We just raised a $30M Series A: Read our story

Check Point SandBlast Network Pros and Cons

Check Point SandBlast Network Pros

Senior Manager at a financial services firm with 10,001+ employees
The sandbox is able to scan files without adding a delay or compromising productivity.
View full review »
Senior Network/Security Engineer at Skywind Group
It provides a high rate of catching the zero-day advanced threats.
View full review »
Security Analyst at Security4IT
When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.
View full review »
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: October 2021.
541,108 professionals have used our research since 2012.
Technology consultant at a tech services company with 501-1,000 employees
Threat extraction can help us to remove malicious content from documents by converting them to PDF.
View full review »
JC
CTO at a computer software company with 11-50 employees
Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us.
View full review »
Technology consultant at a tech services company with 501-1,000 employees
Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided.
View full review »
EA
Deputy Manager of IT Security Infrastructure at Türkiye İş Bankası
You do not need to risk your network by using the in-line sandbox.
View full review »
Associate Consult at Atos
Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox.
View full review »

Check Point SandBlast Network Cons

Senior Manager at a financial services firm with 10,001+ employees
The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue.
View full review »
Senior Network/Security Engineer at Skywind Group
The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption.
View full review »
Security Analyst at Security4IT
I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it.
View full review »
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: October 2021.
541,108 professionals have used our research since 2012.
Technology consultant at a tech services company with 501-1,000 employees
In Check Point SandBlast, improvement has to be made with respect to the GUI.
View full review »
JC
CTO at a computer software company with 11-50 employees
We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us.
View full review »
Technology consultant at a tech services company with 501-1,000 employees
Many Important controls are only available in CLI & very very complicated. All tecli command features should available on GUI so that it will become easy for normal users to monitor & control queue.
View full review »
EA
Deputy Manager of IT Security Infrastructure at Türkiye İş Bankası
EDR and EPM solutions like Carbon Black or CyberArk have integrations with the cloud version of Sandblast, however, there must be on-premise Sandblast options also.
View full review »
Associate Consult at Atos
I think Check Point provides standard time which ideally most other vendors take to identify behaviors of a file by sending them into a sandbox environment for inspection.
View full review »
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: October 2021.
541,108 professionals have used our research since 2012.