The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files.
Sales Engineer at Tempest Security Intelligence
Useful sandboxing functionality, quick support, and reliable
Pros and Cons
- "The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
- "Check Point SandBlast Network can improve the integration with third-party vendors, such as EDR or CRM products. For example, IBM Curator."
What is most valuable?
What needs improvement?
Check Point SandBlast Network can improve the integration with third-party vendors, such as EDR or CRM products. For example, IBM Curator.
For how long have I used the solution?
I have been using Check Point SandBlast Network for approximately two years.
What do I think about the stability of the solution?
The stability of Check Point SandBlast Network is good.
Buyer's Guide
Check Point SandBlast Network
November 2024
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
What do I think about the scalability of the solution?
Check Point SandBlast Network is scalable.
We have approximately 5,000 users using this solution.
How are customer service and support?
The support from Check Point SandBlast Network is good. The support helps us very quickly.
What about the implementation team?
We have two people for the deployment of the Check Point SandBlast Network.
What's my experience with pricing, setup cost, and licensing?
The cost of Check Point SandBlast Network is annually, and there is only a standard license.
What other advice do I have?
I rate Check Point SandBlast Network an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Technology consultant at a tech services company with 501-1,000 employees
Helps to understand the exact daily email traffic flow but monitoring Queues and related operations are very complex
Pros and Cons
- "Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided."
- "Many Important controls are only available in CLI & very very complicated. All tecli command features should available on GUI so that it will become easy for normal users to monitor & control queue."
What is our primary use case?
We have Implemented Check Point SandBlast Network Solution at the email Gateway provider where our primary use case was to clean email attachments. We have also enabled Anti-Virus & Antibot blades. We want to convert each & every document should convert into the PDF file With all their active content for example links etc neutralized or disabled.
Also, we are using on-premises as well as cloud sandboxing at the same time. Means particular file format sandboxing will happen on cloud & remaining on the private cloud means on-premise box.
How has it helped my organization?
Check Point SandBlast Network Solution works well if ignore 2 -3 points. All emails are getting scanned for signatures & Threat emulation works well. Check Point SandBlast Network Solution helps to understand the exact daily email traffic flowing. Threat extraction also works quite good help to neutralized or block any malicious attachment received depending upon the severity.
Cacheing & static analysis really reduces the time taken for scanning & sandboxing the same file for potentially less dangerous files.
What is most valuable?
Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided.
Static analysis as per checkpoint its a python code that helps to provide verdict without emulating every single attachment which results in an increase in performance.
Every scan email will automatically add text which helps us to understand email has been scanned or malicious content has been removed. we can also customize the same.
What needs improvement?
Firstly, performance in our case daily many emails were queued for scanning & among that 30% emails were getting skipped means delivered without scanning. Some times queue was so large that we need to flush or dump emails.
Many Important controls are only available in CLI & very very complicated. All tecli command features should available on GUI so that it will become easy for normal users to monitor & control queue.
Threat Emulation device HA Configuration is also CLI based.
Monitoring Queues and related operations are very complex as it needs to check on CLI.
For how long have I used the solution?
Two years.
What do I think about the stability of the solution?
I have worked on R80.20 & R80.10 I have seen bugs but the TAC team provided hotfixes.
What do I think about the scalability of the solution?
Overall scalability has been a good experience.
How are customer service and technical support?
For Threat Emulation Security team is responsible & those are I think limited no of peoples are available. The checkpoint should increase the skill set on TE.
How was the initial setup?
The initial setup was a complex task need to configure MTA & Configuring & troubleshooting needs good CLI.
What about the implementation team?
I have implemented it with my team.
What's my experience with pricing, setup cost, and licensing?
Cost is on the higher side though ill suggest buying a bigger box than required.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point SandBlast Network
November 2024
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
Security Architect at a manufacturing company with 10,001+ employees
The forensics reports and the ability to sandbox malware are its most valuable features
Pros and Cons
- "The forensics reports and the ability to sandbox malware are its most valuable features."
- "Using it in the beginning was difficult because I had never used anything similar. In terms of navigating the UI, it was all not too bad, but there is definitely a learning curve."
What is our primary use case?
Our primary use case is using it to virtualize environments or create a sandbox in which we can use it to test malware.
What is most valuable?
- The forensics reports
- The ability to sandbox malware.
What needs improvement?
Using it in the beginning was difficult because I had never used anything similar. In terms of navigating the UI, it was all not too bad, but there is definitely a learning curve. If I had gone through additional training, it would have been helpful.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
It seems scalable.
What do I think about the scalability of the solution?
It seems scalable.
How are customer service and technical support?
I have not yet used technical support.
Which solution did I use previously and why did I switch?
We were not using another vendor previously.
How was the initial setup?
The initial setup is pretty straightforward.
What about the implementation team?
The third-party partner handled most of the setup. We observed, and they taught us the basics. Our experience was very good.
What other advice do I have?
Try it out. Demo it. See it in use was helpful.
I have been involved in giving input and feedback with the product to the company.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date.
Valuable Features:
Pro-active prevention techniques mean that files sent to my endpoint are automatically cleansed and filtered for malicious content without a delay. The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Independent tests have verified that Check Point Threat Prevention has the highest catch rate in the industry. Working for a Check Point partner we utilise Check Point's endpoint solution in our day to day work and the most valuable benefit is knowing I am being protected from email, endpoint and removable media attacks and when attacks occur I am likely to weather the storm better than other users.
Improvements to My Organization:
When files are sent they are automatically sandboxed and cleansed in real time meaning we don't need to wait for our filters to do their work before we see the output. I know my laptop is safe.
Room for Improvement:
The day to day files like doc, xls, pdf, zip and rar can be scanned and cleaned by threat extraction in real time but there are still some file types which require further inspection. With the machine learning capabilities of sandblast there should be scope for more coverage, butI would like to feel certain 'no' file type is left uncovered. Any vendor that can find a way to do this is on to a winner!
Disclosure: My company has a business relationship with this vendor other than being a customer: Pentesec are 4 star Check Point partners and one of 2 companies with End Point Collaborative Support certifications, making us the most qualified Check Point End Point partners in the United Kingdom. We are vendor agnostic by default, so by choosing to utilise Check Point's End Point solution over alternatives is an endorsement in itself.
Network Engineer at a hospitality company with 10,001+ employees
It's expandable across the cloud but the initial setup was complex
Pros and Cons
- "In terms of the scalability, it's expandable across the cloud."
- "The initial setup was complex because of the lack of information from the consultant."
What is our primary use case?
Our primary use case of this solution is for security in our data centers.
How has it helped my organization?
I am still learning the product.
What do I think about the stability of the solution?
I am still looking into the product's stability.
What do I think about the scalability of the solution?
In terms of the scalability, it is expandable across the cloud.
How are customer service and technical support?
I haven't had to contact technical support yet.
Which solution did I use previously and why did I switch?
We switched because we were using Cisco and were moving away from using Cisco firewalls.
How was the initial setup?
The initial setup was complex because of the lack of information from the consultant.
What about the implementation team?
I used Check Point and a consultant for the deployment. My experience with them was so-so.
Which other solutions did I evaluate?
We looked at the big three: Palo Alto, Checkpoint, and Cisco.
I had a little bit of input in the decision-making process.
What other advice do I have?
Always try the product out first.
I would rate it about a six out of ten until I figure the product out.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at a tech services company with 51-200 employees
If there's any malicious content in any of your files it gets segregated so it doesn't affect any of your existing infrastructure or network traffic
Pros and Cons
- "SandBlast has opened us up to a lot more opportunities where we can offer this service to clients, that way they don't have to go to a third-party to get this specific solution. It comes in the Check Point Infinity Package so it has helped us a lot."
- "The technical support could use some work, but it's okay. It's a little bit of a tedious process to get through."
What is our primary use case?
Our primary use case of this solution is for file extraction. We send it out to SandBlast to open up the file to see if there is any malicious content in the file. We then send it back into the client environment.
How has it helped my organization?
SandBlast has opened us up to a lot more opportunities where we can offer this service to clients. This way they don't have to go to a third-party to get this specific solution. It comes in the Check Point Infinity package, so it has helped us a lot.
What is most valuable?
We like that we get to segregate our network. If there's any malicious content in any of those files it gets segregated so it doesn't affect any of your existing infrastructure or network traffic.
What needs improvement?
I would like to see different types of network traffic that we could actually analyze, not just files, but the users as well.
What do I think about the stability of the solution?
The stability is good. R80.10 is really stable. It just has high usage of resources, but other than that, it has been a very stable product.
What do I think about the scalability of the solution?
The scalability is very good. It is easy to scale and use.
How are customer service and technical support?
The technical support could use some work, but it's okay. It's a little bit of a tedious process to get through.
How was the initial setup?
If you know what you're doing, then the initial setup is pretty straightforward.
What about the implementation team?
We implemented in-house.
Which other solutions did I evaluate?
The customer wanted this solution. They purchased the blade.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Security Analyst at Security4IT
Prevents the downloading of malicious files by improving security
Pros and Cons
- "When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company."
- "I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it."
What is our primary use case?
Our company sells Check Point products. We give our customers support on these products. We use it here in our company, but mainly we give support to our customers who are using the product.
Our clients use it for improving the security in their environment. We are also using it to improve our security.
We are using this solution extensively. It is available all the time for any file that we download.
We have some on-premise equipment that goes to the cloud.
How has it helped my organization?
When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.
We have never had a case of a virus entering our company in computer. I think we are safe because of this solution. One of the features of the Check Point product, SandBlast Cloud, is that it prevents the downloading of malicious files.
What is most valuable?
The mostly useful feature is we can download a file and emulate it outside of our company, then we can get the file and know that the file is clean. It's safe to run inside our company and we have no risk of viruses, Trojans, and so on.
What needs improvement?
I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it.
For how long have I used the solution?
About two years.
What do I think about the stability of the solution?
It is very stable. We don't have many problems regarding this aspect. Most of the tickets that we receive are doubts about the configuration and feature improvements.
What do I think about the scalability of the solution?
It is scalable. We can just add more computers into the solution if the equipment becomes obsolete or their capacity reaches its maximum. We just need to use a bigger appliance. However, we have no experiences regarding this, as usually the equipment is better than the customer's needs.
In my company, there are maybe 50 users. It's not a very big company, so everyone has their function, but most of them are technicians. Other users are sellers, directors, supervisors, and security analysts (like me). If we consider that every worker has one computer, we can say that there are about 50 computers using this solution.
How are customer service and technical support?
It has very good support. If I had to give them a score from zero to 10, I would give them a nine. Sometimes it takes a bit too long for them to give the first answer. It's not something that we can't wait for, but sometime we will need that answer right in the moment that we ask, and maybe we are waiting some hours depending on the issue.
Which solution did I use previously and why did I switch?
None.
How was the initial setup?
With some of our customers, I have been involved in the initial setup. It is very simple and intuitive. With just a few clicks, we can make it work.
After the system is running, just to enable each of the features, we take no more than 10 minutes.
What about the implementation team?
I just followed the Check Point documentation. I just read and replicated it into our production environment, then it was good to go.
About five of my colleagues are responsible for implementing the product.
Which other solutions did I evaluate?
I haven't evaluated other solutions.
What other advice do I have?
I am very satisfied with this product.
Anyone who deploys this solution needs to understand their network, e.g., the amount of data transferring through it. This way, they can define the product according to their needs.
I would rate this solution as a 10 out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller/Partner.
Network Technician at BUYPASS AS
Has caught some harmful attachments and downloads
Pros and Cons
- "It has caught some harmful attachments and downloads."
- "Most of the time stability is okay, but sometimes, we're not able to contact the cloud. It won't last for long. The product could be faster."
What is our primary use case?
We use the Threat Emulation blade feature on the Security Gateway.
How has it helped my organization?
It has caught some harmful attachments and downloads.
What is most valuable?
The most valuable feature is that attachments to emails and downloads from the web are being emulated in the cloud. We see some malicious downloads and attachments, but it is not a lot. I am thinking about enabling the Threat Extraction blade now.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
Most of the time stability is okay, but sometimes, we're not able to contact the cloud. It won't last for long. The product could be faster. Other than that, the stability is okay.
What do I think about the scalability of the solution?
We don't have any problems with scalability. It depends on the bandwidth because we are talking to the cloud.
How are customer service and technical support?
We don't use technical support directly. We work with our partners, and only if it's a big problem do we deal with Check Point directly. The techs contact me directly.
Which solution did I use previously and why did I switch?
In the beginning, Check Point was just a firewall. It is much more than that now. We have been using the product for over 20 years.
How was the initial setup?
The initial setup was straightforward, but we had some technical issues. It was something to do with the release that we were using. So, we had to do some patching. After a few weeks of tuning, it was okay.
What about the implementation team?
We implemented through our partner, SecureLink, or I did the implementation myself. During the implementation phase, there were some issues and we received some help from the technical support at Check Point.
SecureLink is a good company. They acquired a smaller company, which was our partner.
What was our ROI?
Our ROI is confidence in knowing that things out there that we didn't know about before are being stopped.
What's my experience with pricing, setup cost, and licensing?
We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive.
I would like to buy things, but I would need the funding. There is room for improvement here.
Which other solutions did I evaluate?
We have also looked at Palo Alto and Fortinet. At this point, we know the Check Point product and have a history with it. The management part of Check Point's product is very good.
I was involved in the decision-making process from the technical side.
What other advice do I have?
I would rate it an eight out of ten. It is not a ten simply because nothing is perfect.
I would advise someone considering this solution to get a Threat Emulation license and try it out.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Check Point SandBlast Network Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Advanced Threat Protection (ATP)Popular Comparisons
Microsoft Defender for Office 365
Proofpoint Email Protection
Palo Alto Networks WildFire
Cisco Secure Network Analytics
Trend Micro Deep Discovery
Trellix Network Detection and Response
Fortinet FortiSandbox
Symantec Advanced Threat Protection
Trellix Advanced Threat Defense
Buyer's Guide
Download our free Check Point SandBlast Network Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How much do independent test results affect your security purchases?
- Holding Security Vendors Accountable
- What can businesses do to improve their security posture?
- When evaluating Advanced Threat Protection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- Compromise Assessment vs Threat Hunting
- What are the main evaluation criteria for you when choosing the right vendor for brand protection services?
- Why is ATP (Advanced Threat Protection) important for companies?