I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience.
Information Technology Admin at a wellness & fitness company with 51-200 employees
The admin features make the management smoother
Pros and Cons
- "I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience."
- "The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection."
What is most valuable?
What needs improvement?
We started with 50 users, but our numbers are increasing. Now it's difficult for us to maintain a steady internet connection and remote access, so we want to upgrade. We are considering a switch to FortiGate. I think they may have better service than Check Point offers.
Scalability is where we're having problems now. Generally, Check Point has been working fine, but we need something that can accommodate many users and provide a steadier internet connection. Our remote users need to access the VPN without any issues. Of course, this could also have something to do with our internet connection at the organization.
We've been using Check Point to manage sites we need to block. It gives us the option to totally disable things, but it does not let the administrator create exceptions to allow specific users to access certain websites. Check Point could enable the administrator to permit users to access particular sites. I think the VPN we're using may have exceeded its lifespan. For example, if you check Instagram on Check Point, you might not even see it showing up, and it's difficult to restrict access to specific applications.
For how long have I used the solution?
We started using Remote Access VPN sometime in the past five years.
What do I think about the scalability of the solution?
The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection.
It fills the logs and cuts off our connection when it gets full. It stops working. It's time-consuming to reset the device and reload the backups. It takes us about two hours because we would need to reconfigure those routes and integrate them with the IP addresses we have set up.
Buyer's Guide
Check Point Remote Access VPN
April 2025

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
860,592 professionals have used our research since 2012.
How was the initial setup?
The setup was straightforward. Everything was populated on Check Point, so it was easy to select what we wouldn't allow. We deployed on-premise because we have the space and infrastructure to support it.
The deployment didn't take long. Two IT people are responsible for the deployment and maintenance. The online documentation will walk you through the process. When you do a manual reset by pressing the button, it guides you through the setup process. You only need to follow the steps.
After that, we import our backup file, and it populates. Next, we run the updates and check we forgot to configure anything else. Some backups are older and might not align with what we have running on the ground.
What was our ROI?
I haven't seen an ROI.
What's my experience with pricing, setup cost, and licensing?
The cost varies. I believe the price ranges roughly from about 3000 to 4,000 ZWD. I don't think it gets any lower than that. The initial cost is high because you need to buy the hardware, and you incur some setup costs, but the expense drops in the long run.
Which other solutions did I evaluate?
So far, I have not tried any other solutions. I'm doing the research now. I'm still shopping around, trying to understand what's on the market before deciding.
What other advice do I have?
I rate Check Point Remote Access VPN eight out of 10. Aside from our current performance issues, it was smooth and flawless. I'm still shopping around. I was content with Check Point, but I want to see what's out there. I'm interested in knowing more about other available solutions. My primary goal is to avoid going through this process again two years from now. I'm hoping the next product will be a long-term solution, and it will be a while before we consider upgrading to something different.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd
Has great security features, including zero-day protection, malware protection, and anti-phishing
Pros and Cons
- "The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera."
- "There was complexity in the initial setup."
What is our primary use case?
The solution is primarily used for secure access for remote users. It's deployed as a SaaS over the cloud.
What is most valuable?
The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera.
What needs improvement?
If you are new to deploying the solution, the initial setup might be difficult the first time around. I had trouble setting the policies and then resetting the device.
For how long have I used the solution?
I joined my company eight or nine months ago and have been dealing with the solution since then.
What do I think about the stability of the solution?
I don't have much information on the stability aspect of the product. I haven't spoken to customers about their experience.
What do I think about the scalability of the solution?
I haven't discussed scalability with customers to get their take on how easy it is.
How are customer service and support?
We haven't referred to the technical support of Check Point just yet. We did have a replacement engineer assist us in deployment, and they handled it quite well.
How would you rate customer service and support?
Positive
How was the initial setup?
There was complexity in the initial setup. With one client, once we installed it and then tried to set the policies, the firewall was not responding very well. I was doing it for the first time, so we were unable to do it. The customer was not pleased with that, so we had to send another engineer to deploy that device. That's not to say it's overly hard - it was just my first attempt at an installation.
We had three engineers handling the initial setup. We deployed it over two days.
I'm hoping that the next time I'm deploying it, it should be done perfectly, without any support from any other engineer.
What about the implementation team?
We do the implementation for our clients.
What's my experience with pricing, setup cost, and licensing?
I'm not aware of the exact licensing costs associated with the product.
What other advice do I have?
We are in the business of selling firewalls. We're resellers and Check Point partners.
