Independent Information Technology and Services Professional at a non-profit with 1-10 employees
Real User
Top 5
2024-09-25T13:05:00Z
Sep 25, 2024
For remote work, Check Point Remote Access VPN connects, creates the site, and gathers information about the site in terms of the VPN domain, the public IP at that time, and so on.
Our primary use case is to provide a remote access VPN to organization users so that they can access the organization servers or resources easily from anywhere.
Before COVID-19, one major use case was for remote VPN access. However, since the pandemic, remote work has become more prevalent, and now, the primary use case for the Check Point Remote Access VPN is when users need to connect to office resources from outside the network. With remote Check Point Remote Access VPN, they can access our data center or office network and utilize resources. Additionally, we can publish applications on the public network for anyone to access. As a consultant, I work with multiple vendors across various industries, including banking and IT customers.
Network Engineer at a non-profit with 10,001+ employees
Real User
Top 20
2024-04-05T18:50:47Z
Apr 5, 2024
When it comes to Check Point Remote Access VPN, my company is still in the testing phase and will be due for a rollout with our client, who has wanted a VPN connection since last summer.
We use the solution for our customers. Whenever the users work from home, they connect to the solution and are redirected to their network. It is very simple. They install the client, and the client makes a tunnel to the product. Once they are connected, they can enter into the network.
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Senior Information Security Specialist at AKBANK TAS
Real User
Top 10
2023-09-07T14:55:00Z
Sep 7, 2023
We use Remote Access VPN as a secondary VPN for our IT admins. We use this solution on a different production Internet line. If there is a network shortage on our primary line, we can use Check Point to access and check the systems.
Web Developer at Netconomy Software & Consulting GmbH
User
Top 20
2023-02-24T07:56:00Z
Feb 24, 2023
The remote VPN enables us to connect our devices under a controlled network infrastructure. It protects the channels for transferring data and confidential information. It connects our managers with remote employees to enhance efficiency in the implementation of projects and tasks. Check Point Remote Access VPN blocks unauthorized access to our computing devices. It is easy to install and use this VPN for any new user. It keeps all the teams under the same collaboration and networking channel safe. Information encryption secures end-to-end conversation among teams.
The primary use case is to remotely connect to various sites and various apps and use some technological apps that are cloud-based. Check Point Remote Access was the essential platform for us to connect remotely through a secure network with an encryption key. It's also an encryption service for all information shared and obtained from this remote connection. Today, we still use it to remotely connect to computers, apps, websites, and cloud-based apps while traveling or out of the office.
Head of IT Department at AS Attīstības finanšu institūcija Altum
Real User
Top 5
2023-02-14T07:53:47Z
Feb 14, 2023
We use Check PointVPN to securely connect to our main office systems, which are behind a firewall. This ensures that all incoming and outgoing traffic is encrypted and secure.
Remote Access VPN helps my team to connect our devices remotely without any limitations. It is easy to establish a secure connection among teams and connect efficiently with maximum security. Teams can share files effectively under secure networking infrastructure. When implementing projects and tasks, it conveniently troubleshoots technical issues that can affect information traffic. I can now share large size of documents with my colleagues from a remote location without any interference. It is easy to facilitate remote workers and engage them.
We wanted to give employees the possibility to work from anywhere outside of the organization, being a house or another remote location of offices. We wanted this capability with the possibility and ease to grant them access to our perimeter network so that they could access the data or internal applications for the use of each of its functions. We wanted faster, safer, and more efficient transactions that are going to be shared within our organization based on the business.
The Remote Access VPN provides security to all computing devices across the organization. I can securely log in from a remote area and access the organization's data without physical appearance. It is easy to collaborate with colleagues in the same networking area from different locations. When interacting with our customers, I can easily change my IP address to correspond with a client's. This platform has saved the company a lot of resources that are being used to set up remote offices.
Check Point Remote Access VPN is a VPN solution that allows users to securely connect to corporate networks from remote locations. It enables users to access corporate resources such as files, applications, and network devices as if they were on the corporate network. The primary use case of Check Point Remote Access VPN is to provide secure remote access for employees, contractors, and partners who need to access corporate resources while working remotely. This can include employees working from home, traveling, or working in a remote office location.
Cloud Engineer at IT Quest Solutions|interglobalmsp
User
Top 5
2022-12-30T15:07:00Z
Dec 30, 2022
The organization has made progress in the generational changes of information technology. We have advanced to the cloud on the Azure platform. As we saw that teleworking worked a lot during the pandemic, we kept it up and continued to work out of the office more and more until many employees rarely went in. Due to this, we were forced to look for a tool that would provide us with security in the connection between external resources and the company. We decided to implement Check Point Remote Access VPN so that our users could connect safely to the infrastructure and thus protect the information.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Real User
2022-11-06T05:13:00Z
Nov 6, 2022
We needed to grow a little more at a cloud level, which means that we have had more places in which we host information, and needed to protect it. We needed to allow users to have access from the different branches in the cloud to our main branch and to access remotely. As a result of these needs, we have been looking for solutions that allow us to have quick and efficient access no matter which branch we are going to access, and to have access allowed quickly and easily as if users were inside the perimeter area of our organization.
Currently, as we are a company that constantly imports and exports solutions. We have needed to give our salespeople access to our executives since that part of retail is constantly on the move inside and outside our organization. This makes it somewhat necessary to figure out how everyone can access data since the information is being used and managed every day inside and outside of our institution. We have come to use the Check Point security services so that users can have the same access as we have inside when they are outside the organization.
We came to need a solution that would allow us to connect quickly and easily from our homes or from anywhere, and it was at this point that we integrated and enabled the Check Point Remote Access VPN. With it, our employees could log in from anywhere at any time. This solution allowed them to have the same experience that they had in the office, and they could access all the resources that were necessary for their work. This solution helped us mainly with the shift to remote work. Before the pandemic, everyone worked from the office. Today, more employees have become digital nomads.
After implementing our GW and management security appliance in our public cloud infrastructure, we needed to establish P2S VPNs so that some users could connect to our offices safely to be able to access information and internal applications from anywhere. This need begins when the sales department requires access to internal resources to be able to show solutions that we sell to clients. However, these connections were mostly from public places without security, which was clearly a huge vulnerability of the company. Thanks to this tool, we managed to solve this need.
Check Point Remote Access VPN is used to allow our employees to use the corporate resources or remote access to the corporation and lightweight on resources.
Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions to business users while they are working remotely and traveling for business purposes. Our organization involves over 70% of business travel to generate revenue, and it becomes really troublesome to secure the IT devices and cloud system at such traveling times. Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.
This functionality is very practical to be able to connect to the business network from anywhere; the monitoring that can be provided and the granularity in the VPN to provide control to users is really good.
We primarily use the solution for work from home. Our main goal is to provide users with the ability to access their workstation from anywhere in the world. We provided remote access to more than 500 users during the pandemic. Check Point Remote Access VPN has worked smoothly as our appliance is capable of supporting 1000+ users. We deployed a VPN client-based solution with multi-factor authentication. The compliance check feature is useful. It is compatible with several operating systems, and it has great protection against malware. It offers a simple configuration and setup.
This product provides a secure connection to the corporate network from anywhere and safe traffic of data regardless of the possible threats in the WAN it's connected to. It also provides secure access to company apps and controls the traffic depending on each company's policies. Through it, we create layers that control or limit data traffic for specific users. I've been trained in the product and know it's one of the most effective in the business and admit to facilitating my customers to get it from our Check Point partners.
The company needs a tool that will provide users with the ability to connect from external addresses and that is where Check Point Endpoint Remote Access VPN services were contracted, which allows users to connect to our firewall. We also have Check Point firewalls in the cloud, to which people can also connect. They can then access the resources in our on-premises environment that they need to access, such as their computers, the Intranet, Salesforce, or our production applications, and have a 100% secure connection.
Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data. Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.
Check Point Remote Access VPN allows organization users to work remotely. Especially in the pandemic period, work-from-home demand has been higher than ever. I have a remarkable case about the solution. That is for a bank. They want to have remote access VPNs that can provide connections for internal users who work remotely, partners who have restricted connections to the bank environment and ATM machines that connect to core banking applications. All VPNs acted in the same internet connections but still ensure these three VPNs were separated from each other. For the requirements, deploying the VPN in VSX appliances helped to solve issues. I created three virtual instances: one for corporate users, one for partners and one for ATM machines. Applying security policies for three instances is different. Corporate users must pass two-factor authentication layers and then have access to common corporate services (like email, and chat) and the right business applications depending on their working role, and their department. Partners after authenticating successfully only have limited access to the right place that they are allowed while being unable to connect to other places. ATM machines that act 24/7 need to have continuous connections, thus, they must authenticate using a certificate and their VPN clients must be configured to re-authenticate automatically after a timeout.
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT
User
2022-02-28T14:53:00Z
Feb 28, 2022
Since SARS-COV2, most users went to work from their home office, so we needed to have an robust, secure, and stable VPN connection. We implemented Check Point VPN and we have had no problems with it. We are almost 50 users working from home securely. Also, the access rules based on VLANs have helped many users get access depending on which connection they have. For example, some users with VPN connections can only access some specific servers and ports, however, when they are on an internal LAN, they have access to the entire network.
The primary use case of this solution is to connect to our internal network for accessing servers and clusters using Check Point VPN. End-users are, for example, students accessing computer labs and licensed software that can check academic licenses only within the campus network; further, our ERP folks could make good use of the VPN solution by remotely working on the Institute Management System infrastructure and can work efficiently without any hindrance. We also use its capsule app on smartphones to connect further.
Cyber Security Manager at H2O Power Limited Partnership
Real User
2021-11-19T15:26:00Z
Nov 19, 2021
In our environment, we have many users working remotely. It's important to control the flow of traffic coming and going to these remote employees, and isolate traffic when used for business purposes. We have to allow our remote users to access services from home as though they were in the office. However, at the same time, we need to control that traffic and make sure it conforms to our policy. Our environment is complex and requires advanced policies to look at traffic in very unique ways from different users. Check Point's policy management has allowed us to do that.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
2021-11-02T20:39:00Z
Nov 2, 2021
Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client. Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.
Network Security Engineer at a consumer goods company with 201-500 employees
Real User
2021-10-16T12:34:00Z
Oct 16, 2021
With this solution, we can: 1) Securely and privately access our data from anywhere with the Check Point VPN. 2) Connect securely from any device and any asset. 3) Have 2FA enabled while connecting to the VPN in an official mail. If any person has your VPN credential, he can initiate contact for security codes to connect to the VPN. 4) Integrate our data. 5) View VPN events from the console. 6) Easily install and connect the VPN. 7) Provide colleagues with secure and seamless remote access to the corporate network. 8) Get a full picture with complete network visibility.
The Mobile Access VPN is used to provide users with remote access to company resources. Users can access the system at any time from corporate laptops as well as home PCs. It is also possible to connect from Android and IOS mobile devices. We also use the functionality of the secure Capsule Workspace container to securely provide access to corporate Web resources and mailing services from mobile devices. It is also possible to provide restricted access to partners via SSL VPN using the Check Point Mobile Web Portal fine-tuning.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
2021-10-07T21:05:00Z
Oct 7, 2021
We have always worked within the office. However, the COVID pandemic changed the course of our work in terms of where we had to implement new solutions so that we could all work from home. That was when I encountered Check Point; we had years with this solution in the facilities, yet, only during the pandemic did we have to innovate for a home environment. Today we have more than 6000 users working from home thanks to Check Point. This is possible due to the fact that, with a certificate and the client for this connection, every person can connect to our environment as if they were at the office.
Firewall Engineer at a logistics company with 1,001-5,000 employees
User
2021-09-30T10:59:00Z
Sep 30, 2021
We are hosting environments for our customers and ourselves. With Check Point Client, VPN users that aren't in their internal networks can connect via a secure connection into the internal network. Remote users use different clients (Windows, Linux, and Mac OS) so depending on the customer, there is either a client connection or a clientless approach (using a web portal). Users can also be identified if they use the Client VPN solution. If you want to identify them inside the network you have to use an IA agent. Once set up, it simply works without issues.
Remote Access VPN is one of those essential items for every organization in order to maintain seamless and highly secured connectivity between the end-user and the organization's local area network to access resources - including Jump server Databases, et cetera. No matter from which device or from which location users are accessing an organization's local resources, with the help of the Check Point VPN client they can make sure they have connected securely. Check Point offers a best-in-class encryption algorithm to ensure confidentiality and maintain integrity between the end-user and the Gateway.
Global IT Network and Security Service Senior Specialist at a manufacturing company with 1,001-5,000 employees
Real User
2021-07-04T13:31:00Z
Jul 4, 2021
We've used Check Point VPN to move from an on-premise VPN Cisco product to a VPN built on the cloud. We decided to use Check Point as it was fully integrated with Microsoft Azure and present on the Azure marketplace. We deployed this solution on different subscriptions and used the MEP function to reduce users' latency on the VPN. The implementation has not been very easy, and the implementation of MEP has taken months. There were a lot of hotfixes to install, and the CLI configuration on the files had to be done. The configuration, in fact, can't be implemented using a GUI.
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH
Real User
2021-06-16T01:39:00Z
Jun 16, 2021
We use Check Point Remote Access VPN to provide access to employees, vendors, and advisors. They access the company resources - especially now that most people are working from home over the course of the last year. We also use it for specific companies that give us remote support to some applications, such as our parent company. Our admins access our company servers and resources. We're using Remote Access VPN with specific profiles for them that only give access to some resources. We have three distinct environments. Server, DMZ, and User/SHOP. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.
Network Security Engineer at a manufacturing company with 5,001-10,000 employees
Real User
2021-06-15T19:04:00Z
Jun 15, 2021
We are able to allow users to easily gain access to internal systems from outside the organization. No longer is coming into the office a necessary requirement for our users. They can seamlessly transition from home/remote work to going into the office while still having the same level of access. We also have many users that need to manage servers who are able to connect to the internal servers from anywhere - allowing them to still do their jobs from anywhere. Connecting to VPN doesn't require a ton of technical skill for those not in the technical field.
We primarily use this solution for our clients. Use cases vary, and they include VPN connectivity. It can be used as a provisional firewall and you can allow for a provisional access list, or grant permission to access or for servers or users trying to connect to the server.
Network, Systems and Security Engineer at SOLTEL Group
Real User
2021-06-02T10:42:00Z
Jun 2, 2021
Check Point Endpoint Remote Access VPN is without a doubt, really fantastic software. It allows me remote and secure access to my most important data, to the company's networks, and to corporate resources from anywhere in the world. Regardless of where I am, it guarantees the complete privacy of all our confidential information through multifactor authentication and compliance analysis of the endpoint system. All of this is very easy to configure using step-by-step wizards, and there are many guides to explain it.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-05-31T10:33:00Z
May 31, 2021
We use Check Point Remote Access VPN to provide access to our corporate network and resources to remote users in a secure way. Users have access that is limited or defined by the server. Access is granted for identified devices post-posture validation. Access should be provided via VPN using multifactor authentication other than username/credentials. Users are able to connect from anywhere at anytime using both mechanisms (i.e. User VPN client or browser). This solution mitigates or minimizes data leakage issues. It is stable and scalable and requires minimal management and access provisioning.
