We performed a comparison between BeyondTrust Remote Support and Check Point Remote Access VPN based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Remote Support 16.2 introduced Web Interface for Representative Console.with same functions as Desktop Console."
"The jump to feature function is the most valuable to us as it allows us to directly remote control customers."
"The file transfer feature allows IT to provide needed drivers and files without interfering with the employee's workflow."
"Solution has a good UI."
"This product has drastically improved the speed and ease at which we provide client support from our Solutions Centre (service desk)."
"It is a lightweight, reliable solution that gives IT a direct visual of occurring issues."
"We have not encountered any issues with stability. Updates leave us with less than 30 minutes of downtime."
"The remote reboot feature is particularly valuable for rebooting terminal servers that have power controls disabled."
"Check Point Remote Access VPN is a stable solution."
"The ability to create your trigger data domains is the solution's most valuable feature."
"The solution offers high scalability as far as adding more users."
"It operates effectively, particularly during challenges like adversities or infrastructure issues."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
"For a basic setup, implementation is quite easy."
"Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work."
"We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway."
"Technical support for this region can be improved."
"This product has a lot of features that we do not currently use, so there may be some things that cause bloat and confusion."
"It lacks voice integration like the other products because they need the compression to support that large amount of concurrent sessions. We've had to sacrifice voice."
"I would like more insight into completed sessions. This would be nice, such as a historical log into the technician client application."
"It is expensive. Its initial setup was also a little bit involved, but it was nothing that we couldn't eventually handle. Currently, it has the ability to share screens. Somebody having an issue with their phone can share their screen with a technician sitting at a computer. It would be nice to also be able to control phones remotely, but this could be a limitation of a phone's operating system."
"The Bomgar representative console could do with modernising. The Web rep console introduced is a marked improvement, but is currently not at feature parity with the thick client. This is being worked on."
"iOS interactive support would be a cool addition. Right now it's a non-interactive view."
"Lacks some kind of voice communication option."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"There were some issues with automation and instability."
"You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable MEP function is not so easy to size the gateway licenses."
"There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."
"We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
"Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server."
More Check Point Remote Access VPN Pricing and Cost Advice →
BeyondTrust Remote Support is ranked 7th in Remote Access with 32 reviews while Check Point Remote Access VPN is ranked 5th in Remote Access with 60 reviews. BeyondTrust Remote Support is rated 9.0, while Check Point Remote Access VPN is rated 8.8. The top reviewer of BeyondTrust Remote Support writes "A robust, secure, and complete solution for quickly providing support and monitoring what's going on". On the other hand, the top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". BeyondTrust Remote Support is most compared with Microsoft Remote Desktop Services, TeamViewer, BeyondTrust Privileged Remote Access, F5 BIG-IP Access Policy Manager (APM) and Delinea Secret Server, whereas Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange. See our BeyondTrust Remote Support vs. Check Point Remote Access VPN report.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.