Compare Check Point SandBlast Network vs. Microsoft Defender for Identity

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Palo Alto Networks, RSA, FireEye and others in Advanced Threat Protection. Updated: May 2021.
509,570 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided.""Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox.""When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.""It provides a high rate of catching the zero-day advanced threats.""Threat extraction can help us to remove malicious content from documents by converting them to PDF.""Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us.""The sandbox is able to scan files without adding a delay or compromising productivity."

More Check Point SandBlast Network Pros »

"This solution has advanced a lot over the last few years."

More Microsoft Defender for Identity Pros »

Cons
"Many Important controls are only available in CLI & very very complicated. All tecli command features should available on GUI so that it will become easy for normal users to monitor & control queue.""I think Check Point provides standard time which ideally most other vendors take to identify behaviors of a file by sending them into a sandbox environment for inspection.""I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it.""The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption.""In Check Point SandBlast, improvement has to be made with respect to the GUI.""We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us.""The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."

More Check Point SandBlast Network Cons »

"When the data leaves the cloud, there are security issues."

More Microsoft Defender for Identity Cons »

Pricing and Cost Advice
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.""I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market.""The cost is not significantly high and it can be negotiated during any purchase of NGFW."

More Check Point SandBlast Network Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
509,570 professionals have used our research since 2012.
Questions from the Community
Top Answer: Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us.
Top Answer: I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market.
Top Answer: We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us. If the performance could be improved in the… more »
Top Answer: This solution has advanced a lot over the last few years.
Top Answer: When the data leaves the cloud, there are security issues. The cloud security services and the integration with on-prem applications like SIEM, needs to be improved.
Top Answer: We are looking at this solution as a trusted tenant for our network. This way, all of the data that goes through is trusted and the communication between our on-prem system and the Azure Cloud remains… more »
Ranking
Views
3,402
Comparisons
2,129
Reviews
5
Average Words per Review
627
Rating
8.2
Views
439
Comparisons
143
Reviews
1
Average Words per Review
381
Rating
9.0
Popular Comparisons
Also Known As
Azure Advanced Threat Protection, Azure ATP, MS Defender for Identity, MS Defender for Identity, MS Defender for Identity
Learn More
Overview

Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast

Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. With Microsoft Defender for Identity, you can:

- Monitor users, entity behavior, and activities with learning-based analytics

- Protect user identities and credentials stored in Active Directory

- Identify and investigate suspicious user activities and advanced attacks throughout the kill chain

- Provide clear incident information on a simple timeline for fast triage

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Defender for Identity Community.

    Offer
    Learn more about Check Point SandBlast Network
    Learn more about Microsoft Defender for Identity
    Sample Customers
    Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
    Microsoft Defender for Identity is trusted by companies such as St. Luke’s University Health Network, Ansell, and more.
    Top Industries
    REVIEWERS
    Security Firm17%
    Computer Software Company17%
    Government8%
    Individual & Family Service8%
    VISITORS READING REVIEWS
    Computer Software Company27%
    Comms Service Provider22%
    Financial Services Firm7%
    Government6%
    VISITORS READING REVIEWS
    Computer Software Company48%
    Comms Service Provider19%
    Financial Services Firm8%
    Government5%
    Company Size
    REVIEWERS
    Small Business41%
    Midsize Enterprise23%
    Large Enterprise36%
    No Data Available
    Find out what your peers are saying about Palo Alto Networks, RSA, FireEye and others in Advanced Threat Protection. Updated: May 2021.
    509,570 professionals have used our research since 2012.

    Check Point SandBlast Network is ranked 5th in Advanced Threat Protection with 7 reviews while Microsoft Defender for Identity is ranked 13th in Advanced Threat Protection with 1 review. Check Point SandBlast Network is rated 8.2, while Microsoft Defender for Identity is rated 9.0. The top reviewer of Check Point SandBlast Network writes "Automatically cleans known file types, can detect local file changes, and offers Zero-day attack protection". On the other hand, the top reviewer of Microsoft Defender for Identity writes "Identifies, detects, and investigates advanced threats". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, FireEye Network Security, Proofpoint Email Protection and Symantec Advanced Threat Protection, whereas Microsoft Defender for Identity is most compared with Microsoft Defender for Office 365 and Palo Alto Networks WildFire.

    See our list of best Advanced Threat Protection vendors.

    We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.