Try our new research platform with insights from 80,000+ expert users

BeyondTrust Remote Support vs Check Point Remote Access VPN comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 6, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Intune
Sponsored
Ranking in Remote Access
1st
Average Rating
8.2
Reviews Sentiment
7.3
Number of Reviews
265
Ranking in other categories
Configuration Management (2nd), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
BeyondTrust Remote Support
Ranking in Remote Access
14th
Average Rating
9.0
Reviews Sentiment
6.9
Number of Reviews
34
Ranking in other categories
Privileged Access Management (PAM) (24th)
Check Point Remote Access VPN
Ranking in Remote Access
6th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
71
Ranking in other categories
Enterprise Infrastructure VPN (6th)
 

Mindshare comparison

As of May 2025, in the Remote Access category, the mindshare of Microsoft Intune is 9.4%, down from 11.4% compared to the previous year. The mindshare of BeyondTrust Remote Support is 3.0%, up from 2.5% compared to the previous year. The mindshare of Check Point Remote Access VPN is 1.8%, down from 1.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Remote Access
 

Featured Reviews

Mike Sanlon - PeerSpot reviewer
Provides great visibility, helps consolidate our endpoint devices, and our vendors
Microsoft Intune has played a crucial role in enabling remote work for our facilities under our BYOD policy. It has been essential for our success. Consolidating all our endpoint security management tools into a single platform significantly improves our IT and security operations. This streamlined approach provides us with the advantage of using only one reporting stack, and it yields synergies that surpass the capabilities of individual solutions from separate vendors. Integrating Intune with other Microsoft services has streamlined authentication through single sign-on. We're now transitioning to passwordless authentication for enhanced security and convenience within our unified environment. Last week, for example, someone traveling to China had their laptop stolen. Fortunately, thanks to Intune, we were able to remotely wipe the device, protecting their data. The incident reporting and analytics tools enable us to monitor our devices' compliance status near-continuously. As licensed customs brokers subject to Department of Homeland Security inspections, this allows us to generate reports quickly and efficiently, reducing inspection time from thirty minutes to three to four minutes. Intune gives us full visibility into our devices and IT control across all platforms. This has significantly streamlined our management process. Previously, two people in our ten-person department spent their entire time monitoring platforms and fixing issues. Now, only one person devotes 75 percent of their time to these tasks. This means we're accomplishing more with fewer people and less time overall. It's great, but the issue with any platform like it is the delay between deploying something and it rolling out remotely. However, it's probably the best option available in terms of keeping us informed about what's happening outside our server room or hosting environment. Microsoft Intune has been instrumental in securing our hybrid work environment and protecting data on company-owned devices (BYOD). Before Intune, if someone lost their phone, wiping it meant erasing all their personal data - photos, documents, everything. Today, with Intune, we can selectively remove only our applications and data. This allows users to recover a lost phone and restore their personal information. Intune empowers us to be more proactive, eliminating the worry of accidentally wiping a misplaced device. Microsoft Security Signals has become an invaluable addition because it provides centralized reporting capabilities. This one-pane-of-glass view empowers us to easily communicate our security posture internally to management and externally to regulatory agencies and auditors. I'm impressed with the Intune endpoint privilege management feature. It's allowed us to reduce even the admin team's permissions significantly. Now, they typically lack access to most things, but the system elevates their privileges just in time for them to complete specific tasks and then demotes them again afterward. This least-privilege approach has been fantastic, and the built-in integration across the entire Microsoft stack is a major advantage. It saves us the hassle of purchasing and integrating a separate solution – it's simply there and works seamlessly. Implementing least privilege access through Endpoint Privilege Management has significantly improved our organization's attack surface. For example, our Microsoft Secure Score was around 60 percent before adopting the solution, and it's now up to 98 percent. This reduction in the attack surface has also enabled us to implement various remediation measures and establish context-based security. For instance, even if users enter the correct password and complete two-factor authentication, we can require additional authentication if they log in from an unfamiliar location, such as a new country or state. This multi-layered approach provides us with an enhanced sense of security. Intune has helped reduce the risk of security breaches in our organization. We had another deployment solution for Apple iOS and Mac devices. Additionally, we also managed a few Linux boxes with an unsupported management architecture. We were able to migrate all of those devices to Intune. Intune has helped consolidate vendors.
Rich Longo - PeerSpot reviewer
A robust, secure, and complete solution for quickly providing support and monitoring what's going on
It is pricey. It would be nice if it weren't so expensive because then you could afford more licenses and have more people involved, but I get it. They do have something that's unique compared to some of their competitors out on the market. It is a very robust and safe tool. If the price could come down, that'd be great. In terms of features, it is a great tool. I don't see any area for improvement. It pretty much provides all the features that you need. I can't think of anything additional. It has everything that you could possibly want.
Ozan Durmus - PeerSpot reviewer
Is easy to use and has a nice interface, but the scalability needs to improve
The deployment takes around two to three hours. If you manage the product, one person could be enough, but if you need some kind of additional integrations like ADA integration, you need someone from ADT to access products. One person is enough, but one or two additional personnel may be included. To deploy Check Point Remote Access VPN, you must purchase a license, enable the blade, and purchase client access licenses. You can then follow the instructions to deploy the product, write the necessary rules, make the integrations, deploy the agent to the clients, and provide them with a login solution. I rate the initial setup an eight on a scale of ten, where one is difficult, and ten is easy.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Previously, we used on-prem SCCM to deploy applications we built manually. After migrating to Intune, we automated and streamlined the process of deploying applications with autopilot. I can do more with my day. I can manage more applications and ensure that they're updated without monitoring and manually starting that process all over again."
"Configuration profiles, remediation, scripts, and auto-pilot features are very good."
"The product has eased the deployment of Microsoft apps to the devices. We can manage it properly. We can control it and push the updates. Another company helped us with the deployment. However, we can do it internally."
"The best features include the management, which is quite good, and endpoints."
"I believe that the solution is actually in Gartner's top quadrant at the moment for mobile device management."
"The biggest asset is the range of device management options available with Intune, whether it is a Windows device, a Linux device, a Mac device, or mobile devices."
"The initial setup is not complex."
"The ease of applying security policies to applications we deploy is the most valuable feature of Microsoft Intune."
"The seamless integration of chat, our ITSM management software, and remote viewing/control software makes for a valuable tool."
"The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients."
"A key advantage is over Password Safe, allowing third-party vendors access without directly onboarding them into the systems."
"This product "just works" (without fail) and is dead-easy for clients to connect with."
"The jump to feature function is the most valuable to us as it allows us to directly remote control customers."
"Bomgar is used for connecting with our end users and helping them to resolve any issues that they have on their computer."
"Solution has a good UI."
"I would rate the product ten out of ten."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
"Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
"Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work."
"One feature that is highly valued by our clients in remote access VPN is the IPsec suite. With IPsec, we can encrypt our data, ensuring that no one can perform a man-in-the-middle attack or decrypt the data. It utilizes powerful mathematical calculations and end-to-end encryption, preventing hacking attempts."
"It operates effectively, particularly during challenges like adversities or infrastructure issues."
"The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
"Check Point Remote Access VPN has some useful features, and configuring it is relatively straightforward."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
 

Cons

"Microsoft Intune is not user-friendly to manage and has room for improvement."
"A more incisive reporting tool with automated progress updates and graphical representation would be beneficial, as the current manual method lacks efficiency and visual clarity."
"The reporting dashboard is really limited."
"Microsoft Intune's support for Mac devices is lacking and could be improved."
"We haven't really gone through all the features of Intune. We are just discovering them. Every day, we see a new feature that we want to apply, but what will be great for Intune is to be able to deploy apps in a simple fashion. We should be able to easily install various apps on the Windows platform, iOS, and Android. Currently, we have to write some scripts. It's not as straightforward as we would like it to be. It should be simplified so that we can do it just with three clicks—next, next, finish—without needing to write a script."
"I, as such, do not have any specific inputs or needs. However, there is always room for improvement when it comes to scalability."
"The technical support by Microsoft is not so good. We have to manage many things by ourselves and do not receive responses in a timely manner."
"I would like to see Intune improve its handling of hybrid domain joins. We continue to experience issues with machines losing their hybrid domain join status."
"I would have picked an internal team member who was going to stay on the team for more time. Shortly after we went live, we had a change of staff and lost the main implementer."
"There are not enough product partners in Turkey, making it difficult for me to get assistance."
"I would like to see more integration with iOS devices along with better connectivity and communication with these devices."
"It could be more compatible with other applications. We had trouble with compatibility when it came to Entrust. This is because we had issues with Windows machines when we installed Entrust."
"Although the learning curve is steep, the product is well-documented.​"
"This product has a lot of features that we do not currently use, so there may be some things that cause bloat and confusion."
"There were a few employee devices that failed during the initial deployment, which required a second deployment."
"Customer support was better in the past. About two years ago, the response times became longer."
"The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
"The support hours don't align with work hours, and AI could be introduced."
"The product’s architecture is a bit distributed."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
"When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client."
"It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices."
 

Pricing and Cost Advice

"Intune comes with the licensing that is common for large organizations. However, Microsoft has recently released many add-ons that are very expensive, especially for large organizations or corporations."
"It comes with the E5 plan. We bought the E5 plan from Microsoft."
"I have no comment on pricing of the solution."
"Microsoft's licensing is more flexible and adaptive than its competitors."
"While I can't provide insights from a business perspective, it's worth noting that the pricing may differ significantly, and the discount we received might not be reflective of standard business rates."
"Existing E5 license holders for M365, Intune, and Azure, receive a free license."
"The E5 license is expensive."
"I recently got to know that the AD P1 license is compulsory to use Intune Autopilot, which was surprising for me. Earlier, this was not the case. It is the wrong thing to do. We now need to purchase AD P1 licenses for us and for our customers. I would rate it a seven out of ten for pricing."
"BeyondTrust Remote Support is a very expensive product."
"Pricing is reasonable for what the service is offering. If it is looked at from a purely remote control perspective then it might appear expensive, but it is the wider functionality that should be considered too."
"Bomgar has a very fair pricing structure."
"I rate Remote Support eight out of 10 for affordability. It's definitely not the cheapest product, but you get a good return on your investment."
"This product provides value for money."
"Although the upfront cost is a bit overwhelming, the appliance will pay for itself in less than two years."
"It is pretty pricey. It is not cheap. The licensing structure is not cheap. The tool is not cheap, but in the long run, it is well worth it. It is probably one of the best on the market because it is just so easy to use and easy to deploy. It gave us the ability to see what everybody was doing. It held people accountable. It gave us the accountability that we needed."
"​The product maintenance and licensing costs are on the higher end, so I would carefully review how many licenses you need. The concurrent license model is helpful in this manner.​"
"Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."
"I give the price of the solution a five out of ten."
"Regarding pricing, as a global customer, we get a big discount. For us, it's a good return on investment. We need to pay for additional features we want to enable. It seems cheaper than other vendors, but I can't say what it would cost an average customer."
"Check Point Remote Access VPN is not expensive and the cost is annual."
"The product is expensive. I rate its pricing a ten out of ten. For the cost of one product, we could purchase two or three Fortinet solutions with the same amount of money."
"My company makes yearly payments only towards the licensing costs attached to Check Point Remote Access VPN, as there are no extra costs attached to the product."
"There is a license required for this solution."
"The price of this product is good."
report
Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
851,604 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
18%
Computer Software Company
12%
Financial Services Firm
8%
Manufacturing Company
8%
Computer Software Company
18%
Financial Services Firm
12%
Manufacturing Company
10%
Government
8%
Computer Software Company
13%
Financial Services Firm
10%
Manufacturing Company
10%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
What do you like most about BeyondTrust Remote Support?
The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote...
What needs improvement with BeyondTrust Remote Support?
For me as a user in the service desk, there is already a lot of functionality in the product. I don't have any specif...
What advice do you have for others considering BeyondTrust Remote Support?
If used properly by a service desk agent, the cost of the tool is justified. The price reflects the tool's capabiliti...
What needs improvement with Check Point Endpoint Remote Access VPN?
One area that could be improved is the complexity of setting up Check Point Remote Access VPN, particularly with feat...
What is your primary use case for Check Point Endpoint Remote Access VPN?
We are resellers of Check Point products in our country, and our customers use Check Point Remote Access VPN to keep ...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
Bomgar Remote Support
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
InterContinental Hotels Group, Williams-Sonoma Inc., eBay, Carbonite, Computer Sciences Corporation
Osmose, International Fund for Animal Welfare (IFAW)
Find out what your peers are saying about BeyondTrust Remote Support vs. Check Point Remote Access VPN and other solutions. Updated: April 2025.
851,604 professionals have used our research since 2012.