Try our new research platform with insights from 80,000+ expert users

BeyondTrust Privileged Remote Access vs Check Point Remote Access VPN comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 7, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Customer Service

Sentiment score
6.6
Microsoft Intune support experiences vary, with premium users satisfied, others facing delays, and mixed effectiveness of support staff.
No sentiment score available
Sentiment score
6.7
Check Point Remote Access VPN support is praised for responsiveness and expertise, with high satisfaction rates despite varied response times.
 

Room For Improvement

Sentiment score
4.4
Microsoft Intune faces challenges in reporting, cross-platform support, policy configurations, interface complexity, costs, and macOS management.
No sentiment score available
Sentiment score
4.9
Check Point Remote Access VPN needs improved interface, deployment, security, scalability, multi-platform support, and better documentation for seamless integration.
If my organization has sensitive data we don't want to leak, deploying the policies can present technical challenges and potential loopholes.
 

Scalability Issues

Sentiment score
8.0
Microsoft Intune is praised for its scalability and adaptability, supporting various organizational sizes with seamless device management.
No sentiment score available
Sentiment score
7.4
Check Point Remote Access VPN is scalable and flexible for diverse environments, seamlessly supporting large and expanding user bases.
 

Setup Cost

Sentiment score
7.5
Enterprises find Microsoft Intune competitively priced and cost-effective, especially when bundled with other Microsoft services in agreements.
No sentiment score available
Sentiment score
7.5
Check Point Remote Access VPN offers competitive pricing and flexible licensing with potential discounts for existing customers.
 

Stability Issues

Sentiment score
7.9
Microsoft Intune is highly reliable, with minimal issues and high user satisfaction due to regular updates and strong infrastructure.
No sentiment score available
Sentiment score
5.7
Check Point Remote Access VPN is highly stable and reliable, with improvements minimizing connectivity issues for Windows and macOS users.
 

Valuable Features

Sentiment score
8.0
Microsoft Intune excels with seamless Azure integration, strong security, centralized management, enhancing productivity and cost-effective remote device management.
No sentiment score available
Sentiment score
8.0
Check Point Remote Access VPN offers secure, user-friendly remote access with strong encryption, multi-factor authentication, and easy deployment.
Autopilot allows bulk enrollment of devices, making it easy for end users, even those without technical expertise, to use their devices immediately.
 

Categories and Ranking

Microsoft Intune
Sponsored
Ranking in Remote Access
1st
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
210
Ranking in other categories
Configuration Management (2nd), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
BeyondTrust Privileged Remo...
Ranking in Remote Access
9th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
21
Ranking in other categories
Privileged Access Management (PAM) (9th)
Check Point Remote Access VPN
Ranking in Remote Access
6th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
67
Ranking in other categories
Enterprise Infrastructure VPN (6th)
 

Featured Reviews

Gaurav Chandola - PeerSpot reviewer
We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy
Intune has many benefits from the Microsoft perspective. This solution can manage Windows 10 devices, app management, and provide security solutions. We don't need to worry about our network connection, and we'll be more secure with regular security patches and compliance. Since everything will be deployed through the internet and users will log in using the internet only, the risks have been mitigated. Security updates, security patching, and the application will be targeted from Intune. The location tracker will be available to track where the device is and the user's location. The user will be restricted from accessing certain applications using compliance policies. Conditional access policies will be based on the reason why the user needs access to the application. Microsoft Intune is one of the best products in the industry for managing Windows devices. The solution has more feature restrictions. The conditional access policies also eliminate the dependency on the on-prem network for the devices. The solution also manages our security settings and a lot of other beneficial features such as Microsoft Purview which gives us the compliance portion. We can manage all aspects of our device from a single console, including M365 services. This allows us to configure data classification types, such as public, private, internal, confidential, and highly confidential.
Sean Rall - PeerSpot reviewer
Our support team can do so much more without having to actively engage our customers, which saves us time and money
In recent days, the most valuable feature would be the Vault. Overall, the most valuable feature would be that ability to do remote support. Vault does a good job of providing visibility for domain accounts, endpoints, and local accounts associated with discovery jobs. The report tools are very robust. I know they have their report tools that you can filter through, which also give you access to the data. So, if you ever want to just do a data dump and your own analytics on it, then you could, which is really nice. We also integrate with the API for reports, which is really nice as well.
Ozan Durmus - PeerSpot reviewer
Is easy to use and has a nice interface, but the scalability needs to improve
The deployment takes around two to three hours. If you manage the product, one person could be enough, but if you need some kind of additional integrations like ADA integration, you need someone from ADT to access products. One person is enough, but one or two additional personnel may be included. To deploy Check Point Remote Access VPN, you must purchase a license, enable the blade, and purchase client access licenses. You can then follow the instructions to deploy the product, write the necessary rules, make the integrations, deploy the agent to the clients, and provide them with a login solution. I rate the initial setup an eight on a scale of ten, where one is difficult, and ten is easy.
report
Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
26%
Computer Software Company
11%
Financial Services Firm
7%
Government
7%
Computer Software Company
18%
Financial Services Firm
12%
Manufacturing Company
9%
Government
8%
Computer Software Company
14%
Financial Services Firm
9%
Manufacturing Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
What do you like most about BeyondTrust Privileged Remote Access?
The product has improved remote support capabilities since it works fine.
What needs improvement with BeyondTrust Privileged Remote Access?
The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it a...
What is your primary use case for BeyondTrust Privileged Remote Access?
I use the tool in my lab. I am involved in the product's testing phase in my lab, where I am trying to check out the ...
What needs improvement with Check Point Endpoint Remote Access VPN?
There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients. Another downsid...
What is your primary use case for Check Point Endpoint Remote Access VPN?
For remote work, Check Point Remote Access VPN connects, creates the site, and gathers information about the site in ...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
Bomgar Privileged Access
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
Horizon Beverage, Air Liquide, Gateway Bank of Florida
Osmose, International Fund for Animal Welfare (IFAW)
Find out what your peers are saying about BeyondTrust Privileged Remote Access vs. Check Point Remote Access VPN and other solutions. Updated: October 2024.
816,406 professionals have used our research since 2012.