2020-02-05T08:05:07Z

What do you like most about Check Point Application Control?

Miriam Tover - PeerSpot reviewer
  • 0
  • 3
PeerSpot user
25

25 Answers

AshleyMorales - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-10-30T14:39:00Z
Oct 30, 2023

It has many important features that have greatly helped the company and the IT department.

Search for a product comparison
LuisNeves - PeerSpot reviewer
Real User
Top 20
2023-03-09T22:04:06Z
Mar 9, 2023

The most valuable feature of Check Point Application Control is VPN access and the ability to lock out sites we do not want users to have access. The reporting monitoring software in Check Point Application Control is fantastic. For example, log filtering is beneficial.

NG
User
Top 5Leaderboard
2023-02-24T04:32:00Z
Feb 24, 2023

The most important characteristic is granularity, which allows our teams to have different security profiles depending on the department to be protected.

Edwin Solano Salmeron - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-02-08T15:19:00Z
Feb 8, 2023

One of the greatest capacities and the benefits it gives us is the ability to control applications based on defining access or denial policies in specific applications, groups, or category profiles.

SF
User
Top 5
2022-12-08T14:22:00Z
Dec 8, 2022

It ensures that the health of each application can handle the set tasks and projects without any challenges.

Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-11-09T04:19:00Z
Nov 9, 2022

The most outstanding feature is the Check Point APK wiki.

Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
SL
User
Top 5
2022-10-25T06:43:00Z
Oct 25, 2022

This platform has fully secured our applications with very powerful firewall security upgrades.

Jonathan Ramos G. - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-09-06T20:34:00Z
Sep 6, 2022

The best value we have is their actionable reports on user analytics, events, and activity that are extracted from their database.

Swetha Yadhav - PeerSpot reviewer
Real User
Top 10
2022-08-03T15:22:00Z
Aug 3, 2022

We can easily switch from a classical firewall to a next-gen firewall using application security.

User
Top 10
2022-08-02T05:24:00Z
Aug 2, 2022

It does not require a lot of work to be activated and used.

SM
User
Top 5
2022-07-14T14:12:00Z
Jul 14, 2022

We can control bandwidth and high-risk application access from our network using application control.

LD
User
Top 5Leaderboard
2022-06-19T17:08:00Z
Jun 19, 2022

Its implementation is simple.

Adrian Cambronero - PeerSpot reviewer
Reseller
Top 5Leaderboard
2022-05-23T21:24:00Z
May 23, 2022

It also helps us implement changes very quickly and make people more focused on work.

DAlvarado - PeerSpot reviewer
User
Top 5
2022-04-13T17:33:00Z
Apr 13, 2022

It has helped us to have greater control and security in the organization.

DAlvarado - PeerSpot reviewer
User
Top 5
2022-04-13T17:33:00Z
Apr 13, 2022

It has helped us have greater control and security in the organization. This has encouraged us to look for better policies or regulations that help us protect all the information of our services.

JamesYa - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-04-12T14:43:52Z
Apr 12, 2022

Its initial setup is very simple and straightforward.

MB
User
2021-11-19T03:21:00Z
Nov 19, 2021

They have an excellent support team. They are fast and it is easy to escalate any situation.

PD
Vendor
2021-09-25T16:15:00Z
Sep 25, 2021

The product offers easy-to-install policies and makes it simple to troubleshoot application-related traffic.

reviewer1626546 - PeerSpot reviewer
User
2021-07-15T02:40:00Z
Jul 15, 2021

The automatic updates of new applications and signatures guarantee protection at all times without the need to apply a change manually.

VN
Real User
2021-05-08T13:30:00Z
May 8, 2021

The most important feature, in my opinion, regarding Check Point Application Control is the granularity and the great variety of applications and sub-applications recognized.

ST
Real User
2021-03-19T08:58:00Z
Mar 19, 2021

This product logs & monitors event traffic for each application, giving us better visibility.

JM
Real User
Top 5
2020-10-04T06:40:00Z
Oct 4, 2020

Check Point enables us to save internet bandwidth. The administration offers good guidance. We don't want the employees to access social networking on work computers because it will distract them from their jobs, so we can block that. It also helps us to implement changes very quickly and to get people to be more focused on the job.

OP
Real User
2020-07-30T13:59:00Z
Jul 30, 2020

The overall security of the environment has been greatly improved by the Check Point NGFWs. Before implementing the Check Point solutions, we relied on the Cisco ACLs and Zone-Based firewalls configured on the switches and routers, which in fact a simple stateful firewall, and currently appear to be not an efficient solution for protecting from the advanced threats.

KP
Real User
2020-07-30T12:09:00Z
Jul 30, 2020

With Check Point Application Control we can say we improved our legacy and have made them more secure. Now we are able to allow specific applications on respective service and we are allowed those respective services only.

ND
MSP
2020-02-05T08:05:07Z
Feb 5, 2020

This solution is stable and we have not had any issues.

Check Point Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policies, based on users or groups, to identify, block or limit usage of thousands of Web applications and widgets.Learn more about Application control software
Download Check Point Application Control ReportRead more