We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Our users find the interface very comfortable to use."
"For us, it was essential to integrate with Active Directory, which is our credentials repository."
"Access is browser-based only and requires no additional client installation."
"One of the features that I like most about this software is that it has a very intuitive, simple, and versatile interface that makes it easy to use and configure."
"Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live."
"To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
"Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work."
"The ability to use mobile devices is helpful because we can support our clients from anywhere."
"The initial setup is simple."
"The solution is very fast."
"When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."
"Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds."
"Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
"When you need to create something, you have to follow many steps and I think that should be simplified."
"The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
"There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect."
"The solution should add more options and tools for shortcuts, administration, etc."
"The integration features could be better."
"The packages that Splashtop has, tend to be a little bit confusing and should be simplified."
"The price of this product is good."
"Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."
"The price of the solution is mid-ranged, although it is more cost effective than that of TeamViewer."
"The licensing fees are less than $400 per year."
Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.
Splashtop Remote Support delivers a robust set of features for MSPs, IT service providers and helpdesk professionals for unattended support of Windows and Mac computers at a great price - often 50% less than similar solutions. All packages include unlimited technicians, concurrent sessions and devices to remote from. Get fast remote access, computer and user grouping, user management, logging and secure encryption. Splashtop Remote Support Plus edition adds file transfer, remote print, chat, remote wake, remote reboot, attended support access and priority technical support. Splashtop remote access technology is trusted by more than 20 million users worldwide.
Check Point Remote Access VPN is ranked 4th in Remote Access with 21 reviews while Splashtop Remote Support is ranked 15th in Remote Access with 3 reviews. Check Point Remote Access VPN is rated 8.8, while Splashtop Remote Support is rated 8.0. The top reviewer of Check Point Remote Access VPN writes "Allows everyone to work from home, which is mission-critical for our organization". On the other hand, the top reviewer of Splashtop Remote Support writes "A feature-rich, cost-effective solution to help assist our clients, even using our mobile devices". Check Point Remote Access VPN is most compared with Cisco AnyConnect Secure Mobility Client, OpenVPN Access Server, Zscaler Private Access, Symantec VIP Access Manager and Microsoft Remote Desktop Services, whereas Splashtop Remote Support is most compared with Parallels Access, Microsoft Remote Desktop Services, LogMeIn Rescue, GoToMyPC and Citrix Virtual Apps and Desktops. See our Check Point Remote Access VPN vs. Splashtop Remote Support report.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.