Check Point Remote Access VPN Overview

Check Point Remote Access VPN is the #4 ranked solution in our list of top Remote Access tools. It is most often compared to Cisco AnyConnect Secure Mobility Client: Check Point Remote Access VPN vs Cisco AnyConnect Secure Mobility Client

What is Check Point Remote Access VPN?

Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

Check Point Remote Access VPN is also known as Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN.

Check Point Remote Access VPN Buyer's Guide

Download the Check Point Remote Access VPN Buyer's Guide including reviews and more. Updated: May 2021

Check Point Remote Access VPN Customers

Osmose, International Fund for Animal Welfare (IFAW)

Check Point Remote Access VPN Video

Pricing Advice

What users are saying about Check Point Remote Access VPN pricing:
  • "My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
AG
Network Security Engineer at a financial services firm with 51-200 employees
Real User
Top 10
Allows everyone to work from home, which is mission-critical for our organization

What is our primary use case?

We use a Check Point Endpoint Remote Access VPN client along with Check Point SSL VPN, which allows users to connect to our firewall who don't have the client, e.g., if they have a MacBook, then we don't have a client for them. We allow them to connect to the firewall over the browser. That had a bunch of problems, but they have resolved those this year. The use case is to allow people to connect to our firewall on-premise. We also have Check Point firewalls in the cloud, which people can connect to as well. Then they can access resources either in our on-premise environment that they need to… more »

Pros and Cons

  • "It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now."
  • "When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."

What other advice do I have?

My advice would be to have patience. Make sure you get a Tier 3 support person. Setting up the servers and everything is easy, but deploying the Endpoint VPN client is not easy. They need to have someone walk them through the process of creating the Trac file that contains the settings for the client. That is hard. There is the endpoint server, which is on-prem, and easy to set up like any other appliance that any network engineer or systems administrator should know how to do. That is easy. But if you want to deploy the client, which most people want to deploy the client, and have any type of…
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Enables users to easily work from home

What is our primary use case?

We use Check Point Remote Access VPN to provide access to employees and to the company resources, especially now that most people are working from home. That's the main use. We also use it for specific companies that give us remote support to some applications. They access our company servers and resources. We're using Remote Access VPN with a specific profile for them that only gives access to some. We have two environments. Our firewalls and our perimeter firewalls are Check Point. The firewall connects to the internet and those firewalls are the ones that the people connect to for the… more »

Pros and Cons

  • "The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
  • "We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."

What other advice do I have?

It's not hard to deploy the solution. Remote Access VPN is easier to deploy than some other solutions like Pulse Secure. If you already have a Check Point firewall, this remote solution is a win-win because you don't need to buy, manage, or do a hardware refresh when you enter the end of life. You will have centralized logs on the same tools. If you have a Check Point firewall, this solution is the best for you. I would rate Check Point Remote Access VPN a nine out of ten. It works very well. I would say it's almost the perfect solution. As far as I'm aware, it's one of the oldest solutions…
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: May 2021.
501,151 professionals have used our research since 2012.
Senior Network/Security Engineer at Skywind Group
Real User
Top 5Leaderboard
Easy to install, centrally managed, and stable

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). In addition, there are about 30 Google Cloud projects of different sizes ranging from 10 to 250 virtual machines, and they are used for development, staging, production, etc. For every project, there is one dedicated scalable instance group of the Check Point CloudGuard IaaS gateways. We user the Check Point Remote Access VPN to provide access for our… more »

Pros and Cons

  • "It is easy to install the Endpoint Remote Access VPN client to different platforms."
  • "The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."

What other advice do I have?

The Check Point Endpoint Remote Access VPN for MacOs and Windows are reliable solutions for remote access VPN, and fully compatible with the Check Point security ecosystem.
RS
IT Tech Security Management at a logistics company with 1,001-5,000 employees
Real User
Simple management, quick search capabilities, and very good stability

Pros and Cons

  • "The management of the solution is very simple. It allows for a single view of all the endpoints."
  • "I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."

What other advice do I have?

We currently only use the on-premises deployment model, although we may extend into the cloud in the future. We're aware of the cloud's capabilities, but we're not using it because we don't have a large infrastructure expression there. In terms of advice, I'd suggest that others implementing the solution make sure training happens on their teams. Most products can have lots of features, but if you do not have proper knowledge, you will not be able to make use of those features. I'm very satisfied with this solution; I'd rate it eight out of ten.
Network Engineer at LTTS
Real User
Top 5Leaderboard
Multi-factor authentication helps to securely provide access to company resources while working offsite

What is our primary use case?

The primary use case is to allow our employees to connect to the firewall on-premises, then they can access our office resources. This includes their respective computer, the intranet, shared files, and local applications, even if they are outside of the organization's network. Our production will be locked down if my VPN stops working, leaving the company unable to work. As such, this is a crucial service for us and resources need to be available for each of our users when working remotely.

Pros and Cons

  • "The most valuable feature is the seamless access."
  • "We would like to see support for a layer seven VPN over UDP."
CK
Senior System Engineer at Thai Transmission Industry
Real User
Stable solution but they should strengthen their security features

What is our primary use case?

A lot of our clients are complimentary companies, like the electrical company. They need Check Point Remote Access VPN, or even another similar solution. I tell them that I already have the VPN solution in our company.

What needs improvement?

In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.

For how long have I used the solution?

I have been using Check Point for about one year.

What do I think about the stability of the solution?

I have not heard any complaints from the clients regarding its stability. I…
IT System Integrator at a financial services firm with 201-500 employees
Real User
Top 5Leaderboard
A secure solution that's reliable and scalable

What is our primary use case?

We primarily use the solution to have a secure connection and to offer security integration with our remote office as well as some other companies.

Pros and Cons

  • "The ability to create your trigger data domains is the solution's most valuable feature."
  • "The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified."

What other advice do I have?

We are using the on-premises deployment model. Checkpoint is very strong and very reliable. I would advise that those considering implementing the product go to a Checkpoint training session before implementing the solution. It's good to be familiar with the product beforehand. I'd rate the solution ten out of ten.
NT
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees
Real User
A comfortable interface that provides access to our data and business applications

What is our primary use case?

In our current dynamic, we are using this solution to provide access to data and some business applications over the internet.

What is most valuable?

Our users find the interface very comfortable to use.

What needs improvement?

There is always room for innovation and the addition of new features.

For how long have I used the solution?

We have been using this VPN for more than ten years.

What do I think about the stability of the solution?

With respect to stability, Check Point has been running smoothly and we haven't had any issues.

What do I think about the scalability of the solution?

We have about 500 people using this solution in our company during the COVID-19 pandemic. Prior to that, we had an average of 100 daily users.

How are

Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.