Introducing G2.ai, the future of software buying.Try now
It's been two months since this profile received a new review
Leave a Review

Check Point Mobile Access Reviews & Product Details

Profile Status

This profile is currently managed by Check Point Mobile Access but has limited features.

Are you part of the Check Point Mobile Access team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Value at a Glance

Averages based on real user reviews.

Perceived Cost

$$$$$

Check Point Mobile Access Integrations

(1)
Integration information sourced from real user reviews.
Product Avatar Image

Have you used Check Point Mobile Access before?

Answer a few questions to help the Check Point Mobile Access community

Check Point Mobile Access Reviews (30)

Reviews

Check Point Mobile Access Reviews (30)

4.3
30 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Banking
AB
Mid-Market (51-1000 emp.)
"Check Point Mobile Access"
What do you like best about Check Point Mobile Access?

what is most valuable and helpful about checkpoint mobile access is , It has strong encryption , two-factor authentication, and user-device pairing as a result this is helping our customers to maintain security while allowing employees to work remotely. And specially It is user friendly to use. Additionally It supports smartphones, tablates. PCs. and laptops as a result of this users has flexible and secure access to corporate network. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

Other than some performance issues there is nothing to complain about from my experience. Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
UC
Small-Business (50 or fewer emp.)
"Secure Remote Access"
What do you like best about Check Point Mobile Access?

The strong security and access control. The integration with other Check Point products works very well. The centralized management is also a good point to mention, because it works very good. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

The user interface is a little bit outdated. The initial set up and configuration can be complex for new or inexperienced users. Review collected by and hosted on G2.com.

Maureen A.
MA
Customer Support Agent
Mid-Market (51-1000 emp.)
"Trusted mobile network protection software"
What do you like best about Check Point Mobile Access?

Check Point Mobile Access provides secure connection over mobile network between my team and our agents from remote areas. It detects unprotected communicaation protocol that can expose confidential data to ransomware attackers. The software offers data insights on poor conversation networks for easy troubleshooting. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

I experienced few network network configurations downtimes for the first few days after deployment before familiarizing with the full package. functionalities Review collected by and hosted on G2.com.

Matthew B.
MB
Digital Marketing Specialist
Enterprise (> 1000 emp.)
"Secure mobile network monitoring tool"
What do you like best about Check Point Mobile Access?

It secures all connected devices that we have configured in the enterprise network. It is easy to set up and monitor its security performance in deployed systems. I have not experienced network threats from malware attacks since I started using Layer 3 VPN enabled protocol. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

The few technical issues I experience are mainly from our servers when they are overloaded and does not affect the system operations. Review collected by and hosted on G2.com.

Barbara H.
BH
Financial Analyst
Enterprise (> 1000 emp.)
"Proven technology securing mobile networks"
What do you like best about Check Point Mobile Access?

It gives me freedom of accessing email updates in my smartphone from anywhere without fear of malware attacks. I have not experienced network communication threats from since I started using two-factor authentication feature powered by Check Point Mobile Access. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

The entire set up process and learning curve was challenging for the first few days. Review collected by and hosted on G2.com.

Sunil M N.
SN
Associate Region Head - Southern
Enterprise (> 1000 emp.)
"Access data and information through Mobile devices in most secure and easy manner !"
What do you like best about Check Point Mobile Access?

Check Point Mobile Access is easily accessible and relatively cost-effective software. It helps access confidential and vital data and info through mobile and tablet in the most secure way. No data leakage can happen if Check Point Mobile Access is installed in your device as it prevents data leaks up to 100% without hassle. It continuously runs in the background and helps secure the stored and transmitted data in the best possible way. The interface is easy to operate and does not bother much. Also, dealing with Check Point Marketing and the business team is most accessible than ever. It helps to strengthen the group in accessing the data and essential info from anywhere, anytime. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

No problem as such. Though, would request continuous updates as per changing business and market requirements now and then. Please bring in more tech-savvy security features and strengthen the encryption security to its maximum. Review collected by and hosted on G2.com.

FM
cloud engineer
Enterprise (> 1000 emp.)
"the mobile security solution"
What do you like best about Check Point Mobile Access?

Some benefits of implementing Check-Point Mobile Access include: Secure access to business resources – Allows employees to securely access business resources from their mobile devices. Data protection: protects confidential company information against external and internal threats, guaranteeing data security. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

Some disadvantages of implementing Check-Point Mobile Access can include: Cost – It can be expensive for small businesses to implement Check-Point Mobile Access and keep it up to date. Complexity – Can be complex to implement and configure for some users, especially if they are new to information security. Review collected by and hosted on G2.com.

FA
Manager-Operations
Mid-Market (51-1000 emp.)
"Connecting the world of applications through Mobile in most secure manner. A must have software !"
What do you like best about Check Point Mobile Access?

Safety and security features for integration with 3rd party applications and access data and info trouble-free in the safest manner possible.

Handling is easy, and deployment is not complicated at all.

User authentication is entirely secure with multi-layered protection, which ensures no unauthorized entry under any circumstances. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

No dislikes at all. We love all the features from the bottom of our hearts as its amazing to use and relatively easy to handle. One-stop solution to access documents and information through mobile applications anywhere, anytime, without fear of data theft or loss. Review collected by and hosted on G2.com.

AV
Senior Associate
Mid-Market (51-1000 emp.)
"Smart, safe and highly secure solution to connect applications with Tab, PC and Smartphone easily !"
What do you like best about Check Point Mobile Access?

One of the highly secure software for connecting various 3rd party and other external applications with laptops, desktops and tab etc., most securely and quickly. It helps in managing remote access and control in unified manner.

The solution is highly mobile and dynamically secure and goes well with all kinds of applications and devices effortlessly without any issue. The answer is readily available globally for various professionals and organizations and helps manage the remote monitoring of applications and work efficiently trouble-free.

Remote access VPN is an excellently workable solution for monitoring and managing corporate networks and applications through the multi-layer authentication process, which results in securing the data information and process flow across all channels and ensuring there is complete encryption and encoding enabled across all fronts and no data loss or breach occurs under any circumstances.

Reduced pricing and excellent performance efficiency. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

The integration process with external 3rd party applications still involves many technical issues and hassles, and it often takes and consumes enormous time in final-level integrations. The tech issues are managed in 72 hrs' time which is quite delayed and can be improved to a great extent. Rest everything is fantastic and worth trying. Strongly recommended for use by everyone Review collected by and hosted on G2.com.

LN
Security Engineer
Enterprise (> 1000 emp.)
"Check Point Mobile Access provides comprehensive solution for remote access and security compliances"
What do you like best about Check Point Mobile Access?

Check Point mobile access provides a remote access solution for users, even where they are and which devices they use, while maintaining security factors. Organizations can manage access control of users based on policies where they should have access and where they shouldn't. Besides, the organizations using the solution can create compliance rules to check and scan mobile devices and computers to determine whether they are compliant before connecting to the network. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

Compliance checks in Check Point mobile access are handy for organizations that want to add more security to the network. But this feature only supports almost Windows platforms while supporting minimal settings on others. This is a limitation because using non-Windows machines is very popular. Hopefully, Check Point will continue to develop the product shortly. Review collected by and hosted on G2.com.

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Check Point Mobile Access Comparisons
Product Avatar Image
Palo Alto Networks GlobalProtect
Compare Now
Check Point Mobile Access Features
Multi-Factor Authentication
Access Management
Security and Compliance
Data Encryption
Data Transport
Mobile VPN
Product Avatar Image
Check Point Mobile Access
View Alternatives