Compare Check Point Remote Access VPN vs. F5 BIG-IP

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Check Point Remote Access VPN vs. F5 BIG-IP and other solutions. Updated: March 2020.
501,151 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The ability to create your trigger data domains is the solution's most valuable feature.""The management of the solution is very simple. It allows for a single view of all the endpoints.""The initial set up is not complex.""Our users find the interface very comfortable to use.""It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now.""It is easy to install the Endpoint Remote Access VPN client to different platforms.""The most valuable feature is the seamless access.""The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."

More Check Point Remote Access VPN Pros »

"Traffic Learning is the most valuable feature.""Good application firewall.""The most valuable feature is the proxy.""iRule feature is useful.""F5 has many capabilities for load balancing and web application firewall features.""We always use technical support and the team helps us very well. They're able to effectively find and fix issues and they respond very quickly.""The product is quite flexible.""This is a solution that does what it's supposed to do at the price point."

More F5 BIG-IP Pros »

Cons
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.""I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not.""They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.""There is always room for innovation and the addition of new features.""When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client.""The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed.""We would like to see support for a layer seven VPN over UDP.""We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."

More Check Point Remote Access VPN Cons »

"This is a very expensive solution.""It's a very expensive solution.""If they made it easier for engineers to get F5 training then it would be better.""Reporting could be improved and configuration made easier.""The logging features are too limited and do not give us a solid understanding of what's happening.""The web interface could be better.""The cost of the solution is pretty high. It would be ideal if it was more reasonable.""If we decide to migrate to the cloud, I don't think that BIG-IP is a good solution and we probably won't use it."

More F5 BIG-IP Cons »

Pricing and Cost Advice
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."

More Check Point Remote Access VPN Pricing and Cost Advice »

"There are additional costs depending on what modules or what functionality is required.""F5 pricing is too high, compared to Citrix.""When we purchased additional licenses for our other locations, we received a discount of between 20% and 25%.""F5 BIG-IP can be expensive, although there are trial versions available which are helpful to find out if the solution is right for your company.""The price should be reduced because it is expensive when compared to the competition.""The solution is quite expensive if we compare it with the competition.""It is a bit expensive product. Kemp Loadmaster is much cheaper than F5. Its licensing is on a yearly basis. It can be for one year or three years.""The price of the solution is sometimes expensive."

More F5 BIG-IP Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
501,151 professionals have used our research since 2012.
Questions from the Community
Top Answer: The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN… more »
Top Answer: As far as I'm aware, Check Point is on the same line of pricing with Pulse at the moment. It's not any different. It is in line with the competition. There are no additional costs that I'm aware of.
Top Answer: We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important… more »
Top Answer: The costs could be lower. In a report, we found that Citrix Solutions are somehow cheaper - including in relation to encryption licensing. I cannot compare as I haven't spoken to Citrix. I don't know… more »
Top Answer: Its scalability and deployment should be better. It should be more scalable, and it should be easier to deploy.
Ranking
4th
out of 32 in Remote Access
Views
6,527
Comparisons
5,205
Reviews
8
Average Words per Review
848
Rating
8.6
Views
44,708
Comparisons
35,159
Reviews
15
Average Words per Review
417
Rating
8.2
Popular Comparisons
Also Known As
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
BIG-IP, BIG-IP LTM, F5 ASM, Viprion, F5 BIG-IP Virtual Edition , Crescendo Networks Application Delivery Controller, BIG IP
Learn More
Overview

Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

The BIG-IP family of products offers the application intelligence that network managers need to ensure applications are fast, secure, and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility, and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry.
Offer
Learn more about Check Point Remote Access VPN
Learn more about F5 BIG-IP
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)
Riken, TransUnion, Tepco Systems Administration, Daejeon University, G&T Bank, Danamon, CyberAgent Inc.
Top Industries
VISITORS READING REVIEWS
Comms Service Provider26%
Computer Software Company24%
Government6%
Energy/Utilities Company5%
REVIEWERS
Comms Service Provider24%
Financial Services Firm18%
Manufacturing Company11%
Energy/Utilities Company7%
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider23%
Financial Services Firm7%
Government6%
Company Size
REVIEWERS
Small Business31%
Midsize Enterprise23%
Large Enterprise46%
REVIEWERS
Small Business31%
Midsize Enterprise14%
Large Enterprise56%
VISITORS READING REVIEWS
Small Business18%
Midsize Enterprise21%
Large Enterprise61%
Find out what your peers are saying about Check Point Remote Access VPN vs. F5 BIG-IP and other solutions. Updated: March 2020.
501,151 professionals have used our research since 2012.

Check Point Remote Access VPN is ranked 4th in Remote Access with 8 reviews while F5 BIG-IP is ranked 1st in Application Delivery Controllers with 20 reviews. Check Point Remote Access VPN is rated 8.6, while F5 BIG-IP is rated 8.2. The top reviewer of Check Point Remote Access VPN writes "Allows everyone to work from home, which is mission-critical for our organization". On the other hand, the top reviewer of F5 BIG-IP writes "Very stable and easy to use with a good GUI". Check Point Remote Access VPN is most compared with Cisco AnyConnect Secure Mobility Client, OpenVPN Access Server, Zscaler Private Access, Citrix Gateway and Microsoft Remote Desktop Services, whereas F5 BIG-IP is most compared with Citrix ADC, Microsoft Azure Application Gateway, HAProxy, NGINX Plus and A10 Networks Thunder ADC. See our Check Point Remote Access VPN vs. F5 BIG-IP report.

See our list of .

We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.