Compare Check Point Remote Access VPN vs. Cisco IOS SSL VPN

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Check Point Remote Access VPN vs. Cisco IOS SSL VPN and other solutions. Updated: May 2021.
509,820 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The ability to create your trigger data domains is the solution's most valuable feature.""The management of the solution is very simple. It allows for a single view of all the endpoints.""The initial set up is not complex.""Our users find the interface very comfortable to use.""It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now.""It is easy to install the Endpoint Remote Access VPN client to different platforms.""The most valuable feature is the seamless access.""The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."

More Check Point Remote Access VPN Pros »

"The user interface is user-friendly.""The most valuable features are that it's reliable, convenient, and easy. It always works if configured well.""The feature I find most valuable, is the management portal.""The solution is very stable.""I like to work with the CMD command line because it's easy and it doesn't take very long to configure.""The solution is very easy to work with. This is its most valuable feature. They also did a good job surrounding how you configure the devices.""It's a very stable solution and I'd say it works perfectly.""The setup and installation was easy."

More Cisco IOS SSL VPN Pros »

Cons
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.""I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not.""They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.""There is always room for innovation and the addition of new features.""When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client.""The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed.""We would like to see support for a layer seven VPN over UDP.""We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."

More Check Point Remote Access VPN Cons »

"In terms of what needs improvement, it should have better integration. Although, it might have already been taken care of.""I would like for it to have support for the Dutch language. I typically use English in 99% of our communications but for some people, it matters.""The graphical interface is old and needs to improve.""The pricing needs to be better.""It can be difficult to find service and at times we cannot connect with the internet easily.""Cisco device management is quite difficult. They should work to simplify this.""I think the administration can be improved to include web interfaces.""The servers should be more user-friendly."

More Cisco IOS SSL VPN Cons »

Pricing and Cost Advice
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers.""The price of this product is good.""Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."

More Check Point Remote Access VPN Pricing and Cost Advice »

"I would say it is a bit expensive, but I think it is worth the price.""The pricing of the solution is reasonable""There are no pricing programs for non-profit organizations and the product is otherwise expensive by comparison."

More Cisco IOS SSL VPN Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
509,820 professionals have used our research since 2012.
Questions from the Community
Top Answer: The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN… more »
Top Answer: As far as I'm aware, Check Point is on the same line of pricing with Pulse at the moment. It's not any different. It is in line with the competition. There are no additional costs that I'm aware of.
Top Answer: We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important… more »
Top Answer: The system needs to be upgraded to replace the Token Authentication software, which will no longer be supported.
Top Answer: We are solution providers. We provide remote access solutions, internet access, and Voice over IP for our customers, as well as IT operational support. We use this solution to access their on-premises… more »
Ranking
Views
6,849
Comparisons
5,434
Reviews
8
Average Words per Review
848
Rating
8.6
Views
4,928
Comparisons
3,422
Reviews
12
Average Words per Review
325
Rating
7.9
Popular Comparisons
Also Known As
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
Cisco SSL VPN
Learn More
Overview

Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

Cisco SSL VPN solutions help you easily and securely extend the network to users who have access to the Internet and a web browser. You can customize access and extend the reach of your corporate network to individuals based on their roles, including teleworker contractors and business partners.
Offer
Learn more about Check Point Remote Access VPN
Learn more about Cisco IOS SSL VPN
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)
MST Systems
Top Industries
REVIEWERS
Financial Services Firm36%
Program Development Consultancy18%
Logistics Company9%
Non Tech Company9%
VISITORS READING REVIEWS
Comms Service Provider26%
Computer Software Company24%
Government7%
Financial Services Firm5%
REVIEWERS
Computer Software Company18%
Energy/Utilities Company9%
Educational Organization9%
Security Firm9%
VISITORS READING REVIEWS
Computer Software Company24%
Comms Service Provider23%
Government10%
Media Company5%
Company Size
REVIEWERS
Small Business22%
Midsize Enterprise33%
Large Enterprise44%
VISITORS READING REVIEWS
Small Business8%
Midsize Enterprise68%
Large Enterprise23%
REVIEWERS
Small Business50%
Large Enterprise50%
Find out what your peers are saying about Check Point Remote Access VPN vs. Cisco IOS SSL VPN and other solutions. Updated: May 2021.
509,820 professionals have used our research since 2012.

Check Point Remote Access VPN is ranked 4th in Enterprise Infrastructure VPN with 12 reviews while Cisco IOS SSL VPN is ranked 6th in Enterprise Infrastructure VPN with 12 reviews. Check Point Remote Access VPN is rated 8.6, while Cisco IOS SSL VPN is rated 8.0. The top reviewer of Check Point Remote Access VPN writes "Allows everyone to work from home, which is mission-critical for our organization". On the other hand, the top reviewer of Cisco IOS SSL VPN writes "Stable solution that provides secure access to your network and applications". Check Point Remote Access VPN is most compared with Cisco AnyConnect Secure Mobility Client, OpenVPN Access Server, Zscaler Private Access, TeamViewer and Citrix Gateway, whereas Cisco IOS SSL VPN is most compared with Pulse Connect Secure, F5 BIG-IP, Citrix Gateway, Symantec VIP Access Manager and Zyxel VPN Client. See our Check Point Remote Access VPN vs. Cisco IOS SSL VPN report.

See our list of best Enterprise Infrastructure VPN vendors.

We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.