No more typing reviews! Try our Samantha, our new voice AI agent.
josephtampient3 - PeerSpot reviewer
CEO at T3 Real Estate Group
User
Feb 27, 2023
Low cost with good compliance scanning and a VPN auto-connect feature
Pros and Cons
  • "Check Point has been perfect for protecting us from any type of attack or data theft during remote management."
  • "The main feature that would be improved within Check Point Remote Access is its operation within Linux OS, as it currently does not have many features for that OS."

What is our primary use case?

The primary use case is to remotely connect to various sites and various apps and use some technological apps that are cloud-based. Check Point Remote Access was the essential platform for us to connect remotely through a secure network with an encryption key. It's also an encryption service for all information shared and obtained from this remote connection. Today, we still use it to remotely connect to computers, apps, websites, and cloud-based apps while traveling or out of the office.

How has it helped my organization?

Check Point Remote Access has been the perfect solution for us for a couple of years now. It helped us to remotely connect to various cloud-based apps and software when we were out of the office during the pandemic. 

After the end of the pandemic, we continue to use this platform so that all our employees in our real estate sector can connect to specific apps and not neglect their workdays when they are traveling in other states of the country. 

Check Point has been perfect for protecting us from any type of attack or data theft during remote management; it prevents and blocks all types of data leaks and has an authentication for each connection.

What is most valuable?

The most valuable aspects of the solution include: 

- VPN auto-connect feature. It is essential. It activates the VPN every time I make a remote connection and since I don't have to activate it manually to make the remote connection, it saves me time.

- Compliance scanning. It allows me to detect any existing irregularities in the network that is being used for the remote connection.

- The VPN Client. It allows me to fully configure all remote access, configure the firewall used, and gives me full access to network settings.

What needs improvement?

The main feature that would be improved within Check Point Remote Access is its operation within Linux OS, as it currently does not have many features for that OS. You cannot access the detection of threats that can steal your data. 

In addition, it does not have an incident analysis that can detect failures in time in the network or VPN connectivity. 

Also, the IPsec settings on Linux are quite limited, which makes it a bit difficult to configure the settings you can make for remote connection to Linux.

Buyer's Guide
Check Point Remote Access VPN
May 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,244 professionals have used our research since 2012.

For how long have I used the solution?

I have used this solution for a period of more than three years. The main reason why I decided to start using it is due to the fact that we needed a solution that would allow us to work remotely when the COVID-19 pandemic happened; this was a perfect solution for working remotely securely.

What do I think about the scalability of the solution?

I was impressed by the scalability of this platform throughout our company, mainly since this solution emerged as the main use within the C-Level area of our company. It does not neglect some cloud-based apps when out of the office. The scalability of this platform made it possible for us to implement it in most areas of the company in order to strengthen remote work.

How are customer service and support?

The Check Point support team was always attentive to any requirement when we first purchased this system. We had about three questions when we purchased Check Point Remote Access and the Check Point team answered all of our questions within minutes.

How was the initial setup?

The main implementation was quite simple. Implementing it correctly in our corporate area took us a few days. However, it took us one month to fully implement it in all areas of our company. 

I found the initial setup to be fairly quick and provided a pretty useful system for protecting data leaks during remote connections.

What about the implementation team?

We handled the initial setup in-house.

What was our ROI?

We got a return on investment from this platform in about four months. We managed to enhance remote work greatly. This allowed our sales and our customers' solutions to benefit by 40%. In addition, we managed to enable our employees to provide direct customer service, which strengthened our sales by more than 40%.

What's my experience with pricing, setup cost, and licensing?

The Check Point Remote Access pricing is one of the most affordable solutions in terms of cost. This solution will power remote work for any company, and this solution comes at a very low cost. It provides a complete control panel, an SSL Portal, and client access for operating systems. I consider it very helpful for any company - at a very affordable price.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Richard Hermogeno - PeerSpot reviewer
Channels Management Head at Philippine National Bank
Real User
Feb 12, 2023
A Great Solution That Offers Seamless Remote Access To Our Organization’s On-Premise Applications
Pros and Cons
  • "Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations."
  • "I would like the support to be faster."

What is our primary use case?

Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations.

What is most valuable?

The feature that I found most valuable is how conveniently Check Point Remote Access VPN allows us to access our HR system. We use it for the process of logging in and logging out.

What needs improvement?

I think Check Point Remote Access VPN is good enough to suffice our needs. At present, I don't have any complaints about the tool.

For how long have I used the solution?

I have been using Check Point Remote Access VPN since the COVID-19 pandemic started.

What do I think about the scalability of the solution?

In our organization, approximately 3,000 users work on Check Point Remote Access VPN. The number may go up if we hire more employees.

How are customer service and support?

I think that the tech support provided by Check Point Remote Access VPN is good. Also, I would add that I have no complaints.

How was the initial setup?

I would say that the initial setup was straightforward. The deployment process took place on weekends and during non-banking hours. In our organization, we only need around 10 to 15 employees, who include network administrators, developers, and project managers, for the deployment and maintenance of Check Point Remote Access VPN.

What about the implementation team?

The deployment was conducted with the help of our in-house team.

What's my experience with pricing, setup cost, and licensing?

I won't be in a position to answer this question. But, I can say that the licensing costs are charged annually.

Which other solutions did I evaluate?

We evaluated alternative options by using Forcepoint as a benchmark.

What other advice do I have?

I would like the support to be faster. I rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
May 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,244 professionals have used our research since 2012.
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE
Real User
Aug 7, 2022
Secure remote access integration and hotspot access with a multi-level authentication support system
Pros and Cons
  • "The secure hotspot access for enabling good network connectivity is great."
  • "Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible."
  • "Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners."
  • "Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners."

What is our primary use case?

Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions to business users while they are working remotely and traveling for business purposes. Our organization involves over 70% of business travel to generate revenue, and it becomes really troublesome to secure the IT devices and cloud system at such traveling times. 

Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.

How has it helped my organization?

Check Point Remote Access VPN provides multiple factor authentication layers, and due to that, all the data transmission is completely scanned for any malware or malicious cyber threats. It is integrated with our various IT and cloud systems and performs its security scanning 24/7 without any glitches or trouble.

Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.

They enable a secure hotspot registration process for enabling all-around support of IT systems while operating remotely without any hassle.

What is most valuable?

The secure hotspot access for enabling good network connectivity is great.

Multi-layer scanning of IT systems across various critical stages for detection of threats and malicious threats has been useful.

Provisioning VPN Client and Auto Connect management system for free flow of information without any data mismanagement.

The secure remote access integration is available for both android and IOS devices and systems is helpful.

The multi-factor authentication support system is a phenomenal feature for providing all-around authentication support to for secure IT enablement. 

What needs improvement?

We are still in the learning phase as of now, and there seem to be more and more feature upgrades in the standard version of the application. They're providing updated features in the application with complete compliance assurance - which is really awesome - and we need specific customizations to make it a perfect fit for our business environment. This is a new and emerging area and requires a lot of customization and flexible features to suit the business requirements. 

Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners.

For how long have I used the solution?

I've used the solution for over six months now.

What do I think about the stability of the solution?

The solution is quite stable.

What do I think about the scalability of the solution?

It is an absolutely scalable solution.

How are customer service and support?

Technical support has been so far so good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution earlier.

How was the initial setup?

The setup is effortless and smooth.

What about the implementation team?

We installed the solution through the vendor ONLY.

What was our ROI?

We've seen an ROI of over 75%.

What's my experience with pricing, setup cost, and licensing?

I recommend all businesses to go for Check Point Remote Access VPN. It's one of the best of its kind in the market today. 

It has enormous features for ensuring security management solutions for remote workforce coupled with compliance assurance in the businesses. 

It's one of the highly cost-effective solutions which leads to boosting business performance, and also renewal is smooth without any hassle. The licensing is not pricy and is affordable by organizations.

