Try our new research platform with insights from 80,000+ expert users

Check Point Application Control vs CyberArk Endpoint Privilege Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 29, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.9
Check Point Application Control enhances security and productivity by blocking harmful websites, reducing costs, and improving ROI significantly.
Sentiment score
7.2
CyberArk Endpoint Privilege Manager enhances security, reduces risks and costs, saves resources, and protects sensitive information effectively.
Before granular application control, IT support saw 5 to 7 tickets per week related to blocked apps or network slowdown. After implementing rule-based access and bandwidth prioritization, that dropped to 1-2 tickets per month, saving 6 to 8 hours per month for our team.
I have seen a return on investment, noting that after using Check Point Application Control blade, we minimized our bandwidth usage by half and also observed improved productivity, so we get what we invested in.
I have seen a return on investment since Check Point Application Control reduces my time spent searching for what applications users are accessing.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
 

Customer Service

Sentiment score
4.5
Check Point Application Control support is praised for efficiency but some desire quicker responses and improved initial support.
Sentiment score
6.2
CyberArk Endpoint Privilege Manager support is knowledgeable but needs improvements in response times, accessibility, and first-level assistance.
The support was very good, with representatives who were skilled in resolving issues.
When I create a case, I receive responses and solutions quickly.
We receive timely responses from Check Point if any network issues arise related to software blades.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
 

Scalability Issues

Sentiment score
8.1
Check Point Application Control excels in scalability, handling growth and integrating smoothly, offering consistent performance and flexibility.
Sentiment score
7.7
CyberArk Endpoint Privilege Manager efficiently scales for large deployments, praised for growth-centered architecture despite integration complexities.
It is very useful in an organization to limit bandwidth usage.
It's very scalable and has shown substantial improvement, making it a trusted solution.
Check Point Application Control's scalability allows us to handle growth very easily and in a straightforward manner.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
 

Stability Issues

Sentiment score
8.1
Check Point Application Control is stable and reliable, though installation requires updates and careful planning to avoid issues.
Sentiment score
8.2
CyberArk Endpoint Privilege Manager is stable, with 99.99% uptime, reliable on Windows, needing console improvements and minimal memory.
Check Point Application Control is stable for my needs; there are no downtime or reliability issues.
Check Point Application Control is stable, being more stable than other solutions due to its simplified GUI and policy management, making it the first choice for many customers.
Check Point Application Control is very stable; I haven't encountered any special issues.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
 

Room For Improvement

Check Point Application Control requires usability, support, and pricing improvements, with better customization, categorization, performance, and user guidance needed.
CyberArk Endpoint Privilege Manager needs improved integration, user interface, and pricing, along with enhanced compatibility and functionality.
Check Point can do a deep dive to understand how they can improve the performance while we enable the application control feature on all the policies.
There are many complications while using the smart console, making it very difficult to configure a VPN, such as a route-based VPN for someone transitioning from other technologies to Check Point.
If an unusual app suddenly spikes bandwidth or starts behaving suspiciously, the system should automatically suggest a policy adjustment instead of waiting for the admin to dig into logs.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
 

Setup Cost

Check Point Application Control's advanced features justify its high cost, with straightforward licensing and typically manageable setup.
CyberArk Endpoint Privilege Manager's high pricing is justified by its quality, features, and appeal to large enterprises in finance.
That's why it's costly.
My experience with pricing, setup costs, and licensing for Check Point Application Control has been that they are very affordable for customers.
It is not on the higher side, so the experience has been fair.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
 

Valuable Features

Check Point Application Control offers granular control, risk assessment, real-time monitoring, and optimized bandwidth, enhancing security and productivity.
CyberArk Endpoint Privilege Manager enhances security by managing privileges, integrating seamlessly, and preventing ransomware while ensuring regulatory compliance.
The next-gen application visibility and cloud sync features are valuable for us because they allow us to provide granular controls over the traffic that is flowing in and out.
We are using 4 Mbps of bandwidth, and by using Check Point Application Control, previously it was 3 Mbps, so now it is around 2 Mbps, allowing half of the bandwidth to be utilized for other work and minimizing the usage of bandwidth.
The best features of Check Point Application Control are granular application and web control, user and group awareness, identity awareness, integration, SSL/TLS inspection, detailed visibility and reporting, and bandwidth management.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
 

Categories and Ranking

Check Point Application Con...
Ranking in Application Control
2nd
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
46
Ranking in other categories
No ranking in other categories
CyberArk Endpoint Privilege...
Ranking in Application Control
5th
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
38
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (3rd), Anti-Malware Tools (5th), Ransomware Protection (5th)
 

Mindshare comparison

As of October 2025, in the Application Control category, the mindshare of Check Point Application Control is 5.2%, down from 5.6% compared to the previous year. The mindshare of CyberArk Endpoint Privilege Manager is 5.2%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Application Control Market Share Distribution
ProductMarket Share (%)
Check Point Application Control5.2%
CyberArk Endpoint Privilege Manager5.2%
Other89.6%
Application Control
 

Featured Reviews

YeAung - PeerSpot reviewer
Check Point Application Control provides granular visibility and control over applications and web traffic to enhance security, productivity, and compliance.
Check Point Application Control can be improved with faster updates for emerging applications. While the signature database is comprehensive, new apps or app features sometimes appear before signatures are updated. A faster update process or a community-driven signature model could help keep policies current. Additionally, simpler policy management for large organizations is needed, as the policy interface can feel complex in environments with hundreds of rules and multiple user groups. Features like bulk editing, smart suggestions, or policy templates could reduce admin workload. An improvement in reporting and analytics is also essential, as reports are detailed but sometimes hard to digest at a glance. More visual dashboards, trend analysis, or predictive insights would help the team spot operations and issues faster.
Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.
report
Use our free recommendation engine to learn which Application Control solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
21%
Performing Arts
10%
Financial Services Firm
9%
Construction Company
8%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business18
Midsize Enterprise24
Large Enterprise18
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise9
Large Enterprise18
 

Questions from the Community

What do you like most about Check Point Application Control?
It has many important features that have greatly helped the company and the IT department.
What is your experience regarding pricing and costs for Check Point Application Control?
In my experience with pricing, setup cost, and licensing, there are some costs associated with Check Point Application Control licensing and products, but it is good at what it does. That's why it'...
What needs improvement with Check Point Application Control?
Check Point Application Control could be improved by differentiating the network access segment section in the policy from the application URL filtering. Administrators currently get confused as th...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I believe it's quite a reasonably priced solution. It's not very common to use CyberArk because it's a niche solution, but customers who are willing to control administrative accounts are willing t...
 

Also Known As

No data available
Viewfinity
 

Overview

 

Sample Customers

SEB, Luma Arles, Terma, Aerospace, Midwest Rubber
Information Not Available
Find out what your peers are saying about Check Point Application Control vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.