We performed a comparison between Check Point Remote Access VPN and Ivanti Connect Secure based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"The solution has good performance."
"I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience."
"It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents."
"The secure hotspot access for enabling good network connectivity is great."
"The solution is easy for administrators because you can check logs and write rules on the same page."
"Our users find the interface very comfortable to use."
"A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme."
"It is easy to install the Endpoint Remote Access VPN client to different platforms."
"It is a scalable solution...The technical support team of the solution is very good."
"The product is easy to use."
"The most valuable feature is being able to securely connect and use virtual desktops."
"From an end-user perspective, the setup phase is easy."
"The flexibility in their management is great."
"It is customer-friendly. It is quite easy for our users to connect. There is also the flexibility of the features."
"What I like the most about Pulse Connect Secure is that it's user-friendly. It's easy to use. You just need to connect, and that's it."
"I can safely say this is one of the best solutions I have seen for VPN access. It can achieve what other vendors may not be able to. This product will train you about exactly what an SSL should be. You can leverage it to do whatever you wish, the way you wish to do it. This is the solution if you want a perfectly scalable product for your enterprise that can help your mobile users and integrate with the latest technologies."
"VPN tunneling is a very valuable feature of Pulse Connect Secure. I also like that it is straightforward to use, and you can see traffic logs on it."
"There must be a more easy-to-use GUI."
"Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication."
"You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable MEP function is not so easy to size the gateway licenses."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds."
"The VPN remote Access blade could be improved."
"The provisioning of VPN users has room for improvement."
"Check Point Remote Access VPN's enterprise support could be improved."
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"User experience and after-sales support could be better. For example, over the last couple of years, when this COVID scenario was going on, there were multiple attacks on these types of solutions. SQL has been attacked numerous times, and there were a lot of vulnerabilities, and our customers had to update and upgrade the devices every two weeks or every month. This was a headache. It could also be more scalable."
"There is room for improvement. I'm concerned about the frequent vulnerabilities identified. As a security product, the number of vulnerabilities is concerning."
"The most valuable features of Pulse Connect Secure are the user-friendly connection and interconnecting."
"Pulse Connect Secure could improve by having better integration with NAC solutions, such as Cisco ClearPass integration with Pulse Connect Secure. Additionally, they need better integration with Microsoft Azure AD and Azure Authenticator."
"The product could use additional dashboards."
"Ivanti Connect Secure needs to have faster connections. It also needs to improve the stability."
"The support team of the product needs improvement. Sometimes we have issues with multiple authentications, but there is no help from the support team."
"I would like the solution to be more secure and compatible. It also needs to improve integration with other systems."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 62 reviews while Ivanti Connect Secure is ranked 7th in Enterprise Infrastructure VPN with 26 reviews. Check Point Remote Access VPN is rated 8.8, while Ivanti Connect Secure is rated 7.8. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Ivanti Connect Secure writes "Beneficial multi-factor authentications, useful SSL VPNs, and simple initial setup". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Microsoft Azure VPN Gateway, whereas Ivanti Connect Secure is most compared with Fortinet FortiClient, Cisco AnyConnect Secure Mobility Client, OpenVPN Access Server, Prisma Access by Palo Alto Networks and Ivanti Secure Access. See our Check Point Remote Access VPN vs. Ivanti Connect Secure report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.