What is our primary use case?
Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions.
We can connect anywhere in the world over possible ways to secure the infrastructure.
Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.
Also, we have multi-authentication so there is no chance of leakage.
How has it helped my organization?
Check Point Remote Access VPN provides multi-factor authentication layers.
We can make Data transfer more strict with Data Integrity, Encapsulation, DES,3DES, and Hashing Algorithm so that the level of security will be higher.
Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.
Multiple VPN connections can be established and share the data in a secure possible way.
What is most valuable?
It is easy to install the Endpoint Remote Access VPN client on different platforms. Within the company, we use it for Windows and macOS.
Built-in, centrally managed Compliance blade. We check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.
The stable VPN connection and uptime are also very good.
We have a centrally managed Firewall blade, which allows filtering traffic on the rule base to protect the requirement.
What needs improvement?
Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and Auditors are forced to have the latest patches in place.
Checkpoint Major version should have an extended time than the default time mentioned in the end-of-life policy document with additional prices.
Tools must be introduced and supportive in analyzing the data, flow, and threats.
We have to introduce the scripting part to work seamlessly.
For how long have I used the solution?
I've used the solution for more than four years.
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
The company offers the best support overall and we can trust their advice.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
This is the first time we are using this type of solution.
How was the initial setup?
The initial setup is straightforward, simple, and centralized.
What about the implementation team?
We handled the setup in-house.
What's my experience with pricing, setup cost, and licensing?
The product is better than any other product in the marketplace. Technically sounded techies all over the place. It is cost-effective and most importantly stable and secure.
Which other solutions did I evaluate?
We trust the Check Point Software technology.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.