We performed a comparison between Check Point Harmony Mobile and Check Point Remote Access VPN based on real PeerSpot user reviews.
Find out what your peers are saying about Check Point Software Technologies, Lookout, Zimperium and others in Mobile Threat Defense."Management can see all devices on one panel and easily highlight any devices under threat."
"It is very easy for my company to get information from the product's support team."
"It also enables us to see where privacy is a concern, apps that are leaking privacy. Having an idea as to how these apps are being protected offers some level of security to the device and back into our corporate network."
"The product's initial setup phase is very straightforward."
"It is a scalable solution. Up to three hundred users are using the solution. I rate the scalability a ten out of ten."
"It has been very easy to implement and deploy."
"The solution was easy to deploy and provided a useful security enhancement for mobile devices."
"I really like the application scanning feature that scans all of the installed applications, and not only what appears in the add or remove apps, and then reports the results in the console."
"Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work."
"The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
"It is easy to install the Endpoint Remote Access VPN client on different platforms."
"To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources."
"Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
"Our users find the interface very comfortable to use."
"The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
"The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
"From a user's perspective, of course, it is always better when it is cheaper in price."
"One of the improvements that can be made is that they become compatible with Google MDM."
"Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated."
"I would like to see more visibility into the actual devices that it's protecting. In some cases, you don't want to see a lot. However, for our purposes, I would like to see more information about the applications which are installed, then have more control over what can and what cannot be installed."
"It does the process in the background and it does a wonderful job but the methodologies don't pop up. They should make it more interactive."
"There could be more automation features for the solution."
"It would be super helpful if there were more details around the risks that were found on our mobile devices."
"I would quite like to be able to block ads on my phone by blocking known inbound ad websites and services."
"We would like to see support for a layer seven VPN over UDP."
"We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."
"Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access."
"The provisioning of VPN users has room for improvement."
"We would like to implement HTML5 (clientless access) in the product without installing any additional software."
"The scalability needs improvement."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 45 reviews while Check Point Remote Access VPN is ranked 5th in Remote Access with 62 reviews. Check Point Harmony Mobile is rated 8.8, while Check Point Remote Access VPN is rated 8.8. The top reviewer of Check Point Harmony Mobile writes "Easy to implement, simple to maintain policies, and does not disrupt end-user functionality". On the other hand, the top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". Check Point Harmony Mobile is most compared with Lookout, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, VMware Workspace ONE and Zimperium, whereas Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Zscaler Zero Trust Exchange and Symantec VIP Access Manager.
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.