2019-01-28T12:30:00Z

What is your primary use case for Check Point SandBlast?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Guest
1414 Answers

author avatar
Real User

We have it on our endpoints.

2019-03-17T12:17:00Z
author avatar
Real User

Our primary use case of this solution is for Edge firewalls and our cloud.

2019-02-12T12:12:00Z
author avatar
Real User

Our primary use case of this solution is for file extraction. We send it out to SandBlast to open up the file to see if there is any malicious content in the file. We then send it back into the client environment.

2019-02-12T12:12:00Z
author avatar
Real User

We use SandBlast to protect our mobile devices, as well as our iPads and Samsung tablets.

2019-02-12T12:12:00Z
author avatar
Real User

We were looking to upgrade our protection to our endpoints, giving us more of a forensics backbone into when something happens on a machine. The product can let us know what happened, where it came from, etc. Our primary use case is for more insight into what is happening.

2019-02-12T12:12:00Z
author avatar
Real User

We use it as a method to ensure with all of our emails and the files coming through have secure attachments and no known issues: No malware, no known vulnerable hashes, nor anything malicious.

2019-02-12T12:12:00Z
author avatar
Top 20Reseller

We are a reseller, so we implement this solution for our customers.

2019-02-12T12:12:00Z
author avatar
Real User

My primary use of this solution is to supplement my existing antivirus and enable/enhance my anti-ransomware capabilities.

2019-02-12T12:12:00Z
author avatar
Real User

Our primary use case of this solution is for security in our data centers.

2019-02-12T12:12:00Z
author avatar
Real User

Our customers use this solution because it takes an .exe and applications, then scans them. So, it is good threat protection.

2019-02-12T12:12:00Z
author avatar
Top 20Real User

Our primary use case is using it to virtualize environments or create a sandbox in which we can use it to test malware.

2019-02-12T12:12:00Z
author avatar
Top 20Real User

We use the Threat Emulation blade feature on the Security Gateway.

2019-02-12T12:12:00Z
author avatar
Top 20Real User

Check Point is our main perimeter firewall vendor. We have several Check Point clusters doing different things within our environment.

2019-02-12T12:12:00Z
author avatar
Real User

My primary use case for this solution is to integrate with mobile device management.

2019-01-28T12:30:00Z
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
443,152 professionals have used our research since 2012.