We performed a comparison between Check Point Remote Access VPN and Prisma Access by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution has good performance."
"It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"Our users find the interface very comfortable to use."
"The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
"The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera."
"The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
"We can integrate remote access to our branches through Check Point services."
"It offers a simple configuration and setup."
"The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked."
"Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
"The visibility perspective is pretty cool. If I want to know how much data is being used for a specific project, I can look at how much data has been used, from which region, and which users have been connected. That visibility is very good so that I can see how many licenses we have and how many are used."
"The users can securely access any cloud data centers or cloud platforms. In terms of the features, it has all the features that Palo Alto Next-Generation Firewall has. It is also very stable and scalable."
"It has predefined or preconfigured rules, which are getting periodically updated. They are providing continuous improvements and periodically updating all search queries that they are looking for. That is one thing that helps us to stay vigilant and focused. If we query our AWS account for any breaches or vulnerabilities with any of the cloud tests, and it alerts us based on these predefined rules. It also provides an option to configure our own rules, and based on these rules, it can query the cloud trail logs, pull the information, and trigger alerts in real-time. I haven't explored this feature much because there are multiple accounts, and we don't have enough time to explore this feature. It also provides multiple integrations. When vulnerabilities or breaches are happening, you should be aware of them immediately. It provides integration with tools such as Slack, PagerDuty so that you can get alerted as soon as the high severity stuff comes up. For example, you have a security group that has allowed public traffic on port 22. As TechOps, you should be aware of this immediately. You cannot scan each machine or look into all security groups to identify it. So, Prisma helps us and alerts us when this kind of high-priority stuff comes up. It has different statistics, analytics, and graphs for data. The description of alerts is also pretty good. They describe what are the possible causes for this and what are the solutions. From Prisma Cloud, you can directly go to the AWS account. When you click on an alert, a resource, or a resource ID, it takes you to the AWS console where you need to log in. If you are already logged in, it will take you to that instance directly, and you can fix the issue there. I have found this feature very useful."
"Palo Alto Firewall is one of the best firewalls in the world."
"We have an application called ADEM that helps us troubleshoot network-related issues. It helps us to isolate an issue whether it is on the ISP level, endpoint level, or system access level."
"Prisma Access by Palo Alto Networks is a seamless solution."
"I like it because it's very easy to use. You install the client and you have to know your gateway, but that's something we give to our users. Beyond that, it takes about three seconds to train them on how to use it. And it just works well. That's great for us because it means less administrative time."
"The most valuable feature is the zero-trust part of this solution."
"There must be a more easy-to-use GUI."
"There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect."
"We would like to implement HTML5 (clientless access) in the product without installing any additional software."
"Check Point Remote Access VPN could be more user-friendly."
"Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server."
"We would like to see support for a layer seven VPN over UDP."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"The cost of maintenance is high compared to most products in the market."
"Bug Fixes and enhancement requests should be remediated earlier."
"We would like to see improvements in the licensing; currently, Palo Alto provides 500 to 1000 licenses for users, and we want to see 1500 to 2000 licenses for one version."
"The frequency of updates could be reduced."
"I haven't seen any SD-WAN configuration capability. If Prisma Access would support SD-WAN, that would help... SD-WAN devices should be able to reach Prisma Access, and Palo Alto should support different, vendor-specific devices, not just Palo Alto devices, for SD-WAN configuration."
"They could add more flexibility and improve product performance."
"There should be a dedicated portal or SASE-based solution. They're trying to add a plugin but it needs a dedicated portal because it is now an enterprise solution for multiple organizations. People should be able to directly log in to a dedicated page for Prisma Access, rather than going into a Panorama plugin, and always having to update the plugin."
"When it comes to integration mechanisms, Prisma SaaS does not support reverse proxy type of integrations."
"The tools' scalability is subject to some limitations when done on-premise due to the need for additional licenses. However, in other scenarios, increasing scalability involves expanding infrastructure to accommodate more third-party VPN access. It is scalable as long as you pay the money. Also, it needs to improve security."
"I would like to see better pricing and an easier logging process. Also, if there was a way to log a global log, everything could go onto the system. It would be better if there was a third log, otherwise one would have to do everything manually."
More Check Point Remote Access VPN Pricing and Cost Advice →
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 62 reviews while Prisma Access by Palo Alto Networks is ranked 5th in Enterprise Infrastructure VPN with 59 reviews. Check Point Remote Access VPN is rated 8.8, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Microsoft Remote Desktop Services, whereas Prisma Access by Palo Alto Networks is most compared with Netskope , Zscaler Zero Trust Exchange, Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN. See our Check Point Remote Access VPN vs. Prisma Access by Palo Alto Networks report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.