Try our new research platform with insights from 80,000+ expert users
reviewer1961277 - PeerSpot reviewer
Senior Ts Systems Integration Specialist at NTT Security
Real User
Top 5
Highly secure with good support and multiple factor authentication layers
Pros and Cons
  • "It is easy to install the Endpoint Remote Access VPN client on different platforms."
  • "Bug Fixes and enhancement requests should be remediated earlier."

What is our primary use case?

Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions.

We can connect anywhere in the world over possible ways to secure the infrastructure.

Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.

Also, we have multi-authentication so there is no chance of leakage.

How has it helped my organization?

Check Point Remote Access VPN provides multi-factor authentication layers.

We can make Data transfer more strict with Data Integrity, Encapsulation, DES,3DES, and Hashing Algorithm so that the level of security will be higher.

Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.

Multiple VPN connections can be established and share the data in a secure possible way.

What is most valuable?

It is easy to install the Endpoint Remote Access VPN client on different platforms. Within the company, we use it for Windows and macOS.

Built-in, centrally managed Compliance blade. We check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.

The stable VPN connection and uptime are also very good.

We have a centrally managed Firewall blade, which allows filtering traffic on the rule base to protect the requirement.

What needs improvement?

Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and Auditors are forced to have the latest patches in place.

Checkpoint Major version should have an extended time than the default time mentioned in the end-of-life policy document with additional prices.

Tools must be introduced and supportive in analyzing the data, flow, and threats.

We have to introduce the scripting part to work seamlessly.

Buyer's Guide
Check Point Remote Access VPN
September 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for more than four years.

What do I think about the stability of the solution?

The solution is stable. 

What do I think about the scalability of the solution?

The solution is scalable. 

How are customer service and support?

The company offers the best support overall and we can trust their advice.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time we are using this type of solution.

How was the initial setup?

The initial setup is straightforward, simple, and centralized. 

What about the implementation team?

We handled the setup in-house.

What's my experience with pricing, setup cost, and licensing?

The product is better than any other product in the marketplace. Technically sounded techies all over the place. It is cost-effective and most importantly stable and secure.

Which other solutions did I evaluate?

We trust the Check Point Software technology.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Real User
Good integration, great for remote access, and centralizes users effectively
Pros and Cons
  • "We can integrate remote access to our branches through Check Point services."
  • "We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."

What is our primary use case?

We needed to grow a little more at a cloud level, which means that we have had more places in which we host information, and needed to protect it. We needed to allow users to have access from the different branches in the cloud to our main branch and to access remotely. As a result of these needs, we have been looking for solutions that allow us to have quick and efficient access no matter which branch we are going to access, and to have access allowed quickly and easily as if users were inside the perimeter area of ​​our organization.

How has it helped my organization?

Currently, Check Point is an ally that we have used within our organization to protect the perimeter area, the equipment, and other technologies. We have complete protection in one technology that we are using so that our users with greater frequency can access the data of our organization regardless of where they are. With this, they can have quick, simple access as if they were within the perimeter area. This has given us greater protection when it comes to having protected and verified access under user identity.

What is most valuable?

We can integrate remote access to our branches through Check Point services; however, those services come with a centralized identity, a domain identity, which does not work for the different logins. It only works for the login through the remote connection application. The user profile is centralized, verified, and filtered by the tool, thus being one of the characteristics that are very important to me since it shows any activity that the user is going to carry out.

What needs improvement?

We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution. This would allow us to have a tool that it is not only remote access for mobile devices but a remote access solution for virtual teams, including mobile devices such as cell phones, tablets, and other types of devices in IoT areas such as doors, houses, and medical equipment.

For how long have I used the solution?

I've been using the solution for one year.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
September 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Eladio José Sibaja Trejos - PeerSpot reviewer
Administrador Junior Level 1 at Compuguana
Real User
Easy to install, and makes it quick and easy to connect
Pros and Cons
  • "Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
  • "It would be good to have Remote Access VPN solutions for Check Point edge services."

What is our primary use case?

Currently, as we are a company that constantly imports and exports solutions. We have needed to give our salespeople access to our executives since that part of retail is constantly on the move inside and outside our organization. This makes it somewhat necessary to figure out how everyone can access data since the information is being used and managed every day inside and outside of our institution. We have come to use the Check Point security services so that users can have the same access as we have inside when they are outside the organization.

How has it helped my organization?

The capacity that Check Point Remote Access VPN offers is one of the best. It has made it easier for us and the team to have great mobility inside and outside the organization. If anyone must consult the services internally, they can connect quickly and simply. The agent that allows the connection is very fast to install and very fast to configure. It has streamlined a lot of the complexity that we had faced before.

What is most valuable?

Among its most valuable features is how it quickly and easily connects everyone to the VPN service. It quickly installs an agent on the computers, so that our users do not have to worry about their mobile devices being configured. It is easy to install and can run and install as a client on devices whether the user has Mac or Windows.

What needs improvement?

In the future, if this service could be installed in a faster and simpler way (rather than having it directly connected to the appliances), that would be ideal. Today, many of the solutions are not what was needed when we had perimeter security. It would be good to have Remote Access VPN solutions for Check Point edge services.

For how long have I used the solution?

We have been using the solution for three months.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Great VPN connection that helps extend infrastructure and is perfect for remote worker access
Pros and Cons
  • "Scalability is great. We have been able to grow as a corporation due in part to this type of solution."
  • "Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."

What is our primary use case?

Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client. 

Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.

How has it helped my organization?

Connection through VPN has helped us with the connection to corporate. This type of connection has been very useful to us since, as infrastructure personnel, we can establish a connection to our corporate to make a connection either RDP or directly to services in order to be able to carry out any work activity or review any report by the operational part in order to speed up response times. We can connect to our network equipment by SSH, RDP, or via the web, however, only when we have this type of secure connection.

What is most valuable?

One of the features that has helped us the most with our solutions has been the P2P connection through an IPsec VPN. It has allowed us to extend our infrastructure and grow with new clients. Previously, we had around 15 corporate clients. Through the COVID-19 pandemic, we have managed to grow and now have around 35 new corporate clients and more than 6 people connected by VPN. This has forced us to increase our infrastructure to be able to support all these connections and to have a stable, reliable, and, above all, scalable solution that can interconnect more clients.

What needs improvement?

We have not migrated to the R81 version and I do not doubt that it will have some improvements compared to the version we use today. 

Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor. This type of integration would undoubtedly give it a better reach and greater market with new security trends top of mind. 

I know that everything is moving to a cloud environment, however, for all those corporates that still do not trust such an environment, it would be favorable to offer a 2MFA service in a solution tested through a blade or in the cloud. 

For how long have I used the solution?

I've used the solution for more than five years.

What do I think about the stability of the solution?

The remote workers were experiencing issues like disconections, no IP avaliables from the DHCP, or unable to connect because the server didnt responde to a ping, however this issue was fix after we instlalled the JHF 125 on each gateway and after the upgrade, everythig has been working OK, but before that Check Point didn´t have a fix for that manner.

What do I think about the scalability of the solution?

Scalability is great. We have been able to grow as a corporation due in part to this type of solution.

How are customer service and support?

They have been with us when we needed help. We don't have any complaints about their level of service.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did use a different solution and we switched due to the fact that Check Point is more secure and has more features for the type of connections we need.

How was the initial setup?

It was a straightforward setup.

What about the implementation team?

The product was integrated with in-house personnel.

What was our ROI?

We've seen about a 40% ROI.

What's my experience with pricing, setup cost, and licensing?

Check Point is an expensive solution, however, it has more features and is more secure than other options.

Which other solutions did I evaluate?

Ae evaluated AnyConnect and Palo Alto.

What other advice do I have?

We would like them to add a 2MFA feature in the future. This is our direct request.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Network Security Engineer at a consumer goods company with 201-500 employees
Real User
Easy to download, set up, and configure
Pros and Cons
  • "The solution offers high scalability as far as adding more users."
  • "This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity."

What is our primary use case?

With this solution, we can:

1) Securely and privately access our data from anywhere with the Check Point VPN. 

2) Connect securely from any device and any asset.

3) Have 2FA enabled while connecting to the VPN in an official mail. If any person has your VPN credential, he can initiate contact for security codes to connect to the VPN.

4) Integrate our data.

5) View VPN events from the console.

6) Easily install and connect the VPN. 

7) Provide colleagues with secure and seamless remote access to the corporate network.

8) Get a full picture with complete network visibility.

How has it helped my organization?

The product has improved the organization by:

1) Deploying high performance. Check Point's private VPN gateways can secure our colleagues/teams working remotely with dedicated IPs and provides private resource access. It empowers our personnel to connect with relevant access permissions to access corporate resources.

2) Ensure a user of our organization aligns with traffic privacy with one of many tunneling protocols so that all transmitted data is completely encrypted. The level of security provided by Check Point ensures that only authorized connections are established, so if users are connected, they are protected.

What is most valuable?

The solution's most valuable aspects include:

1) Ease of install and ease of use.

2) 2FA Security.

3) Seamless access.

4) Integration with our data.

5) The ability to view VPN events from the console.

6) The ability to manage all our devices from one platform and easily secure and segment their access to resources. 

7) Providing authorized least privileged access for all devices.

8) The ability for our entire global organization to work more securely and to allow us to deploy private and dedicated networks in more than one location.

9) The level of security provided by Check Point. It ensures that only authorized connections are established, so if users are connected, then they are protected.

What needs improvement?

This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity. 

For example, when my internet is not working properly, then the VPN disconnects all of sudden and if I want to connect again, I need to do so with credentials and 2FA. In the next release, if the product could program in a hold time then disconnect the VPN due to the internet's fluctuation, that would be ideal as it would improve the way we can monitor our network visibility.

For how long have I used the solution?

I've been using Check Point Remote access VPN from a Client perspective for eight months.

What do I think about the stability of the solution?

It is perfectly stable as far as the VPN is concerned because when I used the older version(R.77) of checkpoint Remote VPN then that time there was points of stablility concern but after the upgradation checkpoint VPN(R.80) perfectly worked on stability part and now it is stable for windows and MAC OS.

What do I think about the scalability of the solution?

The solution offers high scalability as far as adding more users. I don't see that as being an issue.

We have 330-350 users in our company who are using the Check Point VPN.

How are customer service and support?

Technical support is good and helpful when needed. Whenever I was stuck, I was able to get a solution. This was provided by the Check Point TAC support and services team and they were helpful.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Forticlient VPN also. However, the Forticlient VPN had no visibility on traffic and we required better security for our organization.

How was the initial setup?

The product is easy to download, set up, and configure. The official site documentation is pretty good and helps you to understand the process in order to get the VPN connected.

What about the implementation team?

I implemented it myself both in-house as well as for our client.

What's my experience with pricing, setup cost, and licensing?

In terms of the cost:

1) It's easy to set up and download from the official Check Point site.

2) It's easy to connect the VPN by putting in the gateway address, credentials, and the 2FA. 

3) I don't know about exact pricing as it's not a part of my job. I'm a technical person. Our sales team knows all the pricing and licensing details.

Which other solutions did I evaluate?

I did not really look at other options. My first experience was with Forticlient, however, I wanted more security so I chose the Check Point VPN solution and I'm happy with using it. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1730568 - PeerSpot reviewer
Network and Security Engineer at a security firm with 11-50 employees
Reseller
Top 5Leaderboard
A stable tool that provides easy-to-use policies and safe infrastructure for remote access
Pros and Cons
  • "The policies are easy to use."
  • "The product’s architecture is a bit distributed."

What is our primary use case?

We use the solution for our customers. Whenever the users work from home, they connect to the solution and are redirected to their network. It is very simple. They install the client, and the client makes a tunnel to the product. Once they are connected, they can enter into the network.

What is most valuable?

The policies are easy to use. Once we are connected, the entire infrastructure is safe, irrespective of the device we are using. There is no need to worry about safety. It's a secure tunnel that helps us access the network. It is a very useful feature. We can access the internal resources once we are connected to a VPN. We need not be in the office. The solution performs well.

What needs improvement?

The product’s architecture is a bit distributed. It should consolidate the architecture to make everything available on a single dashboard.

For how long have I used the solution?

I have been using the solution for two and a half years.

What do I think about the stability of the solution?

The tool is stable.

What do I think about the scalability of the solution?

The tool is scalable. We may need to opt for higher boxes. We work with enterprise customers.

How are customer service and support?

The technical support is hardly good. The support team must improve its response time. It should also improve follow-ups through email.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with Sophos and Array Networks. Check Point’s stability is better compared to other tools. I have frequently faced disconnection and other issues with other products.

How was the initial setup?

The initial setup is not easy. We need to be skilled in Check Point to install the solution. The time taken for deployment depends upon the number of boxes we install. If we install one or two boxes, one or two weeks is sufficient.

Our customer needed to install more than 100 boxes in every region. It takes months to deploy the product at that scale. We need a team of 20 people to implement the tool for an enterprise. Once the installation is done, maintenance is easy. The product runs smoothly.

What other advice do I have?

I recommend the solution to every vendor with Check Point as a firewall because it has great stability and security. We can terminate our VPN services to the same box if we're already using Check Point VPN. Overall, I rate the product a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. MSP
PeerSpot user
Deputy Head of IT department at UkrGasBank
Real User
Provides users with secure, seamless remote access to corporate networks
Pros and Cons
  • "It operates effectively, particularly during challenges like adversities or infrastructure issues."
  • "There were some issues with automation and instability."

What is our primary use case?

In the context of general user remote access, we utilize Check Point VPN concentrators that serve as both Internet firewalls and error ID locations. Our remote access system, constructed on a Check Point foundation, consists of four systems.

What is most valuable?

Currently, I'm part of the network team, and my primary concern revolves around maintaining a stable connectivity setup. It's important for this connectivity solution to have provisions, possibly within AWS, that enhance security measures and provide more security-related advantages. From my standpoint, our solution serves a general purpose. It operates effectively, particularly during challenges like adversities or infrastructure issues. Overall, it suits our needs well.

What needs improvement?

There were some issues with automation and instability. But overall, these self-integrated products offer exceptional support and prove highly beneficial from an administrative standpoint. It isn't overwhelming, as seen with instances like in other vendors. The platform is convenient to manage and scalable.

For how long have I used the solution?

I have been working with Check Point Remote Access VPN for one year. 

What do I think about the scalability of the solution?

The solution is scalable. I rate the scalability a nine out of ten. 

How are customer service and support?

Technical support is essential in our case. We encountered a few instances related to next-generation firewalls, though they might not be of direct interest.

In general, the response rate to our inquiries has been quick. Our cases are categorized as server-to-server or critical solutions, resulting in immediate internet connectivity for addressing the issue. The level of support we receive is of a very high standard.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used Cisco AnyConnect. Both solutions are similar. However, the difference lies in the security features rather than the networking aspects.

Ultimately, the decision was made to expand and implement Check Point for the entire user base. This choice was reasonable based on the circumstances and the initial security in Check Point. We also had a phase where we utilized both solutions simultaneously. Eventually, due to our requirements, switching solely to Check Point proved to be the more precise decision, aligning with our corporate requirements.

How was the initial setup?

The initial setup is not very easy and we are partnered with highly qualified engineers to deploy the solution. The process involves designing the overall network module, carrying out installations, configuring appropriately, and initiating the initial setup. The array agent is then deployed to individual personal computers. It takes almost one quarter.

What about the implementation team?

We had a partnered team with highly qualified engineers to deploy the solution.

What's my experience with pricing, setup cost, and licensing?


What other advice do I have?

When working with remote access, the goal is to define the exact issue we aim to resolve. Identifying a suitable solution for discussions is crucial while focusing on establishing a high-level solution design. Following this, the implementation can proceed. Formulating a solid architecture utilizing Check Point isn't overly complex. The service switches provided within the system confer a sophisticated level of functionality.

Based on these, I would rate it a nine out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Recep  Alver - PeerSpot reviewer
Cyber Security Engineer at Natica IT Consulting at Natica IT Consulting
Real User
Easy to use and set up with good security
Pros and Cons
  • "It is stable most of the time."
  • "We have noted some stability issues."

What is our primary use case?

We primarily use the solution as a VPN for connection purposes. It helps us connect to corporate. 

What is most valuable?

It is easy to use and easy to set up. The setup is very fast.

The security is pretty good. 

It is stable most of the time.

What needs improvement?

It's becoming old-fashioned and slightly out of date. We're moving towards DNS.

We have noted some stability issues. 

For how long have I used the solution?

I've used the solution for more than a year at this point. The company has maybe used it longer. 

What do I think about the stability of the solution?

The stability is very good. I'd rate it nine out of ten. It could be a bit better. It might now work with all programs. 

What do I think about the scalability of the solution?

The solution is scalable. We have 80 or 90 users on the product.

It is not extensively used. 

How are customer service and support?

We do not need to use technical support. We are technical ourselves and can handle issues. 

Which solution did I use previously and why did I switch?

I've used Palo Alto and Sophos, among other solutions. I've used a few different solutions. 

How was the initial setup?

The initial setup is very fast and straightforward. It only takes about five to ten minutes. 

You simply set up your firewall and handle settings and then send links to your IT team that can connect them.

What about the implementation team?

We were able to manage the setup in-house. We did not use a consultant or integrator. 

What was our ROI?

I have not witnessed any ROI. 

What's my experience with pricing, setup cost, and licensing?

The license is renewed yearly. I'm not sure of the exact price or if it is expensive. 

What other advice do I have?

I'd rate the solution nine out of ten. 

I would advise companies to make sure the configuration is correct on the firewall.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.