Head of IT Department at AS Attīstības finanšu institūcija Altum
Real User
Top 5
2023-02-14T07:53:47Z
Feb 14, 2023
The provisioning of VPN users has room for improvement. The solution can improve by providing an option to centrally manage and upgrade client applications on a PC.
My experience with the set features has always been excellent. The secure connection networking system has enabled each team to connect effectively with colleagues from anywhere. Connection of devices from various locations is efficient though there are a few challenges when there is a network failure. Disconnection due to internet failure may affect the entire connection and slow down the workflow. The setup process requires skilled manpower and dedicated teams to get the best results from the entire connection system. Integration of more powerful kill switch tools will enhance secure connection. Additional server locations can boost service delivery and cut the cost of connecting computing devices from different areas.
Sometimes it may mislead the user based on the requested location due to poor networking. Most features have capable performance that responds quickly to user requests. The cost of maintenance is high compared to most products in the market. Integrations with some applications are difficult due to poor compatibility tools. The development team should focus more on updates and integration features. I am impressed by the current performance despite the few challenges. The overall performance has been excellent, and I recommend it to others
The solution needs: Advanced monitoring and reporting capabilities in order to have a more detailed visibility into security incidents and events. It's important to note that the areas of improvement and additional features will vary depending on the specific use case and the organization's security needs, so it is recommended to contact the vendor to know more details about their roadmap and the next releases of the product. Improved scalability to allow the solution to handle larger numbers of users and devices without a significant impact on performance.
Cloud Engineer at IT Quest Solutions|interglobalmsp
User
Top 5
2022-12-30T15:07:00Z
Dec 30, 2022
They need to verify the latency in the GUI. They may need to rearrange or adjust the administrative part of the application. They must improve the documentation part of the tool since it is difficult to find relevant information. They must improve the technical support to reduce the time of resolution of cases. We have had to escalate cases that are not resolved in the priority that they were opened, resulting in operational problems.
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Real User
2022-11-06T05:13:00Z
Nov 6, 2022
We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution. This would allow us to have a tool that it is not only remote access for mobile devices but a remote access solution for virtual teams, including mobile devices such as cell phones, tablets, and other types of devices in IoT areas such as doors, houses, and medical equipment.
I would like this service to be easier to manage when you integrate it with third parties. Although it is complex to configure, I cannot complain that it is complete and it is worth being able to use and integrate it. However, any administrator would welcome any changes that made configuration simpler. We would like the ability to perform remote access with the VPN in the future with any type of device. Lately, Android applications tend to have more errors. I hope that this will be solved in the future.
Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd
Real User
2022-10-04T12:36:14Z
Oct 4, 2022
If you are new to deploying the solution, the initial setup might be difficult the first time around. I had trouble setting the policies and then resetting the device.
The VPN remote Access blade could be improved. Licensing is extremely expensive per user and more so for large companies where the number of users directly impacts the cost. The documentation for good practices and specific configurations is somewhat old, generally for versions before R80, which is why it is sometimes more challenging to understand them or be able to implement them, Also, at the support level, response times can be improved, as the technical level for this type of tool is very good.
Generally, the license is included with the Check Point gateway licensing, however, in terms of the number of users that can be activated for use, it is generally five users. In our case, we quote additional licensing and it is quite expensive for remote VPN, other manufacturers are not so expensive. The support provided is slow, in addition to the fact that the service hours are contrary to ours, which generates slower problem solving, I think it is important to improve this area.
In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system. Also, this product has limitations with headcount addition, as there are performance limitations in each security gateway the software has. The ability to allow split-tunneling while still following our corporate policy should be offered. Some things like the compliance aspect of the VPN Client can be updated so the product stays up to speed with the ever-changing environment in software security.
That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.
Cloud Support at a tech company with 51-200 employees
User
2022-05-17T05:01:00Z
May 17, 2022
At the moment, the remote Check Point VPNs are quite stable. They could improve the support they provide for Check Point. The support is always in English. Some users (who speak Spanish) have no alternative. Another very important fact is documentation and bug fixes are a little too classified in the Check Point portal to help administrators when they find problems. More documentation availability would help users to depend less on support.
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT
User
2022-02-28T14:53:00Z
Feb 28, 2022
It needs to improve the capability of the Secure browser VPN connections. Some in-house applications didn't work due to the use of JScript and the backend and front end technology for the applications. In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers.
