Check Point SandBlast Network Valuable Features

Ryan Steele
Sr Network Engineer at Columbus Regional Airport Authority
Check Point met all of our criteria that we were looking for in a firewall vendor as far as remote access capabilities, as far as IPS and intrusion detection, the SandBlast and the threat extraction pieces that we were looking at to help limit our attack vectors. They're top rated and have been for a long time. Those were all important things that we were looking at when we were looking at replacing what we currently had with Check Point. View full review »
Oleg Pekar
Senior Network/Security Engineer at Skywind Group
* It provides a high rate of catching the zero-day advanced threats. I suppose due to the integrated AI-engine. * The Threat Extraction feature takes the suspicious document and converts it to another type/extension, which is harmless, like DOC to PDF. * The processes for the software blade activation and configuration and very easy. * In addition, Check Point SandBlast Network provides protection against phishing emails. * Good logging and reporting capabilities, on the level of other Check Point products. * Built-in compliance checks, with a reasonable set of the default regulations provided. View full review »
Hugo Thebas
Security Analyst at Security4IT
The mostly useful feature is we can download a file and emulate it outside of our company, then we can get the file and know that the file is clean. It's safe to run inside our company and we have no risk of viruses, Trojans, and so on. View full review »
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,517 professionals have used our research since 2012.
IT Security Engineer at a government with 1,001-5,000 employees
When they work, the log correlation, IPS, antivirus, anti-bot, and the SandBlast are the most valuable features. View full review »
Swapnil T
Technology Consultant at a tech services company with 201-500 employees
Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided. Static analysis as per checkpoint its a python code that helps to provide verdict without emulating every single attachment which results in an increase in performance. Every scan email will automatically add text which helps us to understand email has been scanned or malicious content has been removed. we can also customize the same. View full review »
Espen Sammerud
Network Technician at Buypass
The most valuable feature is that attachments to emails and downloads from the web are being emulated in the cloud. We see some malicious downloads and attachments, but it is not a lot. I am thinking about enabling the Threat Extraction blade now. View full review »
Presales Solutions Architect at Paladion Networks
Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox. The Threat Extraction blade extracts potentially malicious content from e-mail attachments before they enter the corporate network. View full review »
Security Engineer at a individual & family service with 10,001+ employees
It seems like it works all the time. We have never had an issue. We have never had something go undetected, anything major. All in all, it works pretty well. View full review »
Network Engineer at a tech services company with 51-200 employees
We like that we get to segregate our network. If there's any malicious content in any of those files it gets segregated so it doesn't affect any of your existing infrastructure or network traffic. View full review »
Jose Carlos Cordeiro
Director at Compugraf
The zero-day protection is its most valuable feature. View full review »
Michael Yamashita
Security Architect at a manufacturing company with 10,001+ employees
* The forensics reports * The ability to sandbox malware. View full review »
Professional Service Assistant at a tech vendor with 201-500 employees
It saves everyone the time of trying to be reactive. Instead, they are proactive by trying to prevent an issue. View full review »
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,517 professionals have used our research since 2012.