Try our new research platform with insights from 80,000+ expert users

Check Point Application Control vs CyberArk Endpoint Privilege Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Application Con...
Ranking in Application Control
4th
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
37
Ranking in other categories
No ranking in other categories
CyberArk Endpoint Privilege...
Ranking in Application Control
5th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
36
Ranking in other categories
Endpoint Compliance (4th), Privileged Access Management (PAM) (3rd), Anti-Malware Tools (5th), Ransomware Protection (7th)
 

Mindshare comparison

As of May 2025, in the Application Control category, the mindshare of Check Point Application Control is 6.5%, down from 8.9% compared to the previous year. The mindshare of CyberArk Endpoint Privilege Manager is 3.8%. It is calculated based on PeerSpot user engagement data.
Application Control
 

Featured Reviews

Evans Vs - PeerSpot reviewer
Very useful visibility, granular policy enforcement, and application risk assessment
The solution's primary use cases include application visibility and control, enforcement of security policies, risk mitigation, and bandwidth management.  It has enhanced security posture, increased visibility and control, policy enforcement, and improved compliance, etc.                      The…
Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Check Point enables us to save internet bandwidth. The administration offers good guidance. We don't want the employees to access social networking on work computers because it will distract them from their jobs, so we can block that. It also helps us to implement changes very quickly and to get people to be more focused on the job."
"It does not require a lot of work to be activated and used."
"The central management system provides a reliable platform for application control and URL filtering."
"Being able to choose specific applications in our policy rule base in order to better manage access and bandwidth utilization has had a significantly positive impact on our environment and saved a lot of management time."
"Among the features that we have used, we like being able to identify the identity of the user who is doing transactions."
"The most outstanding feature is the Check Point APK wiki."
"This platform has fully secured our applications with very powerful firewall security upgrades."
"We can control bandwidth and high-risk application access from our network using application control."
"We have not had issues with CyberArk. It works very smoothly. We can do many things with CyberArk. It helps us to see exactly what is happening."
"It doesn't affect operational efficiency. If you set everything correctly, the user doesn't notice that it is in the background."
"We did immediately begin to see results when using CyberArk."
"The biggest benefit of CyberArk EPM for our customers is control over privileged access for endpoints. Endpoints are often the starting point for attackers to enter and move within a network. CyberArk EPM bridges the gap between security and operations teams. Operations teams are happy because work isn't stopped due to admin rights issues, while security teams are satisfied that full admin rights aren't given to all users."
"I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks."
"CyberArk Endpoint Privilege Manager is entirely cloud-based, so no further upkeep is required."
"The solution is scalable."
 

Cons

"It's important that there is the option to validate the policies before applying them."
"The guides used today are a bit complex, and we need efficient and simple access to them so that any administrative or technical person can solve, analyze, and configure each of the rules and identities seamlessly."
"The initial setup was a bit difficult."
"We would like the product to be a bit more user-friendly in general."
"Seeing the capabilities and features that we are using today, we can say that we could expect an additional feature that could allow us to integrate this management and even security with APIs."
"Custom applications for internal applications must be defined frequently."
"The learning curve for new users is challenging since the integrated data models are complicated."
"They are expensive products due to the fact that we have to buy blades for each solution that we want to integrate into our corporate."
"Without knowledge, you are not able to find some items as they are really hidden within the UI."
"It's an old product and has many areas that can be improved."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"The main issues I experience are related to deployment, which requires dependency on other solutions like AD or SCCM. These tools need to be defined and synced with the client or agent and master, sometimes needing manual checks."
"One area that has room for improvement is in managing the credentials for network devices."
"CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
"The product is expensive."
"CyberArk has some performance issues. For example, servers could not handle the solution when we first took CyberArk Endpoint Privilege Manager."
 

Pricing and Cost Advice

"The price of Check Point Application Control is high. The support and ecosystem around the solution are expensive."
"I think application control has become a basic feature and it should be enabled automatically, without having to purchase a separate license for it."
"Check Point Application Control is expensive. The tool's licensing costs are yearly."
"It's a bit expensive and it could be cheaper, but it's part of business politics."
"The blade has its cost but you can take advantage of the license package to pay less for it."
"Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
"The solution's pricing is reasonable compared to other vendors' products."
"I feel that the price of the product is nominal. It must be around 10 to 15 USD per installation. I rate the product price an eight to nine out of ten, where one is high price, and ten is low price."
"We pay about $17 per user."
"The price of CyberArk Endpoint Privilege Manager is expensive."
"The price of CyberArk Endpoint Privilege Manager is expensive. The solution is priced based on the number of accounts onboarded and the number of concurrent sessions. Everyone else is included in the price, such as support."
"The cost for CyberArk is very high."
"I rate the solution's pricing an eight out of ten since the price can be too high for smaller businesses."
report
Use our free recommendation engine to learn which Application Control solutions are best for your needs.
849,963 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
22%
Computer Software Company
12%
Government
8%
Educational Organization
6%
Financial Services Firm
16%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Application Control?
It has many important features that have greatly helped the company and the IT department.
What needs improvement with Check Point Application Control?
At this time, Check Point Application control is the best on the market.
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost. It's really one of the best solutions.
 

Also Known As

No data available
Viewfinity
 

Overview

 

Sample Customers

SEB, Luma Arles, Terma, Aerospace, Midwest Rubber
Information Not Available
Find out what your peers are saying about Check Point Application Control vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: April 2025.
849,963 professionals have used our research since 2012.