Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. Integrated into the Check Point Next Generation Firewalls (NGFW), Application Control enables businesses to easily create granular policies based on users or groups—to identify, block or limit usage of applications and widgets. Applications are classified into categories, based on diverse criteria such as application type, security risk level, resource usage, productivity implications and more.
Granular control of social networks, applications and application features – identify, allow, block or limit usage
Leverages the world’s largest application library, grouping apps into categories to simplify policy creation and protect against threats and malware
Integrated in Next Generation Firewalls enables consolidation of security controls decreasing costs
Enables application security policies to identify, allow, block or limit usage of thousands of applications regardless of port, protocol or evasive technique used to traverse the network. Combined with Identity Awareness, IT administrators can create granular policy definitions. User and group application usage is controlled according to user or group needs and applications’ characteristics in terms of security, productivity and resource utilization.
Equipped with Check Point’s SSL inspection technology, Application Control scans and secures SSL/TLS encrypted traffic passing through the gateway. Organizations can granularly define exceptions for SSL/TLS inspection to protect user privacy and comply with corporate policy.
To support the dynamic nature of Internet applications, the Application Control database is continuously and automatically updated. AppWiki enables application scanning and detection of nearly 8,000 distinct applications and over 250,000 Web widgets.
Dynamic zero-day threat protection with cutting-edge evasion-resistant malware detection, safeguards you against the world’s most dangerous threats.
Automated and elastic public cloud network security to keep assets and data protected while staying aligned to the dynamic needs of public cloud environments.
Zero Trust security is about having the ability to “Divide and Rule” your network in order to reduce the risk of lateral movement. Check Point NGFWs enable you to create granular network segmentation across public/private cloud and LAN environments. With detailed visibility into the users, groups, applications, machines and connection types on your network, they allow you to set and enforce a “Least Privileged” access policy. So, only the right users and devices can access your protected assets.
Learn about latest emerging threats, malware trends and cyber security recommendationsDOWNLOAD FULL REPORT