My main use case for Check Point Remote Access VPN involves using a Quantum Spark 1800 and 1600 to connect, providing access to my users to connect from an outside network to an inside network.
The best features Check Point Remote Access VPN offers include the Check Point Endpoint Security VPN from a Check Point Quantum Spark 1800 SMB, which I use to create a user and send the link to download the client. They will download it, and they will connect to our VPN. Once they connect to the VPN, whatever the policy is there, everything will get applied. When they connect to the VPN, we think that it is very secure for the user. The user's internet access is very secure because their internet goes through my firewall before reaching outside.
The security provided by Check Point Remote Access VPN impacts my users because some people connect while traveling, such as being at a railway station or an airport, and we are unsure whether these public networks are safe and secure. For that reason, they connect through the VPN, and once they connect, any kind of network they use has their internet traffic transferred to my firewall through my firewall policies.
I have noticed a measurable impact from using Check Point Remote Access VPN, as earlier, people connected without having a VPN, which sometimes resulted in malware getting into their laptops. Once they connect to the office and the internal network, the firewall immediately catches that particular malware and gives a pop-up to the user.
Since implementing Check Point Remote Access VPN, I have seen a decrease in malware incidents, and I can say that I have reduced a lot of issues, such as malware attacks. Everything has been significantly reduced.
Sometimes the support is a bit glitchy.
I have been using Check Point Remote Access VPN for the last 1.8 years.
All features of Check Point Remote Access VPN are working fine. Everything is functioning properly and effectively.
The interface in Check Point Remote Access VPN is very helpful. Users can easily identify what kind of assets have been connected because it shows a different dashboard. It displays how many mobile phones are connected, how many IoT devices are connected, how many computers, laptops, and desktops are connected.
On a scale of one to ten, I rate Check Point Remote Access VPN a nine.