Try our new research platform with insights from 80,000+ expert users
Founder at a tech services company with 11-50 employees
Real User
Top 10
Oct 16, 2024
Seamless connectivity through advanced application access and excellent support
Pros and Cons
  • "The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay."
  • "Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric."

What is our primary use case?

I use Remote Access VPN for clientless applications, setting up WireGuard tunnels, and WireGuard VPN as a service. It provides remote access for SIP setups, allowing users to connect securely through a VPN.

What is most valuable?

The most valuable features include application access, clientless application access, and WireGuard. These features make it easy to deploy and offer a user-friendly interface. The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay.

What needs improvement?

Automations for cloud integrations need to be expanded, and currently, developers have to manually configure APIs, which is not developer-centric. Improving this process could enhance the solution's scalability and efficiency.

For how long have I used the solution?

I have used Check Point Remote Access VPN for two and a half years.

Buyer's Guide
Check Point Remote Access VPN
December 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,422 professionals have used our research since 2012.

What do I think about the stability of the solution?

Some connectivity issues arise occasionally, especially when accessing the internet or using other applications. The installed client sometimes reconnects, possibly due to conflicts with existing VPN solutions.

What do I think about the scalability of the solution?

The solution is extremely scalable, with an eight out of ten rating due to its mesh network and ability to build WireGuard tunnels. However, additional automation is required to enhance its enterprise features.

How are customer service and support?

Customer service is excellent. Support is integrated into the product, making it easy to access without needing to search for contact information. There is an icon in the portal for online support, and Check Point local support promptly replies to queries.

How would you rate customer service and support?

Positive

How was the initial setup?

On a scale of one to ten, I would rate the initial setup of Check Point Remote Access VPN as ten because it is super easy to set up.

What's my experience with pricing, setup cost, and licensing?

The pricing is rated eight to 8.5 out of ten. The costs increase with the purchase of advanced features. Licensing issues need to be sorted as different features require separate licenses.

What other advice do I have?

The best solution for small to medium businesses. Licensing issues need to be sorted out. For example, features like CASB and browser security should be bundled. Having automations will help scale to other scenarios.

I'd rate the solution ten out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. consultant
PeerSpot user
JamesYa - PeerSpot reviewer
Senior Solutions Architect at a computer software company with 501-1,000 employees
Real User
Apr 16, 2022
Straightforward installation, reliable, but could be more user-friendly
Pros and Cons
  • "Check Point Remote Access VPN is a stable solution."
  • "Check Point Remote Access VPN could be more user-friendly."

What is our primary use case?

We use Check Point Remote Access VPN to connect to the back-office applications.

What needs improvement?

Check Point Remote Access VPN could be more user-friendly.

For how long have I used the solution?

I have been using Check Point Remote Access VPN for approximately two years.

What do I think about the stability of the solution?

Check Point Remote Access VPN is a stable solution.

What do I think about the scalability of the solution?

We have approximately 2,000 users using this solution. We have plans to increase the usage of the solution.

How are customer service and support?

My internal team does some technical support for our employees. I have not contacted the support from Check Point Remote Access VPN.

Which solution did I use previously and why did I switch?

I have used Microsoft Defender Endpoint previously. I found it to be much more user-friendly than Check Point Remote Access VPN.

How was the initial setup?

The installation of Check Point Remote Access VPN is straightforward. The time it takes for the client installation is two minutes. It is a standard installation.

What about the implementation team?

I did the implementation myself. We have our IT department that is supporting and doing the maintenance of the solution.

What's my experience with pricing, setup cost, and licensing?

There is a license required for this solution.

What other advice do I have?

I rate Check Point Remote Access VPN a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
December 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,422 professionals have used our research since 2012.
Works at a tech vendor with 501-1,000 employees
User
Oct 18, 2021
Easy to set up standard authentication, integrates with third-parties, and allows for browser-based access
Pros and Cons
  • "Access is browser-based only and requires no additional client installation."
  • "We would like to implement HTML5 (clientless access) in the product without installing any additional software."

What is our primary use case?

The Mobile Access VPN is used to provide users with remote access to company resources.

Users can access the system at any time from corporate laptops as well as home PCs.

It is also possible to connect from Android and IOS mobile devices.

We also use the functionality of the secure Capsule Workspace container to securely provide access to corporate Web resources and mailing services from mobile devices.

It is also possible to provide restricted access to partners via SSL VPN using the Check Point Mobile Web Portal fine-tuning.

How has it helped my organization?

This solution allows users to connect from any location. The system is very flexible. We can easily control access and view statistics on the usage of this functionality.

We are also happy with the overall stability of the operation, the easy configuration on the gateway side, and the ease of deploying clients to endstations.

The user device verification functionality allows us to prevent connections if a device does not comply with corporate security policies until the device has met all requirements.

What is most valuable?

When working with different groups of users, we can easily set up both standard authentication by username and password and use two-factor authentication such as SMS + username and password or certificate + username and password. This definitely increases security and allows you to control access.

It is also possible to use third-party tools to customize HTML5 access. For example, the connection is made without the need to install any client on the user side.

Access is browser-based only and requires no additional client installation.

What needs improvement?

We would like to implement HTML5 (clientless access) in the product without installing any additional software.

It would also be desirable to be able to segregate the different authentication methods by domain user group.

Unfortunately at the moment, the division is only between domain and non-domain users.

What we also miss is control over the workstations for non-domain PCs that the client is installed on.

It would be nice if we could block such connections based on, for example, the machine name or connection ID.

For how long have I used the solution?

We have been using this solution since 2007 and started with the R65 version.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1670154 - PeerSpot reviewer
Firewall Engineer at a logistics company with 1,001-5,000 employees
User
Oct 4, 2021
Great MEP functionality, perfect for remote users, and has an easy basic setup
Pros and Cons
  • "For a basic setup, implementation is quite easy."
  • "The non-standard setup is quite complex as you have to do changes via GUI and CLI."

What is our primary use case?

We are hosting environments for our customers and ourselves. With Check Point Client, VPN users that aren't in their internal networks can connect via a secure connection into the internal network.

Remote users use different clients (Windows, Linux, and Mac OS) so depending on the customer, there is either a client connection or a clientless approach (using a web portal).

Users can also be identified if they use the Client VPN solution. If you want to identify them inside the network you have to use an IA agent.

Once set up, it simply works without issues.

How has it helped my organization?

The main advantage is that if you already have a Check Point Gateway in place you don't have to buy additional hardware. You only need to check if there are enough resources on the gateway for the additional load and decide how many concurrent users you need.

The installation was fairly straightforward thanks to the Admin Guide and the User Center.

Adding a Radius or similar to use for the user authentication can also easily be done so you don't have to create local users. Depending on the size of the user base I would also recommend MFA.

What is most valuable?

A normal Check Point Gateway has, with the base license, 5 concurrent users included. This means that in emergency situations you don't have to buy additional licenses.

During Covid, the license was increased and therefore it was easily possible to have several users working from home.

It's possible to either have a client installed on the user's machine, or have a clientless approach using the web portal. 

There is MEP functionality, so, based on the user's location, it minimizes the latency by connecting to the nearest entry point. 

What needs improvement?

The non-standard setup is quite complex as you have to do changes via GUI and CLI. Luckily, Check Point knowledgebase articles help you, however, there are so many resources you have to go through.

The Client VPN licenses are for concurrent users and there is currently no way to prioritize certain users over others.

There is no possibility to increase the number of concurrent users for a short time (except if you have unlimited concurrent users licensed). This could help during emergency situations where there are more client VPN users than anticipated.

For how long have I used the solution?

I've used the product for over 7 years.

How was the initial setup?

For a basic setup, implementation is quite easy.

Disclosure: My company has a business relationship with this vendor other than being a customer. We're a check point partner and also host and administrate our customers environments.
PeerSpot user
it_user1662831 - PeerSpot reviewer
Accounts Administrator at a non-profit with 51-200 employees
User
Sep 2, 2021
Easy to install, stable, and reasonably priced
Pros and Cons
  • "The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup."
  • "They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds."

What is our primary use case?

It allows staff to work from home, especially now during COVID-19. You can access it from any location, and it does not require technical knowledge. 

How has it helped my organization?

If any problem occurs, we are unable to work. An access to VPN enabled organization needs to improve by way of getting work done from any location in order to improve submission of work on time.

What is most valuable?

The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup. It integrates extremely well with the Check Point Firewall.

What needs improvement?

A saving password option might save time for continuous disconnection to the server due to internet fluctuation problems. 

They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds. 

If you don't get on your phone right away and check on your authentications, it will kick you out. 

