Check Point SandBlast Network Primary Use Case

Ryan Steele
Sr Network Engineer at Columbus Regional Airport Authority
Check Point is our main perimeter firewall vendor. We have several Check Point clusters doing different things within our environment. View full review »
Oleg Pekar
Senior Network/Security Engineer at Skywind Group
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point SandBlast Network software blade is one of the numerous blades activated on the NGFWs in the DataCenter. It provides the additional layer of security from the perspective of the possible malicious files being scanned and analyzed. View full review »
Hugo Thebas
Security Analyst at Security4IT
Our company sells Check Point products. We give our customers support on these products. We use it here in our company, but mainly we give support to our customers who are using the product. Our clients use it for improving the security in their environment. We are also using it to improve our security. We are using this solution extensively. It is available all the time for any file that we download. We have some on-premise equipment that goes to the cloud. View full review »
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,986 professionals have used our research since 2012.
AaronJones
IT Security Engineer at a government with 1,001-5,000 employees
Our primary use case of this solution is for Edge firewalls and our cloud. View full review »
Swapnil T
Technology Consultant at a tech services company with 201-500 employees
We have Implemented Check Point SandBlast Network Solution at the email Gateway provider where our primary use case was to clean email attachments. We have also enabled Anti-Virus & Antibot blades. We want to convert each & every document should convert into the PDF file With all their active content for example links etc neutralized or disabled. Also, we are using on-premises as well as cloud sandboxing at the same time. Means particular file format sandboxing will happen on cloud & remaining on the private cloud means on-premise box. View full review »
Espen Sammerud
Network Technician at Buypass
We use the Threat Emulation blade feature on the Security Gateway. View full review »
PRAPHULLA DESHPANDE
Presales Solutions Architect at Paladion Networks
Today's attacks are zero-day or which are not correlated to previous attacks. So cyber defense should be active and should block those zero days threats before it impacts the entire network. Something should be there which proactively can detect threats and block them. Sandbox is technology that overcomes this issue and sandblast for the network which consists of threat emulation and threat exaction. It emulates unknows files in a sandbox environment and protects threats in hidden email documents by extracting them. View full review »
Security70a4
Security Engineer at a individual & family service with 10,001+ employees
We use it as a method to ensure with all of our emails and the files coming through have secure attachments and no known issues: No malware, no known vulnerable hashes, nor anything malicious. View full review »
NetworkEe258
Network Engineer at a tech services company with 51-200 employees
Our primary use case of this solution is for file extraction. We send it out to SandBlast to open up the file to see if there is any malicious content in the file. We then send it back into the client environment. View full review »
Jose Carlos Cordeiro
Director at Compugraf
We are a reseller, so we implement this solution for our customers. View full review »
Michael Yamashita
Security Architect at a manufacturing company with 10,001+ employees
Our primary use case is using it to virtualize environments or create a sandbox in which we can use it to test malware. View full review »
Professi1ff3
Professional Service Assistant at a tech vendor with 201-500 employees
Our customers use this solution because it takes an .exe and applications, then scans them. So, it is good threat protection. View full review »
Sean Cronan
Network Engineer at a hospitality company with 10,001+ employees
Our primary use case of this solution is for security in our data centers. View full review »
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,986 professionals have used our research since 2012.