Anonymous UserNetwork, Systems and Security Engineer at SOLTEL Group
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The ability to create your trigger data domains is the solution's most valuable feature."
"The management of the solution is very simple. It allows for a single view of all the endpoints."
"The initial set up is not complex."
"Our users find the interface very comfortable to use."
"It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now."
"It is easy to install the Endpoint Remote Access VPN client to different platforms."
"The most valuable feature is the seamless access."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
"The most valuable features are that it is consistently low profile and consistently works without hiccups or headaches."
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
"There is always room for innovation and the addition of new features."
"When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."
"The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
"We would like to see support for a layer seven VPN over UDP."
"We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
"We occasionally have issues with the graphic software of the interface."
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."
"The price of this product is good."
"Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."
Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.
Intuitive remote control
Use the mouse and keyboard (or touchscreen) in front of you as though they belong to the remote computer.
Send special keys and combinations such as Ctrl-Alt-Del, and copy and paste text in either direction. Type in confidence that characters will be interpreted correctly, whatever your platform, keyboard or input language.
Tried and tested performance
As the original inventors of VNC® technology, we know how to create a responsive screen sharing experience that's as good as being there.
Our patent-protected technology automatically optimizes to the speed of your network, and is especially effective in low-bandwidth and high-latency environments.
PC to PC and mobile to PC across Windows, Mac, Linux, Raspberry Pi, iOS and Android.
With an Enterprise subscription, you also get a key to install our VNC® 5.x software on a wide range of older and UNIX operating systems too, so your legacy hardware remains accessible.
Attended and unattended access
Connect whether remote computer owners are present or not.
Remotely access your own computers, monitor or patch equipment in the field, support customers or colleagues, and much more. Learn about the many ways our customers use VNC® Connect.
Direct and cloud connectivity
Our cloud service automatically brokers cloud connections between devices wherever they are.
So you don’t need to rely on a VPN, or conduct complex and insecure port-forwarding and firewall configuration.
With an Enterprise subscription, you can establish direct connections as well (or instead), perfect for locked down or offline network environments. For more information, start with our document cloud versus direct.
Pre-install or connect on demand
Add device access to your subscription, install VNC® Connect on every device you own or manage, and enable access by anyone at any time.
Alternatively, add instant support to your subscription and connect in seconds on demand, leaving no footprint. Or add both capabilities, and cover every remote access use case.
File transfer, printing and chat
During a session, you're not restricted to just interacting with the remote screen.
You can transfer files in either direction, print files directly to a printer where you are (rather than to a printer attached to the remote computer), and securely chat with other users connected at the same time as you.
Secure by design
VNC® Connect is built from the ground up with security in mind, to balance the control you need with the privacy that compliance requires.
Sessions are encrypted end-to-end using up to 256-bit AES encryption. Authentication is mandatory at the point of connection and never delegated to the cloud. Protect your computers with multi-factor authentication, single-sign on (SSO), granular access control and rich session permissions.
VNC® Connect is available in French, German, Spanish and Brazilian Portuguese as well as English, with more translations on the way.
Online team management
Manage remote computers, the people you invite into your team to share remote access with, and their roles and permissions from one central location.
With an Enterprise subscription, you can deploy VNC® Connect in bulk, offline or remotely using your standard enterprise tooling.
In addition, you can configure VNC® Connect remotely using policy, and lock it down to prevent change.
Virtual desktops under Linux
With an Enterprise subscription, you can create virtual desktops on Linux computers.
This might be useful to enable visual remote access to headless Linux systems, or provide separate workspaces for simultaneous users of a shared resource.
Check Point Remote Access VPN is ranked 4th in Remote Access with 12 reviews while VNC Connect is ranked 12th in Remote Access with 1 review. Check Point Remote Access VPN is rated 8.6, while VNC Connect is rated 9.0. The top reviewer of Check Point Remote Access VPN writes "Allows everyone to work from home, which is mission-critical for our organization". On the other hand, the top reviewer of VNC Connect writes "Reliable and trustworthy remote access software, with responsive technical support ". Check Point Remote Access VPN is most compared with Cisco AnyConnect Secure Mobility Client, OpenVPN Access Server, Zscaler Private Access, TeamViewer and Citrix Gateway, whereas VNC Connect is most compared with OpenText Exceed TurboX (ETX), Citrix Virtual Apps and Desktops, TeamViewer, Parallels Access and Wayk Now.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.