Introducing G2.ai, the future of software buying.Try now
GoodAccess
Sponsored
GoodAccess
Visit Website
Product Avatar Image
Check Point Remote Access VPN

By Check Point Software Technologies

4.5 out of 5 stars

How would you rate your experience with Check Point Remote Access VPN?

GoodAccess
Sponsored
GoodAccess
Visit Website

Check Point Remote Access VPN Reviews & Product Details

Profile Status

This profile is currently managed by Check Point Remote Access VPN but has limited features.

Are you part of the Check Point Remote Access VPN team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Value at a Glance

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

13 months

Check Point Remote Access VPN Integrations

(2)
Integration information sourced from real user reviews.
Product Avatar Image

Have you used Check Point Remote Access VPN before?

Answer a few questions to help the Check Point Remote Access VPN community

Check Point Remote Access VPN Reviews (101)

View 1 Video Reviews
Reviews

Check Point Remote Access VPN Reviews (101)

View 1 Video Reviews
4.5
101 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
IS
IT Network and Security Engineer
Enterprise (> 1000 emp.)
"Secure, Scalable, and Simple VPN Integration""
What do you like best about Check Point Remote Access VPN?

What I appreciate most about Check Point IPsec VPN is its impressive security and dependable performance. The solution offers strong encryption standards and integrates smoothly with existing network infrastructure, while also supporting excellent scalability for both remote users and site-to-site connections. Furthermore, its centralized management and advanced threat prevention capabilities simplify the process of maintaining a secure and efficient VPN environment. Review collected by and hosted on G2.com.

What do you dislike about Check Point Remote Access VPN?

One aspect I find less appealing about Check Point IPsec VPN is that the initial setup can be somewhat complicated when compared to other solutions. Setting it up correctly demands a good understanding of the platform to make sure everything functions as intended. That said, after the configuration is complete, the VPN operates reliably and provides robust security. Review collected by and hosted on G2.com.

Abhimanyu K.
AK
information technology
Information Technology and Services
Mid-Market (51-1000 emp.)
Business partner of the seller or seller's competitor, not included in G2 scores.
"Secure, Seamless Connectivity with Robust Management Features"
What do you like best about Check Point Remote Access VPN?

Check Point Endpoint Remote Access VPN for its secure and seamless connectivity, robust multi-factor authentication and encryption, and centralized management. Key strengths include providing secure access from any device, protecting data with strong protocols, and simplifying administration through the SmartConsole. Review collected by and hosted on G2.com.

What do you dislike about Check Point Remote Access VPN?

Check Point Endpoint Remote Access VPN due to its complexity in initial configuration and a steep learning curve, which can require significant expertise for proper setup and management. Additionally, some users report potential performance issues, such as slower speeds on older devices, and compatibility problems with certain operating system updates or third-party software. The high cost of the full suite and sometimes frustrating logging/troubleshooting issues are also mentioned as drawbacks. Review collected by and hosted on G2.com.

KS
IT Cloud Security Support
Computer Networking
Small-Business (50 or fewer emp.)
"Effortless VPN Management with an Intuitive Smart Console"
What do you like best about Check Point Remote Access VPN?

I really like how easy the smart console is to use for creating VPNs. The configuration is simple and intuitive, and I especially like how it monitors the logs. I can add the VPN blade and see all the related information in an organized and straightforward way. It's been very helpful for me with VPNs, from Azure to on-premises. Review collected by and hosted on G2.com.

What do you dislike about Check Point Remote Access VPN?

Sometimes its rigidity in dynamic environments or with frequent network changes is a drawback. Occasionally, the connection drops unexpectedly and requires manual reconnection, which disrupts the workflow. Additionally, it takes slightly longer to establish the tunnel compared to other solutions I've used. But otherwise, I find it very good. Review collected by and hosted on G2.com.

NG
IT Cloud Security
Telecommunications
Mid-Market (51-1000 emp.)
"Effortless VPN Setup, but License Activation Could Be Smoother"
What do you like best about Check Point Remote Access VPN?

I love Check Point IPsec VPN; it simplified things for us. We needed to connect our Azure environment to different sites and providers, and honestly, I thought it was going to be a nightmare. Setting up the VPNs was incredibly easy, even between different brands, and once everything was configured, we had complete control over who could access what. Review collected by and hosted on G2.com.

What do you dislike about Check Point Remote Access VPN?

I don't like the process for activating the blades with the license file. Sometimes it gets more complicated than it needs to be. If you're not familiar with the format or the step by step instructions, it can be time consuming and frustrating. It's happened to me that everything is ready to configure the VPN, but the license issue slows down the process. It's not a major problem, but it would be nice if they made it simpler or more automated. Review collected by and hosted on G2.com.

SS
System Engineer
Consulting
Mid-Market (51-1000 emp.)
"Exceptional Security and Seamless Integration for Remote Access"
What do you like best about Check Point Remote Access VPN?

The best thing about Check Point Endpoint Remote Access VPN is its robust authentication and encryption mechanisms. It supports multi-factor authentication, integrates with Active Directory and SSO, and leverages SSL and IPSec protocols to ensure secure data transmission. Its SmartConsole management also allows precise access control and detailed visibility into VPN sessions. Review collected by and hosted on G2.com.

What do you dislike about Check Point Remote Access VPN?

One drawback is that the VPN client can occasionally have compatibility issues with certain operating system updates or third-party security software. Additionally, initial configuration through SmartConsole can feel cumbersome, especially when setting up authentication or certificate-based access for large user groups Review collected by and hosted on G2.com.

TV
Cloud Enginer
Computer Networking
Mid-Market (51-1000 emp.)
"Strong VPN Seamless Experience"
What do you like best about Check Point Remote Access VPN?

One of the things we like most about managing Check Point IP Sec VPN is the centralization of administration from a single console where we can easily generate several policies in which we can block or allow traffic, generate application access policies or web filtering, in addition to each of the policies when selected they provide us with traffic logs that pass through each one, in this way we can validate behaviors and determine the correct use in addition to finding communication problems as I mentioned from the same console, for me one of the best functions is the use of the smartconsole. Review collected by and hosted on G2.com.

What do you dislike about Check Point Remote Access VPN?

One of the things I like least is the documentation, which is not intuitive. Unfortunately, the Check Point documentation for IPSec VPN issues is either poor or very advanced. For users who are new to Check Point VPN, it is difficult to generate advanced configurations because the documentation is very difficult to understand. It would be good to improve said documentation. Review collected by and hosted on G2.com.

DH
Cloud Enginner
Telecommunications
Small-Business (50 or fewer emp.)
"CheckPoint VPN - Connection Security"
What do you like best about Check Point Remote Access VPN?

I have been using Check Point IPsec VPN for over 4 years to establish VPN connections with both Azure and on-premises installations, and it has been a fundamental tool for these tasks. I liked that it was our first choice based on recommendations and reviews we had seen previously, which reaffirmed our decision. Also, after gaining experience and with the help of the documentation, the configuration process became much simpler. Check Point IPsec VPN has been very beneficial in allowing us to implement VPNs with clusters at the Azure level and on-premises, ensuring stable connections and effective security reviews at our perimeters. I enjoy the ability to generate policies within the VPN to segment traffic and easily block or allow certain ports through security management. Additionally, we have had a good experience using it with Azure Virtual Gateway and also with Fortinet systems. The solution is stable, robust, and secure, essential characteristics that would make me continue acquiring licenses in the future. Review collected by and hosted on G2.com.

What do you dislike about Check Point Remote Access VPN?

I would like the documentation to be more intuitive. Make it easier to implement the licenses since it is somewhat complicated at the beginning. Review collected by and hosted on G2.com.

William Adrian C.
WC
Consultor TI AZURE
Computer & Network Security
Small-Business (50 or fewer emp.)
"efficient, safe and friendly"
What do you like best about Check Point Remote Access VPN?

One of the valuable functions that the Check Point Remote Access VPN tool has is MEP as it improves the latency of users when they make a connection It is a function that provides a high availability and load sharing solution for VPN connections Another functionality is NGFW you don't need any additional hardware, which simplifies deployment and reduces start-up time,We can reduce access based on geographic location and device type. Devices can be Android, iOS, Windows or Linux.

The technology also allows us to limit access based on geographic location and device type, which includes Android, iOS, Windows, and Linux. Furthermore, it provides customizable authentication mechanisms, allowing us to enforce access regulations and ensure compliance throughout our organization. Review collected by and hosted on G2.com.

What do you dislike about Check Point Remote Access VPN?

One area for improvement is the compliance and scanning process, which can occasionally require significant client machine resources. Another upgrade could be to provide a timeout or automatic reconnection feature when VPN sessions are interrupted due to internet outages.

Furthermore, the Linux client is less complete than the Windows or macOS versions, which may be a drawback for users of that operating system, though it has had no noticeable influence on our workflow. Review collected by and hosted on G2.com.

SQ
Ingeniera
Telecommunications
Mid-Market (51-1000 emp.)
"Seamless Azure Integration and Top-Notch Security"
What do you like best about Check Point Remote Access VPN?

Its integration with Azure simplifies and ensures secure remote access. It offers robust encryption and stable connectivity, guaranteeing the protection of sensitive data while users connect from different locations. The solution is easy to manage, scales well with cloud workloads, and gives me the confidence that my environment remains secure without sacrificing performance. Review collected by and hosted on G2.com.

What do you dislike about Check Point Remote Access VPN?

What I don't like, perhaps, and it's a very small thing, is that the documentation lacks more images and is easier to understand. Review collected by and hosted on G2.com.

RR
Ing Networking
Telecommunications
Mid-Market (51-1000 emp.)
"Reliable, Secure VPN with Effortless Remote Access"
What do you like best about Check Point Remote Access VPN?

It's the reliability and ease of connecting securely from anywhere. The VPN offers strong encryption and seamless access to internal resources without noticeable performance issues. Centralized management makes it easy to enforce consistent policies, and users can connect with the peace of mind that their data is protected. Review collected by and hosted on G2.com.

What do you dislike about Check Point Remote Access VPN?

The initial setup and configuration can be somewhat complicated, especially for users with limited technical knowledge. Sometimes, connection stability can vary depending on the network environment, which may cause interruptions during long sessions. Review collected by and hosted on G2.com.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

13 months

Average Discount

12%

Check Point Remote Access VPN Comparisons
Product Avatar Image
OpenVPN CloudConnexa
Compare Now
Product Avatar Image
Pritunl
Compare Now
Check Point Remote Access VPN Features
Multi-Device Usage
Multiple Concurrent Connections
Protocol Choices
Live Customer Support
Open Source Code
Multiple Payment Methods
Product Avatar Image
Check Point Remote Access VPN
View Alternatives