Try our new research platform with insights from 80,000+ expert users
GaneshKhutwad - PeerSpot reviewer
Network security architect at ATOS
MSP
Top 5Leaderboard
Provides advanced threat prevention and utilizes geographic-based policies to mitigate attacks
Pros and Cons
  • "SandBlast Network enhances security by providing advanced threat prevention."
  • "The response times were slower, and getting support personnel on the call was more difficult."

What is our primary use case?

SandBlast Network enhances security by providing advanced threat prevention. It utilizes geographic-based policies to mitigate attacks. For example, it addresses the OWASP Top Ten security risks, which include common vulnerabilities such as XSS and SQL injection. These algorithms are designed to protect against the most prevalent and dangerous attacks in the world, making them an excellent solution for comprehensive security.

What needs improvement?

Check Point offers three types of support: Gold, Platinum, and Diamond. The level of support you receive should be based on the criticality of the issue, not solely on your client's support tier. While there are established support levels, I have experienced instances where the support provided was not categorized as Gold, Platinum, or Diamond but rather a standard support level. In such cases, the response times were slower, and getting support personnel on the call was more difficult.

For how long have I used the solution?


What do I think about the stability of the solution?

It integrate well into the environment. You can easily configure and trust all their devices.

I rate the solution's stability a nine out of ten.

Buyer's Guide
Check Point SandBlast Network
October 2025
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,778 professionals have used our research since 2012.

What do I think about the scalability of the solution?

There are 35000 US and 24000 UK users working on this solution.

I rate the solution's scalability a nine out of ten.

How are customer service and support?


Which solution did I use previously and why did I switch?

Check Point is a leading provider of network security solutions. Several vendors, such as Fortinet and Cisco, offer network security products, but Check Point stands out for its advanced features. Cisco is often preferred for routing devices and firewalls.

How was the initial setup?

The initial setup is neither very simple nor overly critical because it utilizes a three-tier architecture. This architecture has three tiers: the firewall, the central management system, and the security gateways, all of which must be interconnected. Generally, firewalls work based on this concept, using a three-tier architecture or similar solutions. If your device fails, you can restore your configuration from the centralized system or a local backup.

What was our ROI?

Check Point SandBlast Network products provide enhanced security. With geographic policies, you can easily block various types of traffic, including content-based filtering. This ensures that your network is highly secure within your environment.

What other advice do I have?

Overall, I rate the solution a nine out of teb=n.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2699931 - PeerSpot reviewer
Principal Cybersecurity Architect at a tech vendor with 10,001+ employees
Real User
Top 20
Rich features and strong customer support have enhanced malware inspection capabilities
Pros and Cons
  • "I have seen both money and time saved as a return on investment."
  • "Check Point SandBlast Network can be improved by adding more integration capabilities, such as integration with third-party firewalls, third-party EDR solutions, and SIEM."

What is our primary use case?

The primary use case for Check Point SandBlast Network is malware inspection, specifically the submission of files.

What is most valuable?

The product has rich features and excellent customer support. It's effective in meeting the specific needs of customers through deployment and integration. These features are important as they fulfill the purpose required by customers.

What needs improvement?

Check Point SandBlast Network can be improved by adding more integration capabilities, such as integration with third-party firewalls, third-party EDR solutions, and SIEM.

For how long have I used the solution?

I have been using Check Point SandBlast Network for more than five years.

What do I think about the stability of the solution?

Check Point SandBlast Network is almost stable.

What do I think about the scalability of the solution?

The scalability of Check Point SandBlast Network is good.

How are customer service and support?

The customer support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first solution I have used.

What was our ROI?

I have seen both money and time saved as a return on investment.

What's my experience with pricing, setup cost, and licensing?

The experience with pricing, setup costs, and licensing was good.

Which other solutions did I evaluate?

Before choosing Check Point SandBlast Network, I evaluated Fortinet and Trellix.

What other advice do I have?

I would advise others to evaluate thoroughly before deciding, especially in terms of integration with other third-party solutions. I would rate the overall solution nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point SandBlast Network
October 2025
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,778 professionals have used our research since 2012.
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Helps detect and understand vulnerabilities with good advanced protection
Pros and Cons
  • "The product gives us advanced protection, including artificial intelligence and machine learning technologies and services."
  • "We have found a need for the application to be a bit more elastic, bringing it to SAS services and not IAS."

What is our primary use case?

With so many threats at the computer level, we have sought solutions that allow us to improve our internal perimeter security at the technological level to minimize exposure and one by one ability to reduce recovery time in the event of an attack. 

As a necessary part of security, we needed a solution that could integrate easily with other solutions and third-party solutions to allow us an in-depth defense against any threat that we detect. Based on all this, we effectively wanted to protect ourselves with the best solution and brand on the market. 

How has it helped my organization?

The product gives us advanced protection, including artificial intelligence and machine learning technologies and services. It is managing to protect us from malware fishing, cyber-attacks, and network exploits and allows us to emulate each of these attacks in a controlled environment. It is one of the few solutions that manage to emulate in real-time and minimize exposure to vulnerabilities since it detects if items have been analyzed and emulated, thus giving a 100% solvency solution before any infiltration.

What is most valuable?

One of its most outstanding characteristics is that it offers us a fairly accurate forensic analysis. It is detailed and it does allow us to equip and understand the causes and the impact of each of the vulnerabilities or attacks. This allows us to take preventive measures and react to disasters, giving us correct solvency guidelines. All these characteristics allow us to understand in depth what has happened and why this reaction to the attack is one of the characteristics that we must understand that is outstanding and of a lot of help or guidance. 

What needs improvement?

We have found a need for the application to be a bit more elastic, bringing it to SAS services and not IAS. We need to understand where to find edge analytics in Edge. Right now, it's a bit sparse and not available for some of the products that we have in the services suite. I'd like to see it integrate with more third-party services so that we would have the ability to be an edge service and have high emulation in functionality. 

For how long have I used the solution?

I've used the solution for two years.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Reliable with good performance and the option for a free trial
Pros and Cons
  • "It looks out for new cyber ​​threats and generates predictions based on behaviors that are already detected on a daily basis."
  • "Today, we have it as part of a solution or a package. However, we'd like there to be a way where we can have the solution's features available to us in a cheaper way in the future."

What is our primary use case?

We were looking for several solutions that would meet certain network threat prevention needs - one of which was the tendency to have user workflow control points that could be affected on a day-to-day basis. Given these situations, we needed to provide better zero-day protection in real-time that would reduce corporate expenses and the consumption of costs generated by the security department while still getting information in real-time 24 hours a day. We came across different solutions that met these characteristics; however, in the end, we managed to choose and segment Sandblast computing services.

How has it helped my organization?

Sandblast is one of the tools provided by Check Point, which has given us the best zero-day prevention in real time. It offers optimized security management, which facilitates monitoring, analysis, reporting, user segmentation, detection, and analysis within our network. 

It is providing network administrators with productivity without interrupting their regular operations. 

The zero-day protection and prevention features that are included in the solution enhance the intelligence of searching for threats, infections, or attacks under interpretation or prevention technology. It looks out for new cyber ​​threats and generates predictions based on behaviors that are already detected on a daily basis.

What is most valuable?

We look forward to seeing many favorable characteristics of the Sandblast solution in the future. However, we must take into account that among the appliances that it comes installed and preconfigured on. Check Point provides the solution from Sandblast and offers it to be used for free when purchasing a Check Point product. Its best feature is that in the first year, we get unprecedented security protection and performance. After analysis, we can acquire other services available on the platform. This reduces costs as we have all security needs under one umbrella.  

What needs improvement?

We do take advantage of the year we get for free from Check Point. In the future, this solution can be added under licensing for consumption per user. Today, we have it as part of a solution or a package. However, we'd like there to be a way where we can have the solution's features available to us in a cheaper way in the future.  

For how long have I used the solution?

I've used the solution for one year and nine months.

What do I think about the stability of the solution?

So far, the solution has been very stable during the year and months that we have been using it. There are no crashes, loss of service, or malfunctions. It is one of the solutions that has given us the least amount of problems as security administrators.

What do I think about the scalability of the solution?

The solution has been quite scalable. It has allowed us to integrate different devices and, additionally, it has been incorporated into the solutions that we have today on the perimeter.

Which solution did I use previously and why did I switch?

Previously we were testing solutions from Microsoft, Amazon Web Services, and Fortinet to see which was the best, which we could implement in the end, and we ultimately decided on Check Point's services.

What's my experience with pricing, setup cost, and licensing?

The price-cost relationship, capabilities, and benefits that the solution gives us is something that must be evaluated. When we decide on certain applications, we must understand that organizations have a budget, and we must take care of them based on that. The free trial, however, is of great value. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Real-Time Protection at the Network Edge with SB Network
Pros and Cons
  • "The use of threat cloud protection with its artificial intelligence can automate possible threats."
  • "The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."

What is our primary use case?

We currently operate a hybrid environment, combining both on-premise infrastructure and cloud services through Microsoft Azure. Within this setup, we’ve deployed multiple Check Point gateways over time, with our current gateway running as a virtual appliance in Azure. It plays a key role in securing our cloud-based resources.

Among the activated blades, SandBlast stands out. We rely on it for advanced threat prevention especially its file extraction capabilities. Suspicious files are intercepted, analyzed, and only released to the end user once they’re confirmed to be safe. This proactive approach has been a game changer in defending against zero-day attacks and unknown threats, giving us a strong layer of protection without compromising performance or delivery.

How has it helped my organization?

The tool or blade is implemented in our SandBlast network. The Check Point gateway has provided us with even more advanced protection, check files or attachments in our network, verify threats, deliver (if they are not a problem) or block, in addition to the protection of zero-day for modern threats. It has perfectly complimented us since it is extremely fast. We are impressed with the tool's effectiveness and speed of delivery. The client does not even perceive this protection, which is excellent.

What is most valuable?

Some of the standout strengths of this tool are:

  1. Highly efficient threat extraction – It delivers files at impressive speed while filtering out malicious content. From our experience, it’s among the most reliable solutions we’ve tested.
  2. AI-powered threat cloud protection – The automation of threat detection is a game changer. Reviewing the logs reveals just how intelligent and proactive the system really is.
  3. Up-to-date security against zero-day threats – Regular updates and adherence to top-tier security practices give us strong confidence in the integrity of Check Point’s products. We trust that our environment remains secure and uncompromised.

What needs improvement?

There are really few areas for improvement, however, it seems to me that they should implement SandBlast network in the Check Point Infinity Portal, not as a blade but as a complete tool.

The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations.

Finally, Check Point support is not their strong point. They really need to improve it in order to provide a quality service. Issues take a long time to resolve.

For how long have I used the solution?

This is an exceptional Check Point feature, used by various vendor security tools. It's an incredible functionality that we have tested over at least the last year.

What do I think about the stability of the solution?

yes

What do I think about the scalability of the solution?

yes

How are customer service and support?

good

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not have a previous tool. It is hard for us to know if there is another solution as complete as Check Point.

What's my experience with pricing, setup cost, and licensing?

The best recommendation is to have a Check Point provider to help us with costs and implementations of the features that perfectly meet what the user is looking for.

Which other solutions did I evaluate?

A serious company always evaluates all the options, however, due to having a previous relationship, unique characteristics, and impressive performance, the Check Point SandBlast network was selected since it is an excellent tool.

What other advice do I have?

If you have the organizational and economic capacity to use a tool of this caliber, I recommend it without problems.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Suraj Varma - PeerSpot reviewer
Sr. Network Security Engineer at Digital Track Solutions Pvt Ltd
Real User
Top 5Leaderboard
Frequent updates with zero-day threats and decent pricing
Pros and Cons
  • "The most valuable thing about this product is that it keeps the network secure against zero-day threats."
  • "Sometimes, Check Point Sandblast requires more resources, which impacts network performance if it has been deployed with limited resources."

What is our primary use case?

We are using this solution to keep our organization network secure from threats as it provides a virtual environment for the files to scan and emulate.

How has it helped my organization?

It keeps our organization secure and is effective against zero-day threats as it gets frequently updated. 

What is most valuable?

The most valuable thing about this product is that it keeps the network secure against zero-day threats, as nowadays, many organizations are compromised by emerging threats.  

What needs improvement?

Sometimes, Check Point Sandblast requires more resources, which impacts network performance if it has been deployed with limited resources.

For how long have I used the solution?

I've been using the device for the last year.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is excellent.

How are customer service and support?

Our experience with customer service and support is excellent.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are using Check Point only.

How was the initial setup?

We followed the procedure provided by the OEM, and it is easy.

What about the implementation team?

We implemented it through an in-house team.

What's my experience with pricing, setup cost, and licensing?

As of now, everything is good enough.

Which other solutions did I evaluate?

No, we haven't evaluated other options.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Reseller
Top 5Leaderboard
An affordable and easy-to-deploy tool that is useful for protection against malicious threats
Pros and Cons
  • "The main feature of the solution is that it protects against malicious threats from the outside."
  • "There should be some improvement in the solution's stability and scalability."

What is our primary use case?

We are using it on top of email security and web security.

What is most valuable?

The main feature of the solution is that it protects against malicious threats from the outside. We utilize SandBlast solution to mitigate threats from outside to inside. As an ATP, the solution's role is to defend against threats and provide protection to the customer using the SandBlast as an ATP solution.

What needs improvement?

There should be some improvement in the solution's stability and scalability.

For how long have I used the solution?

I have been using Check Point SandBlast Network for the past three months.

What do I think about the stability of the solution?

Since the stability of the tool is good, I rate it nine out of ten.

What do I think about the scalability of the solution?

We have more than 50 customers, including IT heads, CTOs, and all are working on the solution.

I rate the solution's scalability a nine out of ten.

How was the initial setup?

The initial setup is straightforward, and it's a cloud-based solution.

The deployment is very easy. So, the deployment team is deploying this solution to the customer environment.

For deployment, I do not have any idea since I do the PoC part. It depends on the customer environment, the customer's use cases, and the design of the solution. We provide the solution based on the deployment. So it's not complex. It is very easy.

What about the implementation team?

We have certified engineers in-house who are responsible for deploying and implementing the solution. We have expert engineers specialized in Check Point.

What's my experience with pricing, setup cost, and licensing?

The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine.


What other advice do I have?

We are pitching the customer the benefits of the cloud. However, I don't have detailed knowledge about Check Point. So, to be honest, I lack deep visibility or specific information regarding the need for a Check Point experience.

I would tell those individuals seeking anti-threat protection on top of web security and email security to consider SandBlast. By using SandBlast, we can effectively manage everything.

The solution is a single premium package suitable for heavy usage.

Overall, I rate the solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 20
Efficient and user-friendly, with good security
Pros and Cons
  • "One of its characteristics that we liked the most was its analysis and emulation of activities in the emails since it manages to review them and inspect them if they have an infected attachment."
  • "We would like to see this solution reach mobile devices more efficiently, through apps or more specific products."

What is our primary use case?

It is one of the applications that support us in security and attacks on the network with a capacity for interpretation and analysis of the data that enters our corporate network. 

It is an efficient and friendly service, giving detailed analysis and centralized detection of events, including zero-day attacks, which are analyzed and managed faithfully. 

These capabilities are indispensable for an organization as they help safeguard the integrity and health of each team. 

These are the advantages and needs that we have achieved when using Check Point SandBlast.

How has it helped my organization?

What Check Point has come to give us as a benefit is the power to control, register, analyze, and give a general and safe view of the events and activities carried out by the teams that manage the organization's security. 

These capabilities can be managed from a single panel of equipment configurations and controls. This helps and benefits each of the organization's members that can be attacked because they will always be safe. 

Mail investigation is another of the benefits provided. 

What is most valuable?

One of its characteristics that we liked the most was its analysis and emulation of activities in the emails since it manages to review them and inspect them if they have an infected attachment. After that, it delivers the filtered emails safely. This avoids an analysis or vulnerability of less experienced users who, in most cases, are the weakest link. It offers the ability to take the solution to cloud environments or totally on-premise, which helps us have the ability to adapt to different environments. 

What needs improvement?

We would like to see this solution reach mobile devices more efficiently, through apps or more specific products. For the moment, the solution adapts efficiently to corporate environments as technological demands evolve. It is for this same reason that I hope that these innovations will be integrated into SandBlast and in other Check Point products, as it is one of the best that I have tried. It offers us a competitive advantage and efficient security. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point SandBlast Network Report and get advice and tips from experienced pros sharing their opinions.
Updated: October 2025
Buyer's Guide
Download our free Check Point SandBlast Network Report and get advice and tips from experienced pros sharing their opinions.