Try our new research platform with insights from 80,000+ expert users

Check Point SandBlast Network vs Palo Alto Networks WildFire vs RiskIQ Illuminate comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Check Point SandBlast Network3.1%
Microsoft Defender for Office 3659.7%
Palo Alto Networks WildFire7.6%
Other79.6%
Advanced Threat Protection (ATP)
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Palo Alto Networks WildFire7.6%
Microsoft Defender for Office 3659.7%
Proofpoint Email Protection7.1%
Other75.6%
Advanced Threat Protection (ATP)
Attack Surface Management (ASM) Market Share Distribution
ProductMarket Share (%)
RiskIQ Illuminate0.9%
CrowdStrike Falcon7.8%
Darktrace5.3%
Other86.0%
Attack Surface Management (ASM)
 

Featured Reviews

MW
Technical Specialist at Softcell Technologies Limited
Comprehensive security solution mitigates advanced threats
Improvements for Check Point SandBlast Network can be seen in dashboard usability; the threat emulation logs and analysis reports could be made more intuitive and visually appealing. Enhancing the system for granular tuning to reduce false positives and allowing benign files to bypass checks more simply for non-expert users would be beneficial. Additionally, faster emulation times could be achieved by increasing file scanning speed through hardware productivity enhancements. A specific instance where file scanning speed posed an issue was when the time taken depended on the file size. Scanning can take less than a minute or up to 2 minutes for larger files. Enhancing the file scanning time would be a significant improvement to the system.
RK
Engineer at Taalumgroup
Achieve effective threat prevention and seamless integration with powerful technical support
Integration with third-party products is possible. For example, connecting a mail gateway with Palo Alto Networks WildFire allows them to handle prevention. Palo Alto Networks WildFire is a cloud-based sandboxing solution. The firewall is connected to WildFire, and XDR performs sandboxing from the cloud. WildFire conducts malware scanning and emulation, then informs the firewall to block threats based on the response. It also generates reports regarding malware and other issues. The sandboxing process involves sending sample files to the cloud for scanning, checking file authenticity, certificates, and detecting malicious code. WildFire performs multiple checks and informs the XDR agent about file status. This automatic process occurs within minutes or seconds. For unknown or suspicious files, immediate blocking occurs while samples are sent to WildFire for identification. I rate Palo Alto Networks WildFire a 9 out of 10.
SimonClark - PeerSpot reviewer
Cyber Security Advisor - Director at Fort Net UK
Able to discover unpatched servers, offers good stability, and scales very well
A low-cost service to evaluate the risk score of a supply chain would be very helpful. This could be useful for insurance companies offering cyber insurance to enterprise customers, providing the insurer with a valuable way to unobtrusively, quickly, and frequently assess their customers and apply appropriate premiums for the level of risk. This would also be useful for enterprises. They could, for example, assess companies prior to a merger or acquisition. What would also be useful for any enterprise would be if their supply chain has some kind of direct digital access to parts of their network.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The specific security feature that stands out to me in Check Point SandBlast Network is its real-time protection, which extracts, emulates, and blocks traffic if any malicious signatures are present."
"The forensics reports and the ability to sandbox malware are its most valuable features."
"Check Point SandBlast Network has positively impacted my organization, as I have seen huge changes with a notable drop in malware incidents, especially with suspicious attachments; it gives the security team confidence that known or zero-day files are checked automatically."
"In terms of the scalability, it's expandable across the cloud."
"Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."
"Check Point SandBlast Network has positively impacted our organization by reducing incidents, improving user confidence, and saving time since implementing it. With around 2,000 users in our organization, after deploying threat emulation for network security, we haven't seen any incidents, including zero-day or ransomware attacks."
"It looks out for new cyber ​​threats and generates predictions based on behaviors that are already detected on a daily basis."
"The main feature of the solution is that it protects against malicious threats from the outside."
"I like the analysis they apply to the unknown files, and I think they have good technology to use as a sandboxing tool. I didn't find something similar to WildFire in the marketplace."
"The platform's most valuable feature is its seamless automation within the broader Palo Alto ecosystem."
"I give the initial setup an eight out of ten."
"The solution is easy to use and the Panorama feature is good. The software management or the malware blocking and some authentication management system are good."
"WildFire's application encryption is useful."
"The most valuable features of this solution are sandbox capabilities."
"The automated scanning capabilities integrated with Palo Alto's XDR are crucial for detecting and responding to potential environmental threats."
"The most valuable features of Palo Alto Networks WildFire are the good URL and file analysis that uses artificial intelligence. It has different interfaces, such as rest, SMTP protocol, and HTTPS. The Security incidents and event management are very good. Additionally, there are many file types that are supported and there is no limit to the number of files it can handle simultaneously. It integrates well with SIEM solutions."
"The solution is stable with 12 years of established historical data."
 

Cons

"There have been a couple of things that we've tried where we read through the documentation, and we were really looking for some help in implementing, and technical support wanted me to try it first, then call them if it breaks. It would be nicer if they would hold my hand a bit more. It makes me nervous in production, as I don't have a lab."
"There should be some customized price reductions in the offered packages."
"The management of alerts could improve them a bit - especially in event management."
"I would like to see these solutions being easier to manage from mobile applications - from either iOS or Android - including other operating systems that appear in the future."
"When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization."
"The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."
"The response times were slower, and getting support personnel on the call was more difficult."
"We would like to see this solution reach mobile devices more efficiently, through apps or more specific products."
"The solution can improve its traffic management."
"​The VPN and decryption need improvement."
"Improving detection on non-Windows formats would be beneficial as there are many samples, such as Linux or ransomware for macOS."
"I don't think it needs to improve anything, except maybe the speed to deploy the changes."
"High availability features are lacking."
"The price could be better."
"I would like to see them continue on their developmental roadmap for the product."
"The only complaint that we receive from our customers is in regards to the price."
"A low-cost service to evaluate the risk score of a supply chain would be very helpful."
 

Pricing and Cost Advice

"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
"The product's cost is high."
"We have seen ROI."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Pricing could be improved."
"WildFire is a little bit pricey. Sometimes it's difficult to sell it to customers at the current price."
"The price is a bit higher than the other products such as TrendMicro, or FireEye."
"Palo Alto Networks WildFire is an expensive product."
"The pricing is OK, it is not too expensive."
"This solution is very pricey and it depends on the package that you implement."
"The solution is worth its price"
"Palo Alto Networks solutions are typically on the higher end of pricing, but considering the value and integration with our existing infrastructure, it is worth the investment."
Information not available
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
879,899 professionals have used our research since 2012.
 

Comparison Review

it_user206346 - PeerSpot reviewer
Security Consultant at Webernetz.net - Network Security Consulting
Mar 11, 2015
Cisco ASA vs. Palo Alto Networks
Cisco ASA vs. Palo Alto: Management Goodies You often have comparisons of both firewalls concerning security components. Of course, a firewall must block attacks, scan for viruses, build VPNs, etc. However, in this post I am discussing the advantages and disadvantages from both vendors concerning…
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
7%
Outsourcing Company
7%
Retailer
6%
Computer Software Company
13%
Financial Services Firm
8%
Manufacturing Company
8%
Government
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise8
Large Enterprise13
By reviewers
Company SizeCount
Small Business36
Midsize Enterprise16
Large Enterprise29
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point SandBlast Network?
My experience with pricing and setup cost is that pricing was a bit high, but the setup cost was initially justified.
What needs improvement with Check Point SandBlast Network?
I feel that Check Point SandBlast Network could be improved with slight delays in cleaning the file delivery. Additio...
What is your primary use case for Check Point SandBlast Network?
My main use case for Check Point SandBlast Network is advanced threat protection, especially for scanning emails, att...
How does Cisco Firepower NGFW Firewall compare with Palo Alto Networks Wildfire?
The Cisco Firepower NGFW Firewall is a very powerful and very complex piece of anti-viral software. When one conside...
Which is better - Wildfire or FortiGate?
FortiGate has a lot going for it and I consider it to be the best, most user-friendly firewall out there. What I like...
How does Cisco ASA Firewall compare with Palo Alto's WildFire?
When looking to change our ASA Firewall, we looked into Palo Alto’s WildFire. It works especially in preventing advan...
Ask a question
Earn 20 points
 

Also Known As

No data available
No data available
RiskIQ Digital Threat Management
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Novamedia, Nexon Asia Pacific, Lenovo, Samsonite, IOOF, Sinogrid, SanDisk Corporation
DocuSign, Outbrain, The Economist Group, Rackspace, The Citizen Lab
Find out what your peers are saying about Palo Alto Networks, Microsoft, Proofpoint and others in Advanced Threat Protection (ATP). Updated: December 2025.
879,899 professionals have used our research since 2012.