Try our new research platform with insights from 80,000+ expert users
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
High detection with few false positives and able to handle large volumes of data
Pros and Cons
  • "Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast."
  • "There is a limit on the number of files that can be scanned in real-time, which could lead to us being found with our guard down on a high-traffic day."

What is our primary use case?

We started using it as a suggestion to complement the current solution we had in place. 

The sound of AI engines working non-stop to detect threats in email and web downloads was hard to resist knowing that a lot of the times that there's a breach, the human behind the screen had something to do with it (we're the weakest links in the chain). 

It had been seen before that people click on links in suspicious emails or even insist on entering in websites that aren't safe. 

SandBlast protects the network and endpoint from some of the most vicious malware there is - including trojans and ransomware - without compromising productivity.

How has it helped my organization?

We're very surprised with SandBlast's high detection rates, which also shows the high risks the company's network is exposed to daily. This solution will also protect from zero-day threats. This shows off how advanced the AI engine's heuristics are by assessing the possible threat. It's capable of blocking access, eliminating it, and creating a signature that will help detect and eliminate malware like it in the future. 

Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast.

What is most valuable?

Our company has a large number of employees that exchange dozens to hundreds of emails every day. That's thousands of emails sent and received daily by our email servers. Some threats/malware come coded in large files. Sometimes they're hidden to a point an anti-virus/anti-malware solution alone would let it slip. 

SandBlast will sanitize any downloaded content and files both from an internal/ external email remittent and unknown websites using the emulator, which will detect any signature not previously recognized by Check Point.

What needs improvement?

There is a limit on the number of files that can be scanned in real-time, which could lead to us being found with our guard down on a high-traffic day. We knew that from the beginning, so there is more than one device integrated. 

Not all file types are scanned, so we had to limit the type of files that could be shared. We've detected slower performance in older equipment, sometimes forcing the replacement of it since we can't proactively downgrade the security standards on an endpoint for better performance, knowing this causes a threat to the organization.

Buyer's Guide
Check Point SandBlast Network
July 2025
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
864,053 professionals have used our research since 2012.

For how long have I used the solution?

We've used the solution for three or more years.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE
Real User
Great compliance and reporting features with a helpful dashboard
Pros and Cons
  • "It enables my IT system to apply threat detection intelligence and diffuse the endpoint and potential threat attacks and phishing attacks onto the system in the most proactive and secure manner."
  • "There should be some customized price reductions in the offered packages."

What is our primary use case?

SandBlast Network enables us to restrict and prevent zero-day threats and endpoints attacks completely. This sandboxing solution helps us to diffuse the malware and phishing attacks in real-time with a single click. It's a highly advanced and proactive solution for preventing social engineering attacks and is far better than any unconventional sandboxing solution. 

It also helps in restricting phishing emails and endpoints under the email management system as it acts as a protective shield and applies threat detection intelligence for finding the security threats all over the IT system.

How has it helped my organization?

Check Point SandBlast Network has increased the security system inside out from web devices to cloud servers in the most efficient and time-bound manner. It enables my IT system to apply threat detection intelligence and diffuse the endpoint and potential threat attacks and phishing attacks onto the system in the most proactive and secure manner. It protects our cloud server end to end and is one of the best threat intelligence software for our businesses.

It has automated the security system for us, due to which overall productivity and enhancement are observed all over.

What is most valuable?

Strong Architecture with high-grade advanced intelligence for identifying potential threats and diffusing the same in time bound manner.

Improved income for business due to strengthening security and more confidence in attracting clients.

The compliance and reporting features are superb and help to gain the data views and insights throughout.

The dashboard is quite interactive, and it keeps adding new features as per customized requests from business users.

Its cloud-based service for application control management, strengthening anti-bot, anti-virus, and anti-spam system is quite impressive and aids in attracting more clients on board.

What needs improvement?

I would like to recommend a pricing and costing strategy. Kindly go ahead with some customized price reductions in the offered packages to have a better deal for all kinds of startups as well. This will ensure more and more new infusion of business users, and there will be an overall improved trajectory for improved outcomes and genuine feedback from users all over. Also, the customization features can be further enhanced so that it can attract millions of eyeballs, and more testing of services can be done by various businesses.

For how long have I used the solution?

Its been over six months that we are using the solution. It's been a perfect experience so far.

What do I think about the stability of the solution?

It is highly stable and gives better outcomes with an extended timeframe.

What do I think about the scalability of the solution?

The is the most scalable solution.

How are customer service and support?

Technical support is good.

How would you rate customer service and support?

Positive

How was the initial setup?

It's quite comprehensive and easy to deploy and manage.

What about the implementation team?

We deployed with the assistance of vendor management throughout.

The level of expertise on offer is ten out of ten.

What was our ROI?

We've seen an ROI of 80%.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point SandBlast Network
July 2025
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
864,053 professionals have used our research since 2012.
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Reseller
Top 5Leaderboard
An affordable and easy-to-deploy tool that is useful for protection against malicious threats
Pros and Cons
  • "The main feature of the solution is that it protects against malicious threats from the outside."
  • "There should be some improvement in the solution's stability and scalability."

What is our primary use case?

We are using it on top of email security and web security.

What is most valuable?

The main feature of the solution is that it protects against malicious threats from the outside. We utilize SandBlast solution to mitigate threats from outside to inside. As an ATP, the solution's role is to defend against threats and provide protection to the customer using the SandBlast as an ATP solution.

What needs improvement?

There should be some improvement in the solution's stability and scalability.

For how long have I used the solution?

I have been using Check Point SandBlast Network for the past three months.

What do I think about the stability of the solution?

Since the stability of the tool is good, I rate it nine out of ten.

What do I think about the scalability of the solution?

We have more than 50 customers, including IT heads, CTOs, and all are working on the solution.

I rate the solution's scalability a nine out of ten.

How was the initial setup?

The initial setup is straightforward, and it's a cloud-based solution.

The deployment is very easy. So, the deployment team is deploying this solution to the customer environment.

For deployment, I do not have any idea since I do the PoC part. It depends on the customer environment, the customer's use cases, and the design of the solution. We provide the solution based on the deployment. So it's not complex. It is very easy.

What about the implementation team?

We have certified engineers in-house who are responsible for deploying and implementing the solution. We have expert engineers specialized in Check Point.

What's my experience with pricing, setup cost, and licensing?

The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine.


What other advice do I have?

We are pitching the customer the benefits of the cloud. However, I don't have detailed knowledge about Check Point. So, to be honest, I lack deep visibility or specific information regarding the need for a Check Point experience.

I would tell those individuals seeking anti-threat protection on top of web security and email security to consider SandBlast. By using SandBlast, we can effectively manage everything.

The solution is a single premium package suitable for heavy usage.

Overall, I rate the solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Excellent threat extraction feature, modern and easy to manage with SB Network
Pros and Cons
  • "The use of threat cloud protection with its artificial intelligence can automate possible threats."
  • "The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."

What is our primary use case?

Our technologies and infrastructure are currently both on-premise and in Microsoft Azure, for which we have had several Check Point gateways. Currently, the GW Check Point that we have is in Azure, VM, or virtual appliances, and protecting our infrastructure. Through them, we have activated several blades, one of them SandBlast. This was done in order to use the extraction of files with threats, to verify them, and later, if we do not find security problems, to deliver them to the client. It helps us greatly against zero-day threats.

How has it helped my organization?

The tool or blade is implemented in our SandBlast network. The Check Point gateway has provided us with even more advanced protection, check files or attachments in our network, verify threats, deliver (if they are not a problem) or block, in addition to the protection of zero-day for modern threats. It has perfectly complimented us since it is extremely fast. We are impressed with the tool's effectiveness and speed of delivery. The client does not even perceive this protection, which is excellent.

What is most valuable?

The virtues of this tool include:

1- Its effective threat extraction. With an impressive delivery speed, it is one of the best we have been able to verify.

2- The use of threat cloud protection with its artificial intelligence can automate possible threats. When you see the logs you are amazed.

3- The security is updated with the last zero days and the use of the best security practices is very valuable. It gives us the confidence that the Check Point products will not be violated.

What needs improvement?

There are really few areas for improvement, however, it seems to me that they should implement SandBlast network in the Check Point Infinity Portal, not as a blade but as a complete tool.

The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations.

Finally, Check Point support is not their strong point. They really need to improve it in order to provide a quality service. Issues take a long time to resolve.

For how long have I used the solution?

This is an exceptional Check Point feature, used by various vendor security tools. It's an incredible functionality that we have tested over at least the last year.

Which solution did I use previously and why did I switch?

We did not have a previous tool. It is hard for us to know if there is another solution as complete as Check Point.

What's my experience with pricing, setup cost, and licensing?

The best recommendation is to have a Check Point provider to help us with costs and implementations of the features that perfectly meet what the user is looking for.

Which other solutions did I evaluate?

A serious company always evaluates all the options, however, due to having a previous relationship, unique characteristics, and impressive performance, the Check Point SandBlast network was selected since it is an excellent tool.

What other advice do I have?

If you have the organizational and economic capacity to use a tool of this caliber, I recommend it without problems.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Efficient and user-friendly, with good security
Pros and Cons
  • "One of its characteristics that we liked the most was its analysis and emulation of activities in the emails since it manages to review them and inspect them if they have an infected attachment."
  • "We would like to see this solution reach mobile devices more efficiently, through apps or more specific products."

What is our primary use case?

It is one of the applications that support us in security and attacks on the network with a capacity for interpretation and analysis of the data that enters our corporate network. 

It is an efficient and friendly service, giving detailed analysis and centralized detection of events, including zero-day attacks, which are analyzed and managed faithfully. 

These capabilities are indispensable for an organization as they help safeguard the integrity and health of each team. 

These are the advantages and needs that we have achieved when using Check Point SandBlast.

How has it helped my organization?

What Check Point has come to give us as a benefit is the power to control, register, analyze, and give a general and safe view of the events and activities carried out by the teams that manage the organization's security. 

These capabilities can be managed from a single panel of equipment configurations and controls. This helps and benefits each of the organization's members that can be attacked because they will always be safe. 

Mail investigation is another of the benefits provided. 

What is most valuable?

One of its characteristics that we liked the most was its analysis and emulation of activities in the emails since it manages to review them and inspect them if they have an infected attachment. After that, it delivers the filtered emails safely. This avoids an analysis or vulnerability of less experienced users who, in most cases, are the weakest link. It offers the ability to take the solution to cloud environments or totally on-premise, which helps us have the ability to adapt to different environments. 

What needs improvement?

We would like to see this solution reach mobile devices more efficiently, through apps or more specific products. For the moment, the solution adapts efficiently to corporate environments as technological demands evolve. It is for this same reason that I hope that these innovations will be integrated into SandBlast and in other Check Point products, as it is one of the best that I have tried. It offers us a competitive advantage and efficient security. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Improves security, scans fast, and has lots of helpful features
Pros and Cons
  • "The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises."
  • "When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization."

What is our primary use case?

One of the great needs that our company was going through was the need to protect its infrastructure against hackers or malicious bots, as well as cyber-attacks.

We wanted a robust technology that would meet our objectives. We wanted to prevent attacks on our business environment. In addition, as a company, we already use various Check Point technologies and we wanted to continue with the same scope and security that they have offered us in recent years. That's why Check Point SandBlast Network provides us with that security by scanning everything that passes through our network.

How has it helped my organization?

Since implementing the Check Point SandBlast Network tool in the organization, in an environment of around 200 servers (both physical and virtual), we also have three high-availability clusters. 

Before, we only depended on a firewall; however, this acquisition has helped us a lot to improve the entire security environment of our company. In addition, the tool has excellent features such as Threat Emulation and Threat Extraction as well as sandboxing. We can even extract the malicious content of the files or block files completely and can also work as email APT and can remove malicious content from the email body.

What is most valuable?

We have found several valuable features in the Check Point SandBlast Network. One of those features is that we can download a file and emulate it outside of our company and know that it is clean.

Like any other company that handles sensitive data, we needed a tool that would protect our network and be able to improve security day by day.

The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises.

What needs improvement?

When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization. Another problem is that some PC with minimum characteristics makes them slow, causing slowness in computers where we have to invest in PCs to increase their performance or change them

Another point to improve is the support since they do not give an effective and fast solution to the clients when they have problems with any tool or feature.

For how long have I used the solution?

I have been using and implementing this tool for about three years..

What do I think about the stability of the solution?

It presents medium stability. Sometimes the portal is hard to enter, and that affects the performance of equipment, however, in general, it has excellent stability.

What do I think about the scalability of the solution?

The solution has excellent scalability.

How are customer service and support?

The support they offer is not very good since they take a long time to provide a solution to your problem.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously we had a firewall and we chose to implement this tool since we have always worked with this brand, and it has been very feasible for us to continue to do so.

How was the initial setup?

The configuration is simple it is very user-friendly.

What about the implementation team?

The provider provided us with a support agent to ensure that the configuration was made.

What was our ROI?

Of importance in a company is the security of its computer platforms. When making an investment with these tools, you are taking care of an important heritage that will double your profits.

What's my experience with pricing, setup cost, and licensing?

Check Point offers good prices. There are costs. However, that should not stop a company from maintaining good security.

Which other solutions did I evaluate?

Other brands are not evaluated since we wanted to have the Check Point trend and not mix brands.

What other advice do I have?

It is a very good, reliable, and robust tool. You can be confident that it will protect the organization.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 20
Check Point SandBlast Network -chk2023
Pros and Cons
  • "The Check Point SandBlast Network gives us incredibly good features."
  • "At the support level, they could improve the attention times and have the resolution of cases happen a little faster."

What is our primary use case?

One of our offices required zero-day protection that was automated and within the quantum licensing in a small device. It already had a one-year license enabled, so we had a way to use it based on our needs.

We required sophisticated email phishing protection in addition to validating downloaded files in our infrastructure without compromising productivity. We needed to avoid threats within the network and have a data reviewer based on a database containing old threats and new ones.

This protection was required due to the high impact that we would have if we were compromised in the office.

How has it helped my organization?

Check Point SandBlast Network has provided us with security for downloaded files on our network in addition to protection against phishing that tries to enter through email.

SandBlast has an emulator which is responsible for validating files and emails against modern threats based on its global database, which is constantly updated. In this way, everything is validated and delivered quickly to the user (who is not affected while being analyzed).

All these benefits generated greater security and stability within our office and the company's perimeter network.

What is most valuable?

The Check Point SandBlast Network gives us incredibly good features. It really is a very good security tool. The ability to validate new or old threats within the database that is being updated by all GWs globally from the manufacturer makes it a reliable database and tool.

Its threat extraction and emulation checks validate and deliver emails or downloaded files if they do not represent a threat to users. All of this great work is done in seconds. The client does not perceive this emulation, making the technology even more valuable in implementing security.

What needs improvement?

The Check Point SandBlast Network solution also needs some improvements that can be expected in the future. For example, the cost, which for some customers is high.

Also, on the subject of the guides, they are difficult to find, or they are not clear when it comes to carrying out implementations, generating best practices, or some other details. They are difficult to understand.

At the support level, they could improve the attention times and have the resolution of cases happen a little faster. Sometimes it takes a long time to send emails and tests instead of generating sessions or calls with the client to solve everything quickly.

For how long have I used the solution?

We've used this excellent tool in an office that required protection against zero-day threats. We have used the technology for more than a year.

Which solution did I use previously and why did I switch?

We used the Microsoft 365 Data Protection tool for email. However, it is a solution outside of our Check Point environment.

What's my experience with pricing, setup cost, and licensing?

I'd recommend getting a partner who can provide you with all the help for Check Point services.

Which other solutions did I evaluate?

We always validate, review documentation, and check reviews to determine which security tool fits the bill.

What other advice do I have?

It is a very good tool. You must try it and take your verdict.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Eduardo Barcelos - PeerSpot reviewer
Sales Engineer at Tempest Security Intelligence
Real User
Useful sandboxing functionality, quick support, and reliable
Pros and Cons
  • "The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
  • "Check Point SandBlast Network can improve the integration with third-party vendors, such as EDR or CRM products. For example, IBM Curator."

What is most valuable?

The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files.

What needs improvement?

Check Point SandBlast Network can improve the integration with third-party vendors, such as EDR or CRM products. For example, IBM Curator.

For how long have I used the solution?

I have been using Check Point SandBlast Network for approximately two years.

What do I think about the stability of the solution?

The stability of Check Point SandBlast Network is good.

What do I think about the scalability of the solution?

Check Point SandBlast Network is scalable.

We have approximately 5,000 users using this solution.

How are customer service and support?

The support from Check Point SandBlast Network is good. The support helps us very quickly.

What about the implementation team?

We have two people