Check Point SandBlast Network Overview

Check Point SandBlast Network is the #5 ranked solution in our list of top Advanced Threat Protection tools. It is most often compared to Palo Alto Networks WildFire: Check Point SandBlast Network vs Palo Alto Networks WildFire

What is Check Point SandBlast Network?

Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast

Check Point SandBlast Network Buyer's Guide

Download the Check Point SandBlast Network Buyer's Guide including reviews and more. Updated: June 2021

Check Point SandBlast Network Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media

Check Point SandBlast Network Video

Pricing Advice

What users are saying about Check Point SandBlast Network pricing:
  • "The cost is not significantly high and it can be negotiated during any purchase of NGFW."
  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
  • "I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Senior Manager at a financial services firm with 10,001+ employees
Real User
Top 5Leaderboard
Automatically cleans known file types, can detect local file changes, and offers Zero-day attack protection

What is our primary use case?

The primary use case for our organization is to protect against attacks targeting our network. As most of the attacks originate from the internet, protecting the organization requires us to be equipped and ready to mitigate this type of attack at the perimeter level. Hence, it becomes necessary to scan any traffic flowing North-South and vice versa. The perimeter device should be equipped such that it is able to detect and mitigate attacks, as well as have basic anti-spam filters. Email gateways are not capable of protecting against the latest generation of attacks via email. Similarly, basic… more »

Pros and Cons

  • "The sandbox is able to scan files without adding a delay or compromising productivity."
  • "The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."
Senior Network/Security Engineer at Skywind Group
Real User
Top 5Leaderboard
Effective protection against zero-day threats, with good logging and reporting

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point SandBlast Network software blade is one of the numerous blades… more »

Pros and Cons

  • "It provides a high rate of catching the zero-day advanced threats."
  • "The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption."
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
509,820 professionals have used our research since 2012.
Security Analyst at Security4IT
Reseller
Top 5
Prevents the downloading of malicious files by improving security

What is our primary use case?

Our company sells Check Point products. We give our customers support on these products. We use it here in our company, but mainly we give support to our customers who are using the product. Our clients use it for improving the security in their environment. We are also using it to improve our security. We are using this solution extensively. It is available all the time for any file that we download. We have some on-premise equipment that goes to the cloud.

Pros and Cons

  • "When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company."
  • "I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it."

What other advice do I have?

I am very satisfied with this product. Anyone who deploys this solution needs to understand their network, e.g., the amount of data transferring through it. This way, they can define the product according to their needs. I would rate this solution as a 10 out of 10.
Technology consultant at a tech services company with 501-1,000 employees
Real User
Top 5Leaderboard
Good support, offers visibility of the process, and protects against previously unknown malicious files

What is our primary use case?

We have the Check Point SandBlast TE100X device private cloud sandbox. We use sandboxing to scan files in our network. The unknown file will reach the security gateway, the gateway will check for the verdict in the cache, and if not found, it holds the file while the security gateway sends it to SandBlast. We have enabled four images and depending upon the results of SandBlast, it will determine a verdict that will be given to the security gateway. At this point, the gateway will allow or deny the file and save the results in cache for future reference.

Pros and Cons

  • "Threat extraction can help us to remove malicious content from documents by converting them to PDF."
  • "In Check Point SandBlast, improvement has to be made with respect to the GUI."
JC
CTO at a computer software company with 11-50 employees
Real User
Top 5
Easy to set up, stable, and Threat Extraction helps prevent zero-day threats

What is our primary use case?

We make use of Check Point firewalls to secure our corporate network and the SandBlast Network software blade is one component in use to help prevent and minimize zero-day threats. The Threat Emulation and Threat Extraction features provided by SandBlast are invaluable pieces to securing our environment and ensuring that we remain secure to the best extent possible. Our corporate network is very small consisting of only a few routers/switches, a firewall, and some client machines without any connected servers. Regardless, Check Point is a key piece of the puzzle.

Pros and Cons

  • "Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us."
  • "We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us."
Technology consultant at a tech services company with 501-1,000 employees
Real User
Top 5Leaderboard
Helps to understand the exact daily email traffic flow but monitoring Queues and related operations are very complex

What is our primary use case?

We have Implemented Check Point SandBlast Network Solution at the email Gateway provider where our primary use case was to clean email attachments. We have also enabled Anti-Virus & Antibot blades. We want to convert each & every document should convert into the PDF file With all their active content for example links etc neutralized or disabled. Also, we are using on-premises as well as cloud sandboxing at the same time. Means particular file format sandboxing will happen on cloud & remaining on the private cloud means on-premise box.

Pros and Cons

  • "Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided."
  • "Many Important controls are only available in CLI & very very complicated. All tecli command features should available on GUI so that it will become easy for normal users to monitor & control queue."
Senior Security Analyst at Atos
Real User
Top 5Leaderboard
Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails

What is our primary use case?

Today's attacks are zero-day or which are not correlated to previous attacks. So cyber defense should be active and should block those zero days threats before it impacts the entire network. Something should be there which proactively can detect threats and block them. Sandbox is technology that overcomes this issue and sandblast for the network which consists of threat emulation and threat exaction. It emulates unknows files in a sandbox environment and protects threats in hidden email documents by extracting them.

Pros and Cons

  • "Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox."
  • "I think Check Point provides standard time which ideally most other vendors take to identify behaviors of a file by sending them into a sandbox environment for inspection."