We use Check Point Remote Access VPN for security features.
Lead Technical Consultant at ITC Infotech
Provides ease of maintenance, but its installation process needs improvement
Pros and Cons
- "We encounter challenges for the product’s installation and troubleshooting processes compared to other VPN products."
What is our primary use case?
What needs improvement?
We encounter challenges for the product’s installation and troubleshooting processes compared to other VPN products. It is difficult to restore settings in cases of connection failure. This particular area needs improvement.
For how long have I used the solution?
We have been using Check Point Remote Access VPN for five years.
What do I think about the stability of the solution?
The product is stable.
Buyer's Guide
Check Point Remote Access VPN
April 2025

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
856,873 professionals have used our research since 2012.
What do I think about the scalability of the solution?
We have 3000 Check Point Remote Access VPNs in our organization. It is a scalable product. We can increase and downgrade the access as much as possible. The usage depends on the licensing model.
How are customer service and support?
The technical support team only responds to the problems where the device stops working. Apart from that, they don’t reply to normal issues.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We used ForcePoint before. In comparison, Check Point Remote Access VPN is stable and easy to connect.
How was the initial setup?
The product is easy to maintain. It takes a few days to install and troubleshoot.
What's my experience with pricing, setup cost, and licensing?
The product has average pricing. We purchase its yearly pricing.
What other advice do I have?
I advise others to use the product instead of multiple SD solutions and hardware products. I rate Check Point Remote Access VPN a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Secure remote access integration and hotspot access with a multi-level authentication support system
Pros and Cons
- "The secure hotspot access for enabling good network connectivity is great."
- "Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners."
What is our primary use case?
Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions to business users while they are working remotely and traveling for business purposes. Our organization involves over 70% of business travel to generate revenue, and it becomes really troublesome to secure the IT devices and cloud system at such traveling times.
Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.
How has it helped my organization?
Check Point Remote Access VPN provides multiple factor authentication layers, and due to that, all the data transmission is completely scanned for any malware or malicious cyber threats. It is integrated with our various IT and cloud systems and performs its security scanning 24/7 without any glitches or trouble.
Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.
They enable a secure hotspot registration process for enabling all-around support of IT systems while operating remotely without any hassle.
What is most valuable?
The secure hotspot access for enabling good network connectivity is great.
Multi-layer scanning of IT systems across various critical stages for detection of threats and malicious threats has been useful.
Provisioning VPN Client and Auto Connect management system for free flow of information without any data mismanagement.
The secure remote access integration is available for both android and IOS devices and systems is helpful.
The multi-factor authentication support system is a phenomenal feature for providing all-around authentication support to for secure IT enablement.
What needs improvement?
We are still in the learning phase as of now, and there seem to be more and more feature upgrades in the standard version of the application. They're providing updated features in the application with complete compliance assurance - which is really awesome - and we need specific customizations to make it a perfect fit for our business environment. This is a new and emerging area and requires a lot of customization and flexible features to suit the business requirements.
Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners.
For how long have I used the solution?
I've used the solution for over six months now.
What do I think about the stability of the solution?
The solution is quite stable.
What do I think about the scalability of the solution?
It is an absolutely scalable solution.
How are customer service and support?
Technical support has been so far so good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a different solution earlier.
How was the initial setup?
The setup is effortless and smooth.
What about the implementation team?
We installed the solution through the vendor ONLY.
What was our ROI?
We've seen an ROI of over 75%.
What's my experience with pricing, setup cost, and licensing?
I recommend all businesses to go for Check Point Remote Access VPN. It's one of the best of its kind in the market today.
It has enormous features for ensuring security management solutions for remote workforce coupled with compliance assurance in the businesses.
It's one of the highly cost-effective solutions which leads to boosting business performance, and also renewal is smooth without any hassle. The licensing is not pricy and is affordable by organizations.
Which other solutions did I evaluate?
The business and IT team did a lot of brainstorming sessions on this, and it went of really well in evaluating various available products in the market with their offerings.
We evaluated McAfee, Nord, and others
What other advice do I have?
I'd advise others to try the solution today itself and experience the utilities on their own. I am sure, they will love the product offerings and utilities to the greatest extent possible
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Remote Access VPN
April 2025

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
856,873 professionals have used our research since 2012.
Independent Information Technology and Services Professional at a non-profit with 1-10 employees
Advanced threat protection and valuable features enhance security with great support
Pros and Cons
- "The advanced malware protection and the sandboxing features are very valuable as they perform well, with detection being very high."
- "There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients."
What is our primary use case?
For remote work, Check Point Remote Access VPN connects, creates the site, and gathers information about the site in terms of the VPN domain, the public IP at that time, and so on.
How has it helped my organization?
The Check Point products provide solid detection and advanced malware protection, which helps safeguard the organization’s security infrastructure. The platform offers essential features like sandboxing that perform well in threat detection.
What is most valuable?
The advanced malware protection and the sandboxing features are very valuable as they perform well, with detection being very high. Additionally, the panel features are also solid.
What needs improvement?
There are some issues with the Check Point VPN, such as its complexity compared to other VPN clients. Another downside is related to performance, which lags behind similarly priced products like those from Palo Alto. The platform becomes layered with add-ons, moving away from its original simplicity, which poses a problem.
For how long have I used the solution?
I have been using Check Point since version 4.1, which amounts to about 15 years.
What do I think about the stability of the solution?
I rate the stability of Check Point Remote Access VPN as a seven out of ten. I experienced an issue when there was a recent upgrade to address a vulnerability that required the use of both a VPN user and a password along with a certificate or another form of identity confirmation. This was not mentioned in the upgrade notes, which initially caused some problems.
What do I think about the scalability of the solution?
The scalability of Check Point Remote Access VPN is decent. On a scale of one to ten, I rate it a seven.
How are customer service and support?
Check Point's support has always been great. They are very responsive, and we always get technically capable people. I would rate their support a nine or nine point five out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have worked with multiple vendors, including Palo Alto and Fortinet.
How was the initial setup?
For someone new to Check Point products or coming from managing other products, the setup can be difficult. However, for someone familiar with Check Point, the setup hasn't changed much over the years.
What was our ROI?
I am on the technical side and do not typically consider the business returns or ROI of the product.
What's my experience with pricing, setup cost, and licensing?
I am not familiar with the exact pricing details. However, the pricing for the basic remote access VPN is a lot less than that of other vendors, and it comes with many features within the basic package.
Which other solutions did I evaluate?
I have compared Check Point with Palo Alto. Palo Alto is more GUI-based, which makes it easier to use, but it requires more configuration knowledge.
What other advice do I have?
For regular users, Check Point firewalls are easier to configure compared to Palo Alto's. In terms of detection rates and performance, both Check Point and Palo Alto are very good.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Sep 29, 2024
Flag as inappropriateNetwork Security Engineer at Digitaltrack
Good support, easy connection, and helpful multi-factor authentication
Pros and Cons
- "The most valuable point is that it provides multi-factor authentication (MFA), which increases security by requiring an add-on verification method and ensures that only authorized users have access to the network."
- "The knowledge base can be improved for advanced troubleshooting."
What is our primary use case?
Our primary use case is to provide a remote access VPN to organization users so that they can access the organization servers or resources easily from anywhere.
How has it helped my organization?
With the help of Remote Access VPN, our organization's users can connect to our network easily and access servers. This has increased employee productivity.
What is most valuable?
The most valuable point is that it provides multi-factor authentication (MFA), which increases security by requiring an add-on verification method and ensures that only authorized users have access to the network.
What needs improvement?
The knowledge base can be improved for advanced troubleshooting. For new users, configurations might be complex. This can be also improved.
For how long have I used the solution?
We have been using this solution for the last year.
What do I think about the stability of the solution?
The stability is excellent.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and support?
Our experience with customer service and support is excellent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using the same solution.
How was the initial setup?
The initial setup was very easy and straightforward.
What about the implementation team?
We implemented it through an in-house team.
What's my experience with pricing, setup cost, and licensing?
As per the market, everything looks good.
Which other solutions did I evaluate?
No, we haven't evaluated other option
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network Administrator at a transportation company with 1,001-5,000 employees
Enable employees to securely connect but has configuration limitations
Pros and Cons
- "Check Point Remote Access VPN has some useful features, and configuring it is relatively straightforward."
- "Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access."
What is our primary use case?
The main purpose of Check Point Remote Access VPN is to enable employees to securely connect to the corporate network when they work remotely, such as from home.
What is most valuable?
Check Point Remote Access VPN has some useful features, and configuring it is relatively straightforward. However, there are numerous issues, particularly with the SSL connection, including bugs and other problems.
What needs improvement?
Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access. While there is a feature called "Map multiple entry point," it is reported to be buggy and inadequate. This forces users to purchase additional licenses for separate central point management to achieve VPN access for different locations. Ideally, Check Point should enhance its system to allow for multiple VPN entries managed from a single server without additional licenses or workaround solutions.
For how long have I used the solution?
I have been using Check Point Remote Access VPN for three to four years.
What do I think about the stability of the solution?
The product is stable.
I rate the solution’s stability a seven out of ten because we had some problems before, but we resolved them.
What do I think about the scalability of the solution?
The solution is scalable. It is suitable for small and medium businesses.
I rate the solution’s scalability an eight out of ten.
How are customer service and support?
The documentation and support available for Check Point Remote Access VPN are pretty good. A smaller or medium-sized company don't communicate directly with Check Point. They can't open tickets with them directly, which is frustrating. Currently, we have to go through partners who sell us the product to open tickets, and there should be an option to communicate directly with Check Point. Opening tickets directly with the vendor would streamline the process and potentially reduce response times.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Optimization can be a bit more involved with Check Point. Initially, you'll need to perform optimization steps during the configuration process to achieve your desired outcome. Cisco's solution tends to be more straightforward from the outset, providing a robust VPN solution without requiring as much post-configuration tweaking. While Check Point is relatively easy to configure initially, you may deduce more time to optimization tasks afterward. However, once correctly configured and optimized, it functions effectively.
How was the initial setup?
It's easy to configure Check Point Remote Access VPN but It might not be suitable for certain configurations.
I rate the initial setup an eight out of ten, where one is difficult, and ten is easy.
What's my experience with pricing, setup cost, and licensing?
All the firewall solutions are expensive. Compared with the other vendors, Check Point's pricing is moderate.
What other advice do I have?
Like many IT solutions, equipment such as firewalls can be expensive, but Check Point's pricing is competitive compared to other vendors. Currently, Check Point may even be slightly cheaper than Palo Alto.
I recommend Check Point as a firewall solution due to its effectiveness and reliability. For VPN, I might lean towards Cisco because it tends to have fewer optimization issues and other potential complications with VPN deployment.
Overall, I rate the solution a six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at ITQS
Provides safe connection, good security, and remote access
Pros and Cons
- "The solution implemented in the cloud allows us to easily scale in cases of user increase."
- "Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."
What is our primary use case?
The company needs a tool that will provide users with the ability to connect from external addresses and that is where Check Point Endpoint Remote Access VPN services were contracted, which allows users to connect to our firewall. We also have Check Point firewalls in the cloud, to which people can also connect. They can then access the resources in our on-premises environment that they need to access, such as their computers, the Intranet, Salesforce, or our production applications, and have a 100% secure connection.
How has it helped my organization?
Check Point Remote Access VPN has helped us that our users and providers can connect to our network in a safe and efficient way, with the pandemic most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way, the solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase
What is most valuable?
Check Point Remote Access VPN has helped us in that our users and providers can connect to our network in a safe and efficient way. With the pandemic, most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way. The solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase
What needs improvement?
One of the parts where the improvement of Check Point Remote Access VPN can be forced is in the compliance analysis. Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines.
Another point to improve is to program a timeout if the VPN is disconnected due to an internet problem. One complication that we found is that the Linux machines do not have a complete client to do the installation and that has not delayed a bit with our users who use this type of operating system
For how long have I used the solution?
This solution has been used for approximately Three years in the company.
What do I think about the stability of the solution?
It's very stable in terms of downtime. The performance is very impressive.
What do I think about the scalability of the solution?
The solution can be easily scaled by adding a security gateway and general security and is very robust.
How are customer service and support?
On some occasions, we have had problems. Sometimes it takes a long time to resolve a case while on other occasions they resolve very quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
There was no type of tool that would supply these qualities.
How was the initial setup?
The configuration was very simple. The application is a very user-friendly tool apart from training and courses for implementation.
What about the implementation team?
A Check Point engineer who had a lot of experience in his work helped us with the implementation.
What was our ROI?
Mainly, it offers stability and detects behaviors, and gives users (and administrators) a level of trust as they go about their daily work. It introduces a lot of granularity to our policies.
Another feature that has been helpful is the sandbox feature. Many companies offer this type of thing now, however, Check Point has been offering it for quite some time.
What's my experience with pricing, setup cost, and licensing?
Check Point manages to provide good cost in its products and it is worth making the investment since this solution can prevent a collapse in the organization.
Which other solutions did I evaluate?
Check Point was always our first option with this type of solution since many security teams are from Check Point.
What other advice do I have?
One of the main aspects of importance in a company is the security of the computer platforms. When making an investment with these tools you are taking care of an important patrimony that will double your profits.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Good integration, great for remote access, and centralizes users effectively
Pros and Cons
- "We can integrate remote access to our branches through Check Point services."
- "We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
What is our primary use case?
We needed to grow a little more at a cloud level, which means that we have had more places in which we host information, and needed to protect it. We needed to allow users to have access from the different branches in the cloud to our main branch and to access remotely. As a result of these needs, we have been looking for solutions that allow us to have quick and efficient access no matter which branch we are going to access, and to have access allowed quickly and easily as if users were inside the perimeter area of our organization.
How has it helped my organization?
Currently, Check Point is an ally that we have used within our organization to protect the perimeter area, the equipment, and other technologies. We have complete protection in one technology that we are using so that our users with greater frequency can access the data of our organization regardless of where they are. With this, they can have quick, simple access as if they were within the perimeter area. This has given us greater protection when it comes to having protected and verified access under user identity.
What is most valuable?
We can integrate remote access to our branches through Check Point services; however, those services come with a centralized identity, a domain identity, which does not work for the different logins. It only works for the login through the remote connection application. The user profile is centralized, verified, and filtered by the tool, thus being one of the characteristics that are very important to me since it shows any activity that the user is going to carry out.
What needs improvement?
We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution. This would allow us to have a tool that it is not only remote access for mobile devices but a remote access solution for virtual teams, including mobile devices such as cell phones, tablets, and other types of devices in IoT areas such as doors, houses, and medical equipment.
For how long have I used the solution?
I've been using the solution for one year.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Administrador Junior Level 1 at Compuguana
Easy to install, and makes it quick and easy to connect
Pros and Cons
- "Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
- "It would be good to have Remote Access VPN solutions for Check Point edge services."
What is our primary use case?
Currently, as we are a company that constantly imports and exports solutions. We have needed to give our salespeople access to our executives since that part of retail is constantly on the move inside and outside our organization. This makes it somewhat necessary to figure out how everyone can access data since the information is being used and managed every day inside and outside of our institution. We have come to use the Check Point security services so that users can have the same access as we have inside when they are outside the organization.
How has it helped my organization?
The capacity that Check Point Remote Access VPN offers is one of the best. It has made it easier for us and the team to have great mobility inside and outside the organization. If anyone must consult the services internally, they can connect quickly and simply. The agent that allows the connection is very fast to install and very fast to configure. It has streamlined a lot of the complexity that we had faced before.
What is most valuable?
Among its most valuable features is how it quickly and easily connects everyone to the VPN service. It quickly installs an agent on the computers, so that our users do not have to worry about their mobile devices being configured. It is easy to install and can run and install as a client on devices whether the user has Mac or Windows.
What needs improvement?
In the future, if this service could be installed in a faster and simpler way (rather than having it directly connected to the appliances), that would be ideal. Today, many of the solutions are not what was needed when we had perimeter security. It would be good to have Remote Access VPN solutions for Check Point edge services.
For how long have I used the solution?
We have been using the solution for three months.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Popular Comparisons
Microsoft Intune
Prisma Access by Palo Alto Networks
Fortinet FortiClient
Microsoft Remote Desktop Services
Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
OpenVPN Access Server
Claroty Platform
Cisco Secure Client (including AnyConnect)
Check Point Harmony SASE (formerly Perimeter 81)
Microsoft Azure VPN Gateway
Ivanti Connect Secure
F5 BIG-IP Access Policy Manager (APM)
TeamViewer Tensor
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- How does Check Point VPN compare to Windows VPN?
- When looking for a work from home solution, which Remote Access solution do you prefer? Why?
- What are the tools you recommend to support teleworking?
- When evaluating Virtual User Session, what aspect do you think is the most important to look for?
- What is an efficient alternative to Microsoft Remote Desktop?
- What are the best practices to prevent a Brute Force attack via remote access?
- Why use remote access tools?
- Looking for recommendations for a well-priced remote/access management system for video editing
- Looking for SDK on Remote monitoring on Android devices