Check Point Endpoint Remote Access VPN Pros and Cons
Check Point Endpoint Remote Access VPN Pros
It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now.
View full review »The management of the solution is very simple. It allows for a single view of all the endpoints.
View full review »The most valuable feature is the seamless access.
View full review » Find out what your peers are saying about Check Point, Microsoft, Dell EMC and others in Remote Access. Updated: December 2020.
455,301 professionals have used our research since 2012.
The ability to create your trigger data domains is the solution's most valuable feature.
View full review »Our users find the interface very comfortable to use.
View full review »Check Point Endpoint Remote Access VPN Cons
When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client.
View full review »I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not.
View full review »We would like to see support for a layer seven VPN over UDP.
View full review » Find out what your peers are saying about Check Point, Microsoft, Dell EMC and others in Remote Access. Updated: December 2020.
455,301 professionals have used our research since 2012.
The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.
View full review »There is always room for innovation and the addition of new features.
View full review » Find out what your peers are saying about Check Point, Microsoft, Dell EMC and others in Remote Access. Updated: December 2020.
455,301 professionals have used our research since 2012.