Try our new research platform with insights from 80,000+ expert users

Check Point Remote Access VPN vs Safe-T Secure Application Access comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 13, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Remote Access VPN
Ranking in Enterprise Infrastructure VPN
5th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
74
Ranking in other categories
Remote Access (7th)
Safe-T Secure Application A...
Ranking in Enterprise Infrastructure VPN
45th
Average Rating
7.8
Reviews Sentiment
7.7
Number of Reviews
8
Ranking in other categories
Access Management (27th), ZTNA (24th)
 

Mindshare comparison

As of August 2025, in the Enterprise Infrastructure VPN category, the mindshare of Check Point Remote Access VPN is 3.9%, up from 3.9% compared to the previous year. The mindshare of Safe-T Secure Application Access is 0.3%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Enterprise Infrastructure VPN
 

Featured Reviews

NareshKumar9 - PeerSpot reviewer
Reliable remote access boosts productivity and connectivity for home-based users
In my opinion, the best feature that Check Point Remote Access VPN offers is its reliability, as there has been no downtime till now. The reliability of Check Point Remote Access VPN has positively impacted my daily operations by reducing my support tickets, particularly when users face connection issues due to ISP downtimes. Check Point Remote Access VPN has positively impacted my organization by providing users access to the internal network, allowing us to capture all activities through our network. The visibility offered by Check Point Remote Access VPN has benefited my organization as it detects unauthorized access attempts, immediately alerting me via a pop-up for any threat protection issues.
it_user787671 - PeerSpot reviewer
Needs to be easier to configure and to display logs more simply
We use only it for scanning files for viruses. That's the only feature we use in this product It needs to be easier to configure, it should be something that's working well with other sources. It should be something that allows me to see the logs simply. One to three years. Sometimes it doesn't…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The VPN hides your IP address and encrypts your online traffic and it essentially ensures that your fingerprints cannot be traced on the Internet."
"One of the most outstanding features is the ability to deliver third-party services and achieve double authenticity with integrated identities."
"The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
"The solution has been solid for me for over five years."
"The team has full visibility of the users that connect allowing them to keep control of who is in the network and what data they are allowing to come in and out."
"The initial set up is not complex."
"The initial setup was pretty easy."
"The most valuable feature of Check Point Remote Access VPN is its ability to deploy. It follows the same process as their stateful inspection firewall or IPS. If you know how to enable one feature, you can enable and configure others. The learning curve isn't steep."
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"Safe-T is very good for users because it has plug-in for Outlook."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
 

Cons

"There needs to be a way to create a VPN client specific to our environment so that we can easily lock down who can connect."
"Check Point Remote Access VPN's current configuration has some limitations and issues. One major drawback is the inability to configure multiple gateways from the same management server for VPN access."
"Improvements for Check Point Remote Access VPN could include enhancing mobile connectivity for a smoother user experience."
"Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor."
"Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
"In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains). In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers."
"Sometimes the application slows down the computing device, and this affects workflows."
"The Outlook agent is not working well for installing it in the entire office."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
 

Pricing and Cost Advice

"My company makes yearly payments only towards the licensing costs attached to Check Point Remote Access VPN, as there are no extra costs attached to the product."
"The solution is pretty expensive. The rating is an eight."
"Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality."
"I give the price of the solution a five out of ten."
"Check Point Remote Access VPN is not expensive and the cost is annual."
"Regarding pricing, as a global customer, we get a big discount. For us, it's a good return on investment. We need to pay for additional features we want to enable. It seems cheaper than other vendors, but I can't say what it would cost an average customer."
"The price of this product is good."
"I can say that the licensing costs are charged annually."
Information not available
report
Use our free recommendation engine to learn which Enterprise Infrastructure VPN solutions are best for your needs.
865,484 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
10%
Financial Services Firm
8%
Comms Service Provider
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Check Point Endpoint Remote Access VPN?
I think Check Point Remote Access VPN can be improved as it's more of an annoyance for a good number of the clients because it doesn't save their credentials. Even if it's just timed out, you sort ...
What is your primary use case for Check Point Endpoint Remote Access VPN?
My main use case for Check Point Remote Access VPN is for remote employee access.
Ask a question
Earn 20 points
 

Also Known As

Check Point Remote Access VPN, Check Point Endpoint Remote Access VPN
Safe-T SDA, Safe-T, Safe-T Software-Defined Access
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
Government of Israel, eviCore Healthcore, Glen Imaging, Sarin, LBG, Rollomatic, Boegli-Gravures SA, Banque Heritage, Groupe Minoteries, Temenos, ZEK, RLM Finsbury, Harel Insurance, Meitav Dash
Find out what your peers are saying about Check Point Remote Access VPN vs. Safe-T Secure Application Access and other solutions. Updated: July 2025.
865,484 professionals have used our research since 2012.