Try our new research platform with insights from 80,000+ expert users
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port
User
Excellent support with great multi-factor authentication and compliance checks
Pros and Cons
  • "It offers a simple configuration and setup."
  • "It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices."

What is our primary use case?

We primarily use the solution for work from home. Our main goal is to provide users with the ability to access their workstation from anywhere in the world.

We provided remote access to more than 500 users during the pandemic. Check Point Remote Access VPN has worked smoothly as our appliance is capable of supporting 1000+ users.

We deployed a VPN client-based solution with multi-factor authentication. The compliance check feature is useful.

It is compatible with several operating systems, and it has great protection against malware.

It offers a simple configuration and setup.

How has it helped my organization?

We developed work-from-home policies for our organization during the pandemic due to the rise in COVID cases. As network security engineers, it's challenging for us to manage users' personal laptops and computers which are not up to date (OS, Antivirus ..etc). However, when it comes to the Check Point VPN solution, we overcame all the challenges and successfully implemented our infrastructure. Logs are helping us to monitor each user's activity. We can also isolate user laptops or PCs from the internet when its gets connected to our network.

What is most valuable?

The remote access blade is built in on the firewall, so it is easy to activate through the Smart Console.

Only the VPN client supports only the Windows and Apple Mac operating systems, which also support iOS and Android mobile platforms. The Check Point development team deserves praise for a flawless experience.

Multi-factor authentication and compliance checks help us to ensure maximum security.

VPN logs give us complete visibility and track unusual activities.

The VPN client user interface is simple and perfect.

The VPN client software is lightweight.

What needs improvement?

It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices.

The configuration of a VPN requires a distinct VPN Tab. Once the VPN blade has been activated, after activating VPN blade, we need to make some configurations in the gateway option settings and others in the VPN communities section. It would be preferable if these two things came together in one place.

Apart from this, it operates flawlessly. To improve our IT Services, we poll our users. The majority of people say how excellent the remote access VPN service is. Additionally, they stated that once connected to a VPN service, they never experience connectivity problems.

Buyer's Guide
Check Point Remote Access VPN
April 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
856,873 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for more than two years.

How are customer service and support?

The product offers excellent customer service and support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used a different solution that did not satisfy us in terms of security. As a result, we decided to deploy Check Point for enhanced security.

Before migrating to the Check Point firewall, we conducted market research and solicited feedback from my contacts who are already Check Point NGFW customers. We decided to use Check Point.

How was the initial setup?

The VPN Setup and initial configuration are tricky and not straightforward. For example, you need to:

1. Do some configuration in the gateway option, then:

2. VPN Communities

It would be preferable if step 1 and step 2 were available in one place.

3- Lastly, you must apply the firewall policy

What about the implementation team?

We implemented this solution ourselves.

What was our ROI?

We now have a reliable VPN solution to offer our staff, which is a significant return on investment.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Easy to activate with full visibility and network control
Pros and Cons
  • "The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out."
  • "In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system."

What is our primary use case?

This product provides a secure connection to the corporate network from anywhere and safe traffic of data regardless of the possible threats in the WAN it's connected to. It also provides secure access to company apps and controls the traffic depending on each company's policies. Through it, we create layers that control or limit data traffic for specific users. I've been trained in the product and know it's one of the most effective in the business and admit to facilitating my customers to get it from our Check Point partners.

How has it helped my organization?

A clear example of the positive impact this license has had in my organization was back in 2020. The software was in use since before the pandemic hit so our personnel was familiarized with the product; the transition was smooth and secure from the office to work from home. Access policies were run through the active directory applied on all kinds of end points, from cell phones, tablets, laptops, desktops - you name it. Access could be restricted by location and using network security assessments that prevented connecting to corrupted networks. 

What is most valuable?

We already use the Check Point Firewall and those are the ones the organization's employees connect to for the remote VPN and it made it really easy to activate this function as new hardware was not needed. 

The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out. Be it if our users are at home or in the office the same policy applies to them allowing us to view the traffic within our organization.

What needs improvement?

In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system. 

Also, this product has limitations with headcount addition, as there are performance limitations in each security gateway the software has. 

The ability to allow split-tunneling while still following our corporate policy should be offered. 

Some things like the compliance aspect of the VPN Client can be updated so the product stays up to speed with the ever-changing environment in software security.

For how long have I used the solution?

For the past eight years, I've been working at a company where I was first in software security sales for three years and then five years in hardware sales. Since I have a background in security, I've been part of training and sales where Check Point products are involved. I have tested most products Check Point offers due to our partnership.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
April 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
856,873 professionals have used our research since 2012.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Great VPN connection that helps extend infrastructure and is perfect for remote worker access
Pros and Cons
  • "Scalability is great. We have been able to grow as a corporation due in part to this type of solution."
  • "Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."

What is our primary use case?

Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client. 

Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.

How has it helped my organization?

Connection through VPN has helped us with the connection to corporate. This type of connection has been very useful to us since, as infrastructure personnel, we can establish a connection to our corporate to make a connection either RDP or directly to services in order to be able to carry out any work activity or review any report by the operational part in order to speed up response times. We can connect to our network equipment by SSH, RDP, or via the web, however, only when we have this type of secure connection.

What is most valuable?

One of the features that has helped us the most with our solutions has been the P2P connection through an IPsec VPN. It has allowed us to extend our infrastructure and grow with new clients. Previously, we had around 15 corporate clients. Through the COVID-19 pandemic, we have managed to grow and now have around 35 new corporate clients and more than 6 people connected by VPN. This has forced us to increase our infrastructure to be able to support all these connections and to have a stable, reliable, and, above all, scalable solution that can interconnect more clients.

What needs improvement?

We have not migrated to the R81 version and I do not doubt that it will have some improvements compared to the version we use today. 

Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor. This type of integration would undoubtedly give it a better reach and greater market with new security trends top of mind. 

I know that everything is moving to a cloud environment, however, for all those corporates that still do not trust such an environment, it would be favorable to offer a 2MFA service in a solution tested through a blade or in the cloud. 

For how long have I used the solution?

I've used the solution for more than five years.

What do I think about the stability of the solution?

The remote workers were experiencing issues like disconections, no IP avaliables from the DHCP, or unable to connect because the server didnt responde to a ping, however this issue was fix after we instlalled the JHF 125 on each gateway and after the upgrade, everythig has been working OK, but before that Check Point didn´t have a fix for that manner.

What do I think about the scalability of the solution?

Scalability is great. We have been able to grow as a corporation due in part to this type of solution.

How are customer service and support?

They have been with us when we needed help. We don't have any complaints about their level of service.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did use a different solution and we switched due to the fact that Check Point is more secure and has more features for the type of connections we need.

How was the initial setup?

It was a straightforward setup.

What about the implementation team?

The product was integrated with in-house personnel.

What was our ROI?

We've seen about a 40% ROI.

What's my experience with pricing, setup cost, and licensing?

Check Point is an expensive solution, however, it has more features and is more secure than other options.

Which other solutions did I evaluate?

Ae evaluated AnyConnect and Palo Alto.

What other advice do I have?

We would like them to add a 2MFA feature in the future. This is our direct request.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Network Security Engineer at a consumer goods company with 201-500 employees
Real User
Easy to download, set up, and configure
Pros and Cons
  • "The solution offers high scalability as far as adding more users."
  • "This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity."

What is our primary use case?

With this solution, we can:

1) Securely and privately access our data from anywhere with the Check Point VPN. 

2) Connect securely from any device and any asset.

3) Have 2FA enabled while connecting to the VPN in an official mail. If any person has your VPN credential, he can initiate contact for security codes to connect to the VPN.

4) Integrate our data.

5) View VPN events from the console.

6) Easily install and connect the VPN. 

7) Provide colleagues with secure and seamless remote access to the corporate network.

8) Get a full picture with complete network visibility.

How has it helped my organization?

The product has improved the organization by:

1) Deploying high performance. Check Point's private VPN gateways can secure our colleagues/teams working remotely with dedicated IPs and provides private resource access. It empowers our personnel to connect with relevant access permissions to access corporate resources.

2) Ensure a user of our organization aligns with traffic privacy with one of many tunneling protocols so that all transmitted data is completely encrypted. The level of security provided by Check Point ensures that only authorized connections are established, so if users are connected, they are protected.

What is most valuable?

The solution's most valuable aspects include:

1) Ease of install and ease of use.

2) 2FA Security.

3) Seamless access.

4) Integration with our data.

5) The ability to view VPN events from the console.

6) The ability to manage all our devices from one platform and easily secure and segment their access to resources. 

7) Providing authorized least privileged access for all devices.

8) The ability for our entire global organization to work more securely and to allow us to deploy private and dedicated networks in more than one location.

9) The level of security provided by Check Point. It ensures that only authorized connections are established, so if users are connected, then they are protected.

What needs improvement?

This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity. 

For example, when my internet is not working properly, then the VPN disconnects all of sudden and if I want to connect again, I need to do so with credentials and 2FA. In the next release, if the product could program in a hold time then disconnect the VPN due to the internet's fluctuation, that would be ideal as it would improve the way we can monitor our network visibility.

For how long have I used the solution?

I've been using Check Point Remote access VPN from a Client perspective for eight months.

What do I think about the stability of the solution?

It is perfectly stable as far as the VPN is concerned because when I used the older version(R.77) of checkpoint Remote VPN then that time there was points of stablility concern but after the upgradation checkpoint VPN(R.80) perfectly worked on stability part and now it is stable for windows and MAC OS.

What do I think about the scalability of the solution?

The solution offers high scalability as far as adding more users. I don't see that as being an issue.

We have 330-350 users in our company who are using the Check Point VPN.

How are customer service and support?

Technical support is good and helpful when needed. Whenever I was stuck, I was able to get a solution. This was provided by the Check Point TAC support and services team and they were helpful.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Forticlient VPN also. However, the Forticlient VPN had no visibility on traffic and we required better security for our organization.

How was the initial setup?

The product is easy to download, set up, and configure. The official site documentation is pretty good and helps you to understand the process in order to get the VPN connected.

What about the implementation team?

I implemented it myself both in-house as well as for our client.

What's my experience with pricing, setup cost, and licensing?

In terms of the cost:

1) It's easy to set up and download from the official Check Point site.

2) It's easy to connect the VPN by putting in the gateway address, credentials, and the 2FA. 

3) I don't know about exact pricing as it's not a part of my job. I'm a technical person. Our sales team knows all the pricing and licensing details.

Which other solutions did I evaluate?

I did not really look at other options. My first experience was with Forticlient, however, I wanted more security so I chose the Check Point VPN solution and I'm happy with using it. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Chief Information Security Officer at Abcl
Real User
Top 20
Supports multifactor authentication and clientless login, but the GUI should be more user-friendly
Pros and Cons
  • "Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live."
  • "The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access."

What is our primary use case?

We use Check Point Remote Access VPN to provide access to our corporate network and resources to remote users in a secure way. Users have access that is limited or defined by the server.

Access is granted for identified devices post-posture validation. 

Access should be provided via VPN using multifactor authentication other than username/credentials. Users are able to connect from anywhere at anytime using both mechanisms (i.e. User VPN client or browser). 

This solution mitigates or minimizes data leakage issues.

It is stable and scalable and requires minimal management and access provisioning.

How has it helped my organization?

This solution has improved our organization by providing access to corporate resources in a secure fashion. It uses complete end-to-end encryption from the end-user machine to the VPN device.

Access policies are created on the firewall for restricting access to resources and applications based on the user profile/policy.

Our security gateway is integrated with Active Directory and access to resources/applications is provided based on the security group created in Active directory.

This product has inbuild/native integration with MFA solutions.  

It does not require any additional hardware in cases where the organization already has the Check Point NGFW. The mobile access blade and remote access VPN can be enabled on the same security gateway. Check Point provides a common dashboard and management console used in conjunction with the NGFW.

Multiple access can be provided using multiple realms, based on the user ID or security group, and access can be provided accordingly. Each realm will have a pool of IP addresses for which access will be provisioned on the firewall.

What is most valuable?

Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live. The only requirement is to purchase an additional license from Check Point, and then enable the mobile access blade. After this, the solution is ready to roll out and provide access based on the configured policy. 

Access is restricted based on user ID, security group, and device type. 

Access is provisioned post-posture policy validation and it offers protection against users connecting to the corporate network from non-corporate devices, which minimizes data leakage possibilities. 

Access is available from browsers or VPN clients using MFA. This is helpful in cases where the machine does not have the client installed or the client is corrupted.

We are able to restrict access based on geo-location and device type. Devices can be Android, iOS, Windows, or Linux.

It provides threat prevention capabilities while uses connect via VPN for Windows devices.

What needs improvement?

Access is provisioned based on a single L3 tunnel being established between the endpoint and the VPN device. If an attacker gains access to this session then all of the tunnel traffic is compromised. It needs to move to next-generation style access, provisioning such as per-app VPN.

The GUI interface for configuring the SSL VPN is not user-friendly and requires expertise. 

Devices are exposed over the internet and it can lead to a security threat.

When a critical patch needs to be applied to the VPN, downtime is required for the entire NGFW. This can impact the business when it has a single security gateway.

This product cannot manage sudden user growth, as each security gateway has limitations in terms of performance and throughput.

The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access. Specifically, modules such as Threat prevention, Access control, and Incident analysis are supported only on Windows and Mac.

What do I think about the stability of the solution?

It's very stable in terms of downtime, although it required updates.

What do I think about the scalability of the solution?

The solution can be easily scaled by adding a security gateway.

How are customer service and technical support?

The Check Point technical support is excellent.

Which solution did I use previously and why did I switch?

We used Aventail SonicWALL as a standalone product. We switched because it was expensive in terms of management and maintenance. As we already had Check Point NGFW, it was easy to enable the VPN on the same device.

How was the initial setup?

Enabling the VPN was simple and straightforward with the purchase of an additional license from the OEM. Once we acquired the license, it involved enabling the module on the security gateway. The solution was ready to go live within 10-15 minutes.

What about the implementation team?

The implementation was completed by our in-house team with the assistance of the OEM.

What's my experience with pricing, setup cost, and licensing?

Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality.

Which other solutions did I evaluate?

We evaluated Pulse and Citrix before choosing this option. 

What other advice do I have?

Traditional VPNs that work on L3 or L4, with a single VPN tunnel, are typically hosted on-premises. As organizations are adopting cloud computing, it makes sense to have a VPN solution hosted on the cloud for better control and security.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1730568 - PeerSpot reviewer
Network and Security Engineer at a security firm with 11-50 employees
Reseller
Top 5Leaderboard
A stable tool that provides easy-to-use policies and safe infrastructure for remote access
Pros and Cons
  • "The policies are easy to use."
  • "The product’s architecture is a bit distributed."

What is our primary use case?

We use the solution for our customers. Whenever the users work from home, they connect to the solution and are redirected to their network. It is very simple. They install the client, and the client makes a tunnel to the product. Once they are connected, they can enter into the network.

What is most valuable?

The policies are easy to use. Once we are connected, the entire infrastructure is safe, irrespective of the device we are using. There is no need to worry about safety. It's a secure tunnel that helps us access the network. It is a very useful feature. We can access the internal resources once we are connected to a VPN. We need not be in the office. The solution performs well.

What needs improvement?

The product’s architecture is a bit distributed. It should consolidate the architecture to make everything available on a single dashboard.

For how long have I used the solution?

I have been using the solution for two and a half years.

What do I think about the stability of the solution?

The tool is stable.

What do I think about the scalability of the solution?

The tool is scalable. We may need to opt for higher boxes. We work with enterprise customers.

How are customer service and support?

The technical support is hardly good. The support team must improve its response time. It should also improve follow-ups through email.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with Sophos and Array Networks. Check Point’s stability is better compared to other tools. I have frequently faced disconnection and other issues with other products.

How was the initial setup?

The initial setup is not easy. We need to be skilled in Check Point to install the solution. The time taken for deployment depends upon the number of boxes we install. If we install one or two boxes, one or two weeks is sufficient.

Our customer needed to install more than 100 boxes in every region. It takes months to deploy the product at that scale. We need a team of 20 people to implement the tool for an enterprise. Once the installation is done, maintenance is easy. The product runs smoothly.

What other advice do I have?

I recommend the solution to every vendor with Check Point as a firewall because it has great stability and security. We can terminate our VPN services to the same box if we're already using Check Point VPN. Overall, I rate the product a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: MSP
PeerSpot user
Recep  Alver - PeerSpot reviewer
Cyber Security Engineer at Natica IT Consulting at Natica IT Consulting
Real User
Easy to use and set up with good security
Pros and Cons
  • "It is stable most of the time."
  • "We have noted some stability issues."

What is our primary use case?

We primarily use the solution as a VPN for connection purposes. It helps us connect to corporate. 

What is most valuable?

It is easy to use and easy to set up. The setup is very fast.

The security is pretty good. 

It is stable most of the time.

What needs improvement?

It's becoming old-fashioned and slightly out of date. We're moving towards DNS.

We have noted some stability issues. 

For how long have I used the solution?

I've used the solution for more than a year at this point. The company has maybe used it longer. 

What do I think about the stability of the solution?

The stability is very good. I'd rate it nine out of ten. It could be a bit better. It might now work with all programs. 

What do I think about the scalability of the solution?

The solution is scalable. We have 80 or 90 users on the product.

It is not extensively used. 

How are customer service and support?

We do not need to use technical support. We are technical ourselves and can handle issues. 

Which solution did I use previously and why did I switch?

I've used Palo Alto and Sophos, among other solutions. I've used a few different solutions. 

How was the initial setup?

The initial setup is very fast and straightforward. It only takes about five to ten minutes. 

You simply set up your firewall and handle settings and then send links to your IT team that can connect them.

What about the implementation team?

We were able to manage the setup in-house. We did not use a consultant or integrator. 

What was our ROI?

I have not witnessed any ROI. 

What's my experience with pricing, setup cost, and licensing?

The license is renewed yearly. I'm not sure of the exact price or if it is expensive. 

What other advice do I have?

I'd rate the solution nine out of ten. 

I would advise companies to make sure the configuration is correct on the firewall.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 20
CheckPoint RA VPN 2023
Pros and Cons
  • "Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
  • "The VPN remote Access blade could be improved."

What is our primary use case?

After implementing our GW and management security appliance in our public cloud infrastructure, we needed to establish P2S VPNs so that some users could connect to our offices safely to be able to access information and internal applications from anywhere.

This need begins when the sales department requires access to internal resources to be able to show solutions that we sell to clients. However, these connections were mostly from public places without security, which was clearly a huge vulnerability of the company.

Thanks to this tool, we managed to solve this need.

How has it helped my organization?

Check Point Remote Access VPN has given us the ability to provide access from a client to our network. It offers a simple and integrated installation with security measures such as MFA in addition to being able to enter our infrastructure in a controlled and secure manner. The solution not only provides access. It also generates monitoring and event logs and maintains connections correctly,

Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised.

It is also essential to know that the users who can use the solution are under granular policies from the security application. Policies that can be applied to different user profiles guarantee correct and effective access for the different departments of the company.

What is most valuable?

Its implementation is very simple through the VPN blade in our Check Point gateway which is located and implemented within our public cloud architecture.

Its different monitoring and records generate the required tools to be able to provide good control of everything that happens during the connection time of the users.

Also, the policies can be generated as granularly as desired, and the portal is extremely intuitive. All this is a great help for administrators to manage VPNs.

What needs improvement?

The VPN remote Access blade could be improved. Licensing is extremely expensive per user and more so for large companies where the number of users directly impacts the cost.

The documentation for good practices and specific configurations is somewhat old, generally for versions before R80, which is why it is sometimes more challenging to understand them or be able to implement them,

Also, at the support level, response times can be improved, as the technical level for this type of tool is very good.

For how long have I used the solution?

This is a very good tool and we have used it for a long time from our Check Point gateway. It's security management is providing the perfect and secure solution to connect from any location.

What do I think about the scalability of the solution?

This solution is scalable in cluster and VSS architectures.

Which solution did I use previously and why did I switch?

Previously we have used FortiClient to solve VPN problems. At some point, we also used the Azure P2S VPN. However, it does not provide security.

What's my experience with pricing, setup cost, and licensing?

It is very necessary for a company to have the support of a partner so that they can provide you with cost estimates, documentation, and access to tests that are not publicly available.

Which other solutions did I evaluate?

We always seek to validate the documentation of each security tool seeking the most significant benefit for our interests and each of the company's needs.

What other advice do I have?

It's a very good tool for VPN security. It is somewhat expensive, but they should evaluate it so they can have a more personal concept.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2025
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.