Check Point Remote Access VPN Room for Improvement

Ozan Durmus - PeerSpot reviewer
Senior Information Security Specialist at AKBANK TAS

The client-side UI is fundamental, and there is nothing to see.

View full review »
josephtampient3 - PeerSpot reviewer
CEO at T3 Real Estate Group

The main feature that would be improved within Check Point Remote Access is its operation within Linux OS, as it currently does not have many features for that OS. You cannot access the detection of threats that can steal your data. 

In addition, it does not have an incident analysis that can detect failures in time in the network or VPN connectivity. 

Also, the IPsec settings on Linux are quite limited, which makes it a bit difficult to configure the settings you can make for remote connection to Linux.

View full review »
SK
Network Security Engineer at a consumer goods company with 201-500 employees

This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity. 

For example, when my internet is not working properly, then the VPN disconnects all of sudden and if I want to connect again, I need to do so with credentials and 2FA. In the next release, if the product could program in a hold time then disconnect the VPN due to the internet's fluctuation, that would be ideal as it would improve the way we can monitor our network visibility.

View full review »
Buyer's Guide
Check Point Remote Access VPN
April 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system. 

Also, this product has limitations with headcount addition, as there are performance limitations in each security gateway the software has. 

The ability to allow split-tunneling while still following our corporate policy should be offered. 

Some things like the compliance aspect of the VPN Client can be updated so the product stays up to speed with the ever-changing environment in software security.

View full review »
MM
Network Engineer at a non-profit with 10,001+ employees

Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte.

For improvements in the product, I can create a wishlist since it is a VPN technology. I would love to see what is available on the VPN connections, but it is important for our company to check the encryption part of it.

View full review »
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE

We are still in the learning phase as of now, and there seem to be more and more feature upgrades in the standard version of the application. They're providing updated features in the application with complete compliance assurance - which is really awesome - and we need specific customizations to make it a perfect fit for our business environment. This is a new and emerging area and requires a lot of customization and flexible features to suit the business requirements. 

Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners.

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

Access is provisioned based on a single L3 tunnel being established between the endpoint and the VPN device. If an attacker gains access to this session then all of the tunnel traffic is compromised. It needs to move to next-generation style access, provisioning such as per-app VPN.

The GUI interface for configuring the SSL VPN is not user-friendly and requires expertise. 

Devices are exposed over the internet and it can lead to a security threat.

When a critical patch needs to be applied to the VPN, downtime is required for the entire NGFW. This can impact the business when it has a single security gateway.

This product cannot manage sudden user growth, as each security gateway has limitations in terms of performance and throughput.

The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access. Specifically, modules such as Threat prevention, Access control, and Incident analysis are supported only on Windows and Mac.

View full review »
Nagendra Nekkala - PeerSpot reviewer
Senior Manager ICT & Innovations at Bangalore International Airport Limited

Check Point Remote Access VPN's connectivity and establishment takes time and needs to be faster.

In the future, Check Point Remote Access VPN should provide its users with URL filtering.

View full review »
LF
Deputy Head of IT department at UkrGasBank

There were some issues with automation and instability. But overall, these self-integrated products offer exceptional support and prove highly beneficial from an administrative standpoint. It isn't overwhelming, as seen with instances like in other vendors. The platform is convenient to manage and scalable.

View full review »
Richard Hermogeno - PeerSpot reviewer
Channels Management Head at Philippine National Bank

I think Check Point Remote Access VPN is good enough to suffice our needs. At present, I don't have any complaints about the tool.

View full review »
MB
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees

We have not migrated to the R81 version and I do not doubt that it will have some improvements compared to the version we use today. 

Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor. This type of integration would undoubtedly give it a better reach and greater market with new security trends top of mind. 

I know that everything is moving to a cloud environment, however, for all those corporates that still do not trust such an environment, it would be favorable to offer a 2MFA service in a solution tested through a blade or in the cloud. 

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

One of the parts where the improvement of Check Point Remote Access VPN can be forced is in the compliance analysis. Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines.

Another point to improve is to program a timeout if the VPN is disconnected due to an internet problem. One complication that we found is that the Linux machines do not have a complete client to do the installation and that has not delayed a bit with our users who use this type of operating system

View full review »
MW
Web Developer at Netconomy Software & Consulting GmbH

This version has comprehensive features that provide reliable services based on the organization's requirements. 

Sometimes the application slows down the computing device, and this affects workflows. 

Most modern VPNs offer more features that are more powerful as compared to the ones set up in this system. 

The focus of the next release should be on the compatibility and speed of this platform so that it can easily compete with other products.

It should be customized to accept more languages and more locations.

View full review »
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana

We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution. This would allow us to have a tool that it is not only remote access for mobile devices but a remote access solution for virtual teams, including mobile devices such as cell phones, tablets, and other types of devices in IoT areas such as doors, houses, and medical equipment.

View full review »
FG
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT

It needs to improve the capability of the Secure browser VPN connections. Some in-house applications didn't work due to the use of JScript and the backend and front end technology for the applications. In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers.

View full review »
Recep  Alver - PeerSpot reviewer
Cyber Security Engineer at Natica IT Consulting at Natica IT Consulting

It's becoming old-fashioned and slightly out of date. We're moving towards DNS.

We have noted some stability issues. 

View full review »
SM
Network Engineer at Fujairah Port

It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices.

The configuration of a VPN requires a distinct VPN Tab. Once the VPN blade has been activated, after activating VPN blade, we need to make some configurations in the gateway option settings and others in the VPN communities section. It would be preferable if these two things came together in one place.

Apart from this, it operates flawlessly. To improve our IT Services, we poll our users. The majority of people say how excellent the remote access VPN service is. Additionally, they stated that once connected to a VPN service, they never experience connectivity problems.

View full review »
AT
Cyber Security Manager at H2O Power Limited Partnership

The ability to allow split-tunneling while still following our corporate policy needs to be on the table. Right now, in order to allow the same policy to apply, the users' traffic must be routed up to our NGFW before going out to the internet. Having a method to apply the same policy to the client for outbound traffic while connected to the VPN would be huge.

Some things like the compliance aspect of the VPN Client can be updated to bring it a little more modern. It's very useful for checking things like Windows Updates levels before connecting, however, it could use a facelift since it's still quite old-looking.

View full review »
Eladio José Sibaja Trejos - PeerSpot reviewer
Administrador Junior Level 1 at Compuguana

In the future, if this service could be installed in a faster and simpler way (rather than having it directly connected to the appliances), that would be ideal. Today, many of the solutions are not what was needed when we had perimeter security. It would be good to have Remote Access VPN solutions for Check Point edge services.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.

View full review »
VC
Implementation Specialist at NTT Security

Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and Auditors are forced to have the latest patches in place.

Checkpoint Major version should have an extended time than the default time mentioned in the end-of-life policy document with additional prices.

Tools must be introduced and supportive in analyzing the data, flow, and threats.

We have to introduce the scripting part to work seamlessly.

View full review »
JR
Project Manager at Digitas APAC

My experience with the set features has always been excellent. The secure connection networking system has enabled each team to connect effectively with colleagues from anywhere. 

Connection of devices from various locations is efficient though there are a few challenges when there is a network failure. Disconnection due to internet failure may affect the entire connection and slow down the workflow. 

The setup process requires skilled manpower and dedicated teams to get the best results from the entire connection system. 

Integration of more powerful kill switch tools will enhance secure connection. 

Additional server locations can boost service delivery and cut the cost of connecting computing devices from different areas.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

A characteristic to improve is the communication service under the SMTP scheme. In some cases, it is quite complex when it comes to managing, configuring, forwarding, and integrating mail services. It consumes a lot of processing and RAM memory. We want a solution that allows us to use current resources so that high processing peaks demanded by the virtual or physical equipment do not occur. 

View full review »
AG
Planning Analyst at Ovato

Sometimes it may mislead the user based on the requested location due to poor networking. 

Most features have capable performance that responds quickly to user requests. 

The cost of maintenance is high compared to most products in the market. 

Integrations with some applications are difficult due to poor compatibility tools. The development team should focus more on updates and integration features. 

I am impressed by the current performance despite the few challenges. The overall performance has been excellent, and I recommend it to others 

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

The solution needs:

Advanced monitoring and reporting capabilities in order to have a more detailed visibility into security incidents and events. It's important to note that the areas of improvement and additional features will vary depending on the specific use case and the organization's security needs, so it is recommended to contact the vendor to know more details about their roadmap and the next releases of the product. 

Improved scalability to allow the solution to handle larger numbers of users and devices without a significant impact on performance. 

View full review »
LN
Technical Manager at M.Tech

Endpoint Security on Demand, or Compliance Check is a good feature. It allows the creation of compliance policies and adds more security to the network. Machines will be scanned once they connect to VPN to make sure all of them are compliant. Conditions to configure compliance checks are Windows security (hotfixes, patches), Anti-Spyware, Anti-Virus software, personal firewall, or Custom (application, files, registry). These are not enough in a complicated environment. Almost of them are supported for Windows machines, however, are just limited conditions for non-Windows. In fact, using mobile devices on Android, iOS, macOS, and Linux is very popular. Compliance Check on Check Point should be improved by having more configurable conditions to support multi-platforms and adding more granularity. 

Besides compliance scanning sometimes causes consumes machine resources. 

I also suggest scanning operations will consume fewer resources and increase speed time.

View full review »
MB
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees

The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application. We'd be able to give a better experience to companies that already have a contract or Check Point services that deal with a work-from-home environment, giving greater scope and coverage from a single centralized dashboard.

View full review »
KP
Network Engineer at LTTS

We would like to see support for a layer seven VPN over UDP.-- currently some VPN solution are working on Layer 7 Platform.

The updates under Windows 10 are not always up to date, and we have trouble upgrading remote clients. We have also had trouble deploying new clients.-- The Check Point Remote VPN new client is giving trouble us during upgradation with older version of Windows 10

View full review »
Irshad Kazi - PeerSpot reviewer
Lead Technical Consultant at ITC Infotech

We encounter challenges for the product’s installation and troubleshooting processes compared to other VPN products. It is difficult to restore settings in cases of connection failure. This particular area needs improvement.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

The VPN remote Access blade could be improved. Licensing is extremely expensive per user and more so for large companies where the number of users directly impacts the cost.

The documentation for good practices and specific configurations is somewhat old, generally for versions before R80, which is why it is sometimes more challenging to understand them or be able to implement them,

Also, at the support level, response times can be improved, as the technical level for this type of tool is very good.

View full review »
SS
Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd

If you are new to deploying the solution, the initial setup might be difficult the first time around. I had trouble setting the policies and then resetting the device. 

View full review »
NK
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH

We don't have any specific complaints. We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in right from the software itself. For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent. The documentation of the software needs to be more accessible. If an end-user wants to have access to customized training from the company, that should be able to be built-in. I would add that feature. 

View full review »
ER
Security Officer at a hospitality company with 51-200 employees

The main area for improvement is pricing. Another area could be integrating MFA authentication directly into the solution instead of using separate benchmark tools for implementation.

View full review »
RS
Network and Security Engineer at a security firm with 11-50 employees

The product’s architecture is a bit distributed. It should consolidate the architecture to make everything available on a single dashboard.

View full review »
SR
Senior Security Engineer at a consultancy with 5,001-10,000 employees

Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience, bringing it closer to the level of Cisco AnyConnect, which is considered more user-friendly.

View full review »
WM
Information Technology Admin at a wellness & fitness company with 51-200 employees

We started with 50 users, but our numbers are increasing. Now it's difficult for us to maintain a steady internet connection and remote access, so we want to upgrade. We are considering a switch to FortiGate. I think they may have better service than Check Point offers. 

Scalability is where we're having problems now. Generally, Check Point has been working fine, but we need something that can accommodate many users and provide a steadier internet connection. Our remote users need to access the VPN without any issues. Of course, this could also have something to do with our internet connection at the organization.

We've been using Check Point to manage sites we need to block. It gives us the option to totally disable things, but it does not let the administrator create exceptions to allow specific users to access certain websites. Check Point could enable the administrator to permit users to access particular sites. I think the VPN we're using may have exceeded its lifespan. For example, if you check Instagram on Check Point, you might not even see it showing up, and it's difficult to restrict access to specific applications. 

View full review »
LD
Cloud Support at a tech company with 1-10 employees

The license is included with gw licensing, however, in terms of the number of users that can be activated for use.                                                                                       

In our case, we quote additional licensing and it is quite expensive for remote VPN, other manufacturers are not so expensive.

The support provided is slow, in addition to the fact that the service hours are contrary to ours, which generates slower problem solving, I think it is important to improve this area.

View full review »
SN
System Analyst at IIT Gandhinagar

The Linux version may have an app (similar to Windows) instead of a shell script. We have seen that in Windows and Apple systems the app is running on the system tray whereas in Linux we have to keep the Linux Terminal Window open otherwise the connection drops. Sometimes, we have noticed that the owing to installation of various antivirus and running of inbuilt firewalls (applicable to all operating systems); the connection for VPN sporadically drops and tries to reconnect. When this happens, we have to manually either disable the firewall/antivirus or reconnect the VPN again.

