Try our new research platform with insights from 80,000+ expert users

Check Point SandBlast Network vs Palo Alto Networks WildFire vs RiskIQ Illuminate comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Check Point SandBlast Network3.3%
Microsoft Defender for Office 3658.3%
Palo Alto Networks WildFire7.5%
Other80.9%
Advanced Threat Protection (ATP)
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Palo Alto Networks WildFire7.5%
Microsoft Defender for Office 3658.3%
Proofpoint Email Protection5.9%
Other78.3%
Advanced Threat Protection (ATP)
Attack Surface Management (ASM) Market Share Distribution
ProductMarket Share (%)
RiskIQ Illuminate1.0%
CrowdStrike Falcon7.5%
HackerOne5.0%
Other86.5%
Attack Surface Management (ASM)
 

Featured Reviews

MW
Technical Specialist at Softcell Technologies Limited
Comprehensive security solution mitigates advanced threats
Improvements for Check Point SandBlast Network can be seen in dashboard usability; the threat emulation logs and analysis reports could be made more intuitive and visually appealing. Enhancing the system for granular tuning to reduce false positives and allowing benign files to bypass checks more simply for non-expert users would be beneficial. Additionally, faster emulation times could be achieved by increasing file scanning speed through hardware productivity enhancements. A specific instance where file scanning speed posed an issue was when the time taken depended on the file size. Scanning can take less than a minute or up to 2 minutes for larger files. Enhancing the file scanning time would be a significant improvement to the system.
RK
Engineer at Taalumgroup
Achieve effective threat prevention and seamless integration with powerful technical support
Integration with third-party products is possible. For example, connecting a mail gateway with Palo Alto Networks WildFire allows them to handle prevention. Palo Alto Networks WildFire is a cloud-based sandboxing solution. The firewall is connected to WildFire, and XDR performs sandboxing from the cloud. WildFire conducts malware scanning and emulation, then informs the firewall to block threats based on the response. It also generates reports regarding malware and other issues. The sandboxing process involves sending sample files to the cloud for scanning, checking file authenticity, certificates, and detecting malicious code. WildFire performs multiple checks and informs the XDR agent about file status. This automatic process occurs within minutes or seconds. For unknown or suspicious files, immediate blocking occurs while samples are sent to WildFire for identification. I rate Palo Alto Networks WildFire a 9 out of 10.
SimonClark - PeerSpot reviewer
Cyber Security Advisor - Director at Fort Net UK
Able to discover unpatched servers, offers good stability, and scales very well
A low-cost service to evaluate the risk score of a supply chain would be very helpful. This could be useful for insurance companies offering cyber insurance to enterprise customers, providing the insurer with a valuable way to unobtrusively, quickly, and frequently assess their customers and apply appropriate premiums for the level of risk. This would also be useful for enterprises. They could, for example, assess companies prior to a merger or acquisition. What would also be useful for any enterprise would be if their supply chain has some kind of direct digital access to parts of their network.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast."
"It is a stable solution."
"The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
"Check Point SandBlast Network has positively impacted our organization by reducing incidents, improving user confidence, and saving time since implementing it. With around 2,000 users in our organization, after deploying threat emulation for network security, we haven't seen any incidents, including zero-day or ransomware attacks."
"The solution can detect and prevent attacks that may be encrypted."
"Check Point has enabled us to detect a lot of threats and prevented a lot of threats from entering our environments. It has kept us safe."
"It enables my IT system to apply threat detection intelligence and diffuse the endpoint and potential threat attacks and phishing attacks onto the system in the most proactive and secure manner."
"The main feature of the solution is that it protects against malicious threats from the outside."
"The most valuable feature of this solution is how it keeps up-to-date with viruses."
"The technical support is good."
"The solution is easy to use and the Panorama feature is good. The software management or the malware blocking and some authentication management system are good."
"Detailed reporting on analysis of content. The inspections are easily applied to security policy profiles and profile groups, and may be assigned on a per-rule basis."
"With this product, we receive the best monitoring and reports.​"
"Stability-wise, I rate the solution a ten out of ten since we never faced any issues."
"It helps us when segmenting and securing the network and all sort of technologies, all sort of next generation needs. It's next generation phases of firewall like anti-virus, sandboxing, wifi, and VPN."
"There are multiple features like management, intrusion prevention (IPS), URL filtering, anti-spam, and antivirus."
"The solution is stable with 12 years of established historical data."
 

Cons

"I am very leery right now about the stability. We've had three outages in the last month because of Check Point, not because of something that the customer has done, but because of changes on the Check Point side."
"There have been a couple of things that we've tried where we read through the documentation, and we were really looking for some help in implementing, and technical support wanted me to try it first, then call them if it breaks. It would be nicer if they would hold my hand a bit more. It makes me nervous in production, as I don't have a lab."
"When we enable sandboxing for all users, the CPU utilization of the firewall increases significantly, which could be improved."
"Today, we have it as part of a solution or a package. However, we'd like there to be a way where we can have the solution's features available to us in a cheaper way in the future."
"The technical support could use some work, but it's okay. It's a little bit of a tedious process to get through."
"It has some performance overhead, as sandboxing takes time and real-time delivery depends on threat extraction, requiring high performance."
"The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption."
"Sometimes when we enable a feature in our security gateway, the CPU of the device goes high, so that can be improved."
"As a firewall and 360 degrees of security, there needs to be more maturity."
"The GUI is better in 8.0, but I still feel it lacks the fast response most of us desire. Logs are much quicker."
"Our main concern is that everything has to be synced with the WildFire Cloud and has to be checked through the subscription."
"The only problem with this solution is the cost. It's expensive."
"The product's false positive logs could be more user-friendly to understand. They could provide examples of precious cases to learn."
"The automation and responsiveness need improvement."
"The only complaint that we receive from our customers is in regards to the price."
"The support is good but they could be faster."
"A low-cost service to evaluate the risk score of a supply chain would be very helpful."
 

Pricing and Cost Advice

"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
"The product's cost is high."
"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"We have seen ROI."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"The physical appliance is around €3,000 or €4,000, and then, you have the licensing for a year for around €3,000."
"The price is fair and comparable to other solutions."
"It's pretty expensive but with respect to value for money, it's okay."
"We are on an annual subscription. When we purchased the firewall, we had activated this solutions license for a minimum of one year. The price of the solution is fair."
"I use Palo Alto Networks WildFire's free version."
"There are different types of licenses."
"The price could be better."
"Palo Alto Networks solutions are typically on the higher end of pricing, but considering the value and integration with our existing infrastructure, it is worth the investment."
Information not available
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
881,665 professionals have used our research since 2012.
 

Comparison Review

it_user206346 - PeerSpot reviewer
Security Consultant at Webernetz.net - Network Security Consulting
Mar 11, 2015
Cisco ASA vs. Palo Alto Networks
Cisco ASA vs. Palo Alto: Management Goodies You often have comparisons of both firewalls concerning security components. Of course, a firewall must block attacks, scan for viruses, build VPNs, etc. However, in this post I am discussing the advantages and disadvantages from both vendors concerning…
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Marketing Services Firm
7%
Financial Services Firm
7%
Outsourcing Company
6%
Computer Software Company
11%
Manufacturing Company
8%
Financial Services Firm
8%
Comms Service Provider
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise8
Large Enterprise13
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise16
Large Enterprise29
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point SandBlast Network?
My experience with pricing and setup cost is that pricing was a bit high, but the setup cost was initially justified.
What needs improvement with Check Point SandBlast Network?
I feel that Check Point SandBlast Network could be improved with slight delays in cleaning the file delivery. Additio...
What is your primary use case for Check Point SandBlast Network?
My main use case for Check Point SandBlast Network is advanced threat protection, especially for scanning emails, att...
How does Cisco Firepower NGFW Firewall compare with Palo Alto Networks Wildfire?
The Cisco Firepower NGFW Firewall is a very powerful and very complex piece of anti-viral software. When one conside...
Which is better - Wildfire or FortiGate?
FortiGate has a lot going for it and I consider it to be the best, most user-friendly firewall out there. What I like...
How does Cisco ASA Firewall compare with Palo Alto's WildFire?
When looking to change our ASA Firewall, we looked into Palo Alto’s WildFire. It works especially in preventing advan...
Ask a question
Earn 20 points
 

Also Known As

No data available
No data available
RiskIQ Digital Threat Management
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Novamedia, Nexon Asia Pacific, Lenovo, Samsonite, IOOF, Sinogrid, SanDisk Corporation
DocuSign, Outbrain, The Economist Group, Rackspace, The Citizen Lab
Find out what your peers are saying about Palo Alto Networks, Microsoft, Proofpoint and others in Advanced Threat Protection (ATP). Updated: January 2026.
881,665 professionals have used our research since 2012.