Compare Check Point Endpoint Remote Access VPN vs. Pulse Connect Secure

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Check Point Endpoint Remote Access VPN vs. Pulse Connect Secure and other solutions. Updated: November 2020.
447,846 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The ability to create your trigger data domains is the solution's most valuable feature.""The management of the solution is very simple. It allows for a single view of all the endpoints.""Our users find the interface very comfortable to use.""It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now.""The most valuable feature is the seamless access."

More Check Point Endpoint Remote Access VPN Pros »

"I can safely say this is one of the best solutions I have seen for VPN access. It can achieve what other vendors may not be able to. This product will train you about exactly what an SSL should be. You can leverage it to do whatever you wish, the way you wish to do it. This is the solution if you want a perfectly scalable product for your enterprise that can help your mobile users and integrate with the latest technologies.""The most valuable feature is being able to securely connect and use virtual desktops."

More Pulse Connect Secure Pros »

Cons
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.""I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not.""There is always room for innovation and the addition of new features.""When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client.""We would like to see support for a layer seven VPN over UDP."

More Check Point Endpoint Remote Access VPN Cons »

"Zero test FDP (Fraud Protection and Prevention) should be improved.""This solution normally works but at times, we have had trouble with connectivity."

More Pulse Connect Secure Cons »

Pricing and Cost Advice
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."

More Check Point Endpoint Remote Access VPN Pricing and Cost Advice »

"The cost of the product is high, but worth it because of the utility and great product support."

More Pulse Connect Secure Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
447,846 professionals have used our research since 2012.
Questions from the Community
Top Answer: Our users find the interface very comfortable to use.
Top Answer: There is always room for innovation and the addition of new features.
Top Answer: In our current dynamic, we are using this solution to provide access to data and some business applications over the internet.
Top Answer: The most valuable feature is being able to securely connect and use virtual desktops.
Top Answer: This solution normally works but at times, we have had trouble with connectivity. Disconnections are not regularly happening but they do cause us problems. This type of instability is very serious and… more »
Top Answer: We use this solution to create a secure connection for our virtual desktops when we are working from home or other remote locations.
Ranking
Views
2,337
Comparisons
1,808
Reviews
5
Average Words per Review
862
Avg. Rating
9.0
Views
6,077
Comparisons
3,907
Reviews
2
Average Words per Review
613
Avg. Rating
9.0
Popular Comparisons
Compared 18% of the time.
Learn
Check Point
Pulse Secure
Overview

The Check Point Remote Access VPN Software Blade provides users with secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

The Pulse Connect Secure enables you to give employees, partners, and customers secure and controlled access to your corporate data and applications including file servers, Web servers, native messaging and e-mail clients, hosted servers, and more from outside your trusted network using just a Web browser.
Offer
Learn more about Check Point Endpoint Remote Access VPN
Learn more about Pulse Connect Secure
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)Axcient, Baloise Group, Cygate, Catholic University of America, Datec Inc, Revlon, Santa Monica Networks, 7-Eleven
Top Industries
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider26%
Media Company9%
K 12 Educational Company Or School4%
VISITORS READING REVIEWS
Computer Software Company29%
Comms Service Provider23%
Government7%
Financial Services Firm4%
Find out what your peers are saying about Check Point Endpoint Remote Access VPN vs. Pulse Connect Secure and other solutions. Updated: November 2020.
447,846 professionals have used our research since 2012.

Check Point Endpoint Remote Access VPN is ranked 7th in Enterprise Infrastructure VPN with 5 reviews while Pulse Connect Secure is ranked 9th in Enterprise Infrastructure VPN with 2 reviews. Check Point Endpoint Remote Access VPN is rated 9.0, while Pulse Connect Secure is rated 9.0. The top reviewer of Check Point Endpoint Remote Access VPN writes "Allows everyone to work from home, which is mission-critical for our organization". On the other hand, the top reviewer of Pulse Connect Secure writes "The flexibility enables us to design solutions well, save effort and cost, and better support customers". Check Point Endpoint Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Zscaler Private Access, Prisma Access by Palo Alto Networks and Microsoft Remote Desktop Services, whereas Pulse Connect Secure is most compared with Cisco IOS SSL VPN, F5 BIG-IP, SonicWall SMA, Citrix Gateway and OpenVPN Access Server. See our Check Point Endpoint Remote Access VPN vs. Pulse Connect Secure report.

See our list of best Enterprise Infrastructure VPN vendors.

We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.