
Check Point Mobile Access provides secure connection over mobile network between my team and our agents from remote areas. It detects unprotected communicaation protocol that can expose confidential data to ransomware attackers. The software offers data insights on poor conversation networks for easy troubleshooting. Review collected by and hosted on G2.com.
I experienced few network network configurations downtimes for the first few days after deployment before familiarizing with the full package. functionalities Review collected by and hosted on G2.com.
It secures all connected devices that we have configured in the enterprise network. It is easy to set up and monitor its security performance in deployed systems. I have not experienced network threats from malware attacks since I started using Layer 3 VPN enabled protocol. Review collected by and hosted on G2.com.
The few technical issues I experience are mainly from our servers when they are overloaded and does not affect the system operations. Review collected by and hosted on G2.com.
It gives me freedom of accessing email updates in my smartphone from anywhere without fear of malware attacks. I have not experienced network communication threats from since I started using two-factor authentication feature powered by Check Point Mobile Access. Review collected by and hosted on G2.com.
The entire set up process and learning curve was challenging for the first few days. Review collected by and hosted on G2.com.
Check Point Mobile Access is easily accessible and relatively cost-effective software. It helps access confidential and vital data and info through mobile and tablet in the most secure way. No data leakage can happen if Check Point Mobile Access is installed in your device as it prevents data leaks up to 100% without hassle. It continuously runs in the background and helps secure the stored and transmitted data in the best possible way. The interface is easy to operate and does not bother much. Also, dealing with Check Point Marketing and the business team is most accessible than ever. It helps to strengthen the group in accessing the data and essential info from anywhere, anytime. Review collected by and hosted on G2.com.
No problem as such. Though, would request continuous updates as per changing business and market requirements now and then. Please bring in more tech-savvy security features and strengthen the encryption security to its maximum. Review collected by and hosted on G2.com.
Some benefits of implementing Check-Point Mobile Access include: Secure access to business resources – Allows employees to securely access business resources from their mobile devices. Data protection: protects confidential company information against external and internal threats, guaranteeing data security. Review collected by and hosted on G2.com.
Some disadvantages of implementing Check-Point Mobile Access can include: Cost – It can be expensive for small businesses to implement Check-Point Mobile Access and keep it up to date. Complexity – Can be complex to implement and configure for some users, especially if they are new to information security. Review collected by and hosted on G2.com.
Safety and security features for integration with 3rd party applications and access data and info trouble-free in the safest manner possible.
Handling is easy, and deployment is not complicated at all.
User authentication is entirely secure with multi-layered protection, which ensures no unauthorized entry under any circumstances. Review collected by and hosted on G2.com.
No dislikes at all. We love all the features from the bottom of our hearts as its amazing to use and relatively easy to handle. One-stop solution to access documents and information through mobile applications anywhere, anytime, without fear of data theft or loss. Review collected by and hosted on G2.com.
One of the highly secure software for connecting various 3rd party and other external applications with laptops, desktops and tab etc., most securely and quickly. It helps in managing remote access and control in unified manner.
The solution is highly mobile and dynamically secure and goes well with all kinds of applications and devices effortlessly without any issue. The answer is readily available globally for various professionals and organizations and helps manage the remote monitoring of applications and work efficiently trouble-free.
Remote access VPN is an excellently workable solution for monitoring and managing corporate networks and applications through the multi-layer authentication process, which results in securing the data information and process flow across all channels and ensuring there is complete encryption and encoding enabled across all fronts and no data loss or breach occurs under any circumstances.
Reduced pricing and excellent performance efficiency. Review collected by and hosted on G2.com.
The integration process with external 3rd party applications still involves many technical issues and hassles, and it often takes and consumes enormous time in final-level integrations. The tech issues are managed in 72 hrs' time which is quite delayed and can be improved to a great extent. Rest everything is fantastic and worth trying. Strongly recommended for use by everyone Review collected by and hosted on G2.com.
Check Point mobile access provides a remote access solution for users, even where they are and which devices they use, while maintaining security factors. Organizations can manage access control of users based on policies where they should have access and where they shouldn't. Besides, the organizations using the solution can create compliance rules to check and scan mobile devices and computers to determine whether they are compliant before connecting to the network. Review collected by and hosted on G2.com.
Compliance checks in Check Point mobile access are handy for organizations that want to add more security to the network. But this feature only supports almost Windows platforms while supporting minimal settings on others. This is a limitation because using non-Windows machines is very popular. Hopefully, Check Point will continue to develop the product shortly. Review collected by and hosted on G2.com.
can securely access the corporate application from all the devices in the open internet Review collected by and hosted on G2.com.
if it can have all the in the on-premise it will be good Review collected by and hosted on G2.com.
MOB provides remote access flexible from anywhere, any device while still maintaining security settings. This solution is suitable for work environments that allow flexibility and also suitable for large organizations that want to separate security settings for internal users, partners, and others. Review collected by and hosted on G2.com.
The thing I dislike a bit is about Compliance Check. Although it is a strong security feature, I think it will be better if there are more options to configure compliance for general computers, non-windows machines, and mobile devices. Review collected by and hosted on G2.com.