Top Rated Check Point Application Control Alternatives
The number of applications is enormous. The app database covers all applications for internet. You can easily switch from a a classical firewall to a next gen firewall using application security. Inline and ordered layers are used for enhancing the security. Using application control and url at different layers decrease the transition time from classical to next gen Layer 7 security. App control and URL filtering needs to be used for total Internet access security. Granuality with unified layers is awesome. Internet as a dynamic object in the rule base is a big plus, you can just set the destination as internet and set the applications without constant worry of if it blocks the inter zone traffics. Smartevent integration assists the firewall admins to see the overall usage of applications. QOS based on the applications is also a distinct advantage, many vendors do only classical OQS which is ineffective at modern security. Application control can also be implemented at MDM global security policies and that helps the companies to set the general security standarts for all managed devices. Identity awareness module entegration is to be used for user/group based controls for application and url filtering. Logging is awesome, you can set different options to increse the visibility. It's a one click to enable and disable the module. Review collected by and hosted on G2.com.
Application control at the Data Center layer is a big tricky. As the Application control-blade aims to cover the internet based applications. You need to define custom applications for inhouse applications many times. When you use application layer next to access layer it gives you holistics view increasing visibility and decreasing maintenance however it's a security risk as the default last action is accept. This is a negative security model and it's controversial to ZTNA approach. You should move to inliy layers to enhance the security, otherwise you have always a gap to identify and reavluate every time. As there are lots of applications and they're updated regulary, there's no info which one is updated or the new ones come with the latest updates. Review collected by and hosted on G2.com.
36 out of 37 Total Reviews for Check Point Application Control
Overall Review Sentiment for Check Point Application Control
Log in to view review sentiment.

Check point appliaction control provide granular control overa application, provide critical aspct of network security like threat prevention,integratuin with firewall, performance optimization etc. it is easy use, easy to mange and easy to implement. Review collected by and hosted on G2.com.
sometime it provide false positve like in logs it show block but actually it allows. that same things with other OEM so. Review collected by and hosted on G2.com.
Check Point Application Filter provides security in such way that if someone using application which not relavent to them so we can directly block the application. this also helps to decrese congetion in network if we deployed at internal layer. as a user and administrator it is easy to use and deploy. Review collected by and hosted on G2.com.
there is no such point need to dislike about the fearure. Review collected by and hosted on G2.com.
The application filter is the solution that provides control on application. easy to implement and superiror TAC support. Review collected by and hosted on G2.com.
Since I am exploring the solution there is no point. Review collected by and hosted on G2.com.

Application filters can control the application in the infra. It comes with the firewall in-build feature and is easy to use and implement as with same OS GAIA. Review collected by and hosted on G2.com.
in particular feature still we have not faced any issue. Review collected by and hosted on G2.com.
The Check Point application filter provide seamess control over the application usage with integrated security feature, easy to implement. and easy to manage. all the specification collectively helps the organization secure their network. Review collected by and hosted on G2.com.
No negative feedback recieved from customer and sa per my personal experince. Review collected by and hosted on G2.com.
it is easy to deploy enable features and easy to enable on firewall with easy TAC support. Review collected by and hosted on G2.com.
there is no point which I dislike about it. Review collected by and hosted on G2.com.

Users frequently note many critical things they particularly enjoy about Check Point Application Control
1)Granular Policy Control
2)Extensive Application Dashboard
3)Real-time Visibility and Reporting
4)Seamless Integration Review collected by and hosted on G2.com.
Working using Check Point Application Control, there is nothing for dislike Review collected by and hosted on G2.com.
Allows efficient management of permissions for users accessing multiple applications, widgets.
Can be used to categorise applications according to their security risk levels or resource usage and more. Review collected by and hosted on G2.com.
Delayed customer support and little bit tough to manage dashboard for new users. Review collected by and hosted on G2.com.
The tool has many valuable features that help companies with their security, such as:
Threat Protection
centralized management
Reports and analysis
Mejora de la productividad Review collected by and hosted on G2.com.
Like every tool, it has its disadvantages and they can be improvements or deficiencies that the tool has, some improvements that can be corrected are
Latency: on the network and affect the performance of applications.
User Interface - Difficult to navigate for some users.
Incompatibilities: with security solutions or existing hardware in the network. Review collected by and hosted on G2.com.
Check Point Application Control has the biggest application database in the world. The database groups applications into searchable categories. Hence, we can create granular policies for allowing access to the trusted list while blocking access from the blacklist or limiting usage if consuming much bandwidth. Review collected by and hosted on G2.com.
Almost applications work in encrypted connections. To identify exactly applications and their operations (upload, download, chat,...), we need to enable HTTPS inspection. But we may face resource problems because HTTPS inspection consume much CPU usage. Review collected by and hosted on G2.com.