We are able to allow users to easily gain access to internal systems from outside the organization. No longer is coming into the office a necessary requirement for our users. They can seamlessly transition from home/remote work to going into the office while still having the same level of access. We also have many users that need to manage servers who are able to connect to the internal servers from anywhere - allowing them to still do their jobs from anywhere. Connecting to VPN doesn't require a ton of technical skill for those not in the technical field.
Network Security Engineer at a manufacturing company with 5,001-10,000 employees
Easy to manage, perfect for remote workers, and does not require technical knowledge
Pros and Cons
- "Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work."
- "There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect."
What is our primary use case?
How has it helped my organization?
Users who need to work remotely for any reason can still do their jobs despite their location. The solution is also incredibly easy to manage. It's pretty much set and forget once the blade is turned out and configured. No day-to-day maintenance or configuration is required from the security operations team to keep it running which is welcome considering actual user help tickets are abundant throughout most organizations. Many times our service desk needs to enter the connection settings for our end-users, but that's about it.
What is most valuable?
Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work. There was no need to make any changes at the firewall level once we saw a large number of users go to work from home for safety reasons. If the VPN client was installed on their laptop they were good to go. The client also supports MFA, which is important, especially considering all of the remote work happening these days.
What needs improvement?
There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect. The VPN client install should be specific to our environment. Our service desk does get some complaints about users not being able to connect. Sometimes it's because the VPN client has updated and they've lost their connection settings and don't have a record of the connection settings themselves. Other times, the VPN client needs to be reinstalled or upgraded to allow them to connect.
Buyer's Guide
Check Point Remote Access VPN
January 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
For how long have I used the solution?
I've worked with the solution for more than 5 years.
What do I think about the stability of the solution?
The solution is very stable and requires virtually no maintenance.
What do I think about the scalability of the solution?
The solution is easily scalable.
How are customer service and support?
Diamond support is typically fantastic. However, lately, they make us wait for our diamond support person instead of giving us a different tech to work with.
Which solution did I use previously and why did I switch?
There was no previous solution that was used prior to this product.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
We handled the entire process in-house.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Tech Security Management at a logistics company with 1,001-5,000 employees
Simple management, quick search capabilities, and very good stability
Pros and Cons
- "The management of the solution is very simple. It allows for a single view of all the endpoints."
- "I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
What is most valuable?
The differentiator for this solution is the management interface that we find very good and provides a single view for all endpoints. The solution offers SmartLog that allows quick searches. The compliance modules are also very interesting.
What needs improvement?
I cannot see the full effect of the antibot solution because it relies on having access to the DNS queries, which might not go through the Check Point firewall when you're using it for perimeter networks. In this case Check Point will not identify the actual source of the DNS queries associated with antibot activity. This may be related to the customer architecture, however, and not due to product limitation. I don't know if it can be improved on the Check Point side or not.
The solution should allow for the automatic identification of destinations.
We have a URL qualification on the on-premises deployment model; this should also be the case on the cloud. The automatic classification should be done by the cloud team instead of having to specify or subscribe to a RSS for the information, we should be able to have an object that represents such cloud services. It's possible that Check Point already allows for this, but if they don't they should.
For how long have I used the solution?
We've been using the solution for about 20 years.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The stability depends on the setup. If the solution resides on a specific appliance, it is not scalable. It has a fixed capacity. However, if you move it onto different environments, cloud environments, it will become scalable. Right now, we have about 4,000 users in the current network and about 500 remote access users.
How are customer service and technical support?
Technical support is reasonable. It depends on the level of support you are willing to pay for, however. You can choose to have a company working for you with intermediate support with Check Point, or you can choose to have direct advanced support.
How was the initial setup?
The initial setup has a moderate amount of complexity. It's acceptable. However, the graphical display of the user chart of network usage, and the ability to zero in on the current graphics could be improved.
What other advice do I have?
We currently only use the on-premises deployment model, although we may extend into the cloud in the future. We're aware of the cloud's capabilities, but we're not using it because we don't have a large infrastructure expression there.
In terms of advice, I'd suggest that others implementing the solution make sure training happens on their teams. Most products can have lots of features, but if you do not have proper knowledge, you will not be able to make use of those features.
I'm very satisfied with this solution; I'd rate it eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Remote Access VPN
January 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
Accounts Administrator at a non-profit with 51-200 employees
Easy to install, stable, and reasonably priced
Pros and Cons
- "The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup."
- "They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds."
What is our primary use case?
It allows staff to work from home, especially now during COVID-19. You can access it from any location, and it does not require technical knowledge.
How has it helped my organization?
If any problem occurs, we are unable to work. An access to VPN enabled organization needs to improve by way of getting work done from any location in order to improve submission of work on time.
What is most valuable?
The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup. It integrates extremely well with the Check Point Firewall.
What needs improvement?
A saving password option might save time for continuous disconnection to the server due to internet fluctuation problems.
They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds.
If you don't get on your phone right away and check on your authentications, it will kick you out.
In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems.
The interface needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.
For how long have I used the solution?
I've used the solution for more than three years.
What do I think about the stability of the solution?
The solution's stability is reasonable.
What do I think about the scalability of the solution?
The scalability of the product is reasonable.
How are customer service and technical support?
We've had a satisfactory experience with technical support.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
We used a vendor to set up the solution.
What was our ROI?
We've seen a 100% ROI.
What's my experience with pricing, setup cost, and licensing?
The product is offered at a reasonable cost.
Which other solutions did I evaluate?
We did look at other solutions before choosing this product.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network, Systems and Security Engineer at SOLTEL Group
Easy to configure, versatile and intuitive interface, provides a secure and stable connection
Pros and Cons
- "One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure."
- "When you need to create something, you have to follow many steps and I think that should be simplified."
What is our primary use case?
Check Point Endpoint Remote Access VPN is without a doubt, really fantastic software. It allows me remote and secure access to my most important data, to the company's networks, and to corporate resources from anywhere in the world.
Regardless of where I am, it guarantees the complete privacy of all our confidential information through multifactor authentication and compliance analysis of the endpoint system.
All of this is very easy to configure using step-by-step wizards, and there are many guides to explain it.
How has it helped my organization?
Check Point Remote Access VPN has improved my Organization with:
- It has a built-in, centrally-managed Firewall blade, which allows us to filter traffic on the client-side.
- The built-in, centrally-managed Compliance blade is helpful. Using it, we check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running. It doesn't allow the client to connect to the office in cases where these rules are not satisfied. That prevents infected computers from connecting to the company's location and spreading threats.
- It is easy to install the Endpoint Remote Access VPN client on different platforms.
- It provides a stable VPN connection.
What is most valuable?
One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure. It is compatible with several operating systems, and it has great protection against malware and any other cyber threat that wants to penetrate our endpoints.
It is fully integrated and centralized, which allows me to configure the security policy and view VPN events from a console.
What needs improvement?
Despite being very intuitive, the interface needs improvements. When you need to create something, you have to follow many steps and I think that should be simplified.
For how long have I used the solution?
We've been using Check Point Remote Access VPN for more than two years.
How are customer service and technical support?
I know that if there were any problems, the technical support team would solve them almost immediately. The team is highly qualified.
What other advice do I have?
So far, I have not found any negative characteristics to complain about, since in general, the software works in an excellent way and it has never failed us.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior System Engineer at Thai Transmission Industry
Stable solution but they should strengthen their security features
Pros and Cons
- "The initial set up is not complex."
- "They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
What is our primary use case?
A lot of our clients are complimentary companies, like the electrical company. They need Check Point Remote Access VPN, or even another similar solution. I tell them that I already have the VPN solution in our company.
What needs improvement?
In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.
For how long have I used the solution?
I have been using Check Point for about one year.
What do I think about the stability of the solution?
I have not heard any complaints from the clients regarding its stability. I think it's stable for them.
What do I think about the scalability of the solution?
Not all of our clients who use Check Point VPN are in Thailand. Some government agencies, like the Electric City Company, are in Thailand. They use it formally. Their IT and telecom departments, those who require a secure network, are using it.
How are customer service and technical support?
I have not contacted customer support yet because I take care of any issues from here. That's why I don't have their programming disk because I take care of it myself, including the configuration and the DSL in Check Point.
Which solution did I use previously and why did I switch?
We still use other products.
How was the initial setup?
The initial setup is not complex. Plus, we've got the Kryon system. So these systems make it easier for the user. We have known this product for a while, that's why it's not a problem to configure the system.
What other advice do I have?
I don't have any advice yet.
On a scale of one to ten, I'd give Check Point Remote Access VPN a seven.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Works at MONT Group of Companies
Easy to set up standard authentication, integrates with third-parties, and allows for browser-based access
Pros and Cons
- "Access is browser-based only and requires no additional client installation."
- "We would like to implement HTML5 (clientless access) in the product without installing any additional software."
What is our primary use case?
The Mobile Access VPN is used to provide users with remote access to company resources.
Users can access the system at any time from corporate laptops as well as home PCs.
It is also possible to connect from Android and IOS mobile devices.
We also use the functionality of the secure Capsule Workspace container to securely provide access to corporate Web resources and mailing services from mobile devices.
It is also possible to provide restricted access to partners via SSL VPN using the Check Point Mobile Web Portal fine-tuning.
How has it helped my organization?
This solution allows users to connect from any location. The system is very flexible. We can easily control access and view statistics on the usage of this functionality.
We are also happy with the overall stability of the operation, the easy configuration on the gateway side, and the ease of deploying clients to endstations.
The user device verification functionality allows us to prevent connections if a device does not comply with corporate security policies until the device has met all requirements.
What is most valuable?
When working with different groups of users, we can easily set up both standard authentication by username and password and use two-factor authentication such as SMS + username and password or certificate + username and password. This definitely increases security and allows you to control access.
It is also possible to use third-party tools to customize HTML5 access. For example, the connection is made without the need to install any client on the user side.
Access is browser-based only and requires no additional client installation.
What needs improvement?
We would like to implement HTML5 (clientless access) in the product without installing any additional software.
It would also be desirable to be able to segregate the different authentication methods by domain user group.
Unfortunately at the moment, the division is only between domain and non-domain users.
What we also miss is control over the workstations for non-domain PCs that the client is installed on.
It would be nice if we could block such connections based on, for example, the machine name or connection ID.
For how long have I used the solution?
We have been using this solution since 2007 and started with the R65 version.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Chief Technology Officer at Triana Business Solutions Lda
A secure solution that's reliable and scalable
Pros and Cons
- "The ability to create your trigger data domains is the solution's most valuable feature."
- "The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified."
What is our primary use case?
We primarily use the solution to have a secure connection and to offer security integration with our remote office as well as some other companies.
What is most valuable?
The ability to create your trigger data domains is the solution's most valuable feature.
What needs improvement?
The solution should include the ability to integrate the equipment's functionality with others. For example, we would like Checkpoint to be able to integrate easily to the public key infrastructure. According to Checkpoint, there is no use case for this right now.
The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.
For how long have I used the solution?
I've been using the solution for two years.
What do I think about the scalability of the solution?
The solution has been very scalable for us up until now. Currently, we have two data centers and we are running two Checkpoints for the facility to spread the workload.
How was the initial setup?
The process is mainly straightforward.
We started only with the firewall components and this part was straightforward. Once we started to implement the VPN, we had to work with the reseller. Now, we are handling it ourselves.
What about the implementation team?
We handled the implementation ourselves with the assistance of resellers.
What other advice do I have?
We are using the on-premises deployment model.
Checkpoint is very strong and very reliable. I would advise that those considering implementing the product go to a Checkpoint training session before implementing the solution. It's good to be familiar with the product beforehand.
I'd rate the solution ten out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Enables users to easily work from home
Pros and Cons
- "The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
- "We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
What is our primary use case?
We use Check Point Remote Access VPN to provide access to employees and to the company resources, especially now that most people are working from home. That's the main use. We also use it for specific companies that give us remote support to some applications. They access our company servers and resources. We're using Remote Access VPN with a specific profile for them that only gives access to some.
We have two environments. Our firewalls and our perimeter firewalls are Check Point. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.
How has it helped my organization?
Remote Access VPN allows users to work from home very easily. They are very happy with the way they log in with RSA. That's why we use the Foo. It's very stable. We didn't have any issues.
Compared to Pulse Secure, Check Point saves us a couple of hours a week. It's easier to reverse when we have issues. At the moment, most of our company still uses Pulse Secure. But a year ago, we also started deploying some people on Check Point so that we have another option. If we don't want to renew with Pulse Secure the client says we can migrate everyone to Check Point as we already have some people working on the Check Point VPN. 20% of the company uses the Check Point VPN and the rest uses Pulse Secure, which is our main VPN, which is around 100 people.
What is most valuable?
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.
The integration with two-factor authentication for Remote Access users is another valuable feature. In our case we use RSA.
Those two are the most valuable aspects that we have on the solution. It also gives us the possibility to securely connect to the company resources, without Check Point security measures.
Another good thing we like is that we already have all the logs from the firewall on the SmartPortal as the remote VPN also integrates into the firewall. We can see all the logs on the same tool because we also have a fully secure solution for Remote Access VPN. For full security, we need to manage the different hardware from the firewalls and the logs that are not in the same place. This is another valuable aspect of this solution.
Having access to those logs affects our security operations because if a user calls the support but does not have access to the VPN, we can see on the same tool on the SmartPortal. If he's being blocked on the firewall policy, you can see it with the VPN profile.
If the user is using Foo, we need to go to the Check Point firewall to see the Check Point firewall log on the perimeter firewall, to see if the user is crossing the firewall to get the Foo. Then we need to go to the supplier to see that the logs are there. So we need to go to two places.
What needs improvement?
We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved.
For how long have I used the solution?
I have been using Check Point Remote Access VPN for around one year.
What do I think about the stability of the solution?
We don't have any stability issues.
What do I think about the scalability of the solution?
It is very scalable in a way that we can share the configuration for Remote VPN amongst our perimeter firewall so we can implement the Remote VPN with the same profiles and the same configuration easily on all of them. It's very scalable.
We are still studying the possibility of migrating everyone to Check Point VPN, but a decision has to be made because we still have a lot of people using Pulse Secure.
How are customer service and technical support?
We haven't used technical support specifically for Remote Access VPN. We use it for other products, but not for this one. In general, their support is good, especially if you work with the Israel team. Because of the time zones, we try to call when they are available. The support is usually in. The other ones are also good but in most cases, the Israel team is better.
Which solution did I use previously and why did I switch?
Our team finds that Pulse Security is a bit difficult to configure. It's not very straightforward. We are used to it now. Management is easier on Check Point. Our managers wanted us to have to study some alternatives to Pulse Secure so that if the price was too high, or if we wanted to move to another solution, we would already have an idea about other solutions. We chose Check Point as we already had the firewall. It has worked well until now. We already have some people using the Check Point VPN and we are ready to move everyone.
Pulse Secure was more difficult because of all the things that you need to for the setup. You need to do four or five things to set up a profile and some of them don't make any sense. It's difficult for a person that's never used Pulse to understand the philosophy of the configuration and to create different profiles. It's not very straightforward.
How was the initial setup?
The initial setup was straightforward, especially because we already have the firewall implemented. So we only needed to enable the features and do some configurations, which were not hard to do. They were really fit.
It took two days. We did our own thing. The implementation strategy was to first have only two or three users from the IT team to test it. Then we allowed it to extend to some teams.
What about the implementation team?
Two team members did the deployment.
We require three full-time network security engineers for maintenance. We manage all the solutions on the security side of our company. Specifically Remote Access VPN requires three hours of maintenance a week.
What was our ROI?
The return on investment is that we have a stable VPN solution to provide our employees, which is very important. Especially now with the virus, we have more than 50% of people working from home and using the VPN solutions. Our return on investment is the ability to allow people to work remotely in a secure way and a stable VPN.
What's my experience with pricing, setup cost, and licensing?
As far as I'm aware, Check Point is on the same line of pricing with Pulse at the moment. It's not any different. It is in line with the competition. There are no additional costs that I'm aware of.
What other advice do I have?
It's not hard to deploy the solution. Remote Access VPN is easier to deploy than some other solutions like Pulse Secure.
If you already have a Check Point firewall, this remote solution is a win-win because you don't need to buy, manage, or do a hardware refresh when you enter the end of life. You will have centralized logs on the same tools. If you have a Check Point firewall, this solution is the best for you.
I would rate Check Point Remote Access VPN a nine out of ten.
It works very well. I would say it's almost the perfect solution. As far as I'm aware, it's one of the oldest solutions from Check Point. So it's very, very stable. They have a lot of years of working with it.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Popular Comparisons
Microsoft Intune
Microsoft Remote Desktop Services
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
Claroty Platform
F5 BIG-IP Access Policy Manager (APM)
TeamViewer Tensor
Rocket Exceed TurboX
BeyondTrust Privileged Remote Access
BeyondTrust Remote Support
VNC Connect
LogMeIn Rescue
Parallels Access
Apache Guacamole
ConnectWise ScreenConnect
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices