Most Helpful Review
Multi-factor authentication helps to securely provide access to company resources while working offsite
Find out what your peers are saying about Check Point Endpoint Remote Access VPN vs. Fortinet FortiClient and other solutions. Updated: November 2020.
446,956 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The ability to create your trigger data domains is the solution's most valuable feature."
"The management of the solution is very simple. It allows for a single view of all the endpoints."
"Our users find the interface very comfortable to use."
"It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now."
"The most valuable feature is the seamless access."
"Remote connectivity is its most valuable feature."
"The return on investment was very reasonable. It was low cost and it functioned, so the return on investment was excellent."
"It's pretty stable, and I don't have any problems with it."
"The solution is very scalable. It just depends on the number of licenses an organization has. The enterprise management console is related to the number of clients, and the client interface itself is free to download."
"I think the solution is highly scalable."
"The most valuable feature is that it's easy to deploy. Deployment, configuration, and troubleshooting are very easy."
"The configuration is the most valuable feature."
"It is very easy and useful. A normal user with basic information can easily connect to any environment."
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"There is always room for innovation and the addition of new features."
"When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."
"We would like to see support for a layer seven VPN over UDP."
"The initial setup was probably more complex. The configuration was somewhat unclear."
"Everybody else is doing AI, machine learning, self-healing, next-generation features. It needs more next-generation features. Everybody else is doing AI, machine learning, self-healing, next-generation features. It needs more next-generation features."
"I haven't found that that solution does anything amazing."
"Initially, the support was very poor. It is getting better, but they should continue to improve this."
"I would like to see an improvement in the web filter, because I think it can be more user-friendly."
"The price could also use improvement."
"The pricing could use improvement."
"Technical support is awful. Their online response time is not prompt. They should not respond after four or five days. Their support guys are not competent enough. Small issues are taking time."
Pricing and Cost Advice
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."
"Licensing was free up to ten users and after that, it was pretty reasonable."
"Anyone can download this product for free, but you have to have a FortiGate gateway that you are connecting to."
"An annual license costs about 1.5 to 3,000 US dollars. There are no additional costs."
"The price is okay and competitive."
"Fortinet requires you to buy a lot of product in order for you to have proper protection."
"FortiClient is quite reasonably priced."
"The pricing is reasonable."
"The pricing is good because you get and end-to-end security solution in one package price."
Questions from the Community
Top Answer: Our users find the interface very comfortable to use.
Top Answer: There is always room for innovation and the addition of new features.
Top Answer: In our current dynamic, we are using this solution to provide access to data and some business applications over the internet.
Ask a question
Earn 20 points
out of 39 in Enterprise Infrastructure VPN
Average Words per Review
out of 39 in Enterprise Infrastructure VPN
Average Words per Review
Compared 34% of the time.
Compared 30% of the time.
Compared 18% of the time.
Compared 13% of the time.
Compared 2% of the time.
Compared 25% of the time.
Compared 11% of the time.
Compared 10% of the time.
Compared 6% of the time.
Compared 5% of the time.
Also Known As
The Check Point Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.
Securing your endpoints against sophisticated threats on a myriad of devices can be very challenging:
Learn more about Check Point Endpoint Remote Access VPN
Learn more about Fortinet FortiClient
|Osmose, International Fund for Animal Welfare (IFAW)||Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data|
Computer Software Company27%
Comms Service Provider25%
K 12 Educational Company Or School5%
Financial Services Firm25%
Comms Service Provider17%
Comms Service Provider30%
Computer Software Company19%
K 12 Educational Company Or School6%
No Data Available
See our list of best Enterprise Infrastructure VPN vendors.