We changed our name from IT Central Station: Here's why
2020-02-05T08:05:07Z

What is your primary use case for Check Point Application Control?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
99 Answers

author avatar
Top 5LeaderboardUser

It is one of the main solutions that we have applied in our offices for the administrative control of access to specific services social networks within the corporation, viewing of videos or services that in some way distract the worker from their activities. It's also facilitated us with the ability to separate the databases by a gateway which makes the administration and the permissions granted to the end-users much easier.

2021-11-19T03:21:00Z
author avatar
Top 5LeaderboardReal User

Application and URL filtering is the perfect combination to block unwanted application and web browsing traffic based on the defined policy. Customers who don't have a dedicated proxy can utilize Check Point's Next Generation Firewall as an Application Control. It allows users to define policies based on source IP, user role, or group, which can easily identify traffic flow with SAML. You can allow or block traffic coming or going out to the internet for specific applications or websites. Most organizations take advantage of application control, which provides the most efficient and accurate results to block or allow application traffic. No organization requires entire access for an application running as that would cause more risk, which is not desirable. If we want to allow certain required applications, with Check Point, application control is possible. For customers that have database servers and public-facing servers and want to provide access to specific services, Check Point is perfect. With application control and URL filtering, it becomes possible to block/allow applications and sub-applications the maximum flexibility to allow for policy-based access roles. The solution offers user notifications for blocked access, time-defined policies, and bulk categorization of malicious applications.

2021-09-25T16:15:00Z
author avatar
Top 10User

Before using this solution, I needed to have other network components that would allow me to block or restrict access to unauthorized sites, which generated a very high cost in terms of licensing and maintenance. Now, I can control authorized and unauthorized access to my end-users, and I can control bandwidth and assign a defined bandwidth to guarantee the operation of my company. With this solution, I was able to establish and guarantee the security of my end-users using the categories and definitions within the solution. I'm able to easily identify high-risk sites, as well as sites not allowed for explicit content.

2021-07-15T02:40:00Z
author avatar
Top 5LeaderboardReal User

The Check Point Application Control solution is used by us on two firewall clusters. It is used both on the inside and on the outside. Analyzing internal traffic helps us to understand which applications are used within our network. It does more than simply allowing or blocking traffic. It provides a report on how much these applications consume on the network and where they are used. On the foreign side, we only allow applications considered safe and we always use the report to identify external attacks or improper use from the inside out.

2021-05-08T13:30:00Z
author avatar
Top 5LeaderboardReal User

We use Check Point in our internal network, as well as on the perimeter & we have used the Application control-blade on the internal firewall. All of our user traffic will be terminated at the internal firewall, hence we have done primary filtering of traffic on the internal firewall only. Basically, on the internal firewall, we are blocking all social networking sites, remote meeting applications, adult content, & torrent applications. This restriction helps us to save our bandwidth as well to ensure that users follow & maintain work ethics at the office premises.

2021-03-19T08:58:00Z
author avatar
Top 5LeaderboardReal User

Our primary use case of Check Point Application Control is to filter which application categories we want to allow our organization members to have access to so that they are secured. For example, we don't allow access to malicious applications and some categories that could be threats. We only allow organization members to access secure applications and applications that are aligned with the company's strategy. It also enables us to save internet bandwidth by filtering applications that are not work-related.

2020-10-04T06:40:00Z
author avatar
Top 5LeaderboardReal User

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Application Control software blade is one of the numerous blades activated on the NGFWs and serves for the security improvement in the application detection, categorization, and filtration.

2020-07-30T13:59:00Z
author avatar
Top 5LeaderboardReal User

The Check Point Application Control blade provides application security and identity control for our organization. It gives us very easy to create policies based on users and groups. We use Critical Risk and Anonymizers, P2P file sharing, Spyware, and Remote admin categories. We use Application Control in two ways, separate rule base and with access policy as well. My all over experience is good.

2020-07-30T12:09:00Z
author avatar
Top 5MSP

The primary use case of this solution is security, threat prevention, antivirus, and ransomware. You can use it for everything.

2020-02-05T08:05:07Z
Learn what your peers think about Check Point Application Control. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
564,599 professionals have used our research since 2012.