What is our primary use case?
My main use case for
Check Point Application Control is to provide granular visibility and application monitoring in the organization.
Granular visibility and application monitoring help my organization by allowing us to control application usage through policies, so we can allow, block, limit, or terminate based on our requirements for the organizations and for particular users.
What is most valuable?
A specific example where I had to block or limit usage with
Check Point Application Control is when we use it to block gaming and social applications during office hours to promote employee efficiency during work hours.
This has been effective for our organization as we've seen an improvement in employee productivity and a reduction in bandwidth usage because during work hours, we have fewer people using gaming and social apps.
We've seen close to 50% improved productivity in the organization, with most of the network traffic now being channeled to productive use cases as opposed to earlier when most of the traffic was to social apps and gaming sites, which I measured through consistent reporting.
The best feature Check Point Application Control offers, in my experience, is application control, which I believe is the main use case for it.
Application visibility works in practice for me by giving us real-time insights into which applications are being used on the network.
We usually use the application visibility reports on a weekly basis to assess network usage and application usage, which helps us keep track of overall performance.
I rely on its management feature, which provides control over these applications.
Check Point Application Control has positively impacted our organization by improving security, improving compliance, and reducing the risk of insider threats through applications.
Regarding compliance, it helps us to meet our regulatory requirements within the organization and work policies as related to applications, reducing security incidents as we successfully block applications that are not allowed.
What needs improvement?
One area for improvement in Check Point Application Control would be the behavioral analysis of applications.
I'd like the behavior analysis to better identify potentially malicious activity within the applications that are allowed in the company.
I would also like to see it provide more intelligent recommendations for application control, as this would assist my team in daily operations.
For how long have I used the solution?
I have been using Check Point Application Control for about two years.
What was my experience with deployment of the solution?
We have had to reach out to customer support, and they have been responsive.
What do I think about the stability of the solution?
Check Point Application Control has not experienced any downtime or major issues in my environment.
What do I think about the scalability of the solution?
Its scalability has met my needs as my organization has grown or changed.
How are customer service and support?
We have had to reach out to customer support, and they have been responsive.
I would rate the customer support of Check Point Application Control an eight out of ten.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Before Check Point Application Control, we were using Microsoft Office and Fortinet, and we switched to experience newer technology and to meet our project queries.
How was the initial setup?
The initial setup with Check Point Application Control was straightforward.
What was our ROI?
I do not have insights regarding the return on investment since implementing Check Point Application Control.
What's my experience with pricing, setup cost, and licensing?
The experience with pricing, setup costs, and licensing for Check Point Application Control was straightforward.
Which other solutions did I evaluate?
We evaluated Fortinet and Palo Alto before choosing Check Point Application Control.
What other advice do I have?
I recommend others looking into using Check Point Application Control to basically try it out, as it's one of those tools that can enhance application integrity within one's organization.
On a scale of one to ten, I would rate Check Point Application Control an eight out of ten.
I chose eight out of ten because those two points are areas of improvement that I would like to see addressed.
We are a partner of Check Point.
Overall, Check Point Application Control is a great tool that one can use in their organization.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.