Most Helpful Review
Use OpenText Exceed TurboX (ETX)? Share your opinion.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The initial set up is not complex."
"It is easy to install the Endpoint Remote Access VPN client to different platforms."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
"The solution is perfect for Linux users."
"They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
"The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
"We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
"The performance of the graphical interface needs improvement. They should add some CPU to speed graphic acceleration."
Questions from the Community
Top Answer: The initial set up is not complex.
Top Answer: In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add… more »
Top Answer: A lot of our clients are complimentary companies, like the electrical company. They need Check Point Remote Access VPN, or even another similar solution. I tell them that I already have the VPN… more »
Ask a question
Earn 20 points
out of 32 in Remote Access
Average Words per Review
out of 32 in Remote Access
Average Words per Review
Compared 19% of the time.
Compared 12% of the time.
Compared 11% of the time.
Compared 10% of the time.
Compared 9% of the time.
Compared 64% of the time.
Compared 27% of the time.
Compared 5% of the time.
Compared 2% of the time.
Also Known As
|OpenText Exceed TurboX|
Remote Secure AccessProvide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.
Learn more about Remote Secure Access VPN.
Exceed TurboX Remote Access Software Features High performance remote graphics: Finding a fast and high-quality remote access solution for graphical applications is a top priority for many businesses. Engineers, doctors and designers are among the list of professionals that require extremely accurate display of applications over the WAN. An incorrect diagnosis or a misplaced wire in a CAD model could result in a mistake that costs millions of dollars and affects lives. Exceed TurboX offers unrivaled pixel-perfect drawing and precise color rendering, increasing productivity and the quality of work.
Suspend and resume: With ETX, users can manually suspend their sessions at any time and resume them on any computer. By giving users the ability to suspend sessions at will, ETX grants user’s freedom of movement and unties them from physical computers.
Ultra-low bandwidth usage: Exceed TurboX is up to 90 percent more bandwidth efficient than traditional X servers, thanks to the highly efficient ThinX Protocol. ETX adapts to a variety of network conditions while ensuring high quality remote display.
Supercharged sharing: In a globalized economy, projects require collaborative work from a team of international members. With Exceed TurboX, users from around the globe can share projects and ideas in real time over the internet, by taking advantage of desktop and application sharing for both Windows and X Window sessions.
Centralized administration and user management: Administrators can monitor and manage Exceed TurboX from any location using a web browser on any computing device. Exceed TurboX keeps users and access management in a centralized database. It reduces the administrative headaches of managing disparate user communities and empowers administrators to control application access on the user and group levels.
Learn more about Check Point Remote Access VPN
Learn more about OpenText Exceed TurboX (ETX)
|Zim||SMS Group, Micronas, Inphi|
Computer Software Company28%
Comms Service Provider19%
K 12 Educational Company Or School6%
Computer Software Company33%
Comms Service Provider6%
Check Point Remote Access VPN is ranked 10th in Remote Access with 3 reviews while OpenText Exceed TurboX (ETX) is ranked 18th in Remote Access with 1 review. Check Point Remote Access VPN is rated 8.0, while OpenText Exceed TurboX (ETX) is rated 8.0. The top reviewer of Check Point Remote Access VPN writes "Enables users to easily work from home". On the other hand, the top reviewer of OpenText Exceed TurboX (ETX) writes "Easy to use, perfect for Linux, and great for remote workers". Check Point Remote Access VPN is most compared with Citrix Gateway, F5 BIG-IP, Pulse Connect Secure, TeamViewer and AppGate, whereas OpenText Exceed TurboX (ETX) is most compared with VNC Connect, Citrix Virtual Apps and Desktops, Microsoft Remote Desktop Services and TeamViewer.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.