Try our new research platform with insights from 80,000+ expert users

Check Point SandBlast Network vs Gigamon Deep Observability Pipeline comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point SandBlast Network
Ranking in Advanced Threat Protection (ATP)
10th
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
36
Ranking in other categories
No ranking in other categories
Gigamon Deep Observability ...
Ranking in Advanced Threat Protection (ATP)
21st
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
8
Ranking in other categories
Application Performance Monitoring (APM) and Observability (23rd), Event Monitoring (9th), Data Loss Prevention (DLP) (16th), Security Information and Event Management (SIEM) (26th), Web Application Firewall (WAF) (19th), Network Packet Broker (NPB) (1st), Network Detection and Response (NDR) (11th)
 

Mindshare comparison

As of April 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point SandBlast Network is 6.0%, up from 5.1% compared to the previous year. The mindshare of Gigamon Deep Observability Pipeline is 0.4%. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

GaneshKhutwad - PeerSpot reviewer
Provides advanced threat prevention and utilizes geographic-based policies to mitigate attacks
Check Point offers three types of support: Gold, Platinum, and Diamond. The level of support you receive should be based on the criticality of the issue, not solely on your client's support tier. While there are established support levels, I have experienced instances where the support provided was not categorized as Gold, Platinum, or Diamond but rather a standard support level. In such cases, the response times were slower, and getting support personnel on the call was more difficult.
LeonardoAlves - PeerSpot reviewer
Improved the capability to analyze the environment and network problems with easy setup
It improved the capability to analyze the environment and network problems. It also helped streamline your security and performance monitoring The application I use is a script. My environment is a mix of technologies. I have many passionate people in my network who are on a journey in…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox."
"Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast."
"The forensics reports and the ability to sandbox malware are its most valuable features."
"The main feature of the solution is that it protects against malicious threats from the outside."
"The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises."
"It seems like it works all the time. We have never had an issue. We have never had something go undetected, anything major. All in all, it works pretty well."
"You do not need to risk your network by using the in-line sandbox."
"It enables my IT system to apply threat detection intelligence and diffuse the endpoint and potential threat attacks and phishing attacks onto the system in the most proactive and secure manner."
"The most valuable feature is NetFlow."
"It offers straightforward integration."
"It has high stability."
"It is a good product. It provides network visibility, which is important. Gigamon can bring some optimizations to my network. It is helpful for security inspection, and it makes my firewall work fast because my firewall doesn't have to do the inspection of the SSL connections, for example."
"The tool's most valuable feature is the encryption feature. From a security perspective, the solution hasn't significantly strengthened our security posture. However, it has greatly improved performance by streamlining encryption processes and avoiding encryption at multiple layers. This has also simplified troubleshooting, as we can whitelist certain processes."
"The most valuable feature for improving network visibility with Gigamon is the packet filtering capability."
"The solution is straightforward to set up."
 

Cons

"The initial setup was complex because of the lack of information from the consultant."
"I would like for them to improve the visibility in the product."
"The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."
"They need to improve the GUI interface."
"The response times were slower, and getting support personnel on the call was more difficult."
"There is a limit on the number of files that can be scanned in real-time, which could lead to us being found with our guard down on a high-traffic day."
"I would like to see some speed improvements, e.g., how quickly you can get through all the menus. It crashes sometimes because we push so much through it. Therefore, I would like to see more small things behind the scenes, such as, back-end stability in terms of the management application."
"The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."
"The security should be improved."
"Its filtering feature needs improvement."
"In terms of improvement, while the initial setup is not overly complicated, we did encounter a few issues."
"The Gigamon Deep Observability Pipeline should have a feature showing the traffic flow within its platform. Currently, customers have to use separate tools for monitoring, which is inconvenient. If it had its visibility feature, it would make monitoring easier and more complete without needing extra tools."
"They should increase the solution's cluster capacity."
"The graphical user interface could be improved."
"It only inspects a specific kind of traffic. There should be different kinds of use cases."
 

Pricing and Cost Advice

"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"The product's cost is high."
"We have seen ROI."
"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"The solution's price is reasonable."
"I would rate the solution as expensive, around an eight or nine out of ten. There are other competitive solutions available."
"The solution is highly-priced."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
847,862 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
14%
Government
11%
Energy/Utilities Company
6%
Financial Services Firm
17%
Computer Software Company
14%
Manufacturing Company
8%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point SandBlast Network?
The solution can detect and prevent attacks that may be encrypted.
What needs improvement with Check Point SandBlast Network?
The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool.
What do you like most about Gigamon Deep Observability Pipeline?
The most valuable feature for improving network visibility with Gigamon is the packet filtering capability.
What needs improvement with Gigamon Deep Observability Pipeline?
The challenge is monitoring the cloud network. In on-premises environments, monitoring is straightforward, as I can verify all packets and communications. However, due to the way access tools and p...
What is your primary use case for Gigamon Deep Observability Pipeline?
It improved the capability to analyze the environment and network problems. It also helped streamline your security and performance monitoring.
 

Also Known As

No data available
Gigamon, GigaSecure
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Amica Insurance, College of William & Mary, Gamma, IntercontinentalExchange, OppenheimerFunds
Find out what your peers are saying about Check Point SandBlast Network vs. Gigamon Deep Observability Pipeline and other solutions. Updated: March 2025.
847,862 professionals have used our research since 2012.