Check Point Remote Access VPN and Prisma Access by Palo Alto Networks compete in the VPN and cloud security domain. Prisma Access appears to have the upper hand with its advanced cloud-native security capabilities that offer seamless integration and comprehensive security management.
Features: Check Point Remote Access VPN provides seamless integration into existing ecosystems, has Active Directory integration, and offers SSL VPN without additional hardware requirements. Prisma Access is praised for its cloud-native security that ensures secure access to cloud and on-premises resources, advanced threat protection, and mobile user integration.
Room for Improvement: Check Point faces challenges with simplifying its interface, better integration with other devices, and deployment issues on Windows and Linux. Prisma Access is criticized for its high cost, complexity, limited licensing flexibility, and slow support response times.
Ease of Deployment and Customer Service: Check Point's deployment relies on existing Check Point infrastructure, offering less flexibility for new users but seamless integration for current users. Customer support is generally positive. Prisma Access excels in deploying across hybrid and public cloud environments, with highly regarded customer service despite some concerns about response times.
Pricing and ROI: Check Point offers competitive pricing, especially for existing users, and is noted for its cost-effectiveness. Prisma Access is considered expensive but justified by its advanced features. It offers potentially substantial ROI for businesses requiring secure cloud access, though high initial costs and complex licensing models can be a barrier.
It reduces the dependency on being physically present in the office and enhances the overall user experience, saving time and maintaining security.
In this case, everything is pre-inbuilt, allowing me to easily create new users and share their details so they can connect to Check Point VPN and access internal servers.
Since implementing Check Point Remote Access VPN, I have seen a return on investment as it saves me money and allows users to easily access internal resources from home.
Contacting the Technical Assistance Centers (TACs) initially can be difficult, but once I get in touch with the TAC team, it is easy to solve problems.
The timing of technical support does not always align with our working hours.
While the support team is generally good, it takes at least three to four days to address ticket issues.
The product is reliable, making customer support less frequently needed.
We rarely need to contact support due to having a strong internal team and a robust product.
Currently, 130 users can connect simultaneously, and it is very reliable and efficient.
I feel confident that Check Point Remote Access VPN can scale effectively if our organization grows, as it can handle additional users and traffic.
To scale, one would need to upgrade or acquire more hardware.
Prisma Access provides significant scalability, allowing integration of different systems.
Prisma Access by Palo Alto Networks is a cloud-based solution, and from my experience, there are no issues with scalability.
Check Point Remote Access VPN is stable and has been reliable for my users.
I think the stability of Prisma Access by Palo Alto Networks is excellent, and I would rate it ten out of ten.
GlobalProtect is a satisfying solution, and the product is robust without major stability issues.
Prisma Access is very stable.
Deploying these solutions requires higher technical expertise than other solutions.
Check Point Remote Access VPN can be improved by having more granular options to steer traffic, like easier configurations for split tunneling, which is currently complex.
Check Point Remote Access VPN could improve by automatically switching between my two ISPs when one goes down.
Hosting it in the cloud can mitigate these issues by allowing connection through the nearest Palo Alto or Prisma Cloud regional hub.
There is a lack of integration with third-party solutions like CrowdStrike or SentinelOne in Prisma Access by Palo Alto Networks.
It is competitively priced, and we have chosen it for its market leadership in the firewall space.
The pricing, setup cost, and licensing are straightforward, though the setup is a bit expensive.
The pricing, setup costs, and licensing for Check Point Remote Access VPN are a bit low compared to my previous solution.
The pricing is on the higher side, rating it around eight to nine out of ten.
From my experience, Palo Alto is more expensive compared to solutions like Netskope and Triscale.
Pricing for Prisma Access and Prisma SD WAN is high due to the need for different hardware flavors like IONs.
The functionality enables secure access for remotely connecting users, which is necessary for our operations.
The end-to-end endpoint security provided by Check Point Remote Access VPN impacts our organization by ensuring compliance and enhancing security.
The visibility offered by Check Point Remote Access VPN has benefited my organization as it detects unauthorized access attempts, immediately alerting me via a pop-up for any threat protection issues.
These features are security-driven, providing robust protection against increasing cyber threats by integrating NG Firewalls, SD WAN, and CASB, all within a fully cloud-native solution.
GlobalProtect has been beneficial for its cloud security capabilities, which are vital as businesses seek hybrid options and need to support remote workers while addressing latency issues.
One of the most valuable features of Prisma Access by Palo Alto Networks is the ability to manage on-premise firewalls.
Remote secure access VPN is a solution that provides users with remote access to an organization’s network. The host may have VPN client software loaded or use a web-based client. The solution leverages security features like multi-factor authentication, endpoint scanning, and encryption of all data in motion.
Check Point Remote Access VPN provides individuals with protected and efficient access to a company network from anywhere. This strategy fosters collaboration and connectivity between distributed teams and offices.
Features of Check Point Remote Access VPN
Key features of the secure remote access VPN include:
The system enforces endpoint security with endpoint compliance. It monitors and verifies the security status of each endpoint and reports back to the Security Gateway. The gateway, in turn, checks the compliance level and directs the connectivity to the right resources.
Users can deploy the Remote Access VPN in one of three ways:
Remote Access VPN is centrally managed. The centralized console enables management and enforcement of policies with a single log-in.
The Remote Access VPN has a web portal that users can use to connect securely to corporate applications, such as web-based resources, file-sharing, and email. Administrators can customize the web portal to match the brand identity.
Remote Access VPN offers two choices for remote access:
The authentication features include password management, RADIUS challenge/response, CAPI software, and hardware tokens. P12 certificates, and SecurID.
The system establishes a VPN tunnel on demand. It also re-arranges connections when roaming. The tunnel can automatically tear down when the user is on the corporate LAN.
There are several connection features, such as Hotspot detection, office mode IP, split tunneling, and automatic fallback to HTTPS.
Benefits of Check Point Remote Access VPN
One of the key advantages of Remote Access VPN is that it provides remote workers with a secure way to connect to a corporate network from any device, including their personal devices. The data encryption in transit enables them to securely access the resources they need for their tasks.
It also provides IT support and technicians with a faster way to troubleshoot software issues. In the case of a ticket, IT doesn’t need to go to the server location to fix the problem but can troubleshoot it remotely.
A remote secure access VPN is also an affordable alternative for small and medium-sized businesses, without requiring expensive infrastructure.
Reviews from Real Users
A Global IT Network and Security Service Senior Specialist at a manufacturing company who uses Check Point Remote Access VPN says, "I found the MEP feature the most valuable. This has improved users' latency allowing the users to connect to the nearest Azure Check Point VM."
"Organizations that already use the Check Point NGFW Solution do not require any additional hardware, which makes the implementation straightforward and reduces the time to go live," explains Basil D., Senior Manager at a financial services firm.
Manuel B., a Voice and data infrastructure specialist at a tech services company, says that "The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
Prisma Access by Palo Alto Networks provides consistent security for all users and applications across your remote networks. Prisma Access grants users safe access to the cloud and data center applications and the internet as well. In addition, the solution combines all of your security and networking capabilities into a single cloud-delivered platform, enabling flexible hybrid workforces.
Prisma Access can be managed two ways:
Prisma Access delivers both networking and security services, including:
Prisma Access by Palo Alto Networks Features
Prisma Access by Palo Alto Networks has many valuable key features including: App-ID, User-ID, Device-ID, SSL Decryption, Dynamic User Group (DUG) Monitoring, AI/ML-Based Detection, IoT Security, Reporting, URL Filtering, Enterprise Data Loss Prevention (DLP), Digital Experience Monitoring (DEM)*, Logging, Policy Automation, Intrusion Prevention System (IPS), and many more.
Prisma Access by Palo Alto Networks Benefits
Some of the benefits of using Prisma Access by Palo Alto Networks include:
Reviews from Real Users
Below are some reviews and helpful feedback written by Microsoft Azure Synapse Analytics
users who are currently using the solution.
PeerSpot user Partha D., Global Network Tech Lead at a computer software company, speaks about his experience using the product, saying, "It protects all app traffic so that users can gain access to all apps. Unlike other solutions that only work from ports 80 and 443, which are predominantly for web traffic, Prisma Access covers all protocols and works on all traffic patterns... The most sophisticated attacks can arise from sources that are not behind 80/443."
Tejas J., a Sr. Cloud Security Architect at a computer software company, mentions that "it is geographically dispersed, and it sits on top of Google and AWS platforms. Therefore, you don't face the standard issues, such as latency or bandwidth issues, that you usually face in the case of on-prem data centers.”
Another PeerSpot reviewer, Max I., Associate Director at Cognizant, comments that "Security is absolutely spot-on, really top-notch. It's the result of all the components that come together, such as the HIP [Host Information Profile] and components like Forcepoint, providing end-user content inspection, and antivirus. It incorporates DLP features and that's fantastic because Prisma Access makes sure that all of the essential prerequisites are in place before a user can log in or can be tunneled into."
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.