Top Rated Check Point Application Control Alternatives

1) Application and URL filtering is the perfect combination to block unwanted application and web browsing traffic based on the defined policy.
2) Customers who don't have a dedicated proxy can utilize Check Point's Next Generation Firewall as an Application Control.
3) It allows users to define policies based on source IP, user role, or group, quickly identifying traffic flow with SAML. You can allow or block traffic coming or going out to the internet for specific applications or websites.
4) With application control and URL filtering, it becomes possible to block/allow applications and sub-applications the maximum flexibility to enable policy-based access roles.
5) The solution offers user notifications for blocked access, time-defined policies, and bulk categorization of malicious applications. Review collected by and hosted on G2.com.
1) The working principle of Check Point Application Control is far different from all other vendors in the market.
2) It works in parallel with security rules. Every time packet must go from policy lookup into security rules. It sometimes leads to a troubleshooting phase for which we can create application traffic.
3)Load balancer functionality for application traffic might be a better option. Review collected by and hosted on G2.com.
36 out of 37 Total Reviews for Check Point Application Control
Overall Review Sentiment for Check Point Application Control
Log in to view review sentiment.

Check point appliaction control provide granular control overa application, provide critical aspct of network security like threat prevention,integratuin with firewall, performance optimization etc. it is easy use, easy to mange and easy to implement. Review collected by and hosted on G2.com.
sometime it provide false positve like in logs it show block but actually it allows. that same things with other OEM so. Review collected by and hosted on G2.com.
Check Point Application Filter provides security in such way that if someone using application which not relavent to them so we can directly block the application. this also helps to decrese congetion in network if we deployed at internal layer. as a user and administrator it is easy to use and deploy. Review collected by and hosted on G2.com.
there is no such point need to dislike about the fearure. Review collected by and hosted on G2.com.
The application filter is the solution that provides control on application. easy to implement and superiror TAC support. Review collected by and hosted on G2.com.
Since I am exploring the solution there is no point. Review collected by and hosted on G2.com.

Application filters can control the application in the infra. It comes with the firewall in-build feature and is easy to use and implement as with same OS GAIA. Review collected by and hosted on G2.com.
in particular feature still we have not faced any issue. Review collected by and hosted on G2.com.
The Check Point application filter provide seamess control over the application usage with integrated security feature, easy to implement. and easy to manage. all the specification collectively helps the organization secure their network. Review collected by and hosted on G2.com.
No negative feedback recieved from customer and sa per my personal experince. Review collected by and hosted on G2.com.
it is easy to deploy enable features and easy to enable on firewall with easy TAC support. Review collected by and hosted on G2.com.
there is no point which I dislike about it. Review collected by and hosted on G2.com.

Users frequently note many critical things they particularly enjoy about Check Point Application Control
1)Granular Policy Control
2)Extensive Application Dashboard
3)Real-time Visibility and Reporting
4)Seamless Integration Review collected by and hosted on G2.com.
Working using Check Point Application Control, there is nothing for dislike Review collected by and hosted on G2.com.
Allows efficient management of permissions for users accessing multiple applications, widgets.
Can be used to categorise applications according to their security risk levels or resource usage and more. Review collected by and hosted on G2.com.
Delayed customer support and little bit tough to manage dashboard for new users. Review collected by and hosted on G2.com.
The tool has many valuable features that help companies with their security, such as:
Threat Protection
centralized management
Reports and analysis
Mejora de la productividad Review collected by and hosted on G2.com.
Like every tool, it has its disadvantages and they can be improvements or deficiencies that the tool has, some improvements that can be corrected are
Latency: on the network and affect the performance of applications.
User Interface - Difficult to navigate for some users.
Incompatibilities: with security solutions or existing hardware in the network. Review collected by and hosted on G2.com.
Check Point Application Control has the biggest application database in the world. The database groups applications into searchable categories. Hence, we can create granular policies for allowing access to the trusted list while blocking access from the blacklist or limiting usage if consuming much bandwidth. Review collected by and hosted on G2.com.
Almost applications work in encrypted connections. To identify exactly applications and their operations (upload, download, chat,...), we need to enable HTTPS inspection. But we may face resource problems because HTTPS inspection consume much CPU usage. Review collected by and hosted on G2.com.