Compare Check Point Infinity vs. Check Point SandBlast Network

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Check Point Infinity vs. Check Point SandBlast Network and other solutions. Updated: May 2021.
511,607 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The solution is very stable. I would estimate it's 99.9% stable, if not more.""We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure.""The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."

More Check Point Infinity Pros »

"Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided.""Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox.""When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.""It provides a high rate of catching the zero-day advanced threats.""Threat extraction can help us to remove malicious content from documents by converting them to PDF.""Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us.""The sandbox is able to scan files without adding a delay or compromising productivity."

More Check Point SandBlast Network Pros »

Cons
"Technical support is something that needs improvement.""I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain.""The licensing model for Check Point Infinity is not clear."

More Check Point Infinity Cons »

"Many Important controls are only available in CLI & very very complicated. All tecli command features should available on GUI so that it will become easy for normal users to monitor & control queue.""I think Check Point provides standard time which ideally most other vendors take to identify behaviors of a file by sending them into a sandbox environment for inspection.""I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it.""The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption.""In Check Point SandBlast, improvement has to be made with respect to the GUI.""We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us.""The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."

More Check Point SandBlast Network Cons »

Pricing and Cost Advice
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.""Check Point should provide an enterprise-wide license where the organization should be provided free hand of using any license or services for an agreed period of time (EULA)."

More Check Point Infinity Pricing and Cost Advice »

"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.""I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market.""The cost is not significantly high and it can be negotiated during any purchase of NGFW."

More Check Point SandBlast Network Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
511,607 professionals have used our research since 2012.
Questions from the Community
Top Answer: The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles.
Top Answer: The licensing model for Check Point Infinity is not clear. As infinity licenses are based on the number of users, it confuses larger organizations, where not every user needs every service. For… more »
Top Answer: We use Check Point Infinity to protect our organization against the latest generation cyber-attacks, characterized by large-scale spread and fast movement across multiple attack vectors. These… more »
Top Answer: The sandbox is able to scan files without adding a delay or compromising productivity.
Top Answer: If you already have Check Point NGFW and it's underutilized and sized properly, there is a benefit both in terms of commercial/security and operation. This is because everything is available from a… more »
Top Answer: The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue. The maximum number of… more »
Ranking
Views
687
Comparisons
385
Reviews
3
Average Words per Review
683
Rating
9.0
Views
3,402
Comparisons
2,129
Reviews
5
Average Words per Review
627
Rating
8.2
Popular Comparisons
Also Known As
R80, Infinity
Learn More
Overview

Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity

Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast

Offer
Learn more about Check Point Infinity
Learn more about Check Point SandBlast Network
Sample Customers
Edel AG
Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Top Industries
VISITORS READING REVIEWS
Computer Software Company54%
Comms Service Provider16%
Financial Services Firm5%
Manufacturing Company4%
REVIEWERS
Security Firm17%
Computer Software Company17%
Government8%
Individual & Family Service8%
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider23%
Financial Services Firm8%
Government6%
Company Size
No Data Available
REVIEWERS
Small Business41%
Midsize Enterprise23%
Large Enterprise36%
Find out what your peers are saying about Check Point Infinity vs. Check Point SandBlast Network and other solutions. Updated: May 2021.
511,607 professionals have used our research since 2012.

Check Point Infinity is ranked 10th in Advanced Threat Protection with 3 reviews while Check Point SandBlast Network is ranked 5th in Advanced Threat Protection with 7 reviews. Check Point Infinity is rated 9.0, while Check Point SandBlast Network is rated 8.2. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of Check Point SandBlast Network writes "Automatically cleans known file types, can detect local file changes, and offers Zero-day attack protection". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Cisco Stealthwatch, Palo Alto Networks VM-Series and Skybox Security Suite, whereas Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, FireEye Network Security, Proofpoint Email Protection and Symantec Advanced Threat Protection. See our Check Point Infinity vs. Check Point SandBlast Network report.

See our list of best Advanced Threat Protection vendors.

We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.