
Check Point Endpoint Remote Access VPN is a powerful solution that provides the organization's employees with benefits so that they can easily work from anywhere and access the company's internal applications through a secure connection. Review collected by and hosted on G2.com.
There is no point in disliking the solution. Review collected by and hosted on G2.com.
Check Point Remote Access VPN is a wonderful feature that allows MAC, Linux, Windows, and Android users to access the organization's resources securely from anywhere. Users can install the VPN agent in their system or can use the web-based client. It also supports MFA, which ensures added security. Review collected by and hosted on G2.com.
As far as I am using Check Point endpoint Remote Access VPN, I do not have any points to dislike. Review collected by and hosted on G2.com.
Check Point Endpoint Remote Access VPN as good as they comited,its easy to impiment,easy to intigrated with our Active Directrory.It's a best solutaion for remote user of your organization who work with remotly and access our network. Review collected by and hosted on G2.com.
Not any dislike for this chekpoint Endpoint Remote Access VPN,its a best solution. Review collected by and hosted on G2.com.
Check Point Endpoint Remote Access VPN is a security solution that protects data and ensures the privacy of remote users. What I like about this solution is that
It is easy to use and provides a secure and reliable Internet connection.
Its ability to protect data that is transferred over VPN
is a high-quality security solution Review collected by and hosted on G2.com.
The downside of Check Point Endpoint Remote Access VPN is that it consumes a lot of resources, which affects the performance of the endpoint device.
Configuration and administration can be complex. The solution is not as customizable as other VPN solutions on the market, which can be a limitation for organizations with specific security needs.
This may not be the best solution for all organizations and resource requirements must be carefully considered. Review collected by and hosted on G2.com.
Checkpoint Remote Access Vpn is a client-based solution of Checkpoint Vpn Solutions. It supports most operating systems within its client version. You can also use the SSL Vpn without any client installation. Even SSL Vpn does not need any client, it has some limitations and not many functions. We mostly prefer client-based Vpn services. Management can be done through on-premise MDM/CMAs or even cloud management services. No need to invest in additional management Hardware and Software solution. It supports multifactor authentication and compliance scanning. It has lots of options for compliance scanning. You can buy client based Vpn solution with several options. This client Vpn software is the most sophisticated and all-in-one solution in the market. Review collected by and hosted on G2.com.
As an administrator you need to know the requirements of the Vpn solution before starting. Because the pricing is different for the modules or the coverage, you're trying to implement. We see additional pricing for some modules after the project due to changing requirements or regulations. All in one pricing of endpoint vpn solution is a bit high compared to other vendors. Management of the endpoint needs other module called smart endpoint server. Without smart endpoint server, you can't manage the endpoints. There are some simple options on standard smart console but they're lacking, even you can't make a compliance check through the smart console gui. By the way, there's no interaction with the smart console client and smart endpoint client; these are separate consoles. Checkpoint is pushing the customers to the cloud inifinity portal, which is free of charge and making the transition to the harmony endpoint solution. But again, there's no way to integrate the on-premise MDM/MLM with the cloud infinity. Troubleshooting on the Vpn server is somehow lacking. There's no simple gui for client Vpn security and performance-related issues. Full client package includes lots of items, however DLP client is missing on the package. Even the DLP module on the GW covers basic DLP functions, it's not a full DLP solution. Review collected by and hosted on G2.com.
The most helpful thing about Check Point Endpoint Remote Access VPN is that it allows me to securely and confidently connect to my organization's private network to complete work from a remote location. Review collected by and hosted on G2.com.
The least helpful thing about Check Point Endpoint Remote Access VPN is that while the interface is simple in design and straightforward to use, it does look slightly outdated. The functionality is excellent; it could just use some updating. Review collected by and hosted on G2.com.
For the most part the steps to set things up and maintain are straightforward. Review collected by and hosted on G2.com.
There is a decent learning curve you need to get through before you are truly comfortable using the product. Review collected by and hosted on G2.com.
The way of how the VPN can be configured is straightforward, and that makes it to the administrators how to set up this type of configuration in a short period of time Review collected by and hosted on G2.com.
Sometimes is challenging to establish a VPN connection with some other devices, and that makes us check the documentation of those devices to find some additional settings that checkpoints need to set the VPN connection Review collected by and hosted on G2.com.
There are a number of different deployment options available.
Ensure data security while also protecting against threats at the same time.
End-user systems can only execute software applications that have been authorised in advance. Review collected by and hosted on G2.com.
Due to the fact that this tool has never failed, there isn't much to complain about. Review collected by and hosted on G2.com.
You can easily check the compliance of the VPN connections while increasing visibility with extended logging features. Review collected by and hosted on G2.com.
Standard multifactor authentication issues. Such as it is not sending authentication code problems with low internet. Review collected by and hosted on G2.com.