Check Point SandBlast Network Primary Use Case

Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

We started using it as a suggestion to complement the current solution we had in place. 

The sound of AI engines working non-stop to detect threats in email and web downloads was hard to resist knowing that a lot of the times that there's a breach, the human behind the screen had something to do with it (we're the weakest links in the chain). 

It had been seen before that people click on links in suspicious emails or even insist on entering in websites that aren't safe. 

SandBlast protects the network and endpoint from some of the most vicious malware there is - including trojans and ransomware - without compromising productivity.

View full review »
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

Check Point SandBlast Network was acquired when the company needed to improve its security posture in different characteristics. The company had a deficiency in monitoring the corporate network. This tool analyzes the traffic network in a way that is really efficient, and of course, the best thing is that it identifies suspicious patterns and behaviors. With this solution, we managed to improve the entire comprehensive posture of the critical assets of the organization's network.

View full review »
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE

SandBlast Network enables us to restrict and prevent zero-day threats and endpoints attacks completely. This sandboxing solution helps us to diffuse the malware and phishing attacks in real-time with a single click. It's a highly advanced and proactive solution for preventing social engineering attacks and is far better than any unconventional sandboxing solution. 

It also helps in restricting phishing emails and endpoints under the email management system as it acts as a protective shield and applies threat detection intelligence for finding the security threats all over the IT system.

View full review »
Buyer's Guide
Check Point SandBlast Network
April 2024
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,578 professionals have used our research since 2012.
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

One of the great needs that our company was going through was the need to protect its infrastructure against hackers or malicious bots, as well as cyber-attacks.

We wanted a robust technology that would meet our objectives. We wanted to prevent attacks on our business environment. In addition, as a company, we already use various Check Point technologies and we wanted to continue with the same scope and security that they have offered us in recent years. That's why Check Point SandBlast Network provides us with that security by scanning everything that passes through our network.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

We were looking for several solutions that would meet certain network threat prevention needs - one of which was the tendency to have user workflow control points that could be affected on a day-to-day basis. Given these situations, we needed to provide better zero-day protection in real-time that would reduce corporate expenses and the consumption of costs generated by the security department while still getting information in real-time 24 hours a day. We came across different solutions that met these characteristics; however, in the end, we managed to choose and segment Sandblast computing services.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

It is one of the applications that support us in security and attacks on the network with a capacity for interpretation and analysis of the data that enters our corporate network. 

It is an efficient and friendly service, giving detailed analysis and centralized detection of events, including zero-day attacks, which are analyzed and managed faithfully. 

These capabilities are indispensable for an organization as they help safeguard the integrity and health of each team. 

These are the advantages and needs that we have achieved when using Check Point SandBlast.

View full review »
EA
Deputy Manager of IT Security Infrastructure at Türkiye İş Bankası

We are using Check Point Sandblast Network devices for both a proxy firewall and direct internet usage firewall. They have Check Point thread extraction licenses. If someone or some application needs to reach the internet zone, it must pass through via the next generation firewalls connected with Sandblast devices. 

We are planning to use them for submitting emails. Hence, most of the sandbox solutions can miss the first file, which is unknown. If there is no reputation or analysis report, they need time to examine it and they permit the unknown file. Sandblast does not. It has a trick in that it allows the file to download but never allows you to finish the download until analysis ends. When it ends, it releases the file and user experience feels just like slow downloading.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

With so many threats at the computer level, we have sought solutions that allow us to improve our internal perimeter security at the technological level to minimize exposure and one by one ability to reduce recovery time in the event of an attack. 

As a necessary part of security, we needed a solution that could integrate easily with other solutions and third-party solutions to allow us an in-depth defense against any threat that we detect. Based on all this, we effectively wanted to protect ourselves with the best solution and brand on the market. 

View full review »
BD
Senior Manager at a financial services firm with 10,001+ employees

The primary use case for our organization is to protect against attacks targeting our network. As most of the attacks originate from the internet, protecting the organization requires us to be equipped and ready to mitigate this type of attack at the perimeter level. Hence, it becomes necessary to scan any traffic flowing North-South and vice versa.

The perimeter device should be equipped such that it is able to detect and mitigate attacks, as well as have basic anti-spam filters. Email gateways are not capable of protecting against the latest generation of attacks via email.

Similarly, basic URL filtering is not able to protect against web attacks. Consequently, protecting the organization against this type of sophisticated or targeted attack, we concluded that the next generation of perimeter security solutions is a must.

View full review »
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution

We are using it on top of email security and web security.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

Our technologies and infrastructure are currently both on-premise and in Microsoft Azure, for which we have had several Check Point gateways. Currently, the GW Check Point that we have is in Azure, VM, or virtual appliances, and protecting our infrastructure. Through them, we have activated several blades, one of them SandBlast. This was done in order to use the extraction of files with threats, to verify them, and later, if we do not find security problems, to deliver them to the client. It helps us greatly against zero-day threats.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

One of our offices required zero-day protection that was automated and within the quantum licensing in a small device. It already had a one-year license enabled, so we had a way to use it based on our needs.

We required sophisticated email phishing protection in addition to validating downloaded files in our infrastructure without compromising productivity. We needed to avoid threats within the network and have a data reviewer based on a database containing old threats and new ones.

This protection was required due to the high impact that we would have if we were compromised in the office.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point SandBlast Network software blade is one of the numerous blades activated on the NGFWs in the DataCenter. It provides the additional layer of security from the perspective of the possible malicious files being scanned and analyzed.

View full review »
JC
CTO at a computer software company with 11-50 employees

We make use of Check Point firewalls to secure our corporate network and the SandBlast Network software blade is one component in use to help prevent and minimize zero-day threats. 

The Threat Emulation and Threat Extraction features provided by SandBlast are invaluable pieces to securing our environment and ensuring that we remain secure to the best extent possible.

Our corporate network is very small consisting of only a few routers/switches, a firewall, and some client machines without any connected servers. Regardless, Check Point is a key piece of the puzzle.

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

As we need to secure our network, we must detect and add controls, and that is where, based on recommendations and experience, we use Check Point SandBlast technologies. They help us and provide zero-day or solvent security and protection and contribute to optimizing the risks of security based on profiles or data already shared and pre-established such as security templates to be easy and quick to implement. It is offering us a security strategy that helps us avoid major problems or impacts on users and is easy and non-invasive with users.

View full review »
ST
Technology consultant at a tech services company with 501-1,000 employees

We have the Check Point SandBlast TE100X device private cloud sandbox.

We use sandboxing to scan files in our network. The unknown file will reach the security gateway, the gateway will check for the verdict in the cache, and if not found, it holds the file while the security gateway sends it to SandBlast.

We have enabled four images and depending upon the results of SandBlast, it will determine a verdict that will be given to the security gateway. At this point, the gateway will allow or deny the file and save the results in cache for future reference.

View full review »
BW
Security Engineer at a individual & family service with 10,001+ employees

We use it as a method to ensure with all of our emails and the files coming through have secure attachments and no known issues: No malware, no known vulnerable hashes, nor anything malicious.

View full review »
WL
Information Security Engineer (Core Network Security) at NEX4 ICT Solutions

We primarily use the solution for advanced threat protection. We use it for email security. 

View full review »
RS
Sr Network Engineer at Columbus Regional Airport Authority

Check Point is our main perimeter firewall vendor. We have several Check Point clusters doing different things within our environment.

View full review »
RW
Network & Cyber Security Specialist at HKICL

SandBlast is an email protection solution.

View full review »
SC
Network Engineer at a hospitality company with 10,001+ employees

Our primary use case of this solution is for security in our data centers.

View full review »
ST
Technology consultant at a tech services company with 501-1,000 employees

We have Implemented Check Point SandBlast Network Solution at the email Gateway provider where our primary use case was to clean email attachments. We have also enabled Anti-Virus & Antibot blades. We want to convert each & every document should convert into the PDF file With all their active content for example links etc neutralized or disabled.

Also, we are using on-premises as well as cloud sandboxing at the same time. Means particular file format sandboxing will happen on cloud & remaining on the private cloud means on-premise box.

View full review »
MY
Security Architect at a manufacturing company with 10,001+ employees

Our primary use case is using it to virtualize environments or create a sandbox in which we can use it to test malware.

View full review »
PD
Associate Consult at Atos

Today's attacks are zero-day or which are not correlated to previous attacks. So cyber defense should be active and should block those zero days threats before it impacts the entire network.

Something should be there which proactively can detect threats and block them. Sandbox is technology that overcomes this issue and sandblast for the network which consists of threat emulation and threat exaction.

It emulates unknows files in a sandbox environment and protects threats in hidden email documents by extracting them.

View full review »
AA
Network Engineer at a tech services company with 51-200 employees

Our primary use case of this solution is for file extraction. We send it out to SandBlast to open up the file to see if there is any malicious content in the file. We then send it back into the client environment.

View full review »
HT
Security Analyst at Security4IT

Our company sells Check Point products. We give our customers support on these products. We use it here in our company, but mainly we give support to our customers who are using the product.

Our clients use it for improving the security in their environment. We are also using it to improve our security. 

We are using this solution extensively. It is available all the time for any file that we download.

We have some on-premise equipment that goes to the cloud.

View full review »
ES
Network Technician at BUYPASS AS

We use the Threat Emulation blade feature on the Security Gateway.

View full review »
it_user830025 - PeerSpot reviewer
IT Security Engineer at a government with 1,001-5,000 employees

Our primary use case of this solution is for Edge firewalls and our cloud.

View full review »
JC
Director at Compugraf

We are a reseller, so we implement this solution for our customers.

View full review »
AB
Professional Service Assistant at a tech vendor with 201-500 employees

Our customers use this solution because it takes an .exe and applications, then scans them. So, it is good threat protection.

View full review »
Buyer's Guide
Check Point SandBlast Network
April 2024
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,578 professionals have used our research since 2012.