I personally have sold just the Check Point solution to only one customer. We are also selling data storage solutions, data backup, and cyber security solutions.
We are dealing with the latest version of the solution.
The solution is available both on-premises and in the cloud.
I'd rate the solution nine out of ten. I'd recommend it to other users and companies.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Check Point Remote Access VPN
April 2025

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
860,592 professionals have used our research since 2012.
Sales Engineer at Tempest Security Intelligence
Beneficial multiple factor authentication, lightweight on resources, and simple deployment
Pros and Cons
- "The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
- "Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication."
What is our primary use case?
Check Point Remote Access VPN is used to allow our employees to use the corporate resources or remote access to the corporation and lightweight on resources.
What is most valuable?
The most important feature of Check Point Remote Access VPN is the multiple factor authentication.
What needs improvement?
Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication.
For how long have I used the solution?
I have been using Check Point Remote Access VPN for approximately three years.
What do I think about the scalability of the solution?
We have approximately 1,000 users using this solution. We do not have plans to increase usage at this time.
How was the initial setup?
The initial setup of Check Point Remote Access VPN is simple. The deployment took us approximately two weeks.
What's my experience with pricing, setup cost, and licensing?
Check Point Remote Access VPN is not expensive and the cost is annual.
What other advice do I have?
I rate Check Point Remote Access VPN a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Cloud Engineer at ITQS
Good security, protects identity, and allows full access even in different regions
Pros and Cons
- "The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
- "The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately."
What is our primary use case?
Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data.
Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.
How has it helped my organization?
The solution is giving us security when it comes to sharing our data safely through the private and secure tunnel that is created when creating the VPN. The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet. Online hackers won't be able to use your real IP address to discover your personal data, and government surveillance agencies and ISPs won't be able to monitor what you do online by snooping on your traffic.
In addition to helping you avoid government surveillance, it also helps keep your privacy safe from advertisers.
What is most valuable?
In terms of the way they ensure traffic, an example is when we use Wi-Fi in public areas.
WiFi is everywhere nowadays and it is extremely convenient to use, especially if you have a tight mobile data plan. The only problem with free WiFi is that it's often unsecured, which means you're putting your personal data at risk every time you use it. After all, cybercriminals can find out a lot about you, which can lead to them stealing your:
- Credit card details
- Bank account details
- Email login credentials
However, if you use a VPN, you won't have to worry about those dangers. A VPN uses encryption to protect your online communications, making sure no one can monitor it. Basically, if a hacker tried to see your connection traffic, they would just see nonsense.
What needs improvement?
That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.
For how long have I used the solution?
I've used the solution for about 2 years.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT
A flexible gateway with good security and helpful technical support
Pros and Cons
- "We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway."
- "In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."
What is our primary use case?
Since SARS-COV2, most users went to work from their home office, so we needed to have an robust, secure, and stable VPN connection. We implemented Check Point VPN and we have had no problems with it. We are almost 50 users working from home securely. Also, the access rules based on VLANs have helped many users get access depending on which connection they have. For example, some users with VPN connections can only access some specific servers and ports, however, when they are on an internal LAN, they have access to the entire network.
How has it helped my organization?
We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway.
I'm the IT manager for the company, and my work has been improved due to the fact that, in conjunction with VPN, we implemented the Endpoint Security client so we can manage our client's computers even if they are not physically in the office. When we need to remove some users from a VPN connection we just need to lock the account and use the assets console to disable the feature from the client's computer.
What is most valuable?
The combination of the user accounts for the VPN with the access rules provided by the security gateway gives you more control and specificity about who has access to what. For external users, we can offer a solution based on the internet needs and we are able to share information on a secure channel. We can specifically point to the desired resources in the organization without the need to install any additional software on external client machines.
What needs improvement?
It needs to improve the capability of the Secure browser VPN connections. Some in-house applications didn't work due to the use of JScript and the backend and front end technology for the applications. In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers.
For how long have I used the solution?
I've used the solution for over two years.
What do I think about the stability of the solution?
It's very stable, however, I recommend some scheduled restarts for cleaning connections and processes.
What do I think about the scalability of the solution?
It is very easy to manage the solution and also the integration.
How are customer service and support?
I have had a good experience with the support tickets that I have dealt with.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previous to Check Point, we didn't have any gateway security.
How was the initial setup?
The initial setup was a little complex as it was the first time working with Check Point.
What about the implementation team?
The implementation was handled by an in-house team.
What was our ROI?
We expect that investments is recovered in two years.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair and the support team is good.
Which other solutions did I evaluate?
We were evaluating Fortinet as well.
What other advice do I have?
Check Point is very reliable and secure.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
Creates a dynamic network with great mobility and excellent stability
Pros and Cons
- "The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
- "The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."
What is our primary use case?
We have always worked within the office. However, the COVID pandemic changed the course of our work in terms of where we had to implement new solutions so that we could all work from home. That was when I encountered Check Point; we had years with this solution in the facilities, yet, only during the pandemic did we have to innovate for a home environment. Today we have more than 6000 users working from home thanks to Check Point. This is possible due to the fact that, with a certificate and the client for this connection, every person can connect to our environment as if they were at the office.
How has it helped my organization?
We still have many areas of opportunity in which we must work, however, this has required us to improve our infrastructure in order to accommodate remote work. Since the beginning of the pandemic, we have had this solution and we have had many challenges since there are more than 6000 people who work from home. For security, we have an expiration time of the .p12 certificates and that requires updating passwords. Today, we are integrating this solution with a 2MFA system to give much more security to corporate.
What is most valuable?
The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic for connection to corporate due to the integration we have of Check Point via our AC or LDAP.
We are creating rules by user and not by IP (which could be done both ways). We stick more to mobility inside and outside the corporate environment. Since then, corporate has been increasing security and keeping our workers happier.
What needs improvement?
The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application. We'd be able to give a better experience to companies that already have a contract or Check Point services that deal with a work-from-home environment, giving greater scope and coverage from a single centralized dashboard.
For how long have I used the solution?
I've used the solution for more than two years
What do I think about the stability of the solution?
The stability is the best.
What do I think about the scalability of the solution?
The scalability is great.
How are customer service and support?
We have witnessed a fast response from the support team.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a different solution.
How was the initial setup?
The initial setup was not overly complex.
What about the implementation team?
We handled the installation in-house.
What was our ROI?
We've witnessed a 40% ROI.
What's my experience with pricing, setup cost, and licensing?
The price is a little high, however, the solution is something that we recommend often.
Which other solutions did I evaluate?
We did evaluate other options.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Associate Consult at Atos
Highly stable, very stable, and offers good technical support
Pros and Cons
- "To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources."
- "Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server."
What is our primary use case?
Remote Access VPN is one of those essential items for every organization in order to maintain seamless and highly secured connectivity between the end-user and the organization's local area network to access resources - including Jump server Databases, et cetera.
No matter from which device or from which location users are accessing an organization's local resources, with the help of the Check Point VPN client they can make sure they have connected securely.
Check Point offers a best-in-class encryption algorithm to ensure confidentiality and maintain integrity between the end-user and the Gateway.
How has it helped my organization?
In disaster situations like Covid-19, most users were working from home or in remote locations. In such cases, Check Point Remote Access VPN provides feasibility to everyone to work from home and access an organization's resources remotely.
With a client-less configuration known as SSL VPN users can directly access resources via a browser-like database, share folders, et cetera.
To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources.
What is most valuable?
- Secure connectivity: Guaranteed authentication, confidentiality, and data integrity for every connection and user.
- Straightforward Configuration: Easy to enable blades and define policies.
- Authentication: SAML authentication makes sure the user is legitimate.
- Compliance check: It scans the endpoint machine to detect suspicious/malicious content before connecting to an office network.
- MEP: Multi entry points to make sure there's availability to the LAN network even if the primary gateway goes down.
- A single client can work as sandblast agent.
What needs improvement?
Check Point RA VPN requires companies to take separate licenses initially so that only 5 connected users licenses are given as subscriptions. Most other competitors, like Palo Alto, provide 1000 connected user licenses for free.
Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server. We have to make changes in the local directory of the respective devices.
For how long have I used the solution?
I've used the solution for more than three years.
What do I think about the stability of the solution?
The solution is highly stable.
What do I think about the scalability of the solution?
Check Point has an Unlimited License Package for the RA VPN and therefore we can scale it easily.
How are customer service and technical support?
Customer service has a dedicated team that handles RA VPN cases which ultimately leads to an early resolution.
Which solution did I use previously and why did I switch?
Migration has taken place such as from Cisco to Check Point and Sophos to Check Point. During that phase, the customer needed to change the VPN client as well.
Browser-based functionality is one of the best things that Check Point provides.
How was the initial setup?
The initial setup is straightforward during the initial configuration.
What's my experience with pricing, setup cost, and licensing?
The setup is very straightforward but subscription-based. It isn't cost-effective.
Which other solutions did I evaluate?
We did look at Cisco Anyconnect and Palo Alto Global Protect.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Global IT Network and Security Service Senior Specialist at a manufacturing company with 1,001-5,000 employees
Reasonably priced and scalable but you need to use the CLI for a lot of configurations
Pros and Cons
- "I found the MEP feature the most valuable. This has improved users' latency allowing the users to connect to the nearest Azure Check Point VM."
- "You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable MEP function is not so easy to size the gateway licenses."
What is our primary use case?
We've used Check Point VPN to move from an on-premise VPN Cisco product to a VPN built on the cloud. We decided to use Check Point as it was fully integrated with Microsoft Azure and present on the Azure marketplace. We deployed this solution on different subscriptions and used the MEP function to reduce users' latency on the VPN. The implementation has not been very easy, and the implementation of MEP has taken months. There were a lot of hotfixes to install, and the CLI configuration on the files had to be done. The configuration, in fact, can't be implemented using a GUI.
How has it helped my organization?
The solution has allowed us to remove the on-premise VPN solution and to remove firewalls from the data center. The solution implemented on the cloud allows us to easily scale in cases of increased users - such as during the pandemic, where all users had been moved to Smart working and to a VPN. In fact, in February of 2020, when we closed all of our offices and gave all users the possibility to work from home, we had licenses and CPU problems on-prem. The Check Point solution offered us an unlimited number of users and that made the solution very scalable.
What is most valuable?
I found the MEP feature the most valuable. This has improved users' latency allowing the users to connect to the nearest Azure Check Point VM.
The Multiple Entry Point (MEP) is a feature that provides high availability and load sharing solution for VPN connections. A security gateway on which the VPN module is installed provides a single point of entry to the internal network. It is the security gateway that makes the internal network "available" to remote machines. If a security gateway should become unavailable, the internal network is no longer available as well. An MEP environment has two or more security gateways to both protect and enable access to the same VPN domain, providing peer security gateways with uninterrupted access.
What needs improvement?
The main problem with Check Point is that some configuration can be done with the smart console in GUI, however, some others need to connect to the firewall via the CLI on SSH and therefore you will need to modify the local file on the firewall with VI.
ASA is so easy to reserve some static IPs based on users, however, in Check Point, it is really difficult to do so. In addition, you can't reserve as static some IP that you are assigned dynamically to a local pool.
You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable the MEP function is not so easy to size the gateway licenses.
The configurations that you do to modify local files are not reflected in the GUI via the smart console.
For how long have I used the solution?
We have been using this solution since 2020.
What do I think about the stability of the solution?
The solution isn't really stable. Maybe the last versions of R80.40 and R81 were more stable, however, the upgrade (if you have another old version) is really difficult and you have to rebuild the solution (if you are on Azure cloud).
What do I think about the scalability of the solution?
The solution is really scalable. You have to know that if you want to scale the solution you will have to configure and rebuild an SMS server with high CPU/memory resources, however.
How are customer service and technical support?
Unluckily the experience with support, especially in India, is really poor. It's best if you open a case using the Israeli team as that one is better.
Which solution did I use previously and why did I switch?
Yes, we were using CIsco ASA on-premises. We switched because we were moving our data center infrastructure onto the cloud.
How was the initial setup?
At first, the implementation was not easy to set up. We found many bugs and we had to install different hotfixes and upgrade the version more than one time.
What about the implementation team?
We implemented the solution via a hybrid approach. Check Point professional service is really good, however, our third-party implementation team was not very good.
What was our ROI?
At the moment, we have not reached the ROI point.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to pay attention to the sizing of the solution. There is not an intermediate number of licenses. It's very easy to go to unlimited users licenses.
Which other solutions did I evaluate?
We have gone with the Check Point solution due to its cheap price. Other options we considered were Palo Alto with Global Protect, Zscaler with ZPA, and Cisco Firepower implemented on Cloud.
What other advice do I have?
I suggest that if you want to implement this Check Point solution you should have good knowledge of the system as well as a system integrator or direct contacts in Check Point. In case of any issue, the support is poor and it's not easy to solve issues using technical support.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Popular Comparisons
Microsoft Intune
Prisma Access by Palo Alto Networks
Fortinet FortiClient
Microsoft Remote Desktop Services
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
OpenVPN Access Server
Claroty Platform
Cisco Secure Client (including AnyConnect)
Check Point Harmony SASE (formerly Perimeter 81)
Microsoft Azure VPN Gateway
Ivanti Connect Secure
F5 BIG-IP Access Policy Manager (APM)
TeamViewer Tensor
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices