Check Point Mobile Access

Mobile data protection (MDP) systems and procedures are needed to protect business data privacy, meet regulatory and contractual requirements, and comply with audits.

Languages supported:

7.8/10 (Expert Score) ★★★★★
Product is rated as #27 in category Mobile Data Security Software
Ease of use
8.0
Support
7.6
Ease of Setup
0.0

Check Point Mobile Access is a safe and easy solution to connect to corporate applications over the Internet, with a smartphone, tablet, or PC.

Check Point Mobile Access
Check Point Mobile Access

Show more categories

Customer Reviews

Check Point Mobile Access Reviews

Administrator in Financial Services

Advanced user of Check Point Mobile Access
★★★★★
Remote Access VPN

What do you like best?

Mobile Access VPN is nothing but Remote access VPN provide by CheckPointing for connecting Remote User to Data Center. User can connect via both methods i.e. using a browser or VPN client for accessing Data Center

Provide Data over Internet in Secure manner by End to End Encryption.

Access is controled by admin based on User ID and resource which can be accessed by Each User or security Group

A compliance/Posture Validation allows access to Corporate resource based on criteria such as if the machine is part of the Domain and more

Provide a granular level of control by allowing access to Data Center based on Geolocation or device type based on Policy configured by Admin

Multi factor authentication can be configured while connecting VPN

Does not required additional Hardware feature can be enabled on NGFW Security Gateway.

What do you dislike?

Enabling compliance check is difficult for Remote access VPN as it required a separate Compliance blade to be help on the Security Gateway module. Without this module been enabled, the VPN can only validate if the Machine is complained but does not enforce the Policy.

IP allocation for individual User is difficult

Routing of Pool IP address assinged for VPN

What problems are you solving with the product? What benefits have you realized?

Securely providing access to Corporate Data on Corporate or BYOD devices

Restricting access to a user based on device type and geolocation

Provide access to corporate data anytime anywhere on any device based on access policy

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide