Application Control Software Blade
The Check Point Application Control Software Blade provides the industry's strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policies—based on users or groups—to identify, block or limit usage of over 4,800 Web 2.0 applications and 300,000 widgets.The Application Control Software Blade is a key component of the Secure Web Gateway Appliance.
Granular application control
- Granular control of social networks, application and features within applications - identify, allow, block or limit usage
- User and group granularity in policy and reporting
- Real time user alerts and education on risks and company policies with UserCheck
- Intuitive and insightful granular reports and forensic tools
Largest application library with AppWiki
- Leverages the world's largest application library with over 4,800 Web 2.0 applications and 300,000 social network widgets
- Intuitively grouped in over 150 categories—including Web 2.0, IM, P2P, Voice & Video and File Share
- Embrace the power of Web 2.0 while protecting against threats and malware
Integrated into Check Point Software Blade Architecture
- Centralized management of security policy via a single console
- Activate application control on any Check Point security gateway
- Also available as a part of the Check Point Secure Web Gateway appliance
Application detection and usage control
Enables application security policies to identify, allow, block or limit usage (based on bandwidth and/or time) of thousands of applications, including Web 2.0 and social networking, regardless of port, protocol or evasive technique used to traverse the network. Combined with identity awareness capabilities, IT administrators can create very granular policy definitions. User and group application usage is controlled according to user or group needs and applications’ characteristics in terms of security, productivity and resource utilization.

Easily define application-based policies per user or group directly from the firewall.
AppWiki application classification library
Applications are classified into more than 150 categories, based on diverse criteria such as applications’ type, security risk level, resource usage, productivity implications and others. To support the dynamic nature of Internet applications, AppWiki is continuously updated.

AppWiki: Industry's largest application classification library
Inspect SSL Encrypted Traffic
Scan and secure SSL encrypted traffic passing through the gateway.
Scan and secure SSL encrypted traffic passing through the gateway. When traffic is passed through, the gateway decrypts the traffic with the sender’s public key, inspects and protects, then re-encrypts, sending the newly encrypted content to the receiver.
For example, traffic to Facebook may be over HTTP (clear) or HTTPS (encrypted). If the policy blocks usage of Facebook games, it doesn’t matter whether the traffic is encrypted or not – it will be subject to the same policy and blocked.
Granularly define exceptions for SSL inspection to protect user privacy and comply with corporate policy. Some encrypted content passing through the gateway should not be instpected and therefore can be bypassed with a simple administrator policy definition.
UserCheck
UserCheck technology alerts employees in real-time about their application access limitations, while educating them on Internet risk and corporate usage policies. In addition to defining policies that allow or block specific applications, businesses can choose to query the user by prompting the employee to select whether an application is being used for business or personal use. This enables IT administrators to gain a better understanding of Web 2.0 usage patterns, adapt policies and regulate personal usage without interrupting the flow of business.
User and machine awareness
Integration with the Identity Awareness Software Blade enables users of the Application Control Software Blade to define granular policies to control applications usage by specific users, groups of users and the machine they are using, to best balance between the organization’s security needs and its business needs.
Central policy management
360° Visibility and Reporting
The Application Control software blade used in conjunction with the SmartEvent software blade provides a complete view into users' online behavior and applications usage. SmartEvent provides a granular level of visilibity into application activities leading to a clear understanding of network usage.
Intuitive and insightful reporting helps detect potentially malicious incidents and prvent them from happening. With such enhanced features as detailed reporting, browse time details, trends, maps and statistics, it provides a full insight into web activities.
Integrated into Check Point Software Blade Architecture
Specifications
| Supported Appliance Families | |
|---|---|
|
|
| Supported Operating Systems | |
|
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite


