We performed a comparison between Check Point Remote Access VPN and Perimeter 81 based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"The solution has good performance."
"The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out."
"A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme."
"The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
"For a basic setup, implementation is quite easy."
"Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
"The solution implemented in the cloud allows us to easily scale in cases of user increase."
"The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
"The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
"Scaling Perimeter 81 was easy to do."
"The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."
"Logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN."
"Providing access and security allows our company employees to work from home and remotely."
"The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization."
"It keeps us all accountable and ensures secure internet connections while we all work remotely."
"It connects quickly and stays connected. The user interface is pretty neat too. The app has in-house support with user guides that give you step-by-step walkthroughs on navigating the app. In addition, there is a live chat feature that offers prompt assistance on the go."
"The benefits are really built into the underlying protocol, however, Perimeter81 makes these available in a user-friendly way."
"There must be a more easy-to-use GUI."
"We encounter challenges for the product’s installation and troubleshooting processes compared to other VPN products."
"We would like to implement HTML5 (clientless access) in the product without installing any additional software."
"Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."
"It would be good to have Remote Access VPN solutions for Check Point edge services."
"I would like this service to be easier to manage when you integrate it with third parties."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
"The cost of maintenance is high compared to most products in the market."
"Improved scalability would allow the solution to handle larger numbers of users and devices without a significant impact on performance."
"There are a few areas where the solution could be improved. For instance, we sometimes encounter connectivity issues, which can be problematic. Recently, I experienced a connectivity issue while trying to move to Azure. Connectivity issues can be quite frustrating."
"What would be useful would be a notification/warning that a session is due to timeout after exceeding the default connection limit."
"The overall UI could be improved and updated to bring a simpler feel to the application."
"The platform still lacks relevant dashboards and the ability to customize them based on our needs."
"Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity."
"I'd love to learn more about all of the features. Maybe a monthly spotlight of features or having a banner that explains more ways certain features could be used would be helpful."
"One of our challenges is ensuring the security of our cloud-based operations."
"It would be nice to have a notification sound when Perimeter81 disconnects, as I sometimes don't notice when the icon shows that it's disconnected, and I end up wasting time waiting for my browser to load a page that shows an error, usually error 404."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 62 reviews while Perimeter 81 is ranked 8th in Enterprise Infrastructure VPN with 22 reviews. Check Point Remote Access VPN is rated 8.8, while Perimeter 81 is rated 9.2. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Sangfor EasyConnect, whereas Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Netskope . See our Check Point Remote Access VPN vs. Perimeter 81 report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.