Check Point Application Control Overview

What is Check Point Application Control?


Check Point Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policies, based on users or groups, to identify, block or limit usage of thousands of Web applications and widgets.

Learn more about Application control software

Check Point Application Control Buyer's Guide

Download the Check Point Application Control Buyer's Guide including reviews and more. Updated: February 2021

Check Point Application Control Customers
SEB, Luma Arles, Terma, Aerospace, Midwest Rubber
Check Point Application Control Video

Pricing Advice

What users are saying about Check Point Application Control pricing:
  • "It's a bit expensive and it could be cheaper, but it's part of business politics."

Check Point Application Control Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
reviewer1098015
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Oct 7, 2020
Enables us to block employees from downloading illegal content that would harm the company image

What is our primary use case?

Our primary use case of Check Point Application Control is to filter which application categories we want to allow our organization members to have access to so that they are secured. For example, we don't allow access to malicious applications and some categories that could be threats. We only allow organization members to access secure applications and applications that are aligned with the company's strategy. It also enables us to save internet bandwidth by filtering applications that are not work-related.

Pros and Cons

  • "Check Point enables us to save internet bandwidth. The administration offers good guidance. We don't want the employees to access social networking on work computers because it will distract them from their jobs, so we can block that. It also helps us to implement changes very quickly and to get people to be more focused on the job."
  • "The whitelisting approach should only be on very specific applications. In which only a server should access a certain application and nothing else. If you miss something, you will have to always be investigating why it doesn't have access or why an application is not working."

What other advice do I have?

My advice would be to deploy Application Control with a blacklist approach. In which you select which application categories to block and accept others. Otherwise, from our experience, it's a mess. It's much more easy and efficient than doing the whitelist approach, in which you would select what you would allow and block off the rest. It can forget to add a category or an application that is needed and so you will always need to be adding them on a request basis. The whitelisting approach should only be on very specific applications. In which only a server should access a certain application…
Oleg Pekar
Senior Network/Security Engineer at Skywind Group
Real User
Top 5Leaderboard
Aug 2, 2020
The control-blade significantly increased the security level from the standpoint of application visibility and filtration

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Application Control software blade is one of the numerous blades activated on the… more »

Pros and Cons

  • "The overall security of the environment has been greatly improved by the Check Point NGFWs. Before implementing the Check Point solutions, we relied on the Cisco ACLs and Zone-Based firewalls configured on the switches and routers, which in fact a simple stateful firewall, and currently appear to be not an efficient solution for protecting from the advanced threats."
  • "I think that the pricing for the Check Point products should be reconsidered - we found it to be quite expensive to purchase and to maintain (the licenses and the support services need to be prolonged regularly), or create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers."
Find out what your peers are saying about Check Point, Carbon Black, Ivanti and others in Application Control. Updated: February 2021.
465,058 professionals have used our research since 2012.
Kirtikumar Patel
Network Engineer at LTTS
Real User
Top 5Leaderboard
Aug 5, 2020
We can filter a search based on risk level to see all applications at a certain risk level

What is our primary use case?

The Check Point Application Control blade provides application security and identity control for our organization. It gives us very easy to create policies based on users and groups. We use Critical Risk and Anonymizers, P2P file sharing, Spyware, and Remote admin categories. We use Application Control in two ways, separate rule base and with access policy as well. My all over experience is good.

Pros and Cons

  • "With Check Point Application Control we can say we improved our legacy and have made them more secure. Now we are able to allow specific applications on respective service and we are allowed those respective services only."
  • "Most of the business applications stopped working, we don't know why and we have already escalated to the top level but we still haven't gotten any corrective action on this. They always take logs but after that, there is no resolution."

What other advice do I have?

They have to improve more on the Application Control blade.
Ndricim-Danaj
Senior Security Engineer at a tech services company with 51-200 employees
MSP
Top 20
Feb 10, 2020
Stable, scales well, and you can use it to protect against everything

What is our primary use case?

The primary use case of this solution is security, threat prevention, antivirus, and ransomware. You can use it for everything.

Pros and Cons

  • "This solution is stable and we have not had any issues."
  • "The initial setup was a bit difficult."

What other advice do I have?

It's a good solution and I suggest it. In general, it can be improved but it's good enough. I would rate this solution an eight out of ten.
Product Categories
Application Control
Buyer's Guide
Download our free Application Control Report and find out what your peers are saying about Check Point, Carbon Black, Ivanti, and more!