Top Rated Check Point Application Control Alternatives
37 Check Point Application Control Reviews
Overall Review Sentiment for Check Point Application Control
Log in to view review sentiment.

It has excellent visibility over application traffic flowing as a whole or between the different endpoints. It is an excellent tool for end-to-end application control and management Review collected by and hosted on G2.com.
Sometimes there are errors like Application Control is not responding, and a complete reboot is often required to solve the issue. There should be some alternate solution than relying on a machine reboot. Review collected by and hosted on G2.com.

Check Point Application Control builds stable security walls surrounding each application to keep away all the possible malware attacks. It groups apps according to their basic functionalities to enhance effective and faster integrations. It detects and attacks to the workflows in advance and provides instant solution. Review collected by and hosted on G2.com.
I face d few challenges before I familiarized with the operation of the entire system. The customer support team has deployed technical team that has helped us to catch up faster with all the features. Review collected by and hosted on G2.com.
Check Point Application Control It is one of the Checkpoint features found in the App Gateways, where you can configure fairly detailed access control policies to protect the security of users who use or are within the domain protected by Checkpoint. The user interface is easy and dynamic, you can drag objects around the screen to facilitate its use, besides it is quite easy to understand and apply changes, I like how it shows the policies and their resources to which it is applied. Review collected by and hosted on G2.com.
Sometimes the documentation is not accurate, we have implemented these technologies in our GWs in Azure, but sometimes we run into challenges and find it difficult to find documentation for cases in which they are managed in Azure. More documentation for cloud implementations. Sometimes with the support issue we have had to wait a long time for an engineer to understand the errors, the service SLA is almost never met, at least in some cases.
I would like to see if they can help with the issue of service and more qualified staff in order to have fast and good service with checkpoint products. Review collected by and hosted on G2.com.

Well Check Point Application Control undoubtedly is one of the ultimate tool present in market for end to end application control & management..
Check Point Application Control is highly productive & scalable via is customisable tools & services of threat detection, Blocking & Security against Malware & phishing attacks,2FA Security bridge & much more like these Review collected by and hosted on G2.com.
Well Check Point Application Control is highly recommended tool & It's support team is highly active but In my case I found some issues while third party integration with system but overall it's must integrated product.. Review collected by and hosted on G2.com.
Check Point provides the largest database about Application Control. With Application Control, organizations can create granular policies to identify, allow, block or limit usage. Review collected by and hosted on G2.com.
This is an add-on license, not bundled in NGFW. Besides to effect this feature, need combines with HTTPS Inspection that may cause CPU usage of the firewall. This is the same with other vendors. Review collected by and hosted on G2.com.
The number of applications is enormous. The app database covers all applications for internet. You can easily switch from a a classical firewall to a next gen firewall using application security. Inline and ordered layers are used for enhancing the security. Using application control and url at different layers decrease the transition time from classical to next gen Layer 7 security. App control and URL filtering needs to be used for total Internet access security. Granuality with unified layers is awesome. Internet as a dynamic object in the rule base is a big plus, you can just set the destination as internet and set the applications without constant worry of if it blocks the inter zone traffics. Smartevent integration assists the firewall admins to see the overall usage of applications. QOS based on the applications is also a distinct advantage, many vendors do only classical OQS which is ineffective at modern security. Application control can also be implemented at MDM global security policies and that helps the companies to set the general security standarts for all managed devices. Identity awareness module entegration is to be used for user/group based controls for application and url filtering. Logging is awesome, you can set different options to increse the visibility. It's a one click to enable and disable the module. Review collected by and hosted on G2.com.
Application control at the Data Center layer is a big tricky. As the Application control-blade aims to cover the internet based applications. You need to define custom applications for inhouse applications many times. When you use application layer next to access layer it gives you holistics view increasing visibility and decreasing maintenance however it's a security risk as the default last action is accept. This is a negative security model and it's controversial to ZTNA approach. You should move to inliy layers to enhance the security, otherwise you have always a gap to identify and reavluate every time. As there are lots of applications and they're updated regulary, there's no info which one is updated or the new ones come with the latest updates. Review collected by and hosted on G2.com.

1) Application and URL filtering is the perfect combination to block unwanted application and web browsing traffic based on the defined policy.
2) Customers who don't have a dedicated proxy can utilize Check Point's Next Generation Firewall as an Application Control.
3) It allows users to define policies based on source IP, user role, or group, quickly identifying traffic flow with SAML. You can allow or block traffic coming or going out to the internet for specific applications or websites.
4) With application control and URL filtering, it becomes possible to block/allow applications and sub-applications the maximum flexibility to enable policy-based access roles.
5) The solution offers user notifications for blocked access, time-defined policies, and bulk categorization of malicious applications. Review collected by and hosted on G2.com.
1) The working principle of Check Point Application Control is far different from all other vendors in the market.
2) It works in parallel with security rules. Every time packet must go from policy lookup into security rules. It sometimes leads to a troubleshooting phase for which we can create application traffic.
3)Load balancer functionality for application traffic might be a better option. Review collected by and hosted on G2.com.
Offers a great database about application control Review collected by and hosted on G2.com.
It could be accessed in bundle with ngfws but they decided it to be an add-on Review collected by and hosted on G2.com.
Check Point App Control Software Blade is at the center of the Next Generation firewall.
The number of apps recognized is impressive : more than 8628 applications (as of October 2021). Review collected by and hosted on G2.com.
It is not a dislike per se, but it should be noted that without HTTPS Decryption, most of App Control recognition features will be made useless, as everything is encrypted, so far. Review collected by and hosted on G2.com.
I like all the control that gives us when the LAN try´s to connect to the internet or other service towards social networks to identifying features in order to allow, block o limit the usage with the bandwith restiction Review collected by and hosted on G2.com.
Until this point, I do not have something to dislike this blade Review collected by and hosted on G2.com.