Anonymous UserNetwork Security Engineer/Architect at a tech services company
Anonymous UserBCM/ECM Manager at a comms service provider
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The ability to create your trigger data domains is the solution's most valuable feature."
"The management of the solution is very simple. It allows for a single view of all the endpoints."
"The initial set up is not complex."
"Our users find the interface very comfortable to use."
"It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now."
"It is easy to install the Endpoint Remote Access VPN client to different platforms."
"The most valuable feature is the seamless access."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
"I like the ability to share the connections or simply to be able to pass the credentials for a connection to other colleagues without bothering too much about the connection being tracked or about security, because each and every user will require a secret password, so I don't really care about sending the details. It's very secure."
"I like that it is really easy to use, it's a simple product. It can connect remotely with a secure network."
"I like how I don't need to see the solution or start it up. I just use my computer and have it working in the background. I start my laptop and it's there and working. That's the most important feature."
"It's easy to handle. You can have it on Windows, Linux or Mac, that's quite useful."
"It is easy to handle, you can have it on Windows, Mac, and Linux."
"This solution is stable. There have been no technical issues."
"The most valuable feature is the connection feature."
"The solution is very easy to use and set up."
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
"There is always room for innovation and the addition of new features."
"When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."
"The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
"We would like to see support for a layer seven VPN over UDP."
"We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
"If they could simplify connections via other machines, like Linux or Mac OS X, it would be helpful."
"The logout should be automized and it should have a reminder that you have logged in into a private network."
"The hotspots give me connectivity issues occasionally. It could be easier to use if it allowed me to choose the hotspot."
"Every two weeks there was a new version to install which was annoying for the users."
"It would be useful to have an automatic install process where if you connect and you don't have the latest version, it should be automatically done."
"I have been working with the same interface for the last ten years. I would say that it needs some improvements made."
"There are situations where the connection drops, and you may not even be aware of it until you try to do something critical."
"Behavior analytics and other newer technologies should be integrated into the solution."
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."
"Sometimes there is a problem with the number of licenses for the end-user. The number of concurrent users is limited due to a valid license."
"The pricing depends on the requirement, so proper planning and an RF analysis help to properly size the solution and get the best pricing."
"The licensing costs are reasonable."
Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.
As mobile workers roam to different locations, an always-on intelligent VPN helps AnyConnect client devices to automatically select the optimal network access point and adapt its tunneling protocol to the most efficient method. This may include voice over IP (VoIP) traffic, TCP-based application access, or Datagram Transport Layer Security (DTLS) protocol for latency-sensitive traffic.
Check Point Remote Access VPN is ranked 4th in Enterprise Infrastructure VPN with 8 reviews while Cisco AnyConnect Secure Mobility Client is ranked 3rd in Enterprise Infrastructure VPN with 14 reviews. Check Point Remote Access VPN is rated 8.6, while Cisco AnyConnect Secure Mobility Client is rated 8.6. The top reviewer of Check Point Remote Access VPN writes "Allows everyone to work from home, which is mission-critical for our organization". On the other hand, the top reviewer of Cisco AnyConnect Secure Mobility Client writes "A user-friendly and clean interface, secure with multiple two-factor authentication options, and reliable". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Zscaler Private Access, Citrix Gateway, TeamViewer and Pulse Connect Secure, whereas Cisco AnyConnect Secure Mobility Client is most compared with Zscaler Private Access, OpenVPN Access Server, Fortinet FortiClient, Prisma Access by Palo Alto Networks and F5 BIG-IP. See our Check Point Remote Access VPN vs. Cisco AnyConnect Secure Mobility Client report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.