Try our new research platform with insights from 80,000+ expert users

Check Point Application Control vs CyberArk Endpoint Privilege Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 29, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Application Con...
Ranking in Application Control
3rd
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
41
Ranking in other categories
No ranking in other categories
CyberArk Endpoint Privilege...
Ranking in Application Control
5th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (3rd), Anti-Malware Tools (5th), Ransomware Protection (5th)
 

Mindshare comparison

As of August 2025, in the Application Control category, the mindshare of Check Point Application Control is 5.9%, down from 7.7% compared to the previous year. The mindshare of CyberArk Endpoint Privilege Manager is 5.1%. It is calculated based on PeerSpot user engagement data.
Application Control
 

Featured Reviews

Jivesh Sharma - PeerSpot reviewer
Control application access and optimize bandwidth for enhanced productivity
Check Point Application Control can be improved, particularly in policy management. When we add applications in the policy, we currently have the option to select individual applications, but a feature allowing categorization of applications based on types, such as social media applications, would make it easier to add multiple or bulk applications in the policy. This feature would be very valuable if introduced. Feedback from management about how these changes improved productivity and network performance has been positive. Users were spending their time watching videos on YouTube or streaming content, wasting time on Instagram and Facebook while in the office. Managers complained about this, leading to compliance policies being defined to restrict access to these kinds of applications.
Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Check Point Application Control offers a wide selection of applications, and even within those, you can configure uploads, downloads, et cetera, on a very granular level."
"Among the features that we have used, we like being able to identify the identity of the user who is doing transactions."
"The best value we have is their actionable reports on user analytics, events, and activity that are extracted from their database."
"We can control bandwidth and high-risk application access from our network using application control."
"The most outstanding feature is the Check Point APK wiki."
"We can easily switch from a classical firewall to a next-gen firewall using application security."
"This solution is stable and we have not had any issues."
"They have an excellent support team. They are fast and it is easy to escalate any situation."
"I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
"The most valuable feature of the solution is its performance."
"CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks."
"It doesn't affect operational efficiency. If you set everything correctly, the user doesn't notice that it is in the background."
"The biggest benefit of CyberArk EPM for our customers is control over privileged access for endpoints. Endpoints are often the starting point for attackers to enter and move within a network. CyberArk EPM bridges the gap between security and operations teams. Operations teams are happy because work isn't stopped due to admin rights issues, while security teams are satisfied that full admin rights aren't given to all users."
"CyberArk Endpoint Privilege Manager has had a positive impact on my customers' security posture."
"The most valuable feature of CyberArk Endpoint Privilege Manager is its high performance, it's the best identity security platform. The security is good. It's easy to showcase the feature and capabilities and compare it with other competitors. It competes well with other solutions. Additionally, it is a complete solution."
 

Cons

"At this time, Check Point Application control is the best on the market."
"We would like the product to be a bit more user-friendly in general."
"Custom applications for internal applications must be defined frequently."
"Malware threats can advance attacks when there are no timely measures to curb online phishing attacks."
"I recommend network upgrades in the next release to meet most company demands and daily changes."
"They need to improve the graphical interface."
"Usability needs to be improved."
"More and more product specifications should be infused with new incumbent features in the market to stay relevant and concurrent with the organization's needs."
"The price of the solution should improve."
"CyberArk meets clients' need very spot-on. It covers everything customers ask for. As for improvements, honestly, the feedback's been really positive. I haven't heard any specific areas that need work."
"CyberArk should consider whitelisting important applications like PowerShell and DLL that are currently not allowed due to some malicious content."
"CyberArk Endpoint Privilege Manager can improve its Identity Governance, which is already working effectively yet could continue to enhance its capabilities."
"CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications."
"The turnaround time of the support team is an area of concern where improvements are required."
"It is hard to deal with technical support if you are not certified."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
 

Pricing and Cost Advice

"The price of Check Point Application Control is high. The support and ecosystem around the solution are expensive."
"The blade has its cost but you can take advantage of the license package to pay less for it."
"I think application control has become a basic feature and it should be enabled automatically, without having to purchase a separate license for it."
"Check Point Application Control is expensive. The tool's licensing costs are yearly."
"It's a bit expensive and it could be cheaper, but it's part of business politics."
"We pay about $17 per user."
"I think that it was in the range of $200,000 that had to get approved."
"It is an expensive solution."
"CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive."
"I feel that the price of the product is nominal. It must be around 10 to 15 USD per installation. I rate the product price an eight to nine out of ten, where one is high price, and ten is low price."
"The tool's pricing is reasonable for customers."
"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"The price of CyberArk Endpoint Privilege Manager is expensive."
report
Use our free recommendation engine to learn which Application Control solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Performing Arts
11%
Financial Services Firm
11%
Manufacturing Company
8%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Application Control?
It has many important features that have greatly helped the company and the IT department.
What is your experience regarding pricing and costs for Check Point Application Control?
My experience with the pricing, setup cost, and licensing for Check Point Application Control is that the pricing is a bit high, but the features provided justify the cost. The features that Check ...
What needs improvement with Check Point Application Control?
Check Point Application Control could be improved, particularly regarding the application categorization accuracy as we often face miscategorization issues. The database should be updated properly ...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
 

Also Known As

No data available
Viewfinity
 

Overview

 

Sample Customers

SEB, Luma Arles, Terma, Aerospace, Midwest Rubber
Information Not Available
Find out what your peers are saying about Check Point Application Control vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.