Check Point Remote Access VPN Valuable Features

AG
reviewer1398543
Network Security Engineer at a financial services firm with 51-200 employees

The most valuable part would be allowing users to have a seamless connection to the Check Point firewall, which is what we use for controlling access to our on-premise area. Otherwise, we would have to get some other type of VPN solution that I don't know how well would work with the Check Point firewalls. Keeping it in the same ecosystem is good.

View full review »
JM
reviewer1098015
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees

The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage. 

The integration with two-factor authentication for Remote Access users is another valuable feature. In our case we use RSA.

Those two are the most valuable aspects that we have on the solution. It also gives us the possibility to securely connect to the company resources, without Check Point security measures.

Another good thing we like is that we already have all the logs from the firewall on the SmartPortal as the remote VPN also integrates into the firewall. We can see all the logs on the same tool because we also have a fully secure solution for Remote Access VPN. For full security, we need to manage the different hardware from the firewalls and the logs that are not in the same place. This is another valuable aspect of this solution. 

Having access to those logs affects our security operations because if a user calls the support but does not have access to the VPN, we can see on the same tool on the SmartPortal. If he's being blocked on the firewall policy, you can see it with the VPN profile.

If the user is using Foo, we need to go to the Check Point firewall to see the Check Point firewall log on the perimeter firewall, to see if the user is crossing the firewall to get the Foo. Then we need to go to the supplier to see that the logs are there. So we need to go to two places.

View full review »
Oleg Pekar
Senior Network/Security Engineer at Skywind Group
  1. It is easy to install the Endpoint Remote Access VPN client to different platforms. Within the company, we use it for Windows and macOS.
  2. Built-in, centrally-managed Firewall blade, which allows filtering traffic on the client-side.
  3. Built-in, centrally-managed Compliance blade. We check the client OS on the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.
  4. Stable VPN connection.
View full review »
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: May 2021.
501,151 professionals have used our research since 2012.
RS
reviewer1232001
IT Tech Security Management at a logistics company with 1,001-5,000 employees

The differentiator for this solution is the management interface that we find very good and provides a single view for all endpoints. The solution offers SmartLog that allows quick searches. The compliance modules are also very interesting.

View full review »
Kirtikumar Patel
Network Engineer at LTTS

The most valuable feature is the seamless access. Using this, we control access to our on-premises resources, and our users who are working from outside are easily able to access their office area computers, file servers, and intranet applications.

This product allows us to provide WAN access for our users, whereas prior to this, we could not make the whole intranet available.

Multifactor authentication is very helpful for us.

View full review »
Adriano-Simao
IT System Integrator at a financial services firm with 201-500 employees

The ability to create your trigger data domains is the solution's most valuable feature.

View full review »
NT
reviewer1144182
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees

Our users find the interface very comfortable to use.

View full review »
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: May 2021.
501,151 professionals have used our research since 2012.