Try our new research platform with insights from 80,000+ expert users

Check Point SandBlast Network vs Trend Micro Deep Discovery comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point SandBlast Network
Ranking in Advanced Threat Protection (ATP)
10th
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
36
Ranking in other categories
No ranking in other categories
Trend Micro Deep Discovery
Ranking in Advanced Threat Protection (ATP)
20th
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
26
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (5th), Network Detection and Response (NDR) (7th)
 

Mindshare comparison

As of April 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point SandBlast Network is 6.0%, up from 5.1% compared to the previous year. The mindshare of Trend Micro Deep Discovery is 1.8%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

GaneshKhutwad - PeerSpot reviewer
Provides advanced threat prevention and utilizes geographic-based policies to mitigate attacks
Check Point offers three types of support: Gold, Platinum, and Diamond. The level of support you receive should be based on the criticality of the issue, not solely on your client's support tier. While there are established support levels, I have experienced instances where the support provided was not categorized as Gold, Platinum, or Diamond but rather a standard support level. In such cases, the response times were slower, and getting support personnel on the call was more difficult.
Vladimir Alexandrov - PeerSpot reviewer
Enhanced threat detection through superior sandboxing capabilities with competitive pricing
With Trend Micro Deep Discovery, our enterprise clients can identify forgotten or unmanaged network segments, thereby mitigating unexpected network actions such as outdated antivirus software operations. When under attack, such as with ransomware, it allows us to identify the attack vector and disable it. It also assists in security audits required to prove certain network security measures.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The Check Point SandBlast Network gives us incredibly good features."
"Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox."
"Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast."
"In terms of the scalability, it's expandable across the cloud."
"The forensics reports and the ability to sandbox malware are its most valuable features."
"Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."
"It provides a high rate of catching the zero-day advanced threats."
"It is a stable solution."
"The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
"The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
"Sandboxing gives us a chance to identify malicious behavior, especially for unknown vulnerabilities, although it's rarely needed as a last resort after all other security measures have failed."
"One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery."
"The most valuable features are monitoring for advanced persistent threats, the system runs in a sandbox allowing for effective zero-day exploits management, and the Inspector has a built-in sandbox."
"The platform provides all essential features for discovery and administration."
"As a security product, managing threats is crucial for my clients."
"There is no downtime or server vulnerability with this solution."
 

Cons

"I would like to see these solutions being easier to manage from mobile applications - from either iOS or Android - including other operating systems that appear in the future."
"There should be some improvement in the solution's stability and scalability."
"I would like for them to improve the visibility in the product."
"The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption."
"Most of the time stability is okay, but sometimes, we're not able to contact the cloud. It won't last for long. The product could be faster."
"They need to improve the GUI interface."
"The technical support could use some work, but it's okay. It's a little bit of a tedious process to get through."
"We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us."
"Some of the end users may not be technically proficient, so they occasionally face problems due to a lack of knowledge."
"The tool's configuration can be made easier."
"The solution needs improvement in terms of pricing."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"I would like to see them create a rule where It could integrate with the network and start mitigating with auto-detection."
"The scalability is sometimes limited."
"Trend Micro Deep Discovery is a very expensive solution, making it very hard to sell."
"The product's security features need enhancement."
 

Pricing and Cost Advice

"We have seen ROI."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
"The product's cost is high."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
"Overall, the price is good."
"Its price is fine, but Trend Micro can improve the pricing in general. It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based."
"The price of the solution is lower compared to the competition."
"The pricing is okay for some, and sometimes, some people find it expensive."
"Compared to its competitors, Trend Micro Deep Discovery is a little expensive."
"The licensing cost is a bit pricey. We pay a yearly subscription."
"Overall, Trend Micro Deep Discovery has proven to be a reliable solution that enhances our security posture while minimizing operational disruptions."
"The tool’s licensing costs depend on the customers."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
849,190 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
14%
Government
11%
Energy/Utilities Company
6%
Computer Software Company
16%
Financial Services Firm
11%
Manufacturing Company
10%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point SandBlast Network?
The solution can detect and prevent attacks that may be encrypted.
What needs improvement with Check Point SandBlast Network?
The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool.
What do you like most about Trend Micro Deep Discovery?
The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy.
What is your experience regarding pricing and costs for Trend Micro Deep Discovery?
Trend Micro Deep Discovery is expensive compared to regular antivirus solutions, though it is competitively priced compared to similar products with advanced features.
What needs improvement with Trend Micro Deep Discovery?
The main issue is its high cost, which makes it difficult to sell. The technical support has declined in quality over the years. It is necessary for highly qualified partners to get better pre-qual...
 

Also Known As

No data available
Trend Micro Deep Discovery Inspector, Trend Micro Deep Discovery Analyzer
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Allied Telesis, Atma Jaya Catholic University of Indonesia, Babou, Blekinge County Council, Delacour, Hiroshima Prefectural Government, Live Nation Entertainment Inc., Mazda Motor Logistics Europe, McGill University Health Centre, Mikuni Corporation, OKWAVE, Sinar Mas Land, SWICA, UTOC Corporation
Find out what your peers are saying about Check Point SandBlast Network vs. Trend Micro Deep Discovery and other solutions. Updated: April 2025.
849,190 professionals have used our research since 2012.