Compare Check Point SandBlast vs. Symantec Advanced Threat Protection

Check Point SandBlast is ranked 3rd in Advanced Threat Protection with 14 reviews while Symantec Advanced Threat Protection is ranked 8th in Advanced Threat Protection with 5 reviews. Check Point SandBlast is rated 8.4, while Symantec Advanced Threat Protection is rated 7.8. The top reviewer of Check Point SandBlast writes "We put in high availability clusters and had zero downtime". On the other hand, the top reviewer of Symantec Advanced Threat Protection writes "Offers elaborate detection features and provides information linked to each of the attacked computers". Check Point SandBlast is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox and FireEye Network Security, whereas Symantec Advanced Threat Protection is most compared with FireEye Network Security, Palo Alto Networks WildFire and Check Point SandBlast. See our Check Point SandBlast vs. Symantec Advanced Threat Protection report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Check Point SandBlast vs. Symantec Advanced Threat Protection and other solutions. Updated: January 2020.
396,781 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
Administratively, it's easy to control.The security is its most valuable feature.Its ease of use is the most valuable feature. We had existing endpoints and it was an easy upgrade process. The interface board is also easy to use.The forensics reports and the ability to sandbox malware are its most valuable features.It saves time with us trying to do the analysis. We use it to try to find out how something got into the network. We use it to stop something before it ever gets in.The zero-day protection is its most valuable feature.It has caught some harmful attachments and downloads.We didn't really have any IPS before. So, Check Point has improved our security posture. People get used to doing things certain ways, which might not be the best or most secure way, and they can't do that now, which just requires more education of the user base. With the endpoint client, we've started to use Check Point for remote access.

Read more »

All of the solution's features are quite valuable for us. We especially like the threat protection it provides.The most valuable feature is Click-time URL protection.They manage to solve detection quite nicely. There is some rather elaborate detection compared to other providers.Technical support is very responsive. You just have to open a ticket. They respond in a timely manner. Their response is good. I'm satisfied.It has certainly helped out our audit efforts because we each stay compliant in terms of various security standards.

Read more »

Cons
Off the top of my head, I can't think of a way it has improved my organization.There was a learning curve for our general population of employees (the user).Using it in the beginning was difficult because I had never used anything similar. In terms of navigating the UI, it was all not too bad, but there is definitely a learning curve.I imagine there will be improvements in later versions. There are hotfixes that come out all the time.I would like for them to improve the visibility in the product.Most of the time stability is okay, but sometimes, we're not able to contact the cloud. It won't last for long. The product could be faster.There have been a couple of things that we've tried where we read through the documentation, and we were really looking for some help in implementing, and technical support wanted me to try it first, then call them if it breaks. It would be nicer if they would hold my hand a bit more. It makes me nervous in production, as I don't have a lab.It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects.

Read more »

The cloud platform needs to have improvement in terms of the user interface and the different capabilities it has available. It needs to match the other leading next-gen EDR products that are available in the market. That's the reason why we are stepping away from Symantec. Their cloud environment is just generally lacking in comparison to others.There are limits with respect to blocking files by hash value or blocking IP addresses, and these limits should be removed.It's a strange situation where the infrastructure of the consumer or customer is behind some kind of firewall and they have always used some kind of customized proxy. In this situation, the ATP has a very tough time to pass the information to the cloud and back. To fix, it requires a more elaborate and complex configuration for that particular case.The administration interface needs a lot of improvement. It should be UI based, and simple. They need to improve it. It's pretty much not that friendly compared to what we were using as Bitdefender before. It's okay but is improving, actually.An improvement could be made on the reporting because then it would be easier to collect information and submit it for compliance.

Read more »

Pricing and Cost Advice
We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding.We didn't actually purchase the software. It was given to us by Check Point. We are using it as a test bed for possible future customers.We have seen ROI.Pricing is a little high.

Read more »

The pricing of this solution is inexpensive and affordable.

Read more »

report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
396,781 professionals have used our research since 2012.
Ranking
Views
3,304
Comparisons
2,382
Reviews
13
Average Words per Review
388
Avg. Rating
8.4
Views
3,125
Comparisons
2,319
Reviews
5
Average Words per Review
551
Avg. Rating
7.8
Top Comparisons
Learn
Check Point
Symantec
Overview

Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast

Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantec’s massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents. You can deploy a new installation of Symantec Advanced Threat Protection and start to discover suspicious activity in under an hour. Using the proven technology in Symantec Insight reputation based detection, Symantec SONAR behavioral analysis with the new Symantec Cynic sandbox and file analysis platform, Symantec Advanced Threat Protection provides better detection and prioritization than other vendors, allowing security analysts to “zero in” on just those specific security events of importance.

Offer
Learn more about Check Point SandBlast
Learn more about Symantec Advanced Threat Protection
Sample Customers
Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch MediaECI
Top Industries
REVIEWERS
Comms Service Provider17%
Manufacturing Company17%
Government8%
Transportation Company8%
VISITORS READING REVIEWS
Software R&D Company27%
Financial Services Firm15%
Comms Service Provider15%
Media Company13%
No Data Available
Find out what your peers are saying about Check Point SandBlast vs. Symantec Advanced Threat Protection and other solutions. Updated: January 2020.
396,781 professionals have used our research since 2012.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.