We performed a comparison between Check Point Remote Access VPN and Zscaler Zero Trust Exchange based on real PeerSpot user reviews.
Find out what your peers are saying about TeamViewer, Microsoft, Citrix and others in Remote Access."I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience."
"The clients of the customers have a facility to access the enterprise network."
"The secure hotspot access for enabling good network connectivity is great."
"Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
"The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
"To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources."
"Scalability is great. We have been able to grow as a corporation due in part to this type of solution."
"The most valuable feature of Zscaler Private Access is the categorization of the dynamic URLs which keeps the customer's environment protected. The threats and the malware are correctly categorized."
"SASE's most valuable features are proxy and content filtering."
"The most valuable feature is its ability to establish connectivity for remote users and remote endpoints. It offers a high level of granularity compared to typical VPNs, which also encapsulate a lot of I/O."
"The most valuable features of Zscaler Private Access are reliability, scalability, and availability."
"The most valuable features of Zscaler Private Access are its ability to integrate with multiple IDPs and application segmentation."
"We don't need to connect anymore. It is automatically connected when you log on in Windows."
"What I find most valuable in Zscaler Private Access is that it's a VPN. Its connectivity as a VPN is its most valuable feature."
"I find all Zscaler Private Access features valuable because each replaces flawed technologies, such as EPAs being replacements for VPN and PR as a replacement for PAM, so I can't mention only one valuable feature. Overall, Zscaler Private Access is a good solution."
"Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication."
"The scalability needs improvement."
"Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners."
"The Linux version may have an app (similar to Windows) instead of a shell script."
"Sometimes the application slows down the computing device, and this affects workflows."
"The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"The product’s architecture is a bit distributed."
"We faced certain migration and implementation challenges in executing the tasks, so I would suggest improvement related to the stability of the solution."
"The DX layer could be better if it had improved visibility."
"We often face performance and latency issues with Zscaler SASE."
"It's an expensive solution."
"Conflicts arise if you do not have the same management teams on the product."
"While Zscaler supports client-initiated connections, it does not support server-initiated connections. This is a feature that Zscaler may consider adding in the future."
"What could be improved in Zscaler Private Access is its notification. For example, if there's a speed issue, there should be a pop-up that alerts the user about it. If there is a network quality issue, for example, it isn't good enough to connect to, or the network quality is bad, there should be a notification from the solution. Zscaler Private Access also needs improvement in terms of its interface and security."
"There could be more DLP-related features. Additionally, there needs to be flexibility for integrating ISP features."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 5th in Remote Access with 62 reviews while Zscaler Zero Trust Exchange is ranked 1st in ZTNA as a Service with 34 reviews. Check Point Remote Access VPN is rated 8.8, while Zscaler Zero Trust Exchange is rated 8.4. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Zscaler Zero Trust Exchange writes "Allows for strict access control, granting access to specific applications at a URL level rather than at the physical IP level". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Symantec VIP Access Manager, whereas Zscaler Zero Trust Exchange is most compared with Prisma Access by Palo Alto Networks, Cato SASE Cloud Platform, Axis Security, Cloudflare Access and Appgate SDP.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.