We performed a comparison between Check Point Remote Access VPN and Safe-T Secure Application Access based on real PeerSpot user reviews.
Find out what your peers are saying about OpenVPN, Fortinet, Cisco and others in Enterprise Infrastructure VPN."It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"The solution has good performance."
"I found the MEP feature the most valuable. This has improved users' latency allowing the users to connect to the nearest Azure Check Point VM."
"The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
"The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
"Our users find the interface very comfortable to use."
"The most valuable feature is the seamless access."
"Check Point has been perfect for protecting us from any type of attack or data theft during remote management."
"It offers a simple configuration and setup."
"We can integrate remote access to our branches through Check Point services."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"Safe-T is very good for users because it has plug-in for Outlook."
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"There must be a more easy-to-use GUI."
"We would like to see support for a layer seven VPN over UDP."
"In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system."
"The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately."
"Improved scalability would allow the solution to handle larger numbers of users and devices without a significant impact on performance."
"We encounter challenges for the product’s installation and troubleshooting processes compared to other VPN products."
"A characteristic to improve is the communication service under the SMTP scheme."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"When you need to create something, you have to follow many steps and I think that should be simplified."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
"The Outlook agent is not working well for installing it in the entire office."
More Check Point Remote Access VPN Pricing and Cost Advice →
Earn 20 points
Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 60 reviews while Safe-T Secure Application Access is ranked 44th in Enterprise Infrastructure VPN. Check Point Remote Access VPN is rated 8.8, while Safe-T Secure Application Access is rated 7.8. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange, whereas Safe-T Secure Application Access is most compared with .
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.