Try our new research platform with insights from 80,000+ expert users
Technical Architect and consultant at VirginAustralia
Reseller
Top 5Leaderboard
Helps to connect to office resources from outside the network
Pros and Cons
  • "One feature that is highly valued by our clients in remote access VPN is the IPsec suite. With IPsec, we can encrypt our data, ensuring that no one can perform a man-in-the-middle attack or decrypt the data. It utilizes powerful mathematical calculations and end-to-end encryption, preventing hacking attempts."
  • "As everything is moving to cloud environments, it would be beneficial if Check Point Remote Access VPN could provide on-demand services related to remote VPN. Users with proper authentication should be able to easily deploy VPN on their devices with just a click, perhaps with the help of plugins."

What is our primary use case?

Before COVID-19, one major use case was for remote VPN access. However, since the pandemic, remote work has become more prevalent, and now, the primary use case for the Check Point Remote Access VPN is when users need to connect to office resources from outside the network.

With remote Check Point Remote Access VPN, they can access our data center or office network and utilize resources. Additionally, we can publish applications on the public network for anyone to access. As a consultant, I work with multiple vendors across various industries, including banking and IT customers.

What is most valuable?

One feature that is highly valued by our clients in remote access VPN is the IPsec suite. With IPsec, we can encrypt our data, ensuring that no one can perform a man-in-the-middle attack or decrypt the data. It utilizes powerful mathematical calculations and end-to-end encryption, preventing hacking attempts.

What needs improvement?

As everything is moving to cloud environments, it would be beneficial if Check Point Remote Access VPN could provide on-demand services related to remote VPN. Users with proper authentication should be able to easily deploy VPN on their devices with just a click, perhaps with the help of plugins.

This would establish a secure connection from the customer's network to their data center. I've recently worked with Oracle Cloud, and they offer a feature where running a simple script on any device establishes a terminal between the device and the data center, allowing easy access to resources.

For how long have I used the solution?

I have been working with the product for eight to nine years. 

Buyer's Guide
Check Point Remote Access VPN
September 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,759 professionals have used our research since 2012.

What do I think about the stability of the solution?

I rate the solution's stability an eight out of ten. It is a powerful remote VPN. 

What do I think about the scalability of the solution?

I rate the solution's scalability an eight out of ten. 

How are customer service and support?

The Check Point portal offers documents, direction guides, and case studies. I often utilize these resources to learn more about the product because the documentation is nice. 

How would you rate customer service and support?

Positive

How was the initial setup?

When we deploy the product, setting up the server usually takes two to three days. Once the server is set up, configuring it on the client side takes about 30 minutes.

What was our ROI?

The solution helps my clients save money and time.

What's my experience with pricing, setup cost, and licensing?

The tool is expensive. 

What other advice do I have?

I rate the overall product a nine out of ten. It is mostly for enterprise customers. It is the market leader, and you can trust it blindly. I recommend the solution to many customers, including small and medium-sized businesses. I trust Check Point products because they are market leaders in firewall and VPN solutions. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Abnet Tsegaye Belay - PeerSpot reviewer
Cybersecurity Engineer at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Remote access solutions have improved security with multi-factor authentication and endpoint compliance scanning
Pros and Cons
  • "Check Point Remote Access VPN offers multi-factor authentication when connecting to organizational networks, which adds an extra layer of security by requiring multiple verification steps when users connect."
  • "One area that could be improved is the complexity of setting up Check Point Remote Access VPN, particularly with features like multi-factor authentication, single sign-on, and identity awareness. Deploying these solutions requires higher technical expertise than other solutions."

What is our primary use case?

We are resellers of Check Point products in our country, and our customers use Check Point Remote Access VPN to keep their organization data clean and safe when users access remotely through the client. They use Check Point Remote Access VPN for complex setups requiring technical expertise, such as accessing resources in the organization's private networks. Most of the time, we deploy Check Point Remote Access VPN on banking centers, where they use it to access business data behind their firewalls. Check Point Remote Access VPN supports various platforms, including Windows, MacOS, and mobile devices.

How has it helped my organization?

Whenever we deploy Check Point Remote Access VPN on customer sites, they tell us that this feature improves their access to organizational data, as many employees need remote access to work from their premises or home networks. During this time, company data is vulnerable to attacks due to insecure connections to organizational data. Check Point Remote Access VPN fills this gap by keeping organizational data secure from unauthorized access, providing multi-factor authentication, checking device health status, and assessing the device security posture through the endpoint compliance scanning feature. It improves remote connection and protects the organization's network from cybercriminals.

What is most valuable?

Check Point Remote Access VPN offers multi-factor authentication when connecting to organizational networks, which adds an extra layer of security by requiring multiple verification steps when users connect. This reduces the risk of unauthorized access. Additionally, there's endpoint compliance scanning, which ensures that devices that do not fulfill compliance requirements cannot connect to the network, preventing compromised devices from infiltrating the network. These features are fundamental in protecting organizations from unauthorized access and cyber threats by scanning devices and authenticating users properly.

What needs improvement?

One area that could be improved is the complexity of setting up Check Point Remote Access VPN, particularly with features like multi-factor authentication, single sign-on, and identity awareness. Deploying these solutions requires higher technical expertise than other solutions. Additionally, compared to customer-grade solutions, Check Point Remote Access VPN is more expensive. For example, FortiClient offers a free client, which differs from Check Point VPN.

For how long have I used the solution?

I have deployed Check Point Remote Access VPN over the past 2 years, and I am familiar with Check Point products, including the firewall features and blades and Remote Access VPN. For two years, I have deployed Check Point VPN or Remote Access VPN many times.

What do I think about the stability of the solution?

Check Point Remote Access VPN is stable, and we haven't received any complaints from our customers regarding its stability until now.

What do I think about the scalability of the solution?

Check Point Remote Access VPN is scalable because it supports various platforms and can adapt to different organizational needs.

How are customer service and support?

Contacting the Technical Assistance Centers (TACs) initially can be difficult, but once I get in touch with the TAC team, it is easy to solve problems. However, the first steps can be challenging.

Which solution did I use previously and why did I switch?

Our customers used to connect to their organizational data using AnyDesk, which is a free VPN tool. However, we switched to Check Point Remote Access VPN because of its firewall features and incorporated them into our firewall setup.

How was the initial setup?

Deploying Check Point solutions requires higher technical expertise and can be complex, but it is manageable with knowledgeable staff.

What's my experience with pricing, setup cost, and licensing?

In terms of pricing, Check Point Remote Access VPN is not the most cost-effective option compared to other vendors. However, negotiations with Check Point are very good.

Which other solutions did I evaluate?

We evaluated Fortinet FortiClient before choosing Check Point Remote Access VPN.

What other advice do I have?

If you want to see a return on your investments quickly, prioritize purchasing Check Point Remote Access VPN with integration in Check Point firewall features. I rate Check Point Remote Access VPN an eight out of ten because it is great at what it does, but I deducted two points due to the complexity of the setup and the need for technical expertise.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
September 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,759 professionals have used our research since 2012.
System admin at a manufacturing company with 51-200 employees
Real User
Top 10
Remote users have stayed protected through secure connectivity and centralized internet routing
Pros and Cons
  • "Since implementing Check Point Remote Access VPN, I have seen a decrease in malware incidents, and I can say that I have reduced a lot of issues, such as malware attacks."
  • "Sometimes the support is a bit glitchy."

What is our primary use case?

My main use case for Check Point Remote Access VPN involves using a Quantum Spark 1800 and 1600 to connect, providing access to my users to connect from an outside network to an inside network.

What is most valuable?

The best features Check Point Remote Access VPN offers include the Check Point Endpoint Security VPN from a Check Point Quantum Spark 1800 SMB, which I use to create a user and send the link to download the client. They will download it, and they will connect to our VPN. Once they connect to the VPN, whatever the policy is there, everything will get applied. When they connect to the VPN, we think that it is very secure for the user. The user's internet access is very secure because their internet goes through my firewall before reaching outside.

The security provided by Check Point Remote Access VPN impacts my users because some people connect while traveling, such as being at a railway station or an airport, and we are unsure whether these public networks are safe and secure. For that reason, they connect through the VPN, and once they connect, any kind of network they use has their internet traffic transferred to my firewall through my firewall policies.

I have noticed a measurable impact from using Check Point Remote Access VPN, as earlier, people connected without having a VPN, which sometimes resulted in malware getting into their laptops. Once they connect to the office and the internal network, the firewall immediately catches that particular malware and gives a pop-up to the user.

Since implementing Check Point Remote Access VPN, I have seen a decrease in malware incidents, and I can say that I have reduced a lot of issues, such as malware attacks. Everything has been significantly reduced.

What needs improvement?

Sometimes the support is a bit glitchy.

For how long have I used the solution?

I have been using Check Point Remote Access VPN for the last 1.8 years.

What other advice do I have?

All features of Check Point Remote Access VPN are working fine. Everything is functioning properly and effectively.

The interface in Check Point Remote Access VPN is very helpful. Users can easily identify what kind of assets have been connected because it shows a different dashboard. It displays how many mobile phones are connected, how many IoT devices are connected, how many computers, laptops, and desktops are connected.

On a scale of one to ten, I rate Check Point Remote Access VPN a nine.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
reviewer2701569 - PeerSpot reviewer
Enterprise Network Engineer at a outsourcing company with 201-500 employees
Real User
Top 5Leaderboard
Saves time during downtimes and integrates firewall and VPN policy management
Pros and Cons
  • "Check Point Remote Access VPN has positively impacted my organization by improving productivity and given us a workaround in times of downtime."

    What is our primary use case?

    My main use case for Check Point Remote Access VPN is for remote employee access.

    What is most valuable?

    The best features Check Point Remote Access VPN offers include the fact that you can configure the VPN access in Smart Console, which is important for me because that saves me another sort of window to configure and to monitor that I have to keep switching in between.

    I just do VPN policies in the same place where my firewall policies are.

    Check Point Remote Access VPN has positively impacted my organization by improving productivity and given us a workaround in times of downtime.

    Unless it's specifically the data center that is down, if it's any other place besides the data center, we definitely have business continuity.

    What needs improvement?

    I think Check Point Remote Access VPN can be improved as it's more of an annoyance for a good number of the clients because it doesn't save their credentials.

    Even if it's just timed out, you sort of need to do manual entry.

    This is typically how security should be, but users get annoyed by it.

    As it runs in the background, it's not really easy to stop it from running persistently.

    Additionally, regarding the notifications, I'm yet to find an easy way to disable them.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for three years.

    What do I think about the stability of the solution?

    Check Point Remote Access VPN is stable.

    What do I think about the scalability of the solution?

    I haven't tried scaling Check Point Remote Access VPN, so I wouldn't have a feasible answer.

    How are customer service and support?

    The customer support experience for Check Point Remote Access VPN is smooth.

    How would you rate customer service and support?

    Positive

    What was our ROI?

    I have definitely seen a return on investment from using Check Point Remote Access VPN, as time saved is money saved.

    We can work around our general downtimes by having users connect via VPN.

    Continuous operations mean basically saving money.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing for Check Point Remote Access VPN was smooth.

    What other advice do I have?

    I would advise others looking into using Check Point Remote Access VPN that this is a very powerful solution.

    Unlike many of the other solutions, posture is a very big add-on.

    I would advise them to get the solution when they're in need of a remote VPN access solution.

    Unlike most of the VPN clients, if you're doing the one from Check Point, you also get posture in the same client.

    Before it grants the user access, it will first establish posture.

    That is one of the underrated add-ons that it has that people should appreciate more.

    On a scale of 1-10, I rate Check Point Remote Access VPN a 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Flag as inappropriate
    PeerSpot user
    Nagendra Nekkala - PeerSpot reviewer
    Senior Manager ICT & Innovations at Bangalore International Airport Limited
    Real User
    Top 5Leaderboard
    A user-friendly tool with easy maintenance and installation phases
    Pros and Cons
    • "It is a scalable solution...The technical support team of the solution is very good."
    • "Check Point Remote Access VPN's connectivity and establishment takes time and needs to be faster."

    What is our primary use case?

    Right now, my company connects with the vendors of Check Point whenever any maintenance is required, and not to our domain.

    What is most valuable?

    Check Point Remote Access VPN is a highly secured product with which, in our company, we can get end-to-end VPN connectivity so that the communication part is highly secured.

    What needs improvement?

    Check Point Remote Access VPN's connectivity and establishment takes time and needs to be faster.

    In the future, Check Point Remote Access VPN should provide its users with URL filtering.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for ten years. My company is a customer and end-user of Check Point.

    What do I think about the stability of the solution?

    Though the solution is stable, sometimes the latest updates are not available, especially considering that it is something that has to be done very frequently to take care of URL filtering and the latest OWASP threats, which is only possible if the latest configuration is available to users.

    What do I think about the scalability of the solution?

    It is a scalable solution.

    Considering that access to the solution is given to specific people only in my company, I can say that around 100 to 150 people use the solution.

    How are customer service and support?

    The technical support team of the solution is very good. My company hasn't faced any issues with the technical support team of the solution. My company has not had to wait for a response from the technical support team. I rate the technical support team of the solution a nine out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have experience with Cisco. Though Cisco is one of the latest products that we deal with right now, my company has been more friendly with Check Point. My company prefers Check Point since it is easy and more user-friendly for us. Cisco is not that much of a user-friendly product since it requires highly skilled people and more engineers to operate it.

    How was the initial setup?

    Check Point Remote Access VPN's installation process is easy.

    Check Point Remote Access VPN's installation process can be done in two hours with the help of a person who takes care of the configuration part while also taking care of the respective routing configurations that are required.

    The solution is deployed on an on-premises model.

    What about the implementation team?

    Check Point Remote Access VPN's installation process is something that my company can manage with the help of our in-house members.

    What's my experience with pricing, setup cost, and licensing?

    Compared to Cisco, Check Point Remote Access VPN is cheaper. My company makes yearly payments only towards the licensing costs attached to Check Point Remote Access VPN, as there are no extra costs attached to the product.

    What other advice do I have?

    The maintenance part of the solution is easy and can be done remotely, because of which we face no issues in our company.

    For 100 to 150 users, Check Point Remote Access VPN is a good option, but later on, if more people are going to get involved, causing one to invest in more frequent VPN connections while wanting secured connections, then Cisco is a better choice. For a limited set of people, Check Point is a better option.

    I rate the overall tool a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    reviewer2384745 - PeerSpot reviewer
    Network Engineer at a non-profit with 10,001+ employees
    Real User
    Top 20
    Provides good visibility of the environment along with a lot of knowledge-based articles for users
    Pros and Cons
    • "The product's initial setup phase was easy."
    • "Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte."

    What is our primary use case?

    When it comes to Check Point Remote Access VPN, my company is still in the testing phase and will be due for a rollout with our client, who has wanted a VPN connection since last summer.

    What is most valuable?

    If I compare the solution with some of the other products my company has used in the past, I can definitely see that it has some valuable features that allow me to see the traffic and what a client does. With the tool, I cannot only see a session but also the resources our company's clients are connected to since I can do so with the help of firewall logs. I like the overall visibility of the product.

    The thing I like about Check Point Remote Access VPN stems from the fact that it terminates at the firewall wherever the client is going, and it works in an unencrypted manner, which allows me to see where the traffic is going. I can gain access to the clients' networks with NetScaler and with the aid of a packet sniffer.

    What needs improvement?

    Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte.

    For improvements in the product, I can create a wishlist since it is a VPN technology. I would love to see what is available on the VPN connections, but it is important for our company to check the encryption part of it.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for a couple of years.

    What do I think about the stability of the solution?

    The firewall part of the tool has been running for a while now without the need for any reboot. I don't have any stability-related issues with the product.

    What do I think about the scalability of the solution?

    When it comes to VPN products, our company talks about putting them on another internet gateway, which seems to be an easy process. Using the scalability feature of the product seems to be a painless process, in my opinion.

    How are customer service and support?

    I have contacted the technical support for the solution. The solution's technical support responds immediately. The quality of the solution's technical support is good. If a member of the technical support team doesn't have the answer to my queries, then they ensure that someone else who has the knowledge responds to my issues.

    I rate the support team a ten out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have experience with Citrix NetScaler since it is the only product that I have used as a remote access VPN tool.

    I feel Check Point Remote Access VPN is better than Citrix NetScaler.

    How was the initial setup?

    The product's initial setup phase was easy. I haven't had any formal training, but I have learned everything related to the tool.

    The solution is deployed on an on-premises model.

    What about the implementation team?

    A team in my company takes care of the deployment phase.

    What other advice do I have?

    The reason I started to use Check Point Remote Access VPN is because it is preferred by the organization where I currently work.

    The solution needs maintenance. There is a need to update the policy rules and ensure that the firmware is kept up-to-date.

    I request the potential users of the product to invest time in going through the knowledge-based articles since they have a plethora of information.

    I rate the overall tool a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Ozan Durmus - PeerSpot reviewer
    Senior Information Security Specialist at AKBANK TAS
    Real User
    Is easy to use and has a nice interface, but the scalability needs to improve
    Pros and Cons
    • "The solution is easy for administrators because you can check logs and write rules on the same page."
    • "The client-side UI is fundamental, and there is nothing to see."

    What is our primary use case?

    We use Remote Access VPN as a secondary VPN for our IT admins. We use this solution on a different production Internet line. If there is a network shortage on our primary line, we can use Check Point to access and check the systems.

    How has it helped my organization?

    We use the solution in a basic configuration. The ease of use and the user interface for troubleshooting issues have been helpful.

    What is most valuable?

    We need to use two-factor authentication, ADA authentication, and ADA integration. These features are important. We also use a different kind of cPanel and try to differentiate between the IVR accessing the account and the traffic we will send to our system through Check Point values when installed.

    The solution is easy for administrators because you can check logs and write rules on the same page.

    What needs improvement?

    The client-side UI is fundamental, and there is nothing to see.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for two to three years.

    What do I think about the stability of the solution?

    I rate the solution’s stability an eight out of ten.

    What do I think about the scalability of the solution?

    The scalability depends on the gateway and deployment. A stronger gateway can support more users. The cluster configuration also affects scalability. For example, two active gateways can be used for the VPN. We have 100-200 users using this solution since we use it for IT personnel. We are in progress and we are trying to change our primary ETM product. It will go to Check Point for a POC on a larger scale. I rate the solution’s scalability a four or five out of ten.

    How are customer service and support?

    If you are using Check Point support, they usually assign someone from level 1 to level 2. It is a struggle to struggle to get Level 3 or more if there is a problem that needs to be solved ASAP. The support response could be faster.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    Since we had a Check Point firewall, we used the Check Point VPN for a specific line.

    How was the initial setup?

    The deployment takes around two to three hours. If you manage the product, one person could be enough, but if you need some kind of additional integrations like ADA integration, you need someone from ADT to access products. One person is enough, but one or two additional personnel may be included. To deploy Check Point Remote Access VPN, you must purchase a license, enable the blade, and purchase client access licenses. You can then follow the instructions to deploy the product, write the necessary rules, make the integrations, deploy the agent to the clients, and provide them with a login solution. I rate the initial setup an eight on a scale of ten, where one is difficult, and ten is easy.

    What's my experience with pricing, setup cost, and licensing?

    The product is priced between 20,000 and 40,000. We purchased the license two years ago. I rate the product’s pricing a six out of ten, where ten is expensive.

    What other advice do I have?

    If you work with Check Point in your native areas, there may be some problems. Check Point has always been a first in this area but is struggling to improve its product. While they are making improvements, the product’s stability is decreasing. Therefore, users should be aware of potential solution delays if they experience problems. If you create the environment without overuse, users will not experience any problems. Overall, I rate the solution a seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Richard Hermogeno - PeerSpot reviewer
    Channels Management Head at Philippine National Bank
    Real User
    A Great Solution That Offers Seamless Remote Access To Our Organization’s On-Premise Applications
    Pros and Cons
    • "Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations."
    • "I would like the support to be faster."

    What is our primary use case?

    Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations.

    What is most valuable?

    The feature that I found most valuable is how conveniently Check Point Remote Access VPN allows us to access our HR system. We use it for the process of logging in and logging out.

    What needs improvement?

    I think Check Point Remote Access VPN is good enough to suffice our needs. At present, I don't have any complaints about the tool.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN since the COVID-19 pandemic started.

    What do I think about the scalability of the solution?

    In our organization, approximately 3,000 users work on Check Point Remote Access VPN. The number may go up if we hire more employees.

    How are customer service and support?

    I think that the tech support provided by Check Point Remote Access VPN is good. Also, I would add that I have no complaints.

    How was the initial setup?

    I would say that the initial setup was straightforward. The deployment process took place on weekends and during non-banking hours. In our organization, we only need around 10 to 15 employees, who include network administrators, developers, and project managers, for the deployment and maintenance of Check Point Remote Access VPN.

    What about the implementation team?

    The deployment was conducted with the help of our in-house team.

    What's my experience with pricing, setup cost, and licensing?

    I won't be in a position to answer this question. But, I can say that the licensing costs are charged annually.

    Which other solutions did I evaluate?

    We evaluated alternative options by using Forcepoint as a benchmark.

    What other advice do I have?

    I would like the support to be faster. I rate this solution a nine out of ten.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
    Updated: September 2025
    Buyer's Guide
    Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.