Most Helpful Review
Find out what your peers are saying about Check Point SandBlast Agent vs. CrowdStrike Falcon and other solutions. Updated: September 2020.
441,672 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Its most valuable features are its scalability and advanced threat protection for customers."
"I am told that we get over 100 million emails a month. This filters them down and allows only somewhere about three million emails, which is a great help."
"For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors."
"The most valuable features of this solution are the IPS and the integration with ISE."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"The stability of the solution is perfect. I believe it's the most stable solution on the market right now."
"I am really satisfied with the technical support."
"It is a very stable program."
"Its ability to rollback anti-ransomware once an attack has started is the most valuable feature."
"Its ease of use is the most valuable feature. We had existing endpoints and it was an easy upgrade process. The interface board is also easy to use."
"Administratively, it's easy to control."
"The security is its most valuable feature."
"It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks."
"The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers."
"In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations."
"We now feel more secure with our PCs, even more with the non-technical persons."
"I like the overall reports of this solution. They are crisp, and to the point."
"It has an extremely low footprint, so it has got minimum impact on the user end points in terms of CPU and memory usage."
"The most valuable feature is its threat analysis."
"Scalability is good. We have had no issues with it."
"The automatic alert feature is the most important feature of the solution."
"Because it is security product and acts like an AIML smart product, not merely based on daily/weekly updates and signatures."
"We have seen a reduction to the performance hit to our operating systems."
"We are happy with CloudStrike's ease of use and touch notification."
"We would like to have an API integration with a SIEM solution, because as far as I know, it currently hasn't yet been released."
"I would like them to add whatever makes filtering more advanced in scanning and blocking for malware in emails."
"The solution needs more in-depth analytics."
"In the next version of this solution, I would like to see the addition of local authentication."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"The reporting and analytics areas of the solution need to be improved."
"I would like more seamless integration."
"It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects."
"There was a learning curve for our general population of employees (the user)."
"Off the top of my head, I can't think of a way it has improved my organization."
"We know that Check Point has a very good database about threats even Check Point tries to make this EDR stable still there are some issues we were facing after upgrading or taking TAC to help its got resolved but Check Point really needs to work on metadata."
"SandBlast Agent had moments in which it had a high load, we escalated it to the CheckPoint support that helped us to stabilize it. We had a problem with the parameterization of the solution. Once corrected by following the CheckPoint instructions, everything worked normally again."
"There should be some way of managing this solution outside the organization's network, possibly with some type of remote access. For example, if I'm the admin of Check Point who manages the entire network, I would like to have access on my home device or maybe a mobile app to get reports, etc."
"The solution could be improved in the future with a way to provide online training to customers for free, as other providers do."
"Some of the less tech-savvy users sometimes find it difficult in adjusting and learning how to use the platform."
"It is cloud-based, and this does make some weary of the data being held on the cloud. Privacy requirements must be taken into account."
"The dashboard does not have the facility to export the reports in a PDF format, which I can quickly share with internal stakeholders."
"I would like CrowdStrike to provide some correlation in the threat analysis, so we can visualize things better."
"Whenever there is a feature release (upgrade) where we push to all the endpoints, it causes something to be blocked without us knowing."
"The management of log aggregation is in need of improvement."
"Unfortunately, native applications are not supported."
"We have had to open a case with the technical support to get some issues and bugs resolved."
"The GUI can use improvement, it's cloud-based so sometimes the interface can be a bit slow. The interface could use a little bit more speed."
Pricing and Cost Advice
"The costs of 50 licenses of AMP for three years is around $9,360."
"The price is very good."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"In terms of licensing, have a buffer zone around your projects in terms of the amount of endpoints that you want to have. You can always have more, but it is best to leave room for a little increase or growth."
"The solution is too pricey."
"One of the key factors that made us go with this solution was the pricing. On the licensing part, there was an initial complementary set of licenses offered in the initial onboarding package, either 15 or 20. Then, we had some complementary licenses in the initial purchase of the package. That was pretty useful."
"The pricing will depend upon your volume of usage."
"I would like them to further reduce the price, because it is quite pricey at the moment."
"Purchasing the product through the AWS Marketplace is just a click away. Since we were using the on-premise version of the product, we continued on the cloud by purchasing it through the AWS Marketplace."
"I do not have experience with the cost or licensing of the product."
"The other administrator and I can log in to check the exact details of what happened, what was running, and what caused the detection. We know exactly what was happening on the end users PC and we can tell if it's something that we actually need or something that's malicious."
"We are at about $60,000 per year."
"This solution has a very competitive price."
"Our company pays approximately US$ 65,000 annually for 900 machines."
Questions from the Community
Top Answer: The solution's integration capabilities are excellent. It's one of the best features.
Top Answer: Nice to have URL management, password protection of the app, more details of the machine & user running the app.
Top Answer: The primary use case is for endpoint protection. For the larger deployments, we use it for our policy enforcement as… more »
Ask a question
Earn 20 points
Top Answer: While Carbon Black is great for good detections and incident Response, Crowdstrike is EDR on steroids. It's everything… more »
Question: What is the biggest difference between Carbon Black CB Defense, CrowdStrike, and SentinelOne?
Top Answer: A short answer: Perhaps the biggest IMO is SentinelOne is the only one of these 3 that does not have to go to the cloud… more »
Top Answer: In a nutshell, Microsoft as most of its products tend to be behind the leaders and ATP is no exception, we used both and… more »
Compared 14% of the time.
Compared 9% of the time.
Compared 8% of the time.
Compared 7% of the time.
Compared 6% of the time.
Compared 100% of the time.
Compared 11% of the time.
Compared 9% of the time.
Compared 9% of the time.
Compared 6% of the time.
Compared 3% of the time.
Also Known As
Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.
SandBlast Agent is a complete endpoint security solution offering a fleet of advanced endpoint threat prevention capabilities so you can safely navigate today's menacing threat landscape. It provides a comprehensive system to proactively prevent, detect, and remediate evasive malware attacks.
The Falcon Platform is flexible and extensible when it comes to meeting your endpoint security needs. You can purchase the bundles above or any of the modules listed below. The additional modules can be added to Falcon Endpoint Protection bundles.
Stand-alone modules can be purchased by anyone and do not require a Falcon Endpoint Protection bundle. Our specialized products are for customers working with more stringent compliance or operational requirements.
Request a free trial here:
Learn more about Cisco AMP for Endpoints
Learn more about Check Point SandBlast Agent
Learn more about CrowdStrike Falcon
|Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank||IMC, Alrov, Medical Advocacy and Outreach, Starkey Hearing Technologies, Community Newspaper Group|
Information Not Available
Financial Services Firm7%
Comms Service Provider7%
Computer Software Company26%
Comms Service Provider25%
Comms Service Provider29%
Financial Services Firm29%
Financial Services Firm20%
Comms Service Provider7%
Computer Software Company33%
Comms Service Provider13%
See our list of best Endpoint Protection (EPP) for Business vendors.