We performed a comparison between Check Point Remote Access VPN and Prisma Access by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"The solution has good performance."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
"The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
"To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources."
"Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations."
"I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience."
"Check Point Remote Access VPN provides strong security features, including encryption, authentication, endpoint security, access control, and centralized management."
"The solution is easy for administrators because you can check logs and write rules on the same page."
"The clients of the customers have a facility to access the enterprise network."
"Monitoring is the most valuable feature because we can easily monitor all kinds of stuff coming over the network. We can check the dashboard and work accordingly."
"Palo Alto Firewall is one of the best firewalls in the world."
"It's great that we can make sure a machine meets the minimum requirements before users are allowed to log in."
"Its frontend is user-friendly. It is easy to use for us."
"The scalability of the solution is excellent."
"To quarantine and clean a malware file provides a lot of security."
"It is easy to use, easy to integrate, and is stable. It's scalable as well."
"Prisma Access protects all app traffic, so that users can gain access to all apps and that's very important because we need to be able to access everything. It also allows us to access non-web apps; anything internal that we need access to, we can access."
"There must be a more easy-to-use GUI."
"We have noted some stability issues."
"Check Point Remote Access VPN's enterprise support could be improved."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
"Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."
"We would like to implement HTML5 (clientless access) in the product without installing any additional software."
"The VPN remote Access blade could be improved."
"A characteristic to improve is the communication service under the SMTP scheme."
"The cloud setup is straightforward, and the onboarding process is much better, but the on-premises initial setup is slightly complex."
"It's not very easy to use. Sometimes it's buggy and there are problems when doing updates. The user interface is okay, but some configuration items are difficult. I would like it to be less buggy and easier to configure, to better streamline the user experience."
"There is room for improvement in the multi-environment visibility, especially around containers."
"Better integration with the MDM solution would be useful."
"Prisma would be a stronger solution if it could aggregate resources by project or by application. So say we have an application we've developed in AWS and five applications we've developed in Azure. The platform will group it according to those applications, but it's based on the tags we use in Azure, which means I have to rely on development teams to tag resources properly."
"The frequency of updates could be reduced."
"Their next release should provide solutions for the mobile environment."
"The user interface could be better. They need to work a little bit on the console. It is similar to their firewalls but not exactly. They need to clean it up a bit."
More Check Point Remote Access VPN Pricing and Cost Advice →
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 60 reviews while Prisma Access by Palo Alto Networks is ranked 5th in Enterprise Infrastructure VPN with 56 reviews. Check Point Remote Access VPN is rated 8.8, while Prisma Access by Palo Alto Networks is rated 8.4. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Microsoft Remote Desktop Services, whereas Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Netskope , Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN. See our Check Point Remote Access VPN vs. Prisma Access by Palo Alto Networks report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.