Which other solutions did I evaluate?

The business and IT team did a lot of brainstorming sessions on this, and it went of really well in evaluating various available products in the market with their offerings.

We evaluated McAfee, Nord, and others

What other advice do I have?

I'd advise others to try the solution today itself and experience the utilities on their own. I am sure, they will love the product offerings and utilities to the greatest extent possible 

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
William Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Oct 30, 2025
Provides safe connection, good security, and remote access
Pros and Cons
  • "The solution implemented in the cloud allows us to easily scale in cases of user increase."
  • "Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."

What is our primary use case?

The company needs a tool that will provide users with the ability to connect from external addresses and that is where Check Point Endpoint Remote Access VPN services were contracted, which allows users to connect to our firewall. We also have Check Point firewalls in the cloud, to which people can also connect. They can then access the resources in our on-premises environment that they need to access, such as their computers, the Intranet, Salesforce, or our production applications, and have a 100% secure connection.

How has it helped my organization?

Check Point Remote Access VPN has helped us that our users and providers can connect to our network in a safe and efficient way, with the pandemic most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way, the solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

What is most valuable?

Check Point Remote Access VPN has helped us in that our users and providers can connect to our network in a safe and efficient way. With the pandemic, most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way. The solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

What needs improvement?

One of the parts where the improvement of Check Point Remote Access VPN can be forced is in the compliance analysis. Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines.

Another point to improve is to program a timeout if the VPN is disconnected due to an internet problem. One complication that we found is that the Linux machines do not have a complete client to do the installation and that has not delayed a bit with our users who use this type of operating system

For how long have I used the solution?

This solution has been used for approximately Three years in the company.

What do I think about the stability of the solution?

It's very stable in terms of downtime. The performance is very impressive.

What do I think about the scalability of the solution?

The solution can be easily scaled by adding a security gateway and general security and is very robust.

How are customer service and support?

On some occasions, we have had problems. Sometimes it takes a long time to resolve a case while on other occasions they resolve very quickly.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no type of tool that would supply these qualities.

How was the initial setup?

The configuration was very simple. The application is a very user-friendly tool apart from training and courses for implementation.

What about the implementation team?

A Check Point engineer who had a lot of experience in his work helped us with the implementation.

What was our ROI?

Mainly, it offers stability and detects behaviors, and gives users (and administrators) a level of trust as they go about their daily work. It introduces a lot of granularity to our policies.

Another feature that has been helpful is the sandbox feature. Many companies offer this type of thing now, however, Check Point has been offering it for quite some time.

What's my experience with pricing, setup cost, and licensing?

Check Point manages to provide good cost in its products and it is worth making the investment since this solution can prevent a collapse in the organization.

Which other solutions did I evaluate?

Check Point was always our first option with this type of solution since many security teams are from Check Point.

What other advice do I have?

One of the main aspects of importance in a company is the security of the computer platforms. When making an investment with these tools you are taking care of an important patrimony that will double your profits.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 30, 2025
Flag as inappropriate
PeerSpot user
reviewer2244411 - PeerSpot reviewer
Security Architect/Staff Engineer at a consultancy with 10,001+ employees
Real User
Top 5Leaderboard
Apr 17, 2024
Provides strong security features and offers a straightforward setup
Pros and Cons
  • "Check Point Remote Access VPN provides strong security features, including encryption, authentication, endpoint security, access control, and centralized management."
  • "Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience."

What is most valuable?

Check Point Remote Access VPN provides strong security features, including encryption, authentication, endpoint security, access control, and centralized management. These ensure data protection and access control for remote users, making it a reliable solution for maintaining security in remote access scenarios.

What needs improvement?

Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience, bringing it closer to the level of Cisco AnyConnect, which is considered more user-friendly.

For how long have I used the solution?

I have been working with Check Point Remote Access VPN for almost four years.

How are customer service and support?

My experience with tech support for Check Point Remote Access VPN was okay, but I find Cisco's support to be better. Overall, I would rate Check Point's support around six out of ten.

How would you rate customer service and support?

Neutral

How was the initial setup?

Installation of Check Point Remote Access VPN is straightforward and it involves agent deployment to user laptops, enabling easy connectivity. Maintenance is low-cost and manageable, even for small teams, as configurations are straightforward. Network security engineers need to specify network segments for traffic segregation, but overall, deployment is automated, minimizing manual intervention and complexity.

What's my experience with pricing, setup cost, and licensing?

The pricing for Check Point Remote Access VPN is average. Firewalls, whether physical or cloud-based, tend to be expensive, and Check Point's offering is no exception. While cloud options may offer more flexibility, physical devices have significant licensing costs, often totaling thousands of dollars.

What other advice do I have?

Remote Access VPN, like Check Point's solution, is user-friendly, requiring only client installation for connectivity. It is useful for employees accessing corporate networks remotely and for granting controlled access to contractors or vendors. Competitors like Cisco's AnyConnect exist but Check Point Remote Access VPN is highly regarded for its functionality and reliability.

Check Point's Remote Access VPN is user-friendly and efficient for connecting via laptops, offering a straightforward setup without complex configurations. It simplifies access to specific divisions within a corporate network, making it suitable for end-users without extensive security knowledge. Although challenges may arise with mobile connectivity, the overall experience is smooth and accessible.

MFA adds an extra layer of security to Remote Access VPN. For example, users might need to enter a code from an authenticator app on their phone in addition to their regular login credentials. This ensures enhanced verification of user identity and helps protect against unauthorized access.

Overall, I would rate Check Point Remote Access VPN as an eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1961277 - PeerSpot reviewer
Senior Ts Systems Integration Specialist at NTT Security
Real User
Nov 1, 2023
Highly secure with good support and multiple factor authentication layers
Pros and Cons
  • "It is easy to install the Endpoint Remote Access VPN client on different platforms."
  • "Bug Fixes and enhancement requests should be remediated earlier."

What is our primary use case?

Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions.

We can connect anywhere in the world over possible ways to secure the infrastructure.

Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.

Also, we have multi-authentication so there is no chance of leakage.

How has it helped my organization?

Check Point Remote Access VPN provides multi-factor authentication layers.

We can make Data transfer more strict with Data Integrity, Encapsulation, DES,3DES, and Hashing Algorithm so that the level of security will be higher.

Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.

Multiple VPN connections can be established and share the data in a secure possible way.

What is most valuable?

It is easy to install the Endpoint Remote Access VPN client on different platforms. Within the company, we use it for Windows and macOS.

Built-in, centrally managed Compliance blade. We check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.

The stable VPN connection and uptime are also very good.

We have a centrally managed Firewall blade, which allows filtering traffic on the rule base to protect the requirement.

What needs improvement?

Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and Auditors are forced to have the latest patches in place.

Checkpoint Major version should have an extended time than the default time mentioned in the end-of-life policy document with additional prices.

Tools must be introduced and supportive in analyzing the data, flow, and threats.

We have to introduce the scripting part to work seamlessly.

For how long have I used the solution?

I've used the solution for more than four years.

What do I think about the stability of the solution?

The solution is stable. 

What do I think about the scalability of the solution?

The solution is scalable. 

How are customer service and support?

The company offers the best support overall and we can trust their advice.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time we are using this type of solution.

How was the initial setup?

The initial setup is straightforward, simple, and centralized. 

What about the implementation team?

We handled the setup in-house.

What's my experience with pricing, setup cost, and licensing?

The product is better than any other product in the marketplace. Technically sounded techies all over the place. It is cost-effective and most importantly stable and secure.

Which other solutions did I evaluate?

We trust the Check Point Software technology.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Feb 12, 2023
Easy to set up with good remote access and a flexible to configure VPN
Pros and Cons
  • "This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers."
  • "Connection of devices from various locations is efficient though there are a few challenges when there is a network failure."

What is our primary use case?

Remote Access VPN helps my team to connect our devices remotely without any limitations. It is easy to establish a secure connection among teams and connect efficiently with maximum security. 

Teams can share files effectively under secure networking infrastructure. When implementing projects and tasks, it conveniently troubleshoots technical issues that can affect information traffic. 

I can now share large size of documents with my colleagues from a remote location without any interference. It is easy to facilitate remote workers and engage them.

How has it helped my organization?

This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers. The organization has benefited from a secure network that cyber attacks cannot compromise. We can safely access our servers from anywhere, anytime, without fear of losing confidential information. 

It gives the IT team an opportunity to monitor the performance of devices and control their operations. We can freely connect with our clients from remote areas and give them guidelines without physical appearance under a secure connection.

What is most valuable?

Secure remote access has enabled teams to focus on productive meetings without fear of being attacked by external ransomware attacks. Device access from remote networks has enhanced the efficient connection of teams from various areas. 

The setup process is simple, and new users can set it without any challenges. The cost and maintenance charges are relatively low as compared to most products in the market. 

Configuration of the VPN with other applications is flexible with productive performance. Identity and access management enables the IT team to categorize devices and channel them to effective network infrastructure.

What needs improvement?

My experience with the set features has always been excellent. The secure connection networking system has enabled each team to connect effectively with colleagues from anywhere. 

Connection of devices from various locations is efficient though there are a few challenges when there is a network failure. Disconnection due to internet failure may affect the entire connection and slow down the workflow. 

The setup process requires skilled manpower and dedicated teams to get the best results from the entire connection system. 

Integration of more powerful kill switch tools will enhance secure connection. 

Additional server locations can boost service delivery and cut the cost of connecting computing devices from different areas.

For how long have I used the solution?

I've used the solution for 11 months.

What do I think about the stability of the solution?

The secure connection is stable.

What do I think about the scalability of the solution?

I am impressed by the performance of this tool.

How are customer service and support?

The customer support operations have been excellent throughout.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with another VPN.

How was the initial setup?

The initial setup was successful.

What about the implementation team?

Implementation was through the vendor.

What was our ROI?

The ROI has been positive since we deployed this tool.

What's my experience with pricing, setup cost, and licensing?

The setup and licensing terms are effective.

Which other solutions did I evaluate?

This is the best solution that I have come across.

What other advice do I have?

For secure device connection and team collaboration, this is the best solution.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Feb 5, 2023
Good encryption, secure login capabilities and easy to install
Pros and Cons
  • "A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme."
  • "A characteristic to improve is the communication service under the SMTP scheme."

What is our primary use case?

We wanted to give employees the possibility to work from anywhere outside of the organization, being a house or another remote location of offices. We wanted this capability with the possibility and ease to grant them access to our perimeter network so that they could access the data or internal applications for the use of each of its functions. We wanted faster, safer, and more efficient transactions that are going to be shared within our organization based on the business.

How has it helped my organization?

This tool gave us the possibility and the benefit of being able to establish that all users, according to their geographical location, need to transfer, manage, execute, validate, and maintain data. We are always in contact with all users within and outside. It is strong, fast, easy to install, and extremely secure for each of the functions that it is designed for. Important to note is that one of the features uses a single sign-on approach.

What is most valuable?

Among other features, advantages, and services that the solution provides us, it is important to understand that it gives us the possibility, capacity, and management for establishing that each of the resources is accessed through encrypted communication tunnels. A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme. This goes beyond a simple password, giving us the possibility of integrating more than one service. 

What needs improvement?

A characteristic to improve is the communication service under the SMTP scheme. In some cases, it is quite complex when it comes to managing, configuring, forwarding, and integrating mail services. It consumes a lot of processing and RAM memory. We want a solution that allows us to use current resources so that high processing peaks demanded by the virtual or physical equipment do not occur. 

For how long have I used the solution?

I've used the solution for four years.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2026
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.