A lot of our clients are complimentary companies, like the electrical company. They need Check Point Remote Access VPN, or even another similar solution. I tell them that I already have the VPN solution in our company.
Senior System Engineer at Thai Transmission Industry
Stable solution but they should strengthen their security features
Pros and Cons
- "The initial set up is not complex."
- "They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
What is our primary use case?
What needs improvement?
In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.
For how long have I used the solution?
I have been using Check Point for about one year.
What do I think about the stability of the solution?
I have not heard any complaints from the clients regarding its stability. I think it's stable for them.
Buyer's Guide
Check Point Remote Access VPN
August 2025

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,685 professionals have used our research since 2012.
What do I think about the scalability of the solution?
Not all of our clients who use Check Point VPN are in Thailand. Some government agencies, like the Electric City Company, are in Thailand. They use it formally. Their IT and telecom departments, those who require a secure network, are using it.
How are customer service and support?
I have not contacted customer support yet because I take care of any issues from here. That's why I don't have their programming disk because I take care of it myself, including the configuration and the DSL in Check Point.
Which solution did I use previously and why did I switch?
We still use other products.
How was the initial setup?
The initial setup is not complex. Plus, we've got the Kryon system. So these systems make it easier for the user. We have known this product for a while, that's why it's not a problem to configure the system.
What other advice do I have?
I don't have any advice yet.
On a scale of one to ten, I'd give Check Point Remote Access VPN a seven.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

IT Tech Security Management at a logistics company with 1,001-5,000 employees
Simple management, quick search capabilities, and very good stability
Pros and Cons
- "The management of the solution is very simple. It allows for a single view of all the endpoints."
- "I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
What is most valuable?
The differentiator for this solution is the management interface that we find very good and provides a single view for all endpoints. The solution offers SmartLog that allows quick searches. The compliance modules are also very interesting.
What needs improvement?
I cannot see the full effect of the antibot solution because it relies on having access to the DNS queries, which might not go through the Check Point firewall when you're using it for perimeter networks. In this case Check Point will not identify the actual source of the DNS queries associated with antibot activity. This may be related to the customer architecture, however, and not due to product limitation. I don't know if it can be improved on the Check Point side or not.
The solution should allow for the automatic identification of destinations.
We have a URL qualification on the on-premises deployment model; this should also be the case on the cloud. The automatic classification should be done by the cloud team instead of having to specify or subscribe to a RSS for the information, we should be able to have an object that represents such cloud services. It's possible that Check Point already allows for this, but if they don't they should.
For how long have I used the solution?
We've been using the solution for about 20 years.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The stability depends on the setup. If the solution resides on a specific appliance, it is not scalable. It has a fixed capacity. However, if you move it onto different environments, cloud environments, it will become scalable. Right now, we have about 4,000 users in the current network and about 500 remote access users.
How are customer service and technical support?
Technical support is reasonable. It depends on the level of support you are willing to pay for, however. You can choose to have a company working for you with intermediate support with Check Point, or you can choose to have direct advanced support.
How was the initial setup?
The initial setup has a moderate amount of complexity. It's acceptable. However, the graphical display of the user chart of network usage, and the ability to zero in on the current graphics could be improved.
What other advice do I have?
We currently only use the on-premises deployment model, although we may extend into the cloud in the future. We're aware of the cloud's capabilities, but we're not using it because we don't have a large infrastructure expression there.
In terms of advice, I'd suggest that others implementing the solution make sure training happens on their teams. Most products can have lots of features, but if you do not have proper knowledge, you will not be able to make use of those features.
I'm very satisfied with this solution; I'd rate it eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Remote Access VPN
August 2025

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,685 professionals have used our research since 2012.
Chief Technology Officer at Triana Business Solutions Lda
A secure solution that's reliable and scalable
Pros and Cons
- "The ability to create your trigger data domains is the solution's most valuable feature."
- "The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified."
What is our primary use case?
We primarily use the solution to have a secure connection and to offer security integration with our remote office as well as some other companies.
What is most valuable?
The ability to create your trigger data domains is the solution's most valuable feature.
What needs improvement?
The solution should include the ability to integrate the equipment's functionality with others. For example, we would like Checkpoint to be able to integrate easily to the public key infrastructure. According to Checkpoint, there is no use case for this right now.
The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.
For how long have I used the solution?
I've been using the solution for two years.
What do I think about the scalability of the solution?
The solution has been very scalable for us up until now. Currently, we have two data centers and we are running two Checkpoints for the facility to spread the workload.
How was the initial setup?
The process is mainly straightforward.
We started only with the firewall components and this part was straightforward. Once we started to implement the VPN, we had to work with the reseller. Now, we are handling it ourselves.
What about the implementation team?
We handled the implementation ourselves with the assistance of resellers.
What other advice do I have?
We are using the on-premises deployment model.
Checkpoint is very strong and very reliable. I would advise that those considering implementing the product go to a Checkpoint training session before implementing the solution. It's good to be familiar with the product beforehand.
I'd rate the solution ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a tech consulting company with 51-200 employees
Gives users the ability to work from home. It would be great if the Java applet could run without admin permission.
Valuable Features
Firewall and SSL VPN
Improvements to My Organization
One of the features that is very valuable to our agency is SSL VPN software blade which gives users the ability to work from home.
Room for Improvement
The SSL VPN needs a Java applet to be installed and it is also dependent on the latest version of java. If our users use their work laptops at home they don’t have the permission to install anything that would be great if this applet can run without administrator permission.
Use of Solution
4-5 years
Deployment Issues
We haven't encountered any issues with deployment.
Stability Issues
We haven't encountered any issues with stability.
Scalability Issues
We haven't encountered any issues with scalability.
Customer Service and Technical Support
Customer Service: ExcellentTechnical Support: Excellent
Initial Setup
It is definitely not a complex procedure.
Implementation Team
In-house, with a CheckPoint engineer’s assistance, Excellent.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Electronic Engineer at eBTel Cia. Ltda.
A stable solution that provides customers the facility to access the enterprise network
Pros and Cons
- "The clients of the customers have a facility to access the enterprise network."
- "Check Point Remote Access VPN's enterprise support could be improved."
What is our primary use case?
The solution is used for the mobile license or the troubleshooting of the VPN client.
What is most valuable?
The most valuable feature of the solution is its facility to use the command of the customers in the enterprise. The clients of the customers have a facility to access the enterprise network.
What needs improvement?
Check Point Remote Access VPN's enterprise support could be improved. The principal support is the problem with the operating systems. The customers have a problem with not being able to publish the application.
What do I think about the stability of the solution?
The solution’s stability is very good.
What do I think about the scalability of the solution?
Check Point Remote Access VPN has good scalability. Microsoft's operating system has a problem with the solution's new version.
How are customer service and support?
The solution's technical support is good. However, I face issues communicating with them as my English is not good.
How would you rate customer service and support?
Positive
How was the initial setup?
The solution’s initial setup is somewhere in the middle, from easy to difficult.
What other advice do I have?
Generally, Check Point Remote Access VPN is a very good solution.
Overall, I rate Check Point Remote Access VPN a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner/Reseller

Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Popular Comparisons
Microsoft Intune
Prisma Access by Palo Alto Networks
Fortinet FortiClient
Workspace ONE UEM
Microsoft Remote Desktop Services
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
OpenVPN Access Server Enterprise
TeamViewer Business
Claroty Platform
Cisco Secure Client (including AnyConnect)
Check Point Harmony SASE (formerly Perimeter 81)
Microsoft Azure VPN Gateway
Ivanti Connect Secure
F5 BIG-IP Access Policy Manager (APM)
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices