What is our primary use case?
One of the great needs that our company was going through was the need to protect its infrastructure against hackers or malicious bots, as well as cyber-attacks.
We wanted a robust technology that would meet our objectives. We wanted to prevent attacks on our business environment. In addition, as a company, we already use various Check Point technologies and we wanted to continue with the same scope and security that they have offered us in recent years. That's why Check Point SandBlast Network provides us with that security by scanning everything that passes through our network.
How has it helped my organization?
Since implementing the Check Point SandBlast Network tool in the organization, in an environment of around 200 servers (both physical and virtual), we also have three high-availability clusters.
Before, we only depended on a firewall; however, this acquisition has helped us a lot to improve the entire security environment of our company. In addition, the tool has excellent features such as Threat Emulation and Threat Extraction as well as sandboxing. We can even extract the malicious content of the files or block files completely and can also work as email APT and can remove malicious content from the email body.
What is most valuable?
We have found several valuable features in the Check Point SandBlast Network. One of those features is that we can download a file and emulate it outside of our company and know that it is clean.
Like any other company that handles sensitive data, we needed a tool that would protect our network and be able to improve security day by day.
The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises.
What needs improvement?
When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization. Another problem is that some PC with minimum characteristics makes them slow, causing slowness in computers where we have to invest in PCs to increase their performance or change them
Another point to improve is the support since they do not give an effective and fast solution to the clients when they have problems with any tool or feature.
For how long have I used the solution?
I have been using and implementing this tool for about three years..
What do I think about the stability of the solution?
It presents medium stability. Sometimes the portal is hard to enter, and that affects the performance of equipment, however, in general, it has excellent stability.
What do I think about the scalability of the solution?
The solution has excellent scalability.
How are customer service and support?
The support they offer is not very good since they take a long time to provide a solution to your problem.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Previously we had a firewall and we chose to implement this tool since we have always worked with this brand, and it has been very feasible for us to continue to do so.
How was the initial setup?
The configuration is simple it is very user-friendly.
What about the implementation team?
The provider provided us with a support agent to ensure that the configuration was made.
What was our ROI?
Of importance in a company is the security of its computer platforms. When making an investment with these tools, you are taking care of an important heritage that will double your profits.
What's my experience with pricing, setup cost, and licensing?
Check Point offers good prices. There are costs. However, that should not stop a company from maintaining good security.
Which other solutions did I evaluate?
Other brands are not evaluated since we wanted to have the Check Point trend and not mix brands.
What other advice do I have?
It is a very good, reliable, and robust tool. You can be confident that it will protect the organization.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.