Try our new research platform with insights from 80,000+ expert users
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Provides safe connection, good security, and remote access
Pros and Cons
  • "The solution implemented in the cloud allows us to easily scale in cases of user increase."
  • "Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines."

What is our primary use case?

The company needs a tool that will provide users with the ability to connect from external addresses and that is where Check Point Endpoint Remote Access VPN services were contracted, which allows users to connect to our firewall. We also have Check Point firewalls in the cloud, to which people can also connect. They can then access the resources in our on-premises environment that they need to access, such as their computers, the Intranet, Salesforce, or our production applications, and have a 100% secure connection.

How has it helped my organization?

Check Point Remote Access VPN has helped us that our users and providers can connect to our network in a safe and efficient way, with the pandemic most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way, the solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

What is most valuable?

Check Point Remote Access VPN has helped us in that our users and providers can connect to our network in a safe and efficient way. With the pandemic, most of our collaborators worked from home with this tool we were able to solve those connections and maintain the security of the company through policies and rules and managed to make everyone connect in an easy way. The solution has allowed us to eliminate the local VPN solution and eliminate the firewalls of the data center. The solution implemented in the cloud allows us to easily scale in cases of user increase

What needs improvement?

One of the parts where the improvement of Check Point Remote Access VPN can be forced is in the compliance analysis. Sometimes it causes the consumption of machine resources, and also improves the scanning since they consume many resources in the clients' machines.

Another point to improve is to program a timeout if the VPN is disconnected due to an internet problem. One complication that we found is that the Linux machines do not have a complete client to do the installation and that has not delayed a bit with our users who use this type of operating system

Buyer's Guide
Check Point Remote Access VPN
August 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,685 professionals have used our research since 2012.

For how long have I used the solution?

This solution has been used for approximately Three years in the company.

What do I think about the stability of the solution?

It's very stable in terms of downtime. The performance is very impressive.

What do I think about the scalability of the solution?

The solution can be easily scaled by adding a security gateway and general security and is very robust.

How are customer service and support?

On some occasions, we have had problems. Sometimes it takes a long time to resolve a case while on other occasions they resolve very quickly.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no type of tool that would supply these qualities.

How was the initial setup?

The configuration was very simple. The application is a very user-friendly tool apart from training and courses for implementation.

What about the implementation team?

A Check Point engineer who had a lot of experience in his work helped us with the implementation.

What was our ROI?

Mainly, it offers stability and detects behaviors, and gives users (and administrators) a level of trust as they go about their daily work. It introduces a lot of granularity to our policies.

Another feature that has been helpful is the sandbox feature. Many companies offer this type of thing now, however, Check Point has been offering it for quite some time.

What's my experience with pricing, setup cost, and licensing?

Check Point manages to provide good cost in its products and it is worth making the investment since this solution can prevent a collapse in the organization.

Which other solutions did I evaluate?

Check Point was always our first option with this type of solution since many security teams are from Check Point.

What other advice do I have?

One of the main aspects of importance in a company is the security of the computer platforms. When making an investment with these tools you are taking care of an important patrimony that will double your profits.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2072484 - PeerSpot reviewer
Information Technology Admin at a wellness & fitness company with 51-200 employees
Real User
The admin features make the management smoother
Pros and Cons
  • "I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience."
  • "The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection."

What is most valuable?

I like the fact that Remote Access allows the administrator to control and manage things. It makes things smoother, and it has been an excellent experience. 

What needs improvement?

We started with 50 users, but our numbers are increasing. Now it's difficult for us to maintain a steady internet connection and remote access, so we want to upgrade. We are considering a switch to FortiGate. I think they may have better service than Check Point offers. 

Scalability is where we're having problems now. Generally, Check Point has been working fine, but we need something that can accommodate many users and provide a steadier internet connection. Our remote users need to access the VPN without any issues. Of course, this could also have something to do with our internet connection at the organization.

We've been using Check Point to manage sites we need to block. It gives us the option to totally disable things, but it does not let the administrator create exceptions to allow specific users to access certain websites. Check Point could enable the administrator to permit users to access particular sites. I think the VPN we're using may have exceeded its lifespan. For example, if you check Instagram on Check Point, you might not even see it showing up, and it's difficult to restrict access to specific applications. 

For how long have I used the solution?

We started using Remote Access VPN sometime in the past five years.

What do I think about the scalability of the solution?

The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection.

It fills the logs and cuts off our connection when it gets full. It stops working. It's time-consuming to reset the device and reload the backups. It takes us about two hours because we would need to reconfigure those routes and integrate them with the IP addresses we have set up.

How was the initial setup?

The setup was straightforward. Everything was populated on Check Point, so it was easy to select what we wouldn't allow. We deployed on-premise because we have the space and infrastructure to support it. 

The deployment didn't take long. Two IT people are responsible for the deployment and maintenance. The online documentation will walk you through the process. When you do a manual reset by pressing the button, it guides you through the setup process. You only need to follow the steps. 

After that, we import our backup file, and it populates. Next, we run the updates and check we forgot to configure anything else. Some backups are older and might not align with what we have running on the ground. 

What was our ROI?

I haven't seen an ROI.

What's my experience with pricing, setup cost, and licensing?

The cost varies. I believe the price ranges roughly from about 3000 to 4,000 ZWD. I don't think it gets any lower than that. The initial cost is high because you need to buy the hardware, and you incur some setup costs, but the expense drops in the long run.

Which other solutions did I evaluate?

So far, I have not tried any other solutions. I'm doing the research now. I'm still shopping around, trying to understand what's on the market before deciding.

What other advice do I have?

I rate Check Point Remote Access VPN eight out of 10. Aside from our current performance issues, it was smooth and flawless. I'm still shopping around. I was content with Check Point, but I want to see what's out there. I'm interested in knowing more about other available solutions. My primary goal is to avoid going through this process again two years from now. I'm hoping the next product will be a long-term solution, and it will be a while before we consider upgrading to something different.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Remote Access VPN
August 2025
Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,685 professionals have used our research since 2012.
Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd
Real User
Has great security features, including zero-day protection, malware protection, and anti-phishing
Pros and Cons
  • "The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera."
  • "There was complexity in the initial setup."

What is our primary use case?

The solution is primarily used for secure access for remote users. It's deployed as a SaaS over the cloud. 

What is most valuable?

The solution offers great security features, including zero-day protection, malware protection, anti-phishing, et cetera.

What needs improvement?

If you are new to deploying the solution, the initial setup might be difficult the first time around. I had trouble setting the policies and then resetting the device. 

For how long have I used the solution?

I joined my company eight or nine months ago and have been dealing with the solution since then.

What do I think about the stability of the solution?

I don't have much information on the stability aspect of the product. I haven't spoken to customers about their experience. 

What do I think about the scalability of the solution?

I haven't discussed scalability with customers to get their take on how easy it is. 

How are customer service and support?

We haven't referred to the technical support of Check Point just yet. We did have a replacement engineer assist us in deployment, and they handled it quite well. 

How would you rate customer service and support?

Positive

How was the initial setup?

There was complexity in the initial setup. With one client, once we installed it and then tried to set the policies, the firewall was not responding very well. I was doing it for the first time, so we were unable to do it. The customer was not pleased with that, so we had to send another engineer to deploy that device. That's not to say it's overly hard - it was just my first attempt at an installation.

We had three engineers handling the initial setup. We deployed it over two days. 

I'm hoping that the next time I'm deploying it, it should be done perfectly, without any support from any other engineer.

What about the implementation team?

We do the implementation for our clients. 

What's my experience with pricing, setup cost, and licensing?

I'm not aware of the exact licensing costs associated with the product. 

What other advice do I have?

We are in the business of selling firewalls. We're resellers and Check Point partners. 

I personally have sold just the Check Point solution to only one customer. We are also selling data storage solutions, data backup, and cyber security solutions.

We are dealing with the latest version of the solution.

The solution is available both on-premises and in the cloud. 

I'd rate the solution nine out of ten. I'd recommend it to other users and companies. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Eduardo Barcelos - PeerSpot reviewer
Sales Engineer at Tempest Security Intelligence
Real User
Beneficial multiple factor authentication, lightweight on resources, and simple deployment
Pros and Cons
  • "The most important feature of Check Point Remote Access VPN is the multiple factor authentication."
  • "Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication."

What is our primary use case?

Check Point Remote Access VPN is used to allow our employees to use the corporate resources or remote access to the corporation and lightweight on resources.

What is most valuable?

The most important feature of Check Point Remote Access VPN is the multiple factor authentication.

What needs improvement?

Sometimes we have some small problems with Check Point Remote Access VPN. For example, problems with authentication.

For how long have I used the solution?

I have been using Check Point Remote Access VPN for approximately three years.

What do I think about the scalability of the solution?

We have approximately 1,000 users using this solution. We do not have plans to increase usage at this time.

How was the initial setup?

The initial setup of Check Point Remote Access VPN is simple. The deployment took us approximately two weeks.

What's my experience with pricing, setup cost, and licensing?

Check Point Remote Access VPN is not expensive and the cost is annual.

What other advice do I have?

I rate Check Point Remote Access VPN a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE
Real User
Secure remote access integration and hotspot access with a multi-level authentication support system
Pros and Cons
  • "The secure hotspot access for enabling good network connectivity is great."
  • "Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners."

What is our primary use case?

Check Point Remote Access VPN is a highly secure and seamless software that provides end-to-end security solutions to business users while they are working remotely and traveling for business purposes. Our organization involves over 70% of business travel to generate revenue, and it becomes really troublesome to secure the IT devices and cloud system at such traveling times. 

Check Point Remote Access VPN is the best available solution in the market for providing endpoint management solutions by ensuring adherence to strict compliance and multiple scanning of the data to ensure no data theft or leakage and security and compliance are maintained at the highest level possible.

How has it helped my organization?

Check Point Remote Access VPN provides multiple factor authentication layers, and due to that, all the data transmission is completely scanned for any malware or malicious cyber threats. It is integrated with our various IT and cloud systems and performs its security scanning 24/7 without any glitches or trouble.

Also, they provided a multi-level authentication support system for continuous scanning and compliance management throughout the IT system.

They enable a secure hotspot registration process for enabling all-around support of IT systems while operating remotely without any hassle.

What is most valuable?

The secure hotspot access for enabling good network connectivity is great.

Multi-layer scanning of IT systems across various critical stages for detection of threats and malicious threats has been useful.

Provisioning VPN Client and Auto Connect management system for free flow of information without any data mismanagement.

The secure remote access integration is available for both android and IOS devices and systems is helpful.

The multi-factor authentication support system is a phenomenal feature for providing all-around authentication support to for secure IT enablement. 

What needs improvement?

We are still in the learning phase as of now, and there seem to be more and more feature upgrades in the standard version of the application. They're providing updated features in the application with complete compliance assurance - which is really awesome - and we need specific customizations to make it a perfect fit for our business environment. This is a new and emerging area and requires a lot of customization and flexible features to suit the business requirements. 

Price category and smooth renewal of agreement should be considered for flawless and quick onboarding of clients and partners.

For how long have I used the solution?

I've used the solution for over six months now.

What do I think about the stability of the solution?

The solution is quite stable.

What do I think about the scalability of the solution?

It is an absolutely scalable solution.

How are customer service and support?

Technical support has been so far so good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution earlier.

How was the initial setup?

The setup is effortless and smooth.

What about the implementation team?

We installed the solution through the vendor ONLY.

What was our ROI?

We've seen an ROI of over 75%.

What's my experience with pricing, setup cost, and licensing?

I recommend all businesses to go for Check Point Remote Access VPN. It's one of the best of its kind in the market today. 

It has enormous features for ensuring security management solutions for remote workforce coupled with compliance assurance in the businesses. 

It's one of the highly cost-effective solutions which leads to boosting business performance, and also renewal is smooth without any hassle. The licensing is not pricy and is affordable by organizations.

Which other solutions did I evaluate?

The business and IT team did a lot of brainstorming sessions on this, and it went of really well in evaluating various available products in the market with their offerings.

We evaluated McAfee, Nord, and others

What other advice do I have?

I'd advise others to try the solution today itself and experience the utilities on their own. I am sure, they will love the product offerings and utilities to the greatest extent possible 

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port
User
Excellent support with great multi-factor authentication and compliance checks
Pros and Cons
  • "It offers a simple configuration and setup."
  • "It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices."

What is our primary use case?

We primarily use the solution for work from home. Our main goal is to provide users with the ability to access their workstation from anywhere in the world.

We provided remote access to more than 500 users during the pandemic. Check Point Remote Access VPN has worked smoothly as our appliance is capable of supporting 1000+ users.

We deployed a VPN client-based solution with multi-factor authentication. The compliance check feature is useful.

It is compatible with several operating systems, and it has great protection against malware.

It offers a simple configuration and setup.

How has it helped my organization?

We developed work-from-home policies for our organization during the pandemic due to the rise in COVID cases. As network security engineers, it's challenging for us to manage users' personal laptops and computers which are not up to date (OS, Antivirus ..etc). However, when it comes to the Check Point VPN solution, we overcame all the challenges and successfully implemented our infrastructure. Logs are helping us to monitor each user's activity. We can also isolate user laptops or PCs from the internet when its gets connected to our network.

What is most valuable?

The remote access blade is built in on the firewall, so it is easy to activate through the Smart Console.

Only the VPN client supports only the Windows and Apple Mac operating systems, which also support iOS and Android mobile platforms. The Check Point development team deserves praise for a flawless experience.

Multi-factor authentication and compliance checks help us to ensure maximum security.

VPN logs give us complete visibility and track unusual activities.

The VPN client user interface is simple and perfect.

The VPN client software is lightweight.

What needs improvement?

It's difficult to configure on Linux workstations as Check Point Remote VPN clients support only Windows and Mac devices.

The configuration of a VPN requires a distinct VPN Tab. Once the VPN blade has been activated, after activating VPN blade, we need to make some configurations in the gateway option settings and others in the VPN communities section. It would be preferable if these two things came together in one place.

Apart from this, it operates flawlessly. To improve our IT Services, we poll our users. The majority of people say how excellent the remote access VPN service is. Additionally, they stated that once connected to a VPN service, they never experience connectivity problems.

For how long have I used the solution?

I've used the solution for more than two years.

How are customer service and support?

The product offers excellent customer service and support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used a different solution that did not satisfy us in terms of security. As a result, we decided to deploy Check Point for enhanced security.

Before migrating to the Check Point firewall, we conducted market research and solicited feedback from my contacts who are already Check Point NGFW customers. We decided to use Check Point.

How was the initial setup?

The VPN Setup and initial configuration are tricky and not straightforward. For example, you need to:

1. Do some configuration in the gateway option, then:

2. VPN Communities

It would be preferable if step 1 and step 2 were available in one place.

3- Lastly, you must apply the firewall policy

What about the implementation team?

We implemented this solution ourselves.

What was our ROI?

We now have a reliable VPN solution to offer our staff, which is a significant return on investment.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good security, protects identity, and allows full access even in different regions
Pros and Cons
  • "The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
  • "The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately."

What is our primary use case?

Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data. 

Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.

How has it helped my organization?

The solution is giving us security when it comes to sharing our data safely through the private and secure tunnel that is created when creating the VPN. The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet. Online hackers won't be able to use your real IP address to discover your personal data, and government surveillance agencies and ISPs won't be able to monitor what you do online by snooping on your traffic.

In addition to helping you avoid government surveillance, it also helps keep your privacy safe from advertisers.

What is most valuable?

In terms of the way they ensure traffic, an example is when we use Wi-Fi in public areas.

WiFi is everywhere nowadays and it is extremely convenient to use, especially if you have a tight mobile data plan. The only problem with free WiFi is that it's often unsecured, which means you're putting your personal data at risk every time you use it. After all, cybercriminals can find out a lot about you, which can lead to them stealing your:

  • Credit card details
  • Bank account details
  • Email login credentials

However, if you use a VPN, you won't have to worry about those dangers. A VPN uses encryption to protect your online communications, making sure no one can monitor it. Basically, if a hacker tried to see your connection traffic, they would just see nonsense.

What needs improvement?

That the level of Remote access VPN was higher by default as other brands do it that way. In the case of Check Point, they are not like that. The maximum it is giving us is only 5 licenses and if you need more, they must be purchased separately. From my perspective, it should be added to the same cost as the general license, and that well explained makes the product more attractive. Many organizations would have this need, as many are moving off-premise. We have great executives and entire corporate teams that perform work tasks from home.

For how long have I used the solution?

I've used the solution for about 2 years.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT
User
A flexible gateway with good security and helpful technical support
Pros and Cons
  • "We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway."
  • "In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."

What is our primary use case?

Since SARS-COV2, most users went to work from their home office, so we needed to have an robust, secure, and stable VPN connection. We implemented Check Point VPN and we have had no problems with it. We are almost 50 users working from home securely. Also, the access rules based on VLANs have helped many users get access depending on which connection they have. For example, some users with VPN connections can only access some specific servers and ports, however, when they are on an internal LAN, they have access to the entire network.

How has it helped my organization?

We have more control over the activity that users have on the internal network, thanks to the monitoring offered by Check Point and the security provided by the gateway. 

I'm the IT manager for the company, and my work has been improved due to the fact that, in conjunction with VPN, we implemented the Endpoint Security client so we can manage our client's computers even if they are not physically in the office. When we need to remove some users from a VPN connection we just need to lock the account and use the assets console to disable the feature from the client's computer.

What is most valuable?

The combination of the user accounts for the VPN with the access rules provided by the security gateway gives you more control and specificity about who has access to what. For external users, we can offer a solution based on the internet needs and we are able to share information on a secure channel. We can specifically point to the desired resources in the organization without the need to install any additional software on external client machines.

What needs improvement?

It needs to improve the capability of the Secure browser VPN connections. Some in-house applications didn't work due to the use of JScript and the backend and front end technology for the applications. In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers.

For how long have I used the solution?

I've used the solution for over two years.

What do I think about the stability of the solution?

It's very stable, however, I recommend some scheduled restarts for cleaning connections and processes.

What do I think about the scalability of the solution?

It is very easy to manage the solution and also the integration.

How are customer service and support?

I have had a good experience with the support tickets that I have dealt with.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previous to Check Point, we didn't have any gateway security.

How was the initial setup?

The initial setup was a little complex as it was the first time working with Check Point.

What about the implementation team?

The implementation was handled by an in-house team.

What was our ROI?

We expect that investments is recovered in two years.

What's my experience with pricing, setup cost, and licensing?

The pricing is fair and the support team is good.

Which other solutions did I evaluate?

We were evaluating Fortinet as well.

What other advice do I have?

Check Point is very reliable and secure.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Buyer's Guide
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions.