Try our new research platform with insights from 80,000+ expert users
Check Point Remote Access VPN Logo

Check Point Remote Access VPN pros and cons

4.4 out of 5
Badge Leader

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Check Point Remote Access VPN allows for seamless access, providing a dynamic network environment.
The integration with Active Directory is essential, offering centralized control and smooth user authentication.
Organizations using Check Point NGFW require no additional hardware, making implementation straightforward and reducing time to go live.
Multi-factor authentication enhances security by requiring multiple verification steps, protecting against unauthorized access.
Check Point Remote Access VPN provides robust security features including encryption, authentication, and centralized management, ensuring data safety and positive impact on organizational productivity.

CONS

Check Point Remote Access VPN faces challenges in providing compatibility with Linux operating systems, as it lacks many features for Linux users compared to Windows and Mac.
There are complexities in configuring multiple gateways and issues with scalability as the number of users increases.
Integrating Check Point Remote Access VPN with third-party platforms can be difficult, particularly when setting up multi-factor authentication and single sign-on.
The process of updating and maintaining Check Point Remote Access VPN clients can be cumbersome, requiring frequent updates to align with changes in operating systems like Windows.
Check Point Remote Access VPN has limitations with its support services, including slow response times and limited support documentation, which are not adequately maintained.
 

Check Point Remote Access VPN Pros review quotes

reviewer1398543 - PeerSpot reviewer
Aug 3, 2020
It allows everyone to work from home. If no one could work from home, then we wouldn't have a company, especially now during COVID-19. It's mission-critical, especially since it's currently being used. If there is a problem with it, we would really be screwed. We would be hard-pressed because we would have to figure out what solution we're going to go with, how to deploy it, how long it would take to deploy it, and how we'd even get it on people's computers if we couldn't VPN to them. It would be near impossible to just change to a new VPN solution right now.
Mohammed Tanveer - PeerSpot reviewer
Sep 4, 2025
Approximately 80 to 90% of our staff now rely on the Check Point Remote Access VPN working outside the office, reducing downtime for remote work and giving us confidence that the connection remains secure, directly improving both user satisfaction and overall team output.
reviewer1098015 - PeerSpot reviewer
Oct 25, 2020
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,561 professionals have used our research since 2012.
AT
Nov 19, 2021
The solution has been solid for me for over five years.
reviewer1600518 - PeerSpot reviewer
Jul 4, 2021
I found the MEP feature the most valuable. This has improved users' latency allowing the users to connect to the nearest Azure Check Point VM.
BD
May 31, 2021
Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live.
LN
May 19, 2022
Setting policies allow, block, and limit users' access.
SK
Oct 19, 2021
The solution offers high scalability as far as adding more users.
josephtampient3 - PeerSpot reviewer
Feb 23, 2023
Check Point has been perfect for protecting us from any type of attack or data theft during remote management.
it_user1602519 - PeerSpot reviewer
Jun 16, 2021
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware.
 

Check Point Remote Access VPN Cons review quotes

reviewer1398543 - PeerSpot reviewer
Aug 3, 2020
When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client.
Mohammed Tanveer - PeerSpot reviewer
Sep 4, 2025
Sometimes the client updates cause minor disruption. It would be great if the updates were smooth and didn't require users to restart and reconfigure the settings.
reviewer1098015 - PeerSpot reviewer
Oct 25, 2020
We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved.
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,561 professionals have used our research since 2012.
AT
Nov 19, 2021
The ability to allow split-tunneling while still following our corporate policy needs to be on the table.
reviewer1600518 - PeerSpot reviewer
Jul 4, 2021
You have no ability to reserve a total number of licenses. The VPN user licenses are assigned per gateway, and if you enable MEP function is not so easy to size the gateway licenses.
BD
May 31, 2021
The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access.
LN
May 19, 2022
Compliance Check on Check Point should be improved by having more configurable conditions to support multi-platforms and adding more granularity.
SK
Oct 19, 2021
This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity.
josephtampient3 - PeerSpot reviewer
Feb 23, 2023
The main feature that would be improved within Check Point Remote Access is its operation within Linux OS, as it currently does not have many features for that OS.
it_user1602519 - PeerSpot reviewer
Jun 16, 2021
For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent.