Top Rated Check Point Application Control Alternatives

The more granular and most substantial security application Review collected by and hosted on G2.com.
dependent on the gateway as it needs NGFW and certificate Review collected by and hosted on G2.com.
36 out of 37 Total Reviews for Check Point Application Control
Overall Review Sentiment for Check Point Application Control
Log in to view review sentiment.

Check point appliaction control provide granular control overa application, provide critical aspct of network security like threat prevention,integratuin with firewall, performance optimization etc. it is easy use, easy to mange and easy to implement. Review collected by and hosted on G2.com.
sometime it provide false positve like in logs it show block but actually it allows. that same things with other OEM so. Review collected by and hosted on G2.com.
Check Point Application Filter provides security in such way that if someone using application which not relavent to them so we can directly block the application. this also helps to decrese congetion in network if we deployed at internal layer. as a user and administrator it is easy to use and deploy. Review collected by and hosted on G2.com.
there is no such point need to dislike about the fearure. Review collected by and hosted on G2.com.
The application filter is the solution that provides control on application. easy to implement and superiror TAC support. Review collected by and hosted on G2.com.
Since I am exploring the solution there is no point. Review collected by and hosted on G2.com.

Application filters can control the application in the infra. It comes with the firewall in-build feature and is easy to use and implement as with same OS GAIA. Review collected by and hosted on G2.com.
in particular feature still we have not faced any issue. Review collected by and hosted on G2.com.
The Check Point application filter provide seamess control over the application usage with integrated security feature, easy to implement. and easy to manage. all the specification collectively helps the organization secure their network. Review collected by and hosted on G2.com.
No negative feedback recieved from customer and sa per my personal experince. Review collected by and hosted on G2.com.
it is easy to deploy enable features and easy to enable on firewall with easy TAC support. Review collected by and hosted on G2.com.
there is no point which I dislike about it. Review collected by and hosted on G2.com.

Users frequently note many critical things they particularly enjoy about Check Point Application Control
1)Granular Policy Control
2)Extensive Application Dashboard
3)Real-time Visibility and Reporting
4)Seamless Integration Review collected by and hosted on G2.com.
Working using Check Point Application Control, there is nothing for dislike Review collected by and hosted on G2.com.
Allows efficient management of permissions for users accessing multiple applications, widgets.
Can be used to categorise applications according to their security risk levels or resource usage and more. Review collected by and hosted on G2.com.
Delayed customer support and little bit tough to manage dashboard for new users. Review collected by and hosted on G2.com.
The tool has many valuable features that help companies with their security, such as:
Threat Protection
centralized management
Reports and analysis
Mejora de la productividad Review collected by and hosted on G2.com.
Like every tool, it has its disadvantages and they can be improvements or deficiencies that the tool has, some improvements that can be corrected are
Latency: on the network and affect the performance of applications.
User Interface - Difficult to navigate for some users.
Incompatibilities: with security solutions or existing hardware in the network. Review collected by and hosted on G2.com.
Check Point Application Control has the biggest application database in the world. The database groups applications into searchable categories. Hence, we can create granular policies for allowing access to the trusted list while blocking access from the blacklist or limiting usage if consuming much bandwidth. Review collected by and hosted on G2.com.
Almost applications work in encrypted connections. To identify exactly applications and their operations (upload, download, chat,...), we need to enable HTTPS inspection. But we may face resource problems because HTTPS inspection consume much CPU usage. Review collected by and hosted on G2.com.