It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents.
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
The ability of the solution to be able to interconnect different equipment from any region simultaneously and that content filtering that is put through it, integrating additional solutions as well. How is the issue of identity.
The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out.
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT
User
2022-02-28T14:53:00Z
Feb 28, 2022
We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
2021-10-07T21:05:00Z
Oct 7, 2021
The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic.
To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources.
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH
Real User
2021-06-16T01:39:00Z
Jun 16, 2021
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware.
Network Security Engineer at a manufacturing company with 5,001-10,000 employees
Real User
2021-06-15T19:04:00Z
Jun 15, 2021
Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work.
Network, Systems and Security Engineer at SOLTEL Group
Real User
2021-06-02T10:42:00Z
Jun 2, 2021
One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure.
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.
Network Security Engineer at a financial services firm with 51-200 employees
Real User
2020-08-03T06:11:00Z
Aug 3, 2020
It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now.
Remote secure access VPN is a solution that provides users with remote access to an organization’s network. The host may have VPN client software loaded or use a web-based client. The solution leverages security features like multi-factor authentication, endpoint scanning, and encryption of all data in motion.
Check Point Remote Access VPN provides individuals with protected and efficient access to a company network from anywhere. This strategy fosters collaboration and connectivity between...
The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature.
This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers.
Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations.
The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked.
It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents.
It has MFA authentication, and that helps us to have confidence and connect from anywhere with all the security.
The ability of the solution to be able to interconnect different equipment from any region simultaneously and that content filtering that is put through it, integrating additional solutions as well. How is the issue of identity.
We can integrate remote access to our branches through Check Point services.
One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities.
The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera.
Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised.
Setup using the manuals was easy.
The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out.
The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet.
It helped improve the way our customers, users, and administrators connected via VPN.
Check Point Remote Access VPN is a stable solution.
We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway.
Once we install and connect the VPN service, it keeps on running until we disconnect.
The solution has been solid for me for over five years.
Scalability is great. We have been able to grow as a corporation due in part to this type of solution.
The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic.
To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources.
The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup.
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware.
Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work.
Technical support has been excellent.
One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure.
For us, it was essential to integrate with Active Directory, which is our credentials repository.
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.
The most valuable feature is the seamless access.
It is easy to install the Endpoint Remote Access VPN client to different platforms.
It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now.
The initial set up is not complex.