The Linux version may have an app (similar to Windows) instead of a shell script. We have seen that in Windows and Apple systems the app is running on the system tray whereas in Linux we have to keep the Linux Terminal Window open otherwise the connection drops. Sometimes, we have noticed that the owing to installation of various antivirus and running of inbuilt firewalls (applicable to all operating systems); the connection for VPN sporadically drops and tries to reconnect. When this happens, we have to manually either disable the firewall/antivirus or reconnect the VPN again.
Cyber Security Manager at H2O Power Limited Partnership
Real User
2021-11-19T15:26:00Z
Nov 19, 2021
The ability to allow split-tunneling while still following our corporate policy needs to be on the table. Right now, in order to allow the same policy to apply, the users' traffic must be routed up to our NGFW before going out to the internet. Having a method to apply the same policy to the client for outbound traffic while connected to the VPN would be huge. Some things like the compliance aspect of the VPN Client can be updated to bring it a little more modern. It's very useful for checking things like Windows Updates levels before connecting, however, it could use a facelift since it's still quite old-looking.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
2021-11-02T20:39:00Z
Nov 2, 2021
We have not migrated to the R81 version and I do not doubt that it will have some improvements compared to the version we use today. Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor. This type of integration would undoubtedly give it a better reach and greater market with new security trends top of mind. I know that everything is moving to a cloud environment, however, for all those corporates that still do not trust such an environment, it would be favorable to offer a 2MFA service in a solution tested through a blade or in the cloud.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
2021-10-07T21:05:00Z
Oct 7, 2021
The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application. We'd be able to give a better experience to companies that already have a contract or Check Point services that deal with a work-from-home environment, giving greater scope and coverage from a single centralized dashboard.
Check Point RA VPN requires companies to take separate licenses initially so that only 5 connected users licenses are given as subscriptions. Most other competitors, like Palo Alto, provide 1000 connected user licenses for free. Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server. We have to make changes in the local directory of the respective devices.
Accounts Administrator at a non-profit with 51-200 employees
User
2021-08-31T17:22:00Z
Aug 31, 2021
A saving password option might save time for continuous disconnection to the server due to internet fluctuation problems. They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds. If you don't get on your phone right away and check on your authentications, it will kick you out. In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems. The interface needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH
Real User
2021-06-16T01:39:00Z
Jun 16, 2021
We don't have any specific complaints. We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in right from the software itself. For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent. The documentation of the software needs to be more accessible. If an end-user wants to have access to customized training from the company, that should be able to be built-in. I would add that feature.
Network Security Engineer at a manufacturing company with 5,001-10,000 employees
Real User
2021-06-15T19:04:00Z
Jun 15, 2021
There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect. The VPN client install should be specific to our environment. Our service desk does get some complaints about users not being able to connect. Sometimes it's because the VPN client has updated and they've lost their connection settings and don't have a record of the connection settings themselves. Other times, the VPN client needs to be reinstalled or upgraded to allow them to connect.
With this particular client VPN, there needs to be a feature that can glance at your credentials, of being able to look at credentials. You might hang for a bit or the execution might fail. It would be useful to see your credentials before you connect to take note to see if you are likely to have trouble connecting. They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out. They need to give a bit more time.
Network, Systems and Security Engineer at SOLTEL Group
Real User
2021-06-02T10:42:00Z
Jun 2, 2021
Despite being very intuitive, the interface needs improvements. When you need to create something, you have to follow many steps and I think that should be simplified.
ICT at a manufacturing company with 501-1,000 employees
Real User
2021-05-31T06:33:00Z
May 31, 2021
I would like to have the ability to specify different policies in a simple and quick way, depending on whether I am using the secure remote client or the SSL VPN. It would be very useful to be able to apply different policies depending on the authentication method. For example, an 801x authentication can have different native permissions from those who enter the username and password. In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems.
We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved.
We would like to see support for a layer seven VPN over UDP.-- currently some VPN solution are working on Layer 7 Platform. The updates under Windows 10 are not always up to date, and we have trouble upgrading remote clients. We have also had trouble deploying new clients.-- The Check Point Remote VPN new client is giving trouble us during upgradation with older version of Windows 10
* The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed. This is valid for at least software version E82.30, which we currently use. * In addition, there is no full client of the Check Point Remote Access VPN available for the Linux operating systems families. That is important since some of our administrators prefer to use this OS even on their home PCs. We hope that Check Point would develop a client for Linux in the future.
Network Security Engineer at a financial services firm with 51-200 employees
Real User
2020-08-03T06:11:00Z
Aug 3, 2020
Currently, we're using Check Point Endpoint Remote Access VPN R70.30.03. That's the latest version of R70.30. We haven't upgraded to R80 yet, but all of our firewalls are R80. We've been through many iterations of the Endpoint VPN client. I remember awhile ago, it was very difficult to deploy and not have problems, but they've come a long way. Now, it's a lot better. I have worked so much on this in the past with Check Point that they actually had their vice president of product development call me. I remember one of the things that I told him need room for improvement, which I still haven't seen: When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client. They need to improve deploying a new Endpoint Remote Access VPN client and updating existing Endpoint Remote Access VPN clients. Especially if you want to deploy a new one, it's not an easy process. Their software doesn't really support creating a new Endpoint Remote Access VPN client. There is a lot of manual activity. They need to automate it better. You have to create a generic client, download it to a computer, and install it to the computer. Then, you have to find a file deep inside the directory that it creates. It's like a text file, then you take that text file out and edit the settings in it. For example, I have to tell it to connect to a site which contains our firewalls or else it's like a phone with no phone numbers and I have to put in the phone numbers. This should be done when I download the client the first time from their GUI, but it is not. Instead, I have to install a generic blank version on a computer, find a text file, and edit the text file with the sites of firewalls that the users have to connect to specific to my company. I have to make other setting changes in that version, save it, reboot the computer, find the file again, take that file out of the computer, upload it to GUI, and deploy a new version. Then, I install it after I uninstalled the old one. Of course, all the uninstalls require reboots. So, I am rebooting it like five times now. After that, I have to install it and check the settings. Half the time they don't save the way you want them to save. It is very tedious and terrible. Even learning that process was a nightmare, because it's not like they have a nice article that explains it to you. They don't. I was bumping my head up against the wall with support for almost six or seven months trying to figure that out. Half of them didn't even know how to do it. That was miserable. But now that I'm an expert on it, I can probably do it within a half a day to three days depending on if it gives me problems or not. That's still miserable, and it should be as easy as: I upload the new version of the client, put in the information that I want it to have on the settings, click download, and install, then it works. It should be that easy. There's really no reason why it's not, except for they didn't improve that process nor have they developed that area. It makes me think that their interest isn't in VPN solutions, even though it should be because it's something that they offer. Otherwise, their support is great.
Senior System Engineer at Thai Transmission Industry
Real User
2020-01-26T09:26:00Z
Jan 26, 2020
In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.
Remote secure access VPN is a solution that provides users with remote access to an organization’s network. The host may have VPN client software loaded or use a web-based client. The solution leverages security features like multi-factor authentication, endpoint scanning, and encryption of all data in motion.
Check Point Remote Access VPN provides individuals with protected and efficient access to a company network from anywhere. This strategy fosters collaboration and connectivity between...
The provisioning of VPN users has room for improvement. The solution can improve by providing an option to centrally manage and upgrade client applications on a PC.
My experience with the set features has always been excellent. The secure connection networking system has enabled each team to connect effectively with colleagues from anywhere. Connection of devices from various locations is efficient though there are a few challenges when there is a network failure. Disconnection due to internet failure may affect the entire connection and slow down the workflow. The setup process requires skilled manpower and dedicated teams to get the best results from the entire connection system. Integration of more powerful kill switch tools will enhance secure connection. Additional server locations can boost service delivery and cut the cost of connecting computing devices from different areas.
I think Check Point Remote Access VPN is good enough to suffice our needs. At present, I don't have any complaints about the tool.
Sometimes it may mislead the user based on the requested location due to poor networking. Most features have capable performance that responds quickly to user requests. The cost of maintenance is high compared to most products in the market. Integrations with some applications are difficult due to poor compatibility tools. The development team should focus more on updates and integration features. I am impressed by the current performance despite the few challenges. The overall performance has been excellent, and I recommend it to others
The solution needs: Advanced monitoring and reporting capabilities in order to have a more detailed visibility into security incidents and events. It's important to note that the areas of improvement and additional features will vary depending on the specific use case and the organization's security needs, so it is recommended to contact the vendor to know more details about their roadmap and the next releases of the product. Improved scalability to allow the solution to handle larger numbers of users and devices without a significant impact on performance.
They need to verify the latency in the GUI. They may need to rearrange or adjust the administrative part of the application. They must improve the documentation part of the tool since it is difficult to find relevant information. They must improve the technical support to reduce the time of resolution of cases. We have had to escalate cases that are not resolved in the priority that they were opened, resulting in operational problems.
We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution. This would allow us to have a tool that it is not only remote access for mobile devices but a remote access solution for virtual teams, including mobile devices such as cell phones, tablets, and other types of devices in IoT areas such as doors, houses, and medical equipment.
I would like this service to be easier to manage when you integrate it with third parties. Although it is complex to configure, I cannot complain that it is complete and it is worth being able to use and integrate it. However, any administrator would welcome any changes that made configuration simpler. We would like the ability to perform remote access with the VPN in the future with any type of device. Lately, Android applications tend to have more errors. I hope that this will be solved in the future.
If you are new to deploying the solution, the initial setup might be difficult the first time around. I had trouble setting the policies and then resetting the device.
The VPN remote Access blade could be improved. Licensing is extremely expensive per user and more so for large companies where the number of users directly impacts the cost. The documentation for good practices and specific configurations is somewhat old, generally for versions before R80, which is why it is sometimes more challenging to understand them or be able to implement them, Also, at the support level, response times can be improved, as the technical level for this type of tool is very good.
Generally, the license is included with the Check Point gateway licensing, however, in terms of the number of users that can be activated for use, it is generally five users. In our case, we quote additional licensing and it is quite expensive for remote VPN, other manufacturers are not so expensive. The support provided is slow, in addition to the fact that the service hours are contrary to ours, which generates slower problem solving, I think it is important to improve this area.
In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system. Also, this product has limitations with headcount addition, as there are performance limitations in each security gateway the software has. The ability to allow split-tunneling while still following our corporate policy should be offered. Some things like the compliance aspect of the VPN Client can be updated so the product stays up to speed with the ever-changing environment in software security.
That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.
At the moment, the remote Check Point VPNs are quite stable. They could improve the support they provide for Check Point. The support is always in English. Some users (who speak Spanish) have no alternative. Another very important fact is documentation and bug fixes are a little too classified in the Check Point portal to help administrators when they find problems. More documentation availability would help users to depend less on support.
Check Point Remote Access VPN could be more user-friendly.
It needs to improve the capability of the Secure browser VPN connections. Some in-house applications didn't work due to the use of JScript and the backend and front end technology for the applications. In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers.
The Linux version may have an app (similar to Windows) instead of a shell script. We have seen that in Windows and Apple systems the app is running on the system tray whereas in Linux we have to keep the Linux Terminal Window open otherwise the connection drops. Sometimes, we have noticed that the owing to installation of various antivirus and running of inbuilt firewalls (applicable to all operating systems); the connection for VPN sporadically drops and tries to reconnect. When this happens, we have to manually either disable the firewall/antivirus or reconnect the VPN again.
The ability to allow split-tunneling while still following our corporate policy needs to be on the table. Right now, in order to allow the same policy to apply, the users' traffic must be routed up to our NGFW before going out to the internet. Having a method to apply the same policy to the client for outbound traffic while connected to the VPN would be huge. Some things like the compliance aspect of the VPN Client can be updated to bring it a little more modern. It's very useful for checking things like Windows Updates levels before connecting, however, it could use a facelift since it's still quite old-looking.
We have not migrated to the R81 version and I do not doubt that it will have some improvements compared to the version we use today. Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor. This type of integration would undoubtedly give it a better reach and greater market with new security trends top of mind. I know that everything is moving to a cloud environment, however, for all those corporates that still do not trust such an environment, it would be favorable to offer a 2MFA service in a solution tested through a blade or in the cloud.
The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application. We'd be able to give a better experience to companies that already have a contract or Check Point services that deal with a work-from-home environment, giving greater scope and coverage from a single centralized dashboard.
Check Point RA VPN requires companies to take separate licenses initially so that only 5 connected users licenses are given as subscriptions. Most other competitors, like Palo Alto, provide 1000 connected user licenses for free. Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server. We have to make changes in the local directory of the respective devices.
A saving password option might save time for continuous disconnection to the server due to internet fluctuation problems. They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds. If you don't get on your phone right away and check on your authentications, it will kick you out. In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems. The interface needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.
We don't have any specific complaints. We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in right from the software itself. For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent. The documentation of the software needs to be more accessible. If an end-user wants to have access to customized training from the company, that should be able to be built-in. I would add that feature.
There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect. The VPN client install should be specific to our environment. Our service desk does get some complaints about users not being able to connect. Sometimes it's because the VPN client has updated and they've lost their connection settings and don't have a record of the connection settings themselves. Other times, the VPN client needs to be reinstalled or upgraded to allow them to connect.
With this particular client VPN, there needs to be a feature that can glance at your credentials, of being able to look at credentials. You might hang for a bit or the execution might fail. It would be useful to see your credentials before you connect to take note to see if you are likely to have trouble connecting. They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out. They need to give a bit more time.
Despite being very intuitive, the interface needs improvements. When you need to create something, you have to follow many steps and I think that should be simplified.
I would like to have the ability to specify different policies in a simple and quick way, depending on whether I am using the secure remote client or the SSL VPN. It would be very useful to be able to apply different policies depending on the authentication method. For example, an 801x authentication can have different native permissions from those who enter the username and password. In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems.
We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved.
We would like to see support for a layer seven VPN over UDP.-- currently some VPN solution are working on Layer 7 Platform. The updates under Windows 10 are not always up to date, and we have trouble upgrading remote clients. We have also had trouble deploying new clients.-- The Check Point Remote VPN new client is giving trouble us during upgradation with older version of Windows 10
* The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed. This is valid for at least software version E82.30, which we currently use. * In addition, there is no full client of the Check Point Remote Access VPN available for the Linux operating systems families. That is important since some of our administrators prefer to use this OS even on their home PCs. We hope that Check Point would develop a client for Linux in the future.
Currently, we're using Check Point Endpoint Remote Access VPN R70.30.03. That's the latest version of R70.30. We haven't upgraded to R80 yet, but all of our firewalls are R80. We've been through many iterations of the Endpoint VPN client. I remember awhile ago, it was very difficult to deploy and not have problems, but they've come a long way. Now, it's a lot better. I have worked so much on this in the past with Check Point that they actually had their vice president of product development call me. I remember one of the things that I told him need room for improvement, which I still haven't seen: When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client. They need to improve deploying a new Endpoint Remote Access VPN client and updating existing Endpoint Remote Access VPN clients. Especially if you want to deploy a new one, it's not an easy process. Their software doesn't really support creating a new Endpoint Remote Access VPN client. There is a lot of manual activity. They need to automate it better. You have to create a generic client, download it to a computer, and install it to the computer. Then, you have to find a file deep inside the directory that it creates. It's like a text file, then you take that text file out and edit the settings in it. For example, I have to tell it to connect to a site which contains our firewalls or else it's like a phone with no phone numbers and I have to put in the phone numbers. This should be done when I download the client the first time from their GUI, but it is not. Instead, I have to install a generic blank version on a computer, find a text file, and edit the text file with the sites of firewalls that the users have to connect to specific to my company. I have to make other setting changes in that version, save it, reboot the computer, find the file again, take that file out of the computer, upload it to GUI, and deploy a new version. Then, I install it after I uninstalled the old one. Of course, all the uninstalls require reboots. So, I am rebooting it like five times now. After that, I have to install it and check the settings. Half the time they don't save the way you want them to save. It is very tedious and terrible. Even learning that process was a nightmare, because it's not like they have a nice article that explains it to you. They don't. I was bumping my head up against the wall with support for almost six or seven months trying to figure that out. Half of them didn't even know how to do it. That was miserable. But now that I'm an expert on it, I can probably do it within a half a day to three days depending on if it gives me problems or not. That's still miserable, and it should be as easy as: I upload the new version of the client, put in the information that I want it to have on the settings, click download, and install, then it works. It should be that easy. There's really no reason why it's not, except for they didn't improve that process nor have they developed that area. It makes me think that their interest isn't in VPN solutions, even though it should be because it's something that they offer. Otherwise, their support is great.
In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.