Check Point Endpoint Remote Access VPN vs. F5 BIG-IP

Check Point Endpoint Remote Access VPN is ranked 12th in Enterprise Infrastructure VPN vs F5 BIG-IP which is ranked 1st in Enterprise Infrastructure VPN with 22 reviews. The top reviewer of F5 BIG-IP writes "Hardware and software partitioning enable us to deploy multiple instances, two vCMPs". Check Point Endpoint Remote Access VPN is most compared with OpenVPN. F5 BIG-IP is most compared with Citrix NetScaler ADC, A10 Networks Thunder ADC and HAProxy .
Cancel
You must select at least 2 products to compare!
+Add products to compare
Most Helpful Review
Use Check Point Endpoint Remote Access VPN? Share your opinion.

Have A Question About Enterprise Infrastructure VPN?

Our experts can help. 294,620 professionals have used our research on 6,613 solutions.

Quotes From Members Comparing Check Point Endpoint Remote Access VPN vs. F5 BIG-IP

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
The pricing is inclusive of many features.Security should be involved in any base license. When you bring on F5, you only have default license. Then, the ASM product license has to be purchased. It would be great if F5 could include the ASM in the base license.It's fair, it's not too expensive. Maybe just a little high.It is the best solution, but that comes with an increased price.Try to negotiate all the software features that you require upfront.The licensing strategy for F5 is good.It's not a cheap product, but there are no other replacements for what we do with it.I would recommend that the cost be lowered.

Read more »

report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
294,620 professionals have used our research since 2012.
Ranking
RANKING
Views
94
Comparisons
72
Reviews
0
Followers
21
Avg. Rating
N/A
Views
35,073
Comparisons
24,093
Reviews
20
Followers
600
Avg. Rating
7.9
Top Comparisons
Top ComparisonsSee more Check Point Endpoint Remote Access VPN competitors »
Compared 14% of the time.
Compared 11% of the time.
See more F5 BIG-IP competitors »
Also Known As
Also Known AsBIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery Controller
Website/Video
Website/VideoCheck Point
F5
Overview
Overview

The Check Point Endpoint Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

The BIG-IP family of products offers the application intelligence that network managers need to ensure applications are fast, secure, and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility, and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry.
OFFER
Learn more about Check Point Endpoint Remote Access VPN
Learn more about F5 BIG-IP
Sample Customers
Sample CustomersOsmose, International Fund for Animal Welfare (IFAW)Riken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.
Top Industries
Top Industries
No Data Available
REVIEWERS
Comms Service Provider
36%
Financial Services Firm
29%
Energy/Utilities Company
7%
Non Tech Company
7%
VISITORS READING REVIEWS
Financial Services Firm
26%
Comms Service Provider
14%
University
8%
Manufacturing Company
7%
Company Size
Company Size
No Data Available
REVIEWERS
Small Business
22%
Midsize Enterprise
13%
Large Enterprise
66%
VISITORS READING REVIEWS
Small Business
19%
Midsize Enterprise
17%
Large Enterprise
63%

Have A Question About Enterprise Infrastructure VPN?

Our experts can help. 294,620 professionals have used our research on 6,613 solutions.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email