Introducing G2.ai, the future of software buying.Try now
It's been two months since this profile received a new review
Leave a Review

NCP VPN Client Reviews & Product Details

Profile Status

This profile is currently managed by NCP VPN Client but has limited features.

Are you part of the NCP VPN Client team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used NCP VPN Client before?

Answer a few questions to help the NCP VPN Client community

NCP VPN Client Reviews (3)

Reviews

NCP VPN Client Reviews (3)

5.0
3 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Computer & Network Security
AC
Small-Business (50 or fewer emp.)
"IPSEC provides excellent security once it's setup and working right"
What do you like best about NCP VPN Client?

I love the strong cryptographic verification and the built-in vendor versions that make it great for ease-of-use. I create the user, tell the end user what their authentication tokens are, and boom, they are in and using it. The vendor implementations in Windows make it extremely simple. Review collected by and hosted on G2.com.

What do you dislike about NCP VPN Client?

Server-side setup, especially on linux with the various strongswan/libreswan setup, is maddening! It's unrealistically difficult to setup! As a linux server, first you have to find the right distribution-specific *swan to use, then you have to cnofigure it to be a bridge or point-to-point, and then try it. And don't get me started on the logfiles. Logging is absolutely useless. All of the *swan variants have completely useless data in the logfiles. Unless you have already made a point of reading the entire source code from start to finish and commiting it to memory prior to looking at the logs, and fully understanding every line of it, the logs are complete junk. Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
CC
Enterprise (> 1000 emp.)
"Recommend NCP"
What do you like best about NCP VPN Client?

securely connecting end devices in most possible platforms Review collected by and hosted on G2.com.

What do you dislike about NCP VPN Client?

Though it has support for the most platform, which we don't like is non-Linux support Review collected by and hosted on G2.com.

NR
Rousseau
Small-Business (50 or fewer emp.)
"Safe"
What do you like best about NCP VPN Client?

This vpn is really usefull because you have multiples country to have acces to Many services Review collected by and hosted on G2.com.

What do you dislike about NCP VPN Client?

The least helpful with IPSec VPN is that could be slow sometimes but to just have to restart and it will je alright Review collected by and hosted on G2.com.

There are not enough reviews of NCP VPN Client for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Netgate pfSense Logo
Netgate pfSense
4.8
(322)
The Netgate pfSense project is a powerful open source firewall and routing platform based on @FreeBSD.
2
OpenVPN Access Server Logo
OpenVPN Access Server
4.4
(313)
A self-hosted VPN Solution Engineered for SMBs that provides secure access to your private business network, in the cloud or on-premise. Access Server is free to install and use with a maximum of 2 simultaneous VPN connections.
3
Absolute Secure Access Logo
Absolute Secure Access
4.7
(225)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
4
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.5
(194)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
5
GoodAccess Logo
GoodAccess
4.7
(161)
GoodAccess is a Zero Trust cybersecurity platform (SASE/SSE) built for medium-sized businesses (50–5000+ employees). It enables rapid, low-code/no-code deployment—without hardware or expert staff—to secure remote and hybrid teams. With identity-based access, BYOD protection, network segmentation, and full visibility, GoodAccess simplifies enterprise-grade security for modern, multi-cloud environments.
6
NordLayer Logo
NordLayer
4.3
(125)
A stress-free way to secure your network.
7
OpenVPN CloudConnexa Logo
OpenVPN CloudConnexa
4.6
(118)
CloudConnexa provides secure communication between an organization’s distributed workforce, IoT/IIoT devices, and the online services they rely on daily with a secure virtualized network, based on the market-proven OpenVPN protocol. Get started with 3 free connections.
8
Zscaler Private Access Logo
Zscaler Private Access
4.5
(119)
Embrace a zero trust security strategy for your internal apps
9
Check Point Remote Access VPN Logo
Check Point Remote Access VPN
4.5
(99)
Check Point Remote Access VPN is an enterprise-grade solution that enables secure and seamless remote access to corporate networks and resources for employees working remotely or traveling. It ensures the privacy and integrity of sensitive information through multi-factor authentication, endpoint compliance scanning, and encryption of all transmitted data. Key Features and Functionality: - Secure Remote Access: Provides full IPsec VPN connectivity, ensuring strong authentication, data integrity, and confidentiality. - Multi-Factor Authentication Support: Offers comprehensive authentication options, including username/password, SecurID, RADIUS Challenge/Response, CAPI software and hardware tokens, and P12 certificates. - Endpoint Compliance Scanning: Verifies that client devices comply with the organization's security policies, blocking non-compliant connections to the network. - Seamless User Experience: Features VPN Auto-Connect and logoff when corporate resources are needed and upon network roaming, ensuring a hassle-free experience for users. - Integrated Management: Allows configuration of policies and viewing of VPN events from a single console, streamlining administration. Primary Value and User Solutions: Check Point Remote Access VPN addresses the critical need for secure remote connectivity, enabling employees to access corporate resources safely from any location. By implementing robust security measures such as multi-factor authentication and endpoint compliance scanning, it mitigates risks associated with remote work, including data breaches and unauthorized access. The solution's seamless integration and user-friendly experience enhance productivity while maintaining stringent security standards, making it an essential tool for organizations with remote or traveling employees.
10
Twingate Logo
Twingate
4.7
(74)
Twingate secures remote access to private apps, data and environments, allowing businesses to replace corporate VPNs with a more secure, usable, performant and modern zero trust-based solution.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
NCP VPN Client
View Alternatives