Check Point Remote Access VPN Overview
Check Point Remote Access VPN is the #4 ranked solution in our list of top Remote Access tools. It is most often compared to Cisco AnyConnect Secure Mobility Client: Check Point Remote Access VPN vs Cisco AnyConnect Secure Mobility Client
What is Check Point Remote Access VPN?
Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.
Check Point Remote Access VPN is also known as Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN.
Check Point Remote Access VPN Buyer's Guide
Download the Check Point Remote Access VPN Buyer's Guide including reviews and more. Updated: June 2021
Check Point Remote Access VPN Customers
Osmose, International Fund for Animal Welfare (IFAW)
Check Point Remote Access VPN Video
What users are saying about Check Point Remote Access VPN pricing:
- "My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."
- "Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."
- "The price of this product is good."
- Highest Rating
- Lowest Rating
- Review Length
Showingreviews based on the current filters.
Network Security Engineer at a financial services firm with 51-200 employees
Real UserTop 10
Aug 10, 2020
Allows everyone to work from home, which is mission-critical for our organization
What is our primary use case?We use a Check Point Endpoint Remote Access VPN client along with Check Point SSL VPN, which allows users to connect to our firewall who don't have the client, e.g., if they have a MacBook, then we don't have a client for them. We allow them to connect to the firewall over the browser. That had a bunch of problems, but they have resolved those this year. The use case is to allow people to connect to our firewall on-premise. We also have Check Point firewalls in the cloud, which people can connect to as well. Then they can access resources either in our on-premise environment that they need to… more »
Pros and Cons
- "It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now."
- "When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."
What other advice do I have?My advice would be to have patience. Make sure you get a Tier 3 support person. Setting up the servers and everything is easy, but deploying the Endpoint VPN client is not easy. They need to have someone walk them through the process of creating the Trac file that contains the settings for the client. That is hard. There is the endpoint server, which is on-prem, and easy to set up like any other appliance that any network engineer or systems administrator should know how to do. That is easy. But if you want to deploy the client, which most people want to deploy the client, and have any type of…
Enables users to easily work from home
What is our primary use case?We use Check Point Remote Access VPN to provide access to employees and to the company resources, especially now that most people are working from home. That's the main use. We also use it for specific companies that give us remote support to some applications. They access our company servers and resources. We're using Remote Access VPN with a specific profile for them that only gives access to some. We have two environments. Our firewalls and our perimeter firewalls are Check Point. The firewall connects to the internet and those firewalls are the ones that the people connect to for the… more »
Pros and Cons
- "The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
- "We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
What other advice do I have?It's not hard to deploy the solution. Remote Access VPN is easier to deploy than some other solutions like Pulse Secure. If you already have a Check Point firewall, this remote solution is a win-win because you don't need to buy, manage, or do a hardware refresh when you enter the end of life. You will have centralized logs on the same tools. If you have a Check Point firewall, this solution is the best for you. I would rate Check Point Remote Access VPN a nine out of ten. It works very well. I would say it's almost the perfect solution. As far as I'm aware, it's one of the oldest solutions…
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
513,091 professionals have used our research since 2012.
Senior Manager at a financial services firm with 10,001+ employees
Supports multifactor authentication and clientless login, but the GUI should be more user-friendly
What is our primary use case?We use Check Point Remote Access VPN to provide access to our corporate network and resources to remote users in a secure way. Users have access that is limited or defined by the server. Access is granted for identified devices post-posture validation. Access should be provided via VPN using multifactor authentication other than username/credentials. Users are able to connect from anywhere at anytime using both mechanisms (i.e. User VPN client or browser). This solution mitigates or minimizes data leakage issues. It is stable and scalable and requires minimal management and access… more »
Pros and Cons
- "Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live."
- "The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access."
What other advice do I have?Traditional VPNs that work on L3 or L4, with a single VPN tunnel, are typically hosted on-premises. As organizations are adopting cloud computing, it makes sense to have a VPN solution hosted on the cloud for better control and security.
Senior Network/Security Engineer at Skywind Group
Easy to install, centrally managed, and stable
What is our primary use case?Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). In addition, there are about 30 Google Cloud projects of different sizes ranging from 10 to 250 virtual machines, and they are used for development, staging, production, etc. For every project, there is one dedicated scalable instance group of the Check Point CloudGuard IaaS gateways. We user the Check Point Remote Access VPN to provide access for our… more »
Pros and Cons
- "It is easy to install the Endpoint Remote Access VPN client to different platforms."
- "The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
What other advice do I have?The Check Point Endpoint Remote Access VPN for MacOs and Windows are reliable solutions for remote access VPN, and fully compatible with the Check Point security ecosystem.
Network security engineer at Fidelity Bank
Real UserTop 5
Jun 4, 2021
Stable with good technical support and a straightforward setup
What is our primary use case?We primarily use this solution for our clients. Use cases vary, and they include VPN connectivity. It can be used as a provisional firewall and you can allow for a provisional access list, or grant permission to access or for servers or users trying to connect to the server.
Pros and Cons
- "Technical support has been excellent."
- "They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
What other advice do I have?We are customers and end-users. We don't have a business relationship with the company. I'd advise new users that, when it comes to deploying with an authentication provider, I would advise that you use a Microsoft authenticator. We tried using their authenticator at first, but that is not good. That did not work. I'd rate the solution at an eight out of ten.
IT Tech Security Management at a logistics company with 1,001-5,000 employees
Nov 26, 2019
Simple management, quick search capabilities, and very good stability
Pros and Cons
- "The management of the solution is very simple. It allows for a single view of all the endpoints."
- "I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
What other advice do I have?We currently only use the on-premises deployment model, although we may extend into the cloud in the future. We're aware of the cloud's capabilities, but we're not using it because we don't have a large infrastructure expression there. In terms of advice, I'd suggest that others implementing the solution make sure training happens on their teams. Most products can have lots of features, but if you do not have proper knowledge, you will not be able to make use of those features. I'm very satisfied with this solution; I'd rate it eight out of ten.
ICT at a manufacturing company with 501-1,000 employees
Real UserTop 20
Jun 4, 2021
Stable, supports dual-factor authentication, and facilitates Smart Working
What is our primary use case?We use this solution to permit the connection to on-premises resources to internal and external users. We use rules specific to external users based on the real access needs of the specific company, whereas, for internal users, other rules are used. Users connect to our headquarters and then through private connections, they reach the resources distributed in the various locations. Using dual-factor authentication, we improve the identity security of the users and also protect our company. Check Point has been our strategic partner for approximately 15 years.
Pros and Cons
- "For us, it was essential to integrate with Active Directory, which is our credentials repository."
- "In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems."
Multi-factor authentication helps to securely provide access to company resources while working offsite
What is our primary use case?The primary use case is to allow our employees to connect to the firewall on-premises, then they can access our office resources. This includes their respective computer, the intranet, shared files, and local applications, even if they are outside of the organization's network. Our production will be locked down if my VPN stops working, leaving the company unable to work. As such, this is a crucial service for us and resources need to be available for each of our users when working remotely.
Pros and Cons
- "The most valuable feature is the seamless access."
- "We would like to see support for a layer seven VPN over UDP."
See 4 more Check Point Remote Access VPN Reviews
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.