We use Check Point Application Control to block and protect our website which are not required for user access.
Cyber SOC Manager at a financial services firm with 501-1,000 employees
A cloud solution to block and protect networks with excellent support
What is our primary use case?
What is most valuable?
Check Point provide excellent support. It is easy to operate and handle with the recent GUI.
What needs improvement?
If someone wants to review the configuration for the proxy, they would need to look elsewhere, as this tool is not designed to assess the performance of security policies.
For how long have I used the solution?
I have been using Check Point Application Control for three years.
Buyer's Guide
Check Point Application Control
January 2026
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
What do I think about the stability of the solution?
The product is stable.
What do I think about the scalability of the solution?
The solution’s scalability is good.
How are customer service and support?
When we open a ticket for a critical issue, we are immediately connected with a Level 3 support engineer via phone call within two minutes. There is no waiting list. The support is very swift and efficient, and they assign the best available engineer for critical issues, bypassing the L1, L2 and then L3.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have moved the Check Point Application Control from AppSense, the epoxy solution, because of several issues. Users experienced latency while accessing the internet through the AppSense. Additionally, the AppSense client software installed on user machines frequently crashed, and it was not compatible with MacBooks.
How was the initial setup?
The initial setup is straightforward and takes around three months to complete.
What's my experience with pricing, setup cost, and licensing?
The product is expensive but it is worth the money.
What other advice do I have?
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud computing at a cloud solution provider with 51-200 employees
Great features, good compliance, and helps create visibility
Pros and Cons
- "It has many important features that have greatly helped the company and the IT department."
- "They need to improve the graphical interface."
What is our primary use case?
The companies have implemented this security tool, due to several factors. The companies develop or buy applications for different functions or needs and this is where Check Point Application Control comes in.
The tool has allowed us to be able to identify and classify all those applications that are being used within the network, which simplifies the work of managing bandwidth, and also helps us to have better control over security since it allows us to allows you to block or allow access to our network.
How has it helped my organization?
It has helped us a lot in being able to have more unified and managed control over the entire infrastructure of the companies since with this we have better control in the applications of how we can limit each access or exit to the Internet. Without this tool, it would be a little more complicated since we would be very limited in defining policies based on characteristics such as IP addresses and port numbers. In addition, it has helped improve productivity in the IT area since we have reduced the time dedicated to each of the applications.
What is most valuable?
The tool fulfills the function for which it was designed. It has many important features that have greatly helped the company and the IT department. For example, it presents visibility of all traffic on the network, which helps us have better management to take measures necessary to optimize performance and security.
It also presents a strong point which is the use of policies. Compliance helps the company a lot and it is something that the tool does very well.
What needs improvement?
They need to improve the graphical interface.
They should also improve the latency when entering the GUI.
The application should not be so closed when it comes to integrations with third-party tools.
They have become a bit expensive to be able to purchase them for smaller companies.
For how long have I used the solution?
I have been using this application for one year in this company, however, I had previously used it for two years in a previous company.
What do I think about the stability of the solution?
The tool to the extent that I have used it these years has been very stable and safe.
What do I think about the scalability of the solution?
The tool is my scalable and adapts to our security infrastructure very well.
How are customer service and support?
Support should improve service times and be faster in providing solutions.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
There was no type of tool that fulfilled this function previously.
How was the initial setup?
The installation of the tool at first is somewhat complicated since it has a fairly high learning curve. After getting to know it and how to configure it, that curve becomes easy.
What about the implementation team?
At first, the installation and configuration were done with the supplier. They provided us with training and we proceeded to make the necessary configurations.
What was our ROI?
Making an investment is always complicated. Doubts that can arise. However, it is never bad to invest in a security tool. It brings peace of mind to the company and the financial side.
What's my experience with pricing, setup cost, and licensing?
You must evaluate the needs that the company requires, then request quotes according to the needs of different suppliers.
Which other solutions did I evaluate?
Several options were analyzed, such as Palo Alto Networks App-ID, Fortinet FortiGate Application Control, and SonicWall Application Firewall, among others.
What other advice do I have?
You must have a culture of updating the tool every time you can, always choosing a tool with stability that is scalable since companies change day by day.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Application Control
January 2026
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Sr. Network Security Engineer at a outsourcing company with 11-50 employees
Real-time visibility, granular control, and reasonable pricing
Pros and Cons
- "The most valuable thing about the solution is that we get real-time visibility into the usage of an application and the granular control of the application."
- "At this time, Check Point Application control is the best on the market."
What is our primary use case?
This solution's primary use is to provide real-time visibility and granular control over application usage in my company.
How has it helped my organization?
With the help of this Check Point application control, we are able to control the usage of the application. It offers the best control; we can set the bandwidth usage for the traffic based on the application.
What is most valuable?
The most valuable thing about the solution is that we get real-time visibility into the usage of an application and the granular control of the application.
What needs improvement?
At this time, Check Point Application control is the best on the market.
For how long have I used the solution?
We have been using this product for the last year.
What do I think about the stability of the solution?
The stability is excellent.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and support?
Our experience with customer service and support is excellent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using the same OEM.
How was the initial setup?
The initial setup was simple.
What about the implementation team?
We implemented the solution through an in-house team.
What's my experience with pricing, setup cost, and licensing?
Based on the current market, everything looks good.
Which other solutions did I evaluate?
No, we did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Web Designer at a tech vendor with 201-500 employees
Good security and policy management with helpful excellent customization capabilities
Pros and Cons
- "It blocks ransomware attacks that can affect performance-enhancing secure work environments with zero-day attacks."
- "I recommend network upgrades in the next release to meet most company demands and daily changes."
What is our primary use case?
It helps us to discover applications that run across the organization network and admin accounts that are generated within the ecosystem.
Monitoring the performance of applications has been easy since we deployed this platform.
Check Point Application Control gives the IT team permission to deploy and assign tasks to various apps.
It gives us the authority to eliminate unnecessary admin accounts and blacklist applications that are not required anymore. It protects apps from malware attacks with powerful security tools.
How has it helped my organization?
Setting up new applications and testing the suitability of deployed tools has been efficient since we deployed this platform.
It blocks ransomware attacks that can affect performance-enhancing secure work environments with zero-day attacks.
We are able to manage workstations and servers across remote offices with a unified control system. Setting up a default system for allowing applications that are useful and blocking untrusted platforms has saved time and cost.
This product has enabled my web development team to set reliable control policies for managing applications.
What is most valuable?
Policy management features have enabled the organization to set up achievable goals and programs that can be implemented successfully.
The security systems prevent external attacks from affecting workflows and compromising data.
Customization has enabled us to create policies that can easily meet our requirements with flexible features.
The overall cost of deployment and maintenance has been efficient and affordable. Application blacklisting helps us to filter our tedious apps that can negatively affect operations.
What needs improvement?
The current features have great performance capabilities and have highly boosted production in the organization. I recommend network upgrades in the next release to meet most company demands and daily changes.
The performance has been stable, and we really appreciate the great results. The security tools and policy enhancement tools perform effectively. The overall productivity of the current features is excellent, and I recommend the use of this product to other companies.
We have longed for a reliable Application Control platform for a long time, and finally, we have received the best solution.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
This tool is highly stable.
What do I think about the scalability of the solution?
I am impressed by the product's great performance.
How are customer service and support?
The customer support staff responds effectively.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not worked with any other similar solution before.
How was the initial setup?
The setup was straightforward.
What about the implementation team?
Implementation took place through the vendor.
What was our ROI?
ROI has grown from 40% to 65% from the previous year.
What's my experience with pricing, setup cost, and licensing?
The cost and licensing terms have been reliable.
Which other solutions did I evaluate?
I settled on this product due to its stable performance after evaluating several products.
What other advice do I have?
I highly recommend the use of this product to other organizations for reliable application control services.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Soporte técnico superior at a financial services firm with 51-200 employees
Helps define policies, integrates with third-parties, and offers good threat detection
Pros and Cons
- "One of the greatest capacities and the benefits it gives us is the ability to control applications based on defining access or denial policies in specific applications, groups, or category profiles."
- "The guides used today are a bit complex, and we need efficient and simple access to them so that any administrative or technical person can solve, analyze, and configure each of the rules and identities seamlessly."
What is our primary use case?
We needed to allow, control, block, and access specific applications based on the policies that the institution has as a baseline. Given this need, we have tried, analyzed, and tested various solutions that could comply with said internal directive. We have sought solutions that allow us greater visibility and control over applications on the network, improving the protection of applications and the security of the organization in general. We've validated the software's great potential at detecting malicious events on unauthorized applications or resources.
How has it helped my organization?
Check Point Application Control has offered us the possibility of achieving several important organizational pillars that were required to cover. We had application identification, application control, and protection based on known or unknown threats.
These capabilities have allowed us to discover known or unknown threats by detecting them under the identity of users. We managed to include a malware intrusion detection index based on the identity of the users in order to protect them.
What is most valuable?
One of the greatest capacities and the benefits it gives us is the ability to control applications based on defining access or denial policies in specific applications, groups, or category profiles. Compared to other products, it has offered us a unique combination by allowing the integration of third-party services or brand-owned services, which gives us a chance to insure, protect ourselves, and generate scalable, comprehensive protection.
What needs improvement?
One of the improvements that we need is in the manual services. The guides used today are a bit complex, and we need efficient and simple access to them so that any administrative or technical person can solve, analyze, and configure each of the rules and identities seamlessly. We need clear directions to help us configure effectively. It's important to be able to have this documentation available to make the many available features easy to configure and allow us to promote defense tactics in depth against all available threats.
For how long have I used the solution?
I've used the solution for two years.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Works
Reliable, reduces management requirements, and lessens manual interventions
Pros and Cons
- "Being able to choose specific applications in our policy rule base in order to better manage access and bandwidth utilization has had a significantly positive impact on our environment and saved a lot of management time."
- "One of our continued challenges is having a more accurate, real-time view of how our bandwidth is actually being used at any given moment."
What is our primary use case?
Our K-12 school district is currently leveraging the Check Point 6800 Gateway hardware appliance, which is running version R80.30.
The management station runs as a virtual machine in our VMWare environment with Cisco UCS & EMC (storage) hardware and Cisco networking architecture. In addition to the exceptional performance of the hardware and extensive Firewall abilities, we manage end-user traffic related to the applications. We use the solution primarily in the social media and entertainment arenas. This feature allows us to reduce unnecessary use of our already limited bandwidth.
How has it helped my organization?
Prior to the newer Application Control tools, from Check Point, we didn't have nearly as much in-depth access to manage traffic in the port 80 and 443 pathways.
As a result, we were regularly pushing the high end of our already limited bandwidth. Though we did have web/URL filtering technologies deployed, our users still had quite a bit more access to media resources that presented a distraction in our environment. The Application Control, allows us to better manage bandwidth at a more granular level.
What is most valuable?
Being able to choose specific applications in our policy rule base in order to better manage access and bandwidth utilization has had a significantly positive impact on our environment and saved a lot of management time. This feature allows us to apply all the relevant protocols from a single application "package."
In years past, we used to have to spend a lot of management time manually diagnosing the end-user traffic in an *attempt* to determine what sites, protocols, and ports were being used by the resource. Then, we would have to create specific rules to affect that traffic, before we could regularly monitor the traffic for any unexpected rouge behavior.
What needs improvement?
One of our continued challenges is having a more accurate, real-time view of how our bandwidth is actually being used at any given moment. A feature that could really offer a lot of insight into the live traffic would be a high-quality, real-time traffic graphical monitoring module. Administrators could then "mouse-over" any point on the graph to reveal additional information at a very granular level. The information that could be presented would include data such as the service/app used, the specific network or IP, the date/time, etc.
For how long have I used the solution?
I've used Check Point since the late 1990s. I've used this solution for several years.
What do I think about the stability of the solution?
We've had zero issues. It's a solid product.
What do I think about the scalability of the solution?
My impression is that with all the recent features and abilities added to the application control section, it should be able to scale very nicely. I would anticipate that managing traffic at the application level would be far more efficient than in the past, with the option of creating fewer rules to accomplish the same goal. Being able to group or, "package," together a number of similar applications that contain all the relevant protocols, will be a big benefit over time.
How are customer service and support?
As the product has performed well, we have had little interaction with Check Point's customer support. We have been reasonably satisfied, during the limited times of engagement.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We have been using the Check Point firewall suite of products, since the floppy disk installation days.
How was the initial setup?
We had the guidance and aid of a partner vendor and it was not overly complicated.
What about the implementation team?
We have worked with a vendor for years and have been very pleased.
What was our ROI?
ROI is difficult to quantify in terms of money. However,, we can easily say that our management time has decreased and end-user activities have been more on-task.
What's my experience with pricing, setup cost, and licensing?
Pricing is a bit high for our K12 organization. The setup is not painful. That said, planning is crucial - as well as a thorough understanding of your network architecture and desired outcomes.
Which other solutions did I evaluate?
We did not evaluate other options.
What other advice do I have?
I'd advise users to go with Check Point.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Support at a security firm with 51-200 employees
Good granularity, helpful blocking capabilities, and helps with segmentation
Pros and Cons
- "The most important characteristic is granularity, which allows our teams to have different security profiles depending on the department to be protected."
- "Check Point licenses are somewhat expensive."
What is our primary use case?
Check Point has provided us with a Check Point management server tool where we manage our Gateways. It helped us limit the applications, sites, and different actions that are part of the users' daily lives. We can limit with granularly the applications that users access.
Segmentation is key. We managed to divide everything by department to be able to generate the security that each one requires. Now, managers have greater flexibility.
How has it helped my organization?
This product or feature included in our security admin has helped us a lot to be able to control our users. It helps us with effectiveness since users can use laptops correctly, being more productive.
It has also been possible to avoid modern threats that can enter and attack user equipment, servers, and the business network. These attacks would affect work continuity in addition to company data that could be affected.
What is most valuable?
The most important characteristic is granularity, which allows our teams to have different security profiles depending on the department to be protected.
There is also a list of applications pre-loaded in the systems to be able to have blocks or permissions to use different applications.
Finally, the licensing of our Check Point gateways, which are not licensed separately, provides an advantage.
What needs improvement?
Check Point licenses are somewhat expensive, in addition to the fact that it is difficult to validate their costs without a Check Point partner - which is why it is difficult to validate them.
Support is only available in the English language, which affects some regions where Check Point products will be used.
The SLAs of checkpoint products are sometimes not met since the cases created are sometimes attended to very late after opening them.
For how long have I used the solution?
We have used this solution for at least five years in its different versions. It has helped us a lot with business security.
Which solution did I use previously and why did I switch?
We have not previously used any product like this.
What's my experience with pricing, setup cost, and licensing?
The costs should be reviewed with a partner of Check Point. As for the implementation, it is really simple.
Which other solutions did I evaluate?
Several proofs of concepts were carried out, and Check Point was the best.
What other advice do I have?
This is an excellent product.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 25, 2025
Flag as inappropriateConsultant at a security firm with 51-200 employees
Issue-free with good granularity and is easy-to-use
Pros and Cons
- "It also helps us implement changes very quickly and make people more focused on work."
- "At the moment I don't see the need to add new features. That said, you always have to be one step ahead."
What is our primary use case?
Our use case for Check Point Application Control is to be able to filter and control all the categories of applications that we want to allow in our organization so that users have the necessary access and permissions and have security in using an application.
We only allow members of the organization access secure applications, another benefit is that bandwidth can be limited by restricting applications and unnecessary downloads of applications that are not for business use by controlling the access of gateway apps
How has it helped my organization?
Check Point Application Control has provided us as an organization with the ability to prevent users from entering web pages that are not allowed or that can lead to many vulnerabilities that could result in the loss of sensitive information.
With this friendly, simple, and easy-to-use tool, we have been able to control all these inappropriate accesses. Most users cannot enter sites or applications that are not for work and with this, we have been able to monitor all these pages.
It also helps us implement changes very quickly and make people more focused on work.
What is most valuable?
All Check Point Application Control features are very granular and important. The most important depends on the need of the company this feature is used.
It also has flexibility where you can restrict certain areas of each page. For example, you can enter but not download or use a chat like in social networks. I can see them, however, not chat. This is a good thing as you can be flexible with your employees to have everything without access and allows us to be flexible with certain categories. I think that with this we can achieve a better tool
What needs improvement?
The tool has a number of features necessary for good business security. However, it is always good to add several features and maintain an open and adequate performance for the machines where said software is installed since it will be able to present high performance. However, so far, Check Point Application Control satisfactorily meets the needs of a company in security. At the moment I don't see the need to add new features. That said, you always have to be one step ahead.
They should focus on improving the guides since they are not very friendly or concrete to make a configuration in the interface.
For how long have I used the solution?
This tool has been used for 2 years.
What do I think about the stability of the solution?
The solution is very stable. No problem has been presented.
What do I think about the scalability of the solution?
The solution provides important scalability features
How are customer service and support?
Since the product has worked well, we have had little interaction with Check Point's customer service.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we did not use another tool.
How was the initial setup?
The implementation, like all Check Point products, is very interactive and easy to install and configure.
What about the implementation team?
It was done with a vendor and it was very good in its work until now.
What was our ROI?
Our ROI is that our entire platform meets the necessary security requirements. Nothing happens in the company's infrastructure and this helps us avoid more expenses if not for having implemented a tool like this.
What's my experience with pricing, setup cost, and licensing?
The price is in line with the competition. They maintain an accessible and competitive price.
Which other solutions did I evaluate?
Options were not evaluated since our infrastructure always used Check Point.
What other advice do I have?
They continue to innovate. Check Point is an excellent tool in many areas.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Application ControlPopular Comparisons
WatchGuard Firebox
VMware Carbon Black App Control
Ivanti Application Control
Buyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:









