We performed a comparison between BeyondTrust Privileged Remote Access and Check Point Remote Access VPN based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."This product is very stable and scalable. This is an excellent platform."
"The scalability is excellent."
"It is a real fortress. Its security is very strong. Multi-factor came as a feature out-of-the-box, which was big for us. That helps us meet another compliance requirement. It enforces encryption. Nobody can see what we are doing in our remote system if they happen to be listening for unencrypted traffic. That is its biggest strength."
"Based on the feedback from my colleagues who have never complained about the technical support, I would say that the product's support team is good."
"It's a stable product. Based on the demos and interaction with it, it was stable."
"I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers."
"Its initial setup process is straightforward."
"The most valuable feature is that this solution can be implemented regardless of the operating system."
"Scalability is great. We have been able to grow as a corporation due in part to this type of solution."
"Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
"It is a scalable solution...The technical support team of the solution is very good."
"The solution has been solid for me for over five years."
"The ability to create your trigger data domains is the solution's most valuable feature."
"Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live."
"The clients of the customers have a facility to access the enterprise network."
"There is no connectivity to the appliance side. There is no API, and it is just difficult for me to capture what version the device is on without going in and doing screenshots. It is a little too secure in that regard, where they don't even trust their product owner. Since a lot of hacks come from the inside, they are probably doing what they need to do out of necessity. It is just that I have to work pretty hard to produce compliance data on the box."
"They could probably integrate a wizard or something like that to add a new use case. It could be something that makes it easier to add a new use case."
"The price is pretty expensive."
"The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully."
"The integration of the solution with many platforms is a difficult area to manage and needs to be made easy."
"The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it an area of concern where improvements are required."
"Its access process for third-party vendors needs to be simplified."
"In terms of the ability to automate the creation of new accounts within it, it's still a bit laborious."
"When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."
"Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication."
"There is always room for innovation and the addition of new features."
"There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect."
"Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte."
"In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."
"Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access."
"Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."
More BeyondTrust Privileged Remote Access Pricing and Cost Advice →
More Check Point Remote Access VPN Pricing and Cost Advice →
BeyondTrust Privileged Remote Access is ranked 6th in Remote Access with 21 reviews while Check Point Remote Access VPN is ranked 5th in Remote Access with 62 reviews. BeyondTrust Privileged Remote Access is rated 8.6, while Check Point Remote Access VPN is rated 8.8. The top reviewer of BeyondTrust Privileged Remote Access writes "Our support team can do so much more without having to actively engage our customers, which saves us time and money". On the other hand, the top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". BeyondTrust Privileged Remote Access is most compared with CyberArk Privileged Access Manager, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service), WALLIX Bastion, BeyondTrust Remote Support and BeyondTrust Password Safe, whereas Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Zscaler Zero Trust Exchange. See our BeyondTrust Privileged Remote Access vs. Check Point Remote Access VPN report.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.