We performed a comparison between BeyondTrust Remote Support and Check Point Remote Access VPN based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The support team who are interfacing with us, are excellent. They are on time for any response."
"The seamless integration of chat, our ITSM management software, and remote viewing/control software makes for a valuable tool."
"It has a straightforward setup. Bomgar has created a simple, lightweight deployment process."
"Bomgar has given us the ability to manage the majority of our calls from a remote location making response times quicker and more efficient."
"Bomgar is used for connecting with our end users and helping them to resolve any issues that they have on their computer."
"The file transfer feature allows IT to provide needed drivers and files without interfering with the employee's workflow."
"Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."
"Offers a secure method of access without having to install agents everywhere."
"The most valuable feature is the seamless access."
"One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure."
"The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked."
"For a basic setup, implementation is quite easy."
"The product's initial setup phase was easy."
"Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live."
"The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
"To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources."
"Lacks remote support and privileged remote access in the one product."
"There were a few employee devices that failed during the initial deployment, which required a second deployment."
"It could be more compatible with other applications. We had trouble with compatibility when it came to Entrust. This is because we had issues with Windows machines when we installed Entrust."
"I would like more insight into completed sessions. This would be nice, such as a historical log into the technician client application."
"There are not enough product partners in Turkey, making it difficult for me to get assistance."
"Lacks some kind of voice communication option."
"Static notes for hosts: If I could enter notes on a Jump Client and have them appear every time I connect to that Client, it would be a huge benefit."
"In the next release, I would like remote access to Chrome included."
"In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
"Compliance Check on Check Point should be improved by having more configurable conditions to support multi-platforms and adding more granularity."
"A characteristic to improve is the communication service under the SMTP scheme."
"Check Point Remote Access VPN could be more user-friendly."
"We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
"They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
"We have noted some stability issues."
More Check Point Remote Access VPN Pricing and Cost Advice →
BeyondTrust Remote Support is ranked 7th in Remote Access with 32 reviews while Check Point Remote Access VPN is ranked 5th in Remote Access with 62 reviews. BeyondTrust Remote Support is rated 9.0, while Check Point Remote Access VPN is rated 8.8. The top reviewer of BeyondTrust Remote Support writes "A robust, secure, and complete solution for quickly providing support and monitoring what's going on". On the other hand, the top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". BeyondTrust Remote Support is most compared with Microsoft Remote Desktop Services, TeamViewer, BeyondTrust Privileged Remote Access, F5 BIG-IP Access Policy Manager (APM) and Clarity SM, whereas Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Zscaler Zero Trust Exchange. See our BeyondTrust Remote Support vs. Check Point Remote Access VPN report.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.