The primary use case of this solution is security, threat prevention, antivirus, and ransomware. You can use it for everything.
Senior Security Engineer at a tech services company with 51-200 employees
Stable, scales well, and you can use it to protect against everything
Pros and Cons
- "This solution is stable and we have not had any issues."
- "The initial setup was a bit difficult."
What is our primary use case?
What is most valuable?
The most valuable feature is the protection from threats.
What needs improvement?
This solution could be easier to manage.
The security features could be enhanced, and the price could be lower as well.
For how long have I used the solution?
I have been familiar with this solution for a year and a half.
Buyer's Guide
Check Point Application Control
January 2026
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
What do I think about the stability of the solution?
This solution is stable and we have not had any issues.
What do I think about the scalability of the solution?
This solution scales nicely.
How are customer service and support?
We have not contacted technical support as of yet.
How was the initial setup?
The initial setup was a bit difficult. Every product has its own difficulties and many products are not equal to each other, which is the reason why it was a bit difficult.
You have to know the features and where they are located and how they work, the logic and even with the logic you have, you don't know the configuration.
The deployment took one week.
What about the implementation team?
We have our team. We implemented this solution ourselves.
What's my experience with pricing, setup cost, and licensing?
It's a bit expensive and it could be cheaper, but it's part of business politics.
Which other solutions did I evaluate?
We did evaluate other options but they are approximately the same. They may have some differences, but at first glance, they don't appear to have differences in the functions.
What other advice do I have?
It's a good solution and I suggest it. In general, it can be improved but it's good enough.
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Specialist at a computer software company with 201-500 employees
Granular application control enables precise access management and real-time threat prevention
Pros and Cons
- "Both granular application control and real-time threat prevention are very useful; in my organization, I initially block everything and then allow only what is required, which ensures that only necessary applications like Facebook, YouTube, WhatsApp, Teams, and Microsoft Office 365 are allowed."
What is our primary use case?
The main use case is blocking unwanted applications. For example, I want to block Facebook chat while still being able to view posts. I also use granular level control for categories on YouTube, like blocking adult content. This application control is used to block or allow certain traffic based on my organization's needs.
What is most valuable?
Both granular application control and real-time threat prevention are very useful. In my organization, I initially block everything and then allow only what is required. This approach ensures that only necessary applications like Facebook, YouTube, WhatsApp, Teams, and Microsoft Office 365 are allowed. This method provides precise control over application access.
What needs improvement?
Check Point Application Control can be improved by offering more granular levels of control. For example, in WhatsApp, there should be deep-level control to manage attachments and ensure that links do not open if they're not allowed by the environment.
For how long have I used the solution?
I've been using the application control feature for the past two years as part of my operational tasks. This includes setting policies, giving access to specific applications, blocking unwanted applications, and providing granular access at the application level.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 4, 2025
Flag as inappropriateBuyer's Guide
Check Point Application Control
January 2026
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Penetration Tester at a outsourcing company with 11-50 employees
Have experienced limited engagement and seek more clarity in ongoing use
Pros and Cons
- "I have been using Check Point Application Control for over four years."
What is our primary use case?
I am using Check Point Application Control.
What is most valuable?
I am using Check Point Application Control.
For how long have I used the solution?
I have been using Check Point Application Control for over four years.
What other advice do I have?
We can use Check Point Application Control.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 27, 2025
Flag as inappropriateBuyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Application ControlPopular Comparisons
WatchGuard Firebox
VMware Carbon Black App Control
Ivanti Application Control
Buyer's Guide
Download our free Check Point Application Control Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:





