Cyber Security Manager at H2O Power Limited Partnership
Real User
Scalable with a unified platform and good integration
Pros and Cons
  • "The solution has been solid for me for over five years."
  • "The ability to allow split-tunneling while still following our corporate policy needs to be on the table."

What is our primary use case?

In our environment, we have many users working remotely. It's important to control the flow of traffic coming and going to these remote employees, and isolate traffic when used for business purposes. We have to allow our remote users to access services from home as though they were in the office. However, at the same time, we need to control that traffic and make sure it conforms to our policy. Our environment is complex and requires advanced policies to look at traffic in very unique ways from different users. Check Point's policy management has allowed us to do that.

How has it helped my organization?

At the beginning of the pandemic, everyone rushed to get their employees working from home. Luckily for us, we already had a strong structure around how remote access would work and had it set up for many employees. 

With the groundwork in place, the transition to remote work was made easy by simply adjusting the policy (configuration). In part, this is because we were already prepared for a remote workforce, and that preparation came from within our organization, however, if it weren't for Check Point enabling us to adjust rapidly, then it would not have been an easy transition.

What is most valuable?

The unified platform view is great. Being able to manage NGFW alongside our Remote Access Policies allows us to control traffic in one way. Be it if our users are at home or in the office the same policy applies to them allowing us to have one corporate view on the traffic within our organization.

Being able to integrate the policy with things like Active Directory groups, Azure cloud objects, RADIUS integration, and load balancing capabilities is wonderful. All of these things are built into their NGFW policy which we leverage to implement on our Remote Access policy.

What needs improvement?

The ability to allow split-tunneling while still following our corporate policy needs to be on the table. Right now, in order to allow the same policy to apply, the users' traffic must be routed up to our NGFW before going out to the internet. Having a method to apply the same policy to the client for outbound traffic while connected to the VPN would be huge.

Some things like the compliance aspect of the VPN Client can be updated to bring it a little more modern. It's very useful for checking things like Windows Updates levels before connecting, however, it could use a facelift since it's still quite old-looking.

Buyer's Guide
Check Point Remote Access VPN
May 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
771,170 professionals have used our research since 2012.

For how long have I used the solution?

I've been managing Check Point's Remote Access VPN for five years at my current employment, and had used it before at a previous employer.

What do I think about the stability of the solution?

The solution has been solid for me for over five years.

What do I think about the scalability of the solution?

I get the impression this could scale up to whatever you need. Scaling issues might only be moving to clustered resources and setting up load balancing on gateways. Once you get big enough you should be able to scale up to your needs.

How are customer service and support?

Support has been great 98% of the time. There's always one bad experience, yet, overall I wouldn't rate them based on that. If they need to get their experts online to help solve a problem, they have plenty and are willing to work through really deep subjects. I never worry with their support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

At our organization, we did not use another solution before this. That said, I have used other products in the past. It's been many years, so I'm sure those other vendors have had time to update their products too, however, since I've been managing Remote Access with Check Point, I've always been really impressed.

How was the initial setup?

Setting up the VPN Clients is simple once you've already got the gateway in place. If you have to setup the Gateway, it will take a bit of knowledge and expertise.

What about the implementation team?

Our in-house team set it up. That said, I have been working with network devices for a long time.

What was our ROI?

ROI on the VPN User license itself returns within a couple of months of you using it. However, if you have to make the investment into buying gateways for the product, then the ROI could be one year (if your whole organization is working from home), or up to three years if you barely use it.

What's my experience with pricing, setup cost, and licensing?

You need to be an NGFW customer already. Otherwise, you'll need to purchase the gateways in order to terminate the VPN. That much should be obvious to anyone. Once you have the gateway in place, there is a VPN User license you need to purchase, however, it is very minimal in cost compared to other infrastructure.

Which other solutions did I evaluate?

We inherited the Check Point when we took over. Then, when the topic of remote access came up, it made sense to use what we had and just buy additional licensing rather than buy a whole new product.

What other advice do I have?

Check Point products are typically not cheap, however, I've found it's often due to the fact that you can do a lot with it. 

I recommend Check Point products to anyone who is going to have the time and expertise to administer them. You're going to be able to do what you want to do, engineer a design that works for you. If you want to just plug it in and forget about it, then this might not be the product for you. That said, for those who do just want to plug something in and forget about it, I warn you to be cautious. When it comes to Remote Access, you don't want to ignore this. You want to be looking at it and you want to monitor it, otherwise attackers will take advantage of that weakness. This is where Check Point allows you to monitor the edge, while granularly controlling it.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Daniel-Bass - PeerSpot reviewer
IT Architect at Bezeq
Real User
Is used to connect sites, but the scalability needs improvement
Pros and Cons
  • "We use it to connect our sites. We have a couple of sites that need to interconnect."
  • "The scalability needs improvement."

What is our primary use case?

We use it to connect our sites. We have a couple of sites that need to interconnect. They are in our cloud and our premise data center. 

What needs improvement?

The scalability needs improvement.

For how long have I used the solution?

I have been using Check Point Remote Access VPN for five years. 

What do I think about the scalability of the solution?

The solution is not very scalable. 

How was the initial setup?

The initial setup is not very straightforward. I would rate the setup a four out of ten. The solution is easy to maintain. 

What's my experience with pricing, setup cost, and licensing?

The solution is pretty expensive. I rate it an eight out of ten. 

What other advice do I have?

Overall, I will rate the solution a seven out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
May 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
771,170 professionals have used our research since 2012.
Senior Security Engineer at a consultancy with 5,001-10,000 employees
Real User
Top 5Leaderboard
Provides strong security features and offers a straightforward setup
Pros and Cons
  • "Check Point Remote Access VPN provides strong security features, including encryption, authentication, endpoint security, access control, and centralized management."
  • "Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience."

What is most valuable?

Check Point Remote Access VPN provides strong security features, including encryption, authentication, endpoint security, access control, and centralized management. These ensure data protection and access control for remote users, making it a reliable solution for maintaining security in remote access scenarios.

What needs improvement?

Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience, bringing it closer to the level of Cisco AnyConnect, which is considered more user-friendly.

For how long have I used the solution?

I have been working with Check Point Remote Access VPN for almost four years.

How are customer service and support?

My experience with tech support for Check Point Remote Access VPN was okay, but I find Cisco's support to be better. Overall, I would rate Check Point's support around six out of ten.

How would you rate customer service and support?

Neutral

How was the initial setup?

Installation of Check Point Remote Access VPN is straightforward and it involves agent deployment to user laptops, enabling easy connectivity. Maintenance is low-cost and manageable, even for small teams, as configurations are straightforward. Network security engineers need to specify network segments for traffic segregation, but overall, deployment is automated, minimizing manual intervention and complexity.

What's my experience with pricing, setup cost, and licensing?

The pricing for Check Point Remote Access VPN is average. Firewalls, whether physical or cloud-based, tend to be expensive, and Check Point's offering is no exception. While cloud options may offer more flexibility, physical devices have significant licensing costs, often totaling thousands of dollars.

What other advice do I have?

Remote Access VPN, like Check Point's solution, is user-friendly, requiring only client installation for connectivity. It is useful for employees accessing corporate networks remotely and for granting controlled access to contractors or vendors. Competitors like Cisco's AnyConnect exist but Check Point Remote Access VPN is highly regarded for its functionality and reliability.

Check Point's Remote Access VPN is user-friendly and efficient for connecting via laptops, offering a straightforward setup without complex configurations. It simplifies access to specific divisions within a corporate network, making it suitable for end-users without extensive security knowledge. Although challenges may arise with mobile connectivity, the overall experience is smooth and accessible.

MFA adds an extra layer of security to Remote Access VPN. For example, users might need to enter a code from an authenticator app on their phone in addition to their regular login credentials. This ensures enhanced verification of user identity and helps protect against unauthorized access.

Overall, I would rate Check Point Remote Access VPN as an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Eladio José Sibaja Trejos - PeerSpot reviewer
Administrador Junior Level 1 at Compuguana
Real User
Top 10
Easy to install, and makes it quick and easy to connect
Pros and Cons
  • "Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
  • "It would be good to have Remote Access VPN solutions for Check Point edge services."

What is our primary use case?

Currently, as we are a company that constantly imports and exports solutions. We have needed to give our salespeople access to our executives since that part of retail is constantly on the move inside and outside our organization. This makes it somewhat necessary to figure out how everyone can access data since the information is being used and managed every day inside and outside of our institution. We have come to use the Check Point security services so that users can have the same access as we have inside when they are outside the organization.

How has it helped my organization?

The capacity that Check Point Remote Access VPN offers is one of the best. It has made it easier for us and the team to have great mobility inside and outside the organization. If anyone must consult the services internally, they can connect quickly and simply. The agent that allows the connection is very fast to install and very fast to configure. It has streamlined a lot of the complexity that we had faced before.

