While I do not like to advocate one solution over the other in general, in this case, simply compare the requirements of the Windows 10 VPN to those of Check Point.
It does require installation of RAS, RADIUS and reliance on the corporate PKI, which your company may or may not have in place already.
With Check Point VPN offering, provided that you are not talking about SSL VPN, all you really need is the IA integration. This could be achieved either via AD query, which does not require any additional servers, or the Identity Collector, which does.
You are able to implement rules for mobile access that use Access Roles based on AD groups in Check Point.
Your primary advantage is the ability to inspect the traffic once VPN users are connected to CP cluster.
Using 3rd party solutions, you are blind to the content that is being pumped through it and will not be able to subject it nor to application controls, nor the Threat Prevention.
Regards,
Vladimir