We use Check Point Remote Access VPN to provide access to our corporate network and resources to remote users in a secure way. Users have access that is limited or defined by the server.
Access is granted for identified devices post-posture validation.
Access should be provided via VPN using multifactor authentication other than username/credentials. Users are able to connect from anywhere at anytime using both mechanisms (i.e. User VPN client or browser).
This solution mitigates or minimizes data leakage issues.
It is stable and scalable and requires minimal management and access provisioning.