Compare Check Point Remote Access VPN vs. Safe-T Secure Application Access

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Fortinet, Palo Alto Networks, Cisco and others in Enterprise Infrastructure VPN. Updated: June 2021.
509,570 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers.""The price of this product is good.""Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."

More Check Point Remote Access VPN Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
509,570 professionals have used our research since 2012.
Questions from the Community
Top Answer: The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN… more »
Top Answer: As far as I'm aware, Check Point is on the same line of pricing with Pulse at the moment. It's not any different. It is in line with the competition. There are no additional costs that I'm aware of.
Top Answer: We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important… more »
Ask a question

Earn 20 points

Ranking
Views
6,849
Comparisons
5,434
Reviews
8
Average Words per Review
848
Rating
8.6
Views
1,088
Comparisons
574
Reviews
0
Average Words per Review
0
Rating
N/A
Popular Comparisons
Also Known As
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
Safe-T SDA, Safe-T, Safe-T Software-Defined Access
Learn More
Overview

Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.



Safe-T is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. 

Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. 

This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud. 

Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services. 

With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats. 

At Safe-T, we empower enterprises to safely migrate to the cloud and enable digital transformation.

Offer
Learn more about Check Point Remote Access VPN
Learn more about Safe-T Secure Application Access
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)
Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Top Industries
REVIEWERS
Financial Services Firm36%
Program Development Consultancy18%
Logistics Company9%
Non Tech Company9%
VISITORS READING REVIEWS
Comms Service Provider26%
Computer Software Company24%
Government7%
Financial Services Firm5%
VISITORS READING REVIEWS
Computer Software Company28%
Comms Service Provider26%
Government12%
Media Company7%
Company Size
REVIEWERS
Small Business22%
Midsize Enterprise33%
Large Enterprise44%
VISITORS READING REVIEWS
Small Business8%
Midsize Enterprise68%
Large Enterprise24%
No Data Available
Find out what your peers are saying about Fortinet, Palo Alto Networks, Cisco and others in Enterprise Infrastructure VPN. Updated: June 2021.
509,570 professionals have used our research since 2012.

Check Point Remote Access VPN is ranked 4th in Enterprise Infrastructure VPN with 12 reviews while Safe-T Secure Application Access is ranked 21st in Enterprise Infrastructure VPN. Check Point Remote Access VPN is rated 8.6, while Safe-T Secure Application Access is rated 0.0. The top reviewer of Check Point Remote Access VPN writes "Allows everyone to work from home, which is mission-critical for our organization". On the other hand, Check Point Remote Access VPN is most compared with Cisco AnyConnect Secure Mobility Client, OpenVPN Access Server, Zscaler Private Access, TeamViewer and Citrix Gateway, whereas Safe-T Secure Application Access is most compared with Zscaler Internet Access, Prisma Access by Palo Alto Networks, F5 BIG-IP, Okta Workforce Identity and Zscaler Private Access.

See our list of best Enterprise Infrastructure VPN vendors.

We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.