We performed a comparison between AWS PrivateLink and Check Point Remote Access VPN based on real PeerSpot user reviews.
Find out what your peers are saying about OpenVPN, Fortinet, Cisco and others in Enterprise Infrastructure VPN."It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"The solution has good performance."
"It is a very stable solution. Stability-wise, I rate the solution a ten out of ten."
"The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
"The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
"The solution has been solid for me for over five years."
"Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
"This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers."
"Check Point Remote Access VPN is a stable solution."
"The ability to create your trigger data domains is the solution's most valuable feature."
"There must be a more easy-to-use GUI."
"Security is an area of concern in the product where the solution needs to improve."
"Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience."
"It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices."
"We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
"Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"Compliance Check on Check Point should be improved by having more configurable conditions to support multi-platforms and adding more granularity."
"This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity."
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified."
More Check Point Remote Access VPN Pricing and Cost Advice →
AWS PrivateLink is ranked 15th in Enterprise Infrastructure VPN with 1 review while Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 60 reviews. AWS PrivateLink is rated 7.0, while Check Point Remote Access VPN is rated 8.8. The top reviewer of AWS PrivateLink writes "A highly stable tool that needs to improve its security". On the other hand, the top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". AWS PrivateLink is most compared with AWS Direct Connect, Microsoft Azure VPN Gateway, Prisma Access by Palo Alto Networks, Perimeter 81 and NordLayer, whereas Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.