We performed a comparison between Check Point Remote Access VPN and Ivanti Connect Secure based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution has good performance."
"It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"Our users find the interface very comfortable to use."
"The secure hotspot access for enabling good network connectivity is great."
"The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
"The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup."
"It is stable most of the time."
"Setup using the manuals was easy."
"The management of the solution is very simple. It allows for a single view of all the endpoints."
"The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera."
"From an end-user perspective, the setup phase is easy."
"The most valuable features of Pulse Connect Secure are multi-factor authentications, and VPNs and SSL VPNs we are using."
"The flexibility in their management is great."
"VPN tunneling is a very valuable feature of Pulse Connect Secure. I also like that it is straightforward to use, and you can see traffic logs on it."
"The initial setup is straightforward."
"The most valuable feature is being able to securely connect and use virtual desktops."
"It's a very convenient and user-friendly application."
"The product is easy to use."
"There must be a more easy-to-use GUI."
"When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."
"The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
"This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity."
"Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners."
"Connection of devices from various locations is efficient though there are a few challenges when there is a network failure."
"Sometimes the application slows down the computing device, and this affects workflows."
"We want to switch to another solution because there are some challenges with the support from Pulse. The quality of documentation is also not good. It is sometimes very hard to find documentation that provides a solution and describes how all this works."
"We need to know how many live active users there are and we can't. We even updated the server, however, we still can't see the proper level of live connections. Right now, it's showing as 300 users and my customer does not have that many users in his organization."
"Zero test FDP (Fraud Protection and Prevention) should be improved."
"There is room for improvement. I'm concerned about the frequent vulnerabilities identified. As a security product, the number of vulnerabilities is concerning."
"The solution must be more user-friendly."
"This solution normally works but at times, we have had trouble with connectivity."
"User experience and after-sales support could be better. For example, over the last couple of years, when this COVID scenario was going on, there were multiple attacks on these types of solutions. SQL has been attacked numerous times, and there were a lot of vulnerabilities, and our customers had to update and upgrade the devices every two weeks or every month. This was a headache. It could also be more scalable."
"I would like the solution to be more secure and compatible. It also needs to improve integration with other systems."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 62 reviews while Ivanti Connect Secure is ranked 7th in Enterprise Infrastructure VPN with 26 reviews. Check Point Remote Access VPN is rated 8.8, while Ivanti Connect Secure is rated 7.8. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Ivanti Connect Secure writes "Beneficial multi-factor authentications, useful SSL VPNs, and simple initial setup". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Microsoft Azure VPN Gateway, whereas Ivanti Connect Secure is most compared with Fortinet FortiClient, Cisco AnyConnect Secure Mobility Client, OpenVPN Access Server, Prisma Access by Palo Alto Networks and Ivanti Secure Access. See our Check Point Remote Access VPN vs. Ivanti Connect Secure report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.