Check Point Remote Access Solutions

Secure Remote Access

In today's business environment, it is clear that workers require remote access to sensitive information from a variety of locations and a variety of devices. Organizations must also make sure that their corporate network remains safe and that remote access does not become a weak point in their IT security.

Types of Solutions

All of Check Point's Remote Access solutions provide:

  • Enterprise-grade, secure connectivity to corporate resources.

  • Strong user authentication.

  • Granular access control.

Factors to consider when choosing remote access solutions for your organization:

  • Client-Based vs. Clientless - Does the solution require a Check Point client to be installed on the endpoint computer or is it clientless, for which only a web browser is required. You might need multiple solutions within your organization to meet different needs.

  • Secure Connectivity and Endpoint Security - Which capabilities does the solution include?

Client-Based vs. Clientless

Check Point remote access solutions use IPsec and SSL encryption protocols to create secure connections. All Check Point clients can work through NAT devices, hotspots, and proxies in situations with complex topologies, such as airports or hotels. These are the types of installations for remote access solutions:

  • Client-based - Client application installed on endpoint computers and devices. The client supplies access to most types of corporate resources according to the access privileges of the user.

  • Clientless - Users connect through a web browser and use HTTPS connections. Clientless solutions usually supply access to web-based corporate resources.

  • On demand client - Users connect through a web browser and a client is installed when necessary. The client supplies access to most types of corporate resources according to the access privileges of the user.

Secure Connectivity and Endpoint Security

You can combine secure connectivity with additional features to protect the network or endpoint computers.

  • Secure Connectivity - Traffic is encrypted between the client and VPN Security Gateway and strong user authentication is supported. All Check Point solutions supply this.

    These solutions require licenses based on the number of users connected at the same time.

  • Security Verification for Endpoint computers - Makes sure that devices connecting to the Security Gateway meet security requirements. Endpoint machines that are not compliant with the security policyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. have limited or no connectivity to corporate resources. Some Check Point solutions supply this.

  • Endpoint Security:

    • Desktop Firewall - Protects endpoint computers at all times with a centrally managed security policy. This is important because remote clients are not in the protected network and traffic to clients is only inspected if you have a Desktop Firewall. Some Check Point solutions supply this

    • More Endpoint Security Capabilities - Check Point solutions can include more Endpoint Security capabilities, such as Anti-Malware, disk encryption and more.

    These solutions require licenses based on the number of clients installed.

Remote Access Solution Comparison

Details of the newest version for each client and a link for more information are in sk67820.

SSL VPN Portal and Clients

Supported Operating Systems

Client or Clientless

Encryption Protocol

Security Verification for Endpoint Devices

Desktop Firewall on Endpoint Devices

IPv6 Support

Capsule Workspace for iOS

(previously Mobile Enterprise)

iOS

Client

SSL

Jailbreak & Root Detection

MDM Cooperative Enforcement (sk98201)

 

 

Capsule Workspace for Android

(previously Mobile Enterprise)

Android

Client

SSL

Jailbreak & Root Detection

MDM Cooperative Enforcement (sk98201)

 

 

Layer 3 VPN Tunnel Clients

Supported Operating Systems

Client or Clientless

Encryption Protocol

Security Verification for Endpoint Devices

Desktop Firewall on Endpoint Devices

IPv6 Support

Capsule Connect for iOS

(previously Mobile VPN)

iOS

Client

IPsec / SSL

MDM Cooperative Enforcement (sk98201)

 

 

Capsule VPN for Android

(previously Mobile VPN)

Android

Client

IPsec/SSL

MDM Cooperative Enforcement (sk98201)

 

 

Check Point VPN Plugin for Windows 8.1

Windows 8.1

Pre- installed client

SSL

 

 

 

Check Point Capsule VPN for Windows 10

Windows 10

Client

SSL

 

 

 

Check Point Mobile for Windows

Windows

Client

IPsec

 

 

Layer 3 VPN Tunnel Clients Integrated with Endpoint Security

Supported Operating Systems

Client or Clientless

Encryption Protocol

Security Verification for Endpoint Devices

Desktop Firewall on Endpoint Devices

IPv6 Support

Endpoint Security VPN for Windows

Windows

Client

IPsec

 

Endpoint Security VPN for Mac

macOS

Client

IPsec

 

 

Endpoint Security Suite Remote Access VPN Blade

Windows, macOS

Client

IPsec

 

Additional Remote Access Solutions

Supported Operating Systems

Client or Clientless

Encryption Protocol

Security Verification for Endpoint Devices

Desktop Firewall on Endpoint Devices

IPv6 Support

SecuRemote

Windows

Client

IPsec

 

 

 

Summary of Remote Access Options

Below is a summary of each Remote Access option that Check Point offers. All supply secure remote access to corporate resources, but each has different features and meets different organizational requirements.

Details of the newest version for each client and a link for more information are in sk67820.

Note - Endpoint Security VPN on macOS includes a Desktop Firewall, but not Security Verification.