We performed a comparison between Check Point Remote Access VPN and N-able Take Control based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I found the MEP feature the most valuable. This has improved users' latency allowing the users to connect to the nearest Azure Check Point VM."
"One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities."
"The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
"Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
"The management of the solution is very simple. It allows for a single view of all the endpoints."
"The policies are easy to use."
"Check Point has been perfect for protecting us from any type of attack or data theft during remote management."
"For a basic setup, implementation is quite easy."
"The most valuable part of N-able Take Control is being able to remotely access your customer's site. You are able to view their network. Once you have it set up, it's always available. N-able Take Control can be used even when other remote access controls have been made."
"Take Control enables you to collaborate with end users. It's for supporting a workstation where you want the person on the other side to see you moving their mouse, and you can work with them."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
"We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
"We have noted some stability issues."
"In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems."
"Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."
"I would like this service to be easier to manage when you integrate it with third parties."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable MEP function is not so easy to size the gateway licenses."
"We've seen some latency problems in AWS environments. Aside from that, it's a pretty solid service."
"The dashboards I do not use because there are issues. The solution monitors your antivirus and other programs but it does not seem to work well."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 5th in Remote Access with 62 reviews while N-able Take Control is ranked 19th in Remote Access with 2 reviews. Check Point Remote Access VPN is rated 8.8, while N-able Take Control is rated 9.0. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of N-able Take Control writes "Valuable remote access feature, highly stable, and scalable". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Zscaler Zero Trust Exchange, whereas N-able Take Control is most compared with TeamViewer, Dameware Remote Support and Microsoft Remote Desktop Services. See our Check Point Remote Access VPN vs. N-able Take Control report.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.