What is our primary use case?
My main use case for Check Point Application Control is controlling application access as per client requirements. The LAN users try to access various applications randomly, but with respect to business requirements, users should access only business applications such as Teams and FTP. For the marketing team specifically, they should have access to Facebook, while other users should not have access to Facebook and social media platforms. We have implemented this type of use case for the client.
This use case fits into my daily workflow by providing a particular scenario where Check Point Application Control made a difference for my client. For example, the marketing team has access to Facebook and other social media platforms for marketing purposes, while other users can only access business applications such as Teams. This provides a granular level of control over which applications users can access. With Facebook, users can view posts but cannot post anything or chat on the application, achieving granular level control in particular applications.
What is most valuable?
Check Point Application Control offers features that control around 4,000 users through the Check Point firewall. This application control is one of the blades of the Check Point firewall, which helps us control user traffic based on which applications users should access and which they should not, with respect to company or organization compliance policies.
Changes in network performance are noticeable after implementing Check Point Application Control. Restricting users from visiting unnecessary applications improves the bandwidth, meaning the bandwidth is utilized only for desired applications or required tasks.
Check Point Application Control has positively impacted my organization, as I have seen improvements in security and compliance. Another important factor is that unnecessary bandwidth is not getting utilized; only the required applications get higher priority. For example, Teams voice calling takes priority. If users wanted to browse on YouTube and stream videos, that would consume bandwidth, but after blocking unwanted social media platforms and streaming sites, we prevent unnecessary bandwidth utilization, allowing it to be used for desired tasks.
What needs improvement?
Check Point Application Control can be improved, particularly in policy management. When we add applications in the policy, we currently have the option to select individual applications, but a feature allowing categorization of applications based on types, such as social media applications, would make it easier to add multiple or bulk applications in the policy. This feature would be very valuable if introduced.
Feedback from management about how these changes improved productivity and network performance has been positive. Users were spending their time watching videos on YouTube or streaming content, wasting time on Instagram and Facebook while in the office. Managers complained about this, leading to compliance policies being defined to restrict access to these kinds of applications.
For how long have I used the solution?
I have been using Check Point Application Control for more than one and a half years as an administrator.
What do I think about the stability of the solution?
Check Point Application Control is stable; I have not faced downtime or issues with reliability.
What do I think about the scalability of the solution?
The scalability of Check Point Application Control is good. I have not needed to scale up or down, and the process has been smooth.
How are customer service and support?
Customer support for Check Point Application Control is fair and good, and I have reached out to them with satisfactory results.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have not previously used a different solution before Check Point Application Control.
How was the initial setup?
The initial setup with Check Point Application Control is not very complex. If you know Check Point firewall, then it is easy to implement.
What about the implementation team?
If you want to implement Check Point Application Control, I advise you to implement HTTPS inspection for it to work 100% perfectly. Without HTTPS inspection, it may not function perfectly, as it will scan or judge applications based on their ratings. Additionally, implementing HTTPS inspection will yield better outputs and correct results.
What was our ROI?
I have seen a return on investment since implementing Check Point Application Control. We can say that 4,000 users are now accessing only legitimate business applications rather than wasting time on other applications that utilize unnecessary bandwidth. If we hadn't implemented Application Control, we might have needed to increase bandwidth for the users, which saved costs from that perspective. Additionally, users stay focused on their tasks, ultimately helping the organization save time, and from a security perspective, there are no disruptions seen.
What's my experience with pricing, setup cost, and licensing?
The pricing, setup cost, and licensing of Check Point Application Control are higher than other vendors, but it justifies the features offered. The licensing is straightforward.
Which other solutions did I evaluate?
I evaluated Palo Alto before choosing Check Point Application Control. I noticed that in Palo Alto, we don't get a granular level of application management as we do in Check Point, which has a large database for the applications, making it easier to implement policies.
What other advice do I have?
The process for setting up specific rules for user groups is straightforward. To work efficiently, we have to implement HTTPS inspection, which is important to work perfectly. The rest of the configuration process is very straightforward.
That level of detail is important for my clients because it prevents users from posting any internal information on social media platforms, which is crucial for our organization.
We are a partner of Check Point, so we have a business relationship with this vendor beyond just being a customer.
I use other tech products such as FortScout, FortiADC, and Netskope.
You can use my real name and company name when publishing my review.
On a scale of 1-10, I rate Check Point Application Control a 9.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner