We performed a comparison between Check Point Remote Access VPN and F5 BIG-IP Local Traffic Manager (LTM) based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The product's initial setup phase was easy."
"The solution is easy for administrators because you can check logs and write rules on the same page."
"The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
"The solution implemented in the cloud allows us to easily scale in cases of user increase."
"I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience."
"It is stable most of the time."
"The initial set up is not complex."
"For a basic setup, implementation is quite easy."
"Where we are finding the AWS version helpful is when we are trying to scale up new environments. AWS Marketplace helps here a lot."
"The most valuable feature is the F5 LTM (Local Traffic Manager). This is the part of the product most organisations will be using most. It provides the core functionality to be able to load balance services and the means and the intelligence to be able to load balance based on advanced logic, e.g., TCL scripting."
"Users can see a remarkable performance difference from a qualitative sense."
"The capability is at a seven or eight out of ten."
"Traffic Learning is the most valuable feature."
"Load balancing generally brings high availability and a bigger ability to scale out. In some cases, it brings security, depending on how it is configured."
"It is a fast and available solution."
"F5 BIG-IP Local Traffic Manager (LTM) improves the resilience and quality of the application itself, the speed and the user experience for the application. The data that the users need from the application is actually acquired faster. So, it provides faster data acquisition."
"In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."
"I would like the support to be faster."
"Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server."
"Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."
"A characteristic to improve is the communication service under the SMTP scheme."
"When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"There is always room for innovation and the addition of new features."
"LTM would be improved with the inclusion of signature-based blocking."
"F5 has another solution to load balance servers on the cloud, which they got after the purchase of NGINX. It is deployed as Kubernetes or something like that, but the problem now is that they have two solutions for two situations. They should make F5 deployable on the cloud."
"A lot of functions that are attributed to iRules can actually be simple profile changes. iRules do have a certain performance impact. Therefore, instead of writing simple iRules, they can create certain profiles for classes that will perform the same function."
"The ASM administration is quite complex. The topic itself is pretty complex, so it is not easy to provide a nice, clean interface. There are a lot of references and dependencies in-between the different subareas."
"It would possibly help to get more training, even better in local languages."
"The user interface of F5 BIG-IP LTM is old and could improve."
"Cloud native integration should be provided."
"Security and Reporting."
More Check Point Remote Access VPN Pricing and Cost Advice →
More F5 BIG-IP Local Traffic Manager (LTM) Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 4th in Remote Access with 60 reviews while F5 BIG-IP Local Traffic Manager (LTM) is ranked 1st in Application Delivery Controllers (ADC) with 116 reviews. Check Point Remote Access VPN is rated 8.8, while F5 BIG-IP Local Traffic Manager (LTM) is rated 8.2. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of F5 BIG-IP Local Traffic Manager (LTM) writes "Helps deliver applications to users in a reliable, secure, and optimized way". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange, whereas F5 BIG-IP Local Traffic Manager (LTM) is most compared with Citrix NetScaler, Fortinet FortiADC, Microsoft Azure Application Gateway, NGINX Plus and HAProxy. See our Check Point Remote Access VPN vs. F5 BIG-IP Local Traffic Manager (LTM) report.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.