Try our new research platform with insights from 80,000+ expert users
reviewer1232001 - PeerSpot reviewer
IT Tech Security Management at a logistics company with 1,001-5,000 employees
Real User
Simple management, quick search capabilities, and very good stability
Pros and Cons
  • "The management of the solution is very simple. It allows for a single view of all the endpoints."
  • "I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."

What is most valuable?

The differentiator for this solution is the management interface that we find very good and provides a single view for all endpoints. The solution offers SmartLog that allows quick searches. The compliance modules are also very interesting.

What needs improvement?

I cannot see the full effect of the antibot solution because it relies on having access to the DNS queries, which might not go through the Check Point firewall when you're using it for perimeter networks. In this case Check Point will not identify the actual source of the DNS queries associated with antibot activity. This may be related to the customer architecture, however, and not due to product limitation. I don't know if it can be improved on the Check Point side or not.

The solution should allow for the automatic identification of destinations. 

We have a URL qualification on the on-premises deployment model; this should also be the case on the cloud. The automatic classification should be done by the cloud team instead of having to specify or subscribe to a RSS for the information, we should be able to have an object that represents such cloud services. It's possible that Check Point already allows for this, but if they don't they should.

For how long have I used the solution?

We've been using the solution for about 20 years.

What do I think about the stability of the solution?

The solution is very stable.

Buyer's Guide
Check Point Remote Access VPN
February 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

What do I think about the scalability of the solution?

The stability depends on the setup. If the solution resides on a specific appliance, it is not scalable. It has a fixed capacity. However, if you move it onto different environments, cloud environments, it will become scalable. Right now, we have about 4,000 users in the current network and about 500 remote access users.

How are customer service and support?

Technical support is reasonable. It depends on the level of support you are willing to pay for, however. You can choose to have a company working for you with intermediate support with Check Point, or you can choose to have direct advanced support.

How was the initial setup?

The initial setup has a moderate amount of complexity. It's acceptable. However, the graphical display of the user chart of network usage, and the ability to zero in on the current graphics could be improved.

What other advice do I have?

We currently only use the on-premises deployment model, although we may extend into the cloud in the future. We're aware of the cloud's capabilities, but we're not using it because we don't have a large infrastructure expression there.

In terms of advice, I'd suggest that others implementing the solution make sure training happens on their teams. Most products can have lots of features, but if you do not have proper knowledge, you will not be able to make use of those features.

I'm very satisfied with this solution; I'd rate it eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1777347 - PeerSpot reviewer
System Analyst at IIT Gandhinagar
User
Easy off-site access, offers increased productivity, and works seamlessly on Windows/Mac
Pros and Cons
  • "Once we install and connect the VPN service, it keeps on running until we disconnect."
  • "The Linux version may have an app (similar to Windows) instead of a shell script."

What is our primary use case?

The primary use case of this solution is to connect to our internal network for accessing servers and clusters using Check Point VPN. End-users are, for example, students accessing computer labs and licensed software that can check academic licenses only within the campus network; further, our ERP folks could make good use of the VPN solution by remotely working on the Institute Management System infrastructure and can work efficiently without any hindrance. We also use its capsule app on smartphones to connect further.

How has it helped my organization?

Using Check Point Remote Access VPN has increased the overall productivity for users staying outside the campus and working remotely during this Covid-19 period. Faculty, students, staff, and research fellows as well as a lot of other eligible users have been benefited by securing the VPN license in order to run login remotely and access the project workstations, clusters, run simulations and submit their research work for the final thesis defense. It also allows for publishing in high-impact factor journals.

What is most valuable?

Once we install and connect the VPN service, it keeps on running until we disconnect. Moreover, the best outcome is when the end-users are able to check out software licenses through the tunnel and keep on working remotely from their home without any interruption. 

The VPN service works seamlessly in Windows and Mac. Only in the case of Linux or Ubuntu have we had to struggle a bit by understanding the SNX Batch file to get installed and run it. Moreover, in Windows and Apple systems the app is running on the system tray whereas in Linux we have to keep the Terminal Window Open.

What needs improvement?

The Linux version may have an app (similar to Windows) instead of a shell script. We have seen that in Windows and Apple systems the app is running on the system tray whereas in Linux we have to keep the Linux Terminal Window open otherwise the connection drops. Sometimes, we have noticed that the owing to installation of various antivirus and running of inbuilt firewalls (applicable to all operating systems); the connection for VPN sporadically drops and tries to reconnect. When this happens, we have to manually either disable the firewall/antivirus or reconnect the VPN again.

For how long have I used the solution?

We've used the solution since 2015 or 2016.

Which solution did I use previously and why did I switch?

We were using Cyberoam.

What's my experience with pricing, setup cost, and licensing?

Users must pursue Proof of Concept as the functional requirements can vary.

Which other solutions did I evaluate?

We also looked into Palo Alto and Fortinet.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
February 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
reviewer1662831 - PeerSpot reviewer
Accounts Administrator at a non-profit with 51-200 employees
User
Easy to install, stable, and reasonably priced
Pros and Cons
  • "The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup."
  • "They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds."

What is our primary use case?

It allows staff to work from home, especially now during COVID-19. You can access it from any location, and it does not require technical knowledge. 

How has it helped my organization?

If any problem occurs, we are unable to work. An access to VPN enabled organization needs to improve by way of getting work done from any location in order to improve submission of work on time.

What is most valuable?

The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup. It integrates extremely well with the Check Point Firewall.

What needs improvement?

A saving password option might save time for continuous disconnection to the server due to internet fluctuation problems. 

They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds. 

If you don't get on your phone right away and check on your authentications, it will kick you out. 

In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems. 

The interface needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.

For how long have I used the solution?

I've used the solution for more than three years.

What do I think about the stability of the solution?

The solution's stability is reasonable.

What do I think about the scalability of the solution?

The scalability of the product is reasonable.

How are customer service and technical support?

We've had a satisfactory experience with technical support.

Which solution did I use previously and why did I switch?

We did not previously use a different solution.

How was the initial setup?

The initial setup is straightforward.

What about the implementation team?

We used a vendor to set up the solution. 

What was our ROI?

We've seen a 100% ROI.

What's my experience with pricing, setup cost, and licensing?

The product is offered at a reasonable cost.

Which other solutions did I evaluate?

We did look at other solutions before choosing this product. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1536681 - PeerSpot reviewer
Network, Systems and Security Engineer at SOLTEL Group
Real User
Easy to configure, versatile and intuitive interface, provides a secure and stable connection
Pros and Cons
  • "One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure."
  • "When you need to create something, you have to follow many steps and I think that should be simplified."

What is our primary use case?

Check Point Endpoint Remote Access VPN is without a doubt, really fantastic software. It allows me remote and secure access to my most important data, to the company's networks, and to corporate resources from anywhere in the world.

Regardless of where I am, it guarantees the complete privacy of all our confidential information through multifactor authentication and compliance analysis of the endpoint system.

All of this is very easy to configure using step-by-step wizards, and there are many guides to explain it.

How has it helped my organization?

Check Point Remote Access VPN has improved my Organization with:

  • It has a built-in, centrally-managed Firewall blade, which allows us to filter traffic on the client-side.
  • The built-in, centrally-managed Compliance blade is helpful. Using it, we check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running. It doesn't allow the client to connect to the office in cases where these rules are not satisfied. That prevents infected computers from connecting to the company's location and spreading threats.
  • It is easy to install the Endpoint Remote Access VPN client on different platforms.
  • It provides a stable VPN connection.

What is most valuable?

One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure. It is compatible with several operating systems, and it has great protection against malware and any other cyber threat that wants to penetrate our endpoints.

It is fully integrated and centralized, which allows me to configure the security policy and view VPN events from a console.

What needs improvement?

Despite being very intuitive, the interface needs improvements. When you need to create something, you have to follow many steps and I think that should be simplified.

For how long have I used the solution?

We've been using Check Point Remote Access VPN for more than two years.

How are customer service and technical support?

I know that if there were any problems, the technical support team would solve them almost immediately. The team is highly qualified.

What other advice do I have?

So far, I have not found any negative characteristics to complain about, since in general, the software works in an excellent way and it has never failed us.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Senior System Engineer at Thai Transmission Industry
Real User
Stable solution but they should strengthen their security features
Pros and Cons
  • "The initial set up is not complex."
  • "They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."

What is our primary use case?

A lot of our clients are complimentary companies, like the electrical company. They need Check Point Remote Access VPN, or even another similar solution. I tell them that I already have the VPN solution in our company.

What needs improvement?

In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.

For how long have I used the solution?

I have been using Check Point for about one year.

What do I think about the stability of the solution?

I have not heard any complaints from the clients regarding its stability. I think it's stable for them.

What do I think about the scalability of the solution?

Not all of our clients who use Check Point VPN are in Thailand. Some government agencies, like the Electric City Company, are in Thailand. They use it formally. Their IT and telecom departments, those who require a secure network, are using it.

How are customer service and technical support?

I have not contacted customer support yet because I take care of any issues from here. That's why I don't have their programming disk because I take care of it myself, including the configuration and the DSL in Check Point.

Which solution did I use previously and why did I switch?

We still use other products.

How was the initial setup?

The initial setup is not complex. Plus, we've got the Kryon system. So these systems make it easier for the user. We have known this product for a while, that's why it's not a problem to configure the system.

What other advice do I have?

I don't have any advice yet.

On a scale of one to ten, I'd give Check Point Remote Access VPN a seven.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Head of IT Department at AS Attīstības finanšu institūcija Altum
Real User
Top 5
Customizable, and secure, but has poor technical support
Pros and Cons
  • "The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
  • "The provisioning of VPN users has room for improvement."

What is our primary use case?

We use Check PointVPN to securely connect to our main office systems, which are behind a firewall. This ensures that all incoming and outgoing traffic is encrypted and secure.

What is most valuable?

The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature.

What needs improvement?

The provisioning of VPN users has room for improvement.

The solution can improve by providing an option to centrally manage and upgrade client applications on a PC.

For how long have I used the solution?

I have been using the solution for five years.

What do I think about the stability of the solution?

We found the previous checkpoint version to be quite unstable, as it would occasionally cause issues with the VPN caching every two months. However, we have since updated the solution and the stability has improved significantly, with no further occurrences of this issue.

What do I think about the scalability of the solution?

The solution is licensed-based, so to scale up we only need to add more licenses.

How are customer service and support?

The tech support isn't great. They take a long time to get to our ticket. Their initial response was fast, but after we provided the information they asked for, there was a month of silence before we updated the ticket again. Ultimately, the problem was resolved with newer versions without any response from tech support.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I previously used Mikro Tik VPN which is cheap and includes enterprise features but is hard to configure.

How was the initial setup?

The initial setup is straightforward if we are knowledgeable about the task at hand. However, it is recommended to consider a few things and to have a reliable technical support team to assist with the initial deployment. For a small company, the first step is relatively straightforward. However, if we are looking to scale up, we may need to enlist the help of a consultant to properly configure the necessary parameters, as there are many of them to consider.

Once we have configured users, access lists, written firewall rules, and deployed clients to endpoints, the next step is to educate employees on how to use the solution.

On average the deployment took around two weeks to configure all the certificates. This included preparing laptops and PCs. For just the VPN with central management deployment, it would take one week.

Our deployment was completed by two people.

What's my experience with pricing, setup cost, and licensing?

I give the price of the solution a five out of ten. 

We have a subscription-based license.

What other advice do I have?

I give the solution a seven out of ten.

We have 250 people using the solution in our organization.

Managing updates to endpoints can be a bit of a hassle, but there isn't much maintenance required.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Works at MONT Group of Companies
User
Easy to set up standard authentication, integrates with third-parties, and allows for browser-based access
Pros and Cons
  • "Access is browser-based only and requires no additional client installation."
  • "We would like to implement HTML5 (clientless access) in the product without installing any additional software."

What is our primary use case?

The Mobile Access VPN is used to provide users with remote access to company resources.

Users can access the system at any time from corporate laptops as well as home PCs.

It is also possible to connect from Android and IOS mobile devices.

We also use the functionality of the secure Capsule Workspace container to securely provide access to corporate Web resources and mailing services from mobile devices.

It is also possible to provide restricted access to partners via SSL VPN using the Check Point Mobile Web Portal fine-tuning.

How has it helped my organization?

This solution allows users to connect from any location. The system is very flexible. We can easily control access and view statistics on the usage of this functionality.

We are also happy with the overall stability of the operation, the easy configuration on the gateway side, and the ease of deploying clients to endstations.

The user device verification functionality allows us to prevent connections if a device does not comply with corporate security policies until the device has met all requirements.

What is most valuable?

When working with different groups of users, we can easily set up both standard authentication by username and password and use two-factor authentication such as SMS + username and password or certificate + username and password. This definitely increases security and allows you to control access.

It is also possible to use third-party tools to customize HTML5 access. For example, the connection is made without the need to install any client on the user side.

Access is browser-based only and requires no additional client installation.

What needs improvement?

We would like to implement HTML5 (clientless access) in the product without installing any additional software.

It would also be desirable to be able to segregate the different authentication methods by domain user group.

Unfortunately at the moment, the division is only between domain and non-domain users.

What we also miss is control over the workstations for non-domain PCs that the client is installed on.

It would be nice if we could block such connections based on, for example, the machine name or connection ID.

For how long have I used the solution?

We have been using this solution since 2007 and started with the R65 version.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Adriano-Simao - PeerSpot reviewer
Chief Technology Officer at Triana Business Solutions Lda
Real User
Top 20Leaderboard
A secure solution that's reliable and scalable
Pros and Cons
  • "The ability to create your trigger data domains is the solution's most valuable feature."
  • "The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified."

What is our primary use case?

We primarily use the solution to have a secure connection and to offer security integration with our remote office as well as some other companies.

What is most valuable?

The ability to create your trigger data domains is the solution's most valuable feature.

What needs improvement?

The solution should include the ability to integrate the equipment's functionality with others. For example, we would like Checkpoint to be able to integrate easily to the public key infrastructure. According to Checkpoint, there is no use case for this right now. 

The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified. 

For how long have I used the solution?

I've been using the solution for two years.

What do I think about the scalability of the solution?

The solution has been very scalable for us up until now. Currently, we have two data centers and we are running two Checkpoints for the facility to spread the workload.

How was the initial setup?

The process is mainly straightforward. 

We started only with the firewall components and this part was straightforward. Once we started to implement the VPN, we had to work with the reseller. Now, we are handling it ourselves.

What about the implementation team?

We handled the implementation ourselves with the assistance of resellers.

What other advice do I have?

We are using the on-premises deployment model.

Checkpoint is very strong and very reliable. I would advise that those considering implementing the product go to a Checkpoint training session before implementing the solution. It's good to be familiar with the product beforehand.

I'd rate the solution ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.