We performed a comparison between Check Point Remote Access VPN and Zscaler Zero Trust Exchange based on real PeerSpot user reviews.
Find out what your peers are saying about TeamViewer, Microsoft, Citrix and others in Remote Access."Access is browser-based only and requires no additional client installation."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
"It is a scalable solution...The technical support team of the solution is very good."
"It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents."
"Check Point has been perfect for protecting us from any type of attack or data theft during remote management."
"The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
"The solution implemented in the cloud allows us to easily scale in cases of user increase."
"The solution has been solid for me for over five years."
"The most valuable features are the File Type Control and SSL bypass policies. We"
"The product's most valuable features are cloud-based services and secure internet access. We don't have to set up any physical appliances."
"The Live Logs are a cool feature. We can directly identify issues and divert user traffic."
"The most valuable feature is the manageability of the micro tunnels."
"I find all Zscaler Private Access features valuable because each replaces flawed technologies, such as EPAs being replacements for VPN and PR as a replacement for PAM, so I can't mention only one valuable feature. Overall, Zscaler Private Access is a good solution."
"Users get direct secure access to applications over the internet."
"The most valuable feature of Zscaler Private Access is the categorization of the dynamic URLs which keeps the customer's environment protected. The threats and the malware are correctly categorized."
"The most valuable feature is its ability to establish connectivity for remote users and remote endpoints. It offers a high level of granularity compared to typical VPNs, which also encapsulate a lot of I/O."
"You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable MEP function is not so easy to size the gateway licenses."
"Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."
"The provisioning of VPN users has room for improvement."
"We encounter challenges for the product’s installation and troubleshooting processes compared to other VPN products."
"It would be good to have Remote Access VPN solutions for Check Point edge services."
"The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
"We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
"Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience."
"There are latency issues with the solution. They are small, however, they are there when you compare it to other vendors."
"What could be improved in Zscaler Private Access is its notification. For example, if there's a speed issue, there should be a pop-up that alerts the user about it. If there is a network quality issue, for example, it isn't good enough to connect to, or the network quality is bad, there should be a notification from the solution. Zscaler Private Access also needs improvement in terms of its interface and security."
"It has a limitation, if you are creating a rule or something for a web application or something, you could only add five users, not more than that. Five or four users are only included in a rule. If you want to create a rule for more than five or four users, you have to go through other methods, not particularly with the application. Working within the application with this method would be quite easy as compared to listing a URL or a normal IP address."
"Zscaler Private Access could improve by improving external access. If external parties want to access locally to my company's services, we need to onboard them into our domain, otherwise, it doesn't work. Additionally, if their company also has Zscaler Private Access, then it doesn't work. They need to log in with our domain ID, not their company ID."
"The area that requires improvement is their support. The current support is lacking."
"We'd like to have two-factor authentication that is quite simple."
"It's an expensive solution."
"More on-prem infrastructure is required when Zscaler Private Access is to be implemented as a single point of entry."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 4th in Remote Access with 60 reviews while Zscaler Zero Trust Exchange is ranked 1st in ZTNA as a Service with 34 reviews. Check Point Remote Access VPN is rated 8.8, while Zscaler Zero Trust Exchange is rated 8.4. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Zscaler Zero Trust Exchange writes "Allows for strict access control, granting access to specific applications at a URL level rather than at the physical IP level". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Symantec VIP Access Manager, whereas Zscaler Zero Trust Exchange is most compared with Prisma Access by Palo Alto Networks, Cato SASE Cloud Platform, Axis Security, Cisco AnyConnect Secure Mobility Client and Jamf Connect.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.