Independent Information Technology and Services Professional at a non-profit with 1-10 employees
Real User
Top 5
2024-09-25T13:05:00Z
Sep 25, 2024
For regular users, Check Point firewalls are easier to configure compared to Palo Alto's. In terms of detection rates and performance, both Check Point and Palo Alto are very good. I'd rate the solution eight out of ten.
Student at a university with 5,001-10,000 employees
Real User
Top 5
2024-09-06T20:31:54Z
Sep 6, 2024
During COVID-19, we needed a VPN solution for a specific team that had to use special equipment in the office. We couldn't install this equipment on laptops for home use. The tool helped us deploy a VPN solution in less than 30 days, including project costs and gathering facts. Their support was amazing, especially the R&D team. We worked with someone with experience with similar solutions for other clients, which made it easier. The VPN is still being used, and it's robust. We mainly implemented the Check Point Remote Access VPN to support our team during the COVID-19 peak. Some employees needed specific equipment that couldn't be installed on laptops at home. The solution allowed us to set up a similar setup to the office for these users so that they could support our clients during COVID-19. My advice for those considering Check Point Remote Access VPN is that if you're familiar with one solution, the deployment and configuration process is identical for others. There's no learning curve. Just understand your use cases, enable the needed features, and you're ready. I rate the overall solution a ten out of ten.
I rate the overall product a nine out of ten. It is mostly for enterprise customers. It is the market leader, and you can trust it blindly. I recommend the solution to many customers, including small and medium-sized businesses. I trust Check Point products because they are market leaders in firewall and VPN solutions.
Network Engineer at a non-profit with 10,001+ employees
Real User
Top 20
2024-04-05T18:50:47Z
Apr 5, 2024
The reason I started to use Check Point Remote Access VPN is because it is preferred by the organization where I currently work. The solution needs maintenance. There is a need to update the policy rules and ensure that the firmware is kept up-to-date. I request the potential users of the product to invest time in going through the knowledge-based articles since they have a plethora of information. I rate the overall tool a nine out of ten.
Security Officer at a hospitality company with 51-200 employees
Real User
Top 5
2024-04-03T19:30:23Z
Apr 3, 2024
Our previous company used this product because it's an excellent solution in the cybersecurity community. It was particularly important in Peru, where we had a strong presence in major companies. We selected the solution and used it for approximately ten years. Even after I left the company, they continued using it because of its importance in Peru and its presence in significant companies. Fortinet may have gained more presence in recent years than Check Point Remote Access VPN, likely due to its lower cost. However, during my time at the company, we continued to use it. The company may consider migrating to other solutions primarily for cost reasons, as Fortinet is cheaper. However, this decision might not be based on technical superiority but on price considerations. I rate the product a ten out of ten. You can use it if you can afford the pricing.
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
I recommend the solution to every vendor with Check Point as a firewall because it has great stability and security. We can terminate our VPN services to the same box if we're already using Check Point VPN. Overall, I rate the product a nine out of ten.
Senior Information Security Specialist at AKBANK TAS
Real User
Top 10
2023-09-07T14:55:00Z
Sep 7, 2023
If you work with Check Point in your native areas, there may be some problems. Check Point has always been a first in this area but is struggling to improve its product. While they are making improvements, the product’s stability is decreasing. Therefore, users should be aware of potential solution delays if they experience problems. If you create the environment without overuse, users will not experience any problems. Overall, I rate the solution a seven out of ten.
Head of IT Department at AS Attīstības finanšu institūcija Altum
Real User
Top 5
2023-02-14T07:53:47Z
Feb 14, 2023
I give the solution a seven out of ten. We have 250 people using the solution in our organization. Managing updates to endpoints can be a bit of a hassle, but there isn't much maintenance required.
Information Technology Admin at a wellness & fitness company with 51-200 employees
Real User
Top 20
2023-01-13T16:39:43Z
Jan 13, 2023
I rate Check Point Remote Access VPN eight out of 10. Aside from our current performance issues, it was smooth and flawless. I'm still shopping around. I was content with Check Point, but I want to see what's out there. I'm interested in knowing more about other available solutions. My primary goal is to avoid going through this process again two years from now. I'm hoping the next product will be a long-term solution, and it will be a while before we consider upgrading to something different.
Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd
Real User
2022-10-04T12:36:14Z
Oct 4, 2022
We are in the business of selling firewalls. We're resellers and Check Point partners. I personally have sold just the Check Point solution to only one customer. We are also selling data storage solutions, data backup, and cyber security solutions. We are dealing with the latest version of the solution. The solution is available both on-premises and in the cloud. I'd rate the solution nine out of ten. I'd recommend it to other users and companies.
I'd advise others to try the solution today itself and experience the utilities on their own. I am sure, they will love the product offerings and utilities to the greatest extent possible
One of the main aspects of importance in a company is the security of the computer platforms. When making an investment with these tools you are taking care of an important patrimony that will double your profits.
Cyber Security Manager at H2O Power Limited Partnership
Real User
2021-11-19T15:26:00Z
Nov 19, 2021
Check Point products are typically not cheap, however, I've found it's often due to the fact that you can do a lot with it. I recommend Check Point products to anyone who is going to have the time and expertise to administer them. You're going to be able to do what you want to do, engineer a design that works for you. If you want to just plug it in and forget about it, then this might not be the product for you. That said, for those who do just want to plug something in and forget about it, I warn you to be cautious. When it comes to Remote Access, you don't want to ignore this. You want to be looking at it and you want to monitor it, otherwise attackers will take advantage of that weakness. This is where Check Point allows you to monitor the edge, while granularly controlling it.
Global IT Network and Security Service Senior Specialist at a manufacturing company with 1,001-5,000 employees
Real User
2021-07-04T13:31:00Z
Jul 4, 2021
I suggest that if you want to implement this Check Point solution you should have good knowledge of the system as well as a system integrator or direct contacts in Check Point. In case of any issue, the support is poor and it's not easy to solve issues using technical support.
We are customers and end-users. We don't have a business relationship with the company. I'd advise new users that, when it comes to deploying with an authentication provider, I would advise that you use a Microsoft authenticator. We tried using their authenticator at first, but that is not good. That did not work. I'd rate the solution at an eight out of ten.
Network, Systems and Security Engineer at SOLTEL Group
Real User
2021-06-02T10:42:00Z
Jun 2, 2021
So far, I have not found any negative characteristics to complain about, since in general, the software works in an excellent way and it has never failed us.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-05-31T10:33:00Z
May 31, 2021
Traditional VPNs that work on L3 or L4, with a single VPN tunnel, are typically hosted on-premises. As organizations are adopting cloud computing, it makes sense to have a VPN solution hosted on the cloud for better control and security.
The Check Point Endpoint Remote Access VPN for MacOs and Windows are reliable solutions for remote access VPN, and fully compatible with the Check Point security ecosystem.
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees
Real User
2020-04-19T07:40:34Z
Apr 19, 2020
Currently, Check Point is meeting all of our requirements. That said, there is always a chance of innovation and something new. I would rate this solution a nine out of ten.
IT Tech Security Management at a logistics company with 1,001-5,000 employees
Real User
2019-11-26T05:43:00Z
Nov 26, 2019
We currently only use the on-premises deployment model, although we may extend into the cloud in the future. We're aware of the cloud's capabilities, but we're not using it because we don't have a large infrastructure expression there. In terms of advice, I'd suggest that others implementing the solution make sure training happens on their teams. Most products can have lots of features, but if you do not have proper knowledge, you will not be able to make use of those features. I'm very satisfied with this solution; I'd rate it eight out of ten.
We are using the on-premises deployment model. Checkpoint is very strong and very reliable. I would advise that those considering implementing the product go to a Checkpoint training session before implementing the solution. It's good to be familiar with the product beforehand. I'd rate the solution ten out of ten.
Remote secure access VPN is a solution that provides users with remote access to an organization’s network. The host may have VPN client software loaded or use a web-based client. The solution leverages security features like multi-factor authentication, endpoint scanning, and encryption of all data in motion.
Check Point Remote Access VPN provides individuals with protected and efficient access to a company network from anywhere. This strategy fosters collaboration and connectivity between...
For regular users, Check Point firewalls are easier to configure compared to Palo Alto's. In terms of detection rates and performance, both Check Point and Palo Alto are very good. I'd rate the solution eight out of ten.
During COVID-19, we needed a VPN solution for a specific team that had to use special equipment in the office. We couldn't install this equipment on laptops for home use. The tool helped us deploy a VPN solution in less than 30 days, including project costs and gathering facts. Their support was amazing, especially the R&D team. We worked with someone with experience with similar solutions for other clients, which made it easier. The VPN is still being used, and it's robust. We mainly implemented the Check Point Remote Access VPN to support our team during the COVID-19 peak. Some employees needed specific equipment that couldn't be installed on laptops at home. The solution allowed us to set up a similar setup to the office for these users so that they could support our clients during COVID-19. My advice for those considering Check Point Remote Access VPN is that if you're familiar with one solution, the deployment and configuration process is identical for others. There's no learning curve. Just understand your use cases, enable the needed features, and you're ready. I rate the overall solution a ten out of ten.
I rate the overall product a nine out of ten. It is mostly for enterprise customers. It is the market leader, and you can trust it blindly. I recommend the solution to many customers, including small and medium-sized businesses. I trust Check Point products because they are market leaders in firewall and VPN solutions.
The reason I started to use Check Point Remote Access VPN is because it is preferred by the organization where I currently work. The solution needs maintenance. There is a need to update the policy rules and ensure that the firmware is kept up-to-date. I request the potential users of the product to invest time in going through the knowledge-based articles since they have a plethora of information. I rate the overall tool a nine out of ten.
Overall, I will rate the solution a seven out of ten.
Our previous company used this product because it's an excellent solution in the cybersecurity community. It was particularly important in Peru, where we had a strong presence in major companies. We selected the solution and used it for approximately ten years. Even after I left the company, they continued using it because of its importance in Peru and its presence in significant companies. Fortinet may have gained more presence in recent years than Check Point Remote Access VPN, likely due to its lower cost. However, during my time at the company, we continued to use it. The company may consider migrating to other solutions primarily for cost reasons, as Fortinet is cheaper. However, this decision might not be based on technical superiority but on price considerations. I rate the product a ten out of ten. You can use it if you can afford the pricing.
I recommend the solution to every vendor with Check Point as a firewall because it has great stability and security. We can terminate our VPN services to the same box if we're already using Check Point VPN. Overall, I rate the product a nine out of ten.
I advise others to use the product instead of multiple SD solutions and hardware products. I rate Check Point Remote Access VPN a seven out of ten.
If you work with Check Point in your native areas, there may be some problems. Check Point has always been a first in this area but is struggling to improve its product. While they are making improvements, the product’s stability is decreasing. Therefore, users should be aware of potential solution delays if they experience problems. If you create the environment without overuse, users will not experience any problems. Overall, I rate the solution a seven out of ten.
Generally, Check Point Remote Access VPN is a very good solution. Overall, I rate Check Point Remote Access VPN a nine out of ten.
I'd rate the solution nine out of ten. I would advise companies to make sure the configuration is correct on the firewall.
The performance has been good and I recommend it to other business enterprises.
I give the solution a seven out of ten. We have 250 people using the solution in our organization. Managing updates to endpoints can be a bit of a hassle, but there isn't much maintenance required.
For secure device connection and team collaboration, this is the best solution.
I would like the support to be faster. I rate this solution a nine out of ten.
This is the best VPN I have worked with so far.
I rate Check Point Remote Access VPN eight out of 10. Aside from our current performance issues, it was smooth and flawless. I'm still shopping around. I was content with Check Point, but I want to see what's out there. I'm interested in knowing more about other available solutions. My primary goal is to avoid going through this process again two years from now. I'm hoping the next product will be a long-term solution, and it will be a while before we consider upgrading to something different.
The product is an excellent tool that provides secure connections.
We are in the business of selling firewalls. We're resellers and Check Point partners. I personally have sold just the Check Point solution to only one customer. We are also selling data storage solutions, data backup, and cyber security solutions. We are dealing with the latest version of the solution. The solution is available both on-premises and in the cloud. I'd rate the solution nine out of ten. I'd recommend it to other users and companies.
It's a very good tool for VPN security. It is somewhat expensive, but they should evaluate it so they can have a more personal concept.
I rate Check Point Remote Access VPN a nine out of ten.
I'd advise others to try the solution today itself and experience the utilities on their own. I am sure, they will love the product offerings and utilities to the greatest extent possible
On a technical level, the tool is very good, and safe, in addition to providing a lot of control.
One of the main aspects of importance in a company is the security of the computer platforms. When making an investment with these tools you are taking care of an important patrimony that will double your profits.
I rate Check Point Remote Access VPN a seven out of ten.
Check Point is very reliable and secure.
Check Point products are typically not cheap, however, I've found it's often due to the fact that you can do a lot with it. I recommend Check Point products to anyone who is going to have the time and expertise to administer them. You're going to be able to do what you want to do, engineer a design that works for you. If you want to just plug it in and forget about it, then this might not be the product for you. That said, for those who do just want to plug something in and forget about it, I warn you to be cautious. When it comes to Remote Access, you don't want to ignore this. You want to be looking at it and you want to monitor it, otherwise attackers will take advantage of that weakness. This is where Check Point allows you to monitor the edge, while granularly controlling it.
We would like them to add a 2MFA feature in the future. This is our direct request.
I suggest that if you want to implement this Check Point solution you should have good knowledge of the system as well as a system integrator or direct contacts in Check Point. In case of any issue, the support is poor and it's not easy to solve issues using technical support.
Get this software installed as soon as possible. It's a smart move.
We are customers and end-users. We don't have a business relationship with the company. I'd advise new users that, when it comes to deploying with an authentication provider, I would advise that you use a Microsoft authenticator. We tried using their authenticator at first, but that is not good. That did not work. I'd rate the solution at an eight out of ten.
So far, I have not found any negative characteristics to complain about, since in general, the software works in an excellent way and it has never failed us.
Traditional VPNs that work on L3 or L4, with a single VPN tunnel, are typically hosted on-premises. As organizations are adopting cloud computing, it makes sense to have a VPN solution hosted on the cloud for better control and security.
The Check Point Endpoint Remote Access VPN for MacOs and Windows are reliable solutions for remote access VPN, and fully compatible with the Check Point security ecosystem.
Currently, Check Point is meeting all of our requirements. That said, there is always a chance of innovation and something new. I would rate this solution a nine out of ten.
We currently only use the on-premises deployment model, although we may extend into the cloud in the future. We're aware of the cloud's capabilities, but we're not using it because we don't have a large infrastructure expression there. In terms of advice, I'd suggest that others implementing the solution make sure training happens on their teams. Most products can have lots of features, but if you do not have proper knowledge, you will not be able to make use of those features. I'm very satisfied with this solution; I'd rate it eight out of ten.
We are using the on-premises deployment model. Checkpoint is very strong and very reliable. I would advise that those considering implementing the product go to a Checkpoint training session before implementing the solution. It's good to be familiar with the product beforehand. I'd rate the solution ten out of ten.