
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
Microsoft Remote Desktop Services
OpenVPN Access Server
TeamViewer Business
Claroty Platform
Cisco Secure Client (including AnyConnect)
Check Point Harmony SASE (formerly Perimeter 81)
Ivanti Connect Secure
Microsoft Azure VPN Gateway
F5 BIG-IP Access Policy Manager (APM)
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices