Network Engineer at a tech services company with 51-200 employees
Real User
2019-02-12T12:12:00Z
Feb 12, 2019
Our primary use case of this solution is for file extraction. We send it out to SandBlast to open up the file to see if there is any malicious content in the file. We then send it back into the client environment.
We were looking to upgrade our protection to our endpoints, giving us more of a forensics backbone into when something happens on a machine. The product can let us know what happened, where it came from, etc. Our primary use case is for more insight into what is happening.
We use it as a method to ensure with all of our emails and the files coming through have secure attachments and no known issues: No malware, no known vulnerable hashes, nor anything malicious.
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast
We have it on our endpoints.
Our primary use case of this solution is for Edge firewalls and our cloud.
Our primary use case of this solution is for file extraction. We send it out to SandBlast to open up the file to see if there is any malicious content in the file. We then send it back into the client environment.
We use SandBlast to protect our mobile devices, as well as our iPads and Samsung tablets.
We were looking to upgrade our protection to our endpoints, giving us more of a forensics backbone into when something happens on a machine. The product can let us know what happened, where it came from, etc. Our primary use case is for more insight into what is happening.
We use it as a method to ensure with all of our emails and the files coming through have secure attachments and no known issues: No malware, no known vulnerable hashes, nor anything malicious.
We are a reseller, so we implement this solution for our customers.
My primary use of this solution is to supplement my existing antivirus and enable/enhance my anti-ransomware capabilities.
Our primary use case of this solution is for security in our data centers.
Our customers use this solution because it takes an .exe and applications, then scans them. So, it is good threat protection.
Our primary use case is using it to virtualize environments or create a sandbox in which we can use it to test malware.
We use the Threat Emulation blade feature on the Security Gateway.
Check Point is our main perimeter firewall vendor. We have several Check Point clusters doing different things within our environment.
My primary use case for this solution is to integrate with mobile device management.