Compare Check Point SandBlast Network vs. Hornetsecurity Advanced Threat Protection

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Palo Alto Networks, RSA, FireEye and others in Advanced Threat Protection. Updated: May 2021.
510,882 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.""I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market.""The cost is not significantly high and it can be negotiated during any purchase of NGFW."

More Check Point SandBlast Network Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
510,882 professionals have used our research since 2012.
Questions from the Community
Top Answer: Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us.
Top Answer: I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market.
Top Answer: We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us. If the performance could be improved in the… more »
Ask a question

Earn 20 points

Ranking
Views
3,402
Comparisons
2,129
Reviews
5
Average Words per Review
627
Rating
8.2
Views
47
Comparisons
39
Reviews
0
Average Words per Review
0
Rating
N/A
Popular Comparisons
Learn More
Hornetsecurity
Video Not Available
Overview

Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast

Protect your organization from spam, viruses, malware and spyware, phishing and CEO fraud, ransomware, denial of service attacks and data loss—while saving the time and expense of managing hardware and software systems.

Offer
Learn more about Check Point SandBlast Network
Learn more about Hornetsecurity Advanced Threat Protection
Sample Customers
Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
FESTO, TDK, Gerry Webber, CLAAS, Konica Minolta
Top Industries
REVIEWERS
Security Firm17%
Computer Software Company17%
Government8%
Individual & Family Service8%
VISITORS READING REVIEWS
Computer Software Company27%
Comms Service Provider23%
Financial Services Firm7%
Government7%
No Data Available
Company Size
REVIEWERS
Small Business41%
Midsize Enterprise23%
Large Enterprise36%
No Data Available
Find out what your peers are saying about Palo Alto Networks, RSA, FireEye and others in Advanced Threat Protection. Updated: May 2021.
510,882 professionals have used our research since 2012.

Check Point SandBlast Network is ranked 5th in Advanced Threat Protection with 7 reviews while Hornetsecurity Advanced Threat Protection is ranked 25th in Advanced Threat Protection. Check Point SandBlast Network is rated 8.2, while Hornetsecurity Advanced Threat Protection is rated 0.0. The top reviewer of Check Point SandBlast Network writes "Automatically cleans known file types, can detect local file changes, and offers Zero-day attack protection". On the other hand, Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, FireEye Network Security, Proofpoint Email Protection and Symantec Advanced Threat Protection, whereas Hornetsecurity Advanced Threat Protection is most compared with .

See our list of best Advanced Threat Protection vendors.

We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.