Try our new research platform with insights from 80,000+ expert users
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Creates a dynamic network with great mobility and excellent stability
Pros and Cons
  • "The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
  • "The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."

What is our primary use case?

We have always worked within the office. However, the COVID pandemic changed the course of our work in terms of where we had to implement new solutions so that we could all work from home. That was when I encountered Check Point; we had years with this solution in the facilities, yet, only during the pandemic did we have to innovate for a home environment. Today we have more than 6000 users working from home thanks to Check Point. This is possible due to the fact that, with a certificate and the client for this connection, every person can connect to our environment as if they were at the office.

How has it helped my organization?

We still have many areas of opportunity in which we must work, however, this has required us to improve our infrastructure in order to accommodate remote work. Since the beginning of the pandemic, we have had this solution and we have had many challenges since there are more than 6000 people who work from home. For security, we have an expiration time of the .p12 certificates and that requires updating passwords. Today, we are integrating this solution with a 2MFA system to give much more security to corporate.

What is most valuable?

The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic for connection to corporate due to the integration we have of Check Point via our AC or LDAP. 

We are creating rules by user and not by IP (which could be done both ways). We stick more to mobility inside and outside the corporate environment. Since then, corporate has been increasing security and keeping our workers happier.

What needs improvement?

The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application. We'd be able to give a better experience to companies that already have a contract or Check Point services that deal with a work-from-home environment, giving greater scope and coverage from a single centralized dashboard.

Buyer's Guide
Check Point Remote Access VPN
December 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for more than two years

What do I think about the stability of the solution?

The stability is the best.

What do I think about the scalability of the solution?

The scalability is great.

How are customer service and support?

 We have witnessed a fast response from the support team.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution.

How was the initial setup?

The initial setup was not overly complex.

What about the implementation team?

We handled the installation in-house.

What was our ROI?

We've witnessed a 40% ROI.

What's my experience with pricing, setup cost, and licensing?

The price is a little high, however, the solution is something that we recommend often.

Which other solutions did I evaluate?

We did evaluate other options.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1670154 - PeerSpot reviewer
Firewall Engineer at a logistics company with 1,001-5,000 employees
User
Great MEP functionality, perfect for remote users, and has an easy basic setup
Pros and Cons
  • "For a basic setup, implementation is quite easy."
  • "The non-standard setup is quite complex as you have to do changes via GUI and CLI."

What is our primary use case?

We are hosting environments for our customers and ourselves. With Check Point Client, VPN users that aren't in their internal networks can connect via a secure connection into the internal network.

Remote users use different clients (Windows, Linux, and Mac OS) so depending on the customer, there is either a client connection or a clientless approach (using a web portal).

Users can also be identified if they use the Client VPN solution. If you want to identify them inside the network you have to use an IA agent.

Once set up, it simply works without issues.

How has it helped my organization?

The main advantage is that if you already have a Check Point Gateway in place you don't have to buy additional hardware. You only need to check if there are enough resources on the gateway for the additional load and decide how many concurrent users you need.

The installation was fairly straightforward thanks to the Admin Guide and the User Center.

Adding a Radius or similar to use for the user authentication can also easily be done so you don't have to create local users. Depending on the size of the user base I would also recommend MFA.

What is most valuable?

A normal Check Point Gateway has, with the base license, 5 concurrent users included. This means that in emergency situations you don't have to buy additional licenses.

During Covid, the license was increased and therefore it was easily possible to have several users working from home.

It's possible to either have a client installed on the user's machine, or have a clientless approach using the web portal. 

There is MEP functionality, so, based on the user's location, it minimizes the latency by connecting to the nearest entry point. 

What needs improvement?

The non-standard setup is quite complex as you have to do changes via GUI and CLI. Luckily, Check Point knowledgebase articles help you, however, there are so many resources you have to go through.

The Client VPN licenses are for concurrent users and there is currently no way to prioritize certain users over others.

There is no possibility to increase the number of concurrent users for a short time (except if you have unlimited concurrent users licensed). This could help during emergency situations where there are more client VPN users than anticipated.

For how long have I used the solution?

I've used the product for over 7 years.

How was the initial setup?

For a basic setup, implementation is quite easy.

Disclosure: My company has a business relationship with this vendor other than being a customer: We're a check point partner and also host and administrate our customers environments.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
December 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
reviewer1536681 - PeerSpot reviewer
Network, Systems and Security Engineer at SOLTEL Group
Real User
Easy to configure, versatile and intuitive interface, provides a secure and stable connection
Pros and Cons
  • "One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure."
  • "When you need to create something, you have to follow many steps and I think that should be simplified."

What is our primary use case?

Check Point Endpoint Remote Access VPN is without a doubt, really fantastic software. It allows me remote and secure access to my most important data, to the company's networks, and to corporate resources from anywhere in the world.

Regardless of where I am, it guarantees the complete privacy of all our confidential information through multifactor authentication and compliance analysis of the endpoint system.

All of this is very easy to configure using step-by-step wizards, and there are many guides to explain it.

How has it helped my organization?

Check Point Remote Access VPN has improved my Organization with:

  • It has a built-in, centrally-managed Firewall blade, which allows us to filter traffic on the client-side.
  • The built-in, centrally-managed Compliance blade is helpful. Using it, we check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running. It doesn't allow the client to connect to the office in cases where these rules are not satisfied. That prevents infected computers from connecting to the company's location and spreading threats.
  • It is easy to install the Endpoint Remote Access VPN client on different platforms.
  • It provides a stable VPN connection.

What is most valuable?

One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure. It is compatible with several operating systems, and it has great protection against malware and any other cyber threat that wants to penetrate our endpoints.

It is fully integrated and centralized, which allows me to configure the security policy and view VPN events from a console.

What needs improvement?

Despite being very intuitive, the interface needs improvements. When you need to create something, you have to follow many steps and I think that should be simplified.

For how long have I used the solution?

We've been using Check Point Remote Access VPN for more than two years.

How are customer service and technical support?

I know that if there were any problems, the technical support team would solve them almost immediately. The team is highly qualified.

What other advice do I have?

So far, I have not found any negative characteristics to complain about, since in general, the software works in an excellent way and it has never failed us.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1730568 - PeerSpot reviewer
Network and Security Engineer at a security firm with 11-50 employees
Reseller
Top 5Leaderboard
A stable tool that provides easy-to-use policies and safe infrastructure for remote access
Pros and Cons
  • "The policies are easy to use."
  • "The product’s architecture is a bit distributed."

What is our primary use case?

We use the solution for our customers. Whenever the users work from home, they connect to the solution and are redirected to their network. It is very simple. They install the client, and the client makes a tunnel to the product. Once they are connected, they can enter into the network.

What is most valuable?

The policies are easy to use. Once we are connected, the entire infrastructure is safe, irrespective of the device we are using. There is no need to worry about safety. It's a secure tunnel that helps us access the network. It is a very useful feature. We can access the internal resources once we are connected to a VPN. We need not be in the office. The solution performs well.

What needs improvement?

The product’s architecture is a bit distributed. It should consolidate the architecture to make everything available on a single dashboard.

For how long have I used the solution?

I have been using the solution for two and a half years.

What do I think about the stability of the solution?

The tool is stable.

What do I think about the scalability of the solution?

The tool is scalable. We may need to opt for higher boxes. We work with enterprise customers.

How are customer service and support?

The technical support is hardly good. The support team must improve its response time. It should also improve follow-ups through email.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with Sophos and Array Networks. Check Point’s stability is better compared to other tools. I have frequently faced disconnection and other issues with other products.

How was the initial setup?

The initial setup is not easy. We need to be skilled in Check Point to install the solution. The time taken for deployment depends upon the number of boxes we install. If we install one or two boxes, one or two weeks is sufficient.

Our customer needed to install more than 100 boxes in every region. It takes months to deploy the product at that scale. We need a team of 20 people to implement the tool for an enterprise. Once the installation is done, maintenance is easy. The product runs smoothly.

What other advice do I have?

I recommend the solution to every vendor with Check Point as a firewall because it has great stability and security. We can terminate our VPN services to the same box if we're already using Check Point VPN. Overall, I rate the product a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: MSP
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Easy to install, centrally managed, and stable
Pros and Cons
  • "It is easy to install the Endpoint Remote Access VPN client to different platforms."
  • "The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

In addition, there are about 30 Google Cloud projects of different sizes ranging from 10 to 250 virtual machines, and they are used for development, staging, production, etc. For every project, there is one dedicated scalable instance group of the Check Point CloudGuard IaaS gateways.

We user the Check Point Remote Access VPN to provide access for our employees to connect to the specified environments.

How has it helped my organization?

We use the Check Point Endpoint Remote Access VPN client to allow our remote employees to connect to our company's offices in a secure and reliable way.

We use the clients for Windows and macOS, with the current software version E82.30. The Endpoint Remote Access VPN clients are fully compatible with the Check Point NGFWs Mobile Access VPN blade, and there are no problems connecting to it.

The clients have additional functions, like Firewall and Compliance blades, which we consider as a strong benefit for using the pure clients.

Several remote sites are supported in the client configuration, which allows us to have the redundancy for the case when one of the Offices becomes unavailable due to ISP problems.

What is most valuable?

  1. It is easy to install the Endpoint Remote Access VPN client to different platforms. Within the company, we use it for Windows and macOS.
  2. Built-in, centrally-managed Firewall blade, which allows filtering traffic on the client-side.
  3. Built-in, centrally-managed Compliance blade. We check the client OS on the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.
  4. Stable VPN connection.

What needs improvement?

  1. The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed. This is valid for at least software version E82.30, which we currently use.
  2. In addition, there is no full client of the Check Point Remote Access VPN available for the Linux operating systems families. That is important since some of our administrators prefer to use this OS even on their home PCs. We hope that Check Point would develop a client for Linux in the future.

For how long have I used the solution?

I have been using the Check Point Remote Access VPN for about two years.

What do I think about the stability of the solution?

The Check Point Remote Access VPN clients are stable on both Windows and macOS.

What do I think about the scalability of the solution?

The Gateway side part of the software scales well.

How are customer service and support?

We have had several support cases opened, but none of them were connected with the Check Point Remote Access VPN. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

Which solution did I use previously and why did I switch?

Prior to this product, we didn't use any centralized VPN software before.

How was the initial setup?

The setup was straightforward and simple.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

Which other solutions did I evaluate?

We did not evaluate other options because we already use the products from the CheckPoint ecosystem.

What other advice do I have?

The Check Point Endpoint Remote Access VPN for MacOs and Windows are reliable solutions for remote access VPN, and fully compatible with the Check Point security ecosystem.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1777347 - PeerSpot reviewer
System Analyst at IIT Gandhinagar
User
Easy off-site access, offers increased productivity, and works seamlessly on Windows/Mac
Pros and Cons
  • "Once we install and connect the VPN service, it keeps on running until we disconnect."
  • "The Linux version may have an app (similar to Windows) instead of a shell script."

What is our primary use case?

The primary use case of this solution is to connect to our internal network for accessing servers and clusters using Check Point VPN. End-users are, for example, students accessing computer labs and licensed software that can check academic licenses only within the campus network; further, our ERP folks could make good use of the VPN solution by remotely working on the Institute Management System infrastructure and can work efficiently without any hindrance. We also use its capsule app on smartphones to connect further.

How has it helped my organization?

Using Check Point Remote Access VPN has increased the overall productivity for users staying outside the campus and working remotely during this Covid-19 period. Faculty, students, staff, and research fellows as well as a lot of other eligible users have been benefited by securing the VPN license in order to run login remotely and access the project workstations, clusters, run simulations and submit their research work for the final thesis defense. It also allows for publishing in high-impact factor journals.

What is most valuable?

Once we install and connect the VPN service, it keeps on running until we disconnect. Moreover, the best outcome is when the end-users are able to check out software licenses through the tunnel and keep on working remotely from their home without any interruption. 

The VPN service works seamlessly in Windows and Mac. Only in the case of Linux or Ubuntu have we had to struggle a bit by understanding the SNX Batch file to get installed and run it. Moreover, in Windows and Apple systems the app is running on the system tray whereas in Linux we have to keep the Terminal Window Open.

What needs improvement?

The Linux version may have an app (similar to Windows) instead of a shell script. We have seen that in Windows and Apple systems the app is running on the system tray whereas in Linux we have to keep the Linux Terminal Window open otherwise the connection drops. Sometimes, we have noticed that the owing to installation of various antivirus and running of inbuilt firewalls (applicable to all operating systems); the connection for VPN sporadically drops and tries to reconnect. When this happens, we have to manually either disable the firewall/antivirus or reconnect the VPN again.

For how long have I used the solution?

We've used the solution since 2015 or 2016.

Which solution did I use previously and why did I switch?

We were using Cyberoam.

What's my experience with pricing, setup cost, and licensing?

Users must pursue Proof of Concept as the functional requirements can vary.

Which other solutions did I evaluate?

We also looked into Palo Alto and Fortinet.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1602699 - PeerSpot reviewer
Network Security Engineer at a manufacturing company with 5,001-10,000 employees
Real User
Easy to manage, perfect for remote workers, and does not require technical knowledge
Pros and Cons
  • "Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work."
  • "There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect."

What is our primary use case?

We are able to allow users to easily gain access to internal systems from outside the organization. No longer is coming into the office a necessary requirement for our users. They can seamlessly transition from home/remote work to going into the office while still having the same level of access. We also have many users that need to manage servers who are able to connect to the internal servers from anywhere - allowing them to still do their jobs from anywhere. Connecting to VPN doesn't require a ton of technical skill for those not in the technical field.

How has it helped my organization?

Users who need to work remotely for any reason can still do their jobs despite their location. The solution is also incredibly easy to manage. It's pretty much set and forget once the blade is turned out and configured. No day-to-day maintenance or configuration is required from the security operations team to keep it running which is welcome considering actual user help tickets are abundant throughout most organizations. Many times our service desk needs to enter the connection settings for our end-users, but that's about it.

What is most valuable?

Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work. There was no need to make any changes at the firewall level once we saw a large number of users go to work from home for safety reasons. If the VPN client was installed on their laptop they were good to go. The client also supports MFA, which is important, especially considering all of the remote work happening these days. 

What needs improvement?

There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect. The VPN client install should be specific to our environment. Our service desk does get some complaints about users not being able to connect. Sometimes it's because the VPN client has updated and they've lost their connection settings and don't have a record of the connection settings themselves. Other times, the VPN client needs to be reinstalled or upgraded to allow them to connect.

For how long have I used the solution?

I've worked with the solution for more than 5 years.

What do I think about the stability of the solution?

The solution is very stable and requires virtually no maintenance.

What do I think about the scalability of the solution?

The solution is easily scalable.

How are customer service and technical support?

Diamond support is typically fantastic. However, lately, they make us wait for our diamond support person instead of giving us a different tech to work with.

Which solution did I use previously and why did I switch?

There was no previous solution that was used prior to this product.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

We handled the entire process in-house.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
CheckPoint RA VPN 2023
Pros and Cons
  • "Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
  • "The VPN remote Access blade could be improved."

What is our primary use case?

After implementing our GW and management security appliance in our public cloud infrastructure, we needed to establish P2S VPNs so that some users could connect to our offices safely to be able to access information and internal applications from anywhere.

This need begins when the sales department requires access to internal resources to be able to show solutions that we sell to clients. However, these connections were mostly from public places without security, which was clearly a huge vulnerability of the company.

Thanks to this tool, we managed to solve this need.

How has it helped my organization?

Check Point Remote Access VPN has given us the ability to provide access from a client to our network. It offers a simple and integrated installation with security measures such as MFA in addition to being able to enter our infrastructure in a controlled and secure manner. The solution not only provides access. It also generates monitoring and event logs and maintains connections correctly,

Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised.

It is also essential to know that the users who can use the solution are under granular policies from the security application. Policies that can be applied to different user profiles guarantee correct and effective access for the different departments of the company.

What is most valuable?

Its implementation is very simple through the VPN blade in our Check Point gateway which is located and implemented within our public cloud architecture.

Its different monitoring and records generate the required tools to be able to provide good control of everything that happens during the connection time of the users.

Also, the policies can be generated as granularly as desired, and the portal is extremely intuitive. All this is a great help for administrators to manage VPNs.

What needs improvement?

The VPN remote Access blade could be improved. Licensing is extremely expensive per user and more so for large companies where the number of users directly impacts the cost.

The documentation for good practices and specific configurations is somewhat old, generally for versions before R80, which is why it is sometimes more challenging to understand them or be able to implement them,

Also, at the support level, response times can be improved, as the technical level for this type of tool is very good.

For how long have I used the solution?

This is a very good tool and we have used it for a long time from our Check Point gateway. It's security management is providing the perfect and secure solution to connect from any location.

What do I think about the scalability of the solution?

This solution is scalable in cluster and VSS architectures.

Which solution did I use previously and why did I switch?

Previously we have used FortiClient to solve VPN problems. At some point, we also used the Azure P2S VPN. However, it does not provide security.

What's my experience with pricing, setup cost, and licensing?

It is very necessary for a company to have the support of a partner so that they can provide you with cost estimates, documentation, and access to tests that are not publicly available.

Which other solutions did I evaluate?

We always seek to validate the documentation of each security tool seeking the most significant benefit for our interests and each of the company's needs.

What other advice do I have?

It's a very good tool for VPN security. It is somewhat expensive, but they should evaluate it so they can have a more personal concept.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.