Description
The Check Point Application Control Software Blade provides the industry's strongest application security and identity control to organizations of all sizes. It enables IT teams to easily create granular policies—based on users or groups—to identify, block or limit usage of over 240,000 Web 2.0 applications and widgets.
Granular application control
- Identify, allow, block or limit usage of thousands of applications by user or group
- UserCheck technology alerts users about controls, educates on Web 2.0 risks, policies
- Embrace the power of Web 2.0 Social Technologies and applications while protecting against threats and malware
Largest application library with AppWiki
- Leverages the world's largest application library with over 240,000 Web 2.0 applications and social network widgets
- Identifies, detects, classifies and controls applications for safe use of Web 2.0 social technologies and communications
- Intuitively grouped in over 80 categories—including Web 2.0, IM, P2P, Voice & Video and File Share
Integrated into Check Point Software Blade Architecture
- Centralized management of security policy via a single console
- Activate application control on any Check Point security gateway
- Supported gateways include: UTM-1, Power-1, IP Appliances and IAS Appliances