Cloud Engineer at IT Quest Solutions|interglobalmsp
User
Top 5
2023-01-04T14:05:00Z
Jan 4, 2023
It provides excellent perimeter security since it is integrated with the most sophisticated tools to prevent events such as phishing, account approvals, malicious attachments, and all malware.
One of its characteristics that we liked the most was its analysis and emulation of activities in the emails since it manages to review them and inspect them if they have an infected attachment.
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast.
The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises.
Cloud Support at a tech company with 51-200 employees
User
2022-06-20T00:17:00Z
Jun 20, 2022
It shares the information of all its devices, this generates more robust perimeter security in addition to generating trust of the company with the manufacturer to prevent threats.
Network Engineer at a tech services company with 51-200 employees
Real User
2022-01-12T15:13:23Z
Jan 12, 2022
Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too.
When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.
Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox.
Technology consultant at a tech services company with 501-1,000 employees
Real User
2020-07-29T10:51:00Z
Jul 29, 2020
Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided.
Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast
The solution can detect and prevent attacks that may be encrypted.
The main feature of the solution is that it protects against malicious threats from the outside.
The product gives us advanced protection, including artificial intelligence and machine learning technologies and services.
It provides excellent perimeter security since it is integrated with the most sophisticated tools to prevent events such as phishing, account approvals, malicious attachments, and all malware.
It looks out for new cyber threats and generates predictions based on behaviors that are already detected on a daily basis.
One of its characteristics that we liked the most was its analysis and emulation of activities in the emails since it manages to review them and inspect them if they have an infected attachment.
The Check Point SandBlast Network gives us incredibly good features.
Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast.
The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files.
The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises.
It shares the information of all its devices, this generates more robust perimeter security in addition to generating trust of the company with the manufacturer to prevent threats.
Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too.
You do not need to risk your network by using the in-line sandbox.
The sandbox is able to scan files without adding a delay or compromising productivity.
Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us.
Threat extraction can help us to remove malicious content from documents by converting them to PDF.
It provides a high rate of catching the zero-day advanced threats.
When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.
Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox.
Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided.