We performed a comparison between Check Point Remote Access VPN and Ivanti Secure Access based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"The solution has good performance."
"Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised."
"Check Point Remote Access VPN is a stable solution."
"The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup."
"The ability to create your trigger data domains is the solution's most valuable feature."
"It operates effectively, particularly during challenges like adversities or infrastructure issues."
"The tool is easy to configure and use. We integrated it with Active Directory to manage user authentication. It's intuitive and transparent, making it simple for users to use. It connects automatically to the VPN whenever users turn on the laptop. The product is efficient and offers centralized control."
"The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
"The most valuable feature is the seamless access."
"The most valuable feature of Pulse Client is integration with Google authenticator for two-factor authentication."
"The scalability of Pulse Client is good."
"There must be a more easy-to-use GUI."
"I would like this service to be easier to manage when you integrate it with third parties."
"Improved scalability would allow the solution to handle larger numbers of users and devices without a significant impact on performance."
"The connection has gotten less smooth as the number of users increases. The issue is that the logs fill up quickly. Too many users are connecting remotely. It worked great when we only had a few remote connections. Now, it is disconnecting people and dropping the internet connection."
"Bug Fixes and enhancement requests should be remediated earlier."
"There were some issues with automation and instability."
"The authentication that we handle is through a .p12 certificate, however, we have integrated it with a 2MFA service through another provider. Something that could improve Check Point is if it had its own 2MFA service through a blade or some sort of application."
"They need to increase their timeout. Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds."
"Check Point Remote Access VPN handles up to a hundred megabytes for clients, but I want it to be able to handle up to one gigabyte."
"Pulse Client could improve the system tokens for authentication."
"Pulse Client could improve the reports. The reports are not in PDF and we can't check the details in the reports of users who are using the VPNs."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 6th in Enterprise Infrastructure VPN with 60 reviews while Ivanti Secure Access is ranked 28th in Enterprise Infrastructure VPN with 2 reviews. Check Point Remote Access VPN is rated 8.8, while Ivanti Secure Access is rated 7.6. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of Ivanti Secure Access writes "Integrates well, highly reliable, but lacking reporting". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Zero Trust Exchange, whereas Ivanti Secure Access is most compared with Ivanti Connect Secure, NetMotion Mobility, Tailscale, Microsoft Azure VPN Gateway and Cisco AnyConnect Secure Mobility Client. See our Check Point Remote Access VPN vs. Ivanti Secure Access report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.