Try our new research platform with insights from 80,000+ expert users
Ozan Durmus - PeerSpot reviewer
Senior Information Security Specialist at AKBANK TAS
Real User
Top 5
Is easy to use and has a nice interface, but the scalability needs to improve
Pros and Cons
  • "The solution is easy for administrators because you can check logs and write rules on the same page."
  • "The client-side UI is fundamental, and there is nothing to see."

What is our primary use case?

We use Remote Access VPN as a secondary VPN for our IT admins. We use this solution on a different production Internet line. If there is a network shortage on our primary line, we can use Check Point to access and check the systems.

How has it helped my organization?

We use the solution in a basic configuration. The ease of use and the user interface for troubleshooting issues have been helpful.

What is most valuable?

We need to use two-factor authentication, ADA authentication, and ADA integration. These features are important. We also use a different kind of cPanel and try to differentiate between the IVR accessing the account and the traffic we will send to our system through Check Point values when installed.

The solution is easy for administrators because you can check logs and write rules on the same page.

What needs improvement?

The client-side UI is fundamental, and there is nothing to see.

Buyer's Guide
Check Point Remote Access VPN
August 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,561 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Check Point Remote Access VPN for two to three years.

What do I think about the stability of the solution?

I rate the solution’s stability an eight out of ten.

What do I think about the scalability of the solution?

The scalability depends on the gateway and deployment. A stronger gateway can support more users. The cluster configuration also affects scalability. For example, two active gateways can be used for the VPN. We have 100-200 users using this solution since we use it for IT personnel. We are in progress and we are trying to change our primary ETM product. It will go to Check Point for a POC on a larger scale. I rate the solution’s scalability a four or five out of ten.

How are customer service and support?

If you are using Check Point support, they usually assign someone from level 1 to level 2. It is a struggle to struggle to get Level 3 or more if there is a problem that needs to be solved ASAP. The support response could be faster.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Since we had a Check Point firewall, we used the Check Point VPN for a specific line.

How was the initial setup?

The deployment takes around two to three hours. If you manage the product, one person could be enough, but if you need some kind of additional integrations like ADA integration, you need someone from ADT to access products. One person is enough, but one or two additional personnel may be included. To deploy Check Point Remote Access VPN, you must purchase a license, enable the blade, and purchase client access licenses. You can then follow the instructions to deploy the product, write the necessary rules, make the integrations, deploy the agent to the clients, and provide them with a login solution. I rate the initial setup an eight on a scale of ten, where one is difficult, and ten is easy.

What's my experience with pricing, setup cost, and licensing?

The product is priced between 20,000 and 40,000. We purchased the license two years ago. I rate the product’s pricing a six out of ten, where ten is expensive.

What other advice do I have?

If you work with Check Point in your native areas, there may be some problems. Check Point has always been a first in this area but is struggling to improve its product. While they are making improvements, the product’s stability is decreasing. Therefore, users should be aware of potential solution delays if they experience problems. If you create the environment without overuse, users will not experience any problems. Overall, I rate the solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cyber Security Engineer at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Remote access solutions have improved security with multi-factor authentication and endpoint compliance scanning
Pros and Cons
  • "Check Point Remote Access VPN offers multi-factor authentication when connecting to organizational networks, which adds an extra layer of security by requiring multiple verification steps when users connect."
  • "One area that could be improved is the complexity of setting up Check Point Remote Access VPN, particularly with features like multi-factor authentication, single sign-on, and identity awareness. Deploying these solutions requires higher technical expertise than other solutions."

What is our primary use case?

We are resellers of Check Point products in our country, and our customers use Check Point Remote Access VPN to keep their organization data clean and safe when users access remotely through the client. They use Check Point Remote Access VPN for complex setups requiring technical expertise, such as accessing resources in the organization's private networks. Most of the time, we deploy Check Point Remote Access VPN on banking centers, where they use it to access business data behind their firewalls. Check Point Remote Access VPN supports various platforms, including Windows, MacOS, and mobile devices.

How has it helped my organization?

Whenever we deploy Check Point Remote Access VPN on customer sites, they tell us that this feature improves their access to organizational data, as many employees need remote access to work from their premises or home networks. During this time, company data is vulnerable to attacks due to insecure connections to organizational data. Check Point Remote Access VPN fills this gap by keeping organizational data secure from unauthorized access, providing multi-factor authentication, checking device health status, and assessing the device security posture through the endpoint compliance scanning feature. It improves remote connection and protects the organization's network from cybercriminals.

What is most valuable?

Check Point Remote Access VPN offers multi-factor authentication when connecting to organizational networks, which adds an extra layer of security by requiring multiple verification steps when users connect. This reduces the risk of unauthorized access. Additionally, there's endpoint compliance scanning, which ensures that devices that do not fulfill compliance requirements cannot connect to the network, preventing compromised devices from infiltrating the network. These features are fundamental in protecting organizations from unauthorized access and cyber threats by scanning devices and authenticating users properly.

What needs improvement?

One area that could be improved is the complexity of setting up Check Point Remote Access VPN, particularly with features like multi-factor authentication, single sign-on, and identity awareness. Deploying these solutions requires higher technical expertise than other solutions. Additionally, compared to customer-grade solutions, Check Point Remote Access VPN is more expensive. For example, FortiClient offers a free client, which differs from Check Point VPN.

For how long have I used the solution?

I have deployed Check Point Remote Access VPN over the past 2 years, and I am familiar with Check Point products, including the firewall features and blades and Remote Access VPN. For two years, I have deployed Check Point VPN or Remote Access VPN many times.

What do I think about the stability of the solution?

Check Point Remote Access VPN is stable, and we haven't received any complaints from our customers regarding its stability until now.

What do I think about the scalability of the solution?

Check Point Remote Access VPN is scalable because it supports various platforms and can adapt to different organizational needs.

How are customer service and support?

Contacting the Technical Assistance Centers (TACs) initially can be difficult, but once I get in touch with the TAC team, it is easy to solve problems. However, the first steps can be challenging.

Which solution did I use previously and why did I switch?

Our customers used to connect to their organizational data using AnyDesk, which is a free VPN tool. However, we switched to Check Point Remote Access VPN because of its firewall features and incorporated them into our firewall setup.

How was the initial setup?

Deploying Check Point solutions requires higher technical expertise and can be complex, but it is manageable with knowledgeable staff.

What's my experience with pricing, setup cost, and licensing?

In terms of pricing, Check Point Remote Access VPN is not the most cost-effective option compared to other vendors. However, negotiations with Check Point are very good.

Which other solutions did I evaluate?

We evaluated Fortinet FortiClient before choosing Check Point Remote Access VPN.

What other advice do I have?

If you want to see a return on your investments quickly, prioritize purchasing Check Point Remote Access VPN with integration in Check Point firewall features. I rate Check Point Remote Access VPN an eight out of ten because it is great at what it does, but I deducted two points due to the complexity of the setup and the need for technical expertise.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
August 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,561 professionals have used our research since 2012.
reviewer2540445 - PeerSpot reviewer
Student at a university with 5,001-10,000 employees
Real User
Top 5
Has no learning curve and deployment is straightforward
Pros and Cons
  • "The most valuable feature of Check Point Remote Access VPN is its ability to deploy. It follows the same process as their stateful inspection firewall or IPS. If you know how to enable one feature, you can enable and configure others. The learning curve isn't steep."
  • "The product needs to improve its support."

What is most valuable?

The most valuable feature of Check Point Remote Access VPN is its ability to deploy. It follows the same process as their stateful inspection firewall or IPS. If you know how to enable one feature, you can enable and configure others. The learning curve isn't steep.

What needs improvement?

