We use Check Point Application Control to control VPN and bandwidth.
Senior Manager ICT & Innovations at a logistics company with 501-1,000 employees
Helps to control VPN and bandwidth but needs to incorporate better documentation and regular security patches
Pros and Cons
- "The tool's most valuable features are VPN access, website defense, and maintenance."
- "Check Point Application Control needs to ensure that they release up-to-date security patches regularly. It should release better documentation so end-users can use the product without depending on the support team."
What is our primary use case?
What is most valuable?
The tool's most valuable features are VPN access, website defense, and maintenance.
What needs improvement?
Check Point Application Control needs to ensure that they release up-to-date security patches regularly. It should release better documentation so end-users can use the product without depending on the support team.
For how long have I used the solution?
I have been working with the product for three years.
Buyer's Guide
Check Point Application Control
January 2026
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
What do I think about the stability of the solution?
Check Point Application Control's stability is good.
What do I think about the scalability of the solution?
The tool is scalable. My company has 1000 users.
How are customer service and support?
The tool's support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
You need guidance to do the product's deployment. It cannot be done directly. You need two people to handle the deployment.
What's my experience with pricing, setup cost, and licensing?
Check Point Application Control is expensive. The tool's licensing costs are yearly.
What other advice do I have?
I rate the product an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Java Application Developer at a tech vendor with 1,001-5,000 employees
Reliable support, great performance, and offers efficient protection of data
Pros and Cons
- "The central management system provides a reliable platform for application control and URL filtering."
- "Malware threats can advance attacks when there are no timely measures to curb online phishing attacks."
What is our primary use case?
Check Point Application Control enables my team to customize websites to fit our daily needs. It provides security measures that can be set in place to safeguard our content and internal information.
It provides reliable tools for setting up HTTPS security policies that prevent security risks related to SSL protocol. The product provides real-time insights into the data traffic from the applications and their performance.
The security protocols have enabled my team to set restrictions for accessing confidential information.
How has it helped my organization?
There is efficient protection of data and workflows from external interferences. This platform provides basic tools for protecting applications from cyber attacks and building strong websites.
The SmartView tracker enables my members to monitor data traffic across the applications. It has provided a great opportunity for us to set up basic rules for interacting with applications.
This product provides reliable data controls that monitor the performance and operational capability of all the applications within the company's networking infrastructure.
What is most valuable?
The central management system provides a reliable platform for application control and URL filtering.
The security gateways have set comprehensive security tools for protecting data from malware attacks.
The application library can run many apps and websites at the same time without functional complications.
The application control system blocks internet sites and cyber attacks that can affect daily operations.
SmartEvent Analysis provides capabilities for understanding application performance with charts and reporting analytics.
What needs improvement?
The most set features have enhanced the effective management of workflows.
Malware threats can advance attacks when there are no timely measures to curb online phishing attacks.
The solution needs an efficient monitoring platform that provides individual employee data, and performance will boost productivity in the organization.
Most features perform well since there are few complaints. The security tools should be empowered more to fit daily demands and prevent our systems from advanced threats.
I recommend the use of this platform to other organizations for reliable application performance.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
The application security controls and monitoring tools are powerful.
What do I think about the scalability of the solution?
I am impressed by its great performance.
How are customer service and support?
The customer support staff has been reliable and committed to great service delivery.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not worked with a similar solution.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
The implementation was done by the vendor team, and their level of expertise is excellent.
What was our ROI?
The recorded ROI has improved from 40% to 65% currently.
What's my experience with pricing, setup cost, and licensing?
The setup cost and licensing terms are efficient.
Which other solutions did I evaluate?
I evaluated other application control products, however, Check Point Application Control was the best.
What other advice do I have?
This is great system for monitoring application performance and I recommend to others.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Application Control
January 2026
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Network Administrator at a computer software company with 1,001-5,000 employees
Great rate-limiting their uploads with helpful application control and is easy to expand
Pros and Cons
- "The ability to be able to do dynamic rate limiting on specific applications has been a valuable feature."
- "The one feature that could be improved would be the ability to see implicit rules that are defaulted on the policy."
What is our primary use case?
The primary use case for application control in our organization is to provide the ability to restrict users from using unapproved applications and applications that fall under categories that are deemed malicious.
Application control is enabled on all of our HA firewall clusters globally. Leveraging identity awareness, we can restrict remote access applications from the rest of the organization, allowing it for specific teams that require it, i.e., IT Helpdesk and Technical Support teams.
How has it helped my organization?
Application Control has improved our organization by enabling other network administrators and me to restrict non-corporate applications for specific departments.
Combined with Check Points URL filtering, this blade provides more granular restriction as if the firewall engine does not detect the application, administrators have the ability to use regular expressions to block URLs that are critical for the application to function. For example, the Windows Quick Assist tool needed URL filtering as it was not being detected and categorized as "Remote Assistance"
What is most valuable?
The ability to be able to do dynamic rate limiting on specific applications has been a valuable feature.
This has allowed us to prevent our graphics team from saturating our link to the internet by rate-limiting their uploads to third-party cloud providers (i.e., Dropbox, OneDrive, Google Drive, etc.).
The fact that application control also can stop browser-based extensions/widgets has also been very valuable as it has provided insight to employees installing VPN extensions on their browsers.
What needs improvement?
This blade is very valuable to any organization, and it is great that it is included in the base firewall licensing bundle.
It is very easy to set up and configure. The one feature that could be improved would be the ability to see implicit rules that are defaulted on the policy. For example, if the cleanup rule is removed, there is still another toggle in the settings that (in the event the traffic does not match any of the rules) you can either choose to block the traffic or allow it. By default, this setting is configured to drop, which caused issues the first time we configured the policy as this was not shown.
For how long have I used the solution?
I've used the solution for five years.
What do I think about the stability of the solution?
The solution is stable and hasn't increased the load drastically.
What do I think about the scalability of the solution?
Scalability is excellent and is easy to add new sites.
How are customer service and support?
Technical support is hit or miss. L1 and L2 never seem to be able to solve my issues. We always need to go to L3 support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
The solution should be configured by default with an allow rule that can be changed to drop once implemented to avoid massive disruptions to users.
What about the implementation team?
We handled the solution in-house.
What was our ROI?
The ROI we see is in the added security to block specific applications or categories.
What's my experience with pricing, setup cost, and licensing?
The setup is easy. However if first implemented, it's a good idea to add a "clean up" rule at the bottom rather than denying. This will allow the traffic and you can further tweak rules without impacting users.
Which other solutions did I evaluate?
We did not evaluate other options.
What other advice do I have?
The product is great.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Perimeter Security Administrator at a security firm with 51-200 employees
Good blocking and filtering but needs more of a knowledge base for users
Pros and Cons
- "The most outstanding feature is the Check Point APK wiki."
- "The blocking characteristics for filtering content currently are not so customizable."
What is our primary use case?
We needed a solution that would allow us to protect the applications that we were constantly developing. Those applications needed to be classified by categories, including integrity, risk level, and productivity issues, as well as identity per user. We needed all these characteristics to safeguard a library, repository, or platform that could allow us to manage it in a secure, fast, and scalable way. We tried more than one solution that would allow us the required granularity in the teams and management so that we could implement it according to the regulations that we had internally.
How has it helped my organization?
At the time of implementation, we had a great feeling of satisfaction with the solution as it allowed us to have granularity across types of applications - by the network, identity, social networks, the function of the application, et cetera. We were able to do more than what we really needed, and this gave us that feeling that we now had the internal compliance that we did not have before. The libraries are much larger and grouped by application in categories to protect us from attacks or threats.
What is most valuable?
The most outstanding feature is the Check Point APK wiki, which is a product that is incorporated into the solution that allows us to naturally and dynamically apply internal applications to the application database. It is continuously updated, which allows us to have constant detection capabilities and more than 8000 different applications at different sites. It allows us to be more dynamic and have greater control. Additionally, it has blocking via content filtering or HTTPS inspection, which we can combine with identity. That gives us a more centralized correlation and management for more granular policies and more expeditious control over each activity from the users.
What needs improvement?
The blocking characteristics for filtering content currently are not so customizable. I would like to be able to modify them a bit. I hope that customization will be incorporated in the future. Right now, we must educate the users who are constantly violating or in fear of violating an issue. We would like to be able to incorporate filtering with notifications in a learning portal so users can be educated and will no longer have a lack of experience. A portal will help make better, more educated, and knowledgeable users.
For how long have I used the solution?
I've used the solution for two years.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud Engineer at a tech services company with 51-200 employees
Great for control and management with good granularity
Pros and Cons
- "The best value we have is their actionable reports on user analytics, events, and activity that are extracted from their database."
- "I would like this layer to be faster to install in the future."
What is our primary use case?
We had the need to control and be able to manage rules in a granular way for maintaining the security and control of the data, management by teams, identity, and applications grouping them by category and thus being able to defend ourselves from threats and malware that wants to enter our infrastructure while reducing the operating cost.
Something that we need and want is an inspection of the data. We must see what the different users and applications of our network are sharing, and that is where the control solution brings us that administration value.
How has it helped my organization?
As our need is great, and we not only have a single organization yet also have several subsidiaries. It is there where we are integrating a centralization under well-managed control. It is where application control gives us the possibility of generating rules, and policies that are adjusted and flexible. We need the solution to be able to be adapted to the business and to be modified and scalable according to the need and evolution of our organization. It offers a powerful administration and a great catalog.
What is most valuable?
The best value we have is their actionable reports on user analytics, events, and activity that are extracted from their database. This technology allows us to present reports on the control and management of event policies against applications, locations, IoT, and Identity. Having all this data available generates a control layer that strengthens a security posture. Its best feature will forever be the generation of tangible reports of every actionable activity found and stopped by the solution.
What needs improvement?
I would like this layer to be faster to install in the future. The evolution of its equipment and appliances where the solution is executed has improved a lot, however, it is necessary to increase that capacity. Some competitors do it just as well and in that layer, are faster to apply their changes. These would give greater value and would be a differentiator. Among other things, I would like this integrated solution to manage from mobile devices in an optimized way and be able to administer from anywhere in the world.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
The solution is very stable and has regular updates.
What do I think about the scalability of the solution?
It is fast and easy to scale and manage.
What's my experience with pricing, setup cost, and licensing?
Their cost is based on their appliances, and they offer equipment with the highest licensing.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Manager at a consultancy with 201-500 employees
Great for blocking and malware protection with improved productivity
Pros and Cons
- "It improved the performance outcome for all our verticals due to more automation in system security, which helped in the identification and blockage of malware-affected applications and widgets."
- "More and more product specifications should be infused with new incumbent features in the market to stay relevant and concurrent with the organization's needs."
What is our primary use case?
Check Point Application Control is a one-stop shop for providing the strongest security to an organization's business verticals in the most efficient and effective manner.
It eases the business working as it enables smooth flow of information and helps businesses to create micro-managed accurate, granular policies, and helps in strengthening the organization's security by blocking and restricting the unknown and unsecured phishing widgets and applications across multiple integrations.
It limits the usage and utilization of any unknown malware attempts from any application
How has it helped my organization?
Check Point Application Control improved the productivity of our workforce by reducing the coordination time and efforts involved in strengthening the system's security through a traditional manual way or path.
It improved the performance outcome for all our verticals due to more automation in system security, which helped in the identification and blockage of malware-affected applications and widgets.
It helps in categorizing the basis of the application, its types, security level, the usability of resources, and its implications on productivity as a whole.
What is most valuable?
The solution is great at blocking and stopping unidentified and malware-affected applications.
The next-gen firewall system is inbuilt and is highly efficient in restricting terminated and unsecure applications.
It ensures smooth and secure API integrations with other system firewalls and applications due to advanced next-gen identification of malware-affected applications.
Unauthorized and unsecured applications would not pose any risk to the organization's effectiveness if carried out efficiently by application control security.
What needs improvement?
In my view, more efforts are required with the business development and customer service team to create more and more awareness across businesses of all sizes on the benefits of deploying the Check Point application control security across all business verticals and improving the performance outcomes for the organization.
More and more product specifications should be infused with new incumbent features in the market to stay relevant and concurrent with the organization's needs.
They need more and more secure integration features should be included with less cost so that the adoption rate can be increased multifold amongst new business users.
For how long have I used the solution?
I've been using the solution for over six months now.
What do I think about the stability of the solution?
The product is stable and highly recommended.
What do I think about the scalability of the solution?
The solution is highly scalable and replicable across multiple platforms and systems.
How are customer service and support?
We get great support and services from business and corporate customer service teams.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
An in-house solution was utilized for application security previously.
How was the initial setup?
The product is easy to comprehend and deploy.
What about the implementation team?
We implemented the product through the vendor only.
What was our ROI?
We've seen an ROI of over 80%.
What's my experience with pricing, setup cost, and licensing?
To every business out there, I strongly recommend trying Check Point Application Security and analyzing the utilities independently. It's one of the best security application software with advanced features to strengthen security with integrated applications and other platforms.
Which other solutions did I evaluate?
We evaluated McAfee and Trend security applications before making a final selection.
What other advice do I have?
