The visibility, reporting, and the ability to stop or prevent malicious or undesired applications from being installed are the most valuable features.
This is a basic solution; the policy screen is okay, and it's easy to configure.
We also like the Change Control. We can control how things get executed. It has signatures for different kinds of protocols.
This product logs & monitors event traffic for each application, giving us better visibility.
Check Point enables us to save internet bandwidth. The administration offers good guidance. We don't want the employees to access social networking on work computers because it will distract them from their jobs, so we can block that. It also helps us to implement changes very quickly and to get people to be more focused on the job.
The most valuable feature is the category control.
It does the job of what it says it does. We set it to what we want it to block and then it blocks it.