2020-02-05T08:05:07Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 0

What needs improvement with Check Point Application Control?

Please share with the community what you think needs improvement with Check Point Application Control.

What are its weaknesses? What would you like to see changed in a future version?

5
PeerSpot user
5 Answers
VN
System and Network Administrator at Auriga - The banking e-volution
Real User
Top 5Leaderboard
2021-05-08T13:30:00Z
May 8, 2021

It is hard to say what has to be improved in Check Point Application Control. Occasionally, we have to identify an application that is not registered. I would like to have a periodic update of the applications, perhaps based on a predefined calendar. We would like to have the ability to submit new applications for registration, as well as request the recategorization of URLs.

Search for a product comparison
JM
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
2020-10-04T06:40:00Z
Oct 4, 2020

I think Check Point Application Control is one of Check Point's most complete solutions. It has had a lot of years for improvement. I don't see anything that we need to be improved. It does everything that we would need. It always applies new applications. It does what we need it to do. We don't need to select a specific application if we don't need it, it can be selected by category. The solution is very complete.

Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group
Real User
Top 5
2020-07-30T13:59:00Z
Jul 30, 2020

I think that the pricing for the Check Point products should be reconsidered - we found it to be quite expensive to purchase and to maintain (the licenses and the support services need to be prolonged regularly), or create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers. We also had several support cases opened for software issues, but none of them were connected with the Application Control blade.

Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Real User
Top 5Leaderboard
2020-07-30T12:09:00Z
Jul 30, 2020

Most of the business applications stopped working, we don't know why and we have already escalated to the top level but we still haven't gotten any corrective action on this. They always take logs but after that, there is no resolution. They need to improve this, this will help us a lot. We have not blocked anything on a rule base we have enabled HTTPS on a monitoring mode but still, we are facing issues, and if we add an unknown category on that respective rule only then does it start working.

Ndricim-Danaj - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
MSP
2020-02-05T08:05:07Z
Feb 5, 2020

This solution could be easier to manage. The security features could be enhanced, and the price could be lower as well.

Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
656,862 professionals have used our research since 2012.
Related Questions
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Oct 25, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 19 answers
Ndricim-Danaj - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
Feb 5, 2020
The primary use case of this solution is security, threat prevention, antivirus, and ransomware. You can use it for everything.
Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Jul 30, 2020
The Check Point Application Control blade provides application security and identity control for our organization. It gives us very easy to create policies based on users and groups. We use Critical Risk and Anonymizers, P2P file sharing, Spyware, and Remote admin categories. We use Application Control in two ways, separate rule base and with access policy as well. My all over experience is good.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Oct 25, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 15 answers
Ndricim-Danaj - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
Feb 5, 2020
It's a bit expensive and it could be cheaper, but it's part of business politics.
Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group
Jul 30, 2020
Choosing the correct set of the licenses is essential - without the additional software blade licenses purchased the Check Point gateways are just stateful firewall.
Download Free Report
Download our free Check Point Application Control Report and get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
DOWNLOAD NOW
656,862 professionals have used our research since 2012.