What is most valuable?

Among its most valuable features is how it quickly and easily connects everyone to the VPN service. It quickly installs an agent on the computers, so that our users do not have to worry about their mobile devices being configured. It is easy to install and can run and install as a client on devices whether the user has Mac or Windows.

What needs improvement?

In the future, if this service could be installed in a faster and simpler way (rather than having it directly connected to the appliances), that would be ideal. Today, many of the solutions are not what was needed when we had perimeter security. It would be good to have Remote Access VPN solutions for Check Point edge services.

For how long have I used the solution?

We have been using the solution for three months.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
Good security, protects identity, and allows full access even in different regions
Pros and Cons
  • "The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
  • "The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately."

What is our primary use case?

Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data. 

Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.

How has it helped my organization?

The solution is giving us security when it comes to sharing our data safely through the private and secure tunnel that is created when creating the VPN. The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet. Online hackers won't be able to use your real IP address to discover your personal data, and government surveillance agencies and ISPs won't be able to monitor what you do online by snooping on your traffic.

In addition to helping you avoid government surveillance, it also helps keep your privacy safe from advertisers.

What is most valuable?

In terms of the way they ensure traffic, an example is when we use Wi-Fi in public areas.

WiFi is everywhere nowadays and it is extremely convenient to use, especially if you have a tight mobile data plan. The only problem with free WiFi is that it's often unsecured, which means you're putting your personal data at risk every time you use it. After all, cybercriminals can find out a lot about you, which can lead to them stealing your:

  • Credit card details
  • Bank account details
  • Email login credentials

However, if you use a VPN, you won't have to worry about those dangers. A VPN uses encryption to protect your online communications, making sure no one can monitor it. Basically, if a hacker tried to see your connection traffic, they would just see nonsense.

What needs improvement?

That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.

For how long have I used the solution?

I've used the solution for about 2 years.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Implementation Specialist at NTT Security
Real User
Top 5
Highly secure with good support and multiple factor authentication layers
Pros and Cons
  • "It is easy to install the Endpoint Remote Access VPN client on different platforms."
  • "Bug Fixes and enhancement requests should be remediated earlier."

What is our primary use case?

Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions.

We can connect anywhere in the world over possible ways to secure the infrastructure.

Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.

Also, we have multi-authentication so there is no chance of leakage.

How has it helped my organization?

Check Point Remote Access VPN provides multi-factor authentication layers.

We can make Data transfer more strict with Data Integrity, Encapsulation, DES,3DES, and Hashing Algorithm so that the level of security will be higher.

Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.

Multiple VPN connections can be established and share the data in a secure possible way.

What is most valuable?

It is easy to install the Endpoint Remote Access VPN client on different platforms. Within the company, we use it for Windows and macOS.

Built-in, centrally managed Compliance blade. We check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.

The stable VPN connection and uptime are also very good.

We have a centrally managed Firewall blade, which allows filtering traffic on the rule base to protect the requirement.

What needs improvement?

Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and Auditors are forced to have the latest patches in place.

Checkpoint Major version should have an extended time than the default time mentioned in the end-of-life policy document with additional prices.

Tools must be introduced and supportive in analyzing the data, flow, and threats.

We have to introduce the scripting part to work seamlessly.

For how long have I used the solution?

I've used the solution for more than four years.

What do I think about the stability of the solution?

The solution is stable. 

What do I think about the scalability of the solution?

The solution is scalable. 

How are customer service and support?

The company offers the best support overall and we can trust their advice.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time we are using this type of solution.

How was the initial setup?

The initial setup is straightforward, simple, and centralized. 

What about the implementation team?

We handled the setup in-house.

What's my experience with pricing, setup cost, and licensing?

The product is better than any other product in the marketplace. Technically sounded techies all over the place. It is cost-effective and most importantly stable and secure.

Which other solutions did I evaluate?

We trust the Check Point Software technology.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Web Developer at Netconomy Software & Consulting GmbH
User
Top 20
Compatible across devices, reasonably priced, and secures confidential information
Pros and Cons
  • "It keeps us safe when browsing the internet and when sharing confidential information with our colleagues."
  • "Sometimes the application slows down the computing device, and this affects workflows."

What is our primary use case?

The remote VPN enables us to connect our devices under a controlled network infrastructure. It protects the channels for transferring data and confidential information. 

It connects our managers with remote employees to enhance efficiency in the implementation of projects and tasks. Check Point Remote Access VPN blocks unauthorized access to our computing devices. 

