The main use case of using Check Point Application Control is to provide visibility and control over web applications, web traffic, and user activity. It is for prioritizing bandwidth for business-critical applications like ERP and Office 365. It will also prevent the use of risky IT applications and helps in compliance with security standards.
Cyber Security Solution Engineer at a computer software company with 201-500 employees
Efficiently manage bandwidth and strengthen security posture through enhanced visibility and control
Pros and Cons
- "Bandwidth management with Check Point Application Control allows the organization to prioritize business-critical traffic such as Microsoft Teams, Office 365, and similar applications, ensuring that critical applications remain fast and reliable during peak hours."
- "Sometimes there are many false positives, which impacts user efficiency."
What is our primary use case?
What is most valuable?
The best features of Check Point Application Control are granular application and web control, user and group awareness, identity awareness, integration, SSL/TLS inspection, detailed visibility and reporting, and bandwidth management.
Bandwidth management with Check Point Application Control allows the organization to prioritize business-critical traffic such as Microsoft Teams, Office 365, and similar applications. This ensures that critical applications remain fast and reliable during peak hours. It also prevents the use of applications that consume too much bandwidth. In many organizations where employees depend on real-time applications such as voice, video conferencing, trading platforms, or healthcare systems, poor performance directly impacts productivity. This is where bandwidth management comes into the picture. It allows a smooth user experience, fair usage of network resources, and reduced business risk from downtime or lag.
What needs improvement?
Areas where Check Point Application Control could be improved are policy fine-tuning usability, reporting and analytics, application identification accuracy, and performance impact with SSL inspection. I would personally prefer to see more real-time, AI-assisted insights. For example, if an unusual app suddenly spikes bandwidth or starts behaving suspiciously, the system should automatically suggest a policy adjustment instead of waiting for the admin to dig into logs. That would make security more proactive and improve job efficiency.
The solution received an 8 out of 10 because it's a very strong solution with granular controls, user awareness, and deep visibility. However, they need to work on the customer support and false positive issues. Sometimes there are many false positives, which impacts user efficiency.
For how long have I used the solution?
I have been using Check Point Application Control for the past one year.
Buyer's Guide
Check Point Application Control
January 2026
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
What other advice do I have?
Check Point Application Control improves both security posture and compliance. By controlling which applications are allowed and inspecting their traffic, the organization reduces the attack surface. That means fewer opportunities for malware, phishing, or data leakage. In terms of compliance, many standards such as PCI DSS, HIPAA, and ISO 27001 require visibility into application usage, data transfer, and prevention of unauthorized communication channels. Application control helps enforce those policies, generates audit logs, and demonstrates compliance during assessments.
We have implemented the solution for our clients and customers. We are not using the Check Point cloud application control for our own environment.
For organizations considering this solution, I recommend defining their application usage policy and compliance requirements. Regarding business relationships, we are a customer only. We don't have any additional relationship; we are not a reseller or partner. I was not offered any gift card or incentive for this review. Overall, Check Point Application Control is a reliable solution that strengthens security posture. We are not using any other tech products.
This solution receives an 8 out of 10 rating.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Aug 29, 2025
Flag as inappropriateServer Security Analyst and Solution at a outsourcing company with 11-50 employees
Has improved productivity by restricting vendor access to only approved applications
Pros and Cons
- "Check Point Application Control has positively impacted my organization by improving our productivity, since we have applied a security policy so that only particular applications can be accessed within our network, users are not wasting their time using non-compliant applications in our premises."
What is our primary use case?
My main use case for Check Point Application Control is for application access in our private networks to our vendors whenever they are connected to our network. Vendors are restricted to access only particular allowed applications and are not able to access blocked or any malicious applications within our network.
A specific example of how I have used Check Point Application Control in a real situation is with one vendor who visited daily in our office and worked on a particular application that is hosted in the cloud. We allowed only that application, so the vendor was not able to use any other application.
What is most valuable?
The best features Check Point Application Control offers include outstanding application control, which allows us to block particular categories based on specific applications within our premises, and the application database is automatically updated from the Check Point cloud.
The category-based blocking works very well for us, and it is easy to set up. My technical background has not presented any challenges with the implementation or handling the configuration in day-to-day operations. Check Point Application Control is very straightforward and easy to configure.
The user interface and reporting are both outstanding, as the user interface is very easy to understand. Users can simply click on the internet application category or anything else to allow access, and this can be done through the GUI.
Check Point Application Control has positively impacted my organization by improving our productivity. Since we have applied a security policy so that only particular applications can be accessed within our network, users are not wasting their time using non-compliant applications in our premises. This is how our productivity has increased.
What needs improvement?
I do not see any challenges while implementing or using Check Point Application Control, so there is no lack of features in Check Point Application Control. I chose a rating of nine out of ten because everything is currently working well for me. However, something might need improvement because there is always a chance to improve any solution.
For how long have I used the solution?
I have been using Check Point Application Control for more than two to two and a half years.
What do I think about the stability of the solution?
Check Point Application Control is stable in my experience, as I do not face any issues with this solution.
What do I think about the scalability of the solution?
Check Point Application Control is handling the scalability of my organization well.
How are customer service and support?
The customer support for Check Point Application Control is outstanding, as the support team is rich in technical knowledge.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I am using the same solution only, as I did not previously use a different solution before Check Point Application Control.
How was the initial setup?
I do not see any challenges while implementing or using Check Point Application Control, so there is no lack of features in Check Point Application Control.
What about the implementation team?
I was not in the team that looked after the setup cost or pricing cost for Check Point Application Control.
What was our ROI?
I have seen a return on investment in terms of time saved. I have seen measurable improvements, as it has reduced time in troubleshooting and even the incidents have been reduced.
What's my experience with pricing, setup cost, and licensing?
I was not in the team that looked after the setup cost or pricing cost for Check Point Application Control.
Which other solutions did I evaluate?
Before choosing Check Point Application Control, I evaluated Fortinet Application Control.
What other advice do I have?
My advice for anyone looking into using Check Point Application Control is that they can consider this as one of the outstanding solutions present in the security domain. I have given this review a rating of nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Nov 7, 2025
Flag as inappropriateBuyer's Guide
Check Point Application Control
January 2026
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Sr. Network Security Engineer at a outsourcing company with 11-50 employees
Creates granular access controls and reduces user exposure to unauthorized content
Pros and Cons
- "The best feature of Check Point Application Control allows us to permit access to any website while blocking downloads from that application or website, which is called granular control."
- "It can be improved on web categorisation of newly added domain."
What is our primary use case?
We have been using Check Point Application Control for almost three years.
Our main use case for Check Point Application Control is to create a granular application control with visibility so that we can control user access accessibility and visibility.
How has it helped my organization?
With the help of check point application control our private network users are restricted to access only allowed web site.
What is most valuable?
The best feature of Check Point Application Control allows us to permit access to any website while blocking downloads from that application or website, which is called granular control. I have the control to determine whether users can read only, read and write, or download content. All these features are very great on Check Point Application Control.
It reduces risk because our team knows what users should access and what they should not access. Based on real-time requirements, we use the policies.
The application database is automatically upgraded and updated from the Check Point database, so there is no manual updating required for this application.
Before configuring Check Point Application Control, everyone had complete access over the internet. Once we deployed this solution, we restricted users based on departments to access only allowed webpages, not all webpages on the internet.
After configuring Check Point Application Control, incidents have been reduced.
What needs improvement?
I haven't seen any challenges in configuring the application control feature, thus it can be improved on web categorisation of newly added domain.
For how long have I used the solution?
We have been using Check Point Application Control for almost three years.
What do I think about the stability of the solution?
Check Point Application Control is pretty stable.
What do I think about the scalability of the solution?
It has been able to grow with our organization's needs.
How are customer service and support?
The customer support for Check Point Application Control is outstanding.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using the same solution.
How was the initial setup?
After configuring Check Point Application Control, it has reduced incidents, and after the deployment, incidents have minimized. Users are not exposed to the internet as they have restricted access.
What about the implementation team?
Implementation done by in-house team.
What was our ROI?
It has saved time.
What's my experience with pricing, setup cost, and licensing?
NA
Which other solutions did I evaluate?
We have evaluated the Fortinet application.
What other advice do I have?
I will advise anyone looking for the application control feature in their environment that they can definitely consider Check Point Application Control as a leader in the industry. It will really help them in their environment, allowing them to control user access of their network based on departmental needs. I rate Check Point Application Control nine out of ten.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 21, 2025
Flag as inappropriateInside Sales Manager at a outsourcing company with 11-50 employees
Has increased employee productivity by restricting online access to only approved applications
Pros and Cons
- "Check Point Application Control has positively impacted my organization by controlling application access; previously, all the users had full internet access, and now we have controlled their application access based on this solution."
- "The costing could be better for smaller organizations, as sometimes they feel they are not able to purchase these features due to pricing."
What is our primary use case?
My main use case for Check Point Application Control is to control URL access while users are searching on the internet, and with the help of Application Control, we can allow them whatever they get in our organization. This solution comes with the Check Point Next Generation Firewall, so we have enabled the Application Access feature in Check Point Next Generation Firewall.
A specific example of how I use Check Point Application Control in my day-to-day work is that we have configured the Application Control in our Check Point Next Generation Firewall. There are multiple categories, and we have allowed only the required categories, such as for the HR department and for accounting, whatever applications they use in day-to-day work. Based on that, we have allowed the application. Apart from that, everything is blocked.
What is most valuable?
The best features Check Point Application Control offers include the automatic update of the application categories, which gets automatically updated, and based on that, if any new application is added, it will get blocked under the block categories.
The automatic updates help my team by saving time and reducing manual effort because if we need to block the entertainment applications, if a new application is introduced in the market that falls under the entertainment category, it is blocked by default, so we don't have to manually configure or block this newly added application.
Check Point Application Control has positively impacted my organization by controlling application access; previously, all the users had full internet access, and now we have controlled their application access based on this solution.
What needs improvement?
Currently, I do not feel any feature needs improvement in Application Control because everything functions perfectly.
The costing could be better for smaller organizations, as sometimes they feel they are not able to purchase these features due to pricing.
For how long have I used the solution?
I have been using Check Point Application Control for three years.
What do I think about the stability of the solution?
Check Point Application Control is stable.
What do I think about the scalability of the solution?
The scalability of Check Point Application Control is better.
How are customer service and support?
The customer support is supportive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have been using the same solution from the start, so I did not previously use a different solution before Check Point Application Control.
What was our ROI?
I have seen a return on investment in terms of time saved and increased productivity.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is good based on our organization's size, so the pricing, setup cost, and licensing is considered acceptable.
Which other solutions did I evaluate?
Before choosing Check Point Application Control, we evaluated Sophos Application Control.
What other advice do I have?
After we enabled Check Point Application Control, I have seen improvements in security and productivity with fewer security events and increased productivity of the employees.
This is the industry's best solution, and organizations can consider Check Point Application Control tool in their organization.
Our company has a business relationship with this vendor as we are a partner.
I rate Check Point Application Control nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 24, 2025
Flag as inappropriateNetwork Security Engineer at a outsourcing company with 11-50 employees
Has improved user productivity by controlling access to non-compliant applications and providing clear activity logs
Pros and Cons
- "After deploying Check Point Application Control, our organization's productivity has really increased, which is the main benefit of this solution."
- "Check Point Application Control can be improved by using KB knowledge, but there are not many steps provided in the KB for configuration."
What is our primary use case?
Our main use case for Check Point Application Control is to block and control user accessibility of a particular application over the internet. With the help of this solution, our organization users can access only compliance applications. They are not allowed to access blocked applications in our private network.
We have blocked the entertainment categories application in our private network. Users from HR, account, or IT teams are not allowed to access or watch entertainment websites or applications. They are unable to access entertainment-based applications.
The main reason our organization blocks entertainment sites and applications is for user productivity.
What is most valuable?
The best features Check Point Application Control offers are better visibility and logs.
The visibility and logs feature helps me in my daily work because when any user tries to access blocked applications, I am able to catch them. An event is generated, and I can easily find out the user and which applications they are trying to access.
After deploying Check Point Application Control, our organization's productivity has really increased, which is the main benefit of this solution. We are also getting enhanced security.
Check Point Application Control has saved time as our users are not wasting their time watching entertainment websites or applications.
What needs improvement?
Check Point Application Control can be improved by using KB knowledge, but there are not many steps provided in the KB for configuration.
For how long have I used the solution?
I have been using Check Point Application Control for a total of three years.
What do I think about the stability of the solution?
Check Point Application Control is stable in my experience.
What do I think about the scalability of the solution?
Check Point Application Control's scalability is good.
How are customer service and support?
The customer support is good and supportive.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We are using the same solution as we did not previously use a different solution before Check Point Application Control.
What's my experience with pricing, setup cost, and licensing?
I was not part of the team that decided the cost, setup cost, or licensing pricing.
Which other solutions did I evaluate?
We evaluated Fortinet Application Control before choosing Check Point Application Control.
What other advice do I have?
My advice to others looking into using Check Point Application Control is that anyone who needs to deploy the application control solution can consider this as the best in the security market. On a scale of one to ten, I rate Check Point Application Control an eight out of ten.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 25, 2025
Flag as inappropriateTechnique at a outsourcing company with 11-50 employees
Has enabled user-based access control and improved visibility through granular web filtering
Pros and Cons
- "Check Point Application Control provides excellent granular control; for example, when allowing YouTube access, we can easily control downloading videos or posting content, restricting users to accessing only particular channels."
- "Sometimes Check Point Application Control provides false positives. We allow some websites or domains, but it still blocks them under certain categories."
What is our primary use case?
We are using Check Point Application Control for URL filtering so that users don't have access to unwanted websites, and we are also using it for threat prevention and Identity Awareness to implement allow policies based on users' names.
Previously, we were using allow policies based on IP addresses, but with Check Point Application Control, we have integrated our AD server to the firewall and implemented user-based policies. We have different departments, and we use username-based policies for each user.
What is most valuable?
Check Point Application Control has provided granular control over websites and visibility.
Check Point Application Control provides excellent granular control. For example, when allowing YouTube access, we can easily control downloading videos or posting content, restricting users to accessing only particular channels.
Previously, everyone had access to everything, but now with Check Point Application Control we have department-wise and user-based policies. Users are accessing only the compliance websites that we allow them to access, which is useful for controlling user access. We are getting proper visibility and can generate user-based reporting to present to our management.
Check Point Application Control has saved time since once we configure a user-based policy, there is no need for upgrades. We rarely change configurations in the firewall, making it time-saving while preventing threats from outside. It is cost-effective and provides a return on investment.
What needs improvement?
Sometimes Check Point Application Control provides false positives. We allow some websites or domains, but it still blocks them under certain categories. These false positives given by Check Point Application Control can be improved.
For how long have I used the solution?
We are using Check Point Application Control for more than two years.
What do I think about the stability of the solution?
Check Point Application Control is stable.
Which other solutions did I evaluate?
We evaluated Fortinet application control before choosing Check Point Application Control.
What other advice do I have?
As per industry reputation of Check Point OEM, everything looks fine.
I advise anyone looking for application control in their organization to consider this solution as it provides packet inspection, granular control, visibility, and allows creating user-based policies. All these features are very good, and they can consider Check Point Application Control as the best solution in the industry.
I rate Check Point Application Control eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 23, 2025
Flag as inappropriateTechnical Support Executive at a computer software company with 201-500 employees
Control application access and optimize bandwidth for enhanced productivity
Pros and Cons
- "We can say that 4,000 users are now accessing only legitimate business applications rather than wasting time on other applications that utilize unnecessary bandwidth."
What is our primary use case?
My main use case for Check Point Application Control is controlling application access as per client requirements. The LAN users try to access various applications randomly, but with respect to business requirements, users should access only business applications such as Teams and FTP. For the marketing team specifically, they should have access to Facebook, while other users should not have access to Facebook and social media platforms. We have implemented this type of use case for the client.
This use case fits into my daily workflow by providing a particular scenario where Check Point Application Control made a difference for my client. For example, the marketing team has access to Facebook and other social media platforms for marketing purposes, while other users can only access business applications such as Teams. This provides a granular level of control over which applications users can access. With Facebook, users can view posts but cannot post anything or chat on the application, achieving granular level control in particular applications.
What is most valuable?
Check Point Application Control offers features that control around 4,000 users through the Check Point firewall. This application control is one of the blades of the Check Point firewall, which helps us control user traffic based on which applications users should access and which they should not, with respect to company or organization compliance policies.
Changes in network performance are noticeable after implementing Check Point Application Control. Restricting users from visiting unnecessary applications improves the bandwidth, meaning the bandwidth is utilized only for desired applications or required tasks.
Check Point Application Control has positively impacted my organization, as I have seen improvements in security and compliance. Another important factor is that unnecessary bandwidth is not getting utilized; only the required applications get higher priority. For example, Teams voice calling takes priority. If users wanted to browse on YouTube and stream videos, that would consume bandwidth, but after blocking unwanted social media platforms and streaming sites, we prevent unnecessary bandwidth utilization, allowing it to be used for desired tasks.
What needs improvement?
Check Point Application Control can be improved, particularly in policy management. When we add applications in the policy, we currently have the option to select individual applications, but a feature allowing categorization of applications based on types, such as social media applications, would make it easier to add multiple or bulk applications in the policy. This feature would be very valuable if introduced.
Feedback from management about how these changes improved productivity and network performance has been positive. Users were spending their time watching videos on YouTube or streaming content, wasting time on Instagram and Facebook while in the office. Managers complained about this, leading to compliance policies being defined to restrict access to these kinds of applications.
For how long have I used the solution?
I have been using Check Point Application Control for more than one and a half years as an administrator.
What do I think about the stability of the solution?
Check Point Application Control is stable; I have not faced downtime or issues with reliability.
What do I think about the scalability of the solution?
The scalability of Check Point Application Control is good. I have not needed to scale up or down, and the process has been smooth.
How are customer service and support?
Customer support for Check Point Application Control is fair and good, and I have reached out to them with satisfactory results.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have not previously used a different solution before Check Point Application Control.
How was the initial setup?
The initial setup with Check Point Application Control is not very complex. If you know Check Point firewall, then it is easy to implement.
What about the implementation team?
If you want to implement Check Point Application Control, I advise you to implement HTTPS inspection for it to work 100% perfectly. Without HTTPS inspection, it may not function perfectly, as it will scan or judge applications based on their ratings. Additionally, implementing HTTPS inspection will yield better outputs and correct results.
What was our ROI?
I have seen a return on investment since implementing Check Point Application Control. We can say that 4,000 users are now accessing only legitimate business applications rather than wasting time on other applications that utilize unnecessary bandwidth. If we hadn't implemented Application Control, we might have needed to increase bandwidth for the users, which saved costs from that perspective. Additionally, users stay focused on their tasks, ultimately helping the organization save time, and from a security perspective, there are no disruptions seen.
What's my experience with pricing, setup cost, and licensing?
The pricing, setup cost, and licensing of Check Point Application Control are higher than other vendors, but it justifies the features offered. The licensing is straightforward.
Which other solutions did I evaluate?
I evaluated Palo Alto before choosing Check Point Application Control. I noticed that in Palo Alto, we don't get a granular level of application management as we do in Check Point, which has a large database for the applications, making it easier to implement policies.
What other advice do I have?
The process for setting up specific rules for user groups is straightforward. To work efficiently, we have to implement HTTPS inspection, which is important to work perfectly. The rest of the configuration process is very straightforward.
That level of detail is important for my clients because it prevents users from posting any internal information on social media platforms, which is crucial for our organization.
We are a partner of Check Point, so we have a business relationship with this vendor beyond just being a customer.
I use other tech products such as FortScout, FortiADC, and Netskope.
You can use my real name and company name when publishing my review.
On a scale of 1-10, I rate Check Point Application Control a 9.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Jun 17, 2025
Flag as inappropriateAssistant Manager at a outsourcing company with 11-50 employees
Granular control over application usage has improved compliance and saved time and money
Pros and Cons
- "Check Point Application Control has delivered excellent return on investment, as it has saved both money and time for our organization."
What is our primary use case?
Check Point Application Control serves as my main solution to control application access within my organization. Recently, we blocked entertainment applications, which enabled us to control application access for users more effectively through Check Point Application Control.
What is most valuable?
Check Point Application Control offers excellent features, particularly its auto-update capability and deep application visibility and control. The auto-update feature and deep application visibility help me in my daily work because application updates are automated, eliminating the need for manual updates, and I can control applications at a granular level.
Check Point Application Control has positively impacted my organization by providing strong control over application usage and visibility. It has improved compliance and saved time for our organization.
What needs improvement?
Check Point Application Control is functioning well for our needs, and I do not see anything requiring improvement at this time.
For how long have I used the solution?
I have been using Check Point Application Control for more than three years.
What do I think about the stability of the solution?
Check Point Application Control demonstrates excellent stability.
What do I think about the scalability of the solution?
Check Point Application Control has excellent scalability with no issues.
How are customer service and support?
Although I have not personally interacted with the customer support team, my team has had multiple sessions with them, and they provided good support.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We have been using the same solution since the beginning and have not switched from a different solution.
What was our ROI?
Check Point Application Control has delivered excellent return on investment, as it has saved both money and time for our organization.
What's my experience with pricing, setup cost, and licensing?
I had a great experience with the pricing, setup cost, and licensing from the Check Point sales team because they made it straightforward to understand the setup cost and licensing.
Which other solutions did I evaluate?
Before choosing Check Point Application Control, I did not evaluate other options.
What other advice do I have?
I recommend that any organization wanting to control application usage in their environment consider Check Point Application Control as one of the best solutions available. I provided this review a rating of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Dec 29, 2025
Flag as inappropriateBuyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Application ControlPopular Comparisons
WatchGuard Firebox
VMware Carbon Black App Control
Ivanti Application Control
Buyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:









