How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
In our environment, we have many users working remotely. It's important to control the flow of traffic coming and going to these remote employees, and isolate traffic when used for business purposes. We have to allow our remote users to access services from home as though they were in the office. However, at the same time, we need to control that traffic and make sure it conforms to our policy. Our environment is complex and requires advanced policies to look at traffic in very unique ways from different users. Check Point's policy management has allowed us to do that.
Since the beginning of the COVID-19 pandemic, this solution has helped us a lot. We had to move around 6000 people so that they could work from home. It was a challenge for us, however, it was something we managed to do successfully in collaboration with other areas by providing them with a certificate created by Check Point with a .p12 extension and with the peer configuration in their VPN client. Now, we are integrating this solution with a 2MFA solution in order to provide better security for authentication of people as day by day the threats and new viruses are always a risk. Sometimes, people do not have that instinct of having to secure their workstations, therefore, we do it for them through the VPN connection.
We have always worked within the office. However, the COVID pandemic changed the course of our work in terms of where we had to implement new solutions so that we could all work from home. That was when I encountered Check Point; we had years with this solution in the facilities, yet, only during the pandemic did we have to innovate for a home environment. Today we have more than 6000 users working from home thanks to Check Point. This is possible due to the fact that, with a certificate and the client for this connection, every person can connect to our environment as if they were at the office.
Remote Access VPN is one of those essential items for every organization in order to maintain seamless and highly secured connectivity between the end-user and the organization's local area network to access resources - including Jump server Databases, et cetera. No matter from which device or from which location users are accessing an organization's local resources, with the help of the Check Point VPN client they can make sure they have connected securely. Check Point offers a best-in-class encryption algorithm to ensure confidentiality and maintain integrity between the end-user and the Gateway.
It allows staff to work from home, especially now during COVID-19. You can access it from any location, and it does not require technical knowledge.
We use Check Point Remote Access VPN to provide access to employees, vendors, and advisors. They access the company resources - especially now that most people are working from home over the course of the last year. We also use it for specific companies that give us remote support to some applications, such as our parent company. Our admins access our company servers and resources. We're using Remote Access VPN with specific profiles for them that only give access to some resources. We have three distinct environments. Server, DMZ, and User/SHOP. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.
We are able to allow users to easily gain access to internal systems from outside the organization. No longer is coming into the office a necessary requirement for our users. They can seamlessly transition from home/remote work to going into the office while still having the same level of access. We also have many users that need to manage servers who are able to connect to the internal servers from anywhere - allowing them to still do their jobs from anywhere. Connecting to VPN doesn't require a ton of technical skill for those not in the technical field.
We primarily use this solution for our clients. Use cases vary, and they include VPN connectivity. It can be used as a provisional firewall and you can allow for a provisional access list, or grant permission to access or for servers or users trying to connect to the server.
Check Point Endpoint Remote Access VPN is without a doubt, really fantastic software. It allows me remote and secure access to my most important data, to the company's networks, and to corporate resources from anywhere in the world. Regardless of where I am, it guarantees the complete privacy of all our confidential information through multifactor authentication and compliance analysis of the endpoint system. All of this is very easy to configure using step-by-step wizards, and there are many guides to explain it.
We use this solution to permit the connection to on-premises resources to internal and external users. We use rules specific to external users based on the real access needs of the specific company, whereas, for internal users, other rules are used. Users connect to our headquarters and then through private connections, they reach the resources distributed in the various locations. Using dual-factor authentication, we improve the identity security of the users and also protect our company. Check Point has been our strategic partner for approximately 15 years.
We use Check Point Remote Access VPN to provide access to employees and to the company resources, especially now that most people are working from home. That's the main use. We also use it for specific companies that give us remote support to some applications. They access our company servers and resources. We're using Remote Access VPN with a specific profile for them that only gives access to some. We have two environments. Our firewalls and our perimeter firewalls are Check Point. The firewall connects to the internet and those firewalls are the ones that the people connect to for the Remote VPN. We have the Blade enabled and they access the company resources as if they were working at the office.
The primary use case is to allow our employees to connect to the firewall on-premises, then they can access our office resources. This includes their respective computer, the intranet, shared files, and local applications, even if they are outside of the organization's network. Our production will be locked down if my VPN stops working, leaving the company unable to work. As such, this is a crucial service for us and resources need to be available for each of our users when working remotely.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). In addition, there are about 30 Google Cloud projects of different sizes ranging from 10 to 250 virtual machines, and they are used for development, staging, production, etc. For every project, there is one dedicated scalable instance group of the Check Point CloudGuard IaaS gateways. We user the Check Point Remote Access VPN to provide access for our employees to connect to the specified environments.
We use a Check Point Endpoint Remote Access VPN client along with Check Point SSL VPN, which allows users to connect to our firewall who don't have the client, e.g., if they have a MacBook, then we don't have a client for them. We allow them to connect to the firewall over the browser. That had a bunch of problems, but they have resolved those this year. The use case is to allow people to connect to our firewall on-premise. We also have Check Point firewalls in the cloud, which people can connect to as well. Then they can access resources either in our on-premise environment that they need to access, such as, their computers, the Intranet, Salesforce, or our production applications. Also, in AWS, they can access other types of applications, like WorkSpaces, or our production applications there, which allows them to work. It lets them have access to their email, because they're not able to access their email unless they are VPN'd in, etc. We keep everything locked down to the VPN. If that's not working, then our company will not be able to work. It was very finicky last year, and it's working now. It has been perfect this year. We don't use the Endpoint Remote Access VPN client for too much. We use its local firewall, which is valuable, but we don't really use SandBlast. I know you can add the SandBlast module along with all these other modules. We literally just use it so our users can connect on-prem.
A lot of our clients are complimentary companies, like the electrical company. They need Check Point Remote Access VPN, or even another similar solution. I tell them that I already have the VPN solution in our company.
We all know it's really hard to get good pricing and cost information.
Please share what you can so you can help your peers.