We needed to grow a little more at a cloud level, which means that we have had more places in which we host information, and needed to protect it. We needed to allow users to have access from the different branches in the cloud to our main branch and to access remotely. As a result of these needs, we have been looking for solutions that allow us to have quick and efficient access no matter which branch we are going to access, and to have access allowed quickly and easily as if users were inside the perimeter area of our organization.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at a computer retailer with 501-1,000 employees
Good integration, great for remote access, and centralizes users effectively
Pros and Cons
- "We can integrate remote access to our branches through Check Point services."
- "We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
What is our primary use case?
How has it helped my organization?
Currently, Check Point is an ally that we have used within our organization to protect the perimeter area, the equipment, and other technologies. We have complete protection in one technology that we are using so that our users with greater frequency can access the data of our organization regardless of where they are. With this, they can have quick, simple access as if they were within the perimeter area. This has given us greater protection when it comes to having protected and verified access under user identity.
What is most valuable?
We can integrate remote access to our branches through Check Point services; however, those services come with a centralized identity, a domain identity, which does not work for the different logins. It only works for the login through the remote connection application. The user profile is centralized, verified, and filtered by the tool, thus being one of the characteristics that are very important to me since it shows any activity that the user is going to carry out.
What needs improvement?
We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution. This would allow us to have a tool that it is not only remote access for mobile devices but a remote access solution for virtual teams, including mobile devices such as cell phones, tablets, and other types of devices in IoT areas such as doors, houses, and medical equipment.
Buyer's Guide
Check Point Remote Access VPN
February 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
For how long have I used the solution?
I've been using the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Administrador Junior Level 1 at a tech company with 51-200 employees
Easy to install, and makes it quick and easy to connect
Pros and Cons
- "Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
- "It would be good to have Remote Access VPN solutions for Check Point edge services."
What is our primary use case?
Currently, as we are a company that constantly imports and exports solutions. We have needed to give our salespeople access to our executives since that part of retail is constantly on the move inside and outside our organization. This makes it somewhat necessary to figure out how everyone can access data since the information is being used and managed every day inside and outside of our institution. We have come to use the Check Point security services so that users can have the same access as we have inside when they are outside the organization.
How has it helped my organization?
The capacity that Check Point Remote Access VPN offers is one of the best. It has made it easier for us and the team to have great mobility inside and outside the organization. If anyone must consult the services internally, they can connect quickly and simply. The agent that allows the connection is very fast to install and very fast to configure. It has streamlined a lot of the complexity that we had faced before.
What is most valuable?
Among its most valuable features is how it quickly and easily connects everyone to the VPN service. It quickly installs an agent on the computers, so that our users do not have to worry about their mobile devices being configured. It is easy to install and can run and install as a client on devices whether the user has Mac or Windows.
What needs improvement?
In the future, if this service could be installed in a faster and simpler way (rather than having it directly connected to the appliances), that would be ideal. Today, many of the solutions are not what was needed when we had perimeter security. It would be good to have Remote Access VPN solutions for Check Point edge services.
For how long have I used the solution?
We have been using the solution for three months.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Remote Access VPN
February 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
Consultant at a tech services company with 10,001+ employees
Secure remote access integration and hotspot access with a multi-level authentication support system
Pros and Cons
- "The secure hotspot access for enabling good network connectivity is great."
- "Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners."
What is our primary use case?
Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions to business users while they are working remotely and traveling for business purposes. Our organization involves over 70% of business travel to generate revenue, and it becomes really troublesome to secure the IT devices and cloud system at such traveling times.
Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.
How has it helped my organization?
Check Point Remote Access VPN provides multiple factor authentication layers, and due to that, all the data transmission is completely scanned for any malware or malicious cyber threats. It is integrated with our various IT and cloud systems and performs its security scanning 24/7 without any glitches or trouble.
Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.
They enable a secure hotspot registration process for enabling all-around support of IT systems while operating remotely without any hassle.
What is most valuable?
The secure hotspot access for enabling good network connectivity is great.
Multi-layer scanning of IT systems across various critical stages for detection of threats and malicious threats has been useful.
Provisioning VPN Client and Auto Connect management system for free flow of information without any data mismanagement.
The secure remote access integration is available for both android and IOS devices and systems is helpful.
The multi-factor authentication support system is a phenomenal feature for providing all-around authentication support to for secure IT enablement.
What needs improvement?
We are still in the learning phase as of now, and there seem to be more and more feature upgrades in the standard version of the application. They're providing updated features in the application with complete compliance assurance - which is really awesome - and we need specific customizations to make it a perfect fit for our business environment. This is a new and emerging area and requires a lot of customization and flexible features to suit the business requirements.
Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners.
For how long have I used the solution?
I've used the solution for over six months now.
What do I think about the stability of the solution?
The solution is quite stable.
What do I think about the scalability of the solution?
It is an absolutely scalable solution.
How are customer service and support?
Technical support has been so far so good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a different solution earlier.
How was the initial setup?
The setup is effortless and smooth.
What about the implementation team?
We installed the solution through the vendor ONLY.
What was our ROI?
We've seen an ROI of over 75%.
What's my experience with pricing, setup cost, and licensing?
I recommend all businesses to go for Check Point Remote Access VPN. It's one of the best of its kind in the market today.
It has enormous features for ensuring security management solutions for remote workforce coupled with compliance assurance in the businesses.
It's one of the highly cost-effective solutions which leads to boosting business performance, and also renewal is smooth without any hassle. The licensing is not pricy and is affordable by organizations.
Which other solutions did I evaluate?
The business and IT team did a lot of brainstorming sessions on this, and it went of really well in evaluating various available products in the market with their offerings.
We evaluated McAfee, Nord, and others
What other advice do I have?
I'd advise others to try the solution today itself and experience the utilities on their own. I am sure, they will love the product offerings and utilities to the greatest extent possible
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a maritime company with 501-1,000 employees
Excellent support with great multi-factor authentication and compliance checks
Pros and Cons
- "It offers a simple configuration and setup."
- "It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices."
What is our primary use case?
We primarily use the solution for work from home. Our main goal is to provide users with the ability to access their workstation from anywhere in the world.
We provided remote access to more than 500 users during the pandemic. Check Point Remote Access VPN has worked smoothly as our appliance is capable of supporting 1000+ users.
We deployed a VPN client-based solution with multi-factor authentication. The compliance check feature is useful.
It is compatible with several operating systems, and it has great protection against malware.
It offers a simple configuration and setup.
How has it helped my organization?
We developed work-from-home policies for our organization during the pandemic due to the rise in COVID cases. As network security engineers, it's challenging for us to manage users' personal laptops and computers which are not up to date (OS, Antivirus ..etc). However, when it comes to the Check Point VPN solution, we overcame all the challenges and successfully implemented our infrastructure. Logs are helping us to monitor each user's activity. We can also isolate user laptops or PCs from the internet when its gets connected to our network.
What is most valuable?
The remote access blade is built in on the firewall, so it is easy to activate through the Smart Console.
Only the VPN client supports only the Windows and Apple Mac operating systems, which also support iOS and Android mobile platforms. The Check Point development team deserves praise for a flawless experience.
Multi-factor authentication and compliance checks help us to ensure maximum security.
VPN logs give us complete visibility and track unusual activities.
The VPN client user interface is simple and perfect.
The VPN client software is lightweight.
What needs improvement?
It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices.
The configuration of a VPN requires a distinct VPN Tab. Once the VPN blade has been activated, after activating VPN blade, we need to make some configurations in the gateway option settings and others in the VPN communities section. It would be preferable if these two things came together in one place.
Apart from this, it operates flawlessly. To improve our IT Services, we poll our users. The majority of people say how excellent the remote access VPN service is. Additionally, they stated that once connected to a VPN service, they never experience connectivity problems.
For how long have I used the solution?
I've used the solution for more than two years.
How are customer service and support?
The product offers excellent customer service and support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used a different solution that did not satisfy us in terms of security. As a result, we decided to deploy Check Point for enhanced security.
Before migrating to the Check Point firewall, we conducted market research and solicited feedback from my contacts who are already Check Point NGFW customers. We decided to use Check Point.
How was the initial setup?
The VPN Setup and initial configuration are tricky and not straightforward. For example, you need to:
1. Do some configuration in the gateway option, then:
2. VPN Communities
It would be preferable if step 1 and step 2 were available in one place.
3- Lastly, you must apply the firewall policy
What about the implementation team?
We implemented this solution ourselves.
What was our ROI?
We now have a reliable VPN solution to offer our staff, which is a significant return on investment.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud computing at a security firm with 5,001-10,000 employees
Easy to activate with full visibility and network control
Pros and Cons
- "The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out."
- "In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system."
What is our primary use case?
This product provides a secure connection to the corporate network from anywhere and safe traffic of data regardless of the possible threats in the WAN it's connected to. It also provides secure access to company apps and controls the traffic depending on each company's policies. Through it, we create layers that control or limit data traffic for specific users. I've been trained in the product and know it's one of the most effective in the business and admit to facilitating my customers to get it from our Check Point partners.
How has it helped my organization?
A clear example of the positive impact this license has had in my organization was back in 2020. The software was in use since before the pandemic hit so our personnel was familiarized with the product; the transition was smooth and secure from the office to work from home. Access policies were run through the active directory applied on all kinds of end points, from cell phones, tablets, laptops, desktops - you name it. Access could be restricted by location and using network security assessments that prevented connecting to corrupted networks.
What is most valuable?
We already use the Check Point Firewall and those are the ones the organization's employees connect to for the remote VPN and it made it really easy to activate this function as new hardware was not needed.
The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out. Be it if our users are at home or in the office the same policy applies to them allowing us to view the traffic within our organization.
What needs improvement?
In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system.
Also, this product has limitations with headcount addition, as there are performance limitations in each security gateway the software has.
The ability to allow split-tunneling while still following our corporate policy should be offered.
Some things like the compliance aspect of the VPN Client can be updated so the product stays up to speed with the ever-changing environment in software security.
For how long have I used the solution?
For the past eight years, I've been working at a company where I was first in software security sales for three years and then five years in hardware sales. Since I have a background in security, I've been part of training and sales where Check Point products are involved. I have tested most products Check Point offers due to our partnership.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud Engineer at a tech services company with 51-200 employees
Good security, protects identity, and allows full access even in different regions
Pros and Cons
- "The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
- "The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately."
What is our primary use case?
Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data.
Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.
How has it helped my organization?
The solution is giving us security when it comes to sharing our data safely through the private and secure tunnel that is created when creating the VPN. The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet. Online hackers won't be able to use your real IP address to discover your personal data, and government surveillance agencies and ISPs won't be able to monitor what you do online by snooping on your traffic.
In addition to helping you avoid government surveillance, it also helps keep your privacy safe from advertisers.
What is most valuable?
In terms of the way they ensure traffic, an example is when we use Wi-Fi in public areas.
WiFi is everywhere nowadays and it is extremely convenient to use, especially if you have a tight mobile data plan. The only problem with free WiFi is that it's often unsecured, which means you're putting your personal data at risk every time you use it. After all, cybercriminals can find out a lot about you, which can lead to them stealing your:
- Credit card details
- Bank account details
- Email login credentials
However, if you use a VPN, you won't have to worry about those dangers. A VPN uses encryption to protect your online communications, making sure no one can monitor it. Basically, if a hacker tried to see your connection traffic, they would just see nonsense.
What needs improvement?
That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.
For how long have I used the solution?
I've used the solution for about 2 years.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Especialista Certificado en Administración de Servicios de Tecnología de la Información at a consultancy with 11-50 employees
A flexible gateway with good security and helpful technical support
Pros and Cons
- "We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway."
- "In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."
What is our primary use case?
Since SARS-COV2, most users went to work from their home office, so we needed to have an robust, secure, and stable VPN connection. We implemented Check Point VPN and we have had no problems with it. We are almost 50 users working from home securely. Also, the access rules based on VLANs have helped many users get access depending on which connection they have. For example, some users with VPN connections can only access some specific servers and ports, however, when they are on an internal LAN, they have access to the entire network.
How has it helped my organization?
We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway.
I'm the IT manager for the company, and my work has been improved due to the fact that, in conjunction with VPN, we implemented the Endpoint Security client so we can manage our client's computers even if they are not physically in the office. When we need to remove some users from a VPN connection we just need to lock the account and use the assets console to disable the feature from the client's computer.
What is most valuable?
The combination of the user accounts for the VPN with the access rules provided by the security gateway gives you more control and specificity about who has access to what. For external users, we can offer a solution based on the internet needs and we are able to share information on a secure channel. We can specifically point to the desired resources in the organization without the need to install any additional software on external client machines.
What needs improvement?
It needs to improve the capability of the Secure browser VPN connections. Some in-house applications didn't work due to the use of JScript and the backend and front end technology for the applications. In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers.
For how long have I used the solution?
I've used the solution for over two years.
What do I think about the stability of the solution?
It's very stable, however, I recommend some scheduled restarts for cleaning connections and processes.
What do I think about the scalability of the solution?
It is very easy to manage the solution and also the integration.
How are customer service and support?
I have had a good experience with the support tickets that I have dealt with.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previous to Check Point, we didn't have any gateway security.
How was the initial setup?
The initial setup was a little complex as it was the first time working with Check Point.
What about the implementation team?
The implementation was handled by an in-house team.
What was our ROI?
We expect that investments is recovered in two years.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair and the support team is good.
Which other solutions did I evaluate?
We were evaluating Fortinet as well.
What other advice do I have?
Check Point is very reliable and secure.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
Great VPN connection that helps extend infrastructure and is perfect for remote worker access
Pros and Cons
- "Scalability is great. We have been able to grow as a corporation due in part to this type of solution."
- "Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."
What is our primary use case?
Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client.
Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.
How has it helped my organization?
Connection through VPN has helped us with the connection to corporate. This type of connection has been very useful to us since, as infrastructure personnel, we can establish a connection to our corporate to make a connection either RDP or directly to services in order to be able to carry out any work activity or review any report by the operational part in order to speed up response times. We can connect to our network equipment by SSH, RDP, or via the web, however, only when we have this type of secure connection.
What is most valuable?
One of the features that has helped us the most with our solutions has been the P2P connection through an IPsec VPN. It has allowed us to extend our infrastructure and grow with new clients. Previously, we had around 15 corporate clients. Through the COVID-19 pandemic, we have managed to grow and now have around 35 new corporate clients and more than 6 people connected by VPN. This has forced us to increase our infrastructure to be able to support all these connections and to have a stable, reliable, and, above all, scalable solution that can interconnect more clients.
What needs improvement?
We have not migrated to the R81 version and I do not doubt that it will have some improvements compared to the version we use today.
Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor. This type of integration would undoubtedly give it a better reach and greater market with new security trends top of mind.
I know that everything is moving to a cloud environment, however, for all those corporates that still do not trust such an environment, it would be favorable to offer a 2MFA service in a solution tested through a blade or in the cloud.
For how long have I used the solution?
I've used the solution for more than five years.
What do I think about the stability of the solution?
The remote workers were experiencing issues like disconections, no IP avaliables from the DHCP, or unable to connect because the server didnt responde to a ping, however this issue was fix after we instlalled the JHF 125 on each gateway and after the upgrade, everythig has been working OK, but before that Check Point didn´t have a fix for that manner.
What do I think about the scalability of the solution?
Scalability is great. We have been able to grow as a corporation due in part to this type of solution.
How are customer service and support?
They have been with us when we needed help. We don't have any complaints about their level of service.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did use a different solution and we switched due to the fact that Check Point is more secure and has more features for the type of connections we need.
How was the initial setup?
It was a straightforward setup.
What about the implementation team?
The product was integrated with in-house personnel.
What was our ROI?
We've seen about a 40% ROI.
What's my experience with pricing, setup cost, and licensing?
Check Point is an expensive solution, however, it has more features and is more secure than other options.
Which other solutions did I evaluate?
Ae evaluated AnyConnect and Palo Alto.
What other advice do I have?
We would like them to add a 2MFA feature in the future. This is our direct request.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2026
Popular Comparisons
Microsoft Intune
Prisma Access by Palo Alto Networks
Fortinet FortiClient
Workspace ONE UEM
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
Microsoft Remote Desktop Services
OpenVPN Access Server
Claroty Platform
TeamViewer Business
Check Point Harmony SASE (formerly Perimeter 81)
Cisco Secure Client (including AnyConnect)
Ivanti Connect Secure
F5 BIG-IP Access Policy Manager (APM)
Microsoft Azure VPN Gateway
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices



















