We performed a comparison between Check Point Remote Access VPN and Perimeter 81 based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution has good performance."
"It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
"This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers."
"The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
"The solution has been solid for me for over five years."
"The product's initial setup phase was easy."
"The solution is easy for administrators because you can check logs and write rules on the same page."
"The secure hotspot access for enabling good network connectivity is great."
"The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way."
"Perimeter 81 provides a very secure and non-disruptive experience."
"It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go."
"Perimeter 81 is very pretty."
"Perimeter 81 has increased my security and privacy while maintaining solid internet performance."
"Even after restarting, it tries to quickly reestablish connection which is very helpful."
"Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.)."
"It keeps us all accountable and ensures secure internet connections while we all work remotely."
"There must be a more easy-to-use GUI."
"The scalability needs improvement."
"When you need to create something, you have to follow many steps and I think that should be simplified."
"The Linux version may have an app (similar to Windows) instead of a shell script."
"The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."
"I would like this service to be easier to manage when you integrate it with third parties."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
"Compliance Check on Check Point should be improved by having more configurable conditions to support multi-platforms and adding more granularity."
"The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
"There is a very small amount of downtime."
"Currently, I am not able to define a different country or location, which can result in negative experiences as the tool is being recognized by websites and this can make it difficult to access them or force me to disable the program temporarily."
"One of our challenges is ensuring the security of our cloud-based operations."
"A Google Chrome extension would be handy instead of logging into the app."
"In the future, maybe P81 can improve the network traffic balancing and redundancy."
"Its initial setup process is complex for a hybrid environment."
"The solution's speed of upload and download is an area where it lacks"
"In order to have to bypass the login using the website, a good feature for Perimeter 81 to have is a login instance in the Perimeter 81 application. I'm using a Mac and we don't have that functionality."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 62 reviews while Perimeter 81 is ranked 8th in Enterprise Infrastructure VPN with 22 reviews. Check Point Remote Access VPN is rated 8.8, while Perimeter 81 is rated 9.2. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Sangfor EasyConnect, whereas Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and OpenVPN Access Server. See our Check Point Remote Access VPN vs. Perimeter 81 report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.