2020-01-26T09:26:00Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 45

What is your primary use case for Check Point Remote Access VPN?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

25
PeerSpot user
25 Answers
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Top 5Leaderboard
2022-10-19T04:01:00Z
Oct 19, 2022

We came to need a solution that would allow us to connect quickly and easily from our homes or from anywhere, and it was at this point that we integrated and enabled the Check Point Remote Access VPN. With it, our employees could log in from anywhere at any time. This solution allowed them to have the same experience that they had in the office, and they could access all the resources that were necessary for their work. This solution helped us mainly with the shift to remote work. Before the pandemic, everyone worked from the office. Today, more employees have become digital nomads.

Search for a product comparison
SS
Pre-sales Manager at Alpha1 IT Solutions & Consulting Pvt Ltd
Real User
Top 20
2022-10-04T12:36:14Z
Oct 4, 2022

The solution is primarily used for secure access for remote users. It's deployed as a SaaS over the cloud.

DH
Support at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
2022-09-24T04:07:00Z
Sep 24, 2022

After implementing our GW and management security appliance in our public cloud infrastructure, we needed to establish P2S VPNs so that some users could connect to our offices safely to be able to access information and internal applications from anywhere. This need begins when the sales department requires access to internal resources to be able to show solutions that we sell to clients. However, these connections were mostly from public places without security, which was clearly a huge vulnerability of the company. Thanks to this tool, we managed to solve this need.

LD
Cloud Support - Security Admin at a tech company with 1-10 employees
User
Top 5Leaderboard
2022-07-29T05:09:00Z
Jul 29, 2022

It is important in any company to be able to provide VPN point-to-site access, which is why we validate the operation of this tool within our Check Point gateways environment - from the administrative portal of the management service - where the configuration was carried out. Additionally, this service is I integrate with MFA to provide an additional security layer to the user's identity to be able to use the company's services. This functionality is very practical to be able to connect to the business network from anywhere; the monitoring that can be provided and the granularity in the VPN to provide control to users is really good.

Fabian Miranda - PeerSpot reviewer
Subject Matter Expert - Helthcare and Corporate Verticals Development at Lenovo
Real User
Top 5Leaderboard
2022-07-07T17:41:00Z
Jul 7, 2022

This product provides a secure connection to the corporate network from anywhere and safe traffic of data regardless of the possible threats in the WAN it's connected to. It also provides secure access to company apps and controls the traffic depending on each company's policies. Through it, we create layers that control or limit data traffic for specific users. I've been trained in the product and know it's one of the most effective in the business and admit to facilitating my customers to get it from our Check Point partners.

Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
2022-06-06T15:12:00Z
Jun 6, 2022

Remote Access VPN (Remote Access VPN) allows users in our organization to connect to a private network to access services and resources remotely. This connection is secure and is made through the Internet. It came to support us so that users, whenever they were outside the organization and were supporting customers from any region, could have secure access to the corporation's data. Another important point is when our executives travel to regions where certain access to services is blocked. The VPN helps us bypass that block. Since a VPN can hide your real IP address, it can help you bypass geo-blocks, as the platform the one you want to access will think it is from the “correct” geographic region.

Learn what your peers think about Check Point Remote Access VPN. Get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
653,584 professionals have used our research since 2012.
alvarado - PeerSpot reviewer
Cloud Support Leader at a tech company with 51-200 employees
User
Top 5Leaderboard
2022-05-17T05:01:00Z
May 17, 2022

Before the pandemic and when it started, we needed to provide access from different parts so that they could have access to applications, information, and services, for which the solution was to make a VPN to our resources, first a Microsoft Azure P2S VPN was implemented, however, thanks to the information provided by our checkpoint partner, we were able to take advantage of our existing gateways to install the required blades to be able to provide our users with a VPN through Check Point. This can be used from computers or from mobile.

JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services
Real User
Top 5Leaderboard
2022-04-12T20:01:40Z
Apr 12, 2022

We use Check Point Remote Access VPN to connect to the back-office applications.

FG
Especialista Certificado en Administración de Servicios de Tecnología de la Información at AZZAIT
User
Top 20
2022-02-28T14:53:00Z
Feb 28, 2022

Since SARS-COV2, most users went to work from their home office, so we needed to have an robust, secure, and stable VPN connection. We implemented Check Point VPN and we have had no problems with it. We are almost 50 users working from home securely. Also, the access rules based on VLANs have helped many users get access depending on which connection they have. For example, some users with VPN connections can only access some specific servers and ports, however, when they are on an internal LAN, they have access to the entire network.

SN
System Analyst at IIT Gandhinagar
User
2022-02-08T14:34:00Z
Feb 8, 2022

The primary use case of this solution is to connect to our internal network for accessing servers and clusters using Check Point VPN. End-users are, for example, students accessing computer labs and licensed software that can check academic licenses only within the campus network; further, our ERP folks could make good use of the VPN solution by remotely working on the Institute Management System infrastructure and can work efficiently without any hindrance. We also use its capsule app on smartphones to connect further.

Alex Tremblay - PeerSpot reviewer
Cyber Security Manager at H2O Power
Real User
Top 10
2021-11-19T15:26:00Z
Nov 19, 2021

In our environment, we have many users working remotely. It's important to control the flow of traffic coming and going to these remote employees, and isolate traffic when used for business purposes. We have to allow our remote users to access services from home as though they were in the office. However, at the same time, we need to control that traffic and make sure it conforms to our policy. Our environment is complex and requires advanced policies to look at traffic in very unique ways from different users. Check Point's policy management has allowed us to do that.

Manuel Briones - PeerSpot reviewer
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Top 5Leaderboard
2021-11-02T20:39:00Z
Nov 2, 2021

Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client. Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.

Manuel Briones - PeerSpot reviewer
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Top 5Leaderboard
2021-10-07T21:05:00Z
Oct 7, 2021

We have always worked within the office. However, the COVID pandemic changed the course of our work in terms of where we had to implement new solutions so that we could all work from home. That was when I encountered Check Point; we had years with this solution in the facilities, yet, only during the pandemic did we have to innovate for a home environment. Today we have more than 6000 users working from home thanks to Check Point. This is possible due to the fact that, with a certificate and the client for this connection, every person can connect to our environment as if they were at the office.

PRAPHULLA  DESHPANDE - PeerSpot reviewer
Associate Consult at Atos
Real User
Top 5Leaderboard
2021-09-20T11:05:00Z
Sep 20, 2021

Remote Access VPN is one of those essential items for every organization in order to maintain seamless and highly secured connectivity between the end-user and the organization's local area network to access resources - including Jump server Databases, et cetera. No matter from which device or from which location users are accessing an organization's local resources, with the help of the Check Point VPN client they can make sure they have connected securely. Check Point offers a best-in-class encryption algorithm to ensure confidentiality and maintain integrity between the end-user and the Gateway.

AD
Accounts Administrator at a non-profit with 51-200 employees
User
2021-08-31T17:22:00Z
Aug 31, 2021

It allows staff to work from home, especially now during COVID-19. You can access it from any location, and it does not require technical knowledge.

NK
Senior Vice President, Technology for the Americas at Engel & Völkers Development GmbH
Real User
Top 10
2021-06-16T01:39:00Z
Jun 16, 2021

We use Check Point Remote Access VPN to provide access to employees, vendors, and advisors. They access the company resources - especially now that most people are working from home over the course of the last year. We also use it for specific companies that give us remote support to some applications, such as our parent company. Our admins access our company servers and resources. We're using Remote Access VPN with specific profiles for them that only give access to some resources. We have three distinct environments. Server, DMZ, and User/SHOP. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.

WA
Network Security Engineer at a manufacturing company with 5,001-10,000 employees
Real User
2021-06-15T19:04:00Z
Jun 15, 2021

We are able to allow users to easily gain access to internal systems from outside the organization. No longer is coming into the office a necessary requirement for our users. They can seamlessly transition from home/remote work to going into the office while still having the same level of access. We also have many users that need to manage servers who are able to connect to the internal servers from anywhere - allowing them to still do their jobs from anywhere. Connecting to VPN doesn't require a ton of technical skill for those not in the technical field.

Ifeanyi Onyiaodike - PeerSpot reviewer
Network security engineer at Fidelity Bank
Real User
Top 5
2021-06-03T09:53:16Z
Jun 3, 2021

We primarily use this solution for our clients. Use cases vary, and they include VPN connectivity. It can be used as a provisional firewall and you can allow for a provisional access list, or grant permission to access or for servers or users trying to connect to the server.

LA
Network, Systems and Security Engineer at SOLTEL Group
Real User
Top 5
2021-06-02T10:42:00Z
Jun 2, 2021

Check Point Endpoint Remote Access VPN is without a doubt, really fantastic software. It allows me remote and secure access to my most important data, to the company's networks, and to corporate resources from anywhere in the world. Regardless of where I am, it guarantees the complete privacy of all our confidential information through multifactor authentication and compliance analysis of the endpoint system. All of this is very easy to configure using step-by-step wizards, and there are many guides to explain it.

SM
ICT at a manufacturing company with 501-1,000 employees
Real User
Top 5
2021-05-31T06:33:00Z
May 31, 2021

We use this solution to permit the connection to on-premises resources to internal and external users. We use rules specific to external users based on the real access needs of the specific company, whereas, for internal users, other rules are used. Users connect to our headquarters and then through private connections, they reach the resources distributed in the various locations. Using dual-factor authentication, we improve the identity security of the users and also protect our company. Check Point has been our strategic partner for approximately 15 years.

JM
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
2020-10-25T06:25:00Z
Oct 25, 2020

We use Check Point Remote Access VPN to provide access to employees and to the company resources, especially now that most people are working from home. That's the main use. We also use it for specific companies that give us remote support to some applications. They access our company servers and resources. We're using Remote Access VPN with a specific profile for them that only gives access to some. We have two environments. Our firewalls and our perimeter firewalls are Check Point. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.

Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Real User
Top 5Leaderboard
2020-09-01T09:32:00Z
Sep 1, 2020

The primary use case is to allow our employees to connect to the firewall on-premises, then they can access our office resources. This includes their respective computer, the intranet, shared files, and local applications, even if they are outside of the organization's network. Our production will be locked down if my VPN stops working, leaving the company unable to work. As such, this is a crucial service for us and resources need to be available for each of our users when working remotely.

Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group
Real User
Top 5
2020-08-27T17:49:00Z
Aug 27, 2020

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). In addition, there are about 30 Google Cloud projects of different sizes ranging from 10 to 250 virtual machines, and they are used for development, staging, production, etc. For every project, there is one dedicated scalable instance group of the Check Point CloudGuard IaaS gateways. We user the Check Point Remote Access VPN to provide access for our employees to connect to the specified environments.

AG
Network Security Engineer at a financial services firm with 51-200 employees
Real User
2020-08-03T06:11:00Z
Aug 3, 2020

We use a Check Point Endpoint Remote Access VPN client along with Check Point SSL VPN, which allows users to connect to our firewall who don't have the client, e.g., if they have a MacBook, then we don't have a client for them. We allow them to connect to the firewall over the browser. That had a bunch of problems, but they have resolved those this year. The use case is to allow people to connect to our firewall on-premise. We also have Check Point firewalls in the cloud, which people can connect to as well. Then they can access resources either in our on-premise environment that they need to access, such as, their computers, the Intranet, Salesforce, or our production applications. Also, in AWS, they can access other types of applications, like WorkSpaces, or our production applications there, which allows them to work. It lets them have access to their email, because they're not able to access their email unless they are VPN'd in, etc. We keep everything locked down to the VPN. If that's not working, then our company will not be able to work. It was very finicky last year, and it's working now. It has been perfect this year. We don't use the Endpoint Remote Access VPN client for too much. We use its local firewall, which is valuable, but we don't really use SandBlast. I know you can add the SandBlast module along with all these other modules. We literally just use it so our users can connect on-prem.

CK
Senior System Engineer at Thai Transmission Industry
Real User
2020-01-26T09:26:00Z
Jan 26, 2020

A lot of our clients are complimentary companies, like the electrical company. They need Check Point Remote Access VPN, or even another similar solution. I tell them that I already have the VPN solution in our company.

Related Questions
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Oct 4, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 19 answers
AG
Network Security Engineer at a financial services firm with 51-200 employees
Aug 3, 2020
My understanding is that the pricing and licensing are very competitive, and it's not one of their more expensive products. We buy licenses for the solution and have licenses for the endpoint servers.
Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Sep 1, 2020
This is a very good solution for our employees who work outside of our organization.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Oct 19, 2022
Please share with the community what you think needs improvement with Check Point Remote Access VPN. What are its weaknesses? What would you like to see changed in a future version?
2 out of 25 answers
CK
Senior System Engineer at Thai Transmission Industry
Jan 26, 2020
In terms of improving the service, I think they could add more features, like the security to block off the doors, or create another hatch, something like this. They could make the features safer, add malware to make my mail and the Kryon system safer and to protect data at an earlier stage.
AG
Network Security Engineer at a financial services firm with 51-200 employees
Aug 3, 2020
Currently, we're using Check Point Endpoint Remote Access VPN R70.30.03. That's the latest version of R70.30. We haven't upgraded to R80 yet, but all of our firewalls are R80. We've been through many iterations of the Endpoint VPN client. I remember awhile ago, it was very difficult to deploy and not have problems, but they've come a long way. Now, it's a lot better. I have worked so much on this in the past with Check Point that they actually had their vice president of product development call me. I remember one of the things that I told him need room for improvement, which I still haven't seen: When you want to deploy a new Check Point agent, it is really a pain in the butt. For example, Windows 10 now has updates almost every couple of months. It changes the versioning and things under the hood. These are things that I don't understand, because I'm not a Windows person. However, I know that the Check Point client is installed on the Windows machine, and if the Check Point client's not kept up-to-date, then it's functionality breaks. It has to be up-to-date with the Windows versions. Check Point has to update the client more often. Now, the problem is that the Check Point client is not easy to update on remote computers and it's not easy to deploy a new client. They need to improve deploying a new Endpoint Remote Access VPN client and updating existing Endpoint Remote Access VPN clients. Especially if you want to deploy a new one, it's not an easy process. Their software doesn't really support creating a new Endpoint Remote Access VPN client. There is a lot of manual activity. They need to automate it better. You have to create a generic client, download it to a computer, and install it to the computer. Then, you have to find a file deep inside the directory that it creates. It's like a text file, then you take that text file out and edit the settings in it. For example, I have to tell it to connect to a site which contains our firewalls or else it's like a phone with no phone numbers and I have to put in the phone numbers. This should be done when I download the client the first time from their GUI, but it is not. Instead, I have to install a generic blank version on a computer, find a text file, and edit the text file with the sites of firewalls that the users have to connect to specific to my company. I have to make other setting changes in that version, save it, reboot the computer, find the file again, take that file out of the computer, upload it to GUI, and deploy a new version. Then, I install it after I uninstalled the old one. Of course, all the uninstalls require reboots. So, I am rebooting it like five times now. After that, I have to install it and check the settings. Half the time they don't save the way you want them to save. It is very tedious and terrible. Even learning that process was a nightmare, because it's not like they have a nice article that explains it to you. They don't. I was bumping my head up against the wall with support for almost six or seven months trying to figure that out. Half of them didn't even know how to do it. That was miserable. But now that I'm an expert on it, I can probably do it within a half a day to three days depending on if it gives me problems or not. That's still miserable, and it should be as easy as: I upload the new version of the client, put in the information that I want it to have on the settings, click download, and install, then it works. It should be that easy. There's really no reason why it's not, except for they didn't improve that process nor have they developed that area. It makes me think that their interest isn't in VPN solutions, even though it should be because it's something that they offer. Otherwise, their support is great.
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 26, 2022
PeerSpot’s popular crowdsourced user review platform helps technology decision-makers around the world to better collaborate with peers and other independent technical experts to provide advice, share knowledge and expertise without vendor bias.Our users have ranked numerous popular solutions according to their valuable features, and have also made suggestions on where they see room for improve...
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 26, 2022
Top 5 Enterprise Infrastructure VPN Solutions 2022
PeerSpot’s popular crowdsourced user review platform helps technology decision-makers around the ...
Download Free Report
Download our free Check Point Remote Access VPN Report and get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
DOWNLOAD NOW
653,584 professionals have used our research since 2012.