I'd advise users to go for its mandatory trial and explore the gamut of facilities on their own.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Project Engineer at a tech services company with 10,001+ employees
Good application control, useful notifications, and a straightforward setup
Pros and Cons
- "We can easily switch from a classical firewall to a next-gen firewall using application security."
- "Configuration and deployment are a little bit difficult."
What is our primary use case?
Our primary use case of Check Point Application Control is to filter which application categories we want to allow our organization members to have access to so that they are secured.
For example, we don't allow access to malicious applications and some categories that could be threats. We only allow organization members to access secure applications and applications that are aligned with the company's strategy.
The user interface is easy and dynamic. You can drag objects around the screen to facilitate their use. Besides, it is quite easy to understand and apply changes.
How has it helped my organization?
It also enables us to save internet bandwidth by filtering applications that are not work-related and helps us to easily create granular policies based on users to identify the usage of applications.
We can easily switch from a classical firewall to a next-gen firewall using application security.
We implemented application control at MDM global security policies, which helps us set general security standards for all managed devices.
Identity awareness module integration is to be used for user/group-based controls.
What is most valuable?
Application control and having features like completeness and validity, identification, authentication, and granularity with unified layers is awesome. The most important aspect is that it allows users to define policies based on source IP and user role, quickly identifying traffic flow with SAML.
You can allow or block traffic coming or going out to the internet for specific applications or websites.
It offers user notifications for blocked access, time-defined policies, and bulk categorization of malicious applications.
What needs improvement?
Sometimes, documentation is not accurate and with the support issue we have to wait a long time for an engineer to understand the errors. I would like to see if they can help with the issue of service and more qualified staff. They need to have good service with Check Point products.
The load balancer functionality for application traffic might be a better option.
Configuration and deployment are a little bit difficult.
This product works only when the user is in traffic flow through NGFW.
Sometimes there are more than one category tag to an application which can be tricky.
For how long have I used the solution?
We have been using the product for more than 12.5 years.
What do I think about the stability of the solution?
We are satisfied with the stability.
What do I think about the scalability of the solution?
We are satisfied with the scalability.
How are customer service and support?
The product provides the largest database about application control and we can create granular policies to identify the usage. Overall it's been a very good experience, working with this product.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't use any solutions previously. Check Point Application Control is easy and user-friendly. We're able to control and manage all applications with it.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
The help we had was excellent.
What's my experience with pricing, setup cost, and licensing?
The pricing has to be more economical.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology Security Specialist at a financial services firm with 10,001+ employees
Offers secure access, allows for rule writing, and is easily optimized
Pros and Cons
- "It does not require a lot of work to be activated and used."
- "It would be nice if there was a platform and small application owners could come and send their own applications' name and IP information from there."
What is our primary use case?
Not all of the company's web traffic goes through Check Point, however, on the significant web traffic side, we solve security needs with Check Point.
Especially if you are going to give broad permissions, you need to block dangerous applications at the very beginning of your rule set. In this context, we use Check Point to block on an application basis. Sometimes there are general accesses. Like Azure, we can only give access by selecting the relevant applications. Check Point is a very good solution because these applications are constantly updating the IP lists on the backend.
How has it helped my organization?
It does not require a lot of work to be activated and used. It is quite simple to open the application layer blade and activating it means you are ready to use it.
The concept of NGFW is actually used exactly for this feature and I can say that it does justice. Once you are ready to use it, you can optimize your rule set by selecting the desired application name in the rule. Since the objects used are updatable, the need for you to return and update is very rare. This structure really saves you time.
What is most valuable?
First of all, to use this layer, you don't need to struggle and make changes to your structure. It is enough to have a firewall with NGFW support and turn on the application layer filtering blade. Apart from that, the objects in the rules you wrote have very little margin of error. In other words, the accesses of the application you put are passed or blocked as necessary. In fact, some applications have separate objects for download and installation, so you can write the rule set you have in mind more easily.
What needs improvement?
The objects found now have large applications or general category definitions that are completely determined and organized by Check Point. It would be nice if there was a platform and small application owners could come and send their own applications' name and IP information from there. If we could use application objects directly in our rule sets in Check Point in those small companies, that would be ideal. A few more layered objects could be created for Azure in large applications. It would be nice if firewall administrators could see parser information such as IP behind these objects.
For how long have I used the solution?
I've been using it for the past six years in different companies.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Application ControlPopular Comparisons
WatchGuard Firebox
VMware Carbon Black App Control
Ivanti Application Control
Buyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:









