This functionality is very practical to be able to connect to the business network from anywhere; the monitoring that can be provided and the granularity in the VPN to provide control to users is really good.
Excellent and functional remote access vpn
Pros and Cons
- "Setup using the manuals was easy."
- "Generally, the license is included with the Check Point gateway licensing, however, in terms of the number of users that can be activated for use, it is generally five users."
What is our primary use case?
How has it helped my organization?
It offers excellent performance to be able to connect our users to business applications outside the company perimeter.
It is easy to use and has an easy-to-use connectivity agent, and can be integrated with MFA to provide an additional layer.
In these times when the priority is telecommuting or working from home, it is essential to provide accessibility to the company safely. Through Check Point it was possible to provide this essential comfort to users who work in this modern format.
What is most valuable?
One of the features that draws a lot of attention is the integration of the remote VPN application in our Check Point gateway and management server, where it is easy to use.
The granular control and access under the Check Point policies made applying a zero trust policy much easier, providing greater security.
The integration with MFA through a configuration and integration with Azure is quite good, providing security to the user's identity. It is a very important feature where everything is tried to shield against modern vulnerabilities.
What needs improvement?
The license is included with gw licensing, however, in terms of the number of users that can be activated for use.
In our case, we quote additional licensing and it is quite expensive for remote VPN, other manufacturers are not so expensive.
The support provided is slow, in addition to the fact that the service hours are contrary to ours, which generates slower problem solving, I think it is important to improve this area.
Buyer's Guide
Check Point Remote Access VPN
March 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,933 professionals have used our research since 2012.
For how long have I used the solution?
This is a not-so-new tool that can be used in our gateways and management products. We have used these VPNs since we started using our environments with this manufacturer.
Which solution did I use previously and why did I switch?
On a personal level, I had previously used Cisco and Azure VPN, among others, however, the control generated with Check Point is not the same. It is much better.
What's my experience with pricing, setup cost, and licensing?
It is essential to validate how many remote VPNs are required, check costs, and see if they are within the scope of the company.
Which other solutions did I evaluate?
We validated the scope against other manufacturers and were satisfied with the security features provided by Check Point.
What other advice do I have?
On a technical level, the tool is very good, and safe, in addition to providing a lot of control.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Planning Analyst at Ovato
A powerful VPN that is secure and reliable
Pros and Cons
- "The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked."
- "The cost of maintenance is high compared to most products in the market."
What is our primary use case?
The Remote Access VPN provides security to all computing devices across the organization. I can securely log in from a remote area and access the organization's data without physical appearance.
It is easy to collaborate with colleagues in the same networking area from different locations.
When interacting with our customers, I can easily change my IP address to correspond with a client's.
This platform has saved the company a lot of resources that are being used to set up remote offices.
How has it helped my organization?
This application provides total data security across the enterprise networking infrastructure. Remote interactions with my colleagues are encrypted to enhance safety and prevent threats.
The organization of virtual events is always secure due to efficient security measures deployed in the organization.
A powerful VPN has lowered the cost of team engagements and interactions in the field.
The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked.
What is most valuable?
The set of security features that prevent data leakages has saved resources.
The customer support team responds faster when contacted to provide solutions for technical failures.
The application does not affect the storage and functionalities of the operating system.
The UI enables new users to understand the working criteria of the features easily.
The performance of this tool does not affect the performance of other applications when deployed on mobile or desktop devices.
All the set features have a great impact on protection from data leakages and have saved our organization from threats.
What needs improvement?
Sometimes it may mislead the user based on the requested location due to poor networking.
Most features have capable performance that responds quickly to user requests.
The cost of maintenance is high compared to most products in the market.
Integrations with some applications are difficult due to poor compatibility tools. The development team should focus more on updates and integration features.
I am impressed by the current performance despite the few challenges. The overall performance has been excellent, and I recommend it to others
For how long have I used the solution?
I've used the solution for six months.
What do I think about the stability of the solution?
The product performance is efficient.
What do I think about the scalability of the solution?
The performance is excellent.
How are customer service and support?
The customer support staff is reliable.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have no experience with any similar solution.
How was the initial setup?
The setup was straightforward.
What about the implementation team?
Implementation was handled in-house.
What was our ROI?
We have gained positive ROI since we deployed it.
What's my experience with pricing, setup cost, and licensing?
The setup process is not complex.
Which other solutions did I evaluate?
I evaluated other VPNs, however, in those cases, the performance was not stable.
What other advice do I have?
This is the best VPN I have worked with so far.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Remote Access VPN
March 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,933 professionals have used our research since 2012.
Information Technology Admin at a wellness & fitness company with 51-200 employees
The admin features make the management smoother
Pros and Cons
- "I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience."
- "The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection."
What is most valuable?
I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience.
What needs improvement?
We started with 50 users, but our numbers are increasing. Now it's difficult for us to maintain a steady internet connection and remote access, so we want to upgrade. We are considering a switch to FortiGate. I think they may have better service than Check Point offers.
Scalability is where we're having problems now. Generally, Check Point has been working fine, but we need something that can accommodate many users and provide a steadier internet connection. Our remote users need to access the VPN without any issues. Of course, this could also have something to do with our internet connection at the organization.
We've been using Check Point to manage sites we need to block. It gives us the option to totally disable things, but it does not let the administrator create exceptions to allow specific users to access certain websites. Check Point could enable the administrator to permit users to access particular sites. I think the VPN we're using may have exceeded its lifespan. For example, if you check Instagram on Check Point, you might not even see it showing up, and it's difficult to restrict access to specific applications.
For how long have I used the solution?
We started using Remote Access VPN sometime in the past five years.
What do I think about the scalability of the solution?
The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection.
It fills the logs and cuts off our connection when it gets full. It stops working. It's time-consuming to reset the device and reload the backups. It takes us about two hours because we would need to reconfigure those routes and integrate them with the IP addresses we have set up.
How was the initial setup?
The setup was straightforward. Everything was populated on Check Point, so it was easy to select what we wouldn't allow. We deployed on-premise because we have the space and infrastructure to support it.
The deployment didn't take long. Two IT people are responsible for the deployment and maintenance. The online documentation will walk you through the process. When you do a manual reset by pressing the button, it guides you through the setup process. You only need to follow the steps.
After that, we import our backup file, and it populates. Next, we run the updates and check we forgot to configure anything else. Some backups are older and might not align with what we have running on the ground.
What was our ROI?
I haven't seen an ROI.
What's my experience with pricing, setup cost, and licensing?
The cost varies. I believe the price ranges roughly from about 3000 to 4,000 ZWD. I don't think it gets any lower than that. The initial cost is high because you need to buy the hardware, and you incur some setup costs, but the expense drops in the long run.
Which other solutions did I evaluate?
So far, I have not tried any other solutions. I'm doing the research now. I'm still shopping around, trying to understand what's on the market before deciding.
What other advice do I have?
I rate Check Point Remote Access VPN eight out of 10. Aside from our current performance issues, it was smooth and flawless. I'm still shopping around. I was content with Check Point, but I want to see what's out there. I'm interested in knowing more about other available solutions. My primary goal is to avoid going through this process again two years from now. I'm hoping the next product will be a long-term solution, and it will be a while before we consider upgrading to something different.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Administrative Assistant at Tecapro
Great for access, secure, and is easy to use
Pros and Cons
- "One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities."
- "I would like this service to be easier to manage when you integrate it with third parties."
What is our primary use case?
We came to need a solution that would allow us to connect quickly and easily from our homes or from anywhere, and it was at this point that we integrated and enabled the Check Point Remote Access VPN. With it, our employees could log in from anywhere at any time.
This solution allowed them to have the same experience that they had in the office, and they could access all the resources that were necessary for their work.
This solution helped us mainly with the shift to remote work. Before the pandemic, everyone worked from the office. Today, more employees have become digital nomads.
How has it helped my organization?
In terms of infrastructure, we can say that we have benefited since employees are happier being able to work from home. They make better use of their time and have become more productive.
In the case of the organization, the impact is in being able to have to rent fewer square meters. This helps with annual returns since those operating costs have been reduced.
Everyone has told me that it is simple and easy to use.
What is most valuable?
One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities. We have SSO (Single Sign-On). It is a 'unified' or 'single authentication' which can be integrated to improve security in startup services. This is an advantage due to the fact that you can use the integrated services or the third-party services that you already have, and you will not incur more costs.
What needs improvement?
I would like this service to be easier to manage when you integrate it with third parties.
Although it is complex to configure, I cannot complain that it is complete and it is worth being able to use and integrate it. However, any administrator would welcome any changes that made configuration simpler.
We would like the ability to perform remote access with the VPN in the future with any type of device. Lately, Android applications tend to have more errors. I hope that this will be solved in the future.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd
Has great security features, including zero-day protection, malware protection, and anti-phishing
Pros and Cons
- "The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera."
- "There was complexity in the initial setup."
What is our primary use case?
The solution is primarily used for secure access for remote users. It's deployed as a SaaS over the cloud.
What is most valuable?
The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera.
What needs improvement?
If you are new to deploying the solution, the initial setup might be difficult the first time around. I had trouble setting the policies and then resetting the device.
For how long have I used the solution?
I joined my company eight or nine months ago and have been dealing with the solution since then.
What do I think about the stability of the solution?
I don't have much information on the stability aspect of the product. I haven't spoken to customers about their experience.
What do I think about the scalability of the solution?
I haven't discussed scalability with customers to get their take on how easy it is.
How are customer service and support?
We haven't referred to the technical support of Check Point just yet. We did have a replacement engineer assist us in deployment, and they handled it quite well.
How would you rate customer service and support?
Positive
How was the initial setup?
There was complexity in the initial setup. With one client, once we installed it and then tried to set the policies, the firewall was not responding very well. I was doing it for the first time, so we were unable to do it. The customer was not pleased with that, so we had to send another engineer to deploy that device. That's not to say it's overly hard - it was just my first attempt at an installation.
We had three engineers handling the initial setup. We deployed it over two days.
I'm hoping that the next time I'm deploying it, it should be done perfectly, without any support from any other engineer.
What about the implementation team?
We do the implementation for our clients.
What's my experience with pricing, setup cost, and licensing?
I'm not aware of the exact licensing costs associated with the product.
What other advice do I have?
We are in the business of selling firewalls. We're resellers and Check Point partners.
I personally have sold just the Check Point solution to only one customer. We are also selling data storage solutions, data backup, and cyber security solutions.
We are dealing with the latest version of the solution.
The solution is available both on-premises and in the cloud.
I'd rate the solution nine out of ten. I'd recommend it to other users and companies.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Sales Engineer at Tempest Security Intelligence
Beneficial multiple factor authentication, lightweight on resources, and simple deployment
Pros and Cons
- "The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
- "Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication."
What is our primary use case?
Check Point Remote Access VPN is used to allow our employees to use the corporate resources or remote access to the corporation and lightweight on resources.
What is most valuable?
The most important feature of Check Point Remote Access VPN is the multiple factor authentication.
What needs improvement?
Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication.
For how long have I used the solution?
I have been using Check Point Remote Access VPN for approximately three years.
What do I think about the scalability of the solution?
We have approximately 1,000 users using this solution. We do not have plans to increase usage at this time.
How was the initial setup?
The initial setup of Check Point Remote Access VPN is simple. The deployment took us approximately two weeks.
What's my experience with pricing, setup cost, and licensing?
Check Point Remote Access VPN is not expensive and the cost is annual.
What other advice do I have?
I rate Check Point Remote Access VPN a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Cloud Engineer at ITQS
Good security, protects identity, and allows full access even in different regions
Pros and Cons
- "The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
- "The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately."
What is our primary use case?
Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data.
Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.
How has it helped my organization?
The solution is giving us security when it comes to sharing our data safely through the private and secure tunnel that is created when creating the VPN. The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet. Online hackers won't be able to use your real IP address to discover your personal data, and government surveillance agencies and ISPs won't be able to monitor what you do online by snooping on your traffic.
In addition to helping you avoid government surveillance, it also helps keep your privacy safe from advertisers.
What is most valuable?
In terms of the way they ensure traffic, an example is when we use Wi-Fi in public areas.
WiFi is everywhere nowadays and it is extremely convenient to use, especially if you have a tight mobile data plan. The only problem with free WiFi is that it's often unsecured, which means you're putting your personal data at risk every time you use it. After all, cybercriminals can find out a lot about you, which can lead to them stealing your:
- Credit card details
- Bank account details
- Email login credentials
However, if you use a VPN, you won't have to worry about those dangers. A VPN uses encryption to protect your online communications, making sure no one can monitor it. Basically, if a hacker tried to see your connection traffic, they would just see nonsense.
What needs improvement?
That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.
For how long have I used the solution?
I've used the solution for about 2 years.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Manager at M.Tech
Flexible authentification, good integration, and helpful compliance capabilities
Pros and Cons
- "Setting policies allow, block, and limit users' access."
- "Compliance Check on Check Point should be improved by having more configurable conditions to support multi-platforms and adding more granularity."
What is our primary use case?
Check Point Remote Access VPN allows organization users to work remotely. Especially in the pandemic period, work-from-home demand has been higher than ever.
I have a remarkable case about the solution. That is for a bank. They want to have remote access VPNs that can provide connections for internal users who work remotely, partners who have restricted connections to the bank environment and ATM machines that connect to core banking applications. All VPNs acted in the same internet connections but still ensure these three VPNs were separated from each other. For the requirements, deploying the VPN in VSX appliances helped to solve issues. I created three virtual instances: one for corporate users, one for partners and one for ATM machines.
Applying security policies for three instances is different. Corporate users must pass two-factor authentication layers and then have access to common corporate services (like email, and chat) and the right business applications depending on their working role, and their department. Partners after authenticating successfully only have limited access to the right place that they are allowed while being unable to connect to other places.
ATM machines that act 24/7 need to have continuous connections, thus, they must authenticate using a certificate and their VPN clients must be configured to re-authenticate automatically after a timeout.
How has it helped my organization?
Check Point Remote Access VPN supports almost all common devices, from Windows to macOS, and from Android to iOS. Connection methods are flexible, including browsers and VPN clients.
With such an approach, the solution can solve every remote working problem from anywhere, on any device while maintaining security features. The solution allows us to integrate with external systems like directory servers, email servers, and RADIUS servers for using directory users (a unified user instead must remember many usernames and passwords), adding multi-factor authentication via an OTP certificate. VPN users will have controlled access based on who they are and where they are by security policies.
What is most valuable?
The solution offers flexible authentication methods to control access by policies and compliance.
Check Point can integrate with external systems and third-party solutions to provide multi-layer authentications. This helps secure the user accounts from leakage of passwords and also protects corporate from unauthorized access damage risks.
Security policies help to convert access regulations to policy rule configurations after authenticating. Setting policies allow, block, and limit users' access.
With the compliance feature, Check Point can define what conditions user machines should have to authenticate the VPN. This feature helps to add more security to the network.
What needs improvement?
Endpoint Security on Demand, or Compliance Check is a good feature. It allows the creation of compliance policies and adds more security to the network. Machines will be scanned once they connect to VPN to make sure all of them are compliant. Conditions to configure compliance checks are Windows security (hotfixes, patches), Anti-Spyware, Anti-Virus software, personal firewall, or Custom (application, files, registry). These are not enough in a complicated environment. Almost of them are supported for Windows machines, however, are just limited conditions for non-Windows. In fact, using mobile devices on Android, iOS, macOS, and Linux is very popular. Compliance Check on Check Point should be improved by having more configurable conditions to support multi-platforms and adding more granularity.
Besides compliance scanning sometimes causes consumes machine resources.
I also suggest scanning operations will consume fewer resources and increase speed time.
For how long have I used the solution?
I've been using the solution for more than five years.
What do I think about the stability of the solution?
As mentioned in my use case, the solution is running for thousands of corporate users, partner users, and ATM machines. The performance is very impressive.
What do I think about the scalability of the solution?
With Check Point VSX, the virtual instance extension is just an additional license, thus, it's very easy to add VS for other purposes. Besides Check Point also developed Maestro technology to allow hyperscale, increase throughput, and maximize capacity.
How are customer service and support?
The Check Point Support Team is very professional and has technical expertise. The team is online 24/7 to make sure their customers always be supported. Response time to the customer is quick enough when they provide a solution to fix the issues or when they need some time to investigate or when they need some time to investigate they stay up to date.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I had used Fortinet Remote Access VPN before. At that time, other security features like Firewall, IPS, Application Control, and URL Filtering had been added to the same box running Remote Access VPN. The Fortinet appliance was overloaded all the time - although specifications in the datasheet could be OK. After changing to Check Point (using Remote Access VPN with other security features), the performance was amazing. CPU and memory usages were always at an average level.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Popular Comparisons
Microsoft Intune
Prisma Access by Palo Alto Networks
Fortinet FortiClient
Workspace ONE UEM
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
Claroty Platform
Microsoft Remote Desktop Services
OpenVPN Access Server
Check Point Harmony SASE (formerly Perimeter 81)
Cisco Secure Client (including AnyConnect)
F5 BIG-IP Access Policy Manager (APM)
Ivanti Connect Secure
Microsoft Azure VPN Gateway
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices

















