We performed a comparison between Check Point SandBlast Network and Fortinet FortiSandbox based on real PeerSpot user reviews.
Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It looks out for new cyber threats and generates predictions based on behaviors that are already detected on a daily basis."
"Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox."
"The use of threat cloud protection with its artificial intelligence can automate possible threats."
"Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast."
"It saves time with us trying to do the analysis. We use it to try to find out how something got into the network. We use it to stop something before it ever gets in."
"It has caught some harmful attachments and downloads."
"The Check Point SandBlast Network gives us incredibly good features."
"The sandbox is able to scan files without adding a delay or compromising productivity."
"The solution is very good because it catches a lot of threats in emails."
"FortiSandbox helps us handle unknown threats. Every vendor is competing for who can detect an unknown threat the fastest. Fortinet is competitive in the market."
"he solution's GUI is good."
"The most valuable feature of the solution is that the performance it offers to users is good, making it useful for us in our company."
"Fortinet FortiSandbox is faster than other sandbox solutions."
"The solution is easy to manage."
"Performance is a valuable feature."
"You have access to a report as to what behaviors the example file entered in the registry."
"In Check Point SandBlast, improvement has to be made with respect to the GUI."
"The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."
"SandBlast takes longer than FortiSandbox to complete a scan."
"The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption."
"The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."
"I would like to see these solutions being easier to manage from mobile applications - from either iOS or Android - including other operating systems that appear in the future."
"I would like for them to improve the visibility in the product."
"I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it."
"The use cases in Fortinet FortiSandbox are not good. It is difficult to upload a custom VM for Fortinet FortiSandbox. The integration of Fortinet FortiSandbox with other Fortinet or FortiGate firewalls is not good. VMs are already installed in the hardware and are working fine, but we tried to approve the custom VM many times but did not succeed."
"The area I would like this solution to be improved in is the integrations for Sandbox with AI and big data ML mechanisms. I think this would be a practical improvement."
"The initial setup is not too complex but could be easier."
"Most people are confused about how to use the right integration of the right Fortinet product."
"The initial setup of Fortinet FortiSandbox is complex. You cannot only deploy Fortinet FortiSandbox without deploying the stack of Fortinet solutions. The implementation and integration are challenging tasks with the device and placement in the network. We needed to do POC and offloading testing."
"In the next release, I would like to see machine learning and anti-exploitation included."
"There could be more templates and a higher number of simulated VMs to configure more use cases. Sometimes we need to configure many use cases in many different environments, and if the number of VMs that we configure is limited, we have to remove some and reconfigure the environment if we need another environment."
"For additional features, maybe a form of execution pain files in a non-virtual environment because it has threats that identify when it is being run in a virtual machine."
More Check Point SandBlast Network Pricing and Cost Advice →
Check Point SandBlast Network is ranked 8th in Advanced Threat Protection (ATP) with 33 reviews while Fortinet FortiSandbox is ranked 4th in Advanced Threat Protection (ATP) with 36 reviews. Check Point SandBlast Network is rated 8.4, while Fortinet FortiSandbox is rated 8.2. The top reviewer of Check Point SandBlast Network writes "High detection with few false positives and able to handle large volumes of data". On the other hand, the top reviewer of Fortinet FortiSandbox writes "Light and powerful solution design; useful to have". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Cisco Secure Network Analytics, Microsoft Defender for Office 365, Trellix Network Detection and Response and Symantec Advanced Threat Protection, whereas Fortinet FortiSandbox is most compared with Palo Alto Networks WildFire, Trellix Network Detection and Response, Microsoft Defender for Office 365, Fortinet FortiEDR and Cisco Secure Network Analytics. See our Check Point SandBlast Network vs. Fortinet FortiSandbox report.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.