Check Point Endpoint Remote Access VPN Reviews

Check Point Endpoint Remote Access VPN is the #6 ranked solution of our top Remote Access tools. It's rated 4.5 out of 5 stars, and is most commonly compared to OpenVPN Access Server - Check Point Endpoint Remote Access VPN vs OpenVPN Access Server

Filter by:
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Real User
Network Security Engineer at a financial services firm with 51-200 employees
Aug 10 2020

What is most valuable?

The most valuable part would be allowing users to have a seamless connection to the Check Point firewall, which is what we use for controlling access to our on-premise… more »

How has it helped my organization?

Before we used the Check Point Endpoint Remote Access VPN solution, we were using a difficult VPN solution. It made us install a certificate on the user's laptop. That was… more »

What needs improvement?

Currently, we're using Check Point Endpoint Remote Access VPN R70.30.03. That's the latest version of R70.30. We haven't upgraded to R80 yet, but all of our firewalls are… more »

What's my experience with pricing, setup cost, and licensing?

My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have… more »

Which solution did I use previously and why did I switch?

We did use something else previously. I want to say it was some kind of a VNC Viewer things with a certificate. It's very basic and crappy. We switched because we need… more »

What other advice do I have?

My advice would be to have patience. Make sure you get a Tier 3 support person. Setting up the servers and everything is easy, but deploying the Endpoint VPN client is not… more »

Which other solutions did I evaluate?

I believe we did evaluate other option, but I know that we were leaning strongly towards Check Point.
Real User
IT Tech Security Management at a logistics company with 1,001-5,000 employees
Nov 26 2019

What is most valuable?

The differentiator for this solution is the management interface that we find very good and provides a single view for all endpoints. The solution offers SmartLog that allows quick searches. The compliance modules are also very interesting.

What needs improvement?

I cannot see the full effect of the antibot solution because it relies on having access to the DNS queries, which might not go through the Check Point firewall when you're using it for perimeter networks. In this case Check Point will not identify the actual source of the DNS queries associated with antibot activity. This may be related to the customer architecture, however, and not due to product… more »

What other advice do I have?

We currently only use the on-premises deployment model, although we may extend into the cloud in the future. We're aware of the cloud's capabilities, but we're not using it because we don't have a large infrastructure expression there. In terms of advice, I'd suggest that others implementing the solution make sure training happens on their teams. Most products can have lots of features, but if you… more »
Find out what your peers are saying about Check Point, Dell EMC, Microsoft and others in Remote Access. Updated: September 2020.
438,246 professionals have used our research since 2012.
Kirtikumar Patel
Real User
Network Engineer at LTTS
Sep 17 2020

What is most valuable?

The most valuable feature is the seamless access. Using this, we control access to our on-premises resources, and our users who are working from outside are easily able to access their office area computers, file servers, and intranet… more »

How has it helped my organization?

Prior to using Check Point Endpoint Remote Access VPN, our previous solution required installing certificates on every user's machine, which was a very difficult task. Our old solution did not offer two-factor authentication, which we now… more »

What needs improvement?

We would like to see support for a layer seven VPN over UDP.-- currently some VPN solution are working on Layer 7 Platform. The updates under Windows 10 are not always up to date, and we have trouble upgrading remote clients. We have also… more »

What's my experience with pricing, setup cost, and licensing?

This is a very good solution for our employees who work outside of our organization.

Which solution did I use previously and why did I switch?

Earlier, we had a traditional VPN, which did not help in running our business seamlessly.
Adriano-Simao
Real User
IT System Integrator at CEDSIF - Ministry of Finance
Oct 14 2019

What is most valuable?

The ability to create your trigger data domains is the solution's most valuable feature.

What needs improvement?

The solution should include the ability to integrate the equipment's functionality with others. For example, we would like Checkpoint to be able to integrate easily to the public key infrastructure. According to Checkpoint, there is no use case for this right now. The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be… more »

What other advice do I have?

We are using the on-premises deployment model. Checkpoint is very strong and very reliable. I would advise that those considering implementing the product go to a Checkpoint training session before implementing the solution. It's good to be familiar with the product beforehand. I'd rate the solution ten out of ten.
Real User
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees
Apr 22 2020

What do you think of Check Point Endpoint Remote Access VPN?

What is our primary use case?

In our current dynamic, we are using this solution to provide access to data and some business applications over the internet.

What is most valuable?

Our users find the interface very comfortable to use.

What needs improvement?

There is always room for innovation and the addition of new features.

For how long have I used the solution?

We have been using this VPN for more than ten years.

What do I think about the stability of the solution?

With respect to stability, Check Point has been running smoothly and we haven't had any issues.

What do I think about the scalability of the solution?

We have about 500 people using this solution in our company during the COVID-19 pandemic. Prior to that, we had an average of 100 daily users.

How are

What is Check Point Endpoint Remote Access VPN?

The Check Point Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

Check Point Endpoint Remote Access VPN customers

Osmose, International Fund for Animal Welfare (IFAW)

BUYER'S GUIDE
Download our free Remote Access Report and find out what your peers are saying about Check Point, Dell EMC, Microsoft, and more!