Check Point SandBlast Network excels with its proactive prevention techniques, zero-day protection, and the ability to cleanse files. It offers threat emulation and extraction, dynamic malware updates, and seamless integration with enterprise systems. It ensures network segregation, protects against phishing, and performs forensic analysis. Its cloud-based service aids in application control and enhances security against malware and bots. Its sandboxing feature analyzes files outside the company environment, maintaining network integrity.
- "Check Point SandBlast Network has positively impacted our organization by reducing incidents, improving user confidence, and saving time since implementing it. With around 2,000 users in our organization, after deploying threat emulation for network security, we haven't seen any incidents, including zero-day or ransomware attacks."
- "I have seen both money and time saved as a return on investment."
- "It is a stable solution."
Check Point SandBlast Network users mention an improvement need in file type coverage and machine learning capabilities. They find MDM integration lacking, particularly with iPhones. Users report slow performance, complex UI navigation, inadequate third-party integration, and limited file scanning numbers. They also highlight high resource demands, configuration complexity, and costly service options. Additional concerns include delayed support response times, incomplete guides, log queue management difficulties, and ineffective attachment scanning during peak times.
- "Improvements for Check Point SandBlast Network can be seen in dashboard usability; the threat emulation logs and analysis reports could be made more intuitive and visually appealing."
- "Check Point SandBlast Network can be improved by adding more integration capabilities, such as integration with third-party firewalls, third-party EDR solutions, and SIEM."
- "The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool."