We performed a comparison between Check Point Remote Access VPN and Ivanti Secure Access based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"The solution has good performance."
"One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities."
"A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme."
"The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
"The clients of the customers have a facility to access the enterprise network."
"The most valuable feature is the seamless access."
"The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
"Setting policies allow, block, and limit users' access."
"Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live."
"The most valuable feature of Pulse Client is integration with Google authenticator for two-factor authentication."
"The scalability of Pulse Client is good."
"There must be a more easy-to-use GUI."
"Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners."
"The provisioning of VPN users has room for improvement."
"The VPN remote Access blade could be improved."
"You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable MEP function is not so easy to size the gateway licenses."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"Sometimes the application slows down the computing device, and this affects workflows."
"Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience."
"The cost of maintenance is high compared to most products in the market."
"Pulse Client could improve the system tokens for authentication."
"Pulse Client could improve the reports. The reports are not in PDF and we can't check the details in the reports of users who are using the VPNs."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 60 reviews while Ivanti Secure Access is ranked 28th in Enterprise Infrastructure VPN with 2 reviews. Check Point Remote Access VPN is rated 8.8, while Ivanti Secure Access is rated 7.6. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Ivanti Secure Access writes "Integrates well, highly reliable, but lacking reporting". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange, whereas Ivanti Secure Access is most compared with Ivanti Connect Secure, NetMotion Mobility, Tailscale, Microsoft Azure VPN Gateway and Cisco AnyConnect Secure Mobility Client. See our Check Point Remote Access VPN vs. Ivanti Secure Access report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.