Try our new research platform with insights from 80,000+ expert users

Check Point Remote Access VPN vs F5 BIG-IP Access Policy Manager (APM) comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Aug 7, 2024
 

Categories and Ranking

Microsoft Intune
Sponsored
Ranking in Remote Access
1st
Average Rating
8.2
Reviews Sentiment
7.3
Number of Reviews
233
Ranking in other categories
Configuration Management (2nd), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
Check Point Remote Access VPN
Ranking in Remote Access
6th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
67
Ranking in other categories
Enterprise Infrastructure VPN (6th)
F5 BIG-IP Access Policy Man...
Ranking in Remote Access
14th
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
14
Ranking in other categories
Secure Web Gateways (SWG) (20th), Network Access Control (NAC) (7th), SSL VPN (5th), Access Management (10th)
 

Featured Reviews

Gaurav Chandola - PeerSpot reviewer
We can manage all aspects of our devices from a single console, easy to scale, and quick to deploy
Intune has many benefits from the Microsoft perspective. This solution can manage Windows 10 devices, app management, and provide security solutions. We don't need to worry about our network connection, and we'll be more secure with regular security patches and compliance. Since everything will be deployed through the internet and users will log in using the internet only, the risks have been mitigated. Security updates, security patching, and the application will be targeted from Intune. The location tracker will be available to track where the device is and the user's location. The user will be restricted from accessing certain applications using compliance policies. Conditional access policies will be based on the reason why the user needs access to the application. Microsoft Intune is one of the best products in the industry for managing Windows devices. The solution has more feature restrictions. The conditional access policies also eliminate the dependency on the on-prem network for the devices. The solution also manages our security settings and a lot of other beneficial features such as Microsoft Purview which gives us the compliance portion. We can manage all aspects of our device from a single console, including M365 services. This allows us to configure data classification types, such as public, private, internal, confidential, and highly confidential.
Ozan Durmus - PeerSpot reviewer
Is easy to use and has a nice interface, but the scalability needs to improve
The deployment takes around two to three hours. If you manage the product, one person could be enough, but if you need some kind of additional integrations like ADA integration, you need someone from ADT to access products. One person is enough, but one or two additional personnel may be included. To deploy Check Point Remote Access VPN, you must purchase a license, enable the blade, and purchase client access licenses. You can then follow the instructions to deploy the product, write the necessary rules, make the integrations, deploy the agent to the clients, and provide them with a login solution. I rate the initial setup an eight on a scale of ten, where one is difficult, and ten is easy.
Ashish Kumar Rai - PeerSpot reviewer
Offers remote access control, good GUI and easy to configure
I'd suggest improved documentation integration directly within the GUI. Right now, finding comprehensive documentation often requires going to external websites like the community portal. In the APM interface itself, they could add direct hyperlinks to relevant online documentation. This would provide easy access to admin guides and other resources when working within the GUI.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"At the moment, Autopilot is the most valuable feature."
"The solution has reduced the risk of security breaches by 30%."
"The biggest benefits of Intune are the ability to push changes and the added security. When we moved forward with Defender, we onboarded all those machines automatically. That helps dramatically. For a while, we were left with machines that weren't protected. We could see where people had done things they shouldn't have done, and Defender saved our skins a few times. It didn't happen a lot, but it happened enough that it made us glad we made that decision."
"The most valuable feature of Intune is the central dashboard for compliance and policy management."
"We have one MDM that works with Windows, iOS, and Android."
"The best part of Intune is application deployment. We can deploy an application to several users with a single click. We can use conditional access, granting access to users based on certain conditions, such as location, platform, etc."
"Its direct integration with all the other products that we have from Microsoft is valuable. We're using the E5 license, and we have a whole wealth of different products available. It just makes it easier to have everything from one provider."
"The best part of Intune is device control. If we need to block a user from opening something in their organization's system, we can do it from Intune. If we want to restrict the movement of an organization's data to prevent users from copying the data into Outlook, WhatsApp, or their personal Gmail, we can limit that via Intune. It secures all corporate data."
"The clients of the customers have a facility to access the enterprise network."
"The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
"For us, it was essential to integrate with Active Directory, which is our credentials repository."
"We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway."
"Check Point Remote Access VPN provides strong security features, including encryption, authentication, endpoint security, access control, and centralized management."
"One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure."
"It is easy to install the Endpoint Remote Access VPN client on different platforms."
"The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
"The product allows us to create customized portals for your users."
"The tool is reliable and easy to configure."
"The load balancing features are valuable."
"The most valuable feature is the virtual IP creation. It's our most frequently used feature."
"The performance of the solution is valuable."
"F5 BIG-IP APM is relatively easy to use."
"The portal access was very good."
"The solution is stable and reliable."
 

Cons

"It would be awesome if Microsoft opened their API so we could filter more properties. If we have to do anything outside of Intune that requires a third-party solution to talk back to it, we're very limited in what we can do. Trust your people. We promise not to break your stuff. Open it up just a tiny bit wider."
"The installation could be improved to be simplified."
"Microsoft Intune could improve by being more user-friendly and having it geared toward device management. The graphic interface is not very good."
"The solution's app deployment needs to be improved."
"The interface is not as modern as some competitors in terms of single pane of glass visibility across the entire landscape. It has a very Azure vibe and may not be as graphically appealing as other products."
"It needs certificate provisioning for S/MIME purposes."
"There are a few security features that are not available in Microsoft Intune, when compared to other products."
"I rate Microsoft support four out of 10. Support is one area where Microsoft needs to improve a lot. I recently raised a ticket for a Microsoft Azure issue, and it took two and a half weeks for support to reply. They need to improve support across their entire catalog of products."
"We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
"There was complexity in the initial setup."
"Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric."
"Check Point Remote Access VPN could be more user-friendly."
"The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."
"Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access."
"The scalability needs improvement."
"The cost of maintenance is high compared to most products in the market."
"The initial setup was complex."
"Integrating identity providers and single sign-on solutions can simplify user authentication and access control."
"We do not have knowledgeable support teams locally."
"F5 BIG-IP Access Policy Manager has room for improvement in integration with other products."
"The solution’s GUI looks very old."
"The solution is quite costly."
"F5 BIG-IP APM disconnects when you leave it for long enough, but that is natural for IT solutions to do. That's a little bit frustrating."
"The price of this product can be improved."
 

Pricing and Cost Advice

"We have the business premium licenses for the solution."
"Generally, we get favorable discounts, so it's not too bad. Obviously, we're looking at decreasing those wherever we can to bring value back to the public purse because it's all charity based. It's all publicly funded."
"The product is expensive."
"I have no comment on pricing of the solution."
"Microsoft Intune is a cost effective choice. It is less expensive than other products on the market."
"For Microsoft 365 E5 clients, cost is not an issue as this product is one of the benefits."
"The product is relatively pricey, but considering its benefits, I'd say it's fair. The benefits outweigh the expensive licensing fees, especially for large organizations, but medium-sized and smaller businesses may be unable to afford it."
"Its price is quite okay. I wish they provide certain additional features with the same license."
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."
"There is a license required for this solution."
"The solution is pretty expensive. The rating is an eight."
"The price of this product is good."
"Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."
"Check Point Remote Access VPN is not expensive and the cost is annual."
"I can say that the licensing costs are charged annually."
"The product is expensive. I rate its pricing a ten out of ten. For the cost of one product, we could purchase two or three Fortinet solutions with the same amount of money."
"The product is very expensive."
"Recently, they have simplified the licensing"
"The tool is a little bit expensive."
"I rate the tool's pricing an eight out of ten."
report
Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
26%
Computer Software Company
11%
Financial Services Firm
7%
Government
7%
Computer Software Company
13%
Financial Services Firm
9%
Manufacturing Company
8%
Government
8%
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
10%
Government
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
What needs improvement with Check Point Endpoint Remote Access VPN?
There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients. Another downsid...
What is your primary use case for Check Point Endpoint Remote Access VPN?
For remote work, Check Point Remote Access VPN connects, creates the site, and gathers information about the site in ...
What do you like most about F5 BIG-IP Access Policy Manager (APM)?
In my opinion, the GUI is perfect with the configuration options provided. F5 BIG-IP has given customization options ...
What needs improvement with F5 BIG-IP Access Policy Manager (APM)?
Regarding price, I'm not directly involved in purchasing, but our CIO thinks the product is very expensive. He's cons...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
F5 Access Policy Manager
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
Osmose, International Fund for Animal Welfare (IFAW)
City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
Find out what your peers are saying about Check Point Remote Access VPN vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.