In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems. 

The interface needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified.

For how long have I used the solution?

I've used the solution for more than three years.

What do I think about the stability of the solution?

The solution's stability is reasonable.

What do I think about the scalability of the solution?

The scalability of the product is reasonable.

How are customer service and technical support?

We've had a satisfactory experience with technical support.

Which solution did I use previously and why did I switch?

We did not previously use a different solution.

How was the initial setup?

The initial setup is straightforward.

What about the implementation team?

We used a vendor to set up the solution. 

What was our ROI?

We've seen a 100% ROI.

What's my experience with pricing, setup cost, and licensing?

The product is offered at a reasonable cost.

Which other solutions did I evaluate?

We did look at other solutions before choosing this product. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Nov 4, 2020
Enables users to easily work from home
Pros and Cons
  • "The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage."
  • "We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved."

What is our primary use case?

We use Check Point Remote Access VPN to provide access to employees and to the company resources, especially now that most people are working from home. That's the main use. We also use it for specific companies that give us remote support to some applications. They access our company servers and resources. We're using Remote Access VPN with a specific profile for them that only gives access to some.

We have two environments. Our firewalls and our perimeter firewalls are Check Point. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.

How has it helped my organization?

Remote Access VPN allows users to work from home very easily. They are very happy with the way they log in with RSA. That's why we use the Foo. It's very stable. We didn't have any issues.

Compared to Pulse Secure, Check Point saves us a couple of hours a week. It's easier to reverse when we have issues. At the moment, most of our company still uses Pulse Secure. But a year ago, we also started deploying some people on Check Point so that we have another option. If we don't want to renew with Pulse Secure the client says we can migrate everyone to Check Point as we already have some people working on the Check Point VPN. 20% of the company uses the Check Point VPN and the rest uses Pulse Secure, which is our main VPN, which is around 100 people.

What is most valuable?

The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware. This was a big advantage. 

The integration with two-factor authentication for Remote Access users is another valuable feature. In our case we use RSA.

Those two are the most valuable aspects that we have on the solution. It also gives us the possibility to securely connect to the company resources, without Check Point security measures.

Another good thing we like is that we already have all the logs from the firewall on the SmartPortal as the remote VPN also integrates into the firewall. We can see all the logs on the same tool because we also have a fully secure solution for Remote Access VPN. For full security, we need to manage the different hardware from the firewalls and the logs that are not in the same place. This is another valuable aspect of this solution. 

Having access to those logs affects our security operations because if a user calls the support but does not have access to the VPN, we can see on the same tool on the SmartPortal. If he's being blocked on the firewall policy, you can see it with the VPN profile.

If the user is using Foo, we need to go to the Check Point firewall to see the Check Point firewall log on the perimeter firewall, to see if the user is crossing the firewall to get the Foo. Then we need to go to the supplier to see that the logs are there. So we need to go to two places.

What needs improvement?

We are very happy with the Windows client. You log in with the VPN for the full client, you do the log in there. But for Linux machines, they don't have a full client to install. It is important because we have some users that use Linux and they don't have a specific application from Check Point to use. That is something that could be improved. 

For how long have I used the solution?

I have been using Check Point Remote Access VPN for around one year. 

What do I think about the stability of the solution?

We don't have any stability issues.

What do I think about the scalability of the solution?

It is very scalable in a way that we can share the configuration for Remote VPN amongst our perimeter firewall so we can implement the Remote VPN with the same profiles and the same configuration easily on all of them. It's very scalable.

We are still studying the possibility of migrating everyone to Check Point VPN, but a decision has to be made because we still have a lot of people using Pulse Secure.

How are customer service and technical support?

We haven't used technical support specifically for Remote Access VPN. We use it for other products, but not for this one. In general, their support is good, especially if you work with the Israel team. Because of the time zones, we try to call when they are available. The support is usually in. The other ones are also good but in most cases, the Israel team is better.

Which solution did I use previously and why did I switch?

Our team finds that Pulse Security is a bit difficult to configure. It's not very straightforward. We are used to it now. Management is easier on Check Point. Our managers wanted us to have to study some alternatives to Pulse Secure so that if the price was too high, or if we wanted to move to another solution, we would already have an idea about other solutions. We chose Check Point as we already had the firewall. It has worked well until now. We already have some people using the Check Point VPN and we are ready to move everyone. 

Pulse Secure was more difficult because of all the things that you need to for the setup. You need to do four or five things to set up a profile and some of them don't make any sense. It's difficult for a person that's never used Pulse to understand the philosophy of the configuration and to create different profiles. It's not very straightforward.

How was the initial setup?

The initial setup was straightforward, especially because we already have the firewall implemented. So we only needed to enable the features and do some configurations, which were not hard to do. They were really fit. 

It took two days. We did our own thing. The implementation strategy was to first have only two or three users from the IT team to test it. Then we allowed it to extend to some teams.

What about the implementation team?

Two team members did the deployment. 

We require three full-time network security engineers for maintenance. We manage all the solutions on the security side of our company. Specifically Remote Access VPN requires three hours of maintenance a week.

What was our ROI?

The return on investment is that we have a stable VPN solution to provide our employees, which is very important. Especially now with the virus, we have more than 50% of people working from home and using the VPN solutions. Our return on investment is the ability to allow people to work remotely in a secure way and a stable VPN.

What's my experience with pricing, setup cost, and licensing?

As far as I'm aware, Check Point is on the same line of pricing with Pulse at the moment. It's not any different. It is in line with the competition. There are no additional costs that I'm aware of. 

What other advice do I have?

It's not hard to deploy the solution. Remote Access VPN is easier to deploy than some other solutions like Pulse Secure.

If you already have a Check Point firewall, this remote solution is a win-win because you don't need to buy, manage, or do a hardware refresh when you enter the end of life. You will have centralized logs on the same tools. If you have a Check Point firewall, this solution is the best for you.

I would rate Check Point Remote Access VPN a nine out of ten. 

It works very well. I would say it's almost the perfect solution. As far as I'm aware, it's one of the oldest solutions from Check Point. So it's very, very stable. They have a lot of years of working with it.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
reviewer1144182 - PeerSpot reviewer
Assistant General Manager IT at a non-tech company with 1,001-5,000 employees
Real User
Apr 22, 2020
A comfortable interface that provides access to our data and business applications
Pros and Cons
  • "Our users find the interface very comfortable to use."
  • "There is always room for innovation and the addition of new features."

What is our primary use case?

In our current dynamic, we are using this solution to provide access to data and some business applications over the internet.

What is most valuable?

Our users find the interface very comfortable to use.

What needs improvement?

There is always room for innovation and the addition of new features.

For how long have I used the solution?

We have been using this VPN for more than ten years.

What do I think about the stability of the solution?

With respect to stability, Check Point has been running smoothly and we haven't had any issues.

What do I think about the scalability of the solution?

We have about 500 people using this solution in our company during the COVID-19 pandemic. Prior to that, we had an average of 100 daily users.

How are customer service and technical support?

We are satisfied with the support.

Which other solutions did I evaluate?

We are always searching to see if there is anything new in the market.

What other advice do I have?

Currently, Check Point is meeting all of our requirements. That said, there is always a chance of innovation and something new.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
PeerSpot user
Senior System Engineer with 11-50 employees
Real User
Jan 27, 2020
Stable solution but they should strengthen their security features
Pros and Cons
  • "The initial set up is not complex."
  • "They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."

What is our primary use case?

A lot of our clients are complimentary companies, like the electrical company. They need Check Point Remote Access VPN, or even another similar solution. I tell them that I already have the VPN solution in our company.

What needs improvement?

In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.

For how long have I used the solution?

I have been using Check Point for about one year.

What do I think about the stability of the solution?

I have not heard any complaints from the clients regarding its stability. I think it's stable for them.

What do I think about the scalability of the solution?

Not all of our clients who use Check Point VPN are in Thailand. Some government agencies, like the Electric City Company, are in Thailand. They use it formally. Their IT and telecom departments, those who require a secure network, are using it.

How are customer service and technical support?

I have not contacted customer support yet because I take care of any issues from here. That's why I don't have their programming disk because I take care of it myself, including the configuration and the DSL in Check Point.

Which solution did I use previously and why did I switch?

We still use other products.

How was the initial setup?

The initial setup is not complex. Plus, we've got the Kryon system. So these systems make it easier for the user. We have known this product for a while, that's why it's not a problem to configure the system.

What other advice do I have?

I don't have any advice yet.

On a scale of one to ten, I'd give Check Point Remote Access VPN a seven.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.