Introducing G2.ai, the future of software buying.Try now
Check Point Endpoint Remote Access VPN
Save to My Lists
Claimed
Claimed

Top Rated Check Point Endpoint Remote Access VPN Alternatives

Check Point Endpoint Remote Access VPN Reviews & Product Details - Page 4

Check Point Endpoint Remote Access VPN Overview

What is Check Point Endpoint Remote Access VPN?

Remote Secure Access​ Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

This product is included in:
Check Point Endpoint Remote Access VPN Details
Show LessShow More
Product Description
Remote Secure Access​ Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is ensured through multi-factor authentication, endpoint system compliance scanning and encryption of all transmitted data.

Seller
Description

Check Point Software Technologies is a global leader in cybersecurity solutions, providing advanced threat prevention and security management for enterprises, cloud environments, and mobile devices. Established in 1993, the company offers a comprehensive range of products, including firewalls, endpoint protection, and cloud security services, designed to safeguard networks and data from various cyber threats. Check Point's innovative technologies are built on a unified architecture, enabling organizations to consolidate their security infrastructure and enhance their overall security posture. For more information, visit their website at https://www.checkpoint.com/.

Overview Provided by:

Check Point Endpoint Remote Access VPN Media

Product Avatar Image

Have you used Check Point Endpoint Remote Access VPN before?

Answer a few questions to help the Check Point Endpoint Remote Access VPN community

33 Check Point Endpoint Remote Access VPN Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

Check Point Endpoint Remote Access VPN Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
This product has not yet received any negative sentiments.
G2 reviews are authentic and verified.
Kirtikumar P.
KP
Network Engineer
Enterprise (> 1000 emp.)
"Remote Access VPN is very good c2s VPN. also very easy to manage as well"
What do you like best about Check Point Endpoint Remote Access VPN?

This is very good solution we found during COVID-19 , we have evaluated it our organization. But we are already using remote VPN which is run on layer 7 so we have not done more on tthis, but sure we will look ahead Checkpoint Remote Access VPN Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

I would like to say, it should be run on layer 7. othr are very good features. Review collected by and hosted on G2.com.

Bethanie C.
BC
Senior Software Engineering
Enterprise (> 1000 emp.)
"Check Point Endpoint Remote Access VPN an excellent safe and reliable solution"
What do you like best about Check Point Endpoint Remote Access VPN?

Check Point Endpoint Remote Access VPN is without a doubt a really fantastic software because it allows me remote and secure access to my most important data, to the company's networks and

to corporate resources, from anywhere in the world where I am, guaranteeing the complete privacy of all our confidential information through multifactor authentication and compliance analysis of the endpoint system. One of the features that I like most about this software is that it has a really very intuitive, simple and versatile interface that makes it easy to use and configure, that is compatible with several operating systems, that has great protection against malware or any other Cyber ​​threat that wants to penetrate our endpoints and, as if that were not enough, it is fully integrated and centralized, since it gives me the possibility to configure the security policy and view VPN events from a console. although The ability of creating activation data domains is the most valuable feature of this solution. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

So far I have not found any negative characteristics to complain about, since in general the software works in an excellent way, it has never failed us. and I know that if there were any problems, the technical support team would solve it almost immediately, since it is highly qualified for it. but if I would like to note that the interface despite being very intuitive, it needs improvements. When you need to create something, you have to follow many steps and that should be simplified. Review collected by and hosted on G2.com.

Bonnie G.
BG
Software Developer
Enterprise (> 1000 emp.)
"Excellent solution to access from anywhere safely"
What do you like best about Check Point Endpoint Remote Access VPN?

If I like this software, since it allows us to access our data and information remotely and securely from anywhere in the world, it has a protection against malware or any intrusion that wishes to damage our endpoints, it is easy to using then your access is continuous and if for some reason we have lost the connection of our session we are guaranteed that when we start again we access where it had been, I also like that its console is centralized, since from a single place we can handle or manage security policies, and this makes it much easier for the user to manage all the security and save time and money because the implementation and use of the software becomes less heavy, besides each endpoint is always being analyzed to evaluate that malwares or suspicious movements are not found and the best thing is that having VPN auto connection helps us avoid having to authenticate our connection multiple times. Review collected by and hosted on G2.com.

What do you dislike about Check Point Endpoint Remote Access VPN?

I have not found any critical problem in this software, any questions could be resolved with your support team, which according to our needs can even give us training. Review collected by and hosted on G2.com.

Pricing Insights

Averages based on real user reviews.

Time to Implement

3 months

Return on Investment

12 months

Perceived Cost

$$$$$
Check Point Endpo...