I am using Check Point Application Control for controlling streaming, social media, and video sites. Additionally, we control VPNs and peer-to-peer sites. We use it to control sites that use a lot of bandwidth.
Network System Administrator at Camara Municipal de Lisboa
Useful VPN, high performance, and beneficial report monitoring
Pros and Cons
- "The most valuable feature of Check Point Application Control is VPN access and the ability to lock out sites we do not want users to have access. The reporting monitoring software in Check Point Application Control is fantastic. For example, log filtering is beneficial."
- "There are many aspects we do not like about the solution and there are a lot of alternatives available on the market. Some of the settings are buried deep within the solution making it a challenge to navigate. It would be helpful if it was more intuitive. Additionally, there can be some settings that are in multiple places, this leaves the user not knowing what settings are needed to be modified for the wanted result. I have lost confidence because I do not know if I change a setting or if it is going to have the desired result I intended it to do."
What is our primary use case?
How has it helped my organization?
Check Point Application Control has resulted in fewer outside attacks, increased bandwidth for communication to the outside, more control for the CPA and users, and improved remote access management. We have numerous external collaborators working with our organization, and we have strict protocols for them to follow, which Check Point Application Control has helped us enforce. The VPN feature is also very helpful for remote users. Overall, Check Point has provided our organization with increased security, better performance, improved network response, and fewer issues.
What is most valuable?
The most valuable feature of Check Point Application Control is VPN access and the ability to lock out sites we do not want users to have access. The reporting monitoring software in Check Point Application Control is fantastic. For example, log filtering is beneficial.
What needs improvement?
There are many aspects we do not like about the solution and there are a lot of alternatives available on the market. Some of the settings are buried deep within the solution making it a challenge to navigate. It would be helpful if it was more intuitive. Additionally, there can be some settings that are in multiple places, this leaves the user not knowing what settings are needed to be modified for the wanted result. I have lost confidence because I do not know if I change a setting or if it is going to have the desired result I intended it to do.
I have used other solutions, such as Palo Alto and I did not experience these types of problems.
When we apply a change in Check Point Application Control there can be some time for the changes to take effect. The time is too long, and we have experienced approximately five minutes on occasion for modifying some rules or filtering.
When there are outside-of-the-network threats, such as DoS attacks, Check Point Application Control should have more integrated ways to deal with the attacks. We should not have to purchase add-ons or secondary solutions or patches.
There is some functionality that is not working anymore as it once did, such as HTTP filtering. The complexity of application usage is increasing day by day, and it seems that at some point, we will need to initiate specific projects to tackle the issue of application filtering. Check Point Application Control has been instrumental in addressing this challenge, but with the continued growth in complexity, more advanced features would be necessary to make the solution even more effective.
Buyer's Guide
Check Point Application Control
June 2025

Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
For how long have I used the solution?
I have used Check Point Application Control within the last 12 months.
What do I think about the stability of the solution?
Perhaps due to inadequate planning during the initial installation, we encountered numerous issues that persisted over the years. For instance, we faced challenges with VPN connectivity in certain locations, and at times, multiple CPU calls occurred while SharePoint failed to utilize all available machine resources. These problems led to daily performance issues and crashes, causing considerable headaches.
It seems that the lack of careful planning during the installation phase was the root cause of these problems. With better planning and attention to detail, we could have avoided these issues altogether.
I rate the stability of Check Point Application Control a seven out of ten.
What do I think about the scalability of the solution?
We have approximately 2,000 simultaneous VPN access. We have a total of approximately 4,000 users using the solution.
I rate the scalability of Check Point Application Control an eight out of ten.
How are customer service and support?
The support we received was very good.
I rate the technical support from Check Point Application Control a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used other solutions.
How was the initial setup?
The first deployment of Check Point Application Control posed significant complexity challenges in our large-scale operation. With numerous employees and diverse needs, attempting a self-setup proved to be a daunting task. However, despite the initial ease of implementation, performance degradation gradually surfaced over time, whether after several weeks, months, or even a year or two.
The root cause of the problem lay in inadequate planning and suboptimal configuration at the outset. Our policies failed to work correctly, and we encountered multiple issues that necessitated reaching out to the vendor for assistance. While the system provided many customization options to cater to our specific requirements, uncovering the hidden settings proved to be a stumbling block. Ultimately, we struggled to identify the optimal configuration that would best serve our organization. The default settings are easy to find but the advanced settings are not easy to find and use.
I rate the initial setup Check Point Application Control an eight out of ten.
What about the implementation team?
We use consultants and integrators to install Check Point Application Control. Additionally, we had an external course to improve our knowledge. The solution is complex and we were not able to do the implementation with the knowledge we had. We are discovering more options as we continue using the solution.
What's my experience with pricing, setup cost, and licensing?
The price of Check Point Application Control is high. The support and ecosystem around the solution are expensive.
I rate the price of Check Point Application Control a seven out of ten.
What other advice do I have?
I would advise others before choosing any solution to look at many of the solutions on the market and compare them. It would be helpful to do a proof of concept and test the solutions before purchasing. What the Gartner Magic Quadrant research site advertises sometimes does not translate into the actual performance of the solution. It is important to test the solutions.
Check Point Application Control is a sophisticated powerful solution that makes it difficult to customize. The price and the complexity of the solution might not be the best choice. Planning is a very important aspect of having the smooth operation of the solution if one chooses to use it.
I rate Check Point Application Control an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Network Security Engineer at Digitaltrack
Real-time visibility, granular control, and reasonable pricing
Pros and Cons
- "The most valuable thing about the solution is that we get real-time visibility into the usage of an application and the granular control of the application."
- "At this time, Check Point Application control is the best on the market."
What is our primary use case?
This solution's primary use is to provide real-time visibility and granular control over application usage in my company.
How has it helped my organization?
With the help of this Check Point application control, we are able to control the usage of the application. It offers the best control; we can set the bandwidth usage for the traffic based on the application.
What is most valuable?
The most valuable thing about the solution is that we get real-time visibility into the usage of an application and the granular control of the application.
What needs improvement?
At this time, Check Point Application control is the best on the market.
For how long have I used the solution?
We have been using this product for the last year.
What do I think about the stability of the solution?
The stability is excellent.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and support?
Our experience with customer service and support is excellent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using the same OEM.
How was the initial setup?
The initial setup was simple.
What about the implementation team?
We implemented the solution through an in-house team.
What's my experience with pricing, setup cost, and licensing?
Based on the current market, everything looks good.
Which other solutions did I evaluate?
No, we did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Application Control
June 2025

Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Perimeter Security Administrator at a security firm with 51-200 employees
Good blocking and filtering but needs more of a knowledge base for users
Pros and Cons
- "The most outstanding feature is the Check Point APK wiki."
- "The blocking characteristics for filtering content currently are not so customizable."
What is our primary use case?
We needed a solution that would allow us to protect the applications that we were constantly developing. Those applications needed to be classified by categories, including integrity, risk level, and productivity issues, as well as identity per user. We needed all these characteristics to safeguard a library, repository, or platform that could allow us to manage it in a secure, fast, and scalable way. We tried more than one solution that would allow us the required granularity in the teams and management so that we could implement it according to the regulations that we had internally.
How has it helped my organization?
At the time of implementation, we had a great feeling of satisfaction with the solution as it allowed us to have granularity across types of applications - by the network, identity, social networks, the function of the application, et cetera. We were able to do more than what we really needed, and this gave us that feeling that we now had the internal compliance that we did not have before. The libraries are much larger and grouped by application in categories to protect us from attacks or threats.
What is most valuable?
The most outstanding feature is the Check Point APK wiki, which is a product that is incorporated into the solution that allows us to naturally and dynamically apply internal applications to the application database. It is continuously updated, which allows us to have constant detection capabilities and more than 8000 different applications at different sites. It allows us to be more dynamic and have greater control. Additionally, it has blocking via content filtering or HTTPS inspection, which we can combine with identity. That gives us a more centralized correlation and management for more granular policies and more expeditious control over each activity from the users.
What needs improvement?
The blocking characteristics for filtering content currently are not so customizable. I would like to be able to modify them a bit. I hope that customization will be incorporated in the future. Right now, we must educate the users who are constantly violating or in fear of violating an issue. We would like to be able to incorporate filtering with notifications in a learning portal so users can be educated and will no longer have a lack of experience. A portal will help make better, more educated, and knowledgeable users.
For how long have I used the solution?
I've used the solution for two years.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Manager at Advertising Standards Council of India
Great for blocking and malware protection with improved productivity
Pros and Cons
- "It improved the performance outcome for all our verticals due to more automation in system security, which helped in the identification and blockage of malware-affected applications and widgets."
- "More and more product specifications should be infused with new incumbent features in the market to stay relevant and concurrent with the organization's needs."
What is our primary use case?
Check Point Application Control is a one-stop shop for providing the strongest security to an organization's business verticals in the most efficient and effective manner.
It eases the business working as it enables smooth flow of information and helps businesses to create micro-managed accurate, granular policies, and helps in strengthening the organization's security by blocking and restricting the unknown and unsecured phishing widgets and applications across multiple integrations.
It limits the usage and utilization of any unknown malware attempts from any application
How has it helped my organization?
Check Point Application Control improved the productivity of our workforce by reducing the coordination time and efforts involved in strengthening the system's security through a traditional manual way or path.
It improved the performance outcome for all our verticals due to more automation in system security, which helped in the identification and blockage of malware-affected applications and widgets.
It helps in categorizing the basis of the application, its types, security level, the usability of resources, and its implications on productivity as a whole.
What is most valuable?
The solution is great at blocking and stopping unidentified and malware-affected applications.
The next-gen firewall system is inbuilt and is highly efficient in restricting terminated and unsecure applications.
It ensures smooth and secure API integrations with other system firewalls and applications due to advanced next-gen identification of malware-affected applications.
Unauthorized and unsecured applications would not pose any risk to the organization's effectiveness if carried out efficiently by application control security.
What needs improvement?
In my view, more efforts are required with the business development and customer service team to create more and more awareness across businesses of all sizes on the benefits of deploying the Check Point application control security across all business verticals and improving the performance outcomes for the organization.
More and more product specifications should be infused with new incumbent features in the market to stay relevant and concurrent with the organization's needs.
They need more and more secure integration features should be included with less cost so that the adoption rate can be increased multifold amongst new business users.
For how long have I used the solution?
I've been using the solution for over six months now.
What do I think about the stability of the solution?
The product is stable and highly recommended.
What do I think about the scalability of the solution?
The solution is highly scalable and replicable across multiple platforms and systems.
How are customer service and support?
We get great support and services from business and corporate customer service teams.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
An in-house solution was utilized for application security previously.
How was the initial setup?
The product is easy to comprehend and deploy.
What about the implementation team?
We implemented the product through the vendor only.
What was our ROI?
We've seen an ROI of over 80%.
What's my experience with pricing, setup cost, and licensing?
To every business out there, I strongly recommend trying Check Point Application Security and analyzing the utilities independently. It's one of the best security application software with advanced features to strengthen security with integrated applications and other platforms.
Which other solutions did I evaluate?
We evaluated McAfee and Trend security applications before making a final selection.
What other advice do I have?
I'd advise users to go for its mandatory trial and explore the gamut of facilities on their own.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Project Engineer at Wipro Limited
Good application control, useful notifications, and a straightforward setup
Pros and Cons
- "We can easily switch from a classical firewall to a next-gen firewall using application security."
- "Configuration and deployment are a little bit difficult."
What is our primary use case?
Our primary use case of Check Point Application Control is to filter which application categories we want to allow our organization members to have access to so that they are secured.
For example, we don't allow access to malicious applications and some categories that could be threats. We only allow organization members to access secure applications and applications that are aligned with the company's strategy.
The user interface is easy and dynamic. You can drag objects around the screen to facilitate their use. Besides, it is quite easy to understand and apply changes.
How has it helped my organization?
It also enables us to save internet bandwidth by filtering applications that are not work-related and helps us to easily create granular policies based on users to identify the usage of applications.
We can easily switch from a classical firewall to a next-gen firewall using application security.
We implemented application control at MDM global security policies, which helps us set general security standards for all managed devices.
Identity awareness module integration is to be used for user/group-based controls.
What is most valuable?
Application control and having features like completeness and validity, identification, authentication, and granularity with unified layers is awesome. The most important aspect is that it allows users to define policies based on source IP and user role, quickly identifying traffic flow with SAML.
You can allow or block traffic coming or going out to the internet for specific applications or websites.
It offers user notifications for blocked access, time-defined policies, and bulk categorization of malicious applications.
What needs improvement?
Sometimes, documentation is not accurate and with the support issue we have to wait a long time for an engineer to understand the errors. I would like to see if they can help with the issue of service and more qualified staff. They need to have good service with Check Point products.
The load balancer functionality for application traffic might be a better option.
Configuration and deployment are a little bit difficult.
This product works only when the user is in traffic flow through NGFW.
Sometimes there are more than one category tag to an application which can be tricky.
For how long have I used the solution?
We have been using the product for more than 12.5 years.
What do I think about the stability of the solution?
We are satisfied with the stability.
What do I think about the scalability of the solution?
We are satisfied with the scalability.
How are customer service and support?
The product provides the largest database about application control and we can create granular policies to identify the usage. Overall it's been a very good experience, working with this product.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't use any solutions previously. Check Point Application Control is easy and user-friendly. We're able to control and manage all applications with it.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
The help we had was excellent.
What's my experience with pricing, setup cost, and licensing?
The pricing has to be more economical.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology Security Specialist at AKBANK TAS
Offers secure access, allows for rule writing, and is easily optimized
Pros and Cons
- "It does not require a lot of work to be activated and used."
- "It would be nice if there was a platform and small application owners could come and send their own applications' name and IP information from there."
What is our primary use case?
Not all of the company's web traffic goes through Check Point, however, on the significant web traffic side, we solve security needs with Check Point.
Especially if you are going to give broad permissions, you need to block dangerous applications at the very beginning of your rule set. In this context, we use Check Point to block on an application basis. Sometimes there are general accesses. Like Azure, we can only give access by selecting the relevant applications. Check Point is a very good solution because these applications are constantly updating the IP lists on the backend.
How has it helped my organization?
It does not require a lot of work to be activated and used. It is quite simple to open the application layer blade and activating it means you are ready to use it.
The concept of NGFW is actually used exactly for this feature and I can say that it does justice. Once you are ready to use it, you can optimize your rule set by selecting the desired application name in the rule. Since the objects used are updatable, the need for you to return and update is very rare. This structure really saves you time.
What is most valuable?
First of all, to use this layer, you don't need to struggle and make changes to your structure. It is enough to have a firewall with NGFW support and turn on the application layer filtering blade. Apart from that, the objects in the rules you wrote have very little margin of error. In other words, the accesses of the application you put are passed or blocked as necessary. In fact, some applications have separate objects for download and installation, so you can write the rule set you have in mind more easily.
What needs improvement?
The objects found now have large applications or general category definitions that are completely determined and organized by Check Point. It would be nice if there was a platform and small application owners could come and send their own applications' name and IP information from there. If we could use application objects directly in our rule sets in Check Point in those small companies, that would be ideal. A few more layered objects could be created for Azure in large applications. It would be nice if firewall administrators could see parser information such as IP behind these objects.
For how long have I used the solution?
I've been using it for the past six years in different companies.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Web Designer at Milestone Technologies, Inc.
Good security and policy management with helpful excellent customization capabilities
Pros and Cons
- "It blocks ransomware attacks that can affect performance-enhancing secure work environments with zero-day attacks."
- "I recommend network upgrades in the next release to meet most company demands and daily changes."
What is our primary use case?
It helps us to discover applications that run across the organization network and admin accounts that are generated within the ecosystem.
Monitoring the performance of applications has been easy since we deployed this platform.
Check Point Application Control gives the IT team permission to deploy and assign tasks to various apps.
It gives us the authority to eliminate unnecessary admin accounts and blacklist applications that are not required anymore. It protects apps from malware attacks with powerful security tools.
How has it helped my organization?
Setting up new applications and testing the suitability of deployed tools has been efficient since we deployed this platform.
It blocks ransomware attacks that can affect performance-enhancing secure work environments with zero-day attacks.
We are able to manage workstations and servers across remote offices with a unified control system. Setting up a default system for allowing applications that are useful and blocking untrusted platforms has saved time and cost.
This product has enabled my web development team to set reliable control policies for managing applications.
What is most valuable?
Policy management features have enabled the organization to set up achievable goals and programs that can be implemented successfully.
The security systems prevent external attacks from affecting workflows and compromising data.
Customization has enabled us to create policies that can easily meet our requirements with flexible features.
The overall cost of deployment and maintenance has been efficient and affordable. Application blacklisting helps us to filter our tedious apps that can negatively affect operations.
What needs improvement?
The current features have great performance capabilities and have highly boosted production in the organization. I recommend network upgrades in the next release to meet most company demands and daily changes.
The performance has been stable, and we really appreciate the great results. The security tools and policy enhancement tools perform effectively. The overall productivity of the current features is excellent, and I recommend the use of this product to other companies.
We have longed for a reliable Application Control platform for a long time, and finally, we have received the best solution.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
This tool is highly stable.
What do I think about the scalability of the solution?
I am impressed by the product's great performance.
How are customer service and support?
The customer support staff responds effectively.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not worked with any other similar solution before.
How was the initial setup?
The setup was straightforward.
What about the implementation team?
Implementation took place through the vendor.
What was our ROI?
ROI has grown from 40% to 65% from the previous year.
What's my experience with pricing, setup cost, and licensing?
The cost and licensing terms have been reliable.
Which other solutions did I evaluate?
I settled on this product due to its stable performance after evaluating several products.
What other advice do I have?
I highly recommend the use of this product to other organizations for reliable application control services.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Soporte técnico superior at Acobo
Helps define policies, integrates with third-parties, and offers good threat detection
Pros and Cons
- "One of the greatest capacities and the benefits it gives us is the ability to control applications based on defining access or denial policies in specific applications, groups, or category profiles."
- "The guides used today are a bit complex, and we need efficient and simple access to them so that any administrative or technical person can solve, analyze, and configure each of the rules and identities seamlessly."
What is our primary use case?
We needed to allow, control, block, and access specific applications based on the policies that the institution has as a baseline. Given this need, we have tried, analyzed, and tested various solutions that could comply with said internal directive. We have sought solutions that allow us greater visibility and control over applications on the network, improving the protection of applications and the security of the organization in general. We've validated the software's great potential at detecting malicious events on unauthorized applications or resources.
How has it helped my organization?
Check Point Application Control has offered us the possibility of achieving several important organizational pillars that were required to cover. We had application identification, application control, and protection based on known or unknown threats.
These capabilities have allowed us to discover known or unknown threats by detecting them under the identity of users. We managed to include a malware intrusion detection index based on the identity of the users in order to protect them.
What is most valuable?
One of the greatest capacities and the benefits it gives us is the ability to control applications based on defining access or denial policies in specific applications, groups, or category profiles. Compared to other products, it has offered us a unique combination by allowing the integration of third-party services or brand-owned services, which gives us a chance to insure, protect ourselves, and generate scalable, comprehensive protection.
What needs improvement?
One of the improvements that we need is in the manual services. The guides used today are a bit complex, and we need efficient and simple access to them so that any administrative or technical person can solve, analyze, and configure each of the rules and identities seamlessly. We need clear directions to help us configure effectively. It's important to be able to have this documentation available to make the many available features easy to configure and allow us to promote defense tactics in depth against all available threats.
For how long have I used the solution?
I've used the solution for two years.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Application ControlPopular Comparisons
VMware Carbon Black App Control
Ivanti Application Control
WatchGuard Application Control
Buyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions: