Compare Check Point Endpoint Remote Access VPN vs. Cisco AnyConnect Secure Mobility Client

Check Point Endpoint Remote Access VPN is ranked 5th in Enterprise Infrastructure VPN with 2 reviews while Cisco AnyConnect Secure Mobility Client is ranked 2nd in Enterprise Infrastructure VPN with 10 reviews. Check Point Endpoint Remote Access VPN is rated 9.0, while Cisco AnyConnect Secure Mobility Client is rated 8.6. The top reviewer of Check Point Endpoint Remote Access VPN writes "Simple management, quick search capabilities, and very good stability". On the other hand, the top reviewer of Cisco AnyConnect Secure Mobility Client writes "Lightweight and stable with good connectivity". Check Point Endpoint Remote Access VPN is most compared with OpenVPN, Prisma Access by Palo Alto Networks and Cisco AnyConnect Secure Mobility Client, whereas Cisco AnyConnect Secure Mobility Client is most compared with Prisma Access by Palo Alto Networks , Zscaler Private Access and OpenVPN. See our Check Point Endpoint Remote Access VPN vs. Cisco AnyConnect Secure Mobility Client report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Check Point Endpoint Remote Access VPN? Share your opinion.
Find out what your peers are saying about Check Point Endpoint Remote Access VPN vs. Cisco AnyConnect Secure Mobility Client and other solutions. Updated: March 2020.
406,312 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
The management of the solution is very simple. It allows for a single view of all the endpoints.The ability to create your trigger data domains is the solution's most valuable feature.

Read more »

The solution works very well. You just click and it's working.The setup is quick and easy on the client-side.The solution is very easy to use and set up.The most valuable feature is the connection feature.This solution is stable. There have been no technical issues.It is easy to handle, you can have it on Windows, Mac, and Linux.It's easy to handle. You can have it on Windows, Linux or Mac, that's quite useful.I like how I don't need to see the solution or start it up. I just use my computer and have it working in the background. I start my laptop and it's there and working. That's the most important feature.

Read more »

Cons
I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not.The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.

Read more »

The configuration from the client-side would be useful. Right now, it's not centralized. There should be a lock so that it can only be configured from one place.The setup is a bit difficult to handle on the server-side.Behavior analytics and other newer technologies should be integrated into the solution.There are situations where the connection drops, and you may not even be aware of it until you try to do something critical.I have been working with the same interface for the last ten years. I would say that it needs some improvements made.It would be useful to have an automatic install process where if you connect and you don't have the latest version, it should be automatically done.Every two weeks there was a new version to install which was annoying for the users.The hotspots give me connectivity issues occasionally. It could be easier to use if it allowed me to choose the hotspot.

Read more »

Pricing and Cost Advice
Information Not Available
Sometimes there is a problem with the number of licenses for the end-user. The number of concurrent users is limited due to a valid license.

Read more »

report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
406,312 professionals have used our research since 2012.
Ranking
Views
856
Comparisons
717
Reviews
2
Average Words per Review
409
Avg. Rating
9.0
Views
1,635
Comparisons
1,370
Reviews
10
Average Words per Review
337
Avg. Rating
8.5
Top Comparisons
Also Known As
Cisco AnyConnect Secure Mobility, AnyConnect Secure Mobility, Cisco AnyConnect, AnyConnect
Learn
Check Point
Cisco
Overview

The Check Point Endpoint Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

As mobile workers roam to different locations, an always-on intelligent VPN helps AnyConnect client devices to automatically select the optimal network access point and adapt its tunneling protocol to the most efficient method. This may include voice over IP (VoIP) traffic, TCP-based application access, or Datagram Transport Layer Security (DTLS) protocol for latency-sensitive traffic.

Offer
Learn more about Check Point Endpoint Remote Access VPN
Learn more about Cisco AnyConnect Secure Mobility Client
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)MST, Molina Healthcare, Ritchie Bros. Auctioneers, Arup, New South Wales Rural FireService
Top Industries
No Data Available
VISITORS READING REVIEWS
Software R&D Company34%
Comms Service Provider20%
Construction Company8%
K 12 Educational Company Or School5%
Find out what your peers are saying about Check Point Endpoint Remote Access VPN vs. Cisco AnyConnect Secure Mobility Client and other solutions. Updated: March 2020.
406,312 professionals have used our research since 2012.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.