We are using Check Point Application Control for the last three years.
We are using this feature to gain granular control over URL and web access for users by categorization and known risk level.
In my company, there are multiple departments including HR, IT, and accounting. Different departments need different types of web access. With Check Point Application Control, we provide web access such as hiring applications exclusively to HR, not to other departments such as IT and accounting. Similarly, some websites are not accessible for the HR department but are accessed by IT. In all these scenarios, we implement Check Point Application Control.
We have a deny policy where all known URL threats are by default blocked so that no malicious website can be accessible through the network.
Check Point Application Control provides in-depth visibility of what users are accessing in real-time. We can get reports of top ten users or any specific users, and we can block any particular URL by categorizing or the specific domain.
The reporting is very useful as we must submit those reports to our higher management. We can easily identify the top ten users accessing malicious websites or the top ten risky users. With these reports, we are preventing unauthorized access.
The configuration of Check Point Application Control is straightforward as it is an inbuilt feature of the Next-Generation Check Point Next-Generation Firewall. There are multiple categorized URLs where we can block access with the help of categories.
After deploying Check Point Application Control, we have successfully controlled URL access, web access, and malicious website access for users.
Sometimes by enabling the application inspection, the firewall throughput becomes high in the older versions. This aspect can be improved.
It has been almost more than two years.
Check Point Application Control is stable.
We are using only Check Point Application Control.
We have evaluated Fortinet URL filtering.
Check Point Application Control is very useful, and time is significantly reduced. With this application, we can easily configure the policies and control web access for users.
I advise those who are looking for application control to consider Check Point Application Control feature, which is very easy to deploy and maintain.
On a scale of 1-10, I rate Check Point Application Control an 8.