We performed a comparison between Check Point Application Control and VMware Carbon Black App Control based on real PeerSpot user reviews.
Find out in this report how the two Application Control solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of Check Point Application Control is VPN access and the ability to lock out sites we do not want users to have access. The reporting monitoring software in Check Point Application Control is fantastic. For example, log filtering is beneficial."
"The most important characteristic is granularity, which allows our teams to have different security profiles depending on the department to be protected."
"We can combine Application Control with Identity Awareness and URL Filtering to create security policies for users/groups based on characteristics about security, productivity and network bandwidth."
"The best value we have is their actionable reports on user analytics, events, and activity that are extracted from their database."
"We can control bandwidth and high-risk application access from our network using application control."
"We can easily switch from a classical firewall to a next-gen firewall using application security."
"The central management system provides a reliable platform for application control and URL filtering."
"The product offers easy-to-install policies and makes it simple to troubleshoot application-related traffic."
"If any malicious activity, like VAT viruses, anything RNE, ZOD malware, or something similar, comes in we know that unless we approve it, it's going to be blocked."
"The API integration is good."
"I use the console to check for threats and I find it to be very user-friendly."
"The effectiveness of application whitelisting is very good."
"The visibility, reporting, and the ability to stop or prevent malicious or undesired applications from being installed are the most valuable features."
"The visibility is valuable."
"All the functions within VMware Carbon Black App Control are valuable."
"We use App Control to scan the network for virtual machines that have unauthorized applications. We can isolate the problem VMs and control application access."
"Check Point Application Control needs to ensure that they release up-to-date security patches regularly. It should release better documentation so end-users can use the product without depending on the support team."
"The set performance monitoring systems are complex to interpret and scale down their operations."
"Seeing the capabilities and features that we are using today, we can say that we could expect an additional feature that could allow us to integrate this management and even security with APIs."
"I would like this layer to be faster to install in the future."
"I think that the pricing for the Check Point products should be reconsidered - we found it to be quite expensive to purchase and to maintain (the licenses and the support services need to be prolonged regularly), or create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers."
"The whitelisting approach should only be on very specific applications. In which only a server should access a certain application and nothing else. If you miss something, you will have to always be investigating why it doesn't have access or why an application is not working."
"At the moment I don't see the need to add new features. That said, you always have to be one step ahead."
"More and more product specifications should be infused with new incumbent features in the market to stay relevant and concurrent with the organization's needs."
"Another issue is that even sometimes if you approve, for example, Adobe as a publisher, you say any product or anything that's from Adobe has to run. It generally runs, but especially in a large environment and with a lot of users, sometimes, due to some certification validation issues or some other issue, it might stop the process from running. Genuine processes like Adobe and Chrome can get blocked. so that needs to be improved."
"Its setup is very complex, and it requires guidance from the support team, but it is well worth the effort."
"Carbon Black does not use the database for identifying the file, the fields, or malware."
"The initial setup is somewhat complex."
"I would like to see the addition of some more features that are in other, similar solutions."
"I rate App Control six out of 10 for scalability."
"The solution should have overhead in keeping lists of applications that you want don't want to run."
"The reporting is not good and needs to be improved."
More Check Point Application Control Pricing and Cost Advice →
More VMware Carbon Black App Control Pricing and Cost Advice →
Check Point Application Control is ranked 2nd in Application Control with 34 reviews while VMware Carbon Black App Control is ranked 1st in Application Control with 8 reviews. Check Point Application Control is rated 8.8, while VMware Carbon Black App Control is rated 9.2. The top reviewer of Check Point Application Control writes "Reliable, reduces management requirements, and lessens manual interventions". On the other hand, the top reviewer of VMware Carbon Black App Control writes "We can isolate problem machines and limit their access". Check Point Application Control is most compared with Ivanti Application Control and WatchGuard Application Control, whereas VMware Carbon Black App Control is most compared with McAfee Application Control, ThreatLocker Elevation Control, Ivanti Application Control and Zscaler CASB. See our Check Point Application Control vs. VMware Carbon Black App Control report.
See our list of best Application Control vendors.
We monitor all Application Control reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.