View full review »
KK
Head of IT Department at AS Attīstības finanšu institūcija Altum

The provisioning of VPN users has room for improvement.

The solution can improve by providing an option to centrally manage and upgrade client applications on a PC.

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

I would like this service to be easier to manage when you integrate it with third parties. 

Although it is complex to configure, I cannot complain that it is complete and it is worth being able to use and integrate it. However, any administrator would welcome any changes that made configuration simpler. 

We would like the ability to perform remote access with the VPN in the future with any type of device. Lately, Android applications tend to have more errors. I hope that this will be solved in the future. 

View full review »
PL
Firewall Engineer at a logistics company with 1,001-5,000 employees

The non-standard setup is quite complex as you have to do changes via GUI and CLI. Luckily, Check Point knowledgebase articles help you, however, there are so many resources you have to go through.

The Client VPN licenses are for concurrent users and there is currently no way to prioritize certain users over others.

There is no possibility to increase the number of concurrent users for a short time (except if you have unlimited concurrent users licensed). This could help during emergency situations where there are more client VPN users than anticipated.

View full review »
AD
Accounts Administrator at a non-profit with 51-200 employees

A saving password option might save time for continuous disconnection to the server due to internet fluctuation problems. 

They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds. 

If you don't get on your phone right away and check on your authentications, it will kick you out. 

In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems. 

The interface needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.

View full review »
LA
Network, Systems and Security Engineer at SOLTEL Group

Despite being very intuitive, the interface needs improvements. When you need to create something, you have to follow many steps and I think that should be simplified.

View full review »
SM
ICT at a manufacturing company with 501-1,000 employees

I would like to have the ability to specify different policies in a simple and quick way, depending on whether I am using the secure remote client or the SSL VPN.

It would be very useful to be able to apply different policies depending on the authentication method. For example, an 801x authentication can have different native permissions from those who enter the username and password.

In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems.

View full review »
JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services

Check Point Remote Access VPN could be more user-friendly.

View full review »
OP
Senior Network/Security Engineer at Skywind Group
  1. The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed. This is valid for at least software version E82.30, which we currently use.
  2. In addition, there is no full client of the Check Point Remote Access VPN available for the Linux operating systems families. That is important since some of our administrators prefer to use this OS even on their home PCs. We hope that Check Point would develop a client for Linux in the future.
View full review »
WA
Network Security Engineer at a manufacturing company with 5,001-10,000 employees

There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect. The VPN client install should be specific to our environment. Our service desk does get some complaints about users not being able to connect. Sometimes it's because the VPN client has updated and they've lost their connection settings and don't have a record of the connection settings themselves. Other times, the VPN client needs to be reinstalled or upgraded to allow them to connect.

View full review »
I.
Network security engineer at Fidelity Bank

With this particular client VPN, there needs to be a feature that can glance at your credentials, of being able to look at credentials. You might hang for a bit or the execution might fail. It would be useful to see your credentials before you connect to take note to see if you are likely to have trouble connecting. They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out. They need to give a bit more time.

View full review »
Eduardo Barcelos - PeerSpot reviewer
Sales Engineer at Tempest Security Intelligence

Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication.

View full review »
SA
Works at MONT Group of Companies

We would like to implement HTML5 (clientless access) in the product without installing any additional software.

It would also be desirable to be able to segregate the different authentication methods by domain user group.

Unfortunately at the moment, the division is only between domain and non-domain users.

What we also miss is control over the workstations for non-domain PCs that the client is installed on.

It would be nice if we could block such connections based on, for example, the machine name or connection ID.

View full review »
GD
Global IT Network and Security Service Senior Specialist at a manufacturing company with 1,001-5,000 employees

The main problem with Check Point is that some configuration can be done with the smart console in GUI, however, some others need to connect to the firewall via the CLI on SSH and therefore you will need to modify the local file on the firewall with VI. 

ASA is so easy to reserve some static IPs based on users, however, in Check Point, it is really difficult to do so. In addition, you can't reserve as static some IP that you are assigned dynamically to a local pool. 

You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable the MEP function is not so easy to size the gateway licenses. 

The configurations that you do to modify local files are not reflected in the GUI via the smart console. 

View full review »
PD
Associate Consult at Atos

Check Point RA VPN requires companies to take separate licenses initially so that only 5 connected users licenses are given as subscriptions. Most other competitors, like Palo Alto, provide 1000 connected user licenses for free.

Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server. We have to make changes in the local directory of the respective devices.

View full review »
AG
Network Security Engineer at a financial services firm with 51-200 employees

Currently, we're using Check Point Endpoint Remote Access VPN R70.30.03. That's the latest version of R70.30. We haven't upgraded to R80 yet, but all of our firewalls are R80. We've been through many iterations of the Endpoint VPN client. I remember awhile ago, it was very difficult to deploy and not have problems, but they've come a long way. Now, it's a lot better. 

I have worked so much on this in the past with Check Point that they actually had their vice president of product development call me. I remember one of the things that I told him need room for improvement, which I still haven't seen: When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client. 

They need to improve deploying a new Endpoint Remote Access VPN client and updating existing Endpoint Remote Access VPN clients. Especially if you want to deploy a new one, it's not an easy process. Their software doesn't really support creating a new Endpoint Remote Access VPN client. There is a lot of manual activity. They need to automate it better. You have to create a generic client, download it to a computer, and install it to the computer. Then, you have to find a file deep inside the directory that it creates. It's like a text file, then you take that text file out and edit the settings in it. For example, I have to tell it to connect to a site which contains our firewalls or else it's like a phone with no phone numbers and I have to put in the phone numbers. This should be done when I download the client the first time from their GUI, but it is not. Instead, I have to install a generic blank version on a computer, find a text file, and edit the text file with the sites of firewalls that the users have to connect to specific to my company. I have to make other setting changes in that version, save it, reboot the computer, find the file again, take that file out of the computer, upload it to GUI, and deploy a new version. Then, I install it after I uninstalled the old one. Of course, all the uninstalls require reboots. So, I am rebooting it like five times now. After that, I have to install it and check the settings. Half the time they don't save the way you want them to save. It is very tedious and terrible. 

Even learning that process was a nightmare, because it's not like they have a nice article that explains it to you. They don't. I was bumping my head up against the wall with support for almost six or seven months trying to figure that out. Half of them didn't even know how to do it. That was miserable. But now that I'm an expert on it, I can probably do it within a half a day to three days depending on if it gives me problems or not. That's still miserable, and it should be as easy as: I upload the new version of the client, put in the information that I want it to have on the settings, click download, and install, then it works. It should be that easy. There's really no reason why it's not, except for they didn't improve that process nor have they developed that area. It makes me think that their interest isn't in VPN solutions, even though it should be because it's something that they offer. Otherwise, their support is great.

View full review »
CK
Senior System Engineer at Thai Transmission Industry

In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.

View full review »
RS
IT Tech Security Management at a logistics company with 1,001-5,000 employees

I cannot see the full effect of the antibot solution because it relies on having access to the DNS queries, which might not go through the Check Point firewall when you're using it for perimeter networks. In this case Check Point will not identify the actual source of the DNS queries associated with antibot activity. This may be related to the customer architecture, however, and not due to product limitation. I don't know if it can be improved on the Check Point side or not.

The solution should allow for the automatic identification of destinations. 

We have a URL qualification on the on-premises deployment model; this should also be the case on the cloud. The automatic classification should be done by the cloud team instead of having to specify or subscribe to a RSS for the information, we should be able to have an object that represents such cloud services. It's possible that Check Point already allows for this, but if they don't they should.

View full review »
OP
Electronic Engineer at eBTel Cia. Ltda.

Check Point Remote Access VPN's enterprise support could be improved. The principal support is the problem with the operating systems. The customers have a problem with not being able to publish the application.

View full review »
JM
Network Security Engineer/Architect at Euronext Technologies SAS

We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved. 

View full review »
AS
Chief Technology Officer at Triana Business Solutions Lda

The solution should include the ability to integrate the equipment's functionality with others. For example, we would like Checkpoint to be able to integrate easily to the public key infrastructure. According to Checkpoint, there is no use case for this right now. 

The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified. 

View full review »
it_user147558 - PeerSpot reviewer
Network Engineer at a tech consulting company with 51-200 employees
The SSL VPN needs a Java applet to be installed and it is also dependent on the latest version of java. If our users use their work laptops at home they don’t have the permission to install anything that would be great if this applet can run without administrator permission. View full review »
NT
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees

There is always room for innovation and the addition of new features.

View full review »
Buyer's Guide
Check Point Remote Access VPN
April 2024
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.