The solution's primary use cases include application visibility and control, enforcement of security policies, risk mitigation, and bandwidth management.
The primary use case of Check Point Application Control is to enhance network security by providing granular control over applications and web traffic. It prevents unauthorized access by allowing or blocking applications based on predefined policies, ensuring that only authorized applications are used within the network. Additionally, it improves productivity by restricting access to non-business-related applications and websites, helps maintain compliance with regulatory requirements and internal policies by monitoring and controlling application usage, and mitigates risks by detecting and preventing the use of high-risk applications, thereby reducing the likelihood of malware and data breaches. This comprehensive control over application usage makes us more secure and efficient.
The companies have implemented this security tool, due to several factors. The companies develop or buy applications for different functions or needs and this is where Check Point Application Control comes in. The tool has allowed us to be able to identify and classify all those applications that are being used within the network, which simplifies the work of managing bandwidth, and also helps us to have better control over security since it allows us to allows you to block or allow access to our network.
Network System Administrator at Camara Municipal de Lisboa
Real User
Top 20
2023-03-09T22:04:06Z
Mar 9, 2023
I am using Check Point Application Control for controlling streaming, social media, and video sites. Additionally, we control VPNs and peer-to-peer sites. We use it to control sites that use a lot of bandwidth.
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Check Point has provided us with a Check Point management server tool where we manage our Gateways. It helped us limit the applications, sites, and different actions that are part of the users' daily lives. We can limit with granularly the applications that users access. Segmentation is key. We managed to divide everything by department to be able to generate the security that each one requires. Now, managers have greater flexibility.
We needed to allow, control, block, and access specific applications based on the policies that the institution has as a baseline. Given this need, we have tried, analyzed, and tested various solutions that could comply with said internal directive. We have sought solutions that allow us greater visibility and control over applications on the network, improving the protection of applications and the security of the organization in general. We've validated the software's great potential at detecting malicious events on unauthorized applications or resources.
The company-based applications have benefited from this software in the enhancement of security and performance acceleration. Check Point Application Control monitors all tools' performance and operations in all enterprise activities. The reported performance metrics help us allocate resources and unlock hidden business potentials. Over the past year, this product has boosted the end output of all applications and promoted efficient teamwork. Each tool can easily link and integrate with others with set task objectives.
We needed a solution that would allow us to protect the applications that we were constantly developing. Those applications needed to be classified by categories, including integrity, risk level, and productivity issues, as well as identity per user. We needed all these characteristics to safeguard a library, repository, or platform that could allow us to manage it in a secure, fast, and scalable way. We tried more than one solution that would allow us the required granularity in the teams and management so that we could implement it according to the regulations that we had internally.
This software monitors the performance of applications across the company. It provides comprehensive security for all the tools contributing to the company's growth. Check Point Application Control has created reliable data management policies that guide employees on how to interact effectively with applications. The software assigns each sector the most suitable working tools to easily implement projects and tasks. We were able to customize it and make efficient configurations with data models.
We had the need to control and be able to manage rules in a granular way for maintaining the security and control of the data, management by teams, identity, and applications grouping them by category and thus being able to defend ourselves from threats and malware that wants to enter our infrastructure while reducing the operating cost. Something that we need and want is an inspection of the data. We must see what the different users and applications of our network are sharing, and that is where the control solution brings us that administration value.
Our primary use case of Check Point Application Control is to filter which application categories we want to allow our organization members to have access to so that they are secured. For example, we don't allow access to malicious applications and some categories that could be threats. We only allow organization members to access secure applications and applications that are aligned with the company's strategy. The user interface is easy and dynamic. You can drag objects around the screen to facilitate their use. Besides, it is quite easy to understand and apply changes.
Information Technology Security Specialist at AKBANK TAS
User
2022-08-02T05:24:00Z
Aug 2, 2022
Not all of the company's web traffic goes through Check Point, however, on the significant web traffic side, we solve security needs with Check Point. Especially if you are going to give broad permissions, you need to block dangerous applications at the very beginning of your rule set. In this context, we use Check Point to block on an application basis. Sometimes there are general accesses. Like Azure, we can only give access by selecting the relevant applications. Check Point is a very good solution because these applications are constantly updating the IP lists on the backend.
On our infrastructure, we installed the Check Point 6200 appliance as our primary firewall. It is deployed in a distributed mode, with the security gateway and management running on separate machines. Our major purpose is to limit web access from internal networks. Using application control, we blocked the use of peer-to-peer applications such as torrent from our networks and allowed only youtube.com from the media streaming category, resulting in a significant improvement in bandwidth. Aside from these numerous categories, we blocked a large number of high-risk applications from access our network.
In our company, when acquiring Check Point products to be able to have perimeter protection for our teams, both cloud and on-premise, we are able to carry out greater protection with Check Point's gateway, integrated with access control. It is a great help, in generating granularity policies and blocking specific applications for different internal departments in our company. It's easy to use, included in our gateway, and intuitive. You can also search for a lot of information from the manufacturer to carry out the implementation with best practices.
Our use case for Check Point Application Control is to be able to filter and control all the categories of applications that we want to allow in our organization so that users have the necessary access and permissions and have security in using an application. We only allow members of the organization access secure applications, another benefit is that bandwidth can be limited by restricting applications and unnecessary downloads of applications that are not for business use by controlling the access of gateway apps
Cloud Support at a tech company with 51-200 employees
User
2022-04-13T17:33:00Z
Apr 13, 2022
I use the product to provide accessibility and security to my networks and also in the VPN part. In this way, I can have more granular control that gives me the opportunity to segment departments or teams that have different rules. In this way, it does not affect different departments with some policies more restrictive than others as in the case of management and any other department. I can also facilitate nautical policies that allow me to expose certain services through management. Check Point management is one of the best options.
Cloud Support at a tech company with 51-200 employees
User
2022-04-13T17:33:00Z
Apr 13, 2022
I use it to provide accessibility and security to my networks, also in the VPN part, since this enables me to have more granular controls that give me the opportunity to segment departments or teams that have different rules. In this way, it does not affect different departments with more restrictive policies than others like in the cases of management and any other department. I can also facilitate nautical policies that allow me to expose certain services through management. Checkpoint management is one of the best options.
The product is standard software in our organization. With this solution, you can actually control approved software for use by particular individuals in your company. You can offer it to certain users and disallow it for others.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
2021-11-19T03:21:00Z
Nov 19, 2021
It is one of the main solutions that we have applied in our offices for the administrative control of access to specific services social networks within the corporation, viewing of videos or services that in some way distract the worker from their activities. It's also facilitated us with the ability to separate the databases by a gateway which makes the administration and the permissions granted to the end-users much easier.
Application and URL filtering is the perfect combination to block unwanted application and web browsing traffic based on the defined policy. Customers who don't have a dedicated proxy can utilize Check Point's Next Generation Firewall as an Application Control. It allows users to define policies based on source IP, user role, or group, which can easily identify traffic flow with SAML. You can allow or block traffic coming or going out to the internet for specific applications or websites. Most organizations take advantage of application control, which provides the most efficient and accurate results to block or allow application traffic. No organization requires entire access for an application running as that would cause more risk, which is not desirable. If we want to allow certain required applications, with Check Point, application control is possible. For customers that have database servers and public-facing servers and want to provide access to specific services, Check Point is perfect. With application control and URL filtering, it becomes possible to block/allow applications and sub-applications the maximum flexibility to allow for policy-based access roles. The solution offers user notifications for blocked access, time-defined policies, and bulk categorization of malicious applications.
Before using this solution, I needed to have other network components that would allow me to block or restrict access to unauthorized sites, which generated a very high cost in terms of licensing and maintenance. Now, I can control authorized and unauthorized access to my end-users, and I can control bandwidth and assign a defined bandwidth to guarantee the operation of my company. With this solution, I was able to establish and guarantee the security of my end-users using the categories and definitions within the solution. I'm able to easily identify high-risk sites, as well as sites not allowed for explicit content.
System and Network Administrator at Auriga - The banking e-volution
Real User
2021-05-08T13:30:00Z
May 8, 2021
The Check Point Application Control solution is used by us on two firewall clusters. It is used both on the inside and on the outside. Analyzing internal traffic helps us to understand which applications are used within our network. It does more than simply allowing or blocking traffic. It provides a report on how much these applications consume on the network and where they are used. On the foreign side, we only allow applications considered safe and we always use the report to identify external attacks or improper use from the inside out.
Technology consultant at a tech services company with 501-1,000 employees
Real User
2021-03-19T08:58:00Z
Mar 19, 2021
We use Check Point in our internal network, as well as on the perimeter & we have used the Application control-blade on the internal firewall. All of our user traffic will be terminated at the internal firewall, hence we have done primary filtering of traffic on the internal firewall only. Basically, on the internal firewall, we are blocking all social networking sites, remote meeting applications, adult content, & torrent applications. This restriction helps us to save our bandwidth as well to ensure that users follow & maintain work ethics at the office premises.
Our primary use case of Check Point Application Control is to filter which application categories we want to allow our organization members to have access to so that they are secured. For example, we don't allow access to malicious applications and some categories that could be threats. We only allow organization members to access secure applications and applications that are aligned with the company's strategy. It also enables us to save internet bandwidth by filtering applications that are not work-related.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Application Control software blade is one of the numerous blades activated on the NGFWs and serves for the security improvement in the application detection, categorization, and filtration.
The Check Point Application Control blade provides application security and identity control for our organization. It gives us very easy to create policies based on users and groups. We use Critical Risk and Anonymizers, P2P file sharing, Spyware, and Remote admin categories. We use Application Control in two ways, separate rule base and with access policy as well. My all over experience is good.
Check Point Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policies, based on users or groups, to identify, block or limit usage of thousands of Web applications and widgets.Learn more about Application control software
This solution's primary use is to provide real-time visibility and granular control over application usage in my company.
The solution's primary use cases include application visibility and control, enforcement of security policies, risk mitigation, and bandwidth management.
The primary use case of Check Point Application Control is to enhance network security by providing granular control over applications and web traffic. It prevents unauthorized access by allowing or blocking applications based on predefined policies, ensuring that only authorized applications are used within the network. Additionally, it improves productivity by restricting access to non-business-related applications and websites, helps maintain compliance with regulatory requirements and internal policies by monitoring and controlling application usage, and mitigates risks by detecting and preventing the use of high-risk applications, thereby reducing the likelihood of malware and data breaches. This comprehensive control over application usage makes us more secure and efficient.
We use Check Point Application Control to block and protect our website which are not required for user access.
The companies have implemented this security tool, due to several factors. The companies develop or buy applications for different functions or needs and this is where Check Point Application Control comes in. The tool has allowed us to be able to identify and classify all those applications that are being used within the network, which simplifies the work of managing bandwidth, and also helps us to have better control over security since it allows us to allows you to block or allow access to our network.
I am using Check Point Application Control for controlling streaming, social media, and video sites. Additionally, we control VPNs and peer-to-peer sites. We use it to control sites that use a lot of bandwidth.
Check Point has provided us with a Check Point management server tool where we manage our Gateways. It helped us limit the applications, sites, and different actions that are part of the users' daily lives. We can limit with granularly the applications that users access. Segmentation is key. We managed to divide everything by department to be able to generate the security that each one requires. Now, managers have greater flexibility.
We needed to allow, control, block, and access specific applications based on the policies that the institution has as a baseline. Given this need, we have tried, analyzed, and tested various solutions that could comply with said internal directive. We have sought solutions that allow us greater visibility and control over applications on the network, improving the protection of applications and the security of the organization in general. We've validated the software's great potential at detecting malicious events on unauthorized applications or resources.
The company-based applications have benefited from this software in the enhancement of security and performance acceleration. Check Point Application Control monitors all tools' performance and operations in all enterprise activities. The reported performance metrics help us allocate resources and unlock hidden business potentials. Over the past year, this product has boosted the end output of all applications and promoted efficient teamwork. Each tool can easily link and integrate with others with set task objectives.
We needed a solution that would allow us to protect the applications that we were constantly developing. Those applications needed to be classified by categories, including integrity, risk level, and productivity issues, as well as identity per user. We needed all these characteristics to safeguard a library, repository, or platform that could allow us to manage it in a secure, fast, and scalable way. We tried more than one solution that would allow us the required granularity in the teams and management so that we could implement it according to the regulations that we had internally.
This software monitors the performance of applications across the company. It provides comprehensive security for all the tools contributing to the company's growth. Check Point Application Control has created reliable data management policies that guide employees on how to interact effectively with applications. The software assigns each sector the most suitable working tools to easily implement projects and tasks. We were able to customize it and make efficient configurations with data models.
We had the need to control and be able to manage rules in a granular way for maintaining the security and control of the data, management by teams, identity, and applications grouping them by category and thus being able to defend ourselves from threats and malware that wants to enter our infrastructure while reducing the operating cost. Something that we need and want is an inspection of the data. We must see what the different users and applications of our network are sharing, and that is where the control solution brings us that administration value.
Our primary use case of Check Point Application Control is to filter which application categories we want to allow our organization members to have access to so that they are secured. For example, we don't allow access to malicious applications and some categories that could be threats. We only allow organization members to access secure applications and applications that are aligned with the company's strategy. The user interface is easy and dynamic. You can drag objects around the screen to facilitate their use. Besides, it is quite easy to understand and apply changes.
Not all of the company's web traffic goes through Check Point, however, on the significant web traffic side, we solve security needs with Check Point. Especially if you are going to give broad permissions, you need to block dangerous applications at the very beginning of your rule set. In this context, we use Check Point to block on an application basis. Sometimes there are general accesses. Like Azure, we can only give access by selecting the relevant applications. Check Point is a very good solution because these applications are constantly updating the IP lists on the backend.
On our infrastructure, we installed the Check Point 6200 appliance as our primary firewall. It is deployed in a distributed mode, with the security gateway and management running on separate machines. Our major purpose is to limit web access from internal networks. Using application control, we blocked the use of peer-to-peer applications such as torrent from our networks and allowed only youtube.com from the media streaming category, resulting in a significant improvement in bandwidth. Aside from these numerous categories, we blocked a large number of high-risk applications from access our network.
In our company, when acquiring Check Point products to be able to have perimeter protection for our teams, both cloud and on-premise, we are able to carry out greater protection with Check Point's gateway, integrated with access control. It is a great help, in generating granularity policies and blocking specific applications for different internal departments in our company. It's easy to use, included in our gateway, and intuitive. You can also search for a lot of information from the manufacturer to carry out the implementation with best practices.
Our use case for Check Point Application Control is to be able to filter and control all the categories of applications that we want to allow in our organization so that users have the necessary access and permissions and have security in using an application. We only allow members of the organization access secure applications, another benefit is that bandwidth can be limited by restricting applications and unnecessary downloads of applications that are not for business use by controlling the access of gateway apps
I use the product to provide accessibility and security to my networks and also in the VPN part. In this way, I can have more granular control that gives me the opportunity to segment departments or teams that have different rules. In this way, it does not affect different departments with some policies more restrictive than others as in the case of management and any other department. I can also facilitate nautical policies that allow me to expose certain services through management. Check Point management is one of the best options.
I use it to provide accessibility and security to my networks, also in the VPN part, since this enables me to have more granular controls that give me the opportunity to segment departments or teams that have different rules. In this way, it does not affect different departments with more restrictive policies than others like in the cases of management and any other department. I can also facilitate nautical policies that allow me to expose certain services through management. Checkpoint management is one of the best options.
The product is standard software in our organization. With this solution, you can actually control approved software for use by particular individuals in your company. You can offer it to certain users and disallow it for others.
It is one of the main solutions that we have applied in our offices for the administrative control of access to specific services social networks within the corporation, viewing of videos or services that in some way distract the worker from their activities. It's also facilitated us with the ability to separate the databases by a gateway which makes the administration and the permissions granted to the end-users much easier.
Application and URL filtering is the perfect combination to block unwanted application and web browsing traffic based on the defined policy. Customers who don't have a dedicated proxy can utilize Check Point's Next Generation Firewall as an Application Control. It allows users to define policies based on source IP, user role, or group, which can easily identify traffic flow with SAML. You can allow or block traffic coming or going out to the internet for specific applications or websites. Most organizations take advantage of application control, which provides the most efficient and accurate results to block or allow application traffic. No organization requires entire access for an application running as that would cause more risk, which is not desirable. If we want to allow certain required applications, with Check Point, application control is possible. For customers that have database servers and public-facing servers and want to provide access to specific services, Check Point is perfect. With application control and URL filtering, it becomes possible to block/allow applications and sub-applications the maximum flexibility to allow for policy-based access roles. The solution offers user notifications for blocked access, time-defined policies, and bulk categorization of malicious applications.
Before using this solution, I needed to have other network components that would allow me to block or restrict access to unauthorized sites, which generated a very high cost in terms of licensing and maintenance. Now, I can control authorized and unauthorized access to my end-users, and I can control bandwidth and assign a defined bandwidth to guarantee the operation of my company. With this solution, I was able to establish and guarantee the security of my end-users using the categories and definitions within the solution. I'm able to easily identify high-risk sites, as well as sites not allowed for explicit content.
The Check Point Application Control solution is used by us on two firewall clusters. It is used both on the inside and on the outside. Analyzing internal traffic helps us to understand which applications are used within our network. It does more than simply allowing or blocking traffic. It provides a report on how much these applications consume on the network and where they are used. On the foreign side, we only allow applications considered safe and we always use the report to identify external attacks or improper use from the inside out.
We use Check Point in our internal network, as well as on the perimeter & we have used the Application control-blade on the internal firewall. All of our user traffic will be terminated at the internal firewall, hence we have done primary filtering of traffic on the internal firewall only. Basically, on the internal firewall, we are blocking all social networking sites, remote meeting applications, adult content, & torrent applications. This restriction helps us to save our bandwidth as well to ensure that users follow & maintain work ethics at the office premises.
Our primary use case of Check Point Application Control is to filter which application categories we want to allow our organization members to have access to so that they are secured. For example, we don't allow access to malicious applications and some categories that could be threats. We only allow organization members to access secure applications and applications that are aligned with the company's strategy. It also enables us to save internet bandwidth by filtering applications that are not work-related.
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Application Control software blade is one of the numerous blades activated on the NGFWs and serves for the security improvement in the application detection, categorization, and filtration.
The Check Point Application Control blade provides application security and identity control for our organization. It gives us very easy to create policies based on users and groups. We use Critical Risk and Anonymizers, P2P file sharing, Spyware, and Remote admin categories. We use Application Control in two ways, separate rule base and with access policy as well. My all over experience is good.
The primary use case of this solution is security, threat prevention, antivirus, and ransomware. You can use it for everything.