We performed a comparison between Check Point Remote Access VPN and F5 BIG-IP Local Traffic Manager (LTM) based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is stable most of the time."
"I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience."
"The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
"Setting policies allow, block, and limit users' access."
"Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations."
"The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out."
"Once we install and connect the VPN service, it keeps on running until we disconnect."
"The product's initial setup phase was easy."
"It has helped a lot to protect our organization from external attacks, especially XSS or XSRF types of attacks."
"We plan to create packages of services from which it will be possible to build comprehensive tailor-made solutions."
"We have found the consistency of the application always being the way it is supposed to be as its most valuable feature."
"The most valuable feature is customization."
"The F5 GTM/BIGIP DNS (Global Traffic Manager) is a valuable feature. This feature allows for DNS load balancing, which means that high availability and load sharing can be done across services locally, as well as across datacenters with advanced capabilities."
"It has made it a single entry point for all users, verging across all the VPCs. It is more of an SSO solution versus multitier user loggin."
"The solution could improve the ease of use, the management could be simplified. Other solutions are easier to use."
"The most valuable feature is the F5 LTM (Local Traffic Manager). This is the part of the product most organisations will be using most. It provides the core functionality to be able to load balance services and the means and the intelligence to be able to load balance based on advanced logic, e.g., TCL scripting."
"Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"The provisioning of VPN users has room for improvement."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
"Generally, the license is included with the Check Point gateway licensing, however, in terms of the number of users that can be activated for use, it is generally five users."
"Sometimes the application slows down the computing device, and this affects workflows."
"Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server."
"They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
"I would like there to be more device security. I would like the tool to support SSL links, along with SSL and TLS."
"Lacking in free training to help users understand the product more, so they would know how to correctly use it. Like other vendors and their products, becoming more proactive is an area for improvement."
"If we decide to migrate to the cloud, I don't think that BIG-IP is a good solution and we probably won't use it."
"They could improve the product's ease of use. There is some confusion how to operate it."
"F5 could improve the rule-setting capabilities in the GUI, and they need to simplify web management. For example, the menus in the Citrix GUI are easier to navigate, with a clean structure and layout."
"The GUI needs improvement."
"Not everything is intuitive."
"Certificate management needs improvement. I would like automated deployment of new certificates without manual intervention to be in the next release of this product."
More Check Point Remote Access VPN Pricing and Cost Advice →
More F5 BIG-IP Local Traffic Manager (LTM) Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 4th in Remote Access with 60 reviews while F5 BIG-IP Local Traffic Manager (LTM) is ranked 1st in Application Delivery Controllers (ADC) with 116 reviews. Check Point Remote Access VPN is rated 8.8, while F5 BIG-IP Local Traffic Manager (LTM) is rated 8.2. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of F5 BIG-IP Local Traffic Manager (LTM) writes "Helps deliver applications to users in a reliable, secure, and optimized way". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange, whereas F5 BIG-IP Local Traffic Manager (LTM) is most compared with Citrix NetScaler, Fortinet FortiADC, Microsoft Azure Application Gateway, NGINX Plus and HAProxy. See our Check Point Remote Access VPN vs. F5 BIG-IP Local Traffic Manager (LTM) report.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.