Top Rated Check Point Endpoint Remote Access VPN Alternatives
23 Check Point Endpoint Remote Access VPN Reviews
Overall Review Sentiment for Check Point Endpoint Remote Access VPN
Log in to view review sentiment.
For the most part the steps to set things up and maintain are straightforward. Review collected by and hosted on G2.com.
There is a decent learning curve you need to get through before you are truly comfortable using the product. Review collected by and hosted on G2.com.
The way of how the VPN can be configured is straightforward, and that makes it to the administrators how to set up this type of configuration in a short period of time Review collected by and hosted on G2.com.
Sometimes is challenging to establish a VPN connection with some other devices, and that makes us check the documentation of those devices to find some additional settings that checkpoints need to set the VPN connection Review collected by and hosted on G2.com.

There are a number of different deployment options available.
Ensure data security while also protecting against threats at the same time.
End-user systems can only execute software applications that have been authorised in advance. Review collected by and hosted on G2.com.
Due to the fact that this tool has never failed, there isn't much to complain about. Review collected by and hosted on G2.com.
You can easily check the compliance of the VPN connections while increasing visibility with extended logging features. Review collected by and hosted on G2.com.
Standard multifactor authentication issues. Such as it is not sending authentication code problems with low internet. Review collected by and hosted on G2.com.
Logs are clear, can be tracked easily. Also there is no delay or any error during the session. Review collected by and hosted on G2.com.
I did not face a critical problem in this software. Review collected by and hosted on G2.com.
Setup is too easy and simple. Connectivity is seamless and provide office / corporate resources over Remote. It is also very secure way to work from anywhere. Review collected by and hosted on G2.com.
As of now we haven't found such issue from our users. Review collected by and hosted on G2.com.

it's far more reliable than other VPNs such as VPN portal and ADP token VPN Review collected by and hosted on G2.com.
requires mobile phone to login. when you are in bad coverage area, sometimes you can't get an authentication code. Review collected by and hosted on G2.com.
1. Easy to install the Endpoint Remote Access VPN client to different platforms (within the company we use it for Windows and MacOS).
2. Built-in, centrally-managed Firewall blade, which allows to filter traffic on the client side.
3. Built-in, centrally-managed Compliance blade. We check the client OS on the presence of the latest security updates and that the corporate antivirus software is up and running, and don't allow the client to connect to the Office site in case these rules are not satisfied. That prevents the infected computers from connecting to the company's location and spreading the threats.
4. Stable VPN connection. Review collected by and hosted on G2.com.
1. The Compliance blade is available only for Windows platform, so no MacOS security checks are performed (at least for version E82.30 we use).
2. There is no such client software for Linux (some administrator prefer to use this OS even on their home PCs). Review collected by and hosted on G2.com.
1. Uninterrupted Connectivity.
2. It ask for reauthentication 10 min before session out so we can continue access remote without any interruption .
3. Simple to setup and use. Review collected by and hosted on G2.com.
After using it for almost 1 year I have not found issue. Review collected by and hosted on G2.com.

Check Point Endpoint Remote Access VPN is a very useful tool that gives my colleagues secure and trouble-free access and connection to corporate networks and resources when we travel or work remotely, completely guaranteeing solid privacy for the company . Among the most important features that this software has, I find it important to highlight the ability to create activation data domains, the ability to protect against any type of malware preventing our endpoints from penetrating through a compliance scan, the interface that is really very versatile and that makes it easy to use and configure, which has a highly trained technical support team to solve any problem, but the most I like it is that it is completely centralized, which allows me that from one place we can handle or Manage security policies. Review collected by and hosted on G2.com.
I have had certain problems with the user interface since it usually requires many steps to perform a small action, which lengthens my work. but other than that, I find absolutely nothing else to complain about. As I said before, the technical support team is fantastic and is able to solve any problem. Review collected by and hosted on G2.com.