Essentially the main topic that you'll need to decide is what type of VPN do you want to use? The 2 "main categories" that I'd say you need to consider are the following:
IPSEC - These are the most common and the type you typically see in most corporate environments and used for site to site VPN's. They have the advantage of performance and are considered very secure when configured properly, however there TONS of different configuration combinations which can make the configuration extremely confusing. Most of the entry level / consumer level products try to attempt to make this easier by either providing a specialized IPSEC client (allows you to connect, this is what QuickVPN and SafeNet are), by limiting your options, or a combination of both. The "end user experience" is typically that the user opens a program or a connection profile on their computer which connects them to the VPN and they get access to the remote resources.
Pros - Security, flexibility, industry standard
Cons- Can be difficult and confusing to configure, may have trouble connecting through some firewalls / routers that use NAT.
SSLVPN - This is a VPN solution that is essentially provided over a web page, either by using a web page with code built in that allows you to communicate to the remote network using that code, or by sometimes delivering access to the remote resources via the custom web page. The nice thing with this, is that it doesn't require you to install and configure software on the remote machines and because it typically uses tcp port 443 it is rare that you have a problem connecting. End user experience is that they browse to an IP address / URL and log in using their credentials to gain access. Some solutions have a client that can be installed which prevents the users from needing to browse to a web page to bring up the VPN. Web page based is called "clientless", and conversely the local program type ones are called "client sslvpn".
Pros - Ease of deployment, has less connection problems when going through firewalls
Cons- Not always a "complete" solution (depends on vendor), and typically has a bigger performance / overhead hit than IPSEC so performance isn't as good in most cases
Personally I prefer SSLVPN's because they tend to get through firewalls easier and don't tend to have as much to configure. I have however used the QuickVPN client with the Cisco / Linksys RVS4000 and can assure it is EASY to configure... however... I also did have problems with it getting it to connect through my Cisco ASA, but it did connect ok through your "average home linksys" type of product. Overall it worked, but was slow to connect and I wasn't terribly impressed especially compared to how well the Cisco enterprise IPSEC VPN client works. (Connects fast, and manages to connect through the same Cisco ASA just fine.... go figure) Overall I'd give the QuickVPN a "C+ or B-"
The first VPN router you sent over included one of the IPSEC based "SafeNet" client licenses, if you wanted more than one user to connect using it, you would legally need to buy additional licenses, or use a free IPSEC client (maybe look up ShrewSoft)... Windows includes an IPSEC client, however most people find it difficult if not impossible to configure it properly.
Another cheaper option to look at is the Cisco RVL200, it's an SSLVPN based solution. I haven't used it but based on the below review it looks like it may hold some promise:
http://www.smallnetbuilder.com/content/view/30237/51/