We performed a comparison between Check Point Remote Access VPN and F5 BIG-IP Local Traffic Manager (LTM) based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
"The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked."
"Technical support has been excellent."
"The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
"A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme."
"It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now."
"Setup using the manuals was easy."
"Scalability is great. We have been able to grow as a corporation due in part to this type of solution."
"It provides first-tier firewalling, for you application. And it provides server load-balancing, it provides optimization, and it provides a proxy feature, where your users cannot directly access your server. It acts as a fully proxy architecture. It has client-side and server-side connections, both, and they're separate."
"The support from F5 BIG-IP LTM is good."
"The most valuable feature is customization."
"We like is how they integrate nicely with the Oracle PeopleSoft application."
"The occasion in which we needed technical support, we didn't have problems with them, because they always answered our questions without any trouble."
"The most valuable features are the WAF and the big IP."
"Valuable features include Link Controller and Server Load Balancer."
"It is a very good, flexible solution. It helps us to catch up on flaws in our partner solutions on top of its load balancing feature."
"Compliance Check on Check Point should be improved by having more configurable conditions to support multi-platforms and adding more granularity."
"The main feature that would be improved within Check Point Remote Access is its operation within Linux OS, as it currently does not have many features for that OS."
"There were some issues with automation and instability."
"A characteristic to improve is the communication service under the SMTP scheme."
"Connection of devices from various locations is efficient though there are a few challenges when there is a network failure."
"The product’s architecture is a bit distributed."
"In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."
"Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."
"Its scalability and deployment should be better. It should be more scalable, and it should be easier to deploy."
"They need to develop the reporting tools further."
"F5 BIG-IP Local Traffic Manager is expensive. Pricing needs to be improved."
"BIG-IP LTM is taking a long time to mature in cloud environments. They plan to improve cloud integration in the next version, but it isn't out yet. It's essential because more companies are moving to the cloud these days and using things like Kubernetes or microservices. F5 needs to improve in that direction, and they are."
"The GUI needs improvement."
"It would be good to have better traffic and better data. It would be nice to have more granularity to see packets in terms of the header details, the analytics, etc. It would be nice if that was also part of it and to have analytics added to the traffic."
"A more intuitive interface would be helpful."
"We need best-practice information. They have something called DevCentral and a blog. But we want something from F5 itself regarding how to tackle the false-positive configurations. If you go into detail with so many configurations it will find so many false positives from the moment it is enabled that it will quickly impact your applications, and it will not work."
More Check Point Remote Access VPN Pricing and Cost Advice →
More F5 BIG-IP Local Traffic Manager (LTM) Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 4th in Remote Access with 60 reviews while F5 BIG-IP Local Traffic Manager (LTM) is ranked 1st in Application Delivery Controllers (ADC) with 116 reviews. Check Point Remote Access VPN is rated 8.8, while F5 BIG-IP Local Traffic Manager (LTM) is rated 8.2. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of F5 BIG-IP Local Traffic Manager (LTM) writes "Helps deliver applications to users in a reliable, secure, and optimized way". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange, whereas F5 BIG-IP Local Traffic Manager (LTM) is most compared with Citrix NetScaler, Fortinet FortiADC, Microsoft Azure Application Gateway, NGINX Plus and HAProxy. See our Check Point Remote Access VPN vs. F5 BIG-IP Local Traffic Manager (LTM) report.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.