2020-02-05T08:05:07Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 2
  • 3

What needs improvement with Check Point Application Control?

Please share with the community what you think needs improvement with Check Point Application Control.

What are its weaknesses? What would you like to see changed in a future version?

20
PeerSpot user
20 Answers
SL
Software Engineer at CloudSense
User
Top 5
2022-10-25T06:43:00Z
Oct 25, 2022

The learning curve for new users is challenging since the integrated data models are complicated. The system slows down when the company has a lot of applications. New versions that are upgraded rarely come with new market updates. The cost and deployment capacity is based on the size of the company. The overall performance is excellent when the system administrators from the company work closely with the vendor-customer support team. It has enhanced a secure work environment and enabled employees to focus on more productive tasks.

Search for a product comparison
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
2022-09-06T20:34:00Z
Sep 6, 2022

I would like this layer to be faster to install in the future. The evolution of its equipment and appliances where the solution is executed has improved a lot, however, it is necessary to increase that capacity. Some competitors do it just as well and in that layer, are faster to apply their changes. These would give greater value and would be a differentiator. Among other things, I would like this integrated solution to manage from mobile devices in an optimized way and be able to administer from anywhere in the world.

Swetha Yadhav - PeerSpot reviewer
Project Engineer at Wipro Limited
Real User
Top 10
2022-08-03T15:22:00Z
Aug 3, 2022

Sometimes, documentation is not accurate and with the support issue we have to wait a long time for an engineer to understand the errors. I would like to see if they can help with the issue of service and more qualified staff. They need to have good service with Check Point products. The load balancer functionality for application traffic might be a better option. Configuration and deployment are a little bit difficult. This product works only when the user is in traffic flow through NGFW. Sometimes there are more than one category tag to an application which can be tricky.

Information Technology Security Specialist at AKBANK TAS
User
Top 10
2022-08-02T05:24:00Z
Aug 2, 2022

The objects found now have large applications or general category definitions that are completely determined and organized by Check Point. It would be nice if there was a platform and small application owners could come and send their own applications' name and IP information from there. If we could use application objects directly in our rule sets in Check Point in those small companies, that would be ideal. A few more layered objects could be created for Azure in large applications. It would be nice if firewall administrators could see parser information such as IP behind these objects.

SM
Network Engineer at Fujairah Port
User
Top 5
2022-07-14T14:12:00Z
Jul 14, 2022

1 – Custom applications for internal applications must be defined frequently. This should be improved. It would be much better if Check Point could detect internal applications and automatically bypass them. 2- Without HTTPS decryption, the majority of App Control recognition features will be rendered ineffective, as everything has been encrypted thus far. 3-An application may have multiple category tags, which is confusing. These areas should be improved. It satisfies all of our needs except for this. Check Point Application Control assists us in controlling bandwidth and restricting internet access for our infrastructure.

LD
Cloud Support - Security Admin at a tech company with 1-10 employees
User
Top 5Leaderboard
2022-06-19T17:08:00Z
Jun 19, 2022

Something important to mention is the improvement at the support level. It could be more advanced. Sometimes the responses are somewhat slow or based on a schedule that is not always the same as the companies. It's difficult to generate a session with them to better explain your needs. We would also like the costs to be more comfortable. Although they are not different from other security tools, they could have improvements to provide greater interest to customers who are interested or loyal to Check Point's products.

Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
655,465 professionals have used our research since 2012.
Adriamcam - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
2022-05-23T21:24:00Z
May 23, 2022

The tool has a number of features necessary for good business security. Nevertheless, it is always good to add several features and maintain an open and adequate performance for the machines where said software is installed since it will be able to present high performance. However, so far, Check Point Application Control satisfactorily meets the needs of a company in security. At the moment I don't see the need to add new features. That said, you always have to be one step ahead.

alvarado - PeerSpot reviewer
Cloud Support Leader at a tech company with 51-200 employees
User
Top 5Leaderboard
2022-04-13T17:33:00Z
Apr 13, 2022

We would like to see a greater facility or some corrector that if we apply a change that affects any other policy, it is in constant review and notifies you before applying the changes. This would be extremely impressive and useful for administrators since it would save us time for the publication and installation of the changes on the Check Point Gateways. It would also be good to find more documentation for implementations in the cloud - in my case Microsoft Azure. It has been quite difficult when looking for specific documentation.

alvarado - PeerSpot reviewer
Cloud Support Leader at a tech company with 51-200 employees
User
Top 5Leaderboard
2022-04-13T17:33:00Z
Apr 13, 2022

We would like to see a greater facility or some corrector that, if we apply a change that affects any other policy, it is in constant review and notifies you before applying the changes. This would be extremely impressive and useful for administrators since it would save us time in the publication and installation of the changes on the Check Point gateways. It would also be good to find more documentation for implementations in the cloud - in my case Microsoft Azure. When looking for specific documentation, it has been quite difficult for me.

JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services
Real User
Top 5Leaderboard
2022-04-12T14:43:52Z
Apr 12, 2022

We haven't had any issues with the product. There aren't really any features missing. We would like the product to be a bit more user-friendly in general.

AL
ITSD Analyst Support Group at Reitmans Canada Ltée/Ltd
User
2022-01-24T14:39:24Z
Jan 24, 2022

This has been the best experience I have had with this software and company 

Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Community Manager
Jan 25, 2022

@reviewer1767168 thanks for the answer! Can you please describe some specific/outstanding points that you have liked about the product?

PeerSpot user
Manuel Briones - PeerSpot reviewer
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Top 5Leaderboard
2021-11-19T03:21:00Z
Nov 19, 2021

With Check Point we are more protected, however, one of the issues is the cost. They are expensive products due to the fact that we have to buy blades for each solution that we want to integrate into our corporate. Without a doubt, it is worth it, however, it is an important point that could be considered. Likewise, nowadays a 2MFA solution could be integrated to Check Point since nowadays remote connections made with remote workers are required to protect the extension from the office to your home through a VPN connection.

PRAPHULLA  DESHPANDE - PeerSpot reviewer
Associate Consult at Atos
Real User
Top 5Leaderboard
2021-09-25T16:15:00Z
Sep 25, 2021

The working principle of Check Point Application Control is far different from all other vendors in the market. It basically works in parallel with security rules. Every time packet must go from policy lookup into security rules. It sometimes leads to a troubleshooting phase for which we can create application traffic. SD-WAN functionality can be added. Direct API integration for customized application features can be added. Load balancer functionality for application traffic might be a better option.

reviewer1626546 - PeerSpot reviewer
Network Head at SUKARNE
User
Top 10
2021-07-15T02:40:00Z
Jul 15, 2021

It's important that there is the option to validate the policies before applying them since it is very annoying and causes a waste of time to apply a new policy or rule and afterward receive an error that the policy has failed. It is important that, if you are being notified of the modifications in the automatic policies that were updated, it's clear in terms of the content that is included as well as the applications that have been modified for being malicious or not. Without a doubt, these would be contributions that would greatly benefit the solution's operation within my company.

VN
System and Network Administrator at Auriga - The banking e-volution
Real User
Top 5Leaderboard
2021-05-08T13:30:00Z
May 8, 2021

It is hard to say what has to be improved in Check Point Application Control. Occasionally, we have to identify an application that is not registered. I would like to have a periodic update of the applications, perhaps based on a predefined calendar. We would like to have the ability to submit new applications for registration, as well as request the recategorization of URLs.

Swapnil Talegaonkar - PeerSpot reviewer
Technology consultant at a tech services company with 501-1,000 employees
Real User
Top 5Leaderboard
2021-03-19T08:58:00Z
Mar 19, 2021

We expect applications to be updated regularly.

JM
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
2020-10-04T06:40:00Z
Oct 4, 2020

I think Check Point Application Control is one of Check Point's most complete solutions. It has had a lot of years for improvement. I don't see anything that we need to be improved. It does everything that we would need. It always applies new applications. It does what we need it to do. We don't need to select a specific application if we don't need it, it can be selected by category. The solution is very complete.

Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group
Real User
Top 5
2020-07-30T13:59:00Z
Jul 30, 2020

I think that the pricing for the Check Point products should be reconsidered - we found it to be quite expensive to purchase and to maintain (the licenses and the support services need to be prolonged regularly), or create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers. We also had several support cases opened for software issues, but none of them were connected with the Application Control blade.

Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Real User
Top 5Leaderboard
2020-07-30T12:09:00Z
Jul 30, 2020

Most of the business applications stopped working, we don't know why and we have already escalated to the top level but we still haven't gotten any corrective action on this. They always take logs but after that, there is no resolution. They need to improve this, this will help us a lot. We have not blocked anything on a rule base we have enabled HTTPS on a monitoring mode but still, we are facing issues, and if we add an unknown category on that respective rule only then does it start working.

Ndricim-Danaj - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
MSP
2020-02-05T08:05:07Z
Feb 5, 2020

This solution could be easier to manage. The security features could be enhanced, and the price could be lower as well.

Related Questions
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Oct 25, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 19 answers
Ndricim-Danaj - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
Feb 5, 2020
The primary use case of this solution is security, threat prevention, antivirus, and ransomware. You can use it for everything.
Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Jul 30, 2020
The Check Point Application Control blade provides application security and identity control for our organization. It gives us very easy to create policies based on users and groups. We use Critical Risk and Anonymizers, P2P file sharing, Spyware, and Remote admin categories. We use Application Control in two ways, separate rule base and with access policy as well. My all over experience is good.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Oct 25, 2022
Hi Everyone, What do you like most about Check Point Application Control? Thanks for sharing your thoughts with the community!
2 out of 19 answers
Ndricim-Danaj - PeerSpot reviewer
Senior Security Engineer at a tech services company with 51-200 employees
Feb 5, 2020
This solution is stable and we have not had any issues.
Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Jul 30, 2020
With Check Point Application Control we can say we improved our legacy and have made them more secure. Now we are able to allow specific applications on respective service and we are allowed those respective services only.
Download Free Report
Download our free Check Point Application Control Report and get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
DOWNLOAD NOW
655,465 professionals have used our research since 2012.