Try our new research platform with insights from 80,000+ expert users
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS
Real User
Top 5Leaderboard
Great features, good compliance, and helps create visibility
Pros and Cons
  • "It has many important features that have greatly helped the company and the IT department."
  • "They need to improve the graphical interface."

What is our primary use case?

The companies have implemented this security tool, due to several factors. The companies develop or buy applications for different functions or needs and this is where Check Point Application Control comes in. 

The tool has allowed us to be able to identify and classify all those applications that are being used within the network, which simplifies the work of managing bandwidth, and also helps us to have better control over security since it allows us to allows you to block or allow access to our network.

How has it helped my organization?

It has helped us a lot in being able to have more unified and managed control over the entire infrastructure of the companies since with this we have better control in the applications of how we can limit each access or exit to the Internet. Without this tool, it would be a little more complicated since we would be very limited in defining policies based on characteristics such as IP addresses and port numbers. In addition, it has helped improve productivity in the IT area since we have reduced the time dedicated to each of the applications.

What is most valuable?

The tool fulfills the function for which it was designed. It has many important features that have greatly helped the company and the IT department. For example, it presents visibility of all traffic on the network, which helps us have better management to take measures necessary to optimize performance and security.

It also presents a strong point which is the use of policies. Compliance helps the company a lot and it is something that the tool does very well.

What needs improvement?

They need to improve the graphical interface.

They should also improve the latency when entering the GUI. 

The application should not be so closed when it comes to integrations with third-party tools.

They have become a bit expensive to be able to purchase them for smaller companies. 

Buyer's Guide
Check Point Application Control
October 2025
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,778 professionals have used our research since 2012.

For how long have I used the solution?

I have been using this application for one year in this company, however, I had previously used it for two years in a previous company.

What do I think about the stability of the solution?

The tool to the extent that I have used it these years has been very stable and safe.

What do I think about the scalability of the solution?

The tool is my scalable and adapts to our security infrastructure very well.

How are customer service and support?

Support should improve service times and be faster in providing solutions.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no type of tool that fulfilled this function previously.

How was the initial setup?

The installation of the tool at first is somewhat complicated since it has a fairly high learning curve. After getting to know it and how to configure it, that curve becomes easy.

What about the implementation team?

At first, the installation and configuration were done with the supplier. They provided us with training and we proceeded to make the necessary configurations.

What was our ROI?

Making an investment is always complicated. Doubts that can arise. However, it is never bad to invest in a security tool. It brings peace of mind to the company and the financial side.

What's my experience with pricing, setup cost, and licensing?

You must evaluate the needs that the company requires, then request quotes according to the needs of different suppliers.

Which other solutions did I evaluate?

Several options were analyzed, such as Palo Alto Networks App-ID, Fortinet FortiGate Application Control, and SonicWall Application Firewall, among others.

What other advice do I have?

You must have a culture of updating the tool every time you can, always choosing a tool with stability that is scalable since companies change day by day.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
System Admin at a outsourcing company with 11-50 employees
Real User
Top 5
Has improved visibility and control by restricting application access across departments
Pros and Cons
  • "Check Point Application Control has positively impacted my organization by giving us good control over application usage, allowing us to control user access and providing proper security."

    What is our primary use case?

    My main use case for Check Point Application Control is to use it as a security gateway on our next-generation firewall base, allowing us to control the application usage within our organization.

    In my organization, we have multiple departments, and based on their requirements for applications, we can allow separate application categories using Check Point Application Control.

    Different departments use Check Point Application Control to manage access to certain applications for security or compliance reasons, and it helps with automation in our organization as any new application that is introduced will be automatically added into categories.

    What is most valuable?

    The best features Check Point Application Control offers include tracking application usage, and the suggestion feature is great, with excellent security and visibility.

    The suggestion users feature works based on its own database, which detects and gives me access to applications, helping with security and visibility in my organization.

    Check Point Application Control has positively impacted my organization by giving us good control over application usage, allowing us to control user access and providing proper security.

    Productivity has increased because no user is able to access those applications, so they are not able to get distracted during work.

    What needs improvement?

    Check Point Application Control is working properly, so I do not see any improvements that can be made in this security feature.

    For how long have I used the solution?

    I have been using Check Point Application Control for three years.

    What do I think about the stability of the solution?

    Check Point Application Control is pretty much stable.

    What do I think about the scalability of the solution?

    It has handled growth or changes in my organization well over the past three years, so Check Point Application Control is scalable.

    How are customer service and support?

    The customer support for Check Point Application Control includes very good integration, security, and technical support, and they will help.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We were using the same solution before Check Point Application Control.

    What was our ROI?

    I can see a return on investment from using Check Point Application Control through time saved.

    Check Point Application Control has helped save time for applications.

    Which other solutions did I evaluate?

    Before choosing Check Point Application Control, we evaluated one additional option with the application.

    What other advice do I have?

    My advice for others looking into using Check Point Application Control is that it is one of the best solutions for application security.

    Everything is perfect, and I do not think there is anything I should change for the future.

    I would rate this review a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Check Point Application Control
    October 2025
    Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
    872,778 professionals have used our research since 2012.
    Ajenthan Aiyathurai - PeerSpot reviewer
    Manager - IT at NVCL Group
    Real User
    Top 5Leaderboard
    Helps enforce policies and maintain compliance with good real-time monitoring
    Pros and Cons
    • "The real-time monitoring and reporting functionalities provide visibility into application usage patterns and potential security incidents, enabling proactive responses to emerging threats."
    • "Improving the scalability and performance to handle larger networks and increasing traffic volumes would ensure consistent reliability under heavy usage conditions."

    What is our primary use case?

    The primary use case of Check Point Application Control is to enhance network security by providing granular control over applications and web traffic. It prevents unauthorized access by allowing or blocking applications based on predefined policies, ensuring that only authorized applications are used within the network. 

    Additionally, it improves productivity by restricting access to non-business-related applications and websites, helps maintain compliance with regulatory requirements and internal policies by monitoring and controlling application usage, and mitigates risks by detecting and preventing the use of high-risk applications, thereby reducing the likelihood of malware and data breaches. 

    This comprehensive control over application usage makes us more secure and efficient. 

    How has it helped my organization?

    The solution allows us to enforce policies that ensure only authorized applications are used, reducing the attack surface for potential threats such as malware. Restricting access to non-business-related applications and websites helps boost employee productivity and focus. 

    Moreover, the solution aids in maintaining regulatory compliance by monitoring and controlling application usage, ensuring sensitive data is protected according to our standards. 

    Overall, Check Point Application Control contributes to a more secure IT environment, enhances operational efficiency, and supports compliance efforts, ultimately safeguarding our organization's assets and reputation.

    What is most valuable?

    The application control capabilities allow for precise management of which applications can access the network, helping to prevent unauthorized or risky applications from compromising security. This feature enhances network protection and supports regulatory compliance efforts by ensuring that only approved applications are used. 

    Additionally, the solution's ability to categorize and prioritize applications based on their risk levels enables us to allocate resources more effectively, focusing on mitigating the most significant threats first. 

    Furthermore, the real-time monitoring and reporting functionalities provide visibility into application usage patterns and potential security incidents, enabling proactive responses to emerging threats.

    What needs improvement?

    Firstly, enhancing the user interface and overall user experience could simplify configuration and management tasks, making it more intuitive for administrators to navigate and utilize the solution effectively. 

    Additionally, improving the scalability and performance to handle larger networks and increasing traffic volumes would ensure consistent reliability under heavy usage conditions.

    Looking forward, additional features that could enhance Check Point Application Control in future releases might include more advanced machine learning and AI capabilities for threat detection and anomaly detection within application traffic. 

    Integration with cloud services and applications, as well as enhanced reporting and analytics functionalities, could provide deeper insights into application usage patterns and security posture.

    For how long have I used the solution?

    I've used the solution for three years.

    What do I think about the stability of the solution?

    Its ability to effectively enforce application policies without causing disruptions to network operations. 

    It maintains stability even during periods of high network traffic or when handling a wide variety of applications. 

    What do I think about the scalability of the solution?

    The scalability of Check Point Application Control can be influenced by factors such as hardware resources, network complexity, and the number of concurrent users and applications. 

    Organizations with very large networks or high traffic volumes may need to ensure adequate hardware resources and optimization of configurations to maintain optimal performance and scalability.

    How are customer service and support?

    Technical support was not as expected.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We did not previously use a different solution. 

    How was the initial setup?

    The initial setup was complex.

    What about the implementation team?

    We implemented the solution via the vendor.

    What was our ROI?

    By effectively managing and controlling application usage, we are reducing the risk of security breaches and data loss. This can lead to potential savings associated with avoiding financial penalties, reputational damage, and remediation costs related to security incidents. 

    What's my experience with pricing, setup cost, and licensing?

    The setup cost is reasonable. That said, pricing should be reduced further. 

    Which other solutions did I evaluate?

    We did evaluate Fortigate.

    What other advice do I have?

    This solution is meeting all our expectations; support and subscriptions should be taken into account. 

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Nagendra Nekkala - PeerSpot reviewer
    Senior Manager ICT & Innovations at Bangalore International Airport Limited
    Real User
    Top 5Leaderboard
    Helps to control VPN and bandwidth but needs to incorporate better documentation and regular security patches
    Pros and Cons
    • "The tool's most valuable features are VPN access, website defense, and maintenance."
    • "Check Point Application Control needs to ensure that they release up-to-date security patches regularly. It should release better documentation so end-users can use the product without depending on the support team."

    What is our primary use case?

    We use Check Point Application Control to control VPN and bandwidth. 

    What is most valuable?

    The tool's most valuable features are VPN access, website defense, and maintenance. 

    What needs improvement?

    Check Point Application Control needs to ensure that they release up-to-date security patches regularly. It should release better documentation so end-users can use the product without depending on the support team. 

    For how long have I used the solution?

    I have been working with the product for three years. 

    What do I think about the stability of the solution?

    Check Point Application Control's stability is good. 

    What do I think about the scalability of the solution?

    The tool is scalable. My company has 1000 users. 

    How are customer service and support?

    The tool's support is good. 

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    You need guidance to do the product's deployment. It cannot be done directly. You need two people to handle the deployment. 

    What's my experience with pricing, setup cost, and licensing?

    Check Point Application Control is expensive. The tool's licensing costs are yearly. 

    What other advice do I have?

    I rate the product an eight out of ten. 

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    LuisNeves - PeerSpot reviewer
    Network System Administrator at Camara Municipal de Lisboa
    Real User
    Useful VPN, high performance, and beneficial report monitoring
    Pros and Cons
    • "The most valuable feature of Check Point Application Control is VPN access and the ability to lock out sites we do not want users to have access. The reporting monitoring software in Check Point Application Control is fantastic. For example, log filtering is beneficial."
    • "There are many aspects we do not like about the solution and there are a lot of alternatives available on the market. Some of the settings are buried deep within the solution making it a challenge to navigate. It would be helpful if it was more intuitive. Additionally, there can be some settings that are in multiple places, this leaves the user not knowing what settings are needed to be modified for the wanted result. I have lost confidence because I do not know if I change a setting or if it is going to have the desired result I intended it to do."

    What is our primary use case?

    I am using Check Point Application Control for controlling streaming, social media, and video sites.  Additionally, we control VPNs and peer-to-peer sites. We use it to control sites that use a lot of bandwidth.

    How has it helped my organization?

    Check Point Application Control has resulted in fewer outside attacks, increased bandwidth for communication to the outside, more control for the CPA and users, and improved remote access management. We have numerous external collaborators working with our organization, and we have strict protocols for them to follow, which Check Point Application Control has helped us enforce. The VPN feature is also very helpful for remote users. Overall, Check Point has provided our organization with increased security, better performance, improved network response, and fewer issues.

    What is most valuable?

    The most valuable feature of Check Point Application Control is VPN access and the ability to lock out sites we do not want users to have access. The reporting monitoring software in Check Point Application Control is fantastic. For example, log filtering is beneficial.

    What needs improvement?

    There are many aspects we do not like about the solution and there are a lot of alternatives available on the market. Some of the settings are buried deep within the solution making it a challenge to navigate. It would be helpful if it was more intuitive. Additionally, there can be some settings that are in multiple places, this leaves the user not knowing what settings are needed to be modified for the wanted result. I have lost confidence because I do not know if I change a setting or if it is going to have the desired result I intended it to do.

    I have used other solutions, such as Palo Alto and I did not experience these types of problems.

    When we apply a change in Check Point Application Control there can be some time for the changes to take effect. The time is too long, and we have experienced approximately five minutes on occasion for modifying some rules or filtering.

    When there are outside-of-the-network threats, such as DoS attacks, Check Point Application Control should have more integrated ways to deal with the attacks. We should not have to purchase add-ons or secondary solutions or patches.

    There is some functionality that is not working anymore as it once did, such as HTTP filtering. The complexity of application usage is increasing day by day, and it seems that at some point, we will need to initiate specific projects to tackle the issue of application filtering. Check Point Application Control has been instrumental in addressing this challenge, but with the continued growth in complexity, more advanced features would be necessary to make the solution even more effective.

    For how long have I used the solution?

    I have used Check Point Application Control within the last 12 months.

    What do I think about the stability of the solution?

    Perhaps due to inadequate planning during the initial installation, we encountered numerous issues that persisted over the years. For instance, we faced challenges with VPN connectivity in certain locations, and at times, multiple CPU calls occurred while SharePoint failed to utilize all available machine resources. These problems led to daily performance issues and crashes, causing considerable headaches.

    It seems that the lack of careful planning during the installation phase was the root cause of these problems. With better planning and attention to detail, we could have avoided these issues altogether.

    I rate the stability of Check Point Application Control a seven out of ten.

    What do I think about the scalability of the solution?

    We have approximately 2,000 simultaneous VPN access. We have a total of approximately 4,000 users using the solution.

    I rate the scalability of Check Point Application Control an eight out of ten.

    How are customer service and support?

    The support we received was very good.

    I rate the technical support from Check Point Application Control a nine out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have used other solutions.

    How was the initial setup?

    The first deployment of Check Point Application Control posed significant complexity challenges in our large-scale operation. With numerous employees and diverse needs, attempting a self-setup proved to be a daunting task. However, despite the initial ease of implementation, performance degradation gradually surfaced over time, whether after several weeks, months, or even a year or two.

    The root cause of the problem lay in inadequate planning and suboptimal configuration at the outset. Our policies failed to work correctly, and we encountered multiple issues that necessitated reaching out to the vendor for assistance. While the system provided many customization options to cater to our specific requirements, uncovering the hidden settings proved to be a stumbling block. Ultimately, we struggled to identify the optimal configuration that would best serve our organization. The default settings are easy to find but the advanced settings are not easy to find and use.

    I rate the initial setup Check Point Application Control an eight out of ten.

    What about the implementation team?

    We use consultants and integrators to install Check Point Application Control. Additionally, we had an external course to improve our knowledge. The solution is complex and we were not able to do the implementation with the knowledge we had. We are discovering more options as we continue using the solution.

    What's my experience with pricing, setup cost, and licensing?

    The price of Check Point Application Control is high. The support and ecosystem around the solution are expensive.

    I rate the price of Check Point Application Control a seven out of ten.

    What other advice do I have?

    I would advise others before choosing any solution to look at many of the solutions on the market and compare them. It would be helpful to do a proof of concept and test the solutions before purchasing. What the Gartner Magic Quadrant research site advertises sometimes does not translate into the actual performance of the solution. It is important to test the solutions.

    Check Point Application Control is a sophisticated powerful solution that makes it difficult to customize. The price and the complexity of the solution might not be the best choice. Planning is a very important aspect of having the smooth operation of the solution if one chooses to use it.

    I rate Check Point Application Control an eight out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Evans Vs - PeerSpot reviewer
    Engineer at Digitaltrack
    User
    Top 5Leaderboard
    Very useful visibility, granular policy enforcement, and application risk assessment
    Pros and Cons
    • "It has enhanced security posture."
    • "Usability needs to be improved."

    What is our primary use case?

    The solution's primary use cases include application visibility and control, enforcement of security policies, risk mitigation, and bandwidth management. 

    How has it helped my organization?

    It has enhanced security posture, increased visibility and control, policy enforcement, and improved compliance, etc.                     

    What is most valuable?

    The best features of this application include visibility, granular policy enforcement, application risk assessment, and compliance reporting. 

    These features collectively contribute to enhancing network security, improving operational efficiency, ensuring regulatory compliance, and mitigating risks associated with unauthorized or malicious application usage within an organization using Check Point Application Control.

    What needs improvement?

    The following aspects need to be improved:

    • Application detection and classification
    • The user interface 
    • Usability
    • Threat detection and prevention
    • Reporting and analytics

    For how long have I used the solution?

    I have been Check Point Application Control for the past two years.

    What do I think about the stability of the solution?

    The stability is good.

    What do I think about the scalability of the solution?

    The scalability is good.

    How are customer service and support?

    Technical support is good.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    No, I didn't previously use any other solution. 

    How was the initial setup?

    The initial setup is clean.

    What about the implementation team?

    We had a vendor, and they were good.

    What was our ROI?

    The ROI is nice.

    What's my experience with pricing, setup cost, and licensing?

    The pricing should be reduced, and the licensing needs to be improved.

    Which other solutions did I evaluate?

    We did evaluate Forcepoint Application Control.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Google
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
    Perimeter Security Administrator at a security firm with 51-200 employees
    Real User
    Good blocking and filtering but needs more of a knowledge base for users
    Pros and Cons
    • "The most outstanding feature is the Check Point APK wiki."
    • "The blocking characteristics for filtering content currently are not so customizable."

    What is our primary use case?

    We needed a solution that would allow us to protect the applications that we were constantly developing. Those applications needed to be classified by categories, including integrity, risk level, and productivity issues, as well as identity per user. We needed all these characteristics to safeguard a library, repository, or platform that could allow us to manage it in a secure, fast, and scalable way. We tried more than one solution that would allow us the required granularity in the teams and management so that we could implement it according to the regulations that we had internally.

    How has it helped my organization?

    At the time of implementation, we had a great feeling of satisfaction with the solution as it allowed us to have granularity across types of applications - by the network, identity, social networks, the function of the application, et cetera. We were able to do more than what we really needed, and this gave us that feeling that we now had the internal compliance that we did not have before. The libraries are much larger and grouped by application in categories to protect us from attacks or threats.

    What is most valuable?

    The most outstanding feature is the Check Point APK wiki, which is a product that is incorporated into the solution that allows us to naturally and dynamically apply internal applications to the application database. It is continuously updated, which allows us to have constant detection capabilities and more than 8000 different applications at different sites. It allows us to be more dynamic and have greater control. Additionally, it has blocking via content filtering or HTTPS inspection, which we can combine with identity. That gives us a more centralized correlation and management for more granular policies and more expeditious control over each activity from the users.

    What needs improvement?

    The blocking characteristics for filtering content currently are not so customizable. I would like to be able to modify them a bit. I hope that customization will be incorporated in the future. Right now, we must educate the users who are constantly violating or in fear of violating an issue. We would like to be able to incorporate filtering with notifications in a learning portal so users can be educated and will no longer have a lack of experience. A portal will help make better, more educated, and knowledgeable users. 

    For how long have I used the solution?

    I've used the solution for two years.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Suraj Varma - PeerSpot reviewer
    Sr. Network Security Engineer at Digital Track Solutions Pvt Ltd
    Real User
    Top 5Leaderboard
    Real-time visibility, granular control, and reasonable pricing
    Pros and Cons
    • "The most valuable thing about the solution is that we get real-time visibility into the usage of an application and the granular control of the application."
    • "At this time, Check Point Application control is the best on the market."

    What is our primary use case?

    This solution's primary use is to provide real-time visibility and granular control over application usage in my company. 

    How has it helped my organization?

    With the help of this Check Point application control, we are able to control the usage of the application. It offers the best control; we can set the bandwidth usage for the traffic based on the application.                               

    What is most valuable?

    The most valuable thing about the solution is that we get real-time visibility into the usage of an application and the granular control of the application. 

    What needs improvement?

    At this time, Check Point Application control is the best on the market. 

    For how long have I used the solution?

    We have been using this product for the last year.

    What do I think about the stability of the solution?

    The stability is excellent.

    What do I think about the scalability of the solution?

    The scalability is very good.

    How are customer service and support?

    Our experience with customer service and support is excellent.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We are using the same OEM.

    How was the initial setup?

    The initial setup was simple.

    What about the implementation team?

    We implemented the solution through an in-house team.

    What's my experience with pricing, setup cost, and licensing?

    Based on the current market, everything looks good.

    Which other solutions did I evaluate?

    No, we did not evaluate other options. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user