Check Point Remote Access VPN Valuable Features

Ozan Durmus - PeerSpot reviewer
Senior Information Security Specialist at AKBANK TAS

We need to use two-factor authentication, ADA authentication, and ADA integration. These features are important. We also use a different kind of cPanel and try to differentiate between the IVR accessing the account and the traffic we will send to our system through Check Point values when installed.

The solution is easy for administrators because you can check logs and write rules on the same page.

View full review »
josephtampient3 - PeerSpot reviewer
CEO at T3 Real Estate Group

The most valuable aspects of the solution include: 

- VPN auto-connect feature. It is essential. It activates the VPN every time I make a remote connection and since I don't have to activate it manually to make the remote connection, it saves me time.

- Compliance scanning. It allows me to detect any existing irregularities in the network that is being used for the remote connection.

- The VPN Client. It allows me to fully configure all remote access, configure the firewall used, and gives me full access to network settings.

View full review »
SK
Network Security Engineer at a consumer goods company with 201-500 employees

The solution's most valuable aspects include:

1) Ease of install and ease of use.

2) 2FA Security.

3) Seamless access.

4) Integration with our data.

5) The ability to view VPN events from the console.

6) The ability to manage all our devices from one platform and easily secure and segment their access to resources. 

7) Providing authorized least privileged access for all devices.

8) The ability for our entire global organization to work more securely and to allow us to deploy private and dedicated networks in more than one location.

9) The level of security provided by Check Point. It ensures that only authorized connections are established, so if users are connected, then they are protected.

View full review »
Buyer's Guide
Check Point Remote Access VPN
April 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

We already use the Check Point Firewall and those are the ones the organization's employees connect to for the remote VPN and it made it really easy to activate this function as new hardware was not needed. 

The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out. Be it if our users are at home or in the office the same policy applies to them allowing us to view the traffic within our organization.

View full review »
MM
Network Engineer at a non-profit with 10,001+ employees

If I compare the solution with some of the other products my company has used in the past, I can definitely see that it has some valuable features that allow me to see the traffic and what a client does. With the tool, I cannot only see a session but also the resources our company's clients are connected to since I can do so with the help of firewall logs. I like the overall visibility of the product.

The thing I like about Check Point Remote Access VPN stems from the fact that it terminates at the firewall wherever the client is going, and it works in an unencrypted manner, which allows me to see where the traffic is going. I can gain access to the clients' networks with NetScaler and with the aid of a packet sniffer.

View full review »
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE

The secure hotspot access for enabling good network connectivity is great.

Multi-layer scanning of IT systems across various critical stages for detection of threats and malicious threats has been useful.

Provisioning VPN Client and Auto Connect management system for free flow of information without any data mismanagement.

The secure remote access integration is available for both android and IOS devices and systems is helpful.

The multi-factor authentication support system is a phenomenal feature for providing all-around authentication support to for secure IT enablement. 

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live. The only requirement is to purchase an additional license from Check Point, and then enable the mobile access blade. After this, the solution is ready to roll out and provide access based on the configured policy. 

Access is restricted based on user ID, security group, and device type. 

Access is provisioned post-posture policy validation and it offers protection against users connecting to the corporate network from non-corporate devices, which minimizes data leakage possibilities. 

Access is available from browsers or VPN clients using MFA. This is helpful in cases where the machine does not have the client installed or the client is corrupted.

We are able to restrict access based on geo-location and device type. Devices can be Android, iOS, Windows, or Linux.

It provides threat prevention capabilities while uses connect via VPN for Windows devices.

View full review »
Nagendra Nekkala - PeerSpot reviewer
Senior Manager ICT & Innovations at Bangalore International Airport Limited

Check Point Remote Access VPN is a highly secured product with which, in our company, we can get end-to-end VPN connectivity so that the communication part is highly secured.

View full review »
LF
Deputy Head of IT department at UkrGasBank

Currently, I'm part of the network team, and my primary concern revolves around maintaining a stable connectivity setup. It's important for this connectivity solution to have provisions, possibly within AWS, that enhance security measures and provide more security-related advantages. From my standpoint, our solution serves a general purpose. It operates effectively, particularly during challenges like adversities or infrastructure issues. Overall, it suits our needs well.

View full review »
Richard Hermogeno - PeerSpot reviewer
Channels Management Head at Philippine National Bank

The feature that I found most valuable is how conveniently Check Point Remote Access VPN allows us to access our HR system. We use it for the process of logging in and logging out.

View full review »
MB
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees

One of the features that has helped us the most with our solutions has been the P2P connection through an IPsec VPN. It has allowed us to extend our infrastructure and grow with new clients. Previously, we had around 15 corporate clients. Through the COVID-19 pandemic, we have managed to grow and now have around 35 new corporate clients and more than 6 people connected by VPN. This has forced us to increase our infrastructure to be able to support all these connections and to have a stable, reliable, and, above all, scalable solution that can interconnect more clients.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

Check Point Remote Access VPN has helped us in that our users and providers can connect to our network in a safe and efficient way. With the pandemic, most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way. The solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

View full review »
MW
Web Developer at Netconomy Software & Consulting GmbH

It has a simple user interface that is easy to operate and set up. 

The customer support staff provides 24/7 customer support services that enhance effective service delivery. 

The premium version provides the most advanced services that are always effective. 

The cost of maintenance and privacy policies suits our daily demands. 

It is compatible with most devices and can easily integrate with most applications in the organization. 

There is no apparent IP leak and it connects firmly without disconnecting.

View full review »
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana

We can integrate remote access to our branches through Check Point services; however, those services come with a centralized identity, a domain identity, which does not work for the different logins. It only works for the login through the remote connection application. The user profile is centralized, verified, and filtered by the tool, thus being one of the characteristics that are very important to me since it shows any activity that the user is going to carry out.

View full review »
FG
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT

The combination of the user accounts for the VPN with the access rules provided by the security gateway gives you more control and specificity about who has access to what. For external users, we can offer a solution based on the internet needs and we are able to share information on a secure channel. We can specifically point to the desired resources in the organization without the need to install any additional software on external client machines.

View full review »
Recep  Alver - PeerSpot reviewer
Cyber Security Engineer at Natica IT Consulting at Natica IT Consulting

It is easy to use and easy to set up. The setup is very fast.

The security is pretty good. 

It is stable most of the time.

View full review »
SM
Network Engineer at Fujairah Port

The remote access blade is built in on the firewall, so it is easy to activate through the Smart Console.

Only the VPN client supports only the Windows and Apple Mac operating systems, which also support iOS and Android mobile platforms. The Check Point development team deserves praise for a flawless experience.

Multi-factor authentication and compliance checks help us to ensure maximum security.

VPN logs give us complete visibility and track unusual activities.

The VPN client user interface is simple and perfect.

The VPN client software is lightweight.

View full review »
AT
Cyber Security Manager at H2O Power Limited Partnership

The unified platform view is great. Being able to manage NGFW alongside our Remote Access Policies allows us to control traffic in one way. Be it if our users are at home or in the office the same policy applies to them allowing us to have one corporate view on the traffic within our organization.

Being able to integrate the policy with things like Active Directory groups, Azure cloud objects, RADIUS integration, and load balancing capabilities is wonderful. All of these things are built into their NGFW policy which we leverage to implement on our Remote Access policy.

View full review »
SR
Senior Security Engineer at a consultancy with 5,001-10,000 employees

Check Point Remote Access VPN provides strong security features, including encryption, authentication, endpoint security, access control, and centralized management. These ensure data protection and access control for remote users, making it a reliable solution for maintaining security in remote access scenarios.

View full review »
Eladio José Sibaja Trejos - PeerSpot reviewer
Administrador Junior Level 1 at Compuguana

Among its most valuable features is how it quickly and easily connects everyone to the VPN service. It quickly installs an agent on the computers, so that our users do not have to worry about their mobile devices being configured. It is easy to install and can run and install as a client on devices whether the user has Mac or Windows.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

In terms of the way they ensure traffic, an example is when we use Wi-Fi in public areas.

WiFi is everywhere nowadays and it is extremely convenient to use, especially if you have a tight mobile data plan. The only problem with free WiFi is that it's often unsecured, which means you're putting your personal data at risk every time you use it. After all, cybercriminals can find out a lot about you, which can lead to them stealing your:

  • Credit card details
  • Bank account details
  • Email login credentials

However, if you use a VPN, you won't have to worry about those dangers. A VPN uses encryption to protect your online communications, making sure no one can monitor it. Basically, if a hacker tried to see your connection traffic, they would just see nonsense.

View full review »
VC
Implementation Specialist at NTT Security

It is easy to install the Endpoint Remote Access VPN client on different platforms. Within the company, we use it for Windows and macOS.

Built-in, centrally managed Compliance blade. We check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.

The stable VPN connection and uptime are also very good.

We have a centrally managed Firewall blade, which allows filtering traffic on the rule base to protect the requirement.

View full review »
JR
Project Manager at Digitas APAC

Secure remote access has enabled teams to focus on productive meetings without fear of being attacked by external ransomware attacks. Device access from remote networks has enhanced the efficient connection of teams from various areas. 

The setup process is simple, and new users can set it without any challenges. The cost and maintenance charges are relatively low as compared to most products in the market. 

Configuration of the VPN with other applications is flexible with productive performance. Identity and access management enables the IT team to categorize devices and channel them to effective network infrastructure.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

Among other features, advantages, and services that the solution provides us, it is important to understand that it gives us the possibility, capacity, and management for establishing that each of the resources is accessed through encrypted communication tunnels. A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme. This goes beyond a simple password, giving us the possibility of integrating more than one service. 

View full review »
AG
Planning Analyst at Ovato

The set of security features that prevent data leakages has saved resources. 

The customer support team responds faster when contacted to provide solutions for technical failures. 

The application does not affect the storage and functionalities of the operating system. 

The UI enables new users to understand the working criteria of the features easily. 

The performance of this tool does not affect the performance of other applications when deployed on mobile or desktop devices. 

All the set features have a great impact on protection from data leakages and have saved our organization from threats.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

Some of the features that are considered most valuable in Check Point Remote Access VPN include: 

Multi-factor authentication. This feature allows organizations to use a combination of authentication methods such as certificates, tokens, biometric authentication, and user credentials to secure remote access connections.

Encryption. This feature provides end-to-end encryption for remote access connections, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks. 

View full review »
LN
Technical Manager at M.Tech

The solution offers flexible authentication methods to control access by policies and compliance. 

Check Point can integrate with external systems and third-party solutions to provide multi-layer authentications. This helps secure the user accounts from leakage of passwords and also protects corporate from unauthorized access damage risks. 

Security policies help to convert access regulations to policy rule configurations after authenticating. Setting policies allow, block, and limit users' access. 

With the compliance feature, Check Point can define what conditions user machines should have to authenticate the VPN. This feature helps to add more security to the network.

View full review »
MB
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees

The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic for connection to corporate due to the integration we have of Check Point via our AC or LDAP. 

We are creating rules by user and not by IP (which could be done both ways). We stick more to mobility inside and outside the corporate environment. Since then, corporate has been increasing security and keeping our workers happier.

View full review »
KP
Network Engineer at LTTS

The most valuable feature is the seamless access. Using this, we control access to our on-premises resources, and our users who are working from outside are easily able to access their office area computers, file servers, and intranet applications.

This product allows us to provide WAN access for our users, whereas prior to this, we could not make the whole intranet available.

Multifactor authentication is very helpful for us.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

Its implementation is very simple through the VPN blade in our Check Point gateway which is located and implemented within our public cloud architecture.

Its different monitoring and records generate the required tools to be able to provide good control of everything that happens during the connection time of the users.

Also, the policies can be generated as granularly as desired, and the portal is extremely intuitive. All this is a great help for administrators to manage VPNs.

View full review »
SS
Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd

The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera.

View full review »
NK
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH

The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage. 

The integration with two-factor authentication for remote access users is another valuable feature. In our case we use RSA.

Those two are the most valuable aspects that we have on the solution. It also gives us the possibility to securely connect to the company resources, without Check Point security measures.

Another great thing is that we already have all the logs from the firewall on the SmartPortal as the remote VPN also integrates into the firewall. We can see all the logs on the same tool because we also have a fully secure solution for Remote Access VPN. For full operational security, we need to manage the different hardware from the firewalls and the logs that are not in the same place. This is another valuable aspect of this solution.

Having access to those logs affects our security operations because if a user calls the support but does not have access to the VPN, we can see on the same tool on the SmartPortal and troublshoot. 

View full review »
ER
Security Officer at a hospitality company with 51-200 employees

The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control. 

View full review »
RS
Network and Security Engineer at a security firm with 11-50 employees

The policies are easy to use. Once we are connected, the entire infrastructure is safe, irrespective of the device we are using. There is no need to worry about safety. It's a secure tunnel that helps us access the network. It is a very useful feature. We can access the internal resources once we are connected to a VPN. We need not be in the office. The solution performs well.

View full review »
WM
Information Technology Admin at a wellness & fitness company with 51-200 employees

I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience. 

View full review »
LD
Cloud Support at a tech company with 1-10 employees

One of the features that draws a lot of attention is the integration of the remote VPN application in our Check Point gateway and management server, where it is easy to use.

The granular control and access under the Check Point policies made applying a zero trust policy much easier, providing greater security.

The integration with MFA through a configuration and integration with Azure is quite good, providing security to the user's identity. It is a very important feature where everything is tried to shield against modern vulnerabilities.

View full review »
SN
System Analyst at IIT Gandhinagar

Once we install and connect the VPN service, it keeps on running until we disconnect. Moreover, the best outcome is when the end-users are able to check out software licenses through the tunnel and keep on working remotely from their home without any interruption. 

The VPN service works seamlessly in Windows and Mac. Only in the case of Linux or Ubuntu have we had to struggle a bit by understanding the SNX Batch file to get installed and run it. Moreover, in Windows and Apple systems the app is running on the system tray whereas in Linux we have to keep the Terminal Window Open.

View full review »
KK
Head of IT Department at AS Attīstības finanšu institūcija Altum

The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature.

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities. We have SSO (Single Sign-On). It is a 'unified' or 'single authentication' which can be integrated to improve security in startup services. This is an advantage due to the fact that you can use the integrated services or the third-party services that you already have, and you will not incur more costs. 

View full review »
PL
Firewall Engineer at a logistics company with 1,001-5,000 employees

A normal Check Point Gateway has, with the base license, 5 concurrent users included. This means that in emergency situations you don't have to buy additional licenses.

During Covid, the license was increased and therefore it was easily possible to have several users working from home.

It's possible to either have a client installed on the user's machine, or have a clientless approach using the web portal. 

There is MEP functionality, so, based on the user's location, it minimizes the latency by connecting to the nearest entry point. 

View full review »
AD
Accounts Administrator at a non-profit with 51-200 employees

The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup. It integrates extremely well with the Check Point Firewall.

View full review »
LA
Network, Systems and Security Engineer at SOLTEL Group

One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure. It is compatible with several operating systems, and it has great protection against malware and any other cyber threat that wants to penetrate our endpoints.

It is fully integrated and centralized, which allows me to configure the security policy and view VPN events from a console.

View full review »
SM
ICT at a manufacturing company with 501-1,000 employees

There are many features that make this solution interesting.

For us, it was essential to integrate with Active Directory, which is our credentials repository. 

The option of using SSL VPN, which is clientless and does not require the installation and configuration of a specific client, is a very important feature. Especially given that the latest cyberattacks are against dual-factor authentication, it allows you to significantly increase the security of the identity of the people who connect.

View full review »
OP
Senior Network/Security Engineer at Skywind Group
  1. It is easy to install the Endpoint Remote Access VPN client to different platforms. Within the company, we use it for Windows and macOS.
  2. Built-in, centrally-managed Firewall blade, which allows filtering traffic on the client-side.
  3. Built-in, centrally-managed Compliance blade. We check the client OS on the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.
  4. Stable VPN connection.
View full review »
WA
Network Security Engineer at a manufacturing company with 5,001-10,000 employees

Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work. There was no need to make any changes at the firewall level once we saw a large number of users go to work from home for safety reasons. If the VPN client was installed on their laptop they were good to go. The client also supports MFA, which is important, especially considering all of the remote work happening these days. 

View full review »
I.
Network security engineer at Fidelity Bank

The VPN, the end-user client VPN, is excellent. 

The firewall experience that we have had has been good. It's secure. We've enjoyed it so far.

The initial setup is very easy. It's pretty straightforward. 

The solution is very stable.

Technical support has been excellent.

View full review »
Eduardo Barcelos - PeerSpot reviewer
Sales Engineer at Tempest Security Intelligence

The most important feature of Check Point Remote Access VPN is the multiple factor authentication.

View full review »
SA
Works at MONT Group of Companies

When working with different groups of users, we can easily set up both standard authentication by username and password and use two-factor authentication such as SMS + username and password or certificate + username and password. This definitely increases security and allows you to control access.

It is also possible to use third-party tools to customize HTML5 access. For example, the connection is made without the need to install any client on the user side.

Access is browser-based only and requires no additional client installation.

View full review »
GD
Global IT Network and Security Service Senior Specialist at a manufacturing company with 1,001-5,000 employees

I found the MEP feature the most valuable. This has improved users' latency allowing the users to connect to the nearest Azure Check Point VM. 

The Multiple Entry Point (MEP) is a feature that provides high availability and load sharing solution for VPN connections. A security gateway on which the VPN module is installed provides a single point of entry to the internal network. It is the security gateway that makes the internal network "available" to remote machines. If a security gateway should become unavailable, the internal network is no longer available as well. An MEP environment has two or more security gateways to both protect and enable access to the same VPN domain, providing peer security gateways with uninterrupted access.

View full review »
PD
Associate Consult at Atos
  • Secure connectivity: Guaranteed authentication, confidentiality, and data integrity for every connection and user.
  • Straightforward Configuration: Easy to enable blades and define policies.
  • Authentication: SAML authentication makes sure the user is legitimate.
  • Compliance check: It scans the endpoint machine to detect suspicious/malicious content before connecting to an office network.
  • MEP: Multi entry points to make sure there's availability to the LAN network even if the primary gateway goes down.
  • A single client can work as sandblast agent.
View full review »
AG
Network Security Engineer at a financial services firm with 51-200 employees

The most valuable part would be allowing users to have a seamless connection to the Check Point firewall, which is what we use for controlling access to our on-premise area. Otherwise, we would have to get some other type of VPN solution that I don't know how well would work with the Check Point firewalls. Keeping it in the same ecosystem is good.

View full review »
RS
IT Tech Security Management at a logistics company with 1,001-5,000 employees

The differentiator for this solution is the management interface that we find very good and provides a single view for all endpoints. The solution offers SmartLog that allows quick searches. The compliance modules are also very interesting.

View full review »
OP
Electronic Engineer at eBTel Cia. Ltda.

The most valuable feature of the solution is its facility to use the command of the customers in the enterprise. The clients of the customers have a facility to access the enterprise network.

View full review »
JM
Network Security Engineer/Architect at Euronext Technologies SAS

The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage. 

The integration with two-factor authentication for Remote Access users is another valuable feature. In our case we use RSA.

Those two are the most valuable aspects that we have on the solution. It also gives us the possibility to securely connect to the company resources, without Check Point security measures.

Another good thing we like is that we already have all the logs from the firewall on the SmartPortal as the remote VPN also integrates into the firewall. We can see all the logs on the same tool because we also have a fully secure solution for Remote Access VPN. For full security, we need to manage the different hardware from the firewalls and the logs that are not in the same place. This is another valuable aspect of this solution. 

Having access to those logs affects our security operations because if a user calls the support but does not have access to the VPN, we can see on the same tool on the SmartPortal. If he's being blocked on the firewall policy, you can see it with the VPN profile.

If the user is using Foo, we need to go to the Check Point firewall to see the Check Point firewall log on the perimeter firewall, to see if the user is crossing the firewall to get the Foo. Then we need to go to the supplier to see that the logs are there. So we need to go to two places.

View full review »
AS
Chief Technology Officer at Triana Business Solutions Lda

The ability to create your trigger data domains is the solution's most valuable feature.

View full review »
it_user147558 - PeerSpot reviewer
Network Engineer at a tech consulting company with 51-200 employees
Firewall and SSL VPN View full review »
NT
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees

Our users find the interface very comfortable to use.

View full review »
Buyer's Guide
Check Point Remote Access VPN
April 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.