Try our new research platform with insights from 80,000+ expert users
Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd
Real User
Has great security features, including zero-day protection, malware protection, and anti-phishing
Pros and Cons
  • "The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera."
  • "There was complexity in the initial setup."

What is our primary use case?

The solution is primarily used for secure access for remote users. It's deployed as a SaaS over the cloud. 

What is most valuable?

The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera.

What needs improvement?

If you are new to deploying the solution, the initial setup might be difficult the first time around. I had trouble setting the policies and then resetting the device. 

For how long have I used the solution?

I joined my company eight or nine months ago and have been dealing with the solution since then.

Buyer's Guide
Check Point Remote Access VPN
August 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.

What do I think about the stability of the solution?

I don't have much information on the stability aspect of the product. I haven't spoken to customers about their experience. 

What do I think about the scalability of the solution?

I haven't discussed scalability with customers to get their take on how easy it is. 

How are customer service and support?

We haven't referred to the technical support of Check Point just yet. We did have a replacement engineer assist us in deployment, and they handled it quite well. 

How would you rate customer service and support?

Positive

How was the initial setup?

There was complexity in the initial setup. With one client, once we installed it and then tried to set the policies, the firewall was not responding very well. I was doing it for the first time, so we were unable to do it. The customer was not pleased with that, so we had to send another engineer to deploy that device. That's not to say it's overly hard - it was just my first attempt at an installation.

We had three engineers handling the initial setup. We deployed it over two days. 

I'm hoping that the next time I'm deploying it, it should be done perfectly, without any support from any other engineer.

What about the implementation team?

We do the implementation for our clients. 

What's my experience with pricing, setup cost, and licensing?

I'm not aware of the exact licensing costs associated with the product. 

What other advice do I have?

We are in the business of selling firewalls. We're resellers and Check Point partners. 

I personally have sold just the Check Point solution to only one customer. We are also selling data storage solutions, data backup, and cyber security solutions.

We are dealing with the latest version of the solution.

The solution is available both on-premises and in the cloud. 

I'd rate the solution nine out of ten. I'd recommend it to other users and companies. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Eduardo Barcelos - PeerSpot reviewer
Sales Engineer at Tempest Security Intelligence
Real User
Beneficial multiple factor authentication, lightweight on resources, and simple deployment
Pros and Cons
  • "The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
  • "Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication."

What is our primary use case?

Check Point Remote Access VPN is used to allow our employees to use the corporate resources or remote access to the corporation and lightweight on resources.

What is most valuable?

The most important feature of Check Point Remote Access VPN is the multiple factor authentication.

What needs improvement?

Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication.

For how long have I used the solution?

I have been using Check Point Remote Access VPN for approximately three years.

What do I think about the scalability of the solution?

We have approximately 1,000 users using this solution. We do not have plans to increase usage at this time.

How was the initial setup?

The initial setup of Check Point Remote Access VPN is simple. The deployment took us approximately two weeks.

What's my experience with pricing, setup cost, and licensing?

Check Point Remote Access VPN is not expensive and the cost is annual.

What other advice do I have?

I rate Check Point Remote Access VPN a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
August 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port
User
Excellent support with great multi-factor authentication and compliance checks
Pros and Cons
  • "It offers a simple configuration and setup."
  • "It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices."

What is our primary use case?

We primarily use the solution for work from home. Our main goal is to provide users with the ability to access their workstation from anywhere in the world.

We provided remote access to more than 500 users during the pandemic. Check Point Remote Access VPN has worked smoothly as our appliance is capable of supporting 1000+ users.

We deployed a VPN client-based solution with multi-factor authentication. The compliance check feature is useful.

It is compatible with several operating systems, and it has great protection against malware.

It offers a simple configuration and setup.

How has it helped my organization?

We developed work-from-home policies for our organization during the pandemic due to the rise in COVID cases. As network security engineers, it's challenging for us to manage users' personal laptops and computers which are not up to date (OS, Antivirus ..etc). However, when it comes to the Check Point VPN solution, we overcame all the challenges and successfully implemented our infrastructure. Logs are helping us to monitor each user's activity. We can also isolate user laptops or PCs from the internet when its gets connected to our network.

What is most valuable?

The remote access blade is built in on the firewall, so it is easy to activate through the Smart Console.

Only the VPN client supports only the Windows and Apple Mac operating systems, which also support iOS and Android mobile platforms. The Check Point development team deserves praise for a flawless experience.

Multi-factor authentication and compliance checks help us to ensure maximum security.

VPN logs give us complete visibility and track unusual activities.

The VPN client user interface is simple and perfect.

The VPN client software is lightweight.

What needs improvement?

It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices.

The configuration of a VPN requires a distinct VPN Tab. Once the VPN blade has been activated, after activating VPN blade, we need to make some configurations in the gateway option settings and others in the VPN communities section. It would be preferable if these two things came together in one place.

Apart from this, it operates flawlessly. To improve our IT Services, we poll our users. The majority of people say how excellent the remote access VPN service is. Additionally, they stated that once connected to a VPN service, they never experience connectivity problems.

For how long have I used the solution?

I've used the solution for more than two years.

How are customer service and support?

The product offers excellent customer service and support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used a different solution that did not satisfy us in terms of security. As a result, we decided to deploy Check Point for enhanced security.

Before migrating to the Check Point firewall, we conducted market research and solicited feedback from my contacts who are already Check Point NGFW customers. We decided to use Check Point.

How was the initial setup?

The VPN Setup and initial configuration are tricky and not straightforward. For example, you need to:

1. Do some configuration in the gateway option, then:

2. VPN Communities

It would be preferable if step 1 and step 2 were available in one place.

3- Lastly, you must apply the firewall policy

What about the implementation team?

We implemented this solution ourselves.

What was our ROI?

We now have a reliable VPN solution to offer our staff, which is a significant return on investment.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good security, protects identity, and allows full access even in different regions
Pros and Cons
  • "The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
  • "The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately."

What is our primary use case?

Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data. 

Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.

How has it helped my organization?

The solution is giving us security when it comes to sharing our data safely through the private and secure tunnel that is created when creating the VPN. The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet. Online hackers won't be able to use your real IP address to discover your personal data, and government surveillance agencies and ISPs won't be able to monitor what you do online by snooping on your traffic.

In addition to helping you avoid government surveillance, it also helps keep your privacy safe from advertisers.

What is most valuable?

In terms of the way they ensure traffic, an example is when we use Wi-Fi in public areas.

WiFi is everywhere nowadays and it is extremely convenient to use, especially if you have a tight mobile data plan. The only problem with free WiFi is that it's often unsecured, which means you're putting your personal data at risk every time you use it. After all, cybercriminals can find out a lot about you, which can lead to them stealing your:

  • Credit card details
  • Bank account details
  • Email login credentials

However, if you use a VPN, you won't have to worry about those dangers. A VPN uses encryption to protect your online communications, making sure no one can monitor it. Basically, if a hacker tried to see your connection traffic, they would just see nonsense.

What needs improvement?

That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.

For how long have I used the solution?

I've used the solution for about 2 years.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT
User
A flexible gateway with good security and helpful technical support
Pros and Cons
  • "We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway."
  • "In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."

What is our primary use case?

Since SARS-COV2, most users went to work from their home office, so we needed to have an robust, secure, and stable VPN connection. We implemented Check Point VPN and we have had no problems with it. We are almost 50 users working from home securely. Also, the access rules based on VLANs have helped many users get access depending on which connection they have. For example, some users with VPN connections can only access some specific servers and ports, however, when they are on an internal LAN, they have access to the entire network.

How has it helped my organization?

We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway. 

I'm the IT manager for the company, and my work has been improved due to the fact that, in conjunction with VPN, we implemented the Endpoint Security client so we can manage our client's computers even if they are not physically in the office. When we need to remove some users from a VPN connection we just need to lock the account and use the assets console to disable the feature from the client's computer.

What is most valuable?

The combination of the user accounts for the VPN with the access rules provided by the security gateway gives you more control and specificity about who has access to what. For external users, we can offer a solution based on the internet needs and we are able to share information on a secure channel. We can specifically point to the desired resources in the organization without the need to install any additional software on external client machines.

What needs improvement?

It needs to improve the capability of the Secure browser VPN connections. Some in-house applications didn't work due to the use of JScript and the backend and front end technology for the applications. In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers.

For how long have I used the solution?

I've used the solution for over two years.

What do I think about the stability of the solution?

It's very stable, however, I recommend some scheduled restarts for cleaning connections and processes.

What do I think about the scalability of the solution?

It is very easy to manage the solution and also the integration.

How are customer service and support?

I have had a good experience with the support tickets that I have dealt with.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previous to Check Point, we didn't have any gateway security.

How was the initial setup?

The initial setup was a little complex as it was the first time working with Check Point.

What about the implementation team?

The implementation was handled by an in-house team.

What was our ROI?

We expect that investments is recovered in two years.

What's my experience with pricing, setup cost, and licensing?

The pricing is fair and the support team is good.

Which other solutions did I evaluate?

We were evaluating Fortinet as well.

What other advice do I have?

Check Point is very reliable and secure.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Creates a dynamic network with great mobility and excellent stability
Pros and Cons
  • "The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
  • "The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."

What is our primary use case?

We have always worked within the office. However, the COVID pandemic changed the course of our work in terms of where we had to implement new solutions so that we could all work from home. That was when I encountered Check Point; we had years with this solution in the facilities, yet, only during the pandemic did we have to innovate for a home environment. Today we have more than 6000 users working from home thanks to Check Point. This is possible due to the fact that, with a certificate and the client for this connection, every person can connect to our environment as if they were at the office.

How has it helped my organization?

We still have many areas of opportunity in which we must work, however, this has required us to improve our infrastructure in order to accommodate remote work. Since the beginning of the pandemic, we have had this solution and we have had many challenges since there are more than 6000 people who work from home. For security, we have an expiration time of the .p12 certificates and that requires updating passwords. Today, we are integrating this solution with a 2MFA system to give much more security to corporate.

What is most valuable?

The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic for connection to corporate due to the integration we have of Check Point via our AC or LDAP. 

We are creating rules by user and not by IP (which could be done both ways). We stick more to mobility inside and outside the corporate environment. Since then, corporate has been increasing security and keeping our workers happier.

What needs improvement?

The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application. We'd be able to give a better experience to companies that already have a contract or Check Point services that deal with a work-from-home environment, giving greater scope and coverage from a single centralized dashboard.

For how long have I used the solution?

I've used the solution for more than two years

What do I think about the stability of the solution?

The stability is the best.

What do I think about the scalability of the solution?

The scalability is great.

How are customer service and support?

 We have witnessed a fast response from the support team.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution.

How was the initial setup?

The initial setup was not overly complex.

What about the implementation team?

We handled the installation in-house.

What was our ROI?

We've witnessed a 40% ROI.

What's my experience with pricing, setup cost, and licensing?

The price is a little high, however, the solution is something that we recommend often.

Which other solutions did I evaluate?

We did evaluate other options.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Associate Consult at Atos
Vendor
Highly stable, very stable, and offers good technical support
Pros and Cons
  • "To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources."
  • "Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server."

What is our primary use case?

Remote Access VPN is one of those essential items for every organization in order to maintain seamless and highly secured connectivity between the end-user and the organization's local area network to access resources - including Jump server Databases, et cetera.

No matter from which device or from which location users are accessing an organization's local resources, with the help of the Check Point VPN client they can make sure they have connected securely.

Check Point offers a best-in-class encryption algorithm to ensure confidentiality and maintain integrity between the end-user and the Gateway. 

How has it helped my organization?

In disaster situations like Covid-19, most users were working from home or in remote locations. In such cases, Check Point Remote Access VPN provides feasibility to everyone to work from home and access an organization's resources remotely.

With a client-less configuration known as SSL VPN users can directly access resources via a browser-like database, share folders, et cetera.

To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources.

What is most valuable?

  • Secure connectivity: Guaranteed authentication, confidentiality, and data integrity for every connection and user.
  • Straightforward Configuration: Easy to enable blades and define policies.
  • Authentication: SAML authentication makes sure the user is legitimate.
  • Compliance check: It scans the endpoint machine to detect suspicious/malicious content before connecting to an office network.
  • MEP: Multi entry points to make sure there's availability to the LAN network even if the primary gateway goes down.
  • A single client can work as sandblast agent.

What needs improvement?

Check Point RA VPN requires companies to take separate licenses initially so that only 5 connected users licenses are given as subscriptions. Most other competitors, like Palo Alto, provide 1000 connected user licenses for free.

Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server. We have to make changes in the local directory of the respective devices.

For how long have I used the solution?

I've used the solution for more than three years.

What do I think about the stability of the solution?

The solution is highly stable.

What do I think about the scalability of the solution?

Check Point has an Unlimited License Package for the RA VPN and therefore we can scale it easily.

How are customer service and technical support?

Customer service has a dedicated team that handles RA VPN cases which ultimately leads to an early resolution.

Which solution did I use previously and why did I switch?

Migration has taken place such as from Cisco to Check Point and Sophos to Check Point. During that phase, the customer needed to change the VPN client as well.

Browser-based functionality is one of the best things that Check Point provides.

How was the initial setup?

The initial setup is straightforward during the initial configuration.

What's my experience with pricing, setup cost, and licensing?

The setup is very straightforward but subscription-based. It isn't cost-effective.

Which other solutions did I evaluate?

We did look at Cisco Anyconnect and Palo Alto Global Protect.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1602519 - PeerSpot reviewer
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH
Real User
Great scalability, good technical support, and integrates extremely well with the Check Point firewall
Pros and Cons
  • "The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
  • "For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."

What is our primary use case?

We use Check Point Remote Access VPN to provide access to employees, vendors, and advisors. They access the company resources - especially now that most people are working from home over the course of the last year. We also use it for specific companies that give us remote support to some applications, such as our parent company. Our admins access our company servers and resources. We're using Remote Access VPN with specific profiles for them that only give access to some resources.

We have three distinct environments. Server, DMZ, and User/SHOP. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.

How has it helped my organization?

The headache of connecting has been removed. It's very stable and we don't have any issues with it connecting. We have a large majority of people that were using nothing and always coming to the office. However, since the last year, we have a whopping 75% of users that have switched to using Check Point Remote Access VPN. The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.

What is most valuable?

The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage. 

The integration with two-factor authentication for remote access users is another valuable feature. In our case we use RSA.

Those two are the most valuable aspects that we have on the solution. It also gives us the possibility to securely connect to the company resources, without Check Point security measures.

Another great thing is that we already have all the logs from the firewall on the SmartPortal as the remote VPN also integrates into the firewall. We can see all the logs on the same tool because we also have a fully secure solution for Remote Access VPN. For full operational security, we need to manage the different hardware from the firewalls and the logs that are not in the same place. This is another valuable aspect of this solution.

Having access to those logs affects our security operations because if a user calls the support but does not have access to the VPN, we can see on the same tool on the SmartPortal and troublshoot. 

What needs improvement?

We don't have any specific complaints. We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in right from the software itself. For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent. The documentation of the software needs to be more accessible. If an end-user wants to have access to customized training from the company, that should be able to be built-in. I would add that feature. 

For how long have I used the solution?

I've been using the solution for around 1.5 years.

What do I think about the stability of the solution?

The stability is good. It's a never-fail.

What do I think about the scalability of the solution?

The scalability is great. We deploy to 5000+ users.

How are customer service and technical support?

It's second to none but we haven't needed it a lot. 

Which solution did I use previously and why did I switch?

We used to use Fortinet. We switched because it was hard to deploy. 

How was the initial setup?

Just pull the trigger on a 3rd party. Not complex at all. 

What about the implementation team?

We used both a vendor and in-house talent. 

What was our ROI?

The ROI was instant and around 54%.

What's my experience with pricing, setup cost, and licensing?

Go with a third party and get it set up correctly. It may be costly but it's worth it. 

Which other solutions did I evaluate?

We didn't evaluate anything else. I knew a vendor and had used the software before. 

What other advice do I have?

Get this software installed as soon as possible. It's a smart move. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.