Save to My Lists
Claimed
Claimed

Top Rated Check Point Application Control Alternatives

Check Point Application Control Reviews & Product Details - Page 4

Check Point Application Control Overview

What is Check Point Application Control?

Check Point Application Control provides the industry strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policiesbased on users or groupsto identify, block or limit usage of over 7,800 Web 2.0 applications and 250,000 widgets.

Check Point Application Control Details
Show LessShow More
Product Description

Check Point Application Control provides the industry strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policiesbased on users or groupsto identify, block or limit usage of over 7,800 Web 2.0 applications and 250,000 widgets.


Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,158 Twitter followers
LinkedIn® Page
www.linkedin.com
7,920 employees on LinkedIn®
Ownership
NASDAQ:CHKP
Total Revenue (USD mm)
$2,064
Description

Check Point Software Technologies is a global leader in cybersecurity solutions, providing advanced threat prevention and security management for enterprises, cloud environments, and mobile devices. Established in 1993, the company offers a comprehensive range of products, including firewalls, endpoint protection, and cloud security services, designed to safeguard networks and data from various cyber threats. Check Point's innovative technologies are built on a unified architecture, enabling organizations to consolidate their security infrastructure and enhance their overall security posture. For more information, visit their website at https://www.checkpoint.com/.


MN
Overview Provided by:

Recent Check Point Application Control Reviews

HR
Heema R.Mid-Market (51-1000 emp.)
4.5 out of 5
"Application Filter : The next generation defense"
The application filter is the solution that provides control on application. easy to implement and superiror TAC support.
Maaz P.
MP
Maaz P.Mid-Market (51-1000 emp.)
5.0 out of 5
"Application Control: lock down your application"
Check point appliaction control provide granular control overa application, provide critical aspct of network security like threat prevention,integ...
SV
Suraj V.Mid-Market (51-1000 emp.)
4.5 out of 5
"Application Filter : secure your infra at application level."
it is easy to deploy enable features and easy to enable on firewall with easy TAC support.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Check Point Application Control Media

Answer a few questions to help the Check Point Application Control community
Have you used Check Point Application Control before?
Yes

37 Check Point Application Control Reviews

4.4 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
37 Check Point Application Control Reviews
4.4 out of 5
37 Check Point Application Control Reviews
4.4 out of 5

Check Point Application Control Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for Check Point Application ControlQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Bharat K.
BK
Security consultant
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
Business partner of the seller or seller's competitor, not included in G2 scores.
What do you like best about Check Point Application Control?

Application control without performance impacct Review collected by and hosted on G2.com.

What do you dislike about Check Point Application Control?

Leser applications support and inegrations Review collected by and hosted on G2.com.

Recommendations to others considering Check Point Application Control:

Prefer a demo before buying the product Review collected by and hosted on G2.com.

What problems is Check Point Application Control solving and how is that benefiting you?

Majority of the applications have been given support and real time log analysis along with command line benefits Review collected by and hosted on G2.com.

Oleg P.
OP
Senior DevOps Engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Check Point Application Control?

The number of pre-configured (default objects) for applications and software categories is just amazing.

We still have to define some manually since we develop our own software and it works on non-default ports, but the Check Point Application Control allows to do that in an easy way. Review collected by and hosted on G2.com.

What do you dislike about Check Point Application Control?

During the configuration and exploitation of the Check Point Application Control I haven't had issue I could complain about, so the general experience has been positive. Review collected by and hosted on G2.com.

What problems is Check Point Application Control solving and how is that benefiting you?

The Check Point HA Clusters server as the core security solution for protecting our company's DataCenter located in Asia. We use the Check Point Application Control software blade in the security policy installed on the Check Point Clusters. The rules consume the object - application definitions and the groups of them - to defined whether the access to or from such an application is allowed or denied. I was amaze with the number of applications available just after the blade activation - I feel like the Check Point have a great experience working on application definition and categorization. We also extended the pre-defined set of the application, which may be done quite easy. In overall, the solution is simple, but helps to improve the way you defined your firewall rules. It works stable and doesn't affect the performance of the Check Point Clusters. Review collected by and hosted on G2.com.

AP
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Check Point Application Control?

1. The incredible amount of the built-in application in the database.

2. Ability to define custom application in a simple and convenient way.

3. For R80.10 software and above version, the Application Control policy is unified with Access Control and URL filtering.

4. Ability to inspect the encrypted traffic if you provide the users correct certificate. Review collected by and hosted on G2.com.

What do you dislike about Check Point Application Control?

So far there has been only the positive experience from using the Check Point Application Control software blade on our NGFWs. Review collected by and hosted on G2.com.

Recommendations to others considering Check Point Application Control:

The application database is great, probably the richest among the solutions on the market, and you could easily add the custom application types and groups. Review collected by and hosted on G2.com.

What problems is Check Point Application Control solving and how is that benefiting you?

We use the Check Point Next Generation Firewalls as the edge firewall across all our offices. The Application Control software blade is enabled on all the Gateways and Clusters and inspect the traffic with great performance, without degradation. In the policy, we define the specific application set every AD domain group may use for work (that requires the Check Point Identity Awareness blade to be activatedas well). I'm also satisfied with the visibility of the logs provided on every policy violation event. Review collected by and hosted on G2.com.

Verified User in Banking
AB
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Seller invite
What do you like best about Check Point Application Control?

Love how it van categorise all the apps. Review collected by and hosted on G2.com.

What do you dislike about Check Point Application Control?

Nothing much. However i would appreciate if there are options of defining applications. Review collected by and hosted on G2.com.

What problems is Check Point Application Control solving and how is that benefiting you?

We are getting better control of applications verification. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
Business partner of the seller or seller's competitor, not included in G2 scores.
What do you like best about Check Point Application Control?

identification of applications so you don't have to apply static rules Review collected by and hosted on G2.com.

What do you dislike about Check Point Application Control?

I can't think of anything. It seems like a really mature blade. Review collected by and hosted on G2.com.

What problems is Check Point Application Control solving and how is that benefiting you?

We are allowing access to cloud services. Review collected by and hosted on G2.com.

Kirtikumar P.
KP
Network Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Application Control?

We have thousand of in-build application and also we can manually create as well. Review collected by and hosted on G2.com.

What do you dislike about Check Point Application Control?

The uncategory feature is very disappointing us. because it is allow all https applications. Review collected by and hosted on G2.com.

Recommendations to others considering Check Point Application Control:

This blade is very useful is checkpoint on perimeter. Review collected by and hosted on G2.com.

What problems is Check Point Application Control solving and how is that benefiting you?

We have application layer control and we manage very well as per business need. Review collected by and hosted on G2.com.

Abraham M.
AM
Senior executive - ITIL Certified - Check Point Certified Security Administrator
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Check Point Application Control?

I found all the application needed to run the business. Even it gave option to customise as well. Review collected by and hosted on G2.com.

What do you dislike about Check Point Application Control?

After the upgrade it requires good amount of resource. Review collected by and hosted on G2.com.

Recommendations to others considering Check Point Application Control:

It is worth trying this if you are really looking for solution Review collected by and hosted on G2.com.

What problems is Check Point Application Control solving and how is that benefiting you?

We are able to provide more controlled access. Review collected by and hosted on G2.com.