A major result of the current COVID-19 pandemic is the significant increase in the use of video conferencing applications. Applications like Zoom, BlueJeans, and Microsoft Teams have become critical to our ability to communicate effectively, both for work continuity, and for keeping up with friends and family in these days of social distancing and sheltering in place. Consequently, the need for good visibility and security for these applications is more relevant than ever. In this blog, we share how to leverage the unique security capabilities of Check Point Application Control (APCL) to provide better visibility and security for your organization and your employees.
Check Point Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. Integrated into the Check Point Infinity Architecture, Application Control enables IT teams to easily create granular policies based on users or groups—to identify, block or limit usage of applications and widgets. Applications are classified into categories, based on diverse criteria such as applications’ type, security risk level, resource usage, productivity implications and more.
In Application Control, the video conference apps detection is focused on 4 major components: Basic Discovery (App Identification & Monitoring), File Transfer (Uploads & Downloads), Remote Control and Desktop Sharing. In this blog, we demonstrate how to leverage these for network traffic visibility, and preventing attacks and data exfiltration.
you can find more use-cases and examples in the following blog:
https://blog.checkpoint.com/2020/05/18/adaptation-is-the-best-practice-leveraging-application-contro...