Try our new research platform with insights from 80,000+ expert users
it_user1277715 - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
MSP
Feb 10, 2020
Stable, scales well, and you can use it to protect against everything
Pros and Cons
  • "This solution is stable and we have not had any issues."
  • "The initial setup was a bit difficult."

What is our primary use case?

The primary use case of this solution is security, threat prevention, antivirus, and ransomware. You can use it for everything.

What is most valuable?

The most valuable feature is the protection from threats.

What needs improvement?

This solution could be easier to manage. 

The security features could be enhanced, and the price could be lower as well.

For how long have I used the solution?

I have been familiar with this solution for a year and a half.

Buyer's Guide
Check Point Application Control
January 2026
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.

What do I think about the stability of the solution?

This solution is stable and we have not had any issues.

What do I think about the scalability of the solution?

This solution scales nicely.

How are customer service and support?

We have not contacted technical support as of yet.

How was the initial setup?

The initial setup was a bit difficult. Every product has its own difficulties and many products are not equal to each other, which is the reason why it was a bit difficult. 

You have to know the features and where they are located and how they work, the logic and even with the logic you have, you don't know the configuration.

The deployment took one week.

What about the implementation team?

We have our team. We implemented this solution ourselves.

What's my experience with pricing, setup cost, and licensing?

It's a bit expensive and it could be cheaper, but it's part of business politics.

Which other solutions did I evaluate?

We did evaluate other options but they are approximately the same. They may have some differences, but at first glance, they don't appear to have differences in the functions.

What other advice do I have?

It's a good solution and I suggest it. In general, it can be improved but it's good enough.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Technical Specialist at a computer software company with 201-500 employees
Real User
Top 5Leaderboard
May 4, 2025
Granular application control enables precise access management and real-time threat prevention
Pros and Cons
  • "Both granular application control and real-time threat prevention are very useful; in my organization, I initially block everything and then allow only what is required, which ensures that only necessary applications like Facebook, YouTube, WhatsApp, Teams, and Microsoft Office 365 are allowed."

    What is our primary use case?

    The main use case is blocking unwanted applications. For example, I want to block Facebook chat while still being able to view posts. I also use granular level control for categories on YouTube, like blocking adult content. This application control is used to block or allow certain traffic based on my organization's needs.

    What is most valuable?

    Both granular application control and real-time threat prevention are very useful. In my organization, I initially block everything and then allow only what is required. This approach ensures that only necessary applications like Facebook, YouTube, WhatsApp, Teams, and Microsoft Office 365 are allowed. This method provides precise control over application access.

    What needs improvement?

    Check Point Application Control can be improved by offering more granular levels of control. For example, in WhatsApp, there should be deep-level control to manage attachments and ensure that links do not open if they're not allowed by the environment.

    For how long have I used the solution?

    I've been using the application control feature for the past two years as part of my operational tasks. This includes setting policies, giving access to specific applications, blocking unwanted applications, and providing granular access at the application level.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: May 4, 2025
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Check Point Application Control
    January 2026
    Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
    881,082 professionals have used our research since 2012.
    SiddhanthSomkuwar - PeerSpot reviewer
    Penetration Tester at a outsourcing company with 11-50 employees
    Real User
    Top 5
    Oct 27, 2025
    Have experienced limited engagement and seek more clarity in ongoing use
    Pros and Cons
    • "I have been using Check Point Application Control for over four years."

      What is our primary use case?

      What is most valuable?

      For how long have I used the solution?

      I have been using Check Point Application Control for over four years.

      What other advice do I have?

      We can use Check Point Application Control.

      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      Last updated: Oct 27, 2025
      Flag as inappropriate
      PeerSpot user