Coming October 25: PeerSpot Awards will be announced! Learn more
2020-02-05T08:05:07Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 2

What is your primary use case for Check Point Application Control?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

5
PeerSpot user
5 Answers
VN
System and Network Administrator at Auriga - The banking e-volution
Real User
Top 5Leaderboard
2021-05-08T13:30:00Z
08 May 21

The Check Point Application Control solution is used by us on two firewall clusters. It is used both on the inside and on the outside. Analyzing internal traffic helps us to understand which applications are used within our network. It does more than simply allowing or blocking traffic. It provides a report on how much these applications consume on the network and where they are used. On the foreign side, we only allow applications considered safe and we always use the report to identify external attacks or improper use from the inside out.

PeerSpot user
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
2020-10-04T06:40:00Z
04 October 20

Our primary use case of Check Point Application Control is to filter which application categories we want to allow our organization members to have access to so that they are secured. For example, we don't allow access to malicious applications and some categories that could be threats. We only allow organization members to access secure applications and applications that are aligned with the company's strategy. It also enables us to save internet bandwidth by filtering applications that are not work-related.

Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group
Real User
Top 5
2020-07-30T13:59:00Z
30 July 20

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Application Control software blade is one of the numerous blades activated on the NGFWs and serves for the security improvement in the application detection, categorization, and filtration.

Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Real User
Top 5Leaderboard
2020-07-30T12:09:00Z
30 July 20

The Check Point Application Control blade provides application security and identity control for our organization. It gives us very easy to create policies based on users and groups. We use Critical Risk and Anonymizers, P2P file sharing, Spyware, and Remote admin categories. We use Application Control in two ways, separate rule base and with access policy as well. My all over experience is good.

Ndricim-Danaj - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
MSP
2020-02-05T08:05:07Z
05 February 20

The primary use case of this solution is security, threat prevention, antivirus, and ransomware. You can use it for everything.

Related Questions
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
Sep 06, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 18 answers
Ndricim-Danaj - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
05 February 20
The primary use case of this solution is security, threat prevention, antivirus, and ransomware. You can use it for everything.
Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
30 July 20
The Check Point Application Control blade provides application security and identity control for our organization. It gives us very easy to create policies based on users and groups. We use Critical Risk and Anonymizers, P2P file sharing, Spyware, and Remote admin categories. We use Application Control in two ways, separate rule base and with access policy as well. My all over experience is good.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Sep 06, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 14 answers
Ndricim-Danaj - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
05 February 20
It's a bit expensive and it could be cheaper, but it's part of business politics.
Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group
30 July 20
Choosing the correct set of the licenses is essential - without the additional software blade licenses purchased the Check Point gateways are just stateful firewall.
Related Articles
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 06, 2021
What is software extensibility? Extensibility is the ability of the software system to allow and accept the significant extension of its capabilities without major rewriting of code or changes in its basic architecture. Extensible systems provide technology, tools, languages designed so that developers can expand or add to their capabilities. What are some of the benefits customers get ou...
Related Articles
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Dec 06, 2021
Software Extensibility: Definition, Attributes and Techniques
What is software extensibility? Extensibility is the ability of the software system to allow...