We performed a comparison between Check Point SandBlast Network and Proofpoint Email Protection based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Palo Alto Networks, ESET and others in Advanced Threat Protection (ATP)."One of its characteristics that we liked the most was its analysis and emulation of activities in the emails since it manages to review them and inspect them if they have an infected attachment."
"Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."
"SandBlast updates the threat signatures frequently."
"When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company."
"Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast."
"Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox."
"The technology is impressive in general."
"We didn't really have any IPS before. So, Check Point has improved our security posture. People get used to doing things certain ways, which might not be the best or most secure way, and they can't do that now, which just requires more education of the user base. With the endpoint client, we've started to use Check Point for remote access."
"The most valuable feature of Proofpoint Email Protection is the central location dashboard for viewing all the related information for risk."
"The most valuable feature of Proofpoint Email Protection is the TAP Dashboard. It provides more detailed information that can be used for forensic analysis. This is an advantage that other email security providers, such as Cisco, IronPort, or Microsoft do not offer in their dashboards."
"URL scanning and online relay service are the most valuable features of Proofpoint Email Protection."
"Proofpoint Email Protection's initial installation is straightforward. It took us less than a day to complete the implementation."
"It's a mature product. It does a good job in detection."
"Proofpoint Email Protection is stable enough and does its job of virus, malware, and email scam detection. Setting it up is not too complicated."
"The most valuable features of Proofpoint Email Protection are ease of use, data loss prevention, antivirus, and spam protection."
"The stability is very good."
"They need to improve the GUI interface."
"I am very leery right now about the stability. We've had three outages in the last month because of Check Point, not because of something that the customer has done, but because of changes on the Check Point side."
"Most of the time stability is okay, but sometimes, we're not able to contact the cloud. It won't last for long. The product could be faster."
"I would like to see some speed improvements, e.g., how quickly you can get through all the menus. It crashes sometimes because we push so much through it. Therefore, I would like to see more small things behind the scenes, such as, back-end stability in terms of the management application."
"The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."
"There is a limit on the number of files that can be scanned in real-time, which could lead to us being found with our guard down on a high-traffic day."
"When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization."
"Many Important controls are only available in CLI & very very complicated. All tecli command features should available on GUI so that it will become easy for normal users to monitor & control queue."
"There is room for improvement in detecting and preventing phishing attacks. While the solution performs well in some aspects, it struggles with phishing threats."
"The solution could lower its price."
"The accessibility of Proofpoint Email Protection, particularly access to product trials, could be improved. It's hard to get a trial for Proofpoint Email Protection, and many customers prefer not just to do the POC or demo but try the product out."
"Proofpoint Email Protection could improve by allowing more customization of the reports, such as exceptions and black-and-white lists."
"Sometimes it detects false positives."
"Proofpoint should have better integration with complex environments that need more than one instance of Proofpoint, as there are issues with nested instances."
"We'd like to have the ability to create more customized reports."
"Proofpoint Email Protection could improve the Mail Trace feature and make navigation easier."
More Check Point SandBlast Network Pricing and Cost Advice →
Check Point SandBlast Network is ranked 8th in Advanced Threat Protection (ATP) with 33 reviews while Proofpoint Email Protection is ranked 1st in Secure Email Gateway (SEG) with 46 reviews. Check Point SandBlast Network is rated 8.4, while Proofpoint Email Protection is rated 8.4. The top reviewer of Check Point SandBlast Network writes "High detection with few false positives and able to handle large volumes of data". On the other hand, the top reviewer of Proofpoint Email Protection writes "A reasonably priced product that offers protection to emails, along with spam filters". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, Cisco Secure Network Analytics, Microsoft Defender for Office 365 and Trellix Network Detection and Response, whereas Proofpoint Email Protection is most compared with Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP), Palo Alto Networks WildFire, Cisco Secure Email and Fortinet FortiMail.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.