Try our new research platform with insights from 80,000+ expert users
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port
User
Great for access control and site blocking with the capability to restrict file sharing
Pros and Cons
  • "We can control bandwidth and high-risk application access from our network using application control."
  • "Custom applications for internal applications must be defined frequently."

What is our primary use case?

On our infrastructure, we installed the Check Point 6200 appliance as our primary firewall. It is deployed in a distributed mode, with the security gateway and management running on separate machines.

Our major purpose is to limit web access from internal networks.

Using application control, we blocked the use of peer-to-peer applications such as torrent from our networks and allowed only youtube.com from the media streaming category, resulting in a significant improvement in bandwidth.

Aside from these numerous categories, we blocked a large number of high-risk applications from access our network.

How has it helped my organization?

We can control bandwidth and high-risk application access from our network using application control.

We want our users to only be able to access certain websites during working hours. We accomplished this through application control by blocking social media, phonography, drugs, media sharing, and other sites.

We also restricted file sharing sites through application control and blocked file uploading, which helped us avoid data loss.

We set a usage limit for YouTube.com, giving us more bandwidth control.

What is most valuable?

The control options for an application are very specialized. We may thus ultimately decide what to access and what to prevent.

It is relatively easy to implement an application control policy, and it is made to integrate with the access policy.

The ability to see each application clearly in the logs is quite helpful.

Application control utilizes signatures similarly to how IPS does. It is an excellent feature.

It's pretty easy to schedule updates to the application control database. We can design a check for fresh updates every two hours.

Users can clearly understand the reasons for site blocking from the blocked message.

What needs improvement?

1 – Custom applications for internal applications must be defined frequently. This should be improved. It would be much better if Check Point could detect internal applications and automatically bypass them.

2- Without HTTPS decryption, the majority of App Control recognition features will be rendered ineffective, as everything has been encrypted thus far.

3-An application may have multiple category tags, which is confusing.

These areas should be improved. 

It satisfies all of our needs except for this. 

Check Point Application Control assists us in controlling bandwidth and restricting internet access for our infrastructure.

Buyer's Guide
Check Point Application Control
May 2025
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for almost two years.

Which solution did I use previously and why did I switch?

Yes, we used a different solution. However, it did not satisfy us in terms of security. As a result, we decided to deploy Check Point NGFW for enhanced security.

Before migrating to Check Point firewall, we conducted market research and solicited feedback from my contacts who are already Checkpoint NGFW customers. We decided to use Check Point NGFW as a result of this.

What was our ROI?

Our ROI is that it increases the security precautions that prevent users from accessing websites that can harm our business. Additionally, it also reduces the use of the internet, which is often unrelated to business tasks.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2115711 - PeerSpot reviewer
Web Designer at Milestone Technologies, Inc.
User
Good security and policy management with helpful excellent customization capabilities
Pros and Cons
  • "It blocks ransomware attacks that can affect performance-enhancing secure work environments with zero-day attacks."
  • "I recommend network upgrades in the next release to meet most company demands and daily changes."

What is our primary use case?

It helps us to discover applications that run across the organization network and admin accounts that are generated within the ecosystem. 

Monitoring the performance of applications has been easy since we deployed this platform. 

Check Point Application Control gives the IT team permission to deploy and assign tasks to various apps. 

It gives us the authority to eliminate unnecessary admin accounts and blacklist applications that are not required anymore. It protects apps from malware attacks with powerful security tools.

How has it helped my organization?

Setting up new applications and testing the suitability of deployed tools has been efficient since we deployed this platform. 

It blocks ransomware attacks that can affect performance-enhancing secure work environments with zero-day attacks. 

We are able to manage workstations and servers across remote offices with a unified control system. Setting up a default system for allowing applications that are useful and blocking untrusted platforms has saved time and cost. 

This product has enabled my web development team to set reliable control policies for managing applications.

What is most valuable?

Policy management features have enabled the organization to set up achievable goals and programs that can be implemented successfully. 

The security systems prevent external attacks from affecting workflows and compromising data. 

Customization has enabled us to create policies that can easily meet our requirements with flexible features. 

The overall cost of deployment and maintenance has been efficient and affordable. Application blacklisting helps us to filter our tedious apps that can negatively affect operations. 

What needs improvement?

The current features have great performance capabilities and have highly boosted production in the organization. I recommend network upgrades in the next release to meet most company demands and daily changes. 

The performance has been stable, and we really appreciate the great results. The security tools and policy enhancement tools perform effectively. The overall productivity of the current features is excellent, and I recommend the use of this product to other companies. 

We have longed for a reliable Application Control platform for a long time, and finally, we have received the best solution.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

This tool is highly stable.

What do I think about the scalability of the solution?

I am impressed by the product's great performance.

How are customer service and support?

The customer support staff responds effectively.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with any other similar solution before.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation took place through the vendor.

What was our ROI?

ROI has grown from 40% to 65% from the previous year.

What's my experience with pricing, setup cost, and licensing?

The cost and licensing terms have been reliable.

Which other solutions did I evaluate?

I settled on this product due to its stable performance after evaluating several products.

What other advice do I have?

I highly recommend the use of this product to other organizations for reliable application control services.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Application Control
May 2025
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Helps define policies, integrates with third-parties, and offers good threat detection
Pros and Cons
  • "One of the greatest capacities and the benefits it gives us is the ability to control applications based on defining access or denial policies in specific applications, groups, or category profiles."
  • "The guides used today are a bit complex, and we need efficient and simple access to them so that any administrative or technical person can solve, analyze, and configure each of the rules and identities seamlessly."

What is our primary use case?

We needed to allow, control, block, and access specific applications based on the policies that the institution has as a baseline. Given this need, we have tried, analyzed, and tested various solutions that could comply with said internal directive. We have sought solutions that allow us greater visibility and control over applications on the network, improving the protection of applications and the security of the organization in general. We've validated the software's great potential at detecting malicious events on unauthorized applications or resources. 

How has it helped my organization?

Check Point Application Control has offered us the possibility of achieving several important organizational pillars that were required to cover. We had application identification, application control, and protection based on known or unknown threats. 

These capabilities have allowed us to discover known or unknown threats by detecting them under the identity of users. We managed to include a malware intrusion detection index based on the identity of the users in order to protect them. 

What is most valuable?

One of the greatest capacities and the benefits it gives us is the ability to control applications based on defining access or denial policies in specific applications, groups, or category profiles. Compared to other products, it has offered us a unique combination by allowing the integration of third-party services or brand-owned services, which gives us a chance to insure, protect ourselves, and generate scalable, comprehensive protection. 

What needs improvement?

One of the improvements that we need is in the manual services. The guides used today are a bit complex, and we need efficient and simple access to them so that any administrative or technical person can solve, analyze, and configure each of the rules and identities seamlessly. We need clear directions to help us configure effectively. It's important to be able to have this documentation available to make the many available features easy to configure and allow us to promote defense tactics in depth against all available threats. 

For how long have I used the solution?

I've used the solution for two years.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1858884 - PeerSpot reviewer
Network Administrator at a computer software company with 1,001-5,000 employees
User
Top 20
Great rate-limiting their uploads with helpful application control and is easy to expand
Pros and Cons
  • "The ability to be able to do dynamic rate limiting on specific applications has been a valuable feature."
  • "The one feature that could be improved would be the ability to see implicit rules that are defaulted on the policy."

What is our primary use case?

The primary use case for application control in our organization is to provide the ability to restrict users from using unapproved applications and applications that fall under categories that are deemed malicious. 

Application control is enabled on all of our HA firewall clusters globally. Leveraging identity awareness, we can restrict remote access applications from the rest of the organization, allowing it for specific teams that require it, i.e., IT Helpdesk and Technical Support teams.

How has it helped my organization?

Application Control has improved our organization by enabling other network administrators and me to restrict non-corporate applications for specific departments. 

Combined with Check Points URL filtering, this blade provides more granular restriction as if the firewall engine does not detect the application, administrators have the ability to use regular expressions to block URLs that are critical for the application to function. For example, the Windows Quick Assist tool needed URL filtering as it was not being detected and categorized as "Remote Assistance"

What is most valuable?

The ability to be able to do dynamic rate limiting on specific applications has been a valuable feature. 

This has allowed us to prevent our graphics team from saturating our link to the internet by rate-limiting their uploads to third-party cloud providers (i.e., Dropbox, OneDrive, Google Drive, etc.). 

The fact that application control also can stop browser-based extensions/widgets has also been very valuable as it has provided insight to employees installing VPN extensions on their browsers. 

What needs improvement?

This blade is very valuable to any organization, and it is great that it is included in the base firewall licensing bundle. 

It is very easy to set up and configure. The one feature that could be improved would be the ability to see implicit rules that are defaulted on the policy. For example, if the cleanup rule is removed, there is still another toggle in the settings that (in the event the traffic does not match any of the rules) you can either choose to block the traffic or allow it. By default, this setting is configured to drop, which caused issues the first time we configured the policy as this was not shown.

For how long have I used the solution?

I've used the solution for five years.

What do I think about the stability of the solution?

The solution is stable and hasn't increased the load drastically.

What do I think about the scalability of the solution?

Scalability is excellent and is easy to add new sites.

How are customer service and support?

Technical support is hit or miss. L1 and L2 never seem to be able to solve my issues. We always need to go to L3 support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not previously use a different solution.

How was the initial setup?

The solution should be configured by default with an allow rule that can be changed to drop once implemented to avoid massive disruptions to users.

What about the implementation team?

We handled the solution in-house.

What was our ROI?

The ROI we see is in the added security to block specific applications or categories.

What's my experience with pricing, setup cost, and licensing?

The setup is easy. However if first implemented, it's a good idea to add a "clean up" rule at the bottom rather than denying. This will allow the traffic and you can further tweak rules without impacting users.

Which other solutions did I evaluate?

We did not evaluate other options. 

What other advice do I have?

The product is great.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Great for control and management with good granularity
Pros and Cons
  • "The best value we have is their actionable reports on user analytics, events, and activity that are extracted from their database."
  • "I would like this layer to be faster to install in the future."

What is our primary use case?

We had the need to control and be able to manage rules in a granular way for maintaining the security and control of the data, management by teams, identity, and applications grouping them by category and thus being able to defend ourselves from threats and malware that wants to enter our infrastructure while  reducing the operating cost.

Something that we need and want is an inspection of the data. We must see what the different users and applications of our network are sharing, and that is where the control solution brings us that administration value.

How has it helped my organization?

As our need is great, and we not only have a single organization yet also have several subsidiaries. It is there where we are integrating a centralization under well-managed control. It is where application control gives us the possibility of generating rules, and policies that are adjusted and flexible. We need the solution to be able to be adapted to the business and to be modified and scalable according to the need and evolution of our organization. It offers a powerful administration and a great catalog.

What is most valuable?

The best value we have is their actionable reports on user analytics, events, and activity that are extracted from their database. This technology allows us to present reports on the control and management of event policies against applications, locations, IoT, and Identity. Having all this data available generates a control layer that strengthens a security posture. Its best feature will forever be the generation of tangible reports of every actionable activity found and stopped by the solution.

What needs improvement?

I would like this layer to be faster to install in the future. The evolution of its equipment and appliances where the solution is executed has improved a lot, however, it is necessary to increase that capacity. Some competitors do it just as well and in that layer, are faster to apply their changes. These would give greater value and would be a differentiator. Among other things, I would like this integrated solution to manage from mobile devices in an optimized way and be able to administer from anywhere in the world.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

The solution is very stable and has regular updates.

What do I think about the scalability of the solution?

It is fast and easy to scale and manage.

What's my experience with pricing, setup cost, and licensing?

Their cost is based on their appliances, and they offer equipment with the highest licensing.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Easy to set up with a good ROI and helpful technical support
Pros and Cons
  • "They have an excellent support team. They are fast and it is easy to escalate any situation."
  • "They are expensive products due to the fact that we have to buy blades for each solution that we want to integrate into our corporate."

What is our primary use case?

It is one of the main solutions that we have applied in our offices for the administrative control of access to specific services social networks within the corporation, viewing of videos or services that in some way distract the worker from their activities. It's also facilitated us with the ability to separate the databases by a gateway which makes the administration and the permissions granted to the end-users much easier.

How has it helped my organization?

One of the ways it's helped us improve was in the administration and the permissions for specific services. This was very useful to us when making a database per gateway and configuring them through layers to have better visualization, control, and administration of the rules, which allows new administrators to have a better scope and understanding of the organization. This has undoubtedly been the newest thing for us as gateways administrators.

What is most valuable?

One of the aspects of the solution that has given us more value is the integration of a domain controller with the firewall through the dashboard which allows that through inline layers, LDAP.

The visualization of users, the administration, and the permissions that we can grant to users makes our configuration a more dynamic environment since, as organizational units of an active directory, we can grant permissions to users to specific applications allowed through the URL filtering or application control within the dashboard.

What needs improvement?

With Check Point we are more protected, however, one of the issues is the cost. They are expensive products due to the fact that we have to buy blades for each solution that we want to integrate into our corporate. Without a doubt, it is worth it, however, it is an important point that could be considered. 

Likewise, nowadays a 2MFA solution could be integrated to Check Point since nowadays remote connections made with remote workers are required to protect the extension from the office to your home through a VPN connection.

For how long have I used the solution?

I've used the solution for about three years.

What do I think about the stability of the solution?

The Check Point solution is very stable, however, the installation of JHF at least once a month is somewhat annoying since that could be interpreted as not being a stable solution.

What do I think about the scalability of the solution?

In terms of scalability, my impressions have always been good since there is a lot of scalability in this service. For example, you can integrate several solutions to a centralized administration.

How are customer service and support?

They have an excellent support team. They are fast and it is easy to escalate any situation.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not previously use a different solution.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

We handle the implementation in-house.

What was our ROI?

We've seen a 40% ROI.

What's my experience with pricing, setup cost, and licensing?

Despite the somewhat high cost, based on the blades, it is a reliable solution.

Which other solutions did I evaluate?

We didn't evaluate other solutions.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1626546 - PeerSpot reviewer
Network Head at SUKARNE
User
Stable with good automatic updating and effective filtering capabilities
Pros and Cons
  • "The automatic updates of new applications and signatures guarantee protection at all times without the need to apply a change manually."
  • "It's important that there is the option to validate the policies before applying them."

What is our primary use case?

Before using this solution, I needed to have other network components that would allow me to block or restrict access to unauthorized sites, which generated a very high cost in terms of licensing and maintenance. Now, I can control authorized and unauthorized access to my end-users, and I can control bandwidth and assign a defined bandwidth to guarantee the operation of my company. 

With this solution, I was able to establish and guarantee the security of my end-users using the categories and definitions within the solution. I'm able to easily identify high-risk sites, as well as sites not allowed for explicit content.

How has it helped my organization?

In the beginning, I did not have control of the content that my users had access to, which put the integrity of my company at risk. With this solution, I was able to create explicit policies that would adhere to the rules that we established for access to applications. 

Previously, I had 2 appliances from another brand to control the traffic of applications and to control bandwidth. It is a very simple product to administer with amazing potential endowed within a large database of applications and is constantly updated.

What is most valuable?

The automatic updates of new applications and signatures guarantee protection at all times without the need to apply a change manually. This has been largely beneficial to my organization and only on a couple of occasions have I had a problem with legacy applications being applied to a filter incorrectly. We've solved this by documenting them in the Check Point portal to ensure they are not listed as a malicious application or IP. There is a large database of applications that have been incorporated together with the traffic control tool assigning a defined bandwidth for certain applications.

What needs improvement?

It's important that there is the option to validate the policies before applying them since it is very annoying and causes a waste of time to apply a new policy or rule and afterward receive an error that the policy has failed. 

It is important that, if you are being notified of the modifications in the automatic policies that were updated, it's clear in terms of the content that is included as well as the applications that have been modified for being malicious or not. 

Without a doubt, these would be contributions that would greatly benefit the solution's operation within my company.

For how long have I used the solution?

I've worked with the solution for 5 years.

What do I think about the scalability of the solution?

In some equipment, the scaling is very good, however, it depends on the equipment that is purchased and if there is correct sizing.

Which solution did I use previously and why did I switch?

Yes, I made the change because I tried a demo and it seemed like a great product.

What was our ROI?

It is a very safe and stable product.

What's my experience with pricing, setup cost, and licensing?

The licensing is very good. We always rely on an authorized dealer to ensure proper operation and sizing.

Which other solutions did I evaluate?

Yes, I evaluated Cisco, Palo Alto, and Fortinet.

What other advice do I have?

Not at this time. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Technical Manager at M.Tech
Real User
Great features that can run on a single gateway and helpful technical support
Pros and Cons
  • "We can combine Application Control with Identity Awareness and URL Filtering to create security policies for users/groups based on characteristics about security, productivity and network bandwidth."
  • "It is expensive."

What is our primary use case?

Check Point's Application Control blade is a very powerful and useful tool. To use this tool we need to purchase a subscription for it or purchase a threat prevention package. 

Our primary use case is using Application Control with Identity Awareness feature to create granular policies for users, and groups. Hence, we can control access to applications according to our internet regulations and apply them to users/groups. With the combination, even wherever users/groups are in the organization, whenever they access, they are always under control

How has it helped my organization?

With Application Control, we can:

1. Block the applications with critical risks like proxies, malicious VPN tools, hidden IPs, hotspots, et cetera.

2. Save network bandwidth by blocking the downloading tools, P2P sharing, or limiting access to entertainment/IPTV/Social Networking (et cetera) that consume the bandwidth.

3. Increase work productivity by only allowing access to legal destinations while blocking unnecessary accesses like gambling, games, et cetera.

4. Control data loss risk through popular channels: Facebook upload, Instagram upload, public email services (Gmail, Yahoo, et cetera), file storage, and sharing.

5. Limit the usage of the application flexibly (like allowing users to log in to Facebook, and chat but cannot upload data, video, et cetera).

6. Create more granular policies.

What is most valuable?

We can combine Application Control with Identity Awareness and URL Filtering to create security policies for users/groups based on characteristics about security, productivity and network bandwidth. The most important thing is applying internet access regulations to the firewall system is easier than ever.

The Check Point database of Application Control is the largest library and is updated periodically.

Application categories in the SmartConsole are very clear and easy to search.

The application database is public in AppWiki. This helps to search the application information. This helps people that are considering what Check Point Application Control has before deciding to purchase.

All Check Point security features can run in a single gateway or gateway cluster.

What needs improvement?

It is expensive. The application control is a subscription type, not a perpetual license. Thus, to use this feature year-by-year, customers must purchase a renewal.

To use it effectively, you must turn on the HTTPS Inspection feature. Almost all the applications are running on encrypted connections. Without HTTPS Inspection, Check Point Gateway cannot detect the behaviors of the application. This leads to the gateway's CPU usage being degraded. In an environment of high connectivity growth or using multiple security features on the same appliance, having to handle more encrypted connections will be very stressful for the CPU.

For how long have I used the solution?

We've used the solution for more than five years.

What do I think about the stability of the solution?

It is very exact in application detection.

What do I think about the scalability of the solution?

The scalability of Application Control is based on Check Point Gateway. Check Point Gateway has ClusterXL that supports up to five appliances. With the developing Maestro technology, it's very easy to scale up on demand. Using this technology allows us to maximize hardware investment and appliance capacity.

How are customer service and support?

The support team is very professional.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Fortinet before, however, Check Point Application Control is the best. Check Point has the largest database that no other vendor can compare. Besides, the Check Point appliance is very stable.

How was the initial setup?

It's a bit complicated in terms of the setup if you are combining it with Identity Awareness and HTTPS Inspection.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Product Categories
Application Control
Buyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros sharing their opinions.