We performed a comparison between BeyondTrust Remote Support and Check Point Remote Access VPN based on real PeerSpot user reviews.
Find out in this report how the two Remote Access solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We have the ability to securely assist users remotely with a stable product, which allows for reporting capabilities, SAML authentication, and ServiceNow integration."
"It is a lightweight, reliable solution that gives IT a direct visual of occurring issues."
"The solution has been very stable. We haven't had issues at all. It doesn't crash or freeze. There aren't bugs or glitches either."
"I like Remote Support's ability to connect to a system without end-user interaction. A support engineer can log in to the system if a user is stuck and doesn't know where to go. This is helpful when conference room computers get locked down and the user can't access the guest OS."
"You can't compete with TeamViewer or any other similar products. It's completely in a class of its own."
"The jump to feature function is the most valuable to us as it allows us to directly remote control customers."
"The integrated chat service with quick elevation to a full control support session has increased our service desk efficiency."
"We have not encountered any issues with stability. Updates leave us with less than 30 minutes of downtime."
"Once we install and connect the VPN service, it keeps on running until we disconnect."
"The solution offers high scalability as far as adding more users."
"Check Point Remote Access VPN has some useful features, and configuring it is relatively straightforward."
"The safety of online interactions when working with this product has enabled members to convene productive meetings without fear of being attacked."
"The IPSec VPN, Mobile Access, and Identity Awareness are three of the blades with which we have been working with since the pandemic. This has given us great mobility, making our network more dynamic."
"I found the MEP feature the most valuable. This has improved users' latency allowing the users to connect to the nearest Azure Check Point VM."
"The secure hotspot access for enabling good network connectivity is great."
"The most valuable feature is the seamless access."
"Static notes for hosts: If I could enter notes on a Jump Client and have them appear every time I connect to that Client, it would be a huge benefit."
"Although the learning curve is steep, the product is well-documented."
"It is expensive. Its initial setup was also a little bit involved, but it was nothing that we couldn't eventually handle. Currently, it has the ability to share screens. Somebody having an issue with their phone can share their screen with a technician sitting at a computer. It would be nice to also be able to control phones remotely, but this could be a limitation of a phone's operating system."
"Lacks remote support and privileged remote access in the one product."
"It is pricey. It would be nice if it weren't so expensive because then you could afford more licenses and have more people involved, but I get it. They do have something that's unique compared to some of their competitors out on the market. It is a very robust and safe tool. If the price could come down, that'd be great."
"The solution currently is not stable and we gave a road map of our expectations two or three days ago."
"The screen annotation tools could be expanded. I would like to see a text/typing annotation tool."
"The possibility to integrate a chatbot would take this product to the next level."
"I cannot see the full effect of the endpoint solution because it relies on having access to the DNF queries, which might not go through the Check Point firewall when you're using it for perimeter networks. Check Point will not identify the actual source of the net queries. This may be related to the architecture, however, and not poor product issues. I don't know if it can be improved on the Check Point side or not."
"The fully-featured security module is only supported on Windows and Mac systems, which means that organizations with Linux will face issues providing secure access."
"We would like to implement HTML5 (clientless access) in the product without installing any additional software."
"In my organization, there aren't Linux users, however, I know it has difficulties offering secure access for customers who use this operating system."
"The Linux version may have an app (similar to Windows) instead of a shell script."
"The client-side UI is fundamental, and there is nothing to see."
"Improved scalability would allow the solution to handle larger numbers of users and devices without a significant impact on performance."
"For Linux machines, they don't have a full client to install. For the users that utilize Linux, there needs to be an equivalent."
More Check Point Remote Access VPN Pricing and Cost Advice →
BeyondTrust Remote Support is ranked 7th in Remote Access with 32 reviews while Check Point Remote Access VPN is ranked 5th in Remote Access with 62 reviews. BeyondTrust Remote Support is rated 9.0, while Check Point Remote Access VPN is rated 8.8. The top reviewer of BeyondTrust Remote Support writes "A robust, secure, and complete solution for quickly providing support and monitoring what's going on". On the other hand, the top reviewer of Check Point Remote Access VPN writes "Is easy to use and has a nice interface, but the scalability needs to improve". BeyondTrust Remote Support is most compared with Microsoft Remote Desktop Services, TeamViewer, BeyondTrust Privileged Remote Access, F5 BIG-IP Access Policy Manager (APM) and Clarity SM, whereas Check Point Remote Access VPN is most compared with OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient, Check Point Harmony Mobile and Zscaler Zero Trust Exchange. See our BeyondTrust Remote Support vs. Check Point Remote Access VPN report.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.