We performed a comparison between BeyondTrust Privileged Remote Access and Check Point Remote Access VPN based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's a stable product. Based on the demos and interaction with it, it was stable."
"One of the features that I really like about it is the ability to set a start date, time, and end date for the access. For example, you can set the access for a person from tomorrow, Monday, or Tuesday and ending on a specific period of the day or a specific date. That's really quite helpful."
"The privileged remote access platform is able to track and record everything that happens within a session."
"The scalability is excellent."
"Its initial setup process is straightforward."
"Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that."
"We like the integration with Active Directory. It allows us to discover the endpoints and user accounts that need protection. It's a good way of securing our privileged access."
"The project goal was to allow staff to run applications with admin privileges without being admins, which was the product's most important feature."
"The solution offers high scalability as far as adding more users."
"For a basic setup, implementation is quite easy."
"The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
"Technical support has been excellent."
"Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations."
"It is easy to install the Endpoint Remote Access VPN client to different platforms."
"The product's initial setup phase was easy."
"One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities."
"Its access process for third-party vendors needs to be simplified."
"The integration client, backup solution, and SSO setup and provisioning could be improved. There isn't any documented or supported user provisioning currently, which slows down the processes of onboarding and assigning permissions. I would like to see this improved soon."
"It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution."
"One of our gaps or pain points is having multi-factor authentication at the endpoint and using the PRA password injection from BeyondTrust, which does not work in our environment. We can only have MFA at the login of BeyondTrust to check out the password. Therefore, we can't meet our security requirements of having it on the endpoint."
"The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it an area of concern where improvements are required."
"They could probably integrate a wizard or something like that to add a new use case. It could be something that makes it easier to add a new use case."
"The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully."
"When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer."
"I would like this service to be easier to manage when you integrate it with third parties."
"They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
"This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity."
"Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience."
"The provisioning of VPN users has room for improvement."
"There was complexity in the initial setup."
"The ability to allow split-tunneling while still following our corporate policy needs to be on the table."
"The cost of maintenance is high compared to most products in the market."
More BeyondTrust Privileged Remote Access Pricing and Cost Advice →
More Check Point Remote Access VPN Pricing and Cost Advice →
BeyondTrust Privileged Remote Access is ranked 6th in Remote Access with 21 reviews while Check Point Remote Access VPN is ranked 5th in Remote Access with 60 reviews. BeyondTrust Privileged Remote Access is rated 8.6, while Check Point Remote Access VPN is rated 8.8. The top reviewer of BeyondTrust Privileged Remote Access writes "Our support team can do so much more without having to actively engage our customers, which saves us time and money". On the other hand, the top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". BeyondTrust Privileged Remote Access is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service), BeyondTrust Remote Support and BeyondTrust Password Safe, whereas Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange. See our BeyondTrust Privileged Remote Access vs. Check Point Remote Access VPN report.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.