Try our new research platform with insights from 80,000+ expert users
Irshad Kazi - PeerSpot reviewer
Lead Technical Consultant at ITC Infotech
MSP
Top 5Leaderboard
Provides ease of maintenance, but its installation process needs improvement
Pros and Cons
    • "We encounter challenges for the product’s installation and troubleshooting processes compared to other VPN products."

    What is our primary use case?

    We use Check Point Remote Access VPN for security features.

    What needs improvement?

    We encounter challenges for the product’s installation and troubleshooting processes compared to other VPN products. It is difficult to restore settings in cases of connection failure. This particular area needs improvement.

    For how long have I used the solution?

    We have been using Check Point Remote Access VPN for five years.

    What do I think about the stability of the solution?

    The product is stable.

    Buyer's Guide
    Check Point Remote Access VPN
    December 2024
    Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
    823,875 professionals have used our research since 2012.

    What do I think about the scalability of the solution?

    We have 3000 Check Point Remote Access VPNs in our organization. It is a scalable product. We can increase and downgrade the access as much as possible. The usage depends on the licensing model.

    How are customer service and support?

    The technical support team only responds to the problems where the device stops working. Apart from that, they don’t reply to normal issues.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We used ForcePoint before. In comparison, Check Point Remote Access VPN is stable and easy to connect.

    How was the initial setup?

    The product is easy to maintain. It takes a few days to install and troubleshoot.

    What's my experience with pricing, setup cost, and licensing?

    The product has average pricing. We purchase its yearly pricing.

    What other advice do I have?

    I advise others to use the product instead of multiple SD solutions and hardware products. I rate Check Point Remote Access VPN a seven out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    reviewer1805079 - PeerSpot reviewer
    Network Engineer at Fujairah Port
    User
    Excellent support with great multi-factor authentication and compliance checks
    Pros and Cons
    • "It offers a simple configuration and setup."
    • "It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices."

    What is our primary use case?

    We primarily use the solution for work from home. Our main goal is to provide users with the ability to access their workstation from anywhere in the world.

    We provided remote access to more than 500 users during the pandemic. Check Point Remote Access VPN has worked smoothly as our appliance is capable of supporting 1000+ users.

    We deployed a VPN client-based solution with multi-factor authentication. The compliance check feature is useful.

    It is compatible with several operating systems, and it has great protection against malware.

    It offers a simple configuration and setup.

    How has it helped my organization?

    We developed work-from-home policies for our organization during the pandemic due to the rise in COVID cases. As network security engineers, it's challenging for us to manage users' personal laptops and computers which are not up to date (OS, Antivirus ..etc). However, when it comes to the Check Point VPN solution, we overcame all the challenges and successfully implemented our infrastructure. Logs are helping us to monitor each user's activity. We can also isolate user laptops or PCs from the internet when its gets connected to our network.

    What is most valuable?

    The remote access blade is built in on the firewall, so it is easy to activate through the Smart Console.

    Only the VPN client supports only the Windows and Apple Mac operating systems, which also support iOS and Android mobile platforms. The Check Point development team deserves praise for a flawless experience.

    Multi-factor authentication and compliance checks help us to ensure maximum security.

    VPN logs give us complete visibility and track unusual activities.

    The VPN client user interface is simple and perfect.

    The VPN client software is lightweight.

    What needs improvement?

    It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices.

    The configuration of a VPN requires a distinct VPN Tab. Once the VPN blade has been activated, after activating VPN blade, we need to make some configurations in the gateway option settings and others in the VPN communities section. It would be preferable if these two things came together in one place.

    Apart from this, it operates flawlessly. To improve our IT Services, we poll our users. The majority of people say how excellent the remote access VPN service is. Additionally, they stated that once connected to a VPN service, they never experience connectivity problems.

    For how long have I used the solution?

    I've used the solution for more than two years.

    How are customer service and support?

    The product offers excellent customer service and support.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We used a different solution that did not satisfy us in terms of security. As a result, we decided to deploy Check Point for enhanced security.

    Before migrating to the Check Point firewall, we conducted market research and solicited feedback from my contacts who are already Check Point NGFW customers. We decided to use Check Point.

    How was the initial setup?

    The VPN Setup and initial configuration are tricky and not straightforward. For example, you need to:

    1. Do some configuration in the gateway option, then:

    2. VPN Communities

    It would be preferable if step 1 and step 2 were available in one place.

    3- Lastly, you must apply the firewall policy

    What about the implementation team?

    We implemented this solution ourselves.

    What was our ROI?