The product needs to improve its support. 

What do I think about the stability of the solution?

Check Point Remote Access VPN is quite stable. Once we trained our staff on using and troubleshooting the solution, we could quickly hand it over.

What do I think about the scalability of the solution?

The tool is scalable. If you size your appliance correctly, you shouldn't have software issues. It is deployed with head-end gateways in three regions. From the endpoint perspective, it supports about 1000 end users globally. These users have SMB devices shipped to them that build VPN connections to our head-end devices in the data centers.

This VPN solution integrates with SMB devices. We ship these devices to our end users, who just need to plug them into their network. Once the device receives an IP address, it connects with our head-end and provides connectivity.

How are customer service and support?

A special team helps design solutions, but I can't remember what they're called. It's not the regular break-fix support, which can be frustrating.

How was the initial setup?

The solution's deployment is straightforward. We needed less staff than with other products. Two people were involved in certification, one in verification, and three in deployment (one for build services, one for service delivery, and one for rotation for additional help).

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, as a global customer, we get a big discount. For us, it's a good return on investment. We need to pay for additional features we want to enable. It seems cheaper than other vendors, but I can't say what it would cost an average customer.

What other advice do I have?

During COVID-19, we needed a VPN solution for a specific team that had to use special equipment in the office. We couldn't install this equipment on laptops for home use. The tool helped us deploy a VPN solution in less than 30 days, including project costs and gathering facts. Their support was amazing, especially the R&D team. We worked with someone with experience with similar solutions for other clients, which made it easier. The VPN is still being used, and it's robust.

We mainly implemented the Check Point Remote Access VPN to support our team during the COVID-19 peak. Some employees needed specific equipment that couldn't be installed on laptops at home. The solution allowed us to set up a similar setup to the office for these users so that they could support our clients during COVID-19.

My advice for those considering Check Point Remote Access VPN is that if you're familiar with one solution, the deployment and configuration process is identical for others. There's no learning curve. Just understand your use cases, enable the needed features, and you're ready.

I rate the overall solution a ten out of ten. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2701569 - PeerSpot reviewer
Enterprise Network Engineer at a outsourcing company with 201-500 employees
Real User
Top 5Leaderboard
Saves time during downtimes and integrates firewall and VPN policy management
Pros and Cons
  • "Check Point Remote Access VPN has positively impacted my organization by improving productivity and given us a workaround in times of downtime."

    What is our primary use case?

    My main use case for Check Point Remote Access VPN is for remote employee access.

    What is most valuable?

    The best features Check Point Remote Access VPN offers include the fact that you can configure the VPN access in Smart Console, which is important for me because that saves me another sort of window to configure and to monitor that I have to keep switching in between.

    I just do VPN policies in the same place where my firewall policies are.

    Check Point Remote Access VPN has positively impacted my organization by improving productivity and given us a workaround in times of downtime.

    Unless it's specifically the data center that is down, if it's any other place besides the data center, we definitely have business continuity.

    What needs improvement?

    I think Check Point Remote Access VPN can be improved as it's more of an annoyance for a good number of the clients because it doesn't save their credentials.

    Even if it's just timed out, you sort of need to do manual entry.

    This is typically how security should be, but users get annoyed by it.

    As it runs in the background, it's not really easy to stop it from running persistently.

    Additionally, regarding the notifications, I'm yet to find an easy way to disable them.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for three years.

    What do I think about the stability of the solution?

    Check Point Remote Access VPN is stable.

    What do I think about the scalability of the solution?

    I haven't tried scaling Check Point Remote Access VPN, so I wouldn't have a feasible answer.

    How are customer service and support?

    The customer support experience for Check Point Remote Access VPN is smooth.

    How would you rate customer service and support?

    Positive

    What was our ROI?

    I have definitely seen a return on investment from using Check Point Remote Access VPN, as time saved is money saved.

    We can work around our general downtimes by having users connect via VPN.

    Continuous operations mean basically saving money.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing for Check Point Remote Access VPN was smooth.

    What other advice do I have?

    I would advise others looking into using Check Point Remote Access VPN that this is a very powerful solution.

    Unlike many of the other solutions, posture is a very big add-on.

    I would advise them to get the solution when they're in need of a remote VPN access solution.

    Unlike most of the VPN clients, if you're doing the one from Check Point, you also get posture in the same client.

    Before it grants the user access, it will first establish posture.

    That is one of the underrated add-ons that it has that people should appreciate more.

    On a scale of 1-10, I rate Check Point Remote Access VPN a 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Flag as inappropriate
    PeerSpot user
    Nagendra Nekkala - PeerSpot reviewer
    Senior Manager ICT & Innovations at Bangalore International Airport Limited
    Real User
    Top 5Leaderboard
    A user-friendly tool with easy maintenance and installation phases
    Pros and Cons
    • "It is a scalable solution...The technical support team of the solution is very good."
    • "Check Point Remote Access VPN's connectivity and establishment takes time and needs to be faster."

    What is our primary use case?

    Right now, my company connects with the vendors of Check Point whenever any maintenance is required, and not to our domain.

    What is most valuable?

    Check Point Remote Access VPN is a highly secured product with which, in our company, we can get end-to-end VPN connectivity so that the communication part is highly secured.

    What needs improvement?

    Check Point Remote Access VPN's connectivity and establishment takes time and needs to be faster.

    In the future, Check Point Remote Access VPN should provide its users with URL filtering.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for ten years. My company is a customer and end-user of Check Point.

    What do I think about the stability of the solution?

    Though the solution is stable, sometimes the latest updates are not available, especially considering that it is something that has to be done very frequently to take care of URL filtering and the latest OWASP threats, which is only possible if the latest configuration is available to users.

    What do I think about the scalability of the solution?

    It is a scalable solution.

    Considering that access to the solution is given to specific people only in my company, I can say that around 100 to 150 people use the solution.

    How are customer service and support?

    The technical support team of the solution is very good. My company hasn't faced any issues with the technical support team of the solution. My company has not had to wait for a response from the technical support team. I rate the technical support team of the solution a nine out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have experience with Cisco. Though Cisco is one of the latest products that we deal with right now, my company has been more friendly with Check Point. My company prefers Check Point since it is easy and more user-friendly for us. Cisco is not that much of a user-friendly product since it requires highly skilled people and more engineers to operate it.

    How was the initial setup?

    Check Point Remote Access VPN's installation process is easy.

    Check Point Remote Access VPN's installation process can be done in two hours with the help of a person who takes care of the configuration part while also taking care of the respective routing configurations that are required.

    The solution is deployed on an on-premises model.

    What about the implementation team?

    Check Point Remote Access VPN's installation process is something that my company can manage with the help of our in-house members.

    What's my experience with pricing, setup cost, and licensing?

    Compared to Cisco, Check Point Remote Access VPN is cheaper. My company makes yearly payments only towards the licensing costs attached to Check Point Remote Access VPN, as there are no extra costs attached to the product.

    What other advice do I have?

    The maintenance part of the solution is easy and can be done remotely, because of which we face no issues in our company.

    For 100 to 150 users, Check Point Remote Access VPN is a good option, but later on, if more people are going to get involved, causing one to invest in more frequent VPN connections while wanting secured connections, then Cisco is a better choice. For a limited set of people, Check Point is a better option.

    I rate the overall tool a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    reviewer2384745 - PeerSpot reviewer
    Network Engineer at a non-profit with 10,001+ employees
    Real User
    Top 20
    Provides good visibility of the environment along with a lot of knowledge-based articles for users
    Pros and Cons
    • "The product's initial setup phase was easy."
    • "Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte."

    What is our primary use case?

    When it comes to Check Point Remote Access VPN, my company is still in the testing phase and will be due for a rollout with our client, who has wanted a VPN connection since last summer.

    What is most valuable?

    If I compare the solution with some of the other products my company has used in the past, I can definitely see that it has some valuable features that allow me to see the traffic and what a client does. With the tool, I cannot only see a session but also the resources our company's clients are connected to since I can do so with the help of firewall logs. I like the overall visibility of the product.

    The thing I like about Check Point Remote Access VPN stems from the fact that it terminates at the firewall wherever the client is going, and it works in an unencrypted manner, which allows me to see where the traffic is going. I can gain access to the clients' networks with NetScaler and with the aid of a packet sniffer.

    What needs improvement?

    Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte.

    For improvements in the product, I can create a wishlist since it is a VPN technology. I would love to see what is available on the VPN connections, but it is important for our company to check the encryption part of it.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN for a couple of years.

    What do I think about the stability of the solution?

    The firewall part of the tool has been running for a while now without the need for any reboot. I don't have any stability-related issues with the product.

    What do I think about the scalability of the solution?

    When it comes to VPN products, our company talks about putting them on another internet gateway, which seems to be an easy process. Using the scalability feature of the product seems to be a painless process, in my opinion.

    How are customer service and support?

    I have contacted the technical support for the solution. The solution's technical support responds immediately. The quality of the solution's technical support is good. If a member of the technical support team doesn't have the answer to my queries, then they ensure that someone else who has the knowledge responds to my issues.

    I rate the support team a ten out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have experience with Citrix NetScaler since it is the only product that I have used as a remote access VPN tool.

    I feel Check Point Remote Access VPN is better than Citrix NetScaler.

    How was the initial setup?

    The product's initial setup phase was easy. I haven't had any formal training, but I have learned everything related to the tool.

    The solution is deployed on an on-premises model.

    What about the implementation team?

    A team in my company takes care of the deployment phase.

    What other advice do I have?

    The reason I started to use Check Point Remote Access VPN is because it is preferred by the organization where I currently work.

    The solution needs maintenance. There is a need to update the policy rules and ensure that the firmware is kept up-to-date.

    I request the potential users of the product to invest time in going through the knowledge-based articles since they have a plethora of information.

    I rate the overall tool a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Richard Hermogeno - PeerSpot reviewer
    Channels Management Head at Philippine National Bank
    Real User
    A Great Solution That Offers Seamless Remote Access To Our Organization’s On-Premise Applications
    Pros and Cons
    • "Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations."
    • "I would like the support to be faster."

    What is our primary use case?

    Check Point Remote Access VPN enables us to access on-premise applications while working from remote locations.

    What is most valuable?

    The feature that I found most valuable is how conveniently Check Point Remote Access VPN allows us to access our HR system. We use it for the process of logging in and logging out.

    What needs improvement?

    I think Check Point Remote Access VPN is good enough to suffice our needs. At present, I don't have any complaints about the tool.

    For how long have I used the solution?

    I have been using Check Point Remote Access VPN since the COVID-19 pandemic started.

    What do I think about the scalability of the solution?

    In our organization, approximately 3,000 users work on Check Point Remote Access VPN. The number may go up if we hire more employees.

    How are customer service and support?

    I think that the tech support provided by Check Point Remote Access VPN is good. Also, I would add that I have no complaints.

    How was the initial setup?

    I would say that the initial setup was straightforward. The deployment process took place on weekends and during non-banking hours. In our organization, we only need around 10 to 15 employees, who include network administrators, developers, and project managers, for the deployment and maintenance of Check Point Remote Access VPN.

    What about the implementation team?

    The deployment was conducted with the help of our in-house team.

    What's my experience with pricing, setup cost, and licensing?

    I won't be in a position to answer this question. But, I can say that the licensing costs are charged annually.

    Which other solutions did I evaluate?

    We evaluated alternative options by using Forcepoint as a benchmark.

    What other advice do I have?

    I would like the support to be faster. I rate this solution a nine out of ten.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    josephtampient3 - PeerSpot reviewer
    CEO at T3 Real Estate Group
    User
    Low cost with good compliance scanning and a VPN auto-connect feature
    Pros and Cons
    • "Check Point has been perfect for protecting us from any type of attack or data theft during remote management."
    • "The main feature that would be improved within Check Point Remote Access is its operation within Linux OS, as it currently does not have many features for that OS."

    What is our primary use case?

    The primary use case is to remotely connect to various sites and various apps and use some technological apps that are cloud-based. Check Point Remote Access was the essential platform for us to connect remotely through a secure network with an encryption key. It's also an encryption service for all information shared and obtained from this remote connection. Today, we still use it to remotely connect to computers, apps, websites, and cloud-based apps while traveling or out of the office.

    How has it helped my organization?

    Check Point Remote Access has been the perfect solution for us for a couple of years now. It helped us to remotely connect to various cloud-based apps and software when we were out of the office during the pandemic. 

    After the end of the pandemic, we continue to use this platform so that all our employees in our real estate sector can connect to specific apps and not neglect their workdays when they are traveling in other states of the country. 

    Check Point has been perfect for protecting us from any type of attack or data theft during remote management; it prevents and blocks all types of data leaks and has an authentication for each connection.

    What is most valuable?

    The most valuable aspects of the solution include: 

    - VPN auto-connect feature. It is essential. It activates the VPN every time I make a remote connection and since I don't have to activate it manually to make the remote connection, it saves me time.

    - Compliance scanning. It allows me to detect any existing irregularities in the network that is being used for the remote connection.

    - The VPN Client. It allows me to fully configure all remote access, configure the firewall used, and gives me full access to network settings.

    What needs improvement?

    The main feature that would be improved within Check Point Remote Access is its operation within Linux OS, as it currently does not have many features for that OS. You cannot access the detection of threats that can steal your data. 

    In addition, it does not have an incident analysis that can detect failures in time in the network or VPN connectivity. 

    Also, the IPsec settings on Linux are quite limited, which makes it a bit difficult to configure the settings you can make for remote connection to Linux.

    For how long have I used the solution?

    I have used this solution for a period of more than three years. The main reason why I decided to start using it is due to the fact that we needed a solution that would allow us to work remotely when the COVID-19 pandemic happened; this was a perfect solution for working remotely securely.

    What do I think about the scalability of the solution?

    I was impressed by the scalability of this platform throughout our company, mainly since this solution emerged as the main use within the C-Level area of our company. It does not neglect some cloud-based apps when out of the office. The scalability of this platform made it possible for us to implement it in most areas of the company in order to strengthen remote work.

    How are customer service and support?

    The Check Point support team was always attentive to any requirement when we first purchased this system. We had about three questions when we purchased Check Point Remote Access and the Check Point team answered all of our questions within minutes.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The main implementation was quite simple. Implementing it correctly in our corporate area took us a few days. However, it took us one month to fully implement it in all areas of our company. 

    I found the initial setup to be fairly quick and provided a pretty useful system for protecting data leaks during remote connections.

    What about the implementation team?

    We handled the initial setup in-house.

    What was our ROI?

    We got a return on investment from this platform in about four months. We managed to enhance remote work greatly. This allowed our sales and our customers' solutions to benefit by 40%. In addition, we managed to enable our employees to provide direct customer service, which strengthened our sales by more than 40%.

    What's my experience with pricing, setup cost, and licensing?

    The Check Point Remote Access pricing is one of the most affordable solutions in terms of cost. This solution will power remote work for any company, and this solution comes at a very low cost. It provides a complete control panel, an SSL Portal, and client access for operating systems. I consider it very helpful for any company - at a very affordable price.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
    Updated: August 2025
    Buyer's Guide
    Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.