Try our new research platform with insights from 80,000+ expert users
William Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Oct 30, 2025
Provides safe connection, good security, and remote access
Pros and Cons
  • "The solution implemented in the cloud allows us to easily scale in cases of user increase."
  • "Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."

What is our primary use case?

The company needs a tool that will provide users with the ability to connect from external addresses and that is where Check Point Endpoint Remote Access VPN services were contracted, which allows users to connect to our firewall. We also have Check Point firewalls in the cloud, to which people can also connect. They can then access the resources in our on-premises environment that they need to access, such as their computers, the Intranet, Salesforce, or our production applications, and have a 100% secure connection.

How has it helped my organization?

Check Point Remote Access VPN has helped us that our users and providers can connect to our network in a safe and efficient way, with the pandemic most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way, the solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

What is most valuable?

Check Point Remote Access VPN has helped us in that our users and providers can connect to our network in a safe and efficient way. With the pandemic, most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way. The solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

What needs improvement?

One of the parts where the improvement of Check Point Remote Access VPN can be forced is in the compliance analysis. Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines.

Another point to improve is to program a timeout if the VPN is disconnected due to an internet problem. One complication that we found is that the Linux machines do not have a complete client to do the installation and that has not delayed a bit with our users who use this type of operating system

Buyer's Guide
Check Point Remote Access VPN
March 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.

For how long have I used the solution?

This solution has been used for approximately Three years in the company.

What do I think about the stability of the solution?

It's very stable in terms of downtime. The performance is very impressive.

What do I think about the scalability of the solution?

The solution can be easily scaled by adding a security gateway and general security and is very robust.

How are customer service and support?

On some occasions, we have had problems. Sometimes it takes a long time to resolve a case while on other occasions they resolve very quickly.

Which solution did I use previously and why did I switch?

There was no type of tool that would supply these qualities.

How was the initial setup?

The configuration was very simple. The application is a very user-friendly tool apart from training and courses for implementation.

What about the implementation team?

A Check Point engineer who had a lot of experience in his work helped us with the implementation.

What was our ROI?

Mainly, it offers stability and detects behaviors, and gives users (and administrators) a level of trust as they go about their daily work. It introduces a lot of granularity to our policies.

Another feature that has been helpful is the sandbox feature. Many companies offer this type of thing now, however, Check Point has been offering it for quite some time.

What's my experience with pricing, setup cost, and licensing?

Check Point manages to provide good cost in its products and it is worth making the investment since this solution can prevent a collapse in the organization.

Which other solutions did I evaluate?

Check Point was always our first option with this type of solution since many security teams are from Check Point.

What other advice do I have?

One of the main aspects of importance in a company is the security of the computer platforms. When making an investment with these tools you are taking care of an important patrimony that will double your profits.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 30, 2025
Flag as inappropriate
PeerSpot user
Security Officer at a hospitality company with 51-200 employees
Real User
Top 5
Apr 11, 2024
An intuitive solution that is easy to configure and use
Pros and Cons
  • "The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
  • "The main area for improvement is pricing. Another area could be integrating MFA authentication directly into the solution instead of using separate benchmark tools for implementation."

What is most valuable?

The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control. 

What needs improvement?

The main area for improvement is pricing. Another area could be integrating MFA authentication directly into the solution instead of using separate benchmark tools for implementation.

What do I think about the scalability of the solution?

Nearly all of the company's 700 users used the solution during the COVID-19 emergency.

How was the initial setup?

I rate the tool's ease of deployment an eight out of ten. Integrating the solution with the firewall is easy. Implementing a new user typically takes only five to ten minutes. You create the user in the firewall, install the client, and configure the username, making it ready to use.

Maintaining the solution is my responsibility. However, managing the firewall and VPN involves only two or three people. If you consider the entire security area, there are more people involved.

What's my experience with pricing, setup cost, and licensing?

The product is expensive. I rate its pricing a ten out of ten. For the cost of one product, we could purchase two or three Fortinet solutions with the same amount of money.

What other advice do I have?

Our previous company used this product because it's an excellent solution in the cybersecurity community. It was particularly important in Peru, where we had a strong presence in major companies. We selected the solution and used it for approximately ten years. Even after I left the company, they continued using it because of its importance in Peru and its presence in significant companies.

Fortinet may have gained more presence in recent years than Check Point Remote Access VPN, likely due to its lower cost. However, during my time at the company, we continued to use it. The company may consider migrating to other solutions primarily for cost reasons, as Fortinet is cheaper. However, this decision might not be based on technical superiority but on price considerations.

I rate the product a ten out of ten. You can use it if you can afford the pricing. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
March 2026
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.
reviewer1961277 - PeerSpot reviewer
Senior Ts Systems Integration Specialist at NTT Security
Real User
Nov 1, 2023
Highly secure with good support and multiple factor authentication layers
Pros and Cons
  • "It is easy to install the Endpoint Remote Access VPN client on different platforms."
  • "Bug Fixes and enhancement requests should be remediated earlier."

What is our primary use case?

Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions.

We can connect anywhere in the world over possible ways to secure the infrastructure.

Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.

Also, we have multi-authentication so there is no chance of leakage.

How has it helped my organization?

Check Point Remote Access VPN provides multi-factor authentication layers.

We can make Data transfer more strict with Data Integrity, Encapsulation, DES,3DES, and Hashing Algorithm so that the level of security will be higher.

Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.

Multiple VPN connections can be established and share the data in a secure possible way.

What is most valuable?

It is easy to install the Endpoint Remote Access VPN client on different platforms. Within the company, we use it for Windows and macOS.

Built-in, centrally managed Compliance blade. We check the client OS for the presence of the latest security updates and that the corporate antivirus software is up and running, and do not allow the client to connect to the office site in the case where these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.

The stable VPN connection and uptime are also very good.

We have a centrally managed Firewall blade, which allows filtering traffic on the rule base to protect the requirement.

What needs improvement?

Bug Fixes and enhancement requests should be remediated earlier, as we have multiple dependencies and Auditors are forced to have the latest patches in place.

Checkpoint Major version should have an extended time than the default time mentioned in the end-of-life policy document with additional prices.

Tools must be introduced and supportive in analyzing the data, flow, and threats.

We have to introduce the scripting part to work seamlessly.

For how long have I used the solution?

I've used the solution for more than four years.

What do I think about the stability of the solution?

The solution is stable. 

What do I think about the scalability of the solution?

The solution is scalable. 

How are customer service and support?

The company offers the best support overall and we can trust their advice.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time we are using this type of solution.

How was the initial setup?

The initial setup is straightforward, simple, and centralized. 

What about the implementation team?

We handled the setup in-house.

What's my experience with pricing, setup cost, and licensing?

The product is better than any other product in the marketplace. Technically sounded techies all over the place. It is cost-effective and most importantly stable and secure.

Which other solutions did I evaluate?

We trust the Check Point Software technology.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Feb 12, 2023
Easy to set up with good remote access and a flexible to configure VPN
Pros and Cons
  • "This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers."
  • "Connection of devices from various locations is efficient though there are a few challenges when there is a network failure."

What is our primary use case?

Remote Access VPN helps my team to connect our devices remotely without any limitations. It is easy to establish a secure connection among teams and connect efficiently with maximum security. 

Teams can share files effectively under secure networking infrastructure. When implementing projects and tasks, it conveniently troubleshoots technical issues that can affect information traffic. 

I can now share large size of documents with my colleagues from a remote location without any interference. It is easy to facilitate remote workers and engage them.

How has it helped my organization?

This platform has developed a reliable communication infrastructure that employees can use to communicate with remote workers. The organization has benefited from a secure network that cyber attacks cannot compromise. We can safely access our servers from anywhere, anytime, without fear of losing confidential information. 

It gives the IT team an opportunity to monitor the performance of devices and control their operations. We can freely connect with our clients from remote areas and give them guidelines without physical appearance under a secure connection.

What is most valuable?

Secure remote access has enabled teams to focus on productive meetings without fear of being attacked by external ransomware attacks. Device access from remote networks has enhanced the efficient connection of teams from various areas. 

The setup process is simple, and new users can set it without any challenges. The cost and maintenance charges are relatively low as compared to most products in the market. 

Configuration of the VPN with other applications is flexible with productive performance. Identity and access management enables the IT team to categorize devices and channel them to effective network infrastructure.

What needs improvement?

My experience with the set features has always been excellent. The secure connection networking system has enabled each team to connect effectively with colleagues from anywhere. 

Connection of devices from various locations is efficient though there are a few challenges when there is a network failure. Disconnection due to internet failure may affect the entire connection and slow down the workflow. 

The setup process requires skilled manpower and dedicated teams to get the best results from the entire connection system. 

Integration of more powerful kill switch tools will enhance secure connection. 

Additional server locations can boost service delivery and cut the cost of connecting computing devices from different areas.

For how long have I used the solution?

I've used the solution for 11 months.

What do I think about the stability of the solution?

The secure connection is stable.

What do I think about the scalability of the solution?

I am impressed by the performance of this tool.

How are customer service and support?

The customer support operations have been excellent throughout.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with another VPN.

How was the initial setup?

The initial setup was successful.

What about the implementation team?

Implementation was through the vendor.

What was our ROI?

The ROI has been positive since we deployed this tool.

What's my experience with pricing, setup cost, and licensing?

The setup and licensing terms are effective.

Which other solutions did I evaluate?

This is the best solution that I have come across.

What other advice do I have?

For secure device connection and team collaboration, this is the best solution.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Feb 5, 2023
Good encryption, secure login capabilities and easy to install
Pros and Cons
  • "A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme."
  • "A characteristic to improve is the communication service under the SMTP scheme."

What is our primary use case?

We wanted to give employees the possibility to work from anywhere outside of the organization, being a house or another remote location of offices. We wanted this capability with the possibility and ease to grant them access to our perimeter network so that they could access the data or internal applications for the use of each of its functions. We wanted faster, safer, and more efficient transactions that are going to be shared within our organization based on the business.

How has it helped my organization?

This tool gave us the possibility and the benefit of being able to establish that all users, according to their geographical location, need to transfer, manage, execute, validate, and maintain data. We are always in contact with all users within and outside. It is strong, fast, easy to install, and extremely secure for each of the functions that it is designed for. Important to note is that one of the features uses a single sign-on approach.

What is most valuable?

Among other features, advantages, and services that the solution provides us, it is important to understand that it gives us the possibility, capacity, and management for establishing that each of the resources is accessed through encrypted communication tunnels. A single login based on a second authentication factor is giving us the possibility of integrating third-party services for authentication based on a security scheme. This goes beyond a simple password, giving us the possibility of integrating more than one service. 

What needs improvement?

A characteristic to improve is the communication service under the SMTP scheme. In some cases, it is quite complex when it comes to managing, configuring, forwarding, and integrating mail services. It consumes a lot of processing and RAM memory. We want a solution that allows us to use current resources so that high processing peaks demanded by the virtual or physical equipment do not occur. 

For how long have I used the solution?

I've used the solution for four years.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 20
Jan 22, 2023
Great encryption and MFA with helps improve a company's security posture
Pros and Cons
  • "It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents."
  • "Improved scalability would allow the solution to handle larger numbers of users and devices without a significant impact on performance."

What is our primary use case?

Check Point Remote Access VPN is a VPN solution that allows users to securely connect to corporate networks from remote locations. It enables users to access corporate resources such as files, applications, and network devices as if they were on the corporate network.

The primary use case of Check Point Remote Access VPN is to provide secure remote access for employees, contractors, and partners who need to access corporate resources while working remotely. This can include employees working from home, traveling, or working in a remote office location. 

How has it helped my organization?

It can improve an organization by providing secure access to resources for traveling employees, which can help to reduce the risk of data breaches or other security incidents. 

It also can improve the organization's security posture by providing secure remote access with multi-factor authentication, encryption, and other security features.

It is important to note that the results of the solution will depend on the organization's specific environment and configuration as well as how well it is implemented and managed.

What is most valuable?

Some of the features that are considered most valuable in Check Point Remote Access VPN include: 

Multi-factor authentication. This feature allows organizations to use a combination of authentication methods such as certificates, tokens, biometric authentication, and user credentials to secure remote access connections.

Encryption. This feature provides end-to-end encryption for remote access connections, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks. 

What needs improvement?

The solution needs:

Advanced monitoring and reporting capabilities in order to have a more detailed visibility into security incidents and events. It's important to note that the areas of improvement and additional features will vary depending on the specific use case and the organization's security needs, so it is recommended to contact the vendor to know more details about their roadmap and the next releases of the product. 

Improved scalability to allow the solution to handle larger numbers of users and devices without a significant impact on performance. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Real User
Nov 17, 2022
Good integration, great for remote access, and centralizes users effectively
Pros and Cons
  • "We can integrate remote access to our branches through Check Point services."
  • "Currently, Check Point is an ally that we have used within our organization to protect the perimeter area, the equipment, and other technologies."
  • "We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."
  • "We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution."

What is our primary use case?

We needed to grow a little more at a cloud level, which means that we have had more places in which we host information, and needed to protect it. We needed to allow users to have access from the different branches in the cloud to our main branch and to access remotely. As a result of these needs, we have been looking for solutions that allow us to have quick and efficient access no matter which branch we are going to access, and to have access allowed quickly and easily as if users were inside the perimeter area of ​​our organization.

How has it helped my organization?

Currently, Check Point is an ally that we have used within our organization to protect the perimeter area, the equipment, and other technologies. We have complete protection in one technology that we are using so that our users with greater frequency can access the data of our organization regardless of where they are. With this, they can have quick, simple access as if they were within the perimeter area. This has given us greater protection when it comes to having protected and verified access under user identity.

What is most valuable?

We can integrate remote access to our branches through Check Point services; however, those services come with a centralized identity, a domain identity, which does not work for the different logins. It only works for the login through the remote connection application. The user profile is centralized, verified, and filtered by the tool, thus being one of the characteristics that are very important to me since it shows any activity that the user is going to carry out.

What needs improvement?

We'd like to integrate Check Point into the Remote Access VPN solution and have the ability to integrate multiple devices as access points through the solution. This would allow us to have a tool that it is not only remote access for mobile devices but a remote access solution for virtual teams, including mobile devices such as cell phones, tablets, and other types of devices in IoT areas such as doors, houses, and medical equipment.

For how long have I used the solution?

I've been using the solution for one year.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Eladio José Sibaja Trejos - PeerSpot reviewer
Administrador Junior Level 1 at Compuguana
Real User
Nov 2, 2022
Easy to install, and makes it quick and easy to connect
Pros and Cons
  • "Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
  • "The capacity that Check Point Remote Access VPN offers is one of the best, and it has made it easier for us and the team to have great mobility inside and outside the organization."
  • "It would be good to have Remote Access VPN solutions for Check Point edge services."
  • "It would be good to have Remote Access VPN solutions for Check Point edge services."

What is our primary use case?

Currently, as we are a company that constantly imports and exports solutions. We have needed to give our salespeople access to our executives since that part of retail is constantly on the move inside and outside our organization. This makes it somewhat necessary to figure out how everyone can access data since the information is being used and managed every day inside and outside of our institution. We have come to use the Check Point security services so that users can have the same access as we have inside when they are outside the organization.

How has it helped my organization?

The capacity that Check Point Remote Access VPN offers is one of the best. It has made it easier for us and the team to have great mobility inside and outside the organization. If anyone must consult the services internally, they can connect quickly and simply. The agent that allows the connection is very fast to install and very fast to configure. It has streamlined a lot of the complexity that we had faced before.

What is most valuable?

Among its most valuable features is how it quickly and easily connects everyone to the VPN service. It quickly installs an agent on the computers, so that our users do not have to worry about their mobile devices being configured. It is easy to install and can run and install as a client on devices whether the user has Mac or Windows.

What needs improvement?

In the future, if this service could be installed in a faster and simpler way (rather than having it directly connected to the appliances), that would be ideal. Today, many of the solutions are not what was needed when we had perimeter security. It would be good to have Remote Access VPN solutions for Check Point edge services.

For how long have I used the solution?

We have been using the solution for three months.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.