Try our new research platform with insights from 80,000+ expert users
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port
User
Jul 17, 2022
Excellent support with great multi-factor authentication and compliance checks
Pros and Cons
  • "It offers a simple configuration and setup."
  • "It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices."

What is our primary use case?

We primarily use the solution for work from home. Our main goal is to provide users with the ability to access their workstation from anywhere in the world.

We provided remote access to more than 500 users during the pandemic. Check Point Remote Access VPN has worked smoothly as our appliance is capable of supporting 1000+ users.

We deployed a VPN client-based solution with multi-factor authentication. The compliance check feature is useful.

It is compatible with several operating systems, and it has great protection against malware.

It offers a simple configuration and setup.

How has it helped my organization?

We developed work-from-home policies for our organization during the pandemic due to the rise in COVID cases. As network security engineers, it's challenging for us to manage users' personal laptops and computers which are not up to date (OS, Antivirus ..etc). However, when it comes to the Check Point VPN solution, we overcame all the challenges and successfully implemented our infrastructure. Logs are helping us to monitor each user's activity. We can also isolate user laptops or PCs from the internet when its gets connected to our network.

What is most valuable?

The remote access blade is built in on the firewall, so it is easy to activate through the Smart Console.

Only the VPN client supports only the Windows and Apple Mac operating systems, which also support iOS and Android mobile platforms. The Check Point development team deserves praise for a flawless experience.

Multi-factor authentication and compliance checks help us to ensure maximum security.

VPN logs give us complete visibility and track unusual activities.

The VPN client user interface is simple and perfect.

The VPN client software is lightweight.

What needs improvement?

It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices.

The configuration of a VPN requires a distinct VPN Tab. Once the VPN blade has been activated, after activating VPN blade, we need to make some configurations in the gateway option settings and others in the VPN communities section. It would be preferable if these two things came together in one place.

Apart from this, it operates flawlessly. To improve our IT Services, we poll our users. The majority of people say how excellent the remote access VPN service is. Additionally, they stated that once connected to a VPN service, they never experience connectivity problems.

Buyer's Guide
Check Point Remote Access VPN
March 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,933 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for more than two years.

How are customer service and support?

The product offers excellent customer service and support.

Which solution did I use previously and why did I switch?

We used a different solution that did not satisfy us in terms of security. As a result, we decided to deploy Check Point for enhanced security.

Before migrating to the Check Point firewall, we conducted market research and solicited feedback from my contacts who are already Check Point NGFW customers. We decided to use Check Point.

How was the initial setup?

The VPN Setup and initial configuration are tricky and not straightforward. For example, you need to:

1. Do some configuration in the gateway option, then:

2. VPN Communities

It would be preferable if step 1 and step 2 were available in one place.

3- Lastly, you must apply the firewall policy

What about the implementation team?

We implemented this solution ourselves.

What was our ROI?

We now have a reliable VPN solution to offer our staff, which is a significant return on investment.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Top 20
Jul 10, 2022
Easy to activate with full visibility and network control
Pros and Cons
  • "The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out."
  • "In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system."

What is our primary use case?

This product provides a secure connection to the corporate network from anywhere and safe traffic of data regardless of the possible threats in the WAN it's connected to. It also provides secure access to company apps and controls the traffic depending on each company's policies. Through it, we create layers that control or limit data traffic for specific users. I've been trained in the product and know it's one of the most effective in the business and admit to facilitating my customers to get it from our Check Point partners.

How has it helped my organization?

A clear example of the positive impact this license has had in my organization was back in 2020. The software was in use since before the pandemic hit so our personnel was familiarized with the product; the transition was smooth and secure from the office to work from home. Access policies were run through the active directory applied on all kinds of end points, from cell phones, tablets, laptops, desktops - you name it. Access could be restricted by location and using network security assessments that prevented connecting to corrupted networks. 

What is most valuable?

We already use the Check Point Firewall and those are the ones the organization's employees connect to for the remote VPN and it made it really easy to activate this function as new hardware was not needed. 

The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out. Be it if our users are at home or in the office the same policy applies to them allowing us to view the traffic within our organization.

What needs improvement?

In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system. 

Also, this product has limitations with headcount addition, as there are performance limitations in each security gateway the software has. 

The ability to allow split-tunneling while still following our corporate policy should be offered. 

Some things like the compliance aspect of the VPN Client can be updated so the product stays up to speed with the ever-changing environment in software security.

For how long have I used the solution?

For the past eight years, I've been working at a company where I was first in software security sales for three years and then five years in hardware sales. Since I have a background in security, I've been part of training and sales where Check Point products are involved. I have tested most products Check Point offers due to our partnership.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
March 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,933 professionals have used our research since 2012.
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT
User
Mar 3, 2022
A flexible gateway with good security and helpful technical support
Pros and Cons
  • "We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway."
  • "In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."

What is our primary use case?

Since SARS-COV2, most users went to work from their home office, so we needed to have an robust, secure, and stable VPN connection. We implemented Check Point VPN and we have had no problems with it. We are almost 50 users working from home securely. Also, the access rules based on VLANs have helped many users get access depending on which connection they have. For example, some users with VPN connections can only access some specific servers and ports, however, when they are on an internal LAN, they have access to the entire network.

How has it helped my organization?

We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway. 

I'm the IT manager for the company, and my work has been improved due to the fact that, in conjunction with VPN, we implemented the Endpoint Security client so we can manage our client's computers even if they are not physically in the office. When we need to remove some users from a VPN connection we just need to lock the account and use the assets console to disable the feature from the client's computer.

What is most valuable?

The combination of the user accounts for the VPN with the access rules provided by the security gateway gives you more control and specificity about who has access to what. For external users, we can offer a solution based on the internet needs and we are able to share information on a secure channel. We can specifically point to the desired resources in the organization without the need to install any additional software on external client machines.

What needs improvement?

It needs to improve the capability of the Secure browser VPN connections. Some in-house applications didn't work due to the use of JScript and the backend and front end technology for the applications. In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers.

For how long have I used the solution?

I've used the solution for over two years.

What do I think about the stability of the solution?

It's very stable, however, I recommend some scheduled restarts for cleaning connections and processes.

What do I think about the scalability of the solution?

It is very easy to manage the solution and also the integration.

How are customer service and support?

I have had a good experience with the support tickets that I have dealt with.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previous to Check Point, we didn't have any gateway security.

How was the initial setup?

The initial setup was a little complex as it was the first time working with Check Point.

What about the implementation team?

The implementation was handled by an in-house team.

What was our ROI?

We expect that investments is recovered in two years.

What's my experience with pricing, setup cost, and licensing?

The pricing is fair and the support team is good.

Which other solutions did I evaluate?

We were evaluating Fortinet as well.

What other advice do I have?

Check Point is very reliable and secure.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Nov 6, 2021
Great VPN connection that helps extend infrastructure and is perfect for remote worker access
Pros and Cons
  • "Scalability is great. We have been able to grow as a corporation due in part to this type of solution."
  • "Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."

What is our primary use case?

Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client. 

Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.

How has it helped my organization?

Connection through VPN has helped us with the connection to corporate. This type of connection has been very useful to us since, as infrastructure personnel, we can establish a connection to our corporate to make a connection either RDP or directly to services in order to be able to carry out any work activity or review any report by the operational part in order to speed up response times. We can connect to our network equipment by SSH, RDP, or via the web, however, only when we have this type of secure connection.

What is most valuable?

One of the features that has helped us the most with our solutions has been the P2P connection through an IPsec VPN. It has allowed us to extend our infrastructure and grow with new clients. Previously, we had around 15 corporate clients. Through the COVID-19 pandemic, we have managed to grow and now have around 35 new corporate clients and more than 6 people connected by VPN. This has forced us to increase our infrastructure to be able to support all these connections and to have a stable, reliable, and, above all, scalable solution that can interconnect more clients.

What needs improvement?

We have not migrated to the R81 version and I do not doubt that it will have some improvements compared to the version we use today. 

Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor. This type of integration would undoubtedly give it a better reach and greater market with new security trends top of mind. 

I know that everything is moving to a cloud environment, however, for all those corporates that still do not trust such an environment, it would be favorable to offer a 2MFA service in a solution tested through a blade or in the cloud. 

For how long have I used the solution?

I've used the solution for more than five years.

What do I think about the stability of the solution?

The remote workers were experiencing issues like disconections, no IP avaliables from the DHCP, or unable to connect because the server didnt responde to a ping, however this issue was fix after we instlalled the JHF 125 on each gateway and after the upgrade, everythig has been working OK, but before that Check Point didn´t have a fix for that manner.

What do I think about the scalability of the solution?

Scalability is great. We have been able to grow as a corporation due in part to this type of solution.

How are customer service and support?

They have been with us when we needed help. We don't have any complaints about their level of service.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did use a different solution and we switched due to the fact that Check Point is more secure and has more features for the type of connections we need.

How was the initial setup?

It was a straightforward setup.

What about the implementation team?

The product was integrated with in-house personnel.

What was our ROI?

We've seen about a 40% ROI.

What's my experience with pricing, setup cost, and licensing?

Check Point is an expensive solution, however, it has more features and is more secure than other options.

Which other solutions did I evaluate?

Ae evaluated AnyConnect and Palo Alto.

What other advice do I have?

We would like them to add a 2MFA feature in the future. This is our direct request.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Network Security Engineer at a consumer goods company with 201-500 employees
Real User
Oct 19, 2021
Easy to download, set up, and configure
Pros and Cons
  • "The solution offers high scalability as far as adding more users."
  • "This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity."

What is our primary use case?

With this solution, we can:

1) Securely and privately access our data from anywhere with the Check Point VPN. 

2) Connect securely from any device and any asset.

3) Have 2FA enabled while connecting to the VPN in an official mail. If any person has your VPN credential, he can initiate contact for security codes to connect to the VPN.

4) Integrate our data.

5) View VPN events from the console.

6) Easily install and connect the VPN. 

7) Provide colleagues with secure and seamless remote access to the corporate network.

8) Get a full picture with complete network visibility.

How has it helped my organization?

The product has improved the organization by:

1) Deploying high performance. Check Point's private VPN gateways can secure our colleagues/teams working remotely with dedicated IPs and provides private resource access. It empowers our personnel to connect with relevant access permissions to access corporate resources.

2) Ensure a user of our organization aligns with traffic privacy with one of many tunneling protocols so that all transmitted data is completely encrypted. The level of security provided by Check Point ensures that only authorized connections are established, so if users are connected, they are protected.

What is most valuable?

The solution's most valuable aspects include:

1) Ease of install and ease of use.

2) 2FA Security.

3) Seamless access.

4) Integration with our data.

5) The ability to view VPN events from the console.

6) The ability to manage all our devices from one platform and easily secure and segment their access to resources. 

7) Providing authorized least privileged access for all devices.

8) The ability for our entire global organization to work more securely and to allow us to deploy private and dedicated networks in more than one location.

9) The level of security provided by Check Point. It ensures that only authorized connections are established, so if users are connected, then they are protected.

What needs improvement?

This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity. 

For example, when my internet is not working properly, then the VPN disconnects all of sudden and if I want to connect again, I need to do so with credentials and 2FA. In the next release, if the product could program in a hold time then disconnect the VPN due to the internet's fluctuation, that would be ideal as it would improve the way we can monitor our network visibility.

For how long have I used the solution?

I've been using Check Point Remote access VPN from a Client perspective for eight months.

What do I think about the stability of the solution?

It is perfectly stable as far as the VPN is concerned because when I used the older version(R.77) of checkpoint Remote VPN then that time there was points of stablility concern but after the upgradation checkpoint VPN(R.80) perfectly worked on stability part and now it is stable for windows and MAC OS.

What do I think about the scalability of the solution?

The solution offers high scalability as far as adding more users. I don't see that as being an issue.

We have 330-350 users in our company who are using the Check Point VPN.

How are customer service and support?

Technical support is good and helpful when needed. Whenever I was stuck, I was able to get a solution. This was provided by the Check Point TAC support and services team and they were helpful.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Forticlient VPN also. However, the Forticlient VPN had no visibility on traffic and we required better security for our organization.

How was the initial setup?

The product is easy to download, set up, and configure. The official site documentation is pretty good and helps you to understand the process in order to get the VPN connected.

What about the implementation team?

I implemented it myself both in-house as well as for our client.

What's my experience with pricing, setup cost, and licensing?

In terms of the cost:

1) It's easy to set up and download from the official Check Point site.

2) It's easy to connect the VPN by putting in the gateway address, credentials, and the 2FA. 

3) I don't know about exact pricing as it's not a part of my job. I'm a technical person. Our sales team knows all the pricing and licensing details.

Which other solutions did I evaluate?

I did not really look at other options. My first experience was with Forticlient, however, I wanted more security so I chose the Check Point VPN solution and I'm happy with using it. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Chief Information Security Officer at Abcl
Real User
Top 10
Jun 6, 2021
Supports multifactor authentication and clientless login, but the GUI should be more user-friendly
Pros and Cons
  • "Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live."
  • "The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access."

What is our primary use case?

We use Check Point Remote Access VPN to provide access to our corporate network and resources to remote users in a secure way. Users have access that is limited or defined by the server.

Access is granted for identified devices post-posture validation. 

Access should be provided via VPN using multifactor authentication other than username/credentials. Users are able to connect from anywhere at anytime using both mechanisms (i.e. User VPN client or browser). 

This solution mitigates or minimizes data leakage issues.

It is stable and scalable and requires minimal management and access provisioning.

How has it helped my organization?

This solution has improved our organization by providing access to corporate resources in a secure fashion. It uses complete end-to-end encryption from the end-user machine to the VPN device.

Access policies are created on the firewall for restricting access to resources and applications based on the user profile/policy.

Our security gateway is integrated with Active Directory and access to resources/applications is provided based on the security group created in Active directory.

This product has inbuild/native integration with MFA solutions.  

It does not require any additional hardware in cases where the organization already has the Check Point NGFW. The mobile access blade and remote access VPN can be enabled on the same security gateway. Check Point provides a common dashboard and management console used in conjunction with the NGFW.

Multiple access can be provided using multiple realms, based on the user ID or security group, and access can be provided accordingly. Each realm will have a pool of IP addresses for which access will be provisioned on the firewall.

What is most valuable?

Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live. The only requirement is to purchase an additional license from Check Point, and then enable the mobile access blade. After this, the solution is ready to roll out and provide access based on the configured policy. 

Access is restricted based on user ID, security group, and device type. 

Access is provisioned post-posture policy validation and it offers protection against users connecting to the corporate network from non-corporate devices, which minimizes data leakage possibilities. 

Access is available from browsers or VPN clients using MFA. This is helpful in cases where the machine does not have the client installed or the client is corrupted.

We are able to restrict access based on geo-location and device type. Devices can be Android, iOS, Windows, or Linux.

It provides threat prevention capabilities while uses connect via VPN for Windows devices.

What needs improvement?

Access is provisioned based on a single L3 tunnel being established between the endpoint and the VPN device. If an attacker gains access to this session then all of the tunnel traffic is compromised. It needs to move to next-generation style access, provisioning such as per-app VPN.

The GUI interface for configuring the SSL VPN is not user-friendly and requires expertise. 

Devices are exposed over the internet and it can lead to a security threat.

When a critical patch needs to be applied to the VPN, downtime is required for the entire NGFW. This can impact the business when it has a single security gateway.

This product cannot manage sudden user growth, as each security gateway has limitations in terms of performance and throughput.

The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access. Specifically, modules such as Threat prevention, Access control, and Incident analysis are supported only on Windows and Mac.

What do I think about the stability of the solution?

It's very stable in terms of downtime, although it required updates.

What do I think about the scalability of the solution?

The solution can be easily scaled by adding a security gateway.

How are customer service and technical support?

The Check Point technical support is excellent.

Which solution did I use previously and why did I switch?

We used Aventail SonicWALL as a standalone product. We switched because it was expensive in terms of management and maintenance. As we already had Check Point NGFW, it was easy to enable the VPN on the same device.

How was the initial setup?

Enabling the VPN was simple and straightforward with the purchase of an additional license from the OEM. Once we acquired the license, it involved enabling the module on the security gateway. The solution was ready to go live within 10-15 minutes.

What about the implementation team?

The implementation was completed by our in-house team with the assistance of the OEM.

What's my experience with pricing, setup cost, and licensing?

Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality.

Which other solutions did I evaluate?

We evaluated Pulse and Citrix before choosing this option. 

What other advice do I have?

Traditional VPNs that work on L3 or L4, with a single VPN tunnel, are typically hosted on-premises. As organizations are adopting cloud computing, it makes sense to have a VPN solution hosted on the cloud for better control and security.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1730568 - PeerSpot reviewer
Network and Security Engineer at a security firm with 11-50 employees
Reseller
Oct 20, 2023
A stable tool that provides easy-to-use policies and safe infrastructure for remote access
Pros and Cons
  • "The policies are easy to use."
  • "The product’s architecture is a bit distributed."

What is our primary use case?

We use the solution for our customers. Whenever the users work from home, they connect to the solution and are redirected to their network. It is very simple. They install the client, and the client makes a tunnel to the product. Once they are connected, they can enter into the network.

What is most valuable?

The policies are easy to use. Once we are connected, the entire infrastructure is safe, irrespective of the device we are using. There is no need to worry about safety. It's a secure tunnel that helps us access the network. It is a very useful feature. We can access the internal resources once we are connected to a VPN. We need not be in the office. The solution performs well.

What needs improvement?

The product’s architecture is a bit distributed. It should consolidate the architecture to make everything available on a single dashboard.

For how long have I used the solution?

I have been using the solution for two and a half years.

What do I think about the stability of the solution?

The tool is stable.

What do I think about the scalability of the solution?

The tool is scalable. We may need to opt for higher boxes. We work with enterprise customers.

How are customer service and support?

The technical support is hardly good. The support team must improve its response time. It should also improve follow-ups through email.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with Sophos and Array Networks. Check Point’s stability is better compared to other tools. I have frequently faced disconnection and other issues with other products.

How was the initial setup?

The initial setup is not easy. We need to be skilled in Check Point to install the solution. The time taken for deployment depends upon the number of boxes we install. If we install one or two boxes, one or two weeks is sufficient.

Our customer needed to install more than 100 boxes in every region. It takes months to deploy the product at that scale. We need a team of 20 people to implement the tool for an enterprise. Once the installation is done, maintenance is easy. The product runs smoothly.

What other advice do I have?

I recommend the solution to every vendor with Check Point as a firewall because it has great stability and security. We can terminate our VPN services to the same box if we're already using Check Point VPN. Overall, I rate the product a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. MSP
PeerSpot user
reviewer2114514 - PeerSpot reviewer
Web Developer at Netconomy Software & Consulting GmbH
User
Feb 28, 2023
Compatible across devices, reasonably priced, and secures confidential information
Pros and Cons
  • "It keeps us safe when browsing the internet and when sharing confidential information with our colleagues."
  • "Sometimes the application slows down the computing device, and this affects workflows."

What is our primary use case?

The remote VPN enables us to connect our devices under a controlled network infrastructure. It protects the channels for transferring data and confidential information. 

It connects our managers with remote employees to enhance efficiency in the implementation of projects and tasks. Check Point Remote Access VPN blocks unauthorized access to our computing devices. 

It is easy to install and use this VPN for any new user. It keeps all the teams under the same collaboration and networking channel safe. Information encryption secures end-to-end conversation among teams.

How has it helped my organization?

I have experienced the most benefits while using this product in the organization. 

It keeps us safe when browsing the internet and when sharing confidential information with our colleagues. 

When working on joint projects and tasks this product prevents external cyber attacks from attacking our privacy. 

Teams operating from remote areas can customize the location features and set suitable IP addresses that serve them well. 

The speed and reliability enable us to achieve the set targets and initiate trade-offs.

What is most valuable?

It has a simple user interface that is easy to operate and set up. 

The customer support staff provides 24/7 customer support services that enhance effective service delivery. 

The premium version provides the most advanced services that are always effective. 

The cost of maintenance and privacy policies suits our daily demands. 

It is compatible with most devices and can easily integrate with most applications in the organization. 

There is no apparent IP leak and it connects firmly without disconnecting.

What needs improvement?

This version has comprehensive features that provide reliable services based on the organization's requirements. 

Sometimes the application slows down the computing device, and this affects workflows. 

Most modern VPNs offer more features that are more powerful as compared to the ones set up in this system. 

The focus of the next release should be on the compatibility and speed of this platform so that it can easily compete with other products.

It should be customized to accept more languages and more locations.

For how long have I used the solution?

I've used the solution for 14 months.

What do I think about the stability of the solution?

The operations and stability have been firm and reliable.

What do I think about the scalability of the solution?

This is great and scalable product.

How are customer service and support?

The customer support staff offers great services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with different solutions.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is increased ROI from its reliable performance.

What's my experience with pricing, setup cost, and licensing?

It is cost-effective.

Which other solutions did I evaluate?

I have only had experience with this VPN.

What other advice do I have?

The performance has been good and I recommend it to other business enterprises.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.