Save to My Lists

Check Point Mobile Access Reviews & Product Details

Check Point Mobile Access Overview

What is Check Point Mobile Access?

Check Point Mobile Access is a safe and easy solution to connect to corporate applications over the Internet, with a smartphone, tablet, or PC.

Check Point Mobile Access Details
Show LessShow More
Product Description

Mobile data protection (MDP) systems and procedures are needed to protect business data privacy, meet regulatory and contractual requirements, and comply with audits.


Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,358 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
Total Revenue (USD mm)
$2,064
Description

Check Point Software Technologies is a global leader in cybersecurity solutions, providing advanced threat prevention and security management for enterprises, cloud environments, and mobile devices. Established in 1993, the company offers a comprehensive range of products, including firewalls, endpoint protection, and cloud security services, designed to safeguard networks and data from various cyber threats. Check Point's innovative technologies are built on a unified architecture, enabling organizations to consolidate their security infrastructure and enhance their overall security posture. For more information, visit their website at https://www.checkpoint.com/.


MN
Overview Provided by:

Recent Check Point Mobile Access Reviews

MA
Maureen A.Mid-Market (51-1000 emp.)
5.0 out of 5
"Trusted mobile network protection software"
Check Point Mobile Access provides secure connection over mobile network between my team and our agents from remote areas. It detects unprotected c...
MB
Matthew B.Enterprise (> 1000 emp.)
5.0 out of 5
"Secure mobile network monitoring tool"
It secures all connected devices that we have configured in the enterprise network. It is easy to set up and monitor its security performance in de...
BH
Barbara H.Enterprise (> 1000 emp.)
5.0 out of 5
"Proven technology securing mobile networks"
It gives me freedom of accessing email updates in my smartphone from anywhere without fear of malware attacks. I have not experienced network commu...

Check Point Mobile Access Media

Answer a few questions to help the Check Point Mobile Access community
Have you used Check Point Mobile Access before?
Yes

28 Check Point Mobile Access Reviews

4.3 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
28 Check Point Mobile Access Reviews
4.3 out of 5
28 Check Point Mobile Access Reviews
4.3 out of 5

Check Point Mobile Access Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
MA
Customer Support Agent
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Mobile Access?

Check Point Mobile Access provides secure connection over mobile network between my team and our agents from remote areas. It detects unprotected communicaation protocol that can expose confidential data to ransomware attackers. The software offers data insights on poor conversation networks for easy troubleshooting. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

I experienced few network network configurations downtimes for the first few days after deployment before familiarizing with the full package. functionalities Review collected by and hosted on G2.com.

What problems is Check Point Mobile Access solving and how is that benefiting you?

It has enhanced secure mobile communication and safeguarded data from cyber attacks. Check Point Mobile Access offers real-time solution for network errors that can leak internal data to unauthorized users. Review collected by and hosted on G2.com.

MB
Digital Marketing Specialist
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 Gives Campaign
Incentivized Review
What do you like best about Check Point Mobile Access?

It secures all connected devices that we have configured in the enterprise network. It is easy to set up and monitor its security performance in deployed systems. I have not experienced network threats from malware attacks since I started using Layer 3 VPN enabled protocol. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

The few technical issues I experience are mainly from our servers when they are overloaded and does not affect the system operations. Review collected by and hosted on G2.com.

What problems is Check Point Mobile Access solving and how is that benefiting you?

The two-factor authentication encryption blocks unauthorized users from accessing individual accounts. It enables my colleagues to share files and send emails over secure network that cannot be compromised by cyber criminals. Review collected by and hosted on G2.com.

BH
Financial Analyst
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 Gives Campaign
Incentivized Review
What do you like best about Check Point Mobile Access?

It gives me freedom of accessing email updates in my smartphone from anywhere without fear of malware attacks. I have not experienced network communication threats from since I started using two-factor authentication feature powered by Check Point Mobile Access. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

The entire set up process and learning curve was challenging for the first few days. Review collected by and hosted on G2.com.

What problems is Check Point Mobile Access solving and how is that benefiting you?

Check Point Mobile Access has fully secured my mobile to laptop connection with end to end encryption. Collaboration with remote teams has been effectively enhanced giving members secure interaction network. Review collected by and hosted on G2.com.

SN
Associate Region Head - Southern
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Check Point Mobile Access?

Check Point Mobile Access is easily accessible and relatively cost-effective software. It helps access confidential and vital data and info through mobile and tablet in the most secure way. No data leakage can happen if Check Point Mobile Access is installed in your device as it prevents data leaks up to 100% without hassle. It continuously runs in the background and helps secure the stored and transmitted data in the best possible way. The interface is easy to operate and does not bother much. Also, dealing with Check Point Marketing and the business team is most accessible than ever. It helps to strengthen the group in accessing the data and essential info from anywhere, anytime. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

No problem as such. Though, would request continuous updates as per changing business and market requirements now and then. Please bring in more tech-savvy security features and strengthen the encryption security to its maximum. Review collected by and hosted on G2.com.

What problems is Check Point Mobile Access solving and how is that benefiting you?

Check Point Mobile Access enables data security at its best. It helps corporates scale up most securely without any data leak or lapse. Connecting to in-house corporate applications and dashboards through external devices and servers is easy and hassle-free now. Now, there is no worry of data leakage under any circumstance. Very easy to handle and never hangs or slowdowns. Easy to integrate and deploy in any business environment Review collected by and hosted on G2.com.

FM
cloud engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Mobile Access?

Some benefits of implementing Check-Point Mobile Access include: Secure access to business resources – Allows employees to securely access business resources from their mobile devices. Data protection: protects confidential company information against external and internal threats, guaranteeing data security. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

Some disadvantages of implementing Check-Point Mobile Access can include: Cost – It can be expensive for small businesses to implement Check-Point Mobile Access and keep it up to date. Complexity – Can be complex to implement and configure for some users, especially if they are new to information security. Review collected by and hosted on G2.com.

What problems is Check Point Mobile Access solving and how is that benefiting you?

al implementar esta solucion en nuestra empresa lo gramos algunos beneficios en nuestra organizacion. Seguridad mejorada: Check-Point Mobile Access proporciona una capa adicional de seguridad para los recursos empresariales al controlar el acceso solo a los dispositivos y usuarios autorizados. Productividad aumentada: permite a los empleados acceder a los recursos empresariales desde sus dispositivos móviles, lo que les permite trabajar de manera más eficiente y productiva fuera de la oficina. Review collected by and hosted on G2.com.

FA
Manager-Operations
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about Check Point Mobile Access?

Safety and security features for integration with 3rd party applications and access data and info trouble-free in the safest manner possible.

Handling is easy, and deployment is not complicated at all.

User authentication is entirely secure with multi-layered protection, which ensures no unauthorized entry under any circumstances. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

No dislikes at all. We love all the features from the bottom of our hearts as its amazing to use and relatively easy to handle. One-stop solution to access documents and information through mobile applications anywhere, anytime, without fear of data theft or loss. Review collected by and hosted on G2.com.

What problems is Check Point Mobile Access solving and how is that benefiting you?

Check Point Mobile Access involves multilayered security and protection properties for accessing the data on mobile, tablets and other e-devices in the most secure manner and ensuring no data leakage. Connecting mobile devices with corporate servers and portals is not hectic and complex anymore. It ensures the end-to-end security of data access in time bound manner is swift. Speed with accuracy is at the heart of the software. Review collected by and hosted on G2.com.

AV
Senior Associate
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic Review from User Profile
What do you like best about Check Point Mobile Access?

One of the highly secure software for connecting various 3rd party and other external applications with laptops, desktops and tab etc., most securely and quickly. It helps in managing remote access and control in unified manner.

The solution is highly mobile and dynamically secure and goes well with all kinds of applications and devices effortlessly without any issue. The answer is readily available globally for various professionals and organizations and helps manage the remote monitoring of applications and work efficiently trouble-free.

Remote access VPN is an excellently workable solution for monitoring and managing corporate networks and applications through the multi-layer authentication process, which results in securing the data information and process flow across all channels and ensuring there is complete encryption and encoding enabled across all fronts and no data loss or breach occurs under any circumstances.

Reduced pricing and excellent performance efficiency. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

The integration process with external 3rd party applications still involves many technical issues and hassles, and it often takes and consumes enormous time in final-level integrations. The tech issues are managed in 72 hrs' time which is quite delayed and can be improved to a great extent. Rest everything is fantastic and worth trying. Strongly recommended for use by everyone Review collected by and hosted on G2.com.

What problems is Check Point Mobile Access solving and how is that benefiting you?

All in one round-the-clock secure and safest solution for providing fast and intelligent access to all your important data and confidential information through mobile in any remote environment. It is quick and has a fantastic turnaround time in displaying information through the mobile app. One of the fastest solutions for accessing emails, data flow and other dashboards and securely reporting visibility without interruptions. No extra burden of heavy costing, and it is one of the most cost-effective solutions compared to other competitive software in this domain. The performance efficiency is commendable, and the software is worth using Review collected by and hosted on G2.com.

LN
Security Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
Rating Updated ()
What do you like best about Check Point Mobile Access?

Check Point mobile access provides a remote access solution for users, even where they are and which devices they use, while maintaining security factors. Organizations can manage access control of users based on policies where they should have access and where they shouldn't. Besides, the organizations using the solution can create compliance rules to check and scan mobile devices and computers to determine whether they are compliant before connecting to the network. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

Compliance checks in Check Point mobile access are handy for organizations that want to add more security to the network. But this feature only supports almost Windows platforms while supporting minimal settings on others. This is a limitation because using non-Windows machines is very popular. Hopefully, Check Point will continue to develop the product shortly. Review collected by and hosted on G2.com.

What problems is Check Point Mobile Access solving and how is that benefiting you?

Nowadays, remote working is trending and popular. Hence, ensuring working conditions for users is essential. They can access the corporate network from anywhere but are only allowed to access necessary places, not any destination. This ensures the user's performance and under managed by organizations. Some environments allow partners access to the corporate network to work on projects or interns to work in the internship program, but they are all in control with limited access. Check Point mobile access can help solve these. Besides, it also provides a compliance feature to help manage user devices. Only compliant devices will be allowed to connect. Unmanaged devices won't access the corporate network. Review collected by and hosted on G2.com.

SS
Solution Consultant - Cyber Security
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
Business partner of the seller or seller's competitor, not included in G2 scores.
What do you like best about Check Point Mobile Access?

can securely access the corporate application from all the devices in the open internet Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

if it can have all the in the on-premise it will be good Review collected by and hosted on G2.com.

What problems is Check Point Mobile Access solving and how is that benefiting you?

accessig my corporate application from any part of the world in a safe and secure manner Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
AC
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Check Point Mobile Access?

MOB provides remote access flexible from anywhere, any device while still maintaining security settings. This solution is suitable for work environments that allow flexibility and also suitable for large organizations that want to separate security settings for internal users, partners, and others. Review collected by and hosted on G2.com.

What do you dislike about Check Point Mobile Access?

The thing I dislike a bit is about Compliance Check. Although it is a strong security feature, I think it will be better if there are more options to configure compliance for general computers, non-windows machines, and mobile devices. Review collected by and hosted on G2.com.

What problems is Check Point Mobile Access solving and how is that benefiting you?

With Check Point Mobile Access, every user can work remotely. Work performance still is recommended. Especially during the pandemic period, a VPN solution that can provide remote access capability, enhance protections, and eliminate threats from the endpoints while ensuring security compliance, is very necessary. I believe that not many products on the market like Check Point can adapt all these things. Review collected by and hosted on G2.com.