Try our new research platform with insights from 80,000+ expert users
Technical Specialist at Softcell Technologies Limited
Real User
Top 5Leaderboard
Enables remote connectivity and efficient traffic management with split tunneling
Pros and Cons
  • "Overall, I rate Check Point Remote Access VPN a nine."
  • "Check Point Remote Access VPN can be improved by having more granular options to steer traffic, like easier configurations for split tunneling, which is currently complex."

What is our primary use case?

The main use case is connecting employees at remote locations. If users are not sitting in the LAN network and are connecting from office or home networks, they can access the organization's internal resources. We have set up remote access VPN for a client so their users can connect from anywhere in the world at any time to access their internal resources.

What is most valuable?

One of the best features is split tunneling, which allows steering what traffic is sent from the VPN tunnel. This is valuable because it reduces the load on the perimeter firewall by directing only required traffic through it. Traffic such as Office 365, which is protected by Microsoft, can be redirected to the local internet breakout. Split tunneling also improves network traffic management efficiency. We can manually assign static IP addresses to users in the Remote Access VPN configurations.

What needs improvement?

Check Point Remote Access VPN can be improved by having more granular options to steer traffic, like easier configurations for split tunneling, which is currently complex. It would be beneficial to have the configuration process become more efficient. Adding AI-related features in future releases would also be an improvement.

For how long have I used the solution?

I have been using Check Point Remote Access VPN for around two years. We have a client who relies on it to connect their remote users to internal resources.
Buyer's Guide
Check Point Remote Access VPN
October 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
871,358 professionals have used our research since 2012.

How was the initial setup?

The initial setup is not complex. It is straightforward and involves integrating Active Directory for the Remote Access VPN users list and setting up the rest of the policies.

What was our ROI?

With two thousand remote access VPN users, the solution allows employees to work from anywhere around the world, providing great feasibility and flexibility. It reduces the dependency on being physically present in the office and enhances the overall user experience, saving time and maintaining security.

What's my experience with pricing, setup cost, and licensing?

The pricing, setup cost, and licensing are straightforward, though the setup is a bit expensive. However, this is worthwhile given the security levels provided by Check Point.

What other advice do I have?

For organizations facing heavy loads on perimeter firewalls, implementing a split tunnel approach with Remote Access VPN will definitely help reduce the load. Understanding and utilizing features like split tunneling can maintain smooth operations. Overall, I rate Check Point Remote Access VPN a nine. The solution is good, and I am waiting for new innovations and AI features, which could make it even better.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
reviewer2753559 - PeerSpot reviewer
Cyber Security Solution Engineer at a computer software company with 201-500 employees
Real User
Top 5Leaderboard
Strong encryption and reliable connectivity improve remote work for employees, offering enhanced productivity and seamless secure access
Pros and Cons
  • "Check Point Remote Access VPN has positively impacted my organization by enabling secure remote work without compromising data security, improving employee productivity by providing reliable access anytime, anywhere, and reducing the risk of unauthorized access through strong authentication and policy enforcement."
  • "Check Point Remote Access VPN could be improved in that the initial setup and configuration could be simplified for new users."

What is our primary use case?

My main use case for Check Point Remote Access VPN is secure remote access for employees working from home and remote employees, protect corporate network and resources with strong encryption, and provide reliable connectivity for day-to-day operations.

A quick, specific example of how my team uses Check Point Remote Access VPN in a real-world scenario is during remote work, where an employee connects securely to internal applications without exposing them to the internet. It also helps to maintain business continuity during travel restrictions by giving staff safe access to company resources and sensitive data protected even after access from a public network.

How has it helped my organization?

Check Point Remote Access VPN has positively impacted my organization by enabling secure remote work without compromising data security, improving employee productivity by providing reliable access anytime, anywhere, and reducing the risk of unauthorized access through strong authentication and policy enforcement.

I've noticed productivity improvements since using Check Point Remote Access VPN, as employees connect quickly without needing a complex setup, saving time daily. Secure remote access allows them to work seamlessly from home, client sites, or traveling, and it has reduced downtime since staff can access critical applications without interruption.

What is most valuable?

The best features Check Point Remote Access VPN offers in my experience are strong encryption, secure tunneling for remote connection, seamless integration with Check Point Firewall and other security products, and reliable performance with stable connectivity for end users.

The seamless integration with Check Point Remote Access VPN works for my team because VPN policies are managed directly within the Check Point Firewall, reducing extra configuration. Apart from that, centralized management ensures consistent security rules across remote and on-premises users, which is valuable because it saves time, lowers complexity, and strengthens overall security posture.

What needs improvement?

Check Point Remote Access VPN could be improved in that the initial setup and configuration could be simplified for new users. Apart from that, the user interface can feel outdated compared to modern VPN clients, and more detailed connection analytics and reporting would be helpful.

For how long have I used the solution?

I have been using Check Point Remote Access VPN for the past one year.

What do I think about the scalability of the solution?

The scalability of Check Point Remote Access VPN is good as it supports a large number of remote users simultaneously. Flexible licensing allows expansion as the workforce grows, and it performs reliably even under heavy usage during peak remote work periods.

How are customer service and support?

The customer support for Check Point Remote Access VPN is good, but occasionally it can take longer than expected to respond.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

How was the initial setup?

My experience with pricing, setup cost, and licensing was good.

What was our ROI?

What made my experience good with Check Point Remote Access VPN is that it is affordable and it can provide both money and time savings.

What's my experience with pricing, setup cost, and licensing?

I purchased Check Point Remote Access VPN through the AWS Marketplace.

Which other solutions did I evaluate?

Before choosing Check Point Remote Access VPN, I did not evaluate any other options.

What other advice do I have?

I would rate Check Point Remote Access VPN overall as eight out of ten.

My advice to others looking into using Check Point Remote Access VPN is to plan your deployment with proper firewall and policy configuration in advance, use strong authentication methods such as multi-factor authentication to maximize security, and test performance before rolling it out.

My company has a business relationship with this vendor as we are a partner.

I was not offered a gift card for this review and I do not have any additional thoughts regarding Check Point Remote Access VPN.

I found this interview good, and I do not think anything needs to change for the future.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
October 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
871,358 professionals have used our research since 2012.
Abnet Tsegaye Belay - PeerSpot reviewer
Cybersecurity Engineer at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Remote access solutions have improved security with multi-factor authentication and endpoint compliance scanning
Pros and Cons
  • "Check Point Remote Access VPN offers multi-factor authentication when connecting to organizational networks, which adds an extra layer of security by requiring multiple verification steps when users connect."
  • "One area that could be improved is the complexity of setting up Check Point Remote Access VPN, particularly with features like multi-factor authentication, single sign-on, and identity awareness. Deploying these solutions requires higher technical expertise than other solutions."

What is our primary use case?

We are resellers of Check Point products in our country, and our customers use Check Point Remote Access VPN to keep their organization data clean and safe when users access remotely through the client. They use Check Point Remote Access VPN for complex setups requiring technical expertise, such as accessing resources in the organization's private networks. Most of the time, we deploy Check Point Remote Access VPN on banking centers, where they use it to access business data behind their firewalls. Check Point Remote Access VPN supports various platforms, including Windows, MacOS, and mobile devices.

How has it helped my organization?

Whenever we deploy Check Point Remote Access VPN on customer sites, they tell us that this feature improves their access to organizational data, as many employees need remote access to work from their premises or home networks. During this time, company data is vulnerable to attacks due to insecure connections to organizational data. Check Point Remote Access VPN fills this gap by keeping organizational data secure from unauthorized access, providing multi-factor authentication, checking device health status, and assessing the device security posture through the endpoint compliance scanning feature. It improves remote connection and protects the organization's network from cybercriminals.

What is most valuable?

Check Point Remote Access VPN offers multi-factor authentication when connecting to organizational networks, which adds an extra layer of security by requiring multiple verification steps when users connect. This reduces the risk of unauthorized access. Additionally, there's endpoint compliance scanning, which ensures that devices that do not fulfill compliance requirements cannot connect to the network, preventing compromised devices from infiltrating the network. These features are fundamental in protecting organizations from unauthorized access and cyber threats by scanning devices and authenticating users properly.

What needs improvement?

One area that could be improved is the complexity of setting up Check Point Remote Access VPN, particularly with features like multi-factor authentication, single sign-on, and identity awareness. Deploying these solutions requires higher technical expertise than other solutions. Additionally, compared to customer-grade solutions, Check Point Remote Access VPN is more expensive. For example, FortiClient offers a free client, which differs from Check Point VPN.

For how long have I used the solution?

I have deployed Check Point Remote Access VPN over the past 2 years, and I am familiar with Check Point products, including the firewall features and blades and Remote Access VPN. For two years, I have deployed Check Point VPN or Remote Access VPN many times.

What do I think about the stability of the solution?

Check Point Remote Access VPN is stable, and we haven't received any complaints from our customers regarding its stability until now.

What do I think about the scalability of the solution?

Check Point Remote Access VPN is scalable because it supports various platforms and can adapt to different organizational needs.

How are customer service and support?

Contacting the Technical Assistance Centers (TACs) initially can be difficult, but once I get in touch with the TAC team, it is easy to solve problems. However, the first steps can be challenging.

Which solution did I use previously and why did I switch?

Our customers used to connect to their organizational data using AnyDesk, which is a free VPN tool. However, we switched to Check Point Remote Access VPN because of its firewall features and incorporated them into our firewall setup.

How was the initial setup?

Deploying Check Point solutions requires higher technical expertise and can be complex, but it is manageable with knowledgeable staff.

What's my experience with pricing, setup cost, and licensing?

In terms of pricing, Check Point Remote Access VPN is not the most cost-effective option compared to other vendors. However, negotiations with Check Point are very good.

Which other solutions did I evaluate?

We evaluated Fortinet FortiClient before choosing Check Point Remote Access VPN.

What other advice do I have?

If you want to see a return on your investments quickly, prioritize purchasing Check Point Remote Access VPN with integration in Check Point firewall features. I rate Check Point Remote Access VPN an eight out of ten because it is great at what it does, but I deducted two points due to the complexity of the setup and the need for technical expertise.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
reviewer2701569 - PeerSpot reviewer
Enterprise Network Engineer at a outsourcing company with 201-500 employees
Real User
Top 5Leaderboard
Saves time during downtimes and integrates firewall and VPN policy management
Pros and Cons
  • "Check Point Remote Access VPN has positively impacted my organization by improving productivity and given us a workaround in times of downtime."

    What is our primary use case?

    My main use case for Check Point Remote Access VPN is for remote employee access.

    What is most valuable?

    The best features Check Point Remote Access VPN offers include the fact that you can configure the VPN access in Smart Console, which is important for me because that saves me another sort of window to configure and to monitor that I have to keep switching in between.

    I just do VPN policies in the same place where my firewall policies are.

    Check Point Remote Access VPN has positively impacted my organization by improving productivity and given us a workaround in times of downtime.

    Unless it's specifically the data center that is down, if it's any other place besides the data center, we definitely have business continuity.

    What needs improvement?

    I think Check Point Remote Access VPN can be improved as it's more of an annoyance for a good number of the clients because it doesn't save their credentials.

    Even if it's just timed out, you sort of need to do manual entry.

    This is typically how security should be, but users get annoyed by it.

    As it runs in the background, it's not really easy to stop it from running persistently.

    Additionally, regarding the notifications, I'm yet to find an easy way to disable them.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for three years.

    What do I think about the stability of the solution?

    Check Point Remote Access VPN is stable.

    What do I think about the scalability of the solution?

    I haven't tried scaling Check Point Remote Access VPN, so I wouldn't have a feasible answer.

    How are customer service and support?

    The customer support experience for Check Point Remote Access VPN is smooth.

    How would you rate customer service and support?

    Positive

    What was our ROI?

    I have definitely seen a return on investment from using Check Point Remote Access VPN, as time saved is money saved.

    We can work around our general downtimes by having users connect via VPN.

    Continuous operations mean basically saving money.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing for Check Point Remote Access VPN was smooth.

    What other advice do I have?

    I would advise others looking into using Check Point Remote Access VPN that this is a very powerful solution.

    Unlike many of the other solutions, posture is a very big add-on.

    I would advise them to get the solution when they're in need of a remote VPN access solution.

    Unlike most of the VPN clients, if you're doing the one from Check Point, you also get posture in the same client.

    Before it grants the user access, it will first establish posture.

    That is one of the underrated add-ons that it has that people should appreciate more.

    On a scale of 1-10, I rate Check Point Remote Access VPN a 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Flag as inappropriate
    PeerSpot user
    Nagendra Nekkala - PeerSpot reviewer
    Senior Manager ICT & Innovations at Bangalore International Airport Limited
    Real User
    Top 5Leaderboard
    A user-friendly tool with easy maintenance and installation phases
    Pros and Cons
    • "It is a scalable solution...The technical support team of the solution is very good."
    • "Check Point Remote Access VPN's connectivity and establishment takes time and needs to be faster."

    What is our primary use case?

    Right now, my company connects with the vendors of Check Point whenever any maintenance is required, and not to our domain.

    What is most valuable?

    Check Point Remote Access VPN is a highly secured product with which, in our company, we can get end-to-end VPN connectivity so that the communication part is highly secured.

    What needs improvement?

    Check Point Remote Access VPN's connectivity and establishment takes time and needs to be faster.

    In the future, Check Point Remote Access VPN should provide its users with URL filtering.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for ten years. My company is a customer and end-user of Check Point.

    What do I think about the stability of the solution?

    Though the solution is stable, sometimes the latest updates are not available, especially considering that it is something that has to be done very frequently to take care of URL filtering and the latest OWASP threats, which is only possible if the latest configuration is available to users.

    What do I think about the scalability of the solution?

    It is a scalable solution.

    Considering that access to the solution is given to specific people only in my company, I can say that around 100 to 150 people use the solution.

    How are customer service and support?

    The technical support team of the solution is very good. My company hasn't faced any issues with the technical support team of the solution. My company has not had to wait for a response from the technical support team. I rate the technical support team of the solution a nine out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have experience with Cisco. Though Cisco is one of the latest products that we deal with right now, my company has been more friendly with Check Point. My company prefers Check Point since it is easy and more user-friendly for us. Cisco is not that much of a user-friendly product since it requires highly skilled people and more engineers to operate it.

    How was the initial setup?

    Check Point Remote Access VPN's installation process is easy.

    Check Point Remote Access VPN's installation process can be done in two hours with the help of a person who takes care of the configuration part while also taking care of the respective routing configurations that are required.

    The solution is deployed on an on-premises model.

    What about the implementation team?

    Check Point Remote Access VPN's installation process is something that my company can manage with the help of our in-house members.

    What's my experience with pricing, setup cost, and licensing?

    Compared to Cisco, Check Point Remote Access VPN is cheaper. My company makes yearly payments only towards the licensing costs attached to Check Point Remote Access VPN, as there are no extra costs attached to the product.

    What other advice do I have?

    The maintenance part of the solution is easy and can be done remotely, because of which we face no issues in our company.

    For 100 to 150 users, Check Point Remote Access VPN is a good option, but later on, if more people are going to get involved, causing one to invest in more frequent VPN connections while wanting secured connections, then Cisco is a better choice. For a limited set of people, Check Point is a better option.

    I rate the overall tool a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Technical Architect and consultant at VirginAustralia
    Reseller
    Top 5Leaderboard
    Helps to connect to office resources from outside the network
    Pros and Cons
    • "One feature that is highly valued by our clients in remote access VPN is the IPsec suite. With IPsec, we can encrypt our data, ensuring that no one can perform a man-in-the-middle attack or decrypt the data. It utilizes powerful mathematical calculations and end-to-end encryption, preventing hacking attempts."
    • "As everything is moving to cloud environments, it would be beneficial if Check Point Remote Access VPN could provide on-demand services related to remote VPN. Users with proper authentication should be able to easily deploy VPN on their devices with just a click, perhaps with the help of plugins."

    What is our primary use case?

    Before COVID-19, one major use case was for remote VPN access. However, since the pandemic, remote work has become more prevalent, and now, the primary use case for the Check Point Remote Access VPN is when users need to connect to office resources from outside the network.

    With remote Check Point Remote Access VPN, they can access our data center or office network and utilize resources. Additionally, we can publish applications on the public network for anyone to access. As a consultant, I work with multiple vendors across various industries, including banking and IT customers.

    What is most valuable?

    One feature that is highly valued by our clients in remote access VPN is the IPsec suite. With IPsec, we can encrypt our data, ensuring that no one can perform a man-in-the-middle attack or decrypt the data. It utilizes powerful mathematical calculations and end-to-end encryption, preventing hacking attempts.

    What needs improvement?

    As everything is moving to cloud environments, it would be beneficial if Check Point Remote Access VPN could provide on-demand services related to remote VPN. Users with proper authentication should be able to easily deploy VPN on their devices with just a click, perhaps with the help of plugins.

    This would establish a secure connection from the customer's network to their data center. I've recently worked with Oracle Cloud, and they offer a feature where running a simple script on any device establishes a terminal between the device and the data center, allowing easy access to resources.

    For how long have I used the solution?

    I have been working with the product for eight to nine years. 

    What do I think about the stability of the solution?

    I rate the solution's stability an eight out of ten. It is a powerful remote VPN. 

    What do I think about the scalability of the solution?

    I rate the solution's scalability an eight out of ten. 

    How are customer service and support?

    The Check Point portal offers documents, direction guides, and case studies. I often utilize these resources to learn more about the product because the documentation is nice. 

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    When we deploy the product, setting up the server usually takes two to three days. Once the server is set up, configuring it on the client side takes about 30 minutes.

    What was our ROI?

    The solution helps my clients save money and time.

    What's my experience with pricing, setup cost, and licensing?

    The tool is expensive. 

    What other advice do I have?

    I rate the overall product a nine out of ten. It is mostly for enterprise customers. It is the market leader, and you can trust it blindly. I recommend the solution to many customers, including small and medium-sized businesses. I trust Check Point products because they are market leaders in firewall and VPN solutions. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer.
    PeerSpot user
    reviewer2384745 - PeerSpot reviewer
    Network Engineer at a non-profit with 10,001+ employees
    Real User
    Top 20
    Provides good visibility of the environment along with a lot of knowledge-based articles for users
    Pros and Cons
    • "The product's initial setup phase was easy."
    • "Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte."

    What is our primary use case?

    When it comes to Check Point Remote Access VPN, my company is still in the testing phase and will be due for a rollout with our client, who has wanted a VPN connection since last summer.

    What is most valuable?

    If I compare the solution with some of the other products my company has used in the past, I can definitely see that it has some valuable features that allow me to see the traffic and what a client does. With the tool, I cannot only see a session but also the resources our company's clients are connected to since I can do so with the help of firewall logs. I like the overall visibility of the product.

    The thing I like about Check Point Remote Access VPN stems from the fact that it terminates at the firewall wherever the client is going, and it works in an unencrypted manner, which allows me to see where the traffic is going. I can gain access to the clients' networks with NetScaler and with the aid of a packet sniffer.

    What needs improvement?

    Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte.

    For improvements in the product, I can create a wishlist since it is a VPN technology. I would love to see what is available on the VPN connections, but it is important for our company to check the encryption part of it.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for a couple of years.

    What do I think about the stability of the solution?

    The firewall part of the tool has been running for a while now without the need for any reboot. I don't have any stability-related issues with the product.

    What do I think about the scalability of the solution?

    When it comes to VPN products, our company talks about putting them on another internet gateway, which seems to be an easy process. Using the scalability feature of the product seems to be a painless process, in my opinion.

    How are customer service and support?

    I have contacted the technical support for the solution. The solution's technical support responds immediately. The quality of the solution's technical support is good. If a member of the technical support team doesn't have the answer to my queries, then they ensure that someone else who has the knowledge responds to my issues.

    I rate the support team a ten out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have experience with Citrix NetScaler since it is the only product that I have used as a remote access VPN tool.

    I feel Check Point Remote Access VPN is better than Citrix NetScaler.

    How was the initial setup?

    The product's initial setup phase was easy. I haven't had any formal training, but I have learned everything related to the tool.

    The solution is deployed on an on-premises model.

    What about the implementation team?

    A team in my company takes care of the deployment phase.

    What other advice do I have?

    The reason I started to use Check Point Remote Access VPN is because it is preferred by the organization where I currently work.

    The solution needs maintenance. There is a need to update the policy rules and ensure that the firmware is kept up-to-date.

    I request the potential users of the product to invest time in going through the knowledge-based articles since they have a plethora of information.

    I rate the overall tool a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Ozan Durmus - PeerSpot reviewer
    Senior Information Security Specialist at AKBANK TAS
    Real User
    Is easy to use and has a nice interface, but the scalability needs to improve
    Pros and Cons
    • "The solution is easy for administrators because you can check logs and write rules on the same page."
    • "The client-side UI is fundamental, and there is nothing to see."

    What is our primary use case?

    We use Remote Access VPN as a secondary VPN for our IT admins. We use this solution on a different production Internet line. If there is a network shortage on our primary line, we can use Check Point to access and check the systems.

    How has it helped my organization?

    We use the solution in a basic configuration. The ease of use and the user interface for troubleshooting issues have been helpful.

    What is most valuable?

    We need to use two-factor authentication, ADA authentication, and ADA integration. These features are important. We also use a different kind of cPanel and try to differentiate between the IVR accessing the account and the traffic we will send to our system through Check Point values when installed.

    The solution is easy for administrators because you can check logs and write rules on the same page.

    What needs improvement?

    The client-side UI is fundamental, and there is nothing to see.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for two to three years.

    What do I think about the stability of the solution?

    I rate the solution’s stability an eight out of ten.

    What do I think about the scalability of the solution?

    The scalability depends on the gateway and deployment. A stronger gateway can support more users. The cluster configuration also affects scalability. For example, two active gateways can be used for the VPN. We have 100-200 users using this solution since we use it for IT personnel. We are in progress and we are trying to change our primary ETM product. It will go to Check Point for a POC on a larger scale. I rate the solution’s scalability a four or five out of ten.

    How are customer service and support?

    If you are using Check Point support, they usually assign someone from level 1 to level 2. It is a struggle to struggle to get Level 3 or more if there is a problem that needs to be solved ASAP. The support response could be faster.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    Since we had a Check Point firewall, we used the Check Point VPN for a specific line.

    How was the initial setup?

    The deployment takes around two to three hours. If you manage the product, one person could be enough, but if you need some kind of additional integrations like ADA integration, you need someone from ADT to access products. One person is enough, but one or two additional personnel may be included. To deploy Check Point Remote Access VPN, you must purchase a license, enable the blade, and purchase client access licenses. You can then follow the instructions to deploy the product, write the necessary rules, make the integrations, deploy the agent to the clients, and provide them with a login solution. I rate the initial setup an eight on a scale of ten, where one is difficult, and ten is easy.

    What's my experience with pricing, setup cost, and licensing?

    The product is priced between 20,000 and 40,000. We purchased the license two years ago. I rate the product’s pricing a six out of ten, where ten is expensive.

    What other advice do I have?

    If you work with Check Point in your native areas, there may be some problems. Check Point has always been a first in this area but is struggling to improve its product. While they are making improvements, the product’s stability is decreasing. Therefore, users should be aware of potential solution delays if they experience problems. If you create the environment without overuse, users will not experience any problems. Overall, I rate the solution a seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
    Updated: October 2025
    Buyer's Guide
    Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.