User Reviews of Check Point Remote Access VPN & F5 BIG-IP Access Policy Manager (APM)

Updated March 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE report comparing Check Point Remote Access VPN and F5 BIG-IP Access Policy Manager (APM) based on reviews, features, and more!

Where should we email your report?






Check Point Remote Access VPN review

Ozan Durmus
Ozan Durmus
Senior Information Security Specialist at AKBANK TAS
Is easy to use and has a nice interface, but the scalability needs to improve
The deployment takes around two to three hours. If you manage the product, one person could be enough, but if you need some kind of additional integrations like ADA integration, you need someone from ADT to access products. One person is enough, but one or two additional personnel may be included. To deploy Check Point Remote Access VPN,...
F5 BIG-IP Access Policy Manager (APM) review

Ishan Shah
Ishan Shah
Senior Network Engineer at a financial services firm with 10,001+ employees
Facilitates packet inspection, modification, and offloading and offers visibility...
From my perspective, the work I do benefits from good visibility before anything goes to production. We can generate traffic with F5's load generators to see how it behaves, exposing any packet errors and other issues. This is valuable for me, as it allows for troubleshooting without involving server personnel. Additionally, we can capture...

Since 2012, we've had 768,415 professionals use our research.

As seen in