We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros | |
"The ability to create your trigger data domains is the solution's most valuable feature." "The management of the solution is very simple. It allows for a single view of all the endpoints." "Our users find the interface very comfortable to use." "It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now." "The most valuable feature is the seamless access." | "The ability to change the way that the client works to a service so that we can get a little bit deeper into the operating system, as opposed to just an app running is the most valuable aspect. We also like the unattended sessions. Those are probably the two most important things to us. It's important because we can't do certain things when it is just an application running." |
Cons | |
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified." "I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not." "There is always room for innovation and the addition of new features." "When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client." "We would like to see support for a layer seven VPN over UDP." | "If they included some sort of monitoring system for managed services so we can have it all in one package, that would be helpful. There are managed services solutions that allow us to remote into the computers, but a lot of them have too much overhead. Usually, the remote connection is not as simple and as fast and cannot be run as a service." |
Pricing and Cost Advice | |
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers." More Check Point Endpoint Remote Access VPN Pricing and Cost Advice » | "It's very inexpensive. The seats are $25 monthly apiece or something. There aren't additional costs that I'm aware of." |
Use our free recommendation engine to learn which Remote Access solutions are best for your needs. 457,209 professionals have used our research since 2012. | |
Questions from the Community | |
Top Answer: Our users find the interface very comfortable to use. Top Answer: There is always room for innovation and the addition of new features. Top Answer: In our current dynamic, we are using this solution to provide access to data and some business applications over the internet. | Ask a question Earn 20 points |
Ranking | |
Views 2,632 Comparisons 2,009 Reviews 5 Average Words per Review 862 Rating 9.0 | Views 5 Comparisons 3 Reviews 1 Average Words per Review 1,382 Rating 9.0 |
Popular Comparisons | |
![]() Compared 32% of the time. ![]() Compared 32% of the time. ![]() Compared 17% of the time. ![]() Compared 11% of the time. ![]() Compared 3% of the time. | |
Learn | |
Check Point | LogMeIn |
Overview | |
The Check Point Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data. | Radically Refreshing Remote Support
|
Offer | |
Learn more about Check Point Endpoint Remote Access VPN | Learn more about GoToAssist |
Sample Customers | |
Osmose, International Fund for Animal Welfare (IFAW) | Information Not Available |
Top Industries | |
Comms Service Provider28% Computer Software Company24% Media Company7% Financial Services Firm5% | No Data Available |
Company Size | |
Small Business29% Midsize Enterprise14% Large Enterprise57% | No Data Available |
Check Point Endpoint Remote Access VPN is ranked 4th in Remote Access with 5 reviews while GoToAssist is ranked 11th in Remote Access with 1 review. Check Point Endpoint Remote Access VPN is rated 9.0, while GoToAssist is rated 9.0. The top reviewer of Check Point Endpoint Remote Access VPN writes "Allows everyone to work from home, which is mission-critical for our organization". On the other hand, the top reviewer of GoToAssist writes "Has the ability to change the way that the client works to a service so that we can get a little bit deeper into the operating system". Check Point Endpoint Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Zscaler Private Access, Prisma Access by Palo Alto Networks and Microsoft Remote Desktop Services, whereas GoToAssist is most compared with .
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.