It is easy to install and use this VPN for any new user. It keeps all the teams under the same collaboration and networking channel safe. Information encryption secures end-to-end conversation among teams.

How has it helped my organization?

I have experienced the most benefits while using this product in the organization. 

It keeps us safe when browsing the internet and when sharing confidential information with our colleagues. 

When working on joint projects and tasks this product prevents external cyber attacks from attacking our privacy. 

Teams operating from remote areas can customize the location features and set suitable IP addresses that serve them well. 

The speed and reliability enable us to achieve the set targets and initiate trade-offs.

What is most valuable?

It has a simple user interface that is easy to operate and set up. 

The customer support staff provides 24/7 customer support services that enhance effective service delivery. 

The premium version provides the most advanced services that are always effective. 

The cost of maintenance and privacy policies suits our daily demands. 

It is compatible with most devices and can easily integrate with most applications in the organization. 

There is no apparent IP leak and it connects firmly without disconnecting.

What needs improvement?

This version has comprehensive features that provide reliable services based on the organization's requirements. 

Sometimes the application slows down the computing device, and this affects workflows. 

Most modern VPNs offer more features that are more powerful as compared to the ones set up in this system. 

The focus of the next release should be on the compatibility and speed of this platform so that it can easily compete with other products.

It should be customized to accept more languages and more locations.

For how long have I used the solution?

I've used the solution for 14 months.

What do I think about the stability of the solution?

The operations and stability have been firm and reliable.

What do I think about the scalability of the solution?

This is great and scalable product.

How are customer service and support?

The customer support staff offers great services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with different solutions.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is increased ROI from its reliable performance.

What's my experience with pricing, setup cost, and licensing?

It is cost-effective.

Which other solutions did I evaluate?

I have only had experience with this VPN.

What other advice do I have?

The performance has been good and I recommend it to other business enterprises.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Project Manager at Digitas APAC
User
Top 5
Easy to set up with good remote access and a flexible to configure VPN
Pros and Cons
  • "This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers."
  • "Connection of devices from various locations is efficient though there are a few challenges when there is a network failure."

What is our primary use case?

Remote Access VPN helps my team to connect our devices remotely without any limitations. It is easy to establish a secure connection among teams and connect efficiently with maximum security. 

Teams can share files effectively under secure networking infrastructure. When implementing projects and tasks, it conveniently troubleshoots technical issues that can affect information traffic. 

I can now share large size of documents with my colleagues from a remote location without any interference. It is easy to facilitate remote workers and engage them.

How has it helped my organization?

This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers. The organization has benefited from a secure network that cyber attacks cannot compromise. We can safely access our servers from anywhere, anytime, without fear of losing confidential information. 

It gives the IT team an opportunity to monitor the performance of devices and control their operations. We can freely connect with our clients from remote areas and give them guidelines without physical appearance under a secure connection.

What is most valuable?

Secure remote access has enabled teams to focus on productive meetings without fear of being attacked by external ransomware attacks. Device access from remote networks has enhanced the efficient connection of teams from various areas. 

The setup process is simple, and new users can set it without any challenges. The cost and maintenance charges are relatively low as compared to most products in the market. 

Configuration of the VPN with other applications is flexible with productive performance. Identity and access management enables the IT team to categorize devices and channel them to effective network infrastructure.

What needs improvement?

My experience with the set features has always been excellent. The secure connection networking system has enabled each team to connect effectively with colleagues from anywhere. 

Connection of devices from various locations is efficient though there are a few challenges when there is a network failure. Disconnection due to internet failure may affect the entire connection and slow down the workflow. 

The setup process requires skilled manpower and dedicated teams to get the best results from the entire connection system. 

Integration of more powerful kill switch tools will enhance secure connection. 

Additional server locations can boost service delivery and cut the cost of connecting computing devices from different areas.

For how long have I used the solution?

I've used the solution for 11 months.

What do I think about the stability of the solution?

The secure connection is stable.

What do I think about the scalability of the solution?

I am impressed by the performance of this tool.

How are customer service and support?

The customer support operations have been excellent throughout.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with another VPN.

How was the initial setup?

The initial setup was successful.

What about the implementation team?

Implementation was through the vendor.

What was our ROI?

The ROI has been positive since we deployed this tool.

What's my experience with pricing, setup cost, and licensing?

The setup and licensing terms are effective.

Which other solutions did I evaluate?

This is the best solution that I have come across.

What other advice do I have?

For secure device connection and team collaboration, this is the best solution.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2024
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.