

Check Point Application Control and Zscaler Zero Trust Exchange Platform compete in the cybersecurity domain. While both products are strong in their respective areas, Zscaler may have an edge due to its ease of remote access and cloud-native security features, making it more suitable for organizations with a distributed workforce.
Features: Check Point Application Control provides detailed visibility and granular control over a vast application database, allowing businesses to enforce precise security policies. It categorizes applications extensively and offers significant monitoring capabilities. Meanwhile, Zscaler Zero Trust is appreciated for its cloud-native architecture and integrated security, delivering robust protection through zero trust models and offering strong support for remote access and cloud services.
Room for Improvement: Check Point requires licensing for all gateways, which can be costly, and lacks real-time graphical traffic monitoring. There are challenges with policy validation and flexibility in customization. Zscaler is criticized for its high costs and scalability issues, with users suggesting improvements in handling latency and better integration with legacy systems. Its architecture could also benefit from more granularity.
Ease of Deployment and Customer Service: Check Point is designed mainly for on-premises and private cloud deployments, offering comprehensive integration capabilities, although some users have had inconsistent experiences with technical support. Zscaler focuses on cloud deployments, supporting both hybrid and public cloud environments. Users report favorable experiences with its swift customer service and straightforward cloud-based deployments, though on-premises support could be improved.
Pricing and ROI: Check Point's pricing is often seen as high, especially when additional software blades are needed; however, flexible subscription models and productivity gains help justify the investment. Zscaler also faces critiques for its high costs but offers scalable pricing that decreases per user with volume, beneficial for larger enterprises. Its architecture promises a strong ROI through enhanced security and operational efficiency.
Before granular application control, IT support saw 5 to 7 tickets per week related to blocked apps or network slowdown. After implementing rule-based access and bandwidth prioritization, that dropped to 1-2 tickets per month, saving 6 to 8 hours per month for our team.
I have seen a return on investment, noting that after using Check Point Application Control blade, we minimized our bandwidth usage by half and also observed improved productivity, so we get what we invested in.
Unproductive applications are not being accessed in our network, which is indirectly saving our employees' precious work hours.
When I see that I am trying to cut costs, for example, even when replacing Prisma, we have managed to save about over half a million dollars a year.
In terms of time savings, since users no longer manually connect to the VPN, access became seamless, improving user productivity, especially for remote users.
We don't have to purchase many components such as load balancers and proxy servers that were necessary in traditional setups.
The support was very good, with representatives who were skilled in resolving issues.
When I create a case, I receive responses and solutions quickly.
Service-wise, they are excellent, providing guidance to resolve any technical issues.
The support engineers are technically knowledgeable, particularly for Zscaler Private Access related issues, providing clear guidance and documentation for troubleshooting.
Sometimes, support takes time since the solution has some bugs that need fixing.
They have provided the numbers and contact supports, and it is almost immediate.
It is very useful in an organization to limit bandwidth usage.
Scalability-wise, Check Point Application Control is excellent and can grow with our organization's needs.
It has handled growth or changes in my organization well over the past three years, so Check Point Application Control is scalable.
The only limitation I was mentioning is that it was unable to identify the sources of vulnerability, which they are going to embed by the mid of this year.
Zscaler Zero Trust Exchange Platform is highly scalable, primarily because it is built on a cloud-native, globally distributed architecture.
Check Point Application Control is stable for my needs; there are no downtime or reliability issues.
Check Point Application Control is a stable solution.
Check Point Application Control is very stable; I haven't encountered any special issues.
Zscaler Zero Trust Exchange Platform is very stable, especially in enterprise environments.
Zscaler Zero Trust Exchange Platform is very stable.
Check Point can do a deep dive to understand how they can improve the performance while we enable the application control feature on all the policies.
There are many complications while using the smart console, making it very difficult to configure a VPN, such as a route-based VPN for someone transitioning from other technologies to Check Point.
If an unusual app suddenly spikes bandwidth or starts behaving suspiciously, the system should automatically suggest a policy adjustment instead of waiting for the admin to dig into logs.
It would be beneficial to have more granular centralized visibility, allowing for quick end-to-end tracing of a user request from authentication to application access without switching between multiple views.
Zscaler Zero Trust Exchange Platform probably needs to be more efficient because scanning takes a lot of time.
They might be able to identify if something is missing with Zscaler.
That's why it's costly.
My experience with pricing, setup cost, and licensing was that the cost was high.
It is not on the higher side, so the experience has been fair.
There is minimal setup cost since it is a cloud-delivered platform, eliminating the need to invest in additional hardware such as VPN gateways or maintain infrastructure.
Zscaler Zero Trust Exchange Platform is much, much cheaper when comparing price.
The next-gen application visibility and cloud sync features are valuable for us because they allow us to provide granular controls over the traffic that is flowing in and out.
We are using 4 Mbps of bandwidth, and by using Check Point Application Control, previously it was 3 Mbps, so now it is around 2 Mbps, allowing half of the bandwidth to be utilized for other work and minimizing the usage of bandwidth.
The best features of Check Point Application Control are granular application and web control, user and group awareness, identity awareness, integration, SSL/TLS inspection, detailed visibility and reporting, and bandwidth management.
The solution is cloud-based with the latest inspection engines, which I find to be amazing.
We have excellent account management, smooth marketplace engagement, and processing in how my team or organization uses Zscaler Zero Trust Exchange Platform.
Since we started using Zscaler Zero Trust Exchange Platform, it has auto-configuration, and wherever we have deployed the auto-configuration, we have not encountered any problem.
| Product | Mindshare (%) |
|---|---|
| Check Point Application Control | 4.5% |
| Zscaler Zero Trust Exchange Platform | 10.2% |
| Other | 85.3% |


| Company Size | Count |
|---|---|
| Small Business | 33 |
| Midsize Enterprise | 25 |
| Large Enterprise | 20 |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 12 |
| Large Enterprise | 44 |
Zscaler Zero Trust Exchange enhances security with seamless cloud-based connectivity and VPN-less operation, offering integration with multiple identity providers and advanced security features, suitable for remote work environments.
Zscaler Zero Trust Exchange provides secure, adaptive connectivity without traditional VPNs, allowing organizations to replace legacy systems and bolster remote work security. The platform offers cloud-based protection, single sign-on, dynamic URL categorization, and scalable solutions. While advanced security features like DLP and threat protection enhance data protection, users may face issues with speed, connectivity, and some customization options. Integration challenges, latency due to multi-tenant hosting, reporting delays, and licensing costs require consideration. It supports secure internet access and private application security, ensuring traffic control and data compliance.
What are the key features of Zscaler Zero Trust Exchange?
What are the benefits of using Zscaler Zero Trust Exchange?
Zscaler Zero Trust Exchange is deployed across industries to secure remote access and enforce zero trust principles. Organizations in finance, healthcare, and technology sectors utilize it for secure internet access and visibility into cloud applications, enhancing performance and compliance in dynamic environments.
We monitor all Application Control reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.