IT Central Station is now PeerSpot: Here's why

Check Point Application Control OverviewUNIXBusinessApplication

Check Point Application Control is #1 ranked solution in top Application Control tools. PeerSpot users give Check Point Application Control an average rating of 9.0 out of 10. Check Point Application Control is most commonly compared to WatchGuard Application Control: Check Point Application Control vs WatchGuard Application Control. Check Point Application Control is popular among the large enterprise segment, accounting for 61% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a comms service provider, accounting for 31% of all views.
Check Point Application Control Buyer's Guide

Download the Check Point Application Control Buyer's Guide including reviews and more. Updated: August 2022

What is Check Point Application Control?


Check Point Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policies, based on users or groups, to identify, block or limit usage of thousands of Web applications and widgets.

Learn more about Application control software

Check Point Application Control Customers
SEB, Luma Arles, Terma, Aerospace, Midwest Rubber
Check Point Application Control Video

Archived Check Point Application Control Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Real User
Top 5Leaderboard
We can filter a search based on risk level to see all applications at a certain risk level
Pros and Cons
  • "With Check Point Application Control we can say we improved our legacy and have made them more secure. Now we are able to allow specific applications on respective service and we are allowed those respective services only."
  • "Most of the business applications stopped working, we don't know why and we have already escalated to the top level but we still haven't gotten any corrective action on this. They always take logs but after that, there is no resolution."

What is our primary use case?

The Check Point Application Control blade provides application security and identity control for our organization. It gives us very easy to create policies based on users and groups. We use Critical Risk and Anonymizers, P2P file sharing, Spyware, and Remote admin categories. We use Application Control in two ways, separate rule base and with access policy as well. My all over experience is good.  

How has it helped my organization?

With Check Point Application Control we can say we improved our legacy and have made them more secure. Now we are able to allow specific applications on respective service and we are allowed those respective services only. 

With Application Control we have visibility into who is accessing which application but our pain area is still with HTTPS inspection. 

Overall, Application Control is a very good blade and it is very helpful in our complex environment. We can restrict our site to site rule as well.

What is most valuable?

The Check Point Application control database contains each and every application and category and each of the applications and categories describe the additional category and also a risk level. The database updates regularly. It gives us the updated and latest lists of applications that are widely used. We can filter a search based on risk level, risk level 5 to see all applications with that risk level. We can also see the description of the risk level with the lag line. 

What needs improvement?

Most of the business applications stopped working, we don't know why and we have already escalated to the top level but we still haven't gotten any corrective action on this. They always take logs but after that, there is no resolution. They need to improve this, this will help us a lot. We have not blocked anything on a rule base we have enabled HTTPS on a monitoring mode but still, we are facing issues, and if we add an unknown category on that respective rule only then does it start working.

Buyer's Guide
Check Point Application Control
August 2022
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: August 2022.
619,967 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Check Point for four years. 

What do I think about the stability of the solution?

Stability is good. 

How are customer service and support?

Support is genuinely not good on Application Control.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

We initially implemented it with a vendor. 

What was our ROI?

We have seen ROI.

What other advice do I have?

They have to improve more on the Application Control blade.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ndricim-Danaj - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
MSP
Stable, scales well, and you can use it to protect against everything
Pros and Cons
  • "This solution is stable and we have not had any issues."
  • "The initial setup was a bit difficult."

What is our primary use case?

The primary use case of this solution is security, threat prevention, antivirus, and ransomware. You can use it for everything.

What is most valuable?

The most valuable feature is the protection from threats.

What needs improvement?

This solution could be easier to manage. 

The security features could be enhanced, and the price could be lower as well.

For how long have I used the solution?

I have been familiar with this solution for a year and a half.

What do I think about the stability of the solution?

This solution is stable and we have not had any issues.

What do I think about the scalability of the solution?

This solution scales nicely.

How are customer service and technical support?

We have not contacted technical support as of yet.

How was the initial setup?

The initial setup was a bit difficult. Every product has its own difficulties and many products are not equal to each other, which is the reason why it was a bit difficult. 

You have to know the features and where they are located and how they work, the logic and even with the logic you have, you don't know the configuration.

The deployment took one week.

What about the implementation team?

We have our team. We implemented this solution ourselves.

What's my experience with pricing, setup cost, and licensing?

It's a bit expensive and it could be cheaper, but it's part of business politics.

Which other solutions did I evaluate?

We did evaluate other options but they are approximately the same. They may have some differences, but at first glance, they don't appear to have differences in the functions.

What other advice do I have?

It's a good solution and I suggest it. In general, it can be improved but it's good enough.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user