Try our new research platform with insights from 80,000+ expert users

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Check Point SandBlast Network effectively detects and prevents threats, keeping environments secure with zero-day threat protection.
The sandboxing feature provides advanced protection by quickly quarantining files, reducing false positives and ensuring fast threat detection.
The system's scalability and integration with the cloud enhance overall network security and allow for seamless analysis and emulation of potential threats.
Threat extraction capabilities sanitize incoming files and emails, providing real-time threat prevention and maintaining productivity.
Check Point SandBlast Network utilizes caching, static analysis, and AI-driven threat cloud protection for comprehensive and efficient threat management.

CONS

Check Point SandBlast Network experiences stability issues, leading to outages not related to customer actions and changes on their end.
The technical support is criticized for being tedious, slow in response, and hesitant to offer direct assistance during implementation.
Users report significant performance hits, particularly with the Threat Emulation feature, which increases CPU and memory consumption and can slow down processes.
Integration with third-party vendors is limited, including EDR and CRM products, with a call for better compatibility and more elastic options such as moving to SAS services.
Pricing is considered high, and documentation or best practices are hard to navigate, indicating a need for more user-friendly resources.
 

Check Point SandBlast Network Pros review quotes

MW
May 8, 2025
Check Point SandBlast Network has positively impacted our organization by reducing incidents, improving user confidence, and saving time since implementing it. With around 2,000 users in our organization, after deploying threat emulation for network security, we haven't seen any incidents, including zero-day or ransomware attacks.
BD
May 29, 2021
The sandbox is able to scan files without adding a delay or compromising productivity.
RS
Feb 12, 2019
We didn't really have any IPS before. So, Check Point has improved our security posture. People get used to doing things certain ways, which might not be the best or most secure way, and they can't do that now, which just requires more education of the user base. With the endpoint client, we've started to use Check Point for remote access.
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,706 professionals have used our research since 2012.
OP
Aug 29, 2020
It provides a high rate of catching the zero-day advanced threats.
KK
Aug 9, 2024
It is a stable solution.
William Cambronero - PeerSpot reviewer
Jun 23, 2025
The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises.
HT
Aug 27, 2020
When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.
Abnet Tsegaye Belay - PeerSpot reviewer
Sep 24, 2025
Check Point SandBlast Network stops unknown malware and zero-day attacks, and we rely on it to prevent zero-day threats before they enter our enterprise network to protect our productivity, so it has to sanitize files that are delivered immediately to our users in our organization.
AshleyMorales - PeerSpot reviewer
Nov 29, 2023
The solution can detect and prevent attacks that may be encrypted.
LD
Oct 29, 2025
The use of threat cloud protection with its artificial intelligence can automate possible threats.
 

Check Point SandBlast Network Cons review quotes

MW
May 8, 2025
Improvements for Check Point SandBlast Network can be seen in dashboard usability; the threat emulation logs and analysis reports could be made more intuitive and visually appealing.
BD
May 29, 2021
The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue.
RS
Feb 12, 2019
There have been a couple of things that we've tried where we read through the documentation, and we were really looking for some help in implementing, and technical support wanted me to try it first, then call them if it breaks. It would be nicer if they would hold my hand a bit more. It makes me nervous in production, as I don't have a lab.
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,706 professionals have used our research since 2012.
OP
Aug 29, 2020
The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption.
KK
Aug 9, 2024
The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool.
William Cambronero - PeerSpot reviewer
Jun 23, 2025
When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization.
HT
Aug 27, 2020
I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it.
Abnet Tsegaye Belay - PeerSpot reviewer
Sep 24, 2025
It has some performance overhead, as sandboxing takes time and real-time delivery depends on threat extraction, requiring high performance.
AshleyMorales - PeerSpot reviewer
Nov 29, 2023
The management of alerts could improve them a bit - especially in event management.
LD
Oct 29, 2025
The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations.