Check Point SandBlast Network Benefits

Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

We're very surprised with SandBlast's high detection rates, which also shows the high risks the company's network is exposed to daily. This solution will also protect from zero-day threats. This shows off how advanced the AI engine's heuristics are by assessing the possible threat. It's capable of blocking access, eliminating it, and creating a signature that will help detect and eliminate malware like it in the future. 

Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast.

View full review »
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

Within the first six months of implementing Check Point SandBlast Network, we have managed to improve the security posture little by little. We have managed to reduce some threats, and with this, we have managed to locate where to improve the defense against malware, exploits, and zero-day attacks. 

One of the features that has helped us a lot is the capacity for sandboxing analysis and deep inspection of SSL/TLS traffic, which has enabled us to neutralize malware that the other technologies we have were not able to identify.

View full review »
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE

Check Point SandBlast Network has increased the security system inside out from web devices to cloud servers in the most efficient and time-bound manner. It enables my IT system to apply threat detection intelligence and diffuse the endpoint and potential threat attacks and phishing attacks onto the system in the most proactive and secure manner. It protects our cloud server end to end and is one of the best threat intelligence software for our businesses.

It has automated the security system for us, due to which overall productivity and enhancement are observed all over.

View full review »
Buyer's Guide
Check Point SandBlast Network
April 2024
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

Since implementing the Check Point SandBlast Network tool in the organization, in an environment of around 200 servers (both physical and virtual), we also have three high-availability clusters. 

Before, we only depended on a firewall; however, this acquisition has helped us a lot to improve the entire security environment of our company. In addition, the tool has excellent features such as Threat Emulation and Threat Extraction as well as sandboxing. We can even extract the malicious content of the files or block files completely and can also work as email APT and can remove malicious content from the email body.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

Sandblast is one of the tools provided by Check Point, which has given us the best zero-day prevention in real time. It offers optimized security management, which facilitates monitoring, analysis, reporting, user segmentation, detection, and analysis within our network. 

It is providing network administrators with productivity without interrupting their regular operations. 

The zero-day protection and prevention features that are included in the solution enhance the intelligence of searching for threats, infections, or attacks under interpretation or prevention technology. It looks out for new cyber ​​threats and generates predictions based on behaviors that are already detected on a daily basis.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

What Check Point has come to give us as a benefit is the power to control, register, analyze, and give a general and safe view of the events and activities carried out by the teams that manage the organization's security. 

These capabilities can be managed from a single panel of equipment configurations and controls. This helps and benefits each of the organization's members that can be attacked because they will always be safe. 

Mail investigation is another of the benefits provided. 

View full review »
EA
Deputy Manager of IT Security Infrastructure at Türkiye İş Bankası

Generally, network sandbox solutions must be in-line configured. This may cause high availability problems and you must consider hardware bypass modules etc. However, Sandblast has native integration with Check Point Next Generation Firewalls. The firewall handles the signature base checks for antivirus, anti-malware, anti-bot, IPS solutions and if there is unknown file it sends the file for analysis in Sandblast. Reputation is calculated and feeds back to NGFW and if Sandblast fails only the sandbox ability fails. The thread extraction ability is really amazing.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

The product gives us advanced protection, including artificial intelligence and machine learning technologies and services. It is managing to protect us from malware fishing, cyber-attacks, and network exploits and allows us to emulate each of these attacks in a controlled environment. It is one of the few solutions that manage to emulate in real-time and minimize exposure to vulnerabilities since it detects if items have been analyzed and emulated, thus giving a 100% solvency solution before any infiltration.

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

This product protects us against the most common and sophisticated attacks including phishing email, account takeover, protection against malicious files, malicious attachments, and malware.

It protects us against data leakage that can be caused by an aforementioned attack, which can result in financial loss or reputation damage to the organization.

It is able to detect any changes in our software, such as whenever new code or a new file are delivered via web or email. It accomplishes this using sandboxing to evaluate it for potential vulnerabilities before it is delivered to the endpoint. 

It is able to quarantine zero-day threats using sandbox technology.

Sandboxing functions in a complementary fashion to your other security modules, products, and policies. It provides additional protection with modules such as IPS, anti-bot, antivirus, and antispam with the NGTX license.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

The tool or blade is implemented in our SandBlast network. The Check Point gateway has provided us with even more advanced protection, check files or attachments in our network, verify threats, deliver (if they are not a problem) or block, in addition to the protection of zero-day for modern threats. It has perfectly complimented us since it is extremely fast. We are impressed with the tool's effectiveness and speed of delivery. The client does not even perceive this protection, which is excellent.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

Check Point SandBlast Network has provided us with security for downloaded files on our network in addition to protection against phishing that tries to enter through email.

SandBlast has an emulator which is responsible for validating files and emails against modern threats based on its global database, which is constantly updated. In this way, everything is validated and delivered quickly to the user (who is not affected while being analyzed).

All these benefits generated greater security and stability within our office and the company's perimeter network.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

The overall security of the environment has been greatly improved by the Check Point NGFWs with the SandBlast Network blade activated. Before implementing the Check Point solutions, we relied on the Cisco ACLs and Zone-Based firewalls configured on the switches and routers, which in fact is a simple stateful firewall, and currently appear to be not an efficient solution for protecting from the advanced threats.

The Check Point SandBlast Network software blade has increased the protection of our environment by enabling the Threat Emulation and Threat Extraction features. The first feature performs the sandboxing of the suspicious file types, where more than 70 file types may be emulated, in the Windows and macOS virtual machines.

The second feature works faster by just converting the files to the clean file of the PDF format thus deleting potentially dangerous Macros, JavaScript Actions, etc.

View full review »
JC
CTO at a computer software company with 11-50 employees

By enabling the Threat Emulation and Threat Extraction features, we have increased our overall security posture and improved the protection of our corporate environment. We receive a high volume of incoming files and having this in place brings a certain level of peace of mind.

As a new organization, prior to implementing Check Point as part of our network, we relied on everyone just being careful. This is obviously not the best security practice. As we have grown, our security posture has changed and Check Point was part of our maturation as a company.

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

Its greatest value is that Check Point promotes and connects these technologies efficiently with ThreatCloud, which is one of the most outstanding bits of intelligence of the brand. It is capable of integrating advanced AI engines, and exclusive data of the brand. Having this added value in the solution enables us to provide greater security and adds efficiency in resolving incidents of any product. The AI can perform deep investigations, which can help us solve CPU problems or other types of hardware attacks.

View full review »
ST
Technology consultant at a tech services company with 501-1,000 employees

Before using sandblast, we were relying only on the firewall for protection against threats. Like all antivirus solutions, IPS antibot is signature-based protection and we can only upgrade the signatures on daily basis.

But, with SandBlast, we are getting almost instant protection for new threats as well. We now scan all of the incoming files and unknown threats are handled by SandBlast. We can even extract the malicious content from files or block the file outright.

SandBlast can also work as Email APT & can remove malicious content from the email body. It can even block the same & notify the user regarding the event.

View full review »
BW
Security Engineer at a individual & family service with 10,001+ employees

SandBlast has improved my organization in the way that we no longer have to worry as much about attachments which come in. Previously, it was a pretty frequent occurrence when we would get something malicious. So, it made it so that we could focus on other tasks and not have to worry nearly as much.

View full review »
RS
Sr Network Engineer at Columbus Regional Airport Authority

We didn't really have any IPS before. So, Check Point has improved our security posture. People get used to doing things certain ways, which might not be the best or most secure way, and they can't do that now, which just requires more education of the user base. With the endpoint client, we've started to use Check Point for remote access.

View full review »
SC
Network Engineer at a hospitality company with 10,001+ employees

I am still learning the product.

View full review »
ST
Technology consultant at a tech services company with 501-1,000 employees

Check Point SandBlast Network Solution works well if ignore 2 -3 points. All emails are getting scanned for signatures & Threat emulation works well. Check Point SandBlast Network Solution helps to understand the exact daily email traffic flowing. Threat extraction also works quite good help to neutralized or block any malicious attachment received depending upon the severity.

Cacheing & static analysis really reduces the time taken for scanning & sandboxing the same file for potentially less dangerous files. 

View full review »
rb6k - PeerSpot reviewer
Business Co-Ordinator at Pentesec

When files are sent they are automatically sandboxed and cleansed in real time meaning we don't need to wait for our filters to do their work before we see the output. I know my laptop is safe.

View full review »
PD
Associate Consult at Atos

It contains malware from attached documents in email organization can be relayed on such type of solutions where they need not invest more on other solution for such feature sets which ultimately reduce attack vector via email or from spoof senders and Extracts exploitable content out of the file.

For new applications or for databases there were many file storage which are having new hash values or unknow that can be identified by executing them in the sandbox environment hence improving more efficiency and security.

View full review »
AA
Network Engineer at a tech services company with 51-200 employees

SandBlast has opened us up to a lot more opportunities where we can offer this service to clients. This way they don't have to go to a third-party to get this specific solution. It comes in the Check Point Infinity package, so it has helped us a lot.

View full review »
HT
Security Analyst at Security4IT

When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.

We have never had a case of a virus entering our company in computer. I think we are safe because of this solution. One of the features of the Check Point product, SandBlast Cloud, is that it prevents the downloading of malicious files.

View full review »
ES
Network Technician at BUYPASS AS

It has caught some harmful attachments and downloads.

View full review »
it_user830025 - PeerSpot reviewer
IT Security Engineer at a government with 1,001-5,000 employees

Check Point has enabled us to detect a lot of threats and prevented a lot of threats from entering our environments. It has kept us safe.

View full review »
JC
Director at Compugraf

The Check Point product is very common in Brazil.

View full review »
MM
Network Engineer at a tech services company with 51-200 employees

We don't lose any data now that we are using SandBlast.

View full review »
AB
Professional Service Assistant at a tech vendor with 201-500 employees

It saves time with us trying to do the analysis. We use it to try to find out how something got into the network. We use it to stop something before it ever gets in.

View full review »
Buyer's Guide
Check Point SandBlast Network
April 2024
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.