I use Remote Access VPN for clientless applications, setting up WireGuard tunnels, and WireGuard VPN as a service. It provides remote access for SIP setups, allowing users to connect securely through a VPN.
Founder at Isecurex
Seamless connectivity through advanced application access and excellent support
Pros and Cons
- "The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay."
- "Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric."
What is our primary use case?
What is most valuable?
The most valuable features include application access, clientless application access, and WireGuard. These features make it easy to deploy and offer a user-friendly interface. The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay.
What needs improvement?
Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric. Improving this process could enhance the solution's scalability and efficiency.
For how long have I used the solution?
I have used Check Point Remote Access VPN for two and a half years.
Buyer's Guide
Check Point Remote Access VPN
March 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.
What do I think about the stability of the solution?
Some connectivity issues arise occasionally, especially when accessing the internet or using other applications. The installed client sometimes reconnects, possibly due to conflicts with existing VPN solutions.
What do I think about the scalability of the solution?
The solution is extremely scalable, with an eight out of ten rating due to its mesh network and ability to build WireGuard tunnels. However, additional automation is required to enhance its enterprise features.
How are customer service and support?
Customer service is excellent. Support is integrated into the product, making it easy to access without needing to search for contact information. There is an icon in the portal for online support, and Check Point local support promptly replies to queries.
How was the initial setup?
On a scale of one to ten, I would rate the initial setup of Check Point Remote Access VPN as ten because it is super easy to set up.
What's my experience with pricing, setup cost, and licensing?
The pricing is rated eight to 8.5 out of ten. The costs increase with the purchase of advanced features. Licensing issues need to be sorted as different features require separate licenses.
What other advice do I have?
The best solution for small to medium businesses. Licensing issues need to be sorted out. For example, features like CASB and browser security should be bundled. Having automations will help scale to other scenarios.
I'd rate the solution ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. consultant
Independent Information Technology And Services Professional at a non-profit with 1-10 employees
Advanced threat protection and valuable features enhance security with great support
Pros and Cons
- "The advanced malware protection and the sandboxing features are very valuable as they perform well, with detection being very high."
- "There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients."
What is our primary use case?
For remote work, Check Point Remote Access VPN connects, creates the site, and gathers information about the site in terms of the VPN domain, the public IP at that time, and so on.
How has it helped my organization?
The Check Point products provide solid detection and advanced malware protection, which helps safeguard the organization’s security infrastructure. The platform offers essential features like sandboxing that perform well in threat detection.
What is most valuable?
The advanced malware protection and the sandboxing features are very valuable as they perform well, with detection being very high. Additionally, the panel features are also solid.
What needs improvement?
There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients. Another downside is related to performance, which lags behind similarly priced products like those from Palo Alto. The platform becomes layered with add-ons, moving away from its original simplicity, which poses a problem.
For how long have I used the solution?
I have been using Check Point since version 4.1, which amounts to about 15 years.
What do I think about the stability of the solution?
I rate the stability of Check Point Remote Access VPN as a seven out of ten. I experienced an issue when there was a recent upgrade to address a vulnerability that required the use of both a VPN user and a password along with a certificate or another form of identity confirmation. This was not mentioned in the upgrade notes, which initially caused some problems.
What do I think about the scalability of the solution?
The scalability of Check Point Remote Access VPN is decent. On a scale of one to ten, I rate it a seven.
How are customer service and support?
Check Point's support has always been great. They are very responsive, and we always get technically capable people. I would rate their support a nine or nine point five out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have worked with multiple vendors, including Palo Alto and Fortinet.
How was the initial setup?
For someone new to Check Point products or coming from managing other products, the setup can be difficult. However, for someone familiar with Check Point, the setup hasn't changed much over the years.
What was our ROI?
I am on the technical side and do not typically consider the business returns or ROI of the product.
What's my experience with pricing, setup cost, and licensing?
I am not familiar with the exact pricing details. However, the pricing for the basic remote access VPN is a lot less than that of other vendors, and it comes with many features within the basic package.
Which other solutions did I evaluate?
I have compared Check Point with Palo Alto. Palo Alto is more GUI-based, which makes it easier to use, but it requires more configuration knowledge.
What other advice do I have?
For regular users, Check Point firewalls are easier to configure compared to Palo Alto's. In terms of detection rates and performance, both Check Point and Palo Alto are very good.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Check Point Remote Access VPN
March 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.
Head of IT Department at AS Attīstības finanšu institūcija Altum
Customizable, and secure, but has poor technical support
Pros and Cons
- "The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
- "The provisioning of VPN users has room for improvement."
What is our primary use case?
We use Check PointVPN to securely connect to our main office systems, which are behind a firewall. This ensures that all incoming and outgoing traffic is encrypted and secure.
What is most valuable?
The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature.
What needs improvement?
The provisioning of VPN users has room for improvement.
The solution can improve by providing an option to centrally manage and upgrade client applications on a PC.
For how long have I used the solution?
I have been using the solution for five years.
What do I think about the stability of the solution?
We found the previous checkpoint version to be quite unstable, as it would occasionally cause issues with the VPN caching every two months. However, we have since updated the solution and the stability has improved significantly, with no further occurrences of this issue.
What do I think about the scalability of the solution?
The solution is licensed-based, so to scale up we only need to add more licenses.
How are customer service and support?
The tech support isn't great. They take a long time to get to our ticket. Their initial response was fast, but after we provided the information they asked for, there was a month of silence before we updated the ticket again. Ultimately, the problem was resolved with newer versions without any response from tech support.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I previously used Mikro Tik VPN which is cheap and includes enterprise features but is hard to configure.
How was the initial setup?
The initial setup is straightforward if we are knowledgeable about the task at hand. However, it is recommended to consider a few things and to have a reliable technical support team to assist with the initial deployment. For a small company, the first step is relatively straightforward. However, if we are looking to scale up, we may need to enlist the help of a consultant to properly configure the necessary parameters, as there are many of them to consider.
Once we have configured users, access lists, written firewall rules, and deployed clients to endpoints, the next step is to educate employees on how to use the solution.
On average the deployment took around two weeks to configure all the certificates. This included preparing laptops and PCs. For just the VPN with central management deployment, it would take one week.
Our deployment was completed by two people.
What's my experience with pricing, setup cost, and licensing?
I give the price of the solution a five out of ten.
We have a subscription-based license.
What other advice do I have?
I give the solution a seven out of ten.
We have 250 people using the solution in our organization.
Managing updates to endpoints can be a bit of a hassle, but there isn't much maintenance required.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Accounts Administrator at a non-profit with 51-200 employees
Easy to install, stable, and reasonably priced
Pros and Cons
- "The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup."
- "The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup."
- "They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds."
- "If any problem occurs, we are unable to work."
What is our primary use case?
It allows staff to work from home, especially now during COVID-19. You can access it from any location, and it does not require technical knowledge.
How has it helped my organization?
If any problem occurs, we are unable to work. An access to VPN enabled organization needs to improve by way of getting work done from any location in order to improve submission of work on time.
What is most valuable?
The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup. It integrates extremely well with the Check Point Firewall.
What needs improvement?
A saving password option might save time for continuous disconnection to the server due to internet fluctuation problems.
They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds.
If you don't get on your phone right away and check on your authentications, it will kick you out.
In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems.
The interface needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.
For how long have I used the solution?
I've used the solution for more than three years.
What do I think about the stability of the solution?
The solution's stability is reasonable.
What do I think about the scalability of the solution?
The scalability of the product is reasonable.
How are customer service and technical support?
We've had a satisfactory experience with technical support.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
We used a vendor to set up the solution.
What was our ROI?
We've seen a 100% ROI.
What's my experience with pricing, setup cost, and licensing?
The product is offered at a reasonable cost.
Which other solutions did I evaluate?
We did look at other solutions before choosing this product.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Enables users to easily work from home
Pros and Cons
- "The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
- "Our return on investment is the ability to allow people to work remotely in a secure way and a stable VPN."
- "We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."
- "We are very happy with the Windows client, but for Linux machines, they don't have a full client to install, which is important because we have some users that use Linux and they don't have a specific application from Check Point to use."
What is our primary use case?
We use Check Point Remote Access VPN to provide access to employees and to the company resources, especially now that most people are working from home. That's the main use. We also use it for specific companies that give us remote support to some applications. They access our company servers and resources. We're using Remote Access VPN with a specific profile for them that only gives access to some.
We have two environments. Our firewalls and our perimeter firewalls are Check Point. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.
How has it helped my organization?
Remote Access VPN allows users to work from home very easily. They are very happy with the way they log in with RSA. That's why we use the Foo. It's very stable. We didn't have any issues.
Compared to Pulse Secure, Check Point saves us a couple of hours a week. It's easier to reverse when we have issues. At the moment, most of our company still uses Pulse Secure. But a year ago, we also started deploying some people on Check Point so that we have another option. If we don't want to renew with Pulse Secure the client says we can migrate everyone to Check Point as we already have some people working on the Check Point VPN. 20% of the company uses the Check Point VPN and the rest uses Pulse Secure, which is our main VPN, which is around 100 people.
What is most valuable?
The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage.
The integration with two-factor authentication for Remote Access users is another valuable feature. In our case we use RSA.
Those two are the most valuable aspects that we have on the solution. It also gives us the possibility to securely connect to the company resources, without Check Point security measures.
Another good thing we like is that we already have all the logs from the firewall on the SmartPortal as the remote VPN also integrates into the firewall. We can see all the logs on the same tool because we also have a fully secure solution for Remote Access VPN. For full security, we need to manage the different hardware from the firewalls and the logs that are not in the same place. This is another valuable aspect of this solution.
Having access to those logs affects our security operations because if a user calls the support but does not have access to the VPN, we can see on the same tool on the SmartPortal. If he's being blocked on the firewall policy, you can see it with the VPN profile.
If the user is using Foo, we need to go to the Check Point firewall to see the Check Point firewall log on the perimeter firewall, to see if the user is crossing the firewall to get the Foo. Then we need to go to the supplier to see that the logs are there. So we need to go to two places.
What needs improvement?
We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved.
For how long have I used the solution?
I have been using Check Point Remote Access VPN for around one year.
What do I think about the stability of the solution?
We don't have any stability issues.
What do I think about the scalability of the solution?
It is very scalable in a way that we can share the configuration for Remote VPN amongst our perimeter firewall so we can implement the Remote VPN with the same profiles and the same configuration easily on all of them. It's very scalable.
We are still studying the possibility of migrating everyone to Check Point VPN, but a decision has to be made because we still have a lot of people using Pulse Secure.
How are customer service and technical support?
We haven't used technical support specifically for Remote Access VPN. We use it for other products, but not for this one. In general, their support is good, especially if you work with the Israel team. Because of the time zones, we try to call when they are available. The support is usually in. The other ones are also good but in most cases, the Israel team is better.
Which solution did I use previously and why did I switch?
Our team finds that Pulse Security is a bit difficult to configure. It's not very straightforward. We are used to it now. Management is easier on Check Point. Our managers wanted us to have to study some alternatives to Pulse Secure so that if the price was too high, or if we wanted to move to another solution, we would already have an idea about other solutions. We chose Check Point as we already had the firewall. It has worked well until now. We already have some people using the Check Point VPN and we are ready to move everyone.
Pulse Secure was more difficult because of all the things that you need to for the setup. You need to do four or five things to set up a profile and some of them don't make any sense. It's difficult for a person that's never used Pulse to understand the philosophy of the configuration and to create different profiles. It's not very straightforward.
How was the initial setup?
The initial setup was straightforward, especially because we already have the firewall implemented. So we only needed to enable the features and do some configurations, which were not hard to do. They were really fit.
It took two days. We did our own thing. The implementation strategy was to first have only two or three users from the IT team to test it. Then we allowed it to extend to some teams.
What about the implementation team?
Two team members did the deployment.
We require three full-time network security engineers for maintenance. We manage all the solutions on the security side of our company. Specifically Remote Access VPN requires three hours of maintenance a week.
What was our ROI?
The return on investment is that we have a stable VPN solution to provide our employees, which is very important. Especially now with the virus, we have more than 50% of people working from home and using the VPN solutions. Our return on investment is the ability to allow people to work remotely in a secure way and a stable VPN.
What's my experience with pricing, setup cost, and licensing?
As far as I'm aware, Check Point is on the same line of pricing with Pulse at the moment. It's not any different. It is in line with the competition. There are no additional costs that I'm aware of.
What other advice do I have?
It's not hard to deploy the solution. Remote Access VPN is easier to deploy than some other solutions like Pulse Secure.
If you already have a Check Point firewall, this remote solution is a win-win because you don't need to buy, manage, or do a hardware refresh when you enter the end of life. You will have centralized logs on the same tools. If you have a Check Point firewall, this solution is the best for you.
I would rate Check Point Remote Access VPN a nine out of ten.
It works very well. I would say it's almost the perfect solution. As far as I'm aware, it's one of the oldest solutions from Check Point. So it's very, very stable. They have a lot of years of working with it.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees
A comfortable interface that provides access to our data and business applications
Pros and Cons
- "Our users find the interface very comfortable to use."
- "Currently, Check Point is meeting all of our requirements."
- "There is always room for innovation and the addition of new features."
- "There is always room for innovation and the addition of new features."
What is our primary use case?
In our current dynamic, we are using this solution to provide access to data and some business applications over the internet.
What is most valuable?
Our users find the interface very comfortable to use.
What needs improvement?
There is always room for innovation and the addition of new features.
For how long have I used the solution?
We have been using this VPN for more than ten years.
What do I think about the stability of the solution?
With respect to stability, Check Point has been running smoothly and we haven't had any issues.
What do I think about the scalability of the solution?
We have about 500 people using this solution in our company during the COVID-19 pandemic. Prior to that, we had an average of 100 daily users.
How are customer service and technical support?
We are satisfied with the support.
Which other solutions did I evaluate?
We are always searching to see if there is anything new in the market.
What other advice do I have?
Currently, Check Point is meeting all of our requirements. That said, there is always a chance of innovation and something new.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
Senior System Engineer at Thai Transmission Industry
Stable solution but they should strengthen their security features
Pros and Cons
- "The initial set up is not complex."
- "The initial setup is not complex, and with the Kryon system it makes it easier for the user because we have known this product for a while, so it's not a problem to configure the system."
- "They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
- "They could add more features, like the security to block off the doors, or create another hatch, something like this."
What is our primary use case?
A lot of our clients are complimentary companies, like the electrical company. They need Check Point Remote Access VPN, or even another similar solution. I tell them that I already have the VPN solution in our company.
What needs improvement?
In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.
For how long have I used the solution?
I have been using Check Point for about one year.
What do I think about the stability of the solution?
I have not heard any complaints from the clients regarding its stability. I think it's stable for them.
What do I think about the scalability of the solution?
Not all of our clients who use Check Point VPN are in Thailand. Some government agencies, like the Electric City Company, are in Thailand. They use it formally. Their IT and telecom departments, those who require a secure network, are using it.
How are customer service and technical support?
I have not contacted customer support yet because I take care of any issues from here. That's why I don't have their programming disk because I take care of it myself, including the configuration and the DSL in Check Point.
Which solution did I use previously and why did I switch?
We still use other products.
How was the initial setup?
The initial setup is not complex. Plus, we've got the Kryon system. So these systems make it easier for the user. We have known this product for a while, that's why it's not a problem to configure the system.
What other advice do I have?
I don't have any advice yet.
On a scale of one to ten, I'd give Check Point Remote Access VPN a seven.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Tech Security Management at a logistics company with 1,001-5,000 employees
Simple management, quick search capabilities, and very good stability
Pros and Cons
- "The management of the solution is very simple. It allows for a single view of all the endpoints."
- "The differentiator for this solution is the management interface that we find very good and provides a single view for all endpoints."
- "I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
- "I cannot see the full effect of the antibot solution because it relies on having access to the DNS queries, which might not go through the Check Point firewall when you're using it for perimeter networks."
What is most valuable?
The differentiator for this solution is the management interface that we find very good and provides a single view for all endpoints. The solution offers SmartLog that allows quick searches. The compliance modules are also very interesting.
What needs improvement?
I cannot see the full effect of the antibot solution because it relies on having access to the DNS queries, which might not go through the Check Point firewall when you're using it for perimeter networks. In this case Check Point will not identify the actual source of the DNS queries associated with antibot activity. This may be related to the customer architecture, however, and not due to product limitation. I don't know if it can be improved on the Check Point side or not.
The solution should allow for the automatic identification of destinations.
We have a URL qualification on the on-premises deployment model; this should also be the case on the cloud. The automatic classification should be done by the cloud team instead of having to specify or subscribe to a RSS for the information, we should be able to have an object that represents such cloud services. It's possible that Check Point already allows for this, but if they don't they should.
For how long have I used the solution?
We've been using the solution for about 20 years.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The stability depends on the setup. If the solution resides on a specific appliance, it is not scalable. It has a fixed capacity. However, if you move it onto different environments, cloud environments, it will become scalable. Right now, we have about 4,000 users in the current network and about 500 remote access users.
How are customer service and technical support?
Technical support is reasonable. It depends on the level of support you are willing to pay for, however. You can choose to have a company working for you with intermediate support with Check Point, or you can choose to have direct advanced support.
How was the initial setup?
The initial setup has a moderate amount of complexity. It's acceptable. However, the graphical display of the user chart of network usage, and the ability to zero in on the current graphics could be improved.
What other advice do I have?
We currently only use the on-premises deployment model, although we may extend into the cloud in the future. We're aware of the cloud's capabilities, but we're not using it because we don't have a large infrastructure expression there.
In terms of advice, I'd suggest that others implementing the solution make sure training happens on their teams. Most products can have lots of features, but if you do not have proper knowledge, you will not be able to make use of those features.
I'm very satisfied with this solution; I'd rate it eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Popular Comparisons
Microsoft Intune
Prisma Access by Palo Alto Networks
Fortinet FortiClient
Workspace ONE UEM
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
Claroty Platform
Microsoft Remote Desktop Services
Check Point Harmony SASE (formerly Perimeter 81)
OpenVPN Access Server
Cisco Secure Client (including AnyConnect)
F5 BIG-IP Access Policy Manager (APM)
Ivanti Connect Secure
Microsoft Azure VPN Gateway
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices














