We performed a comparison between Check Point Remote Access VPN and F5 BIG-IP Local Traffic Manager (LTM) based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now."
"It operates effectively, particularly during challenges like adversities or infrastructure issues."
"The most valuable feature is the seamless access."
"One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure."
"It is easy to install the Endpoint Remote Access VPN client on different platforms."
"The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
"Setting policies allow, block, and limit users' access."
"I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience."
"I think F5's tech support may be better than Citrix's because they mainly focus on the ADC product, but Citrix support covers Hypervisor, XenMobile, FAS, and ADC. And from my experience, sometimes, we face some issues that Citrix cannot handle."
"We like the capability to combine the content switching with the intrusion prevention and adding the security roles, so we can expose certain sub-pieces outside without exposing everything."
"Initial setup was straightforward. We were up and running in three hours."
"LTM."
"The most valuable feature is the F5 LTM (Local Traffic Manager). This is the part of the product most organisations will be using most. It provides the core functionality to be able to load balance services and the means and the intelligence to be able to load balance based on advanced logic, e.g., TCL scripting."
"We have found the consistency of the application always being the way it is supposed to be as its most valuable feature."
"The initial setup is easy."
"Good application firewall."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"The Linux version may have an app (similar to Windows) instead of a shell script."
"The product’s architecture is a bit distributed."
"We would like to see support for a layer seven VPN over UDP."
"The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."
"We would like to implement HTML5 (clientless access) in the product without installing any additional software."
"There was complexity in the initial setup."
"Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte."
"The ASM administration is quite complex. The topic itself is pretty complex, so it is not easy to provide a nice, clean interface. There are a lot of references and dependencies in-between the different subareas."
"The license terms for "non-commercial" will are challenging for us."
"LTM's cloud capabilities could be improved. Cloud providers all offer load balancing, but you can't get the same level of security. F5's cloud service is still not on par with its on-prem service."
"If one virtual portion is unavailable, it can cause issues."
"It reaches a point where scaling is no longer possible."
"The license terms for "non-commercial" will be a challenge for us."
"The SharePoint SSO part has some room for improvement."
"My only point of contention would be that it is a little pricey."
More Check Point Remote Access VPN Pricing and Cost Advice →
More F5 BIG-IP Local Traffic Manager (LTM) Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 4th in Remote Access with 60 reviews while F5 BIG-IP Local Traffic Manager (LTM) is ranked 1st in Application Delivery Controllers (ADC) with 116 reviews. Check Point Remote Access VPN is rated 8.8, while F5 BIG-IP Local Traffic Manager (LTM) is rated 8.2. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of F5 BIG-IP Local Traffic Manager (LTM) writes "Helps deliver applications to users in a reliable, secure, and optimized way". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange, whereas F5 BIG-IP Local Traffic Manager (LTM) is most compared with Citrix NetScaler, Fortinet FortiADC, Microsoft Azure Application Gateway, NGINX Plus and HAProxy. See our Check Point Remote Access VPN vs. F5 BIG-IP Local Traffic Manager (LTM) report.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.