Try our new research platform with insights from 80,000+ expert users

Check Point SandBlast Network vs Palo Alto Networks WildFire vs RiskIQ Illuminate comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Check Point SandBlast Network3.3%
Microsoft Defender for Office 3658.3%
Palo Alto Networks WildFire7.5%
Other80.9%
Advanced Threat Protection (ATP)
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Palo Alto Networks WildFire7.5%
Microsoft Defender for Office 3658.3%
Proofpoint Email Protection5.9%
Other78.3%
Advanced Threat Protection (ATP)
Attack Surface Management (ASM) Market Share Distribution
ProductMarket Share (%)
RiskIQ Illuminate1.0%
CrowdStrike Falcon7.5%
HackerOne5.0%
Other86.5%
Attack Surface Management (ASM)
 

Featured Reviews

MW
Technical Specialist at Softcell Technologies Limited
Comprehensive security solution mitigates advanced threats
Improvements for Check Point SandBlast Network can be seen in dashboard usability; the threat emulation logs and analysis reports could be made more intuitive and visually appealing. Enhancing the system for granular tuning to reduce false positives and allowing benign files to bypass checks more simply for non-expert users would be beneficial. Additionally, faster emulation times could be achieved by increasing file scanning speed through hardware productivity enhancements. A specific instance where file scanning speed posed an issue was when the time taken depended on the file size. Scanning can take less than a minute or up to 2 minutes for larger files. Enhancing the file scanning time would be a significant improvement to the system.
RK
Engineer at Taalumgroup
Achieve effective threat prevention and seamless integration with powerful technical support
Integration with third-party products is possible. For example, connecting a mail gateway with Palo Alto Networks WildFire allows them to handle prevention. Palo Alto Networks WildFire is a cloud-based sandboxing solution. The firewall is connected to WildFire, and XDR performs sandboxing from the cloud. WildFire conducts malware scanning and emulation, then informs the firewall to block threats based on the response. It also generates reports regarding malware and other issues. The sandboxing process involves sending sample files to the cloud for scanning, checking file authenticity, certificates, and detecting malicious code. WildFire performs multiple checks and informs the XDR agent about file status. This automatic process occurs within minutes or seconds. For unknown or suspicious files, immediate blocking occurs while samples are sent to WildFire for identification. I rate Palo Alto Networks WildFire a 9 out of 10.
SimonClark - PeerSpot reviewer
Cyber Security Advisor - Director at Fort Net UK
Able to discover unpatched servers, offers good stability, and scales very well
A low-cost service to evaluate the risk score of a supply chain would be very helpful. This could be useful for insurance companies offering cyber insurance to enterprise customers, providing the insurer with a valuable way to unobtrusively, quickly, and frequently assess their customers and apply appropriate premiums for the level of risk. This would also be useful for enterprises. They could, for example, assess companies prior to a merger or acquisition. What would also be useful for any enterprise would be if their supply chain has some kind of direct digital access to parts of their network.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
"The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises."
"It looks out for new cyber ​​threats and generates predictions based on behaviors that are already detected on a daily basis."
"We didn't really have any IPS before. So, Check Point has improved our security posture. People get used to doing things certain ways, which might not be the best or most secure way, and they can't do that now, which just requires more education of the user base. With the endpoint client, we've started to use Check Point for remote access."
"The best feature Check Point SandBlast Network offers is real-time threat extraction capabilities, which sanitizes the files, mails, and other content before reaching the end-users."
"It is a stable solution."
"Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox."
"You do not need to risk your network by using the in-line sandbox."
"We get support in the free version."
"It catches modified signatures of known viruses."
"My primary use case for this solution is for a secure gateway."
"The most valuable feature is the improved security that it offers."
"Wildfire has excellent features and offers some of the best security measures available, although it requires a significant budget."
"The most valuable features of Palo Alto Networks WildFire are the good URL and file analysis that uses artificial intelligence. It has different interfaces, such as rest, SMTP protocol, and HTTPS. The Security incidents and event management are very good. Additionally, there are many file types that are supported and there is no limit to the number of files it can handle simultaneously. It integrates well with SIEM solutions."
"Whole team can use the firewall and understand it."
"The solution has plenty of features."
"The solution is stable with 12 years of established historical data."
 

Cons

"It has some performance overhead, as sandboxing takes time and real-time delivery depends on threat extraction, requiring high performance."
"I think Check Point provides standard time which ideally most other vendors take to identify behaviors of a file by sending them into a sandbox environment for inspection."
"There have been a couple of things that we've tried where we read through the documentation, and we were really looking for some help in implementing, and technical support wanted me to try it first, then call them if it breaks. It would be nicer if they would hold my hand a bit more. It makes me nervous in production, as I don't have a lab."
"If any file is more than 15 GB, the inspection takes some time, so that can be reduced to make real-time protection much faster."
"We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us."
"The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool."
"Sometimes when we enable a feature in our security gateway, the CPU of the device goes high, so that can be improved."
"There should be some improvement in the solution's stability and scalability."
"If Wi-Fi can be improved to offer real-time security profiling and updates, it can prevent traits unrelated to Wi-Fi."
"I would like to see them continue on their developmental roadmap for the product."
"The data analytical system for deployment needs to improve."
"The only problem with this solution is the cost. It's expensive."
"They can keep on doing more updates. As new malware and viruses are coming out, they can make sure that WildFire is up to date."
"It's not really their problem, it's a problem across the board. There will always be problems with interrupted traffic. We have to set it up where we're playing a middle man game where we're stripping it out, looking at it, and then putting it back together and sending it on its way. That requires CPU cycles. And there's some overhead with that."
"The configuration should be made a little bit easier. I understand why it is as it is, but there should be a way to make it easier from the user side."
"Improving detection on non-Windows formats would be beneficial as there are many samples, such as Linux or ransomware for macOS."
"A low-cost service to evaluate the risk score of a supply chain would be very helpful."
 

Pricing and Cost Advice

"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"The product's cost is high."
"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
"We have seen ROI."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"It's pretty expensive but with respect to value for money, it's okay."
"We pay between $3,000 and $4,000 CAD ($2,200 - $3,000 USD) per year to maintain this solution."
"I use Palo Alto Networks WildFire's free version."
"​More expensive than other firewalls.​"
"There are different types of licenses."
"It IS a bit expensive, but I think you get what you pay for. Value is there."
"It is a reasonable price compared to other solutions on the market."
"This solution is very pricey and it depends on the package that you implement."
Information not available
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
881,665 professionals have used our research since 2012.
 

Comparison Review

it_user206346 - PeerSpot reviewer
Security Consultant at Webernetz.net - Network Security Consulting
Mar 11, 2015
Cisco ASA vs. Palo Alto Networks
Cisco ASA vs. Palo Alto: Management Goodies You often have comparisons of both firewalls concerning security components. Of course, a firewall must block attacks, scan for viruses, build VPNs, etc. However, in this post I am discussing the advantages and disadvantages from both vendors concerning…
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Marketing Services Firm
7%
Financial Services Firm
7%
Outsourcing Company
6%
Computer Software Company
11%
Manufacturing Company
8%
Financial Services Firm
8%
Comms Service Provider
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise8
Large Enterprise13
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise16
Large Enterprise29
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point SandBlast Network?
My experience with pricing and setup cost is that pricing was a bit high, but the setup cost was initially justified.
What needs improvement with Check Point SandBlast Network?
I feel that Check Point SandBlast Network could be improved with slight delays in cleaning the file delivery. Additio...
What is your primary use case for Check Point SandBlast Network?
My main use case for Check Point SandBlast Network is advanced threat protection, especially for scanning emails, att...
How does Cisco Firepower NGFW Firewall compare with Palo Alto Networks Wildfire?
The Cisco Firepower NGFW Firewall is a very powerful and very complex piece of anti-viral software. When one conside...
Which is better - Wildfire or FortiGate?
FortiGate has a lot going for it and I consider it to be the best, most user-friendly firewall out there. What I like...
How does Cisco ASA Firewall compare with Palo Alto's WildFire?
When looking to change our ASA Firewall, we looked into Palo Alto’s WildFire. It works especially in preventing advan...
Ask a question
Earn 20 points
 

Also Known As

No data available
No data available
RiskIQ Digital Threat Management
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Novamedia, Nexon Asia Pacific, Lenovo, Samsonite, IOOF, Sinogrid, SanDisk Corporation
DocuSign, Outbrain, The Economist Group, Rackspace, The Citizen Lab
Find out what your peers are saying about Palo Alto Networks, Microsoft, Proofpoint and others in Advanced Threat Protection (ATP). Updated: January 2026.
881,665 professionals have used our research since 2012.