You must have a culture of updating the tool every time you can, always choosing a tool with stability that is scalable since companies change day by day.
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
We are internally using this product in our company. We are not offering it to customers. It's deployed directly on our laptops. I'd rate the solution an eight out of ten. I would recommend the product to other users and organizations.
Technology consultant at a tech services company with 501-1,000 employees
Real User
2021-03-19T08:58:00Z
Mar 19, 2021
The only thing we expect from a Check Point is to regularly update their database with the new applications. Other than this, specific to the application control-blade, I have not seen any issues or problems.
My advice would be to deploy Application Control with a blacklist approach. In which you select which application categories to block and accept others. Otherwise, from our experience, it's a mess. It's much more easy and efficient than doing the whitelist approach, in which you would select what you would allow and block off the rest. It can forget to add a category or an application that is needed and so you will always need to be adding them on a request basis. The whitelisting approach should only be on very specific applications. In which only a server should access a certain application and nothing else. If you miss something, you will have to always be investigating why it doesn't have access or why an application is not working. We tried to do a whitelist approach on a specific environment, but we gave up because it was starting to get to be a bit messy. Some servers only need it to go to the internet to do some updates on some applications. They shouldn't access any other categories. That was always something that was not working because some application was categorized as technology and it was also categorized as, for example, social networking. The biggest lesson is that it's very important to have Application Control on the company's internet access. A previous company I worked at, got a court letter saying that our IP downloaded two movies from torrents. The company got a final warning that if our IP would be caught downloading illegal stuff again we would have problems and so the company implemented Application Control. It's very important for the company's IP reputation and also for employees to be focused on their job. You can block malicious applications which gives you another level of protection and also reduces internet link usage. I would rate Check Point Application Control a ten out of ten.
Check Point Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policies, based on users or groups, to identify, block or limit usage of thousands of Web applications and widgets.Learn more about Application control software
This solution is meeting all our expectations; support and subscriptions should be taken into account.
Overall, I rate the solution a nine out of ten.
You must have a culture of updating the tool every time you can, always choosing a tool with stability that is scalable since companies change day by day.
I highly recommend the use of this product to other organizations for reliable application control services.
This is great system for monitoring application performance and I recommend to others.
The product is great.
I highly recommend this software for comprehensive application security enhancement.
I'd advise users to go for its mandatory trial and explore the gamut of facilities on their own.
They continue to innovate. Check Point is an excellent tool in many areas.
It is an excellent option, a very good Check Point tool.
We are internally using this product in our company. We are not offering it to customers. It's deployed directly on our laptops. I'd rate the solution an eight out of ten. I would recommend the product to other users and organizations.
Not at this time.
It does not require excessive resources but if you intend to use it massively, do not underestimate the size of the firewall.
The only thing we expect from a Check Point is to regularly update their database with the new applications. Other than this, specific to the application control-blade, I have not seen any issues or problems.
My advice would be to deploy Application Control with a blacklist approach. In which you select which application categories to block and accept others. Otherwise, from our experience, it's a mess. It's much more easy and efficient than doing the whitelist approach, in which you would select what you would allow and block off the rest. It can forget to add a category or an application that is needed and so you will always need to be adding them on a request basis. The whitelisting approach should only be on very specific applications. In which only a server should access a certain application and nothing else. If you miss something, you will have to always be investigating why it doesn't have access or why an application is not working. We tried to do a whitelist approach on a specific environment, but we gave up because it was starting to get to be a bit messy. Some servers only need it to go to the internet to do some updates on some applications. They shouldn't access any other categories. That was always something that was not working because some application was categorized as technology and it was also categorized as, for example, social networking. The biggest lesson is that it's very important to have Application Control on the company's internet access. A previous company I worked at, got a court letter saying that our IP downloaded two movies from torrents. The company got a final warning that if our IP would be caught downloading illegal stuff again we would have problems and so the company implemented Application Control. It's very important for the company's IP reputation and also for employees to be focused on their job. You can block malicious applications which gives you another level of protection and also reduces internet link usage. I would rate Check Point Application Control a ten out of ten.
They have to improve more on the Application Control blade.
It's a good solution and I suggest it. In general, it can be improved but it's good enough. I would rate this solution an eight out of ten.