Check Point Endpoint Remote Access VPN Reviews

Filter by:Reset all filters
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Real User
IT Tech Security Management at a logistics company with 1,001-5,000 employees
Nov 26 2019

What is most valuable?

The differentiator for this solution is the management interface that we find very good and provides a single view for all endpoints. The solution offers SmartLog that allows quick searches. The compliance modules are also very interesting.

What needs improvement?

I cannot see the full effect of the antibot solution because it relies on having access to the DNS queries, which might not go through the Check Point firewall when you're using it for perimeter networks. In this case Check Point will not identify the actual source of the DNS queries associated with antibot activity. This may be related to the customer architecture, however, and not due to product… more»

What other advice do I have?

We currently only use the on-premises deployment model, although we may extend into the cloud in the future. We're aware of the cloud's capabilities, but we're not using it because we don't have a large infrastructure expression there. In terms of advice, I'd suggest that others implementing the solution make sure training happens on their teams. Most products can have lots of features, but if you… more»
Adriano-Simao
Real User
IT System Integrator at a financial services firm with 201-500 employees
Oct 14 2019

What is most valuable?

The ability to create your trigger data domains is the solution's most valuable feature.

What needs improvement?

The solution should include the ability to integrate the equipment's functionality with others. For example, we would like Checkpoint to be able to integrate easily to the public key infrastructure. According to Checkpoint, there is no use case for this right now. The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be… more»

What other advice do I have?

We are using the on-premises deployment model. Checkpoint is very strong and very reliable. I would advise that those considering implementing the product go to a Checkpoint training session before implementing the solution. It's good to be familiar with the product beforehand. I'd rate the solution ten out of ten.

Articles

User Assessments By Topic About Check Point Endpoint Remote Access VPN

Find out what your peers are saying about Check Point, OpenVPN, Palo Alto Networks and others in Enterprise Infrastructure VPN. Updated: February 2020.
396,781 professionals have used our research since 2012.

Check Point Endpoint Remote Access VPN Questions

What is Check Point Endpoint Remote Access VPN?

The Check Point Endpoint Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

Check Point Endpoint Remote Access VPN customers

Osmose, International Fund for Animal Welfare (IFAW)

BUYER'S GUIDE
Download our free Enterprise Infrastructure VPN Report and find out what your peers are saying about Check Point, OpenVPN, Palo Alto Networks, and more!