IT Security Engineer at a government with 1,001-5,000 employees
Real User
2019-02-12T12:12:00Z
Feb 12, 2019
I would like to see more fine-tune MDM integration, specifically iPhones and Symantec pieces. It integrated in great, but not all of the features went in smoothly. They should expand the partnership with some of the bigger MDM companies that the product relies on. Every time we try to do SandBlast, we run into a conundrum where the certificate issue comes into play. We've gone through it with engineers and it's very painful to keep up on that process. There could be improvements with changing the HTTPS inspection mechanism, or how it's done. That would be huge. Everybody that I've spoken to engineer-wise has said that is very painful and time-consuming. This would be one of the things that I would recommend that they fix. I just want the product to work and make sure it's reliable. That's my biggest thing from the security aspect.
I would like to see more visibility into the actual devices that it's protecting. In some cases, you don't want to see a lot. However, for our purposes, I would like to see more information about the applications which are installed, then have more control over what can and what cannot be installed. That would be very useful for us. The GUI could be a bit more intuitive, as far as going from page to page and understanding what you're looking in the beginning. After you use it for a while, you get used it.
I would like to see some speed improvements, e.g., how quickly you can get through all the menus. It crashes sometimes because we push so much through it. Therefore, I would like to see more small things behind the scenes, such as, back-end stability in terms of the management application. I would also like to improve the usability of the application to improve the quality of life of our users.
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Owner at a tech services company with 1-10 employees
Real User
2019-02-12T12:12:00Z
Feb 12, 2019
It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects.
Security Architect at a manufacturing company with 10,001+ employees
Real User
2019-02-12T12:12:00Z
Feb 12, 2019
Using it in the beginning was difficult because I had never used anything similar. In terms of navigating the UI, it was all not too bad, but there is definitely a learning curve. If I had gone through additional training, it would have been helpful.
Sr Network Engineer at Columbus Regional Airport Authority
Real User
2019-02-12T12:12:00Z
Feb 12, 2019
The number one thing that's a little bit frustrating is we implement two-factor authentication for remote access. We thought we were going to be able to pick users or groups to do two-factor against, and some did not do two-factor against. We found out that we can only do that either in the mobile access blade in which we can have it all do two-factor or not, and then the remote VPN all do two-factor or not. For our own internal employees, I want them to have an option to either do clientless or client depending on the situation. One of the main reasons why we picked Check Point was because we needed a clientless option for third-parties who don't have our hardware. Check Point is not doing two-factor authentication for that. This is something that we've been really asking about and we'd like to be able to do: Two-factor authentication off blade based groups (or something else). We know it is on the roadmap.
Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast
I would like to see more fine-tune MDM integration, specifically iPhones and Symantec pieces. It integrated in great, but not all of the features went in smoothly. They should expand the partnership with some of the bigger MDM companies that the product relies on. Every time we try to do SandBlast, we run into a conundrum where the certificate issue comes into play. We've gone through it with engineers and it's very painful to keep up on that process. There could be improvements with changing the HTTPS inspection mechanism, or how it's done. That would be huge. Everybody that I've spoken to engineer-wise has said that is very painful and time-consuming. This would be one of the things that I would recommend that they fix. I just want the product to work and make sure it's reliable. That's my biggest thing from the security aspect.
I would like to see different types of network traffic that we could actually analyze, not just files, but the users as well.
I would like to see more visibility into the actual devices that it's protecting. In some cases, you don't want to see a lot. However, for our purposes, I would like to see more information about the applications which are installed, then have more control over what can and what cannot be installed. That would be very useful for us. The GUI could be a bit more intuitive, as far as going from page to page and understanding what you're looking in the beginning. After you use it for a while, you get used it.
There was a learning curve for our general population of employees (the user).
I would like to see some speed improvements, e.g., how quickly you can get through all the menus. It crashes sometimes because we push so much through it. Therefore, I would like to see more small things behind the scenes, such as, back-end stability in terms of the management application. I would also like to improve the usability of the application to improve the quality of life of our users.
I would like for them to improve the visibility in the product.
It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects.
I imagine there will be improvements in later versions. There are hotfixes that come out all the time.
Using it in the beginning was difficult because I had never used anything similar. In terms of navigating the UI, it was all not too bad, but there is definitely a learning curve. If I had gone through additional training, it would have been helpful.
The number one thing that's a little bit frustrating is we implement two-factor authentication for remote access. We thought we were going to be able to pick users or groups to do two-factor against, and some did not do two-factor against. We found out that we can only do that either in the mobile access blade in which we can have it all do two-factor or not, and then the remote VPN all do two-factor or not. For our own internal employees, I want them to have an option to either do clientless or client depending on the situation. One of the main reasons why we picked Check Point was because we needed a clientless option for third-parties who don't have our hardware. Check Point is not doing two-factor authentication for that. This is something that we've been really asking about and we'd like to be able to do: Two-factor authentication off blade based groups (or something else). We know it is on the roadmap.
It does the process in the background and it does a wonderful job but the methodologies don't pop up. They should make it more interactive.