We performed a comparison between Check Point Remote Access VPN and Zscaler Zero Trust Exchange based on real PeerSpot user reviews.
Find out what your peers are saying about TeamViewer, Microsoft, Citrix and others in Remote Access."The solution implemented in the cloud allows us to easily scale in cases of user increase."
"The secure hotspot access for enabling good network connectivity is great."
"We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway."
"One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
"Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
"For a basic setup, implementation is quite easy."
"The ability to create your trigger data domains is the solution's most valuable feature."
"The most valuable feature of Zscaler Private Access is the categorization of the dynamic URLs which keeps the customer's environment protected. The threats and the malware are correctly categorized."
"Users get direct secure access to applications over the internet."
"The most valuable features of this solution are the CASB solutions, which is protecting their Office 365."
"I like the web filtering capabilities."
"The most valuable features of Zscaler Private Access are reliability, scalability, and availability."
"The VPN is great for the stability on offer and for the cloud updates and insights you can get."
"The Live Logs are a cool feature. We can directly identify issues and divert user traffic."
"The most valuable features are the File Type Control and SSL bypass policies. We"
"The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection."
"In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system."
"There were some issues with automation and instability."
"The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."
"We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
"In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems."
"They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
"Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server."
"The granularity in blocking is not sufficient, as new domains are automatically blocked for 30 days without further information."
"It would be better if the Zscaler Private Access team made it easier for people to find subscriptions on the portal, mainly information on what my customers subscribed to or the type of licenses purchased."
"Zscaler Private Access could improve by improving external access. If external parties want to access locally to my company's services, we need to onboard them into our domain, otherwise, it doesn't work. Additionally, if their company also has Zscaler Private Access, then it doesn't work. They need to log in with our domain ID, not their company ID."
"Zscaler Private Access needs to improve its collaboration with applications without compromising security."
"To enhance their offering, it is advisable for them to focus on strengthening the foundation of their architecture. Additionally, they should consider integrating a broader range of services that go beyond what managed service providers typically offer independently."
"I can't speak to any missing features."
"Setup is a bit complex because there are many steps that need to be taken before onboarding and activating the solution."
"We'd like to have two-factor authentication that is quite simple."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 4th in Remote Access with 60 reviews while Zscaler Zero Trust Exchange is ranked 1st in ZTNA as a Service with 34 reviews. Check Point Remote Access VPN is rated 8.8, while Zscaler Zero Trust Exchange is rated 8.4. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Zscaler Zero Trust Exchange writes "Allows for strict access control, granting access to specific applications at a URL level rather than at the physical IP level". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Symantec VIP Access Manager, whereas Zscaler Zero Trust Exchange is most compared with Prisma Access by Palo Alto Networks, Cato SASE Cloud Platform, Axis Security, Cisco AnyConnect Secure Mobility Client and Jamf Connect.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.