Check Point Application ControlCheck Point
|
||||||
Related Products
|
||||||
About
Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. Integrated into the Check Point Next Generation Firewalls (NGFW), Application Control enables businesses to easily create granular policies based on users or groups, to identify, block or limit the usage of applications and widgets. Applications are classified into categories, based on diverse criteria such as application type, security risk level, resource usage, productivity implications, and more. Granular control of social networks, applications, and application features, identify, allow, block, or limit the usage. Leverages the world’s largest application library, grouping apps into categories to simplify policy creation and protect against threats and malware. Integrated into Next Generation Firewalls enables consolidation of security controls decreasing costs. Only the right users and devices can access your protected assets.
|
About
PC Matic Pro's application whitelisting is a critical preventative layer of cyber-protection that resides on top of other endpoint security solutions. zero trust whitelisting solutions prevent hacking and cyber-attacks. Block all malware, ransomware, and malicious scripts from executing. Protect your business data, users, and network with our whitelist cybersecurity solution. PC Matic Pro represents a long overdue shift in the cybersecurity industry to absolute prevention. Today's threats to critical infrastructure, industry, and all levels of government demand nothing less. PC Matic Pro provides a patented default-deny security layer at the device that blocks all unknown executions without introducing headaches for IT. Unlike traditional security solutions, customer infections aren’t required to strengthen the whitelist architecture. Local overrides can be added after prevention with a focus on accuracy and without concern for responding to an already active infection.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Businesses seeking a tool to create granular policies based on users to identify, block or limit usage of applications
|
Audience
Companies, businesses, and individuals searching for a solution to prevent ransomware and malware
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$50 per year
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCheck Point
United States
www.checkpoint.com/quantum/application-control/
|
Company InformationPC Matic
United States
www.pcmatic.com/pro/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Integrations
AVG AntiVirus Business Edition
Bitdefender Advanced Threat Intelligence
BlackBerry 10
CardinalOps
Check Point Quantum Next Generation Firewalls (NGFW)
CrowdStrike Container Security
ESET Cyber Security
Forcepoint ONE
IBM Cloud Network Security
Malwarebytes
|
Integrations
AVG AntiVirus Business Edition
Bitdefender Advanced Threat Intelligence
BlackBerry 10
CardinalOps
Check Point Quantum Next Generation Firewalls (NGFW)
CrowdStrike Container Security
ESET Cyber Security
Forcepoint ONE
IBM Cloud Network Security
Malwarebytes
|
|||||
|
|
|