Check Point Remote Access VPN Primary Use Case

Ozan Durmus - PeerSpot reviewer
Senior Information Security Specialist at AKBANK TAS

We use Remote Access VPN as a secondary VPN for our IT admins. We use this solution on a different production Internet line. If there is a network shortage on our primary line, we can use Check Point to access and check the systems.

View full review »
josephtampient3 - PeerSpot reviewer
CEO at T3 Real Estate Group

The primary use case is to remotely connect to various sites and various apps and use some technological apps that are cloud-based. Check Point Remote Access was the essential platform for us to connect remotely through a secure network with an encryption key. It's also an encryption service for all information shared and obtained from this remote connection. Today, we still use it to remotely connect to computers, apps, websites, and cloud-based apps while traveling or out of the office.

View full review »
SK
Network Security Engineer at a consumer goods company with 201-500 employees

With this solution, we can:

1) Securely and privately access our data from anywhere with the Check Point VPN. 

2) Connect securely from any device and any asset.

3) Have 2FA enabled while connecting to the VPN in an official mail. If any person has your VPN credential, he can initiate contact for security codes to connect to the VPN.

4) Integrate our data.

5) View VPN events from the console.

6) Easily install and connect the VPN. 

7) Provide colleagues with secure and seamless remote access to the corporate network.

8) Get a full picture with complete network visibility.

View full review »
Buyer's Guide
Check Point Remote Access VPN
April 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,246 professionals have used our research since 2012.
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

This product provides a secure connection to the corporate network from anywhere and safe traffic of data regardless of the possible threats in the WAN it's connected to. It also provides secure access to company apps and controls the traffic depending on each company's policies. Through it, we create layers that control or limit data traffic for specific users. I've been trained in the product and know it's one of the most effective in the business and admit to facilitating my customers to get it from our Check Point partners.

View full review »
MM
Network Engineer at a non-profit with 10,001+ employees

When it comes to Check Point Remote Access VPN, my company is still in the testing phase and will be due for a rollout with our client, who has wanted a VPN connection since last summer.

View full review »
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE

Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions to business users while they are working remotely and traveling for business purposes. Our organization involves over 70% of business travel to generate revenue, and it becomes really troublesome to secure the IT devices and cloud system at such traveling times. 

Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

We use Check Point Remote Access VPN to provide access to our corporate network and resources to remote users in a secure way. Users have access that is limited or defined by the server.

Access is granted for identified devices post-posture validation. 

Access should be provided via VPN using multifactor authentication other than username/credentials. Users are able to connect from anywhere at anytime using both mechanisms (i.e. User VPN client or browser). 

This solution mitigates or minimizes data leakage issues.

It is stable and scalable and requires minimal management and access provisioning.

View full review »
Nagendra Nekkala - PeerSpot reviewer
Senior Manager ICT & Innovations at Bangalore International Airport Limited

Right now, my company connects with the vendors of Check Point whenever any maintenance is required, and not to our domain.

View full review »
LF
Deputy Head of IT department at UkrGasBank

In the context of general user remote access, we utilize Check Point VPN concentrators that serve as both Internet firewalls and error ID locations. Our remote access system, constructed on a Check Point foundation, consists of four systems.

View full review »
Richard Hermogeno - PeerSpot reviewer
Channels Management Head at Philippine National Bank

Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations.

View full review »
MB
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees

Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client. 

Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

The company needs a tool that will provide users with the ability to connect from external addresses and that is where Check Point Endpoint Remote Access VPN services were contracted, which allows users to connect to our firewall. We also have Check Point firewalls in the cloud, to which people can also connect. They can then access the resources in our on-premises environment that they need to access, such as their computers, the Intranet, Salesforce, or our production applications, and have a 100% secure connection.

View full review »
MW
Web Developer at Netconomy Software & Consulting GmbH

The remote VPN enables us to connect our devices under a controlled network infrastructure. It protects the channels for transferring data and confidential information. 

It connects our managers with remote employees to enhance efficiency in the implementation of projects and tasks. Check Point Remote Access VPN blocks unauthorized access to our computing devices. 

It is easy to install and use this VPN for any new user. It keeps all the teams under the same collaboration and networking channel safe. Information encryption secures end-to-end conversation among teams.

View full review »
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana

We needed to grow a little more at a cloud level, which means that we have had more places in which we host information, and needed to protect it. We needed to allow users to have access from the different branches in the cloud to our main branch and to access remotely. As a result of these needs, we have been looking for solutions that allow us to have quick and efficient access no matter which branch we are going to access, and to have access allowed quickly and easily as if users were inside the perimeter area of ​​our organization.

View full review »
FG
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT

Since SARS-COV2, most users went to work from their home office, so we needed to have an robust, secure, and stable VPN connection. We implemented Check Point VPN and we have had no problems with it. We are almost 50 users working from home securely. Also, the access rules based on VLANs have helped many users get access depending on which connection they have. For example, some users with VPN connections can only access some specific servers and ports, however, when they are on an internal LAN, they have access to the entire network.

View full review »
Recep  Alver - PeerSpot reviewer
Cyber Security Engineer at Natica IT Consulting at Natica IT Consulting

We primarily use the solution as a VPN for connection purposes. It helps us connect to corporate. 

View full review »
SM
Network Engineer at Fujairah Port

We primarily use the solution for work from home. Our main goal is to provide users with the ability to access their workstation from anywhere in the world.

We provided remote access to more than 500 users during the pandemic. Check Point Remote Access VPN has worked smoothly as our appliance is capable of supporting 1000+ users.

We deployed a VPN client-based solution with multi-factor authentication. The compliance check feature is useful.

It is compatible with several operating systems, and it has great protection against malware.

It offers a simple configuration and setup.

View full review »
AT
Cyber Security Manager at H2O Power Limited Partnership

In our environment, we have many users working remotely. It's important to control the flow of traffic coming and going to these remote employees, and isolate traffic when used for business purposes. We have to allow our remote users to access services from home as though they were in the office. However, at the same time, we need to control that traffic and make sure it conforms to our policy. Our environment is complex and requires advanced policies to look at traffic in very unique ways from different users. Check Point's policy management has allowed us to do that.

View full review »
Eladio José Sibaja Trejos - PeerSpot reviewer
Administrador Junior Level 1 at Compuguana

Currently, as we are a company that constantly imports and exports solutions. We have needed to give our salespeople access to our executives since that part of retail is constantly on the move inside and outside our organization. This makes it somewhat necessary to figure out how everyone can access data since the information is being used and managed every day inside and outside of our institution. We have come to use the Check Point security services so that users can have the same access as we have inside when they are outside the organization.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data. 

Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.

View full review »
VC
Implementation Specialist at NTT Security

Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions.

We can connect anywhere in the world over possible ways to secure the infrastructure.

Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.

Also, we have multi-authentication so there is no chance of leakage.

View full review »
JR
Project Manager at Digitas APAC

Remote Access VPN helps my team to connect our devices remotely without any limitations. It is easy to establish a secure connection among teams and connect efficiently with maximum security. 

Teams can share files effectively under secure networking infrastructure. When implementing projects and tasks, it conveniently troubleshoots technical issues that can affect information traffic. 

I can now share large size of documents with my colleagues from a remote location without any interference. It is easy to facilitate remote workers and engage them.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

We wanted to give employees the possibility to work from anywhere outside of the organization, being a house or another remote location of offices. We wanted this capability with the possibility and ease to grant them access to our perimeter network so that they could access the data or internal applications for the use of each of its functions. We wanted faster, safer, and more efficient transactions that are going to be shared within our organization based on the business.

View full review »
AG
Planning Analyst at Ovato

The Remote Access VPN provides security to all computing devices across the organization. I can securely log in from a remote area and access the organization's data without physical appearance. 

It is easy to collaborate with colleagues in the same networking area from different locations. 

When interacting with our customers, I can easily change my IP address to correspond with a client's. 

This platform has saved the company a lot of resources that are being used to set up remote offices. 

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

Check Point Remote Access VPN is a VPN solution that allows users to securely connect to corporate networks from remote locations. It enables users to access corporate resources such as files, applications, and network devices as if they were on the corporate network.

The primary use case of Check Point Remote Access VPN is to provide secure remote access for employees, contractors, and partners who need to access corporate resources while working remotely. This can include employees working from home, traveling, or working in a remote office location. 

View full review »
LN
Technical Manager at M.Tech

Check Point Remote Access VPN allows organization users to work remotely. Especially in the pandemic period, work-from-home demand has been higher than ever. 

I have a remarkable case about the solution. That is for a bank. They want to have remote access VPNs that can provide connections for internal users who work remotely, partners who have restricted connections to the bank environment and ATM machines that connect to core banking applications. All VPNs acted in the same internet connections but still ensure these three VPNs were separated from each other. For the requirements, deploying the VPN in VSX appliances helped to solve issues. I created three virtual instances: one for corporate users, one for partners and one for ATM machines. 

Applying security policies for three instances is different. Corporate users must pass two-factor authentication layers and then have access to common corporate services (like email, and chat) and the right business applications depending on their working role, and their department. Partners after authenticating successfully only have limited access to the right place that they are allowed while being unable to connect to other places. 

ATM machines that act 24/7 need to have continuous connections, thus, they must authenticate using a certificate and their VPN clients must be configured to re-authenticate automatically after a timeout.

View full review »
MB
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees

We have always worked within the office. However, the COVID pandemic changed the course of our work in terms of where we had to implement new solutions so that we could all work from home. That was when I encountered Check Point; we had years with this solution in the facilities, yet, only during the pandemic did we have to innovate for a home environment. Today we have more than 6000 users working from home thanks to Check Point. This is possible due to the fact that, with a certificate and the client for this connection, every person can connect to our environment as if they were at the office.

View full review »
KP
Network Engineer at LTTS

The primary use case is to allow our employees to connect to the firewall on-premises, then they can access our office resources. This includes their respective computer, the intranet, shared files, and local applications, even if they are outside of the organization's network.

Our production will be locked down if my VPN stops working, leaving the company unable to work. As such, this is a crucial service for us and resources need to be available for each of our users when working remotely.

View full review »
Irshad Kazi - PeerSpot reviewer
Lead Technical Consultant at ITC Infotech

We use Check Point Remote Access VPN for security features.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

After implementing our GW and management security appliance in our public cloud infrastructure, we needed to establish P2S VPNs so that some users could connect to our offices safely to be able to access information and internal applications from anywhere.

This need begins when the sales department requires access to internal resources to be able to show solutions that we sell to clients. However, these connections were mostly from public places without security, which was clearly a huge vulnerability of the company.

Thanks to this tool, we managed to solve this need.

View full review »
SS
Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd

The solution is primarily used for secure access for remote users. It's deployed as a SaaS over the cloud. 

View full review »
NK
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH

We use Check Point Remote Access VPN to provide access to employees, vendors, and advisors. They access the company resources - especially now that most people are working from home over the course of the last year. We also use it for specific companies that give us remote support to some applications, such as our parent company. Our admins access our company servers and resources. We're using Remote Access VPN with specific profiles for them that only give access to some resources.

We have three distinct environments. Server, DMZ, and User/SHOP. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.

View full review »
RS
Network and Security Engineer at a security firm with 11-50 employees

We use the solution for our customers. Whenever the users work from home, they connect to the solution and are redirected to their network. It is very simple. They install the client, and the client makes a tunnel to the product. Once they are connected, they can enter into the network.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

This functionality is very practical to be able to connect to the business network from anywhere; the monitoring that can be provided and the granularity in the VPN to provide control to users is really good.

View full review »
SN
System Analyst at IIT Gandhinagar

The primary use case of this solution is to connect to our internal network for accessing servers and clusters using Check Point VPN. End-users are, for example, students accessing computer labs and licensed software that can check academic licenses only within the campus network; further, our ERP folks could make good use of the VPN solution by remotely working on the Institute Management System infrastructure and can work efficiently without any hindrance. We also use its capsule app on smartphones to connect further.

View full review »
KK
Head of IT Department at AS Attīstības finanšu institūcija Altum

We use Check PointVPN to securely connect to our main office systems, which are behind a firewall. This ensures that all incoming and outgoing traffic is encrypted and secure.

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

We came to need a solution that would allow us to connect quickly and easily from our homes or from anywhere, and it was at this point that we integrated and enabled the Check Point Remote Access VPN. With it, our employees could log in from anywhere at any time. 

This solution allowed them to have the same experience that they had in the office, and they could access all the resources that were necessary for their work. 

This solution helped us mainly with the shift to remote work. Before the pandemic, everyone worked from the office. Today, more employees have become digital nomads. 

View full review »
PL
Firewall Engineer at a logistics company with 1,001-5,000 employees

We are hosting environments for our customers and ourselves. With Check Point Client, VPN users that aren't in their internal networks can connect via a secure connection into the internal network.

Remote users use different clients (Windows, Linux, and Mac OS) so depending on the customer, there is either a client connection or a clientless approach (using a web portal).

Users can also be identified if they use the Client VPN solution. If you want to identify them inside the network you have to use an IA agent.

Once set up, it simply works without issues.

View full review »
AD
Accounts Administrator at a non-profit with 51-200 employees

It allows staff to work from home, especially now during COVID-19. You can access it from any location, and it does not require technical knowledge. 

View full review »
LA
Network, Systems and Security Engineer at SOLTEL Group

Check Point Endpoint Remote Access VPN is without a doubt, really fantastic software. It allows me remote and secure access to my most important data, to the company's networks, and to corporate resources from anywhere in the world.

Regardless of where I am, it guarantees the complete privacy of all our confidential information through multifactor authentication and compliance analysis of the endpoint system.

All of this is very easy to configure using step-by-step wizards, and there are many guides to explain it.

View full review »
SM
ICT at a manufacturing company with 501-1,000 employees

We use this solution to permit the connection to on-premises resources to internal and external users.

We use rules specific to external users based on the real access needs of the specific company, whereas, for internal users, other rules are used.

Users connect to our headquarters and then through private connections, they reach the resources distributed in the various locations. Using dual-factor authentication, we improve the identity security of the users and also protect our company.

Check Point has been our strategic partner for approximately 15 years. 

View full review »
JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services

We use Check Point Remote Access VPN to connect to the back-office applications.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

In addition, there are about 30 Google Cloud projects of different sizes ranging from 10 to 250 virtual machines, and they are used for development, staging, production, etc. For every project, there is one dedicated scalable instance group of the Check Point CloudGuard IaaS gateways.

We user the Check Point Remote Access VPN to provide access for our employees to connect to the specified environments.

View full review »
WA
Network Security Engineer at a manufacturing company with 5,001-10,000 employees

We are able to allow users to easily gain access to internal systems from outside the organization. No longer is coming into the office a necessary requirement for our users. They can seamlessly transition from home/remote work to going into the office while still having the same level of access. We also have many users that need to manage servers who are able to connect to the internal servers from anywhere - allowing them to still do their jobs from anywhere. Connecting to VPN doesn't require a ton of technical skill for those not in the technical field.

View full review »
I.
Network security engineer at Fidelity Bank

We primarily use this solution for our clients. Use cases vary, and they include VPN connectivity. It can be used as a provisional firewall and you can allow for a provisional access list, or grant permission to access or for servers or users trying to connect to the server. 

View full review »
Eduardo Barcelos - PeerSpot reviewer
Sales Engineer at Tempest Security Intelligence

Check Point Remote Access VPN is used to allow our employees to use the corporate resources or remote access to the corporation and lightweight on resources.

View full review »
SA
Works at MONT Group of Companies

The Mobile Access VPN is used to provide users with remote access to company resources.

Users can access the system at any time from corporate laptops as well as home PCs.

It is also possible to connect from Android and IOS mobile devices.

We also use the functionality of the secure Capsule Workspace container to securely provide access to corporate Web resources and mailing services from mobile devices.

It is also possible to provide restricted access to partners via SSL VPN using the Check Point Mobile Web Portal fine-tuning.

View full review »
GD
Global IT Network and Security Service Senior Specialist at a manufacturing company with 1,001-5,000 employees

We've used Check Point VPN to move from an on-premise VPN Cisco product to a VPN built on the cloud. We decided to use Check Point as it was fully integrated with Microsoft Azure and present on the Azure marketplace. We deployed this solution on different subscriptions and used the MEP function to reduce users' latency on the VPN. The implementation has not been very easy, and the implementation of MEP has taken months. There were a lot of hotfixes to install, and the CLI configuration on the files had to be done. The configuration, in fact, can't be implemented using a GUI.

View full review »
PD
Associate Consult at Atos

Remote Access VPN is one of those essential items for every organization in order to maintain seamless and highly secured connectivity between the end-user and the organization's local area network to access resources - including Jump server Databases, et cetera.

No matter from which device or from which location users are accessing an organization's local resources, with the help of the Check Point VPN client they can make sure they have connected securely.

Check Point offers a best-in-class encryption algorithm to ensure confidentiality and maintain integrity between the end-user and the Gateway. 

View full review »
AG
Network Security Engineer at a financial services firm with 51-200 employees

We use a Check Point Endpoint Remote Access VPN client along with Check Point SSL VPN, which allows users to connect to our firewall who don't have the client, e.g., if they have a MacBook, then we don't have a client for them. We allow them to connect to the firewall over the browser. That had a bunch of problems, but they have resolved those this year. 

The use case is to allow people to connect to our firewall on-premise. We also have Check Point firewalls in the cloud, which people can connect to as well. Then they can access resources either in our on-premise environment that they need to access, such as, their computers, the Intranet, Salesforce, or our production applications. Also, in AWS, they can access other types of applications, like WorkSpaces, or our production applications there, which allows them to work. It lets them have access to their email, because they're not able to access their email unless they are VPN'd in, etc. 

We keep everything locked down to the VPN. If that's not working, then our company will not be able to work. It was very finicky last year, and it's working now. It has been perfect this year.

We don't use the Endpoint Remote Access VPN client for too much. We use its local firewall, which is valuable, but we don't really use SandBlast. I know you can add the SandBlast module along with all these other modules. We literally just use it so our users can connect on-prem.

View full review »
CK
Senior System Engineer at Thai Transmission Industry

A lot of our clients are complimentary companies, like the electrical company. They need Check Point Remote Access VPN, or even another similar solution. I tell them that I already have the VPN solution in our company.

View full review »
OP
Electronic Engineer at eBTel Cia. Ltda.

The solution is used for the mobile license or the troubleshooting of the VPN client.

View full review »
JM
Network Security Engineer/Architect at Euronext Technologies SAS

We use Check Point Remote Access VPN to provide access to employees and to the company resources, especially now that most people are working from home. That's the main use. We also use it for specific companies that give us remote support to some applications. They access our company servers and resources. We're using Remote Access VPN with a specific profile for them that only gives access to some.

We have two environments. Our firewalls and our perimeter firewalls are Check Point. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.

View full review »
AS
Chief Technology Officer at Triana Business Solutions Lda

We primarily use the solution to have a secure connection and to offer security integration with our remote office as well as some other companies.

View full review »
NT
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees

In our current dynamic, we are using this solution to provide access to data and some business applications over the internet.

View full review »
Buyer's Guide
Check Point Remote Access VPN
April 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,246 professionals have used our research since 2012.