Introducing G2.ai, the future of software buying.Try now
SetMe
Sponsored
SetMe
Visit Website
Product Avatar Image
Check Point Endpoint Remote Access VPN

By Check Point Software Technologies

4.5 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Check Point Endpoint Remote Access VPN?

SetMe
Sponsored
SetMe
Visit Website

Check Point Endpoint Remote Access VPN Reviews & Product Details

Profile Status

This profile is currently managed by Check Point Endpoint Remote Access VPN but has limited features.

Are you part of the Check Point Endpoint Remote Access VPN team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Value at a Glance

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

13 months

Check Point Endpoint Remote Access VPN Integrations

(1)
Integration information sourced from real user reviews.
Product Avatar Image

Have you used Check Point Endpoint Remote Access VPN before?

Answer a few questions to help the Check Point Endpoint Remote Access VPN community

Check Point Endpoint Remote Access VPN Reviews (51)

Reviews

Check Point Endpoint Remote Access VPN Reviews (51)

4.5
51 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Abhimanyu K.
AK
information technology
Information Technology and Services
Mid-Market (51-1000 emp.)
Business partner of the seller or seller's competitor, not included in G2 scores.
"Secure, Seamless Connectivity with Robust Management Features"
What do you like best about Check Point Endpoint Remote Access VPN?

Check Point Endpoint Remote Access VPN for its secure and seamless connectivity, robust multi-factor authentication and encryption, and centralized management. Key strengths include providing secure access from any device, protecting data with strong protocols, and simplifying administration through the SmartConsole. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

Check Point Endpoint Remote Access VPN due to its complexity in initial configuration and a steep learning curve, which can require significant expertise for proper setup and management. Additionally, some users report potential performance issues, such as slower speeds on older devices, and compatibility problems with certain operating system updates or third-party software. The high cost of the full suite and sometimes frustrating logging/troubleshooting issues are also mentioned as drawbacks. Review collected by and hosted on G2.com.

SS
System Engineer
Consulting
Mid-Market (51-1000 emp.)
"Exceptional Security and Seamless Integration for Remote Access"
What do you like best about Check Point Endpoint Remote Access VPN?

The best thing about Check Point Endpoint Remote Access VPN is its robust authentication and encryption mechanisms. It supports multi-factor authentication, integrates with Active Directory and SSO, and leverages SSL and IPSec protocols to ensure secure data transmission. Its SmartConsole management also allows precise access control and detailed visibility into VPN sessions. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

One drawback is that the VPN client can occasionally have compatibility issues with certain operating system updates or third-party security software. Additionally, initial configuration through SmartConsole can feel cumbersome, especially when setting up authentication or certificate-based access for large user groups Review collected by and hosted on G2.com.

William Adrian C.
WC
Consultor TI AZURE
Computer & Network Security
Small-Business (50 or fewer emp.)
"efficient, safe and friendly"
What do you like best about Check Point Endpoint Remote Access VPN?

One of the valuable functions that the Check Point Remote Access VPN tool has is MEP as it improves the latency of users when they make a connection It is a function that provides a high availability and load sharing solution for VPN connections Another functionality is NGFW you don't need any additional hardware, which simplifies deployment and reduces start-up time,We can reduce access based on geographic location and device type. Devices can be Android, iOS, Windows or Linux.

The technology also allows us to limit access based on geographic location and device type, which includes Android, iOS, Windows, and Linux. Furthermore, it provides customizable authentication mechanisms, allowing us to enforce access regulations and ensure compliance throughout our organization. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

One area for improvement is the compliance and scanning process, which can occasionally require significant client machine resources. Another upgrade could be to provide a timeout or automatic reconnection feature when VPN sessions are interrupted due to internet outages.

Furthermore, the Linux client is less complete than the Windows or macOS versions, which may be a drawback for users of that operating system, though it has had no noticeable influence on our workflow. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Enterprise (> 1000 emp.)
"Secure and Effective Endpoint VPN"
What do you like best about Check Point Endpoint Remote Access VPN?

I appreciate that Check Point Endpoint Remote Access VPN delivers a stable and secure connection, utilizing robust encryption. Its integration with the organization’s security policies makes it straightforward to manage for both administrators and end users. The client is dependable and continues to function smoothly, even when dealing with complex network setups. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

At times, the client consumes a significant amount of system resources, particularly when starting up. I have also encountered occasional compatibility problems following Windows updates, which sometimes necessitate a reinstallation or the application of specific patches. Additionally, the user interface would benefit from being more modern and intuitive, especially for those who are not technically inclined. Review collected by and hosted on G2.com.

CB
Network & Security Engineer
Mid-Market (51-1000 emp.)
"Reliable and Secure VPN for Seamless Remote Work"
What do you like best about Check Point Endpoint Remote Access VPN?

What i like best about checkpoint endpoint remote acces VPN is that it's very reliable once it's connected. it gives me a strong sense of security when i'm working remotely, and i can easily access company resources. the connection speed usually stable, and it doesn't interupt my workflow much. the interface is pretty simple once you get used to it, and i like that it automatically attempt to reconnects if the internet drops. overall, it helps me work from anywhere with peace of mind. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

The main issue i face is that sometime the connection takes a while to establish especially when switching between networks. it can also slow down browsing or file transfer a bit when the internet speed is not great. Occasionally, the app needs to be restarted to reconnect properly, which can be annoying during meetings. I also wish the updates were a bit smoother because they sometimes require admin help. Apart from that, it's a dependable VPN once it's runing. Review collected by and hosted on G2.com.

Abhinandan Y.
AY
Network Engineer
Computer Networking
Mid-Market (51-1000 emp.)
Business partner of the seller or seller's competitor, not included in G2 scores.
"Robust Security, But Setup Can Be Challenging for Small Teams"
What do you like best about Check Point Endpoint Remote Access VPN?

Reviewers consistently highlight strong security features: multi-factor authentication, encryption, endpoint compliance scanning. For example, on one review site it has a rating of ~4.5/5 with praises for its robustness. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

Reviewers report that the initial deployment and configuration can be quite complex, especially in smaller teams or where the infrastructure isn’t already based on ‎Check Point firewalls. Review collected by and hosted on G2.com.

SM
Solution Consultant
Mid-Market (51-1000 emp.)
"Reliable, Secure VPN with Seamless Management and Excellent Support"
What do you like best about Check Point Endpoint Remote Access VPN?

What I like best about Check Point Endpoint Remote Access VPN is its reliability, strong security, and seamless connectivity for remote users.The integration with Check Point’s centralized management console (SmartConsole) is a major advantage — it allows administrators to easily configure policies, monitor connections, and manage users from a single interface. This unified management significantly simplifies operations and ensures consistent policy enforcement across the organization. Easy to use and user friendly GUI. Customer support is so great. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

client updates and version compatibility issues can occasionally cause disruptions or require manual troubleshooting. Review collected by and hosted on G2.com.

TT
Solution Engineer
Mid-Market (51-1000 emp.)
"Checkpoint Endpoint Remote Access VPN"
What do you like best about Check Point Endpoint Remote Access VPN?

The primary strength of Check Point Endpoint Remote Access VPN is its strong, encrypted connection between remote users and corporate resources.The Endpoint Security VPN client has an intuitive interface that allows quick connection with minimal training.Threats are detected and blocked even before they reach the internal network. Easy to implement . Support is so great. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

Pricing is bit high. Other than this product is so great. Review collected by and hosted on G2.com.

TR
Business Development Management
Mid-Market (51-1000 emp.)
"Robust VPN Security with Seamless MFA—Perfect for Hybrid Work"
What do you like best about Check Point Endpoint Remote Access VPN?

It supports full IPsec VPN connectivity with encryption, integrity, and authentication built-in.It ensures encrypted communication between remote users and corporate networks, protecting sensitive data from interception or unauthorized access.MFA Adds an extra layer of security by requiring users to verify their identity beyond just a password, reducing the risk of credential-based attacks. Easy to implement and customer support is so great. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

No dislike as of now. Product is doing great. Review collected by and hosted on G2.com.

VS
Solution Consultant
Mid-Market (51-1000 emp.)
"Checkpoint Endpoint Remote Access VPN"
What do you like best about Check Point Endpoint Remote Access VPN?

It supports full IP-sec tunnels with strong authentication, data-integrity and confidentiality.The “seamless roaming” capability: when users move between networks (Wi-Fi, cellular hotspots, office LAN) the tunnel auto reconnects or adapts.The client supports automatic tunnel tear-down when on corporate LAN, automatic fallback/roaming etc, which reduces configuration woes. Easy to implement. Support is great. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

No dislike as of now. Product is doing so great. Review collected by and hosted on G2.com.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

13 months

Average Discount

15%

Check Point Endpoint Remote Access VPN Comparisons
Product Avatar Image
AnyDesk
Compare Now
Product Avatar Image
Apache Guacamole
Compare Now
Product Avatar Image
OpenVPN CloudConnexa
Compare Now
Check Point Endpoint Remote Access VPN Features
Multi-Device Usage
Multiple Concurrent Connections
Protocol Choices
Live Customer Support
Open Source Code
Multiple Payment Methods
Usage Information
Integrations
Cross-Platform Access
Mobile Device Access
Applications Management