Skip to Main Content
Notifications

Track orders, manage IT assets and get personalized pricing all in one place

CDW Logo

Check Point Mobile Access blade - license - unlimited concurrent connections

Mfg # CPSB-MOB-U CDW # 2325269

Software Details

  • License
  • SSL
  • unlimited concurrent connections
  • for 12000 Appliance 12607, 12608, 12610; 12400 Appliance; 21400 Appliance
View Tech Specs View More

Know your gear

Check Point Mobile Access software blade is the safe and easy solution for you to connect to corporate applications over the Internet with your smartphone or PC. The solution provides enterprise-grade remote access via SSL VPN, allowing you simple, safe and secure connectivity to your email, calendar, contacts and corporate applications.
Request Pricing
Reviews
(30)
Availability: 2-4+ Days
Add to Compare

Enhance your purchase

Better Together

Current Item
Check Point Mobile Access blade - license - unlimited concurrent connections

This Item: Check Point Mobile Access blade - license - unlimited concurrent connections

Call

Total Price:

Reviews

Reviews by Ratings

63%
33%
4%
0%
0%

Reviews by Industry

Clear All Filters
Reviewed and validated on:

What do you like best about the product?

what is most valuable and helpful about checkpoint mobile access is , It has strong encryption , two-factor authentication, and user-device pairing as a result this is helping our customers to maintain security while allowing employees to work remotely. And specially It is user friendly to use. Additionally It supports smartphones, tablates. PCs. and laptops as a result of this users has flexible and secure access to corporate network.

What do you dislike about the product?

Other than some performance issues there is nothing to complain about from my experience.

Reviewed and validated on:

What do you like best about the product?

The strong security and access control. The integration with other Check Point products works very well. The centralized management is also a good point to mention, because it works very good.

What do you dislike about the product?

The user interface is a little bit outdated. The initial set up and configuration can be complex for new or inexperienced users.

Reviewed and validated on:

What do you like best about the product?

Check Point Mobile Access provides secure connection over mobile network between my team and our agents from remote areas. It detects unprotected communicaation protocol that can expose confidential data to ransomware attackers. The software offers data insights on poor conversation networks for easy troubleshooting.

What do you dislike about the product?

I experienced few network network configurations downtimes for the first few days after deployment before familiarizing with the full package. functionalities

Reviewed and validated on:
Incentivized Review (Incentive offered for this review)

What do you like best about the product?

It secures all connected devices that we have configured in the enterprise network. It is easy to set up and monitor its security performance in deployed systems. I have not experienced network threats from malware attacks since I started using Layer 3 VPN enabled protocol.

What do you dislike about the product?

The few technical issues I experience are mainly from our servers when they are overloaded and does not affect the system operations.

Reviewed and validated on:
Incentivized Review (Incentive offered for this review)

What do you like best about the product?

It gives me freedom of accessing email updates in my smartphone from anywhere without fear of malware attacks. I have not experienced network communication threats from since I started using two-factor authentication feature powered by Check Point Mobile Access.

What do you dislike about the product?

The entire set up process and learning curve was challenging for the first few days.

Reviewed and validated on:

What do you like best about the product?

Check Point mobile access provides a remote access solution for users, even where they are and which devices they use, while maintaining security factors. Organizations can manage access control of users based on policies where they should have access and where they shouldn't. Besides, the organizations using the solution can create compliance rules to check and scan mobile devices and computers to determine whether they are compliant before connecting to the network.

What do you dislike about the product?

Compliance checks in Check Point mobile access are handy for organizations that want to add more security to the network. But this feature only supports almost Windows platforms while supporting minimal settings on others. This is a limitation because using non-Windows machines is very popular. Hopefully, Check Point will continue to develop the product shortly.

Reviewed and validated on:
Incentivized Review (Incentive offered for this review)

What do you like best about the product?

can securely access the corporate application from all the devices in the open internet

What do you dislike about the product?

if it can have all the in the on-premise it will be good

Reviewed and validated on:
Verified User

What do you like best about the product?

Check Point Mobile Access is easily accessible and relatively cost-effective software. It helps access confidential and vital data and info through mobile and tablet in the most secure way. No data leakage can happen if Check Point Mobile Access is installed in your device as it prevents data leaks up to 100% without hassle. It continuously runs in the background and helps secure the stored and transmitted data in the best possible way. The interface is easy to operate and does not bother much. Also, dealing with Check Point Marketing and the business team is most accessible than ever. It helps to strengthen the group in accessing the data and essential info from anywhere, anytime.

What do you dislike about the product?

No problem as such. Though, would request continuous updates as per changing business and market requirements now and then. Please bring in more tech-savvy security features and strengthen the encryption security to its maximum.

To Top
We ran into an issue adding your itemPlease try again.Close