Network System Administrator at Camara Municipal de Lisboa
Real User
Top 20
2023-03-09T22:04:06Z
Mar 9, 2023
The most valuable feature of Check Point Application Control is VPN access and the ability to lock out sites we do not want users to have access. The reporting monitoring software in Check Point Application Control is fantastic. For example, log filtering is beneficial.
The most important characteristic is granularity, which allows our teams to have different security profiles depending on the department to be protected.
One of the greatest capacities and the benefits it gives us is the ability to control applications based on defining access or denial policies in specific applications, groups, or category profiles.
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Cloud Support at a tech company with 51-200 employees
User
2022-04-13T17:33:00Z
Apr 13, 2022
It has helped us have greater control and security in the organization. This has encouraged us to look for better policies or regulations that help us protect all the information of our services.
System and Network Administrator at Auriga - The banking e-volution
Real User
2021-05-08T13:30:00Z
May 8, 2021
The most important feature, in my opinion, regarding Check Point Application Control is the granularity and the great variety of applications and sub-applications recognized.
Check Point enables us to save internet bandwidth. The administration offers good guidance. We don't want the employees to access social networking on work computers because it will distract them from their jobs, so we can block that. It also helps us to implement changes very quickly and to get people to be more focused on the job.
The overall security of the environment has been greatly improved by the Check Point NGFWs. Before implementing the Check Point solutions, we relied on the Cisco ACLs and Zone-Based firewalls configured on the switches and routers, which in fact a simple stateful firewall, and currently appear to be not an efficient solution for protecting from the advanced threats.
With Check Point Application Control we can say we improved our legacy and have made them more secure. Now we are able to allow specific applications on respective service and we are allowed those respective services only.
Check Point Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policies, based on users or groups, to identify, block or limit usage of thousands of Web applications and widgets.Learn more about Application control software
It has many important features that have greatly helped the company and the IT department.
The most valuable feature of Check Point Application Control is VPN access and the ability to lock out sites we do not want users to have access. The reporting monitoring software in Check Point Application Control is fantastic. For example, log filtering is beneficial.
The most important characteristic is granularity, which allows our teams to have different security profiles depending on the department to be protected.
One of the greatest capacities and the benefits it gives us is the ability to control applications based on defining access or denial policies in specific applications, groups, or category profiles.
It ensures that the health of each application can handle the set tasks and projects without any challenges.
The most outstanding feature is the Check Point APK wiki.
This platform has fully secured our applications with very powerful firewall security upgrades.
The best value we have is their actionable reports on user analytics, events, and activity that are extracted from their database.
We can easily switch from a classical firewall to a next-gen firewall using application security.
It does not require a lot of work to be activated and used.
We can control bandwidth and high-risk application access from our network using application control.
Its implementation is simple.
It also helps us implement changes very quickly and make people more focused on work.
It has helped us have greater control and security in the organization. This has encouraged us to look for better policies or regulations that help us protect all the information of our services.
It has helped us to have greater control and security in the organization.
Its initial setup is very simple and straightforward.
They have an excellent support team. They are fast and it is easy to escalate any situation.
The product offers easy-to-install policies and makes it simple to troubleshoot application-related traffic.
The automatic updates of new applications and signatures guarantee protection at all times without the need to apply a change manually.
The most important feature, in my opinion, regarding Check Point Application Control is the granularity and the great variety of applications and sub-applications recognized.
This product logs & monitors event traffic for each application, giving us better visibility.
Check Point enables us to save internet bandwidth. The administration offers good guidance. We don't want the employees to access social networking on work computers because it will distract them from their jobs, so we can block that. It also helps us to implement changes very quickly and to get people to be more focused on the job.
The overall security of the environment has been greatly improved by the Check Point NGFWs. Before implementing the Check Point solutions, we relied on the Cisco ACLs and Zone-Based firewalls configured on the switches and routers, which in fact a simple stateful firewall, and currently appear to be not an efficient solution for protecting from the advanced threats.
With Check Point Application Control we can say we improved our legacy and have made them more secure. Now we are able to allow specific applications on respective service and we are allowed those respective services only.
This solution is stable and we have not had any issues.