Try our new research platform with insights from 80,000+ expert users

Aruba Virtual Intranet Access vs Check Point Remote Access VPN comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 25, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Aruba Virtual Intranet Access
Ranking in Enterprise Infrastructure VPN
34th
Average Rating
7.0
Reviews Sentiment
6.5
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Check Point Remote Access VPN
Ranking in Enterprise Infrastructure VPN
3rd
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
91
Ranking in other categories
Remote Access (6th)
 

Mindshare comparison

As of March 2026, in the Enterprise Infrastructure VPN category, the mindshare of Aruba Virtual Intranet Access is 0.8%, up from 0.3% compared to the previous year. The mindshare of Check Point Remote Access VPN is 3.2%, down from 3.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Infrastructure VPN Mindshare Distribution
ProductMindshare (%)
Check Point Remote Access VPN3.2%
Aruba Virtual Intranet Access0.8%
Other96.0%
Enterprise Infrastructure VPN
 

Featured Reviews

reviewer1934385 - PeerSpot reviewer
Director of Electronic procurement department at a government with 51-200 employees
Very user friendly but configurations can be a bit complex
We use the solution to access company information via the cloud.  The solution is very user friendly.  Configurations can be a bit complex.  I have been using the solution for two years.  The solution is stable.  Technical support is very helpful so I rate them a seven out of ten.  Neutral…
Dhiren - PeerSpot reviewer
Team Lead - Network and Security at Digitaltrack
Secure data transfers and reliable remote connectivity have strengthened infrastructure
Check Point Remote Access VPN helps me secure and protect my data. If a remote user's device has a vulnerability, the VPN helps. It is very reliable and cost-effective. It keeps my data protected so no one can breach it. There is no interception between the two channels, from the user to the data center, when the VPN tunnel is established with Check Point. Check Point also has a high rate of threat prevention, so I really trust it in this case. I have noticed that my data is now more secure and reliable when accessed from a remote location. This is an issue that it has resolved for my data center.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is very user friendly."
"It is stable most of the time."
"Check Point Remote Access VPN is a stable solution."
"The solution offers high scalability as far as adding more users."
"The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
"Check Point Remote Access VPN has impacted my organization positively by providing better security and ensuring our data is safe within the entity."
"The complexity is hidden within a full mesh network, allowing seamless user-to-application connectivity with minimal delay."
"After deploying Check Point Remote Access VPN, the ease of doing work from anywhere has resolved our challenges."
"Among its most valuable features is how it quickly and easily connects everyone to the VPN service."
 

Cons

"Configurations can be a bit complex."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"Check Point Remote Access VPN's enterprise support could be improved."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20. If you don't get on your phone right away and check on your authentications, it will kick you out."
"The interface itself needs improvement. When you need to create something, you have to go through a lot of steps. It needs to be simplified."
"The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."
"The SSL VPN needs a Java applet to be installed and it is also dependent on the latest version of Java."
"The Compliance software blade is available only for the Windows operating systems family, so no macOS security checks are implemented and performed."
"Our key technical supports come during hours that are not aligned with our working hours, which sometimes affects our access to support."
 

Pricing and Cost Advice

Information not available
"The product is expensive. I rate its pricing a ten out of ten. For the cost of one product, we could purchase two or three Fortinet solutions with the same amount of money."
"There is a license required for this solution."
"My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers."
"My company makes yearly payments only towards the licensing costs attached to Check Point Remote Access VPN, as there are no extra costs attached to the product."
"The price of this product is good."
"I give the price of the solution a five out of ten."
"Check Point Remote Access VPN is not expensive and the cost is annual."
"I can say that the licensing costs are charged annually."
report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Outsourcing Company
20%
Computer Software Company
11%
Manufacturing Company
10%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business54
Midsize Enterprise31
Large Enterprise34
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with Check Point Endpoint Remote Access VPN?
The main improvement I see for Check Point Remote Access VPN would be a cleaner, more modern interface. It works well, but a streamlined UI would make the day-to-day even smoother.
What is your primary use case for Check Point Endpoint Remote Access VPN?
Check Point Remote Access VPN is used to provide employees access to internal corporate resources when they are working from home or outside the office. The finance team and HR team securely connec...
 

Also Known As

Aruba VIA
Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
 

Overview

 

Sample Customers

VERISK
Osmose, International Fund for Animal Welfare (IFAW)
Find out what your peers are saying about OpenVPN, Fortinet, Check Point Software Technologies and others in Enterprise Infrastructure VPN. Updated: February 2026.
884,933 professionals have used our research since 2012.