ICT at a manufacturing company with 501-1,000 employees
Real User
2021-05-31T06:33:00Z
May 31, 2021
We use this solution to permit the connection to on-premises resources to internal and external users. We use rules specific to external users based on the real access needs of the specific company, whereas, for internal users, other rules are used. Users connect to our headquarters and then through private connections, they reach the resources distributed in the various locations. Using dual-factor authentication, we improve the identity security of the users and also protect our company. Check Point has been our strategic partner for approximately 15 years.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). In addition, there are about 30 Google Cloud projects of different sizes ranging from 10 to 250 virtual machines, and they are used for development, staging, production, etc. For every project, there is one dedicated scalable instance group of the Check Point CloudGuard IaaS gateways. We user the Check Point Remote Access VPN to provide access for our employees to connect to the specified environments.
Remote secure access VPN is a solution that provides users with remote access to an organization’s network. The host may have VPN client software loaded or use a web-based client. The solution leverages security features like multi-factor authentication, endpoint scanning, and encryption of all data in motion.
Check Point Remote Access VPN provides individuals with protected and efficient access to a company network from anywhere. This strategy fosters collaboration and connectivity between...
For remote work, Check Point Remote Access VPN connects, creates the site, and gathers information about the site in terms of the VPN domain, the public IP at that time, and so on.
Our primary use case is to provide a remote access VPN to organization users so that they can access the organization servers or resources easily from anywhere.
Before COVID-19, one major use case was for remote VPN access. However, since the pandemic, remote work has become more prevalent, and now, the primary use case for the Check Point Remote Access VPN is when users need to connect to office resources from outside the network. With remote Check Point Remote Access VPN, they can access our data center or office network and utilize resources. Additionally, we can publish applications on the public network for anyone to access. As a consultant, I work with multiple vendors across various industries, including banking and IT customers.
When it comes to Check Point Remote Access VPN, my company is still in the testing phase and will be due for a rollout with our client, who has wanted a VPN connection since last summer.
We use it to connect our sites. We have a couple of sites that need to interconnect. They are in our cloud and our premise data center.
We use the solution for our customers. Whenever the users work from home, they connect to the solution and are redirected to their network. It is very simple. They install the client, and the client makes a tunnel to the product. Once they are connected, they can enter into the network.
We use Check Point Remote Access VPN for security features.
We use Remote Access VPN as a secondary VPN for our IT admins. We use this solution on a different production Internet line. If there is a network shortage on our primary line, we can use Check Point to access and check the systems.
The solution is used for the mobile license or the troubleshooting of the VPN client.
We primarily use the solution as a VPN for connection purposes. It helps us connect to corporate.
The remote VPN enables us to connect our devices under a controlled network infrastructure. It protects the channels for transferring data and confidential information. It connects our managers with remote employees to enhance efficiency in the implementation of projects and tasks. Check Point Remote Access VPN blocks unauthorized access to our computing devices. It is easy to install and use this VPN for any new user. It keeps all the teams under the same collaboration and networking channel safe. Information encryption secures end-to-end conversation among teams.
The primary use case is to remotely connect to various sites and various apps and use some technological apps that are cloud-based. Check Point Remote Access was the essential platform for us to connect remotely through a secure network with an encryption key. It's also an encryption service for all information shared and obtained from this remote connection. Today, we still use it to remotely connect to computers, apps, websites, and cloud-based apps while traveling or out of the office.
We use Check PointVPN to securely connect to our main office systems, which are behind a firewall. This ensures that all incoming and outgoing traffic is encrypted and secure.
Remote Access VPN helps my team to connect our devices remotely without any limitations. It is easy to establish a secure connection among teams and connect efficiently with maximum security. Teams can share files effectively under secure networking infrastructure. When implementing projects and tasks, it conveniently troubleshoots technical issues that can affect information traffic. I can now share large size of documents with my colleagues from a remote location without any interference. It is easy to facilitate remote workers and engage them.
Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations.
We wanted to give employees the possibility to work from anywhere outside of the organization, being a house or another remote location of offices. We wanted this capability with the possibility and ease to grant them access to our perimeter network so that they could access the data or internal applications for the use of each of its functions. We wanted faster, safer, and more efficient transactions that are going to be shared within our organization based on the business.
The Remote Access VPN provides security to all computing devices across the organization. I can securely log in from a remote area and access the organization's data without physical appearance. It is easy to collaborate with colleagues in the same networking area from different locations. When interacting with our customers, I can easily change my IP address to correspond with a client's. This platform has saved the company a lot of resources that are being used to set up remote offices.
Check Point Remote Access VPN is a VPN solution that allows users to securely connect to corporate networks from remote locations. It enables users to access corporate resources such as files, applications, and network devices as if they were on the corporate network. The primary use case of Check Point Remote Access VPN is to provide secure remote access for employees, contractors, and partners who need to access corporate resources while working remotely. This can include employees working from home, traveling, or working in a remote office location.
The organization has made progress in the generational changes of information technology. We have advanced to the cloud on the Azure platform. As we saw that teleworking worked a lot during the pandemic, we kept it up and continued to work out of the office more and more until many employees rarely went in. Due to this, we were forced to look for a tool that would provide us with security in the connection between external resources and the company. We decided to implement Check Point Remote Access VPN so that our users could connect safely to the infrastructure and thus protect the information.
We needed to grow a little more at a cloud level, which means that we have had more places in which we host information, and needed to protect it. We needed to allow users to have access from the different branches in the cloud to our main branch and to access remotely. As a result of these needs, we have been looking for solutions that allow us to have quick and efficient access no matter which branch we are going to access, and to have access allowed quickly and easily as if users were inside the perimeter area of our organization.
Currently, as we are a company that constantly imports and exports solutions. We have needed to give our salespeople access to our executives since that part of retail is constantly on the move inside and outside our organization. This makes it somewhat necessary to figure out how everyone can access data since the information is being used and managed every day inside and outside of our institution. We have come to use the Check Point security services so that users can have the same access as we have inside when they are outside the organization.
We came to need a solution that would allow us to connect quickly and easily from our homes or from anywhere, and it was at this point that we integrated and enabled the Check Point Remote Access VPN. With it, our employees could log in from anywhere at any time. This solution allowed them to have the same experience that they had in the office, and they could access all the resources that were necessary for their work. This solution helped us mainly with the shift to remote work. Before the pandemic, everyone worked from the office. Today, more employees have become digital nomads.
The solution is primarily used for secure access for remote users. It's deployed as a SaaS over the cloud.
After implementing our GW and management security appliance in our public cloud infrastructure, we needed to establish P2S VPNs so that some users could connect to our offices safely to be able to access information and internal applications from anywhere. This need begins when the sales department requires access to internal resources to be able to show solutions that we sell to clients. However, these connections were mostly from public places without security, which was clearly a huge vulnerability of the company. Thanks to this tool, we managed to solve this need.
Check Point Remote Access VPN is used to allow our employees to use the corporate resources or remote access to the corporation and lightweight on resources.
Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions to business users while they are working remotely and traveling for business purposes. Our organization involves over 70% of business travel to generate revenue, and it becomes really troublesome to secure the IT devices and cloud system at such traveling times. Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.
This functionality is very practical to be able to connect to the business network from anywhere; the monitoring that can be provided and the granularity in the VPN to provide control to users is really good.
We primarily use the solution for work from home. Our main goal is to provide users with the ability to access their workstation from anywhere in the world. We provided remote access to more than 500 users during the pandemic. Check Point Remote Access VPN has worked smoothly as our appliance is capable of supporting 1000+ users. We deployed a VPN client-based solution with multi-factor authentication. The compliance check feature is useful. It is compatible with several operating systems, and it has great protection against malware. It offers a simple configuration and setup.
This product provides a secure connection to the corporate network from anywhere and safe traffic of data regardless of the possible threats in the WAN it's connected to. It also provides secure access to company apps and controls the traffic depending on each company's policies. Through it, we create layers that control or limit data traffic for specific users. I've been trained in the product and know it's one of the most effective in the business and admit to facilitating my customers to get it from our Check Point partners.
The company needs a tool that will provide users with the ability to connect from external addresses and that is where Check Point Endpoint Remote Access VPN services were contracted, which allows users to connect to our firewall. We also have Check Point firewalls in the cloud, to which people can also connect. They can then access the resources in our on-premises environment that they need to access, such as their computers, the Intranet, Salesforce, or our production applications, and have a 100% secure connection.
Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data. Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.
Check Point Remote Access VPN allows organization users to work remotely. Especially in the pandemic period, work-from-home demand has been higher than ever. I have a remarkable case about the solution. That is for a bank. They want to have remote access VPNs that can provide connections for internal users who work remotely, partners who have restricted connections to the bank environment and ATM machines that connect to core banking applications. All VPNs acted in the same internet connections but still ensure these three VPNs were separated from each other. For the requirements, deploying the VPN in VSX appliances helped to solve issues. I created three virtual instances: one for corporate users, one for partners and one for ATM machines. Applying security policies for three instances is different. Corporate users must pass two-factor authentication layers and then have access to common corporate services (like email, and chat) and the right business applications depending on their working role, and their department. Partners after authenticating successfully only have limited access to the right place that they are allowed while being unable to connect to other places. ATM machines that act 24/7 need to have continuous connections, thus, they must authenticate using a certificate and their VPN clients must be configured to re-authenticate automatically after a timeout.
We use Check Point Remote Access VPN to connect to the back-office applications.
Since SARS-COV2, most users went to work from their home office, so we needed to have an robust, secure, and stable VPN connection. We implemented Check Point VPN and we have had no problems with it. We are almost 50 users working from home securely. Also, the access rules based on VLANs have helped many users get access depending on which connection they have. For example, some users with VPN connections can only access some specific servers and ports, however, when they are on an internal LAN, they have access to the entire network.
The primary use case of this solution is to connect to our internal network for accessing servers and clusters using Check Point VPN. End-users are, for example, students accessing computer labs and licensed software that can check academic licenses only within the campus network; further, our ERP folks could make good use of the VPN solution by remotely working on the Institute Management System infrastructure and can work efficiently without any hindrance. We also use its capsule app on smartphones to connect further.
In our environment, we have many users working remotely. It's important to control the flow of traffic coming and going to these remote employees, and isolate traffic when used for business purposes. We have to allow our remote users to access services from home as though they were in the office. However, at the same time, we need to control that traffic and make sure it conforms to our policy. Our environment is complex and requires advanced policies to look at traffic in very unique ways from different users. Check Point's policy management has allowed us to do that.
Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client. Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.
With this solution, we can: 1) Securely and privately access our data from anywhere with the Check Point VPN. 2) Connect securely from any device and any asset. 3) Have 2FA enabled while connecting to the VPN in an official mail. If any person has your VPN credential, he can initiate contact for security codes to connect to the VPN. 4) Integrate our data. 5) View VPN events from the console. 6) Easily install and connect the VPN. 7) Provide colleagues with secure and seamless remote access to the corporate network. 8) Get a full picture with complete network visibility.
The Mobile Access VPN is used to provide users with remote access to company resources. Users can access the system at any time from corporate laptops as well as home PCs. It is also possible to connect from Android and IOS mobile devices. We also use the functionality of the secure Capsule Workspace container to securely provide access to corporate Web resources and mailing services from mobile devices. It is also possible to provide restricted access to partners via SSL VPN using the Check Point Mobile Web Portal fine-tuning.
We have always worked within the office. However, the COVID pandemic changed the course of our work in terms of where we had to implement new solutions so that we could all work from home. That was when I encountered Check Point; we had years with this solution in the facilities, yet, only during the pandemic did we have to innovate for a home environment. Today we have more than 6000 users working from home thanks to Check Point. This is possible due to the fact that, with a certificate and the client for this connection, every person can connect to our environment as if they were at the office.
We are hosting environments for our customers and ourselves. With Check Point Client, VPN users that aren't in their internal networks can connect via a secure connection into the internal network. Remote users use different clients (Windows, Linux, and Mac OS) so depending on the customer, there is either a client connection or a clientless approach (using a web portal). Users can also be identified if they use the Client VPN solution. If you want to identify them inside the network you have to use an IA agent. Once set up, it simply works without issues.
Remote Access VPN is one of those essential items for every organization in order to maintain seamless and highly secured connectivity between the end-user and the organization's local area network to access resources - including Jump server Databases, et cetera. No matter from which device or from which location users are accessing an organization's local resources, with the help of the Check Point VPN client they can make sure they have connected securely. Check Point offers a best-in-class encryption algorithm to ensure confidentiality and maintain integrity between the end-user and the Gateway.
It allows staff to work from home, especially now during COVID-19. You can access it from any location, and it does not require technical knowledge.
We've used Check Point VPN to move from an on-premise VPN Cisco product to a VPN built on the cloud. We decided to use Check Point as it was fully integrated with Microsoft Azure and present on the Azure marketplace. We deployed this solution on different subscriptions and used the MEP function to reduce users' latency on the VPN. The implementation has not been very easy, and the implementation of MEP has taken months. There were a lot of hotfixes to install, and the CLI configuration on the files had to be done. The configuration, in fact, can't be implemented using a GUI.
We use Check Point Remote Access VPN to provide access to employees, vendors, and advisors. They access the company resources - especially now that most people are working from home over the course of the last year. We also use it for specific companies that give us remote support to some applications, such as our parent company. Our admins access our company servers and resources. We're using Remote Access VPN with specific profiles for them that only give access to some resources. We have three distinct environments. Server, DMZ, and User/SHOP. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.
We are able to allow users to easily gain access to internal systems from outside the organization. No longer is coming into the office a necessary requirement for our users. They can seamlessly transition from home/remote work to going into the office while still having the same level of access. We also have many users that need to manage servers who are able to connect to the internal servers from anywhere - allowing them to still do their jobs from anywhere. Connecting to VPN doesn't require a ton of technical skill for those not in the technical field.
We primarily use this solution for our clients. Use cases vary, and they include VPN connectivity. It can be used as a provisional firewall and you can allow for a provisional access list, or grant permission to access or for servers or users trying to connect to the server.
Check Point Endpoint Remote Access VPN is without a doubt, really fantastic software. It allows me remote and secure access to my most important data, to the company's networks, and to corporate resources from anywhere in the world. Regardless of where I am, it guarantees the complete privacy of all our confidential information through multifactor authentication and compliance analysis of the endpoint system. All of this is very easy to configure using step-by-step wizards, and there are many guides to explain it.
We use Check Point Remote Access VPN to provide access to our corporate network and resources to remote users in a secure way. Users have access that is limited or defined by the server. Access is granted for identified devices post-posture validation. Access should be provided via VPN using multifactor authentication other than username/credentials. Users are able to connect from anywhere at anytime using both mechanisms (i.e. User VPN client or browser). This solution mitigates or minimizes data leakage issues. It is stable and scalable and requires minimal management and access provisioning.
We use this solution to permit the connection to on-premises resources to internal and external users. We use rules specific to external users based on the real access needs of the specific company, whereas, for internal users, other rules are used. Users connect to our headquarters and then through private connections, they reach the resources distributed in the various locations. Using dual-factor authentication, we improve the identity security of the users and also protect our company. Check Point has been our strategic partner for approximately 15 years.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). In addition, there are about 30 Google Cloud projects of different sizes ranging from 10 to 250 virtual machines, and they are used for development, staging, production, etc. For every project, there is one dedicated scalable instance group of the Check Point CloudGuard IaaS gateways. We user the Check Point Remote Access VPN to provide access for our employees to connect to the specified environments.
In our current dynamic, we are using this solution to provide access to data and some business applications over the internet.
We primarily use the solution to have a secure connection and to offer security integration with our remote office as well as some other companies.