Basil DangeSenior Manager at a financial services firm
Anonymous UserChief Information Officer at a consumer goods company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided."
"Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox."
"When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company."
"It provides a high rate of catching the zero-day advanced threats."
"Threat extraction can help us to remove malicious content from documents by converting them to PDF."
"Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us."
"The sandbox is able to scan files without adding a delay or compromising productivity."
"The most valuable feature is the ability to remove bad messages that were delivered, prior to being classified as unwanted."
"The anti-spam features are excellent on the email firewalls."
"The initial implementation is pretty easy to handle."
"They have customized security rules, mature rules, anti-virus protection, as well as email authentication similar to SPF, DKIM, and DMARC."
"Its anti-phishing functionality is the most valuable. Certainly, the biggest problem I have is phishing."
"The most valuable features are the business email compromise protection and targeted attack prevention."
"The solution scales quite well."
"I like all the features with Proofpoint, such as how it filters the spam and marketing mail, lost reality mail, blocks phishing attacks, blocks malicious attachments, and stops phishing links. Also it can defend against the business email compromise impersonation technique. It is a complete solution for all email attacks. It filters for the bad, malicious attachments. If there is any executable file, it can be deleted. It is a good, complete solution."
"Many Important controls are only available in CLI & very very complicated. All tecli command features should available on GUI so that it will become easy for normal users to monitor & control queue."
"I think Check Point provides standard time which ideally most other vendors take to identify behaviors of a file by sending them into a sandbox environment for inspection."
"I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it."
"The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption."
"In Check Point SandBlast, improvement has to be made with respect to the GUI."
"We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us."
"The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."
"Proofpoint should have better integration with complex environments that need more than one instance of Proofpoint, as there are issues with nested instances."
"The solution could be improved with the addition of PLP and email encryption features."
"We find the cost to be prohibitive."
"They do not have an on-demand scan for the internal viruses and internal users, and they don't have a scan for the exchange server against viruses and spam as Symantec does."
"It has too many screens. It is kind of a conglomeration of products. In other words, they built product A, product B, and product C, and they are yet to integrate them into a single administrative console. I would certainly like to see a more seamless administrative interface. I would also like to see them include more bang for the buck, by including features like email fraud protection, rather than making their product so piecemeal, where you are buying little pieces. I agree with the idea of having multiple tiers or layers, but maybe as small, medium, and large, as opposed to an a la carte menu."
"The largest complaint that we hear from our customers is that there is no local support."
"The incident reporting on offer needs to be improved. It's lacking right now. It should be on the platform somewhere."
"The reporting section could be enhanced. I like some reports but if they could allow us to create custom reports with more flexibility it would enhance the reports more."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"Annually, it costs us about $92,000. This is pretty much what it costs us. There is no additional cost."
"The price is reasonable."
"Proofpoint is fairly expensive."
"The licensing is basically $8/user."
"It is multiple times more expensive, which made it very much less attractive."
Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast
Proofpoint Email Protection stops malware and non-malware threats such as impostor email (also known as email fraud). Deployed as a cloud service or on-premises, it provides granular filtering to control bulk "graymail" and other unwanted email. And business continuity capabilities keep email communications flowing, even when your email server fails.
Check Point SandBlast Network is ranked 4th in Advanced Threat Protection (ATP) with 7 reviews while Proofpoint Email Protection is ranked 1st in Email Security with 11 reviews. Check Point SandBlast Network is rated 8.2, while Proofpoint Email Protection is rated 9.0. The top reviewer of Check Point SandBlast Network writes "Automatically cleans known file types, can detect local file changes, and offers Zero-day attack protection". On the other hand, the top reviewer of Proofpoint Email Protection writes "Flexible, very secure, and offers excellent technical support". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, FireEye Network Security, Symantec Advanced Threat Protection and Fortinet FortiEDR, whereas Proofpoint Email Protection is most compared with Palo Alto Networks WildFire, Microsoft Exchange Online Protection, Cisco Secure Email, Microsoft Defender for Office 365 and Fortinet FortiMail.
See our list of .
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.