Compare Check Point SandBlast Network vs. Digital Guardian

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Check Point SandBlast Network vs. Digital Guardian and other solutions. Updated: May 2021.
512,711 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided.""Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox.""When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.""It provides a high rate of catching the zero-day advanced threats.""Threat extraction can help us to remove malicious content from documents by converting them to PDF.""Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us.""The sandbox is able to scan files without adding a delay or compromising productivity."

More Check Point SandBlast Network Pros »

"The technical support is really terrific.""In Digital Guardian, they have the cloud correlation servers that give you visibility work like EBR and the correlation server works very well for security analysis.""It can scale from 100 to 10,000. There's no problem with the scalability.""The feature we call desktop recording is the most valuable aspect of the solution. Not only can we collect data from the user's usage, but we also capture his screenshots when he is trying to steal the data."

More Digital Guardian Pros »

Cons
"Many Important controls are only available in CLI & very very complicated. All tecli command features should available on GUI so that it will become easy for normal users to monitor & control queue.""I think Check Point provides standard time which ideally most other vendors take to identify behaviors of a file by sending them into a sandbox environment for inspection.""I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it.""The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption.""In Check Point SandBlast, improvement has to be made with respect to the GUI.""We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us.""The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."

More Check Point SandBlast Network Cons »

"I would like to see the workflow, to get all the rules and policies set up, be less complicated.""The room for improvement with Digital Guardian is that it will be better with the Linux agent because it is the only DLP solution for Linux workstations. It still needs to upgrade the agents to the latest version for the Linux kernel.""There are a lot of issues with the current version of the Endpoint agent. It's not stable, it's resource-consuming, and there are some performance issues. If they could improve the stability of the agent it would be great.""Some features on Mac and Linux are not complete currently. For example, some device control features haven't been transferred over to the other systems. If they could have their Windows features also available on Mac and Linux, that would be perfect. Some of our customers have a Mac environment for their RD environment. Having the solution fully capable of handling everything in a Mac environment is crucial."

More Digital Guardian Cons »

Pricing and Cost Advice
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.""I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market.""The cost is not significantly high and it can be negotiated during any purchase of NGFW."

More Check Point SandBlast Network Pricing and Cost Advice »

"Digital Guardian has both, subscription and perpetual licenses, but I think when everything (all technologies) will go to the cloud they will only offer subscriptions.""If I compare Digital Guardian with Symantec, the license cost is lower, but McAfee can be cheaper than Digital Guardian. It depends on how many licenses you plan to buy and how big the project is. The cost is not so high as Symantec, but not as cheap as McAfee. They can easily sell the solution for price."

More Digital Guardian Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
512,711 professionals have used our research since 2012.
Questions from the Community
Top Answer: The sandbox is able to scan files without adding a delay or compromising productivity.
Top Answer: If you already have Check Point NGFW and it's underutilized and sized properly, there is a benefit both in terms of commercial/security and operation. This is because everything is available from a… more »
Top Answer: The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue. The maximum number of… more »
Top Answer: The feature we call desktop recording is the most valuable aspect of the solution. Not only can we collect data from the user's usage, but we also capture his screenshots when he is trying to steal… more »
Top Answer: For the price in the market, it is a little bit higher than Symantec and Forcepoint. However, I believe, especially in the manufacturing industry, it is the only solution that makes sense for them. If… more »
Top Answer: We're a distributor of the solution. I personally handle pre-sales. Some web upload actions need to be improved due to the fact that DG is a very strong technology on the endpoint. For the network DLP… more »
Ranking
Views
3,402
Comparisons
2,129
Reviews
5
Average Words per Review
627
Rating
8.2
Views
5,590
Comparisons
3,820
Reviews
2
Average Words per Review
869
Rating
7.0
Popular Comparisons
Learn More
Overview

Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast

Digital Guardian Endpoint Data Loss Prevention (DLP) protects sensitive data on all your endpoints. It protects intellectual property and personal information. An endpoint agent that captures and records all system, user and data events on or off the network. It has a granular control of all data movement that can be configured to automatically block, justify or encrypt sensitive data in or attached to email, files moved to removable drives, cloud storage, or web - malware and malware-free - before sensitive data is lost. It has a built-in advanced data classification that creates and modifies classification and usage policies through content inspection, context-awareness and user classification. It provides design policies with controls that won't block actions that comply with corporate policy so employees remain productive while the data stays safe.

Offer
Learn more about Check Point SandBlast Network
Learn more about Digital Guardian
Sample Customers
Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
The Fifth Avenue Theatre, Jabil Circuit
Top Industries
REVIEWERS
Security Firm17%
Computer Software Company17%
Government8%
Individual & Family Service8%
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider23%
Financial Services Firm8%
Government6%
VISITORS READING REVIEWS
Computer Software Company25%
Comms Service Provider24%
Financial Services Firm8%
Manufacturing Company5%
Company Size
REVIEWERS
Small Business41%
Midsize Enterprise23%
Large Enterprise36%
No Data Available
Find out what your peers are saying about Check Point SandBlast Network vs. Digital Guardian and other solutions. Updated: May 2021.
512,711 professionals have used our research since 2012.

Check Point SandBlast Network is ranked 5th in Advanced Threat Protection with 7 reviews while Digital Guardian is ranked 11th in Advanced Threat Protection with 4 reviews. Check Point SandBlast Network is rated 8.2, while Digital Guardian is rated 7.0. The top reviewer of Check Point SandBlast Network writes "Automatically cleans known file types, can detect local file changes, and offers Zero-day attack protection". On the other hand, the top reviewer of Digital Guardian writes "The classification engine enables you to set up inspection rules to determine whether data has PII". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, FireEye Network Security, Proofpoint Email Protection and Symantec Advanced Threat Protection, whereas Digital Guardian is most compared with Forcepoint Data Loss Prevention, Symantec Data Loss Prevention, CrowdStrike Falcon, Microsoft Defender for Endpoint and Carbon Black CB Defense. See our Check Point SandBlast Network vs. Digital Guardian report.

See our list of best Advanced Threat Protection vendors.

We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.