Check Point launches application firewall

Check Point building with a sign

Firewall specialist Check Point (CHKP) has launched a new Application Control Software Blade which allows granular control of more than 50,000 Web 2.0 widgets and more than 4,500 internet applications, including social networking, instant messaging and media streaming. The Blade software is effectively sold as a service with regular updates adding to the list of controlled application within Check Point’s AppWiki database.

Implementation

According to Gabi Reish, global head of network security at Check Point: “Application Control Software allows our channel to go to end customers with a compelling offering.” Reish points to a single management interface and integration with Active Directory as key features that make implementation of application control very simple.

The software is agent-less at the client level and can generate a pop-up screen asking a user if they are accessing an application, for example Facebook, for work or personal reasons. These logs are then assessed by IT staff to help define usage policies for the organisation.

Although late to the application firewall market, Reish contends that the seamless nature of its implementation is much more attractive for existing Check Point customers then trying to integrate a rival third party solution.

The software is only available as within its blade architecture as opposed to a standalone appliance which makes the solution more applicable to existing Check Point customers. Reish estimates around 20 percent are already on its blade architecture and all current and future Check Point products will support the technology.

Survey

To support the launch of its new Blade, Check Point commissioned a report with The Ponemon Institute that surveyed 2,100 IT and security practitioners in the UK, US, Australia, France and Japan. 58 percent surveyed in the UK and Australia said that Web 2.0 applications have a significant or very significant impact on the security posture of their companies. IT administrators cited primarily workplace inefficiencies, malware, data loss and viruses as the main threats caused by insecure use of Web 2.0 applications, such as social networking, blogs and wikis.

Check Point will be running a number of partner training sessions for the new product in September with general availability scheduled for Q4. Pricing has yet to be confirmed.

Latest in Software
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
NetSuite branding pictured at the company's 'SuiteConnect' conference in Westminster, London, England.
NetSuite targets UK customer productivity gains with new AI tools
Microsoft 365 logo pictured on a smartphone with Microsoft logo pictured in background.
Microsoft justifies 365 price increases after MP concerns
The Huawei IdeaHub ES3 in an office room
Huawei's Intelligent Collaboration solution is shaping the future of video conferencing
Programming code and big data wave on a black background.
Open source security in the spotlight as UK gov publishes fresh guidance
Logo of Microsoft, developer of the Remote Desktop app, pictured on a billboard on top of a building.
Microsoft is ending support for the Remote Desktop app – here are three alternatives you can try instead
Latest in News
Digital handshake concept with Hand shake between two businessmen with digital hand
SYSPRO appoints Josef Al-Sibaie to spearhead global expansion
A telephoto shot of Evan Goldberg, founder and EVP at Oracle NetSuite, pictured from the waist up speaking onstage at the opening keynote of SuiteConnect London 2025.
‘Every feature that comes into NetSuite over the coming years is going to have AI’: NetSuite’s Evan Goldberg on the future of the platform and how AI will drive customer success
ChatGPT logo and branding pictured in white coloring against a black backdrop.
DeepSeek and Anthropic have a long way to go to catch ChatGPT: OpenAI's flagship chatbot is still far and away the most popular AI tool in offices globally
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Flexible work concept image showing woman working in office environment side by side with woman working from home.
IT professionals aren’t budging on flexible work demands – and more than half say they’ll quit if employers don’t meet expectations
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack