Security Officer at a hospitality company with 51-200 employees
Real User
Top 5
2024-04-03T19:30:23Z
Apr 3, 2024
The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control.
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme.
It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents.
Information Technology Admin at a wellness & fitness company with 51-200 employees
Real User
Top 20
2023-01-13T16:39:43Z
Jan 13, 2023
I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience.
The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out.
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT
User
2022-02-28T14:53:00Z
Feb 28, 2022
We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
2021-10-07T21:05:00Z
Oct 7, 2021
The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic.
To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources.
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH
Real User
2021-06-16T01:39:00Z
Jun 16, 2021
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware.
Network Security Engineer at a manufacturing company with 5,001-10,000 employees
Real User
2021-06-15T19:04:00Z
Jun 15, 2021
Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work.
Network, Systems and Security Engineer at SOLTEL Group
Real User
2021-06-02T10:42:00Z
Jun 2, 2021
One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-05-31T10:33:00Z
May 31, 2021
Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live.
Remote secure access VPN is a solution that provides users with remote access to an organization’s network. The host may have VPN client software loaded or use a web-based client. The solution leverages security features like multi-factor authentication, endpoint scanning, and encryption of all data in motion.
Check Point Remote Access VPN provides individuals with protected and efficient access to a company network from anywhere. This strategy fosters collaboration and connectivity between...
The product's initial setup phase was easy.
The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control.
The policies are easy to use.
The solution is easy for administrators because you can check logs and write rules on the same page.
The clients of the customers have a facility to access the enterprise network.
It is stable most of the time.
It keeps us safe when browsing the internet and when sharing confidential information with our colleagues.
Check Point has been perfect for protecting us from any type of attack or data theft during remote management.
The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature.
This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers.
Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations.
A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme.
The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked.
It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents.
I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience.
It has MFA authentication, and that helps us to have confidence and connect from anywhere with all the security.
We can integrate remote access to our branches through Check Point services.
Among its most valuable features is how it quickly and easily connects everyone to the VPN service.
One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities.
The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera.
Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised.
The most important feature of Check Point Remote Access VPN is the multiple factor authentication.
The secure hotspot access for enabling good network connectivity is great.
Setup using the manuals was easy.
It offers a simple configuration and setup.
The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out.
The solution implemented in the cloud allows us to easily scale in cases of user increase.
The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet.
Setting policies allow, block, and limit users' access.
Check Point Remote Access VPN is a stable solution.
We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway.
Once we install and connect the VPN service, it keeps on running until we disconnect.
The solution has been solid for me for over five years.
Scalability is great. We have been able to grow as a corporation due in part to this type of solution.
The solution offers high scalability as far as adding more users.
Access is browser-based only and requires no additional client installation.
The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic.
For a basic setup, implementation is quite easy.
To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources.
The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup.
I found the MEP feature the most valuable. This has improved users' latency allowing the users to connect to the nearest Azure Check Point VM.
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware.
Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work.
Technical support has been excellent.
One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure.
Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live.
For us, it was essential to integrate with Active Directory, which is our credentials repository.
It is easy to install the Endpoint Remote Access VPN client to different platforms.
Our users find the interface very comfortable to use.
The management of the solution is very simple. It allows for a single view of all the endpoints.
The ability to create your trigger data domains is the solution's most valuable feature.