Check Point Application ControlCheck Point
|
ExtremeControlExtreme Networks
|
|||||
Related Products
|
||||||
About
Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. Integrated into the Check Point Next Generation Firewalls (NGFW), Application Control enables businesses to easily create granular policies based on users or groups, to identify, block or limit the usage of applications and widgets. Applications are classified into categories, based on diverse criteria such as application type, security risk level, resource usage, productivity implications, and more. Granular control of social networks, applications, and application features, identify, allow, block, or limit the usage. Leverages the world’s largest application library, grouping apps into categories to simplify policy creation and protect against threats and malware. Integrated into Next Generation Firewalls enables consolidation of security controls decreasing costs. Only the right users and devices can access your protected assets.
|
About
Control users and devices across your networks with granular visibility and in-depth control. Customizing the onboarding of guests and IoT devices is easy and secure with predefined templates for non-IT personnel. Enables consistent policy roll-out across the entire network. Enhances security with agent-based and agentless assessment options. Control users and devices across your networks with granular visibility and in-depth control. Single pane of glass for wired and wireless. Secure, simple onboarding. Detailed profiling with access and app analytics data. Context-based policies. Policies based on security posture of IoT devices.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Businesses seeking a tool to create granular policies based on users to identify, block or limit usage of applications
|
Audience
IT Professionals and network adminstrators looking for a web application monitoring solution
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCheck Point
United States
www.checkpoint.com/quantum/application-control/
|
Company InformationExtreme Networks
Founded: 1996
United States
www.extremenetworks.com/product/extremecontrol/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
|
|||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
Network Access Control (NAC) Features
Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access
|
||||||
Integrations
Aranda Security Compliance
CardinalOps
Check Point Quantum Next Generation Firewalls (NGFW)
Checkmk
Mindflow
NetBeez
QA
SecHard
SecureW2
WatchGuard WIPS
|
Integrations
Aranda Security Compliance
CardinalOps
Check Point Quantum Next Generation Firewalls (NGFW)
Checkmk
Mindflow
NetBeez
QA
SecHard
SecureW2
WatchGuard WIPS
|
|||||
|
|
|