We performed a comparison between Check Point Remote Access VPN and Safe-T Secure Application Access based on real PeerSpot user reviews.
Find out what your peers are saying about OpenVPN, Fortinet, Cisco and others in Enterprise Infrastructure VPN."The solution has good performance."
"It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"Setting policies allow, block, and limit users' access."
"It operates effectively, particularly during challenges like adversities or infrastructure issues."
"I found the MEP feature the most valuable. This has improved users' latency allowing the users to connect to the nearest Azure Check Point VM."
"Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work."
"Technical support has been excellent."
"The clients of the customers have a facility to access the enterprise network."
"Our users find the interface very comfortable to use."
"Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations."
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"Safe-T is very good for users because it has plug-in for Outlook."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"There must be a more easy-to-use GUI."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds."
"The VPN remote Access blade could be improved."
"We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
"Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."
"The cost of maintenance is high compared to most products in the market."
"Check Point Remote Access VPN could be more user-friendly."
"The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access."
"The main area for improvement is pricing. Another area could be integrating MFA authentication directly into the solution instead of using separate benchmark tools for implementation."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
"The Outlook agent is not working well for installing it in the entire office."
More Check Point Remote Access VPN Pricing and Cost Advice →
Earn 20 points
Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 60 reviews while Safe-T Secure Application Access is ranked 44th in Enterprise Infrastructure VPN. Check Point Remote Access VPN is rated 8.8, while Safe-T Secure Application Access is rated 7.8. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange, whereas Safe-T Secure Application Access is most compared with .
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.