Try our new research platform with insights from 80,000+ expert users

BeyondTrust Remote Support vs Check Point Remote Access VPN comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 7, 2024
 

Categories and Ranking

Microsoft Intune
Sponsored
Ranking in Remote Access
1st
Average Rating
8.2
Reviews Sentiment
7.3
Number of Reviews
233
Ranking in other categories
Configuration Management (2nd), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
BeyondTrust Remote Support
Ranking in Remote Access
19th
Average Rating
9.0
Reviews Sentiment
6.9
Number of Reviews
32
Ranking in other categories
Privileged Access Management (PAM) (21st)
Check Point Remote Access VPN
Ranking in Remote Access
6th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
67
Ranking in other categories
Enterprise Infrastructure VPN (6th)
 

Featured Reviews

Gaurav Chandola - PeerSpot reviewer
We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy
Intune has many benefits from the Microsoft perspective. This solution can manage Windows 10 devices, app management, and provide security solutions. We don't need to worry about our network connection, and we'll be more secure with regular security patches and compliance. Since everything will be deployed through the internet and users will log in using the internet only, the risks have been mitigated. Security updates, security patching, and the application will be targeted from Intune. The location tracker will be available to track where the device is and the user's location. The user will be restricted from accessing certain applications using compliance policies. Conditional access policies will be based on the reason why the user needs access to the application. Microsoft Intune is one of the best products in the industry for managing Windows devices. The solution has more feature restrictions. The conditional access policies also eliminate the dependency on the on-prem network for the devices. The solution also manages our security settings and a lot of other beneficial features such as Microsoft Purview which gives us the compliance portion. We can manage all aspects of our device from a single console, including M365 services. This allows us to configure data classification types, such as public, private, internal, confidential, and highly confidential.
Justin Glasscock - PeerSpot reviewer
You can connect to a system without end-user interaction.
I would say setting up the cloud version was fairly straightforward. BeyondTrust stood up the application and then handed it over just kind of blank, the company at the time did not want to pay the implementation cost. So integrated it with Azure for single sign on, set up the group policies, I would say it was pretty straightforward. So it was kind of an ongoing. Once we got the initials set up and core administrators that would be using the tool set up with local accounts, it did become a more back burner task. I was able to work on it as I was had free time from other tasks. I would say really getting it to the basic usability point of being able to log in on the tool and to be able to connect and help somebody was within a couple hours and then developing the customizations, client deployment installations via group policy, transitioning from using local accounts to Azure AD accounts. If able to tackle in one sitting, probably would've been a few days, but since it was using more free time from other tasks, it was an ongoing process that took weeks and even into a couple of months to kind of get to a very nice deployment flow where everything was set up and easily usable and easy to onboard somebody else into the tool. Just one person really. Just me.
Ozan Durmus - PeerSpot reviewer
Is easy to use and has a nice interface, but the scalability needs to improve
The deployment takes around two to three hours. If you manage the product, one person could be enough, but if you need some kind of additional integrations like ADA integration, you need someone from ADT to access products. One person is enough, but one or two additional personnel may be included. To deploy Check Point Remote Access VPN, you must purchase a license, enable the blade, and purchase client access licenses. You can then follow the instructions to deploy the product, write the necessary rules, make the integrations, deploy the agent to the clients, and provide them with a login solution. I rate the initial setup an eight on a scale of ten, where one is difficult, and ten is easy.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is a stable solution."
"I would rate the stability of Microsoft Intune nine out of ten."
"Intune simplifies compliance. The ability to manage software updates and policies on endpoints has helped us meet contract requirements."
"Microsoft Intune is very stable due to its cloud-based infrastructure and its reliability in performance."
"Implementing Microsoft Intune has provided a more streamlined and consistent method for device management across our multiple domains, effectively consolidating our administrative efforts."
"There are no complaints about the stability. It works one hundred percent of the time."
"Microsoft Intune is easy to use, and it is able to enforce policies towards multiple devices. It is able to bring multiple classes of devices into the same security posture. I found that very useful."
"The biggest asset is the range of device management options available with Intune, whether it is a Windows device, a Linux device, a Mac device, or mobile devices."
"The remote reboot feature is particularly valuable for rebooting terminal servers that have power controls disabled."
"Remote Support 16.2 introduced Web Interface for Representative Console.with same functions as Desktop Console."
"It has allowed us to quickly address the needs and issues of our end users."
"One of the largest values that we get from Bomgar Remote Support tool is the ability to assist our drivers with their mobile devices. We were unable to do this previously."
"Solution has a good UI."
"It has a straightforward setup. Bomgar has created a simple, lightweight deployment process."
"Bomgar has allowed our service desk (based in India) and our other support personnel based in the US to seamlessly support our users worldwide."
"The solution is stable."
"The product's initial setup phase was easy."
"The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
"The solution implemented in the cloud allows us to easily scale in cases of user increase."
"Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
"The policies are easy to use."
"The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
"The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out."
"The ability to create your trigger data domains is the solution's most valuable feature."
 

Cons

"There is room for improvement, particularly in terms of compatibility, extending beyond the well-known major brands."
"Once it's configured it is unobtrusive, but it does take some hands-on to configure and deploy it properly."
"The mobile management is good for iPhone and iPad, but the Apple Mac management needs improvement. That is probably because Microsoft does not have low-level access to Apple Mac hardware. If you are doing basic things, it is okay, but if you want to image Apple Macs and do things like that, then Jamf is much better."
"I want more secure, reliable, and efficient security policies."
"Historically, Group Policy has simplified the management of various items, such as printer and drive mappings and while Intune offers workarounds, it lacks native support for these functionalities. This is an area I believe needs improvement."
"The initial setup is a little bit complex."
"It would be great to see on-premises mailboxes and for the solution to have geofencing capabilities."
"Intune is not the most user-friendly mobile device management platform available."
"It needs better Linux support. We have had issues with Ubuntu specifically."
"It is expensive. Its initial setup was also a little bit involved, but it was nothing that we couldn't eventually handle. Currently, it has the ability to share screens. Somebody having an issue with their phone can share their screen with a technician sitting at a computer. It would be nice to also be able to control phones remotely, but this could be a limitation of a phone's operating system."
"I would have picked an internal team member who was going to stay on the team for more time. Shortly after we went live, we had a change of staff and lost the main implementer."
"It could be more compatible with other applications. We had trouble with compatibility when it came to Entrust. This is because we had issues with Windows machines when we installed Entrust."
"The ability to connect mobile devices could be improved. Smartphones and tablets are becoming more prevalent throughout corporate environments. From time to time, we have problems connecting to those devices. You can't stage the application to connect without a user's input. You had to guide them through enabling permissions for the app. Then they need to enter the URL and session key. It would be great if they could streamline that process."
"The chat needs to improve. We need to enable set hours for chat support which are separate from the remote support assistance."
"The screen annotation tools could be expanded. I would like to see a text/typing annotation tool."
"The Remote support solution based on Bomgar has physical appliances deployed and leveraged to serve our multiple customers. Aging appliances are going RMA now and then."
"The main area for improvement is pricing. Another area could be integrating MFA authentication directly into the solution instead of using separate benchmark tools for implementation."
"Sometimes the application slows down the computing device, and this affects workflows."
"The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
"Bug Fixes and enhancement requests should be remediated earlier."
"You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable MEP function is not so easy to size the gateway licenses."
"Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."
"There was complexity in the initial setup."
"This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity."
 

Pricing and Cost Advice

"Microsoft's licensing is more flexible and adaptive than its competitors."
"The pricing is good because customers are not complaining about it."
"The pricing for Microsoft Intune is reasonable. Our clients are satisfied."
"Microsoft Intune's costliness stems from licensing fees and the overhead associated with its management, user experience, and device remediation."
"The pricing is inherently reasonable, as Microsoft leverages market insights to maintain the total cost of ownership at around ninety to ninety-five percent of what would be incurred in an on-premise scenario."
"The cost of the license and the features are justified for myself as a technical person."
"Intune is linked with Microsoft. We can deploy the Microsoft E365 license to users by Intune. There are different types of licenses, such as device administrator licenses, E5 licenses for device enrollment manually, and P1 and p2 licenses for device enrollment automatically. These are the licenses required for the administration."
"No one can compete with Microsoft when it comes to price, and the features it is offering."
"The licensing is concurrent and we spend about $10,000. It's my understanding that there aren't any extra costs beyond just the straight licensing."
"The setup is complex. Purchase the remote implementation service and make them slow down and work with you."
"The solution is subscription-based and depends on the number of admin users."
"It is not the most cost effective solution on the market."
"This product provides value for money."
"It is pretty pricey. It is not cheap. The licensing structure is not cheap. The tool is not cheap, but in the long run, it is well worth it. It is probably one of the best on the market because it is just so easy to use and easy to deploy. It gave us the ability to see what everybody was doing. It held people accountable. It gave us the accountability that we needed."
"I would like to order more licenses. This would allow us to support more end users concurrently."
"​The product maintenance and licensing costs are on the higher end, so I would carefully review how many licenses you need. The concurrent license model is helpful in this manner.​"
"Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."
"My company makes yearly payments only towards the licensing costs attached to Check Point Remote Access VPN, as there are no extra costs attached to the product."
"Check Point Remote Access VPN is not expensive and the cost is annual."
"The price of this product is good."
"I give the price of the solution a five out of ten."
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."
"The solution is pretty expensive. The rating is an eight."
"Regarding pricing, as a global customer, we get a big discount. For us, it's a good return on investment. We need to pay for additional features we want to enable. It seems cheaper than other vendors, but I can't say what it would cost an average customer."
report
Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
26%
Computer Software Company
11%
Financial Services Firm
7%
Government
7%
Computer Software Company
17%
Financial Services Firm
12%
Government
10%
Manufacturing Company
9%
Computer Software Company
13%
Financial Services Firm
9%
Manufacturing Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
What do you like most about BeyondTrust Remote Support?
The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote...
What needs improvement with BeyondTrust Remote Support?
The local partners for BeyondTrust Remote Support are not enough in numbers. There are not enough product partners in...
What advice do you have for others considering BeyondTrust Remote Support?
I can recommend the product, but it is important to note that it is expensive. Though I am not a very good expert wit...
What needs improvement with Check Point Endpoint Remote Access VPN?
There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients. Another downsid...
What is your primary use case for Check Point Endpoint Remote Access VPN?
For remote work, Check Point Remote Access VPN connects, creates the site, and gathers information about the site in ...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
Bomgar Remote Support
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
InterContinental Hotels Group, Williams-Sonoma Inc., eBay, Carbonite, Computer Sciences Corporation
Osmose, International Fund for Animal Welfare (IFAW)
Find out what your peers are saying about BeyondTrust Remote Support vs. Check Point Remote Access VPN and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.