    We now have a reliable VPN solution to offer our staff, which is a significant return on investment.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Check Point Remote Access VPN
    December 2024
    Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
    823,875 professionals have used our research since 2012.
    Suraj Varma - PeerSpot reviewer
    Network Security Engineer at Digitaltrack
    Real User
    Top 5
    Good support, easy connection, and helpful multi-factor authentication
    Pros and Cons
    • "The most valuable point is that it provides multi-factor authentication (MFA), which increases security by requiring an add-on verification method and ensures that only authorized users have access to the network."
    • "The knowledge base can be improved for advanced troubleshooting."

    What is our primary use case?

    Our primary use case is to provide a remote access VPN to organization users so that they can access the organization servers or resources easily from anywhere.

    How has it helped my organization?

    With the help of Remote Access VPN, our organization's users can connect to our network easily and access servers. This has increased employee productivity.

    What is most valuable?

    The most valuable point is that it provides multi-factor authentication (MFA), which increases security by requiring an add-on verification method and ensures that only authorized users have access to the network.

    What needs improvement?

    The knowledge base can be improved for advanced troubleshooting. For new users, configurations might be complex. This can be also improved. 

    For how long have I used the solution?

    We have been using this solution for the last year.

    What do I think about the stability of the solution?

    The stability is excellent.

    What do I think about the scalability of the solution?

    The scalability is very good.

    How are customer service and support?

    Our experience with customer service and support is excellent.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We are using the same solution.

    How was the initial setup?

    The initial setup was very easy and straightforward.

    What about the implementation team?

    We implemented it through an in-house team.

    What's my experience with pricing, setup cost, and licensing?

    As per the market, everything looks good.

    Which other solutions did I evaluate?

    No, we haven't evaluated other option

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    reviewer2072484 - PeerSpot reviewer
    Information Technology Admin at a wellness & fitness company with 51-200 employees
    Real User
    Top 20
    The admin features make the management smoother
    Pros and Cons
    • "I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience."
    • "The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection."

    What is most valuable?

    I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience. 

    What needs improvement?

    We started with 50 users, but our numbers are increasing. Now it's difficult for us to maintain a steady internet connection and remote access, so we want to upgrade. We are considering a switch to FortiGate. I think they may have better service than Check Point offers. 

    Scalability is where we're having problems now. Generally, Check Point has been working fine, but we need something that can accommodate many users and provide a steadier internet connection. Our remote users need to access the VPN without any issues. Of course, this could also have something to do with our internet connection at the organization.

    We've been using Check Point to manage sites we need to block. It gives us the option to totally disable things, but it does not let the administrator create exceptions to allow specific users to access certain websites. Check Point could enable the administrator to permit users to access particular sites. I think the VPN we're using may have exceeded its lifespan. For example, if you check Instagram on Check Point, you might not even see it showing up, and it's difficult to restrict access to specific applications. 

    For how long have I used the solution?

    We started using Remote Access VPN sometime in the past five years.

    What do I think about the scalability of the solution?

    The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection.

    It fills the logs and cuts off our connection when it gets full. It stops working. It's time-consuming to reset the device and reload the backups. It takes us about two hours because we would need to reconfigure those routes and integrate them with the IP addresses we have set up.

    How was the initial setup?

    The setup was straightforward. Everything was populated on Check Point, so it was easy to select what we wouldn't allow. We deployed on-premise because we have the space and infrastructure to support it. 

    The deployment didn't take long. Two IT people are responsible for the deployment and maintenance. The online documentation will walk you through the process. When you do a manual reset by pressing the button, it guides you through the setup process. You only need to follow the steps. 

    After that, we import our backup file, and it populates. Next, we run the updates and check we forgot to configure anything else. Some backups are older and might not align with what we have running on the ground. 

    What was our ROI?

    I haven't seen an ROI.

    What's my experience with pricing, setup cost, and licensing?

    The cost varies. I believe the price ranges roughly from about 3000 to 4,000 ZWD. I don't think it gets any lower than that. The initial cost is high because you need to buy the hardware, and you incur some setup costs, but the expense drops in the long run.

    Which other solutions did I evaluate?

    So far, I have not tried any other solutions. I'm doing the research now. I'm still shopping around, trying to understand what's on the market before deciding.

    What other advice do I have?

    I rate Check Point Remote Access VPN eight out of 10. Aside from our current performance issues, it was smooth and flawless. I'm still shopping around. I was content with Check Point, but I want to see what's out there. I'm interested in knowing more about other available solutions. My primary goal is to avoid going through this process again two years from now. I'm hoping the next product will be a long-term solution, and it will be a while before we consider upgrading to something different.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Eladio José Sibaja Trejos - PeerSpot reviewer
    Administrador Junior Level 1 at Compuguana
    Real User
    Easy to install, and makes it quick and easy to connect
    Pros and Cons
    • "Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
    • "It would be good to have Remote Access VPN solutions for Check Point edge services."

    What is our primary use case?

    Currently, as we are a company that constantly imports and exports solutions. We have needed to give our salespeople access to our executives since that part of retail is constantly on the move inside and outside our organization. This makes it somewhat necessary to figure out how everyone can access data since the information is being used and managed every day inside and outside of our institution. We have come to use the Check Point security services so that users can have the same access as we have inside when they are outside the organization.

    How has it helped my organization?

    The capacity that Check Point Remote Access VPN offers is one of the best. It has made it easier for us and the team to have great mobility inside and outside the organization. If anyone must consult the services internally, they can connect quickly and simply. The agent that allows the connection is very fast to install and very fast to configure. It has streamlined a lot of the complexity that we had faced before.

    What is most valuable?

    Among its most valuable features is how it quickly and easily connects everyone to the VPN service. It quickly installs an agent on the computers, so that our users do not have to worry about their mobile devices being configured. It is easy to install and can run and install as a client on devices whether the user has Mac or Windows.

    What needs improvement?

    In the future, if this service could be installed in a faster and simpler way (rather than having it directly connected to the appliances), that would be ideal. Today, many of the solutions are not what was needed when we had perimeter security. It would be good to have Remote Access VPN solutions for Check Point edge services.

    For how long have I used the solution?

    We have been using the solution for three months.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Jonathan Ramos G. - PeerSpot reviewer
    Cloud Engineer at ITQS
    Real User
    Top 5Leaderboard
    Good security, protects identity, and allows full access even in different regions
    Pros and Cons
    • "The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
    • "The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately."

    What is our primary use case?

    Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data. 

    Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.

    How has it helped my organization?

    The solution is giving us security when it comes to sharing our data safely through the private and secure tunnel that is created when creating the VPN. The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet. Online hackers won't be able to use your real IP address to discover your personal data, and government surveillance agencies and ISPs won't be able to monitor what you do online by snooping on your traffic.

    In addition to helping you avoid government surveillance, it also helps keep your privacy safe from advertisers.

    What is most valuable?

    In terms of the way they ensure traffic, an example is when we use Wi-Fi in public areas.

    WiFi is everywhere nowadays and it is extremely convenient to use, especially if you have a tight mobile data plan. The only problem with free WiFi is that it's often unsecured, which means you're putting your personal data at risk every time you use it. After all, cybercriminals can find out a lot about you, which can lead to them stealing your:

    • Credit card details
    • Bank account details
    • Email login credentials

    However, if you use a VPN, you won't have to worry about those dangers. A VPN uses encryption to protect your online communications, making sure no one can monitor it. Basically, if a hacker tried to see your connection traffic, they would just see nonsense.

    What needs improvement?

    That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.

    For how long have I used the solution?

    I've used the solution for about 2 years.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Independent Information Technology and Services Professional at a non-profit with 1-10 employees
    Real User
    Top 5
    Advanced threat protection and valuable features enhance security with great support
    Pros and Cons
    • "The advanced malware protection and the sandboxing features are very valuable as they perform well, with detection being very high."
    • "There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients."

    What is our primary use case?

    For remote work, Check Point Remote Access VPN connects, creates the site, and gathers information about the site in terms of the VPN domain, the public IP at that time, and so on.

    How has it helped my organization?

    The Check Point products provide solid detection and advanced malware protection, which helps safeguard the organization’s security infrastructure. The platform offers essential features like sandboxing that perform well in threat detection.

    What is most valuable?

    The advanced malware protection and the sandboxing features are very valuable as they perform well, with detection being very high. Additionally, the panel features are also solid.

    What needs improvement?

    There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients. Another downside is related to performance, which lags behind similarly priced products like those from Palo Alto. The platform becomes layered with add-ons, moving away from its original simplicity, which poses a problem.

    For how long have I used the solution?

    I have been using Check Point since version 4.1, which amounts to about 15 years.

    What do I think about the stability of the solution?

    I rate the stability of Check Point Remote Access VPN as a seven out of ten. I experienced an issue when there was a recent upgrade to address a vulnerability that required the use of both a VPN user and a password along with a certificate or another form of identity confirmation. This was not mentioned in the upgrade notes, which initially caused some problems.

    What do I think about the scalability of the solution?

    The scalability of Check Point Remote Access VPN is decent. On a scale of one to ten, I rate it a seven.

    How are customer service and support?

    Check Point's support has always been great. They are very responsive, and we always get technically capable people. I would rate their support a nine or nine point five out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have worked with multiple vendors, including Palo Alto and Fortinet.

    How was the initial setup?

    For someone new to Check Point products or coming from managing other products, the setup can be difficult. However, for someone familiar with Check Point, the setup hasn't changed much over the years.

    What was our ROI?

    I am on the technical side and do not typically consider the business returns or ROI of the product.

    What's my experience with pricing, setup cost, and licensing?

    I am not familiar with the exact pricing details. However, the pricing for the basic remote access VPN is a lot less than that of other vendors, and it comes with many features within the basic package.

    Which other solutions did I evaluate?

    I have compared Check Point with Palo Alto. Palo Alto is more GUI-based, which makes it easier to use, but it requires more configuration knowledge.

    What other advice do I have?

    For regular users, Check Point firewalls are easier to configure compared to Palo Alto's. In terms of detection rates and performance, both Check Point and Palo Alto are very good.

    I'd rate the solution eight out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    Flag as inappropriate
    PeerSpot user
    Technical Manager at M.Tech
    Real User
    Flexible authentification, good integration, and helpful compliance capabilities
    Pros and Cons
    • "Setting policies allow, block, and limit users' access."
    • "Compliance Check on Check Point should be improved by having more configurable conditions to support multi-platforms and adding more granularity."

    What is our primary use case?

    Check Point Remote Access VPN allows organization users to work remotely. Especially in the pandemic period, work-from-home demand has been higher than ever. 

    I have a remarkable case about the solution. That is for a bank. They want to have remote access VPNs that can provide connections for internal users who work remotely, partners who have restricted connections to the bank environment and ATM machines that connect to core banking applications. All VPNs acted in the same internet connections but still ensure these three VPNs were separated from each other. For the requirements, deploying the VPN in VSX appliances helped to solve issues. I created three virtual instances: one for corporate users, one for partners and one for ATM machines. 

    Applying security policies for three instances is different. Corporate users must pass two-factor authentication layers and then have access to common corporate services (like email, and chat) and the right business applications depending on their working role, and their department. Partners after authenticating successfully only have limited access to the right place that they are allowed while being unable to connect to other places. 

    ATM machines that act 24/7 need to have continuous connections, thus, they must authenticate using a certificate and their VPN clients must be configured to re-authenticate automatically after a timeout.

    How has it helped my organization?

    Check Point Remote Access VPN supports almost all common devices, from Windows to macOS, and from Android to iOS. Connection methods are flexible, including browsers and VPN clients. 

    With such an approach, the solution can solve every remote working problem from anywhere, on any device while maintaining security features. The solution allows us to integrate with external systems like directory servers, email servers, and RADIUS servers for using directory users (a unified user instead must remember many usernames and passwords), adding multi-factor authentication via an OTP certificate. VPN users will have controlled access based on who they are and where they are by security policies. 

    What is most valuable?

    The solution offers flexible authentication methods to control access by policies and compliance. 

    Check Point can integrate with external systems and third-party solutions to provide multi-layer authentications. This helps secure the user accounts from leakage of passwords and also protects corporate from unauthorized access damage risks. 

    Security policies help to convert access regulations to policy rule configurations after authenticating. Setting policies allow, block, and limit users' access. 

    With the compliance feature, Check Point can define what conditions user machines should have to authenticate the VPN. This feature helps to add more security to the network.

    What needs improvement?

    Endpoint Security on Demand, or Compliance Check is a good feature. It allows the creation of compliance policies and adds more security to the network. Machines will be scanned once they connect to VPN to make sure all of them are compliant. Conditions to configure compliance checks are Windows security (hotfixes, patches), Anti-Spyware, Anti-Virus software, personal firewall, or Custom (application, files, registry). These are not enough in a complicated environment. Almost of them are supported for Windows machines, however, are just limited conditions for non-Windows. In fact, using mobile devices on Android, iOS, macOS, and Linux is very popular. Compliance Check on Check Point should be improved by having more configurable conditions to support multi-platforms and adding more granularity. 

    Besides compliance scanning sometimes causes consumes machine resources. 

    I also suggest scanning operations will consume fewer resources and increase speed time.

    For how long have I used the solution?

    I've been using the solution for more than five years.

    What do I think about the stability of the solution?

    As mentioned in my use case, the solution is running for thousands of corporate users, partner users, and ATM machines. The performance is very impressive. 

    What do I think about the scalability of the solution?

    With Check Point VSX, the virtual instance extension is just an additional license, thus, it's very easy to add VS for other purposes. Besides Check Point also developed Maestro technology to allow hyperscale, increase throughput, and maximize capacity.

    How are customer service and support?

    The Check Point Support Team is very professional and has technical expertise. The team is online 24/7 to make sure their customers always be supported. Response time to the customer is quick enough when they provide a solution to fix the issues or when they need some time to investigate or when they need some time to investigate they stay up to date.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I had used Fortinet Remote Access VPN before. At that time, other security features like Firewall, IPS, Application Control, and URL Filtering had been added to the same box running Remote Access VPN. The Fortinet appliance was overloaded all the time - although specifications in the datasheet could be OK. After changing to Check Point (using Remote Access VPN with other security features), the performance was amazing. CPU and memory usages were always at an average level.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
    Updated: December 2024
    Buyer's Guide
    Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.