Try our new research platform with insights from 80,000+ expert users

BeyondTrust Privileged Remote Access vs Check Point Remote Access VPN comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 7, 2024
 

Categories and Ranking

Microsoft Intune
Sponsored
Ranking in Remote Access
1st
Average Rating
8.2
Reviews Sentiment
7.3
Number of Reviews
233
Ranking in other categories
Configuration Management (2nd), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
BeyondTrust Privileged Remo...
Ranking in Remote Access
9th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
22
Ranking in other categories
Privileged Access Management (PAM) (9th)
Check Point Remote Access VPN
Ranking in Remote Access
6th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
67
Ranking in other categories
Enterprise Infrastructure VPN (6th)
 

Featured Reviews

Gaurav Chandola - PeerSpot reviewer
We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy
Intune has many benefits from the Microsoft perspective. This solution can manage Windows 10 devices, app management, and provide security solutions. We don't need to worry about our network connection, and we'll be more secure with regular security patches and compliance. Since everything will be deployed through the internet and users will log in using the internet only, the risks have been mitigated. Security updates, security patching, and the application will be targeted from Intune. The location tracker will be available to track where the device is and the user's location. The user will be restricted from accessing certain applications using compliance policies. Conditional access policies will be based on the reason why the user needs access to the application. Microsoft Intune is one of the best products in the industry for managing Windows devices. The solution has more feature restrictions. The conditional access policies also eliminate the dependency on the on-prem network for the devices. The solution also manages our security settings and a lot of other beneficial features such as Microsoft Purview which gives us the compliance portion. We can manage all aspects of our device from a single console, including M365 services. This allows us to configure data classification types, such as public, private, internal, confidential, and highly confidential.
Sean Rall - PeerSpot reviewer
Our support team can do so much more without having to actively engage our customers, which saves us time and money
In recent days, the most valuable feature would be the Vault. Overall, the most valuable feature would be that ability to do remote support. Vault does a good job of providing visibility for domain accounts, endpoints, and local accounts associated with discovery jobs. The report tools are very robust. I know they have their report tools that you can filter through, which also give you access to the data. So, if you ever want to just do a data dump and your own analytics on it, then you could, which is really nice. We also integrate with the API for reports, which is really nice as well.
Ozan Durmus - PeerSpot reviewer
Is easy to use and has a nice interface, but the scalability needs to improve
The deployment takes around two to three hours. If you manage the product, one person could be enough, but if you need some kind of additional integrations like ADA integration, you need someone from ADT to access products. One person is enough, but one or two additional personnel may be included. To deploy Check Point Remote Access VPN, you must purchase a license, enable the blade, and purchase client access licenses. You can then follow the instructions to deploy the product, write the necessary rules, make the integrations, deploy the agent to the clients, and provide them with a login solution. I rate the initial setup an eight on a scale of ten, where one is difficult, and ten is easy.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The overall user experience is quite nice. I have no complaints from end users regarding their devices enrolled in Intune."
"It works well if you have a Microsoft environment."
"In terms of technical support, you will get an immediate response."
"Among the most valuable features are the Company Portal that is built into Intune, and the update rings so that we can manage what types of future updates the devices get."
"The most valuable feature for us is the security, including risk analysis and patch management."
"We can manage and standardize security across your environment, identify problems, receive alerts, and so on. That's its purpose, and that's also why it's so good."
"It is helpful for managing devices anytime and any place without requiring dependency on the local networks."
"The most valuable features are the ones that make sure that the deployment is of a standard operating system and the Zero Touch deployment, which is very useful. This allows users to have an out of box experience."
"One of the features that I really like about it is the ability to set a start date, time, and end date for the access. For example, you can set the access for a person from tomorrow, Monday, or Tuesday and ending on a specific period of the day or a specific date. That's really quite helpful."
"Based on the feedback from my colleagues who have never complained about the technical support, I would say that the product's support team is good."
"Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that."
"I'd rate the solution ten out of ten."
"PRA stands on its own as a full solution. This is important because it reduces the need to maintain a lot of different services. Also, the integration between those services are sometimes not easy to maintain. So, having a solution like BeyondTrust Privileged Remote Access reducing our workload gives us enough time to work on our other issues. The system just runs and does what it is supposed to do."
"The visibility of the solution's Vault works as it is supposed to: out-of-the-box for domain accounts, endpoints, and local accounts associated with discovery jobs."
"The security provided by PRA when it comes to access for remote and privileged users has been outstanding. It has met all of our objectives, everything from password rotation to securing and allowing us to clamp down access to the auditing and monitoring features."
"We can truly elevate our admin rights while we're in there to fully take control of a system and manage it as if it was sitting right here on our desk. Most of the organization has gone to remote work or work from home. With that being the case, this solution allows us to be able to still work with our end-users, even though they're not always sitting on our network."
"The solution has been solid for me for over five years."
"Access is browser-based only and requires no additional client installation."
"It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents."
"The solution implemented in the cloud allows us to easily scale in cases of user increase."
"The most valuable point is that it provides multi-factor authentication (MFA), which increases security by requiring an add-on verification method and ensures that only authorized users have access to the network."
"Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
"Setting policies allow, block, and limit users' access."
"The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
 

Cons

"The synchronization could be improved."
"I'd suggest adding more features for macOS in Intune. There should be more functionality for managing macOS. There should be a better capability for pushing things down on macOS. Currently, Intune is not capable of managing macOS at the same level as Windows."
"It would be great if Intune offered better data protection controls for BYOD Windows PCs."
"Intune's server management could be better. If it could incorporate more features from System Center into Intune's Configuration Manager, it would be beneficial."
"Microsoft needs to enhance device-level security, as sometimes when using Microsoft Intune, the device's operating system becomes stuck and requires a full uninstall to remove the Intune bug."
"Some enrollment features could be improved."
"Intune could add more Linux security features and more integration with on-prem devices. The application deployments can also be improved."
"We've faced significant pushback with Copilot as our clients aren't seeing a favorable cost-benefit analysis."
"Some of the capabilities in the solution were not as available or not as outstanding as CyberArk. We had to manage whatever little was available for us, especially its recording capabilities, logs, and a number of things."
"It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution."
"The integration of the solution with many platforms is a difficult area to manage and needs to be made easy."
"Multiple areas can be improved. We've seen lots of updates in the past year. They have a portal where we can submit our ideas. BeyondTrust is immediately implementing user suggestions. The UI could be more informative. Initially, there were two or three connectors, and now we have five or six. It would be nice if they added a few more connectors for third-party integration. There are multiple tools, but the clients may require more for their convenience."
"The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully."
"Changing your password should be simplified, and there should not be a charge for it."
"The integration client, backup solution, and SSO setup and provisioning could be improved. There isn't any documented or supported user provisioning currently, which slows down the processes of onboarding and assigning permissions. I would like to see this improved soon."
"At the moment, I don't see any major problems with it. If anything, they can just change the look and feel of the login screen because it looks too simple to me. It does not have so much information. When you get to the login screen of the solution, you should have more information. We also have BeyondTrust Remote Support, and the login page looks similar to BeyondTrust Privilege Remote Access. I would love to see more rich information on the login screen or landing page so that rather than having a regular sign-in screen or page where you just provide a username and password and get into the solution, you should have more insight into what the solution does. I've mentioned this to them every time I have had an opportunity."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
"We would like to implement HTML5 (clientless access) in the product without installing any additional software."
"It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices."
"Connection of devices from various locations is efficient though there are a few challenges when there is a network failure."
"We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
"The Linux version may have an app (similar to Windows) instead of a shell script."
"This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity."
"Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."
 

Pricing and Cost Advice

"Intune is moderately expensive. You can get the license bundled with Office 365 E3 or E5 licenses. The E5s are a bit expensive, but you get some cheaper solutions with Intune."
"With our standard E5 agreement with Microsoft, there have been no pricing concerns. Introductory professional services, like a fast-track service, were included with our E5 membership, and there have been no additional costs."
"Intune comes with the licensing that is common for large organizations. However, Microsoft has recently released many add-ons that are very expensive, especially for large organizations or corporations."
"The product is offered as part of a Microsoft standard bundle. The pricing can be competitive to Airwatch, and Maas360."
"Intune's pricing is reasonable considering its benefits and the high costs it helps avoid."
"We have the business premium licenses for the solution."
"It is not expensive."
"Our Office 365 Business Premium license, including Office 365 and Intune Management, offers excellent value."
"My client found the solution a bit expensive but considering their use case and requirements, they didn't have any other choice. As far as I know, implementation and licensing are the only costs."
"Don't get into a situation where you are licensing per desktop or per person until you fully understand the licensing."
"Though the solution was a bit expensive, the overall pricing was average."
"I rate the product's pricing a four on a scale of one to ten, where one is high, and ten is low. It is an expensive product."
"PRA was one of the cheapest solutions that we evaluated."
"I wasn't directly involved in the licensing and pricing, but I can say that PRA is licensed per endpoint added to the Vault. I would advise users to take frequent exports of their license usage package; it's a simple feature that provides a spreadsheet of every machine in the Vault. This helps to cut down on duplicate licenses, which can happen by adding the same endpoint using an IP address and a fully qualified domain name, for instance. The implementation is an additional cost, and they offer several tiers, so the price varies. There are also some optional add-ons, so I would advise people to research the product well and find out precisely what they need regarding features. The Advanced Web Access add-on provides some required functionality when interfacing with websites; that's one to consider."
"The price is pretty expensive, but you get what you pay for and this is a great product."
"I wish it was a little bit cheaper, but when a product is as solid as this, I understand what the cost does. It helps them to make sure it stays that way. If you want a reliable, solid product, you're going to pay more."
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."
"Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."
"The product is expensive. I rate its pricing a ten out of ten. For the cost of one product, we could purchase two or three Fortinet solutions with the same amount of money."
"There is a license required for this solution."
"I give the price of the solution a five out of ten."
"Check Point Remote Access VPN is not expensive and the cost is annual."
"The price of this product is good."
"My company makes yearly payments only towards the licensing costs attached to Check Point Remote Access VPN, as there are no extra costs attached to the product."
report
Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
26%
Computer Software Company
11%
Financial Services Firm
7%
Government
7%
Computer Software Company
19%
Financial Services Firm
11%
Manufacturing Company
10%
Government
9%
Computer Software Company
13%
Financial Services Firm
9%
Manufacturing Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
What do you like most about BeyondTrust Privileged Remote Access?
The product has improved remote support capabilities since it works fine.
What needs improvement with BeyondTrust Privileged Remote Access?
The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it a...
What is your primary use case for BeyondTrust Privileged Remote Access?
I use the tool in my lab. I am involved in the product's testing phase in my lab, where I am trying to check out the ...
What needs improvement with Check Point Endpoint Remote Access VPN?
There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients. Another downsid...
What is your primary use case for Check Point Endpoint Remote Access VPN?
For remote work, Check Point Remote Access VPN connects, creates the site, and gathers information about the site in ...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
Bomgar Privileged Access
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
Horizon Beverage, Air Liquide, Gateway Bank of Florida
Osmose, International Fund for Animal Welfare (IFAW)
Find out what your peers are saying about BeyondTrust Privileged Remote Access vs. Check Point Remote Access VPN and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.