We performed a comparison between Check Point Remote Access VPN and OpenText Exceed TurboX based on real PeerSpot user reviews.
Find out what your peers are saying about TeamViewer, Microsoft, Citrix and others in Remote Access."To maintain the authorization of the connected user, Check Point provides multi-factor authentication for an RA VPN client to make sure legitimate users have access to resources."
"The biggest advantage of Check Point Remote Access VPN is that we already use the Check Point firewall. We only needed to enable the feature and do the configuration in order to enable the VPN feature. We didn't need to buy or manage new hardware."
"One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities."
"The solution is easy to install, centrally managed, and stable, with good technical support and a straightforward setup."
"Check Point Remote Access VPN is a stable solution."
"Our number of users working remotely vastly increased during the COVID 19 pandemic. Check Point Remote Access VPN allowed us to quickly make the transition from in-office to remote work."
"The solution offers high scalability as far as adding more users."
"The security of the solution is a good feature, the stability is a valuable feature, and the customization is also a nice feature."
"The most helpful feature of OpenText Exceed TurboX (ETX) is that it allows you to consume heavy applications that usually have a lot of latency. I also like that the solution is fast and has a friendly UI."
"The solution is perfect for Linux users."
"We would like to see support for a layer seven VPN over UDP."
"A characteristic to improve is the communication service under the SMTP scheme."
"There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"In an environment with multiple cluster checkpoints, the global properties common to all clusters in some cases give problems."
"The product’s architecture is a bit distributed."
"In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."
"They could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage."
"An area for improvement in OpenText Exceed TurboX (ETX) is the installation process because you need some technical knowledge to install it. What's lacking in OpenText Exceed TurboX (ETX) is a help portal for users to ask questions and seek assistance."
"The performance of the graphical interface needs improvement. They should add some CPU to speed graphic acceleration."
More Check Point Remote Access VPN Pricing and Cost Advice →
Check Point Remote Access VPN is ranked 4th in Remote Access with 57 reviews while OpenText Exceed TurboX is ranked 10th in Remote Access with 2 reviews. Check Point Remote Access VPN is rated 8.8, while OpenText Exceed TurboX is rated 8.6. The top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". On the other hand, the top reviewer of OpenText Exceed TurboX writes "Fast and has a friendly UI; allows you to consume heavy applications". Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Check Point Harmony Mobile, Fortinet FortiClient and Zscaler Private Access, whereas OpenText Exceed TurboX is most compared with VNC Connect, Citrix Workspace, Microsoft Remote Desktop Services and VMware Horizon.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.