
These are the types of installations for remote access solutions:Ĭlient-based- Client application installed on endpoint computers and devices. All Check Point clients can work through NAT devices, hotspots, and proxies in situations with complex topologies, such as airports or hotels.

Some Check Point solutions supply this.Ĭheck Point remote access solutions use IPsec and SSL encryption protocols to create secure connections. All Check Point solutions supply this.Įndpoint Security- Endpoint computers are protected at all times, even when there is no connectivity to the corporate network. After users authenticate, they can access the corporate resources that are permitted to them in the access policy. Secure Connectivity - Traffic is encrypted between the client and VPN Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. Secure Connectivity and Endpoint Security - Which capabilities does the solution include? You might need multiple solutions within your organization to meet different needs. Clientless - Does the solution require a Check Point client to be installed on the endpoint computer or is it clientless, for which only a web browser is required. Types of SolutionsĪll of Check Point's Remote Access solutions provide:Įnterprise-grade, secure connectivity to corporate resources.įactors to consider when choosing remote access solutions for your organization:Ĭlient-Based vs.


Organizations must also make sure that their corporate network remains safe and that remote access does not become a weak point in their IT security. In today's business environment, it is clear that workers require remote access to sensitive information from a variety of locations and a variety of devices.

Check Point Remote Access Solutions Secure Remote Access
