Try our new research platform with insights from 80,000+ expert users
 

Check Point SandBlast Network Pros review quotes

BD
May 29, 2021
The sandbox is able to scan files without adding a delay or compromising productivity.
RS
Feb 12, 2019
We didn't really have any IPS before. So, Check Point has improved our security posture. People get used to doing things certain ways, which might not be the best or most secure way, and they can't do that now, which just requires more education of the user base. With the endpoint client, we've started to use Check Point for remote access.
OP
Aug 29, 2020
It provides a high rate of catching the zero-day advanced threats.
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,649 professionals have used our research since 2012.
KK
Aug 9, 2024
It is a stable solution.
Adrian Cambronero - PeerSpot reviewer
Dec 21, 2023
The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises.
HT
Aug 27, 2020
When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.
AshleyMorales - PeerSpot reviewer
Nov 29, 2023
The solution can detect and prevent attacks that may be encrypted.
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Nov 14, 2022
It looks out for new cyber ​​threats and generates predictions based on behaviors that are already detected on a daily basis.
ST
Mar 25, 2021
Threat extraction can help us to remove malicious content from documents by converting them to PDF.
JC
May 13, 2021
Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us.
 

Check Point SandBlast Network Cons review quotes

BD
May 29, 2021
The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue.
RS
Feb 12, 2019
There have been a couple of things that we've tried where we read through the documentation, and we were really looking for some help in implementing, and technical support wanted me to try it first, then call them if it breaks. It would be nicer if they would hold my hand a bit more. It makes me nervous in production, as I don't have a lab.
OP
Aug 29, 2020
The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption.
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
814,649 professionals have used our research since 2012.
KK
Aug 9, 2024
The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool.
Adrian Cambronero - PeerSpot reviewer
Dec 21, 2023
When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization.
HT
Aug 27, 2020
I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it.
AshleyMorales - PeerSpot reviewer
Nov 29, 2023
The management of alerts could improve them a bit - especially in event management.
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Nov 14, 2022
Today, we have it as part of a solution or a package. However, we'd like there to be a way where we can have the solution's features available to us in a cheaper way in the future.
ST
Mar 25, 2021
In Check Point SandBlast, improvement has to be made with respect to the GUI.
JC
May 13, 2021
We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us.