How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We have it on our endpoints.
Our primary use case of this solution is for Edge firewalls and our cloud.
Our primary use case of this solution is for file extraction. We send it out to SandBlast to open up the file to see if there is any malicious content in the file. We then send it back into the client environment.
We use SandBlast to protect our mobile devices, as well as our iPads and Samsung tablets.
We were looking to upgrade our protection to our endpoints, giving us more of a forensics backbone into when something happens on a machine. The product can let us know what happened, where it came from, etc. Our primary use case is for more insight into what is happening.
We use it as a method to ensure with all of our emails and the files coming through have secure attachments and no known issues: No malware, no known vulnerable hashes, nor anything malicious.
We are a reseller, so we implement this solution for our customers.
My primary use of this solution is to supplement my existing antivirus and enable/enhance my anti-ransomware capabilities.
Our primary use case of this solution is for security in our data centers.
Our customers use this solution because it takes an .exe and applications, then scans them. So, it is good threat protection.
Our primary use case is using it to virtualize environments or create a sandbox in which we can use it to test malware.
We use the Threat Emulation blade feature on the Security Gateway.
Check Point is our main perimeter firewall vendor. We have several Check Point clusters doing different things within our environment.
My primary use case for this solution is to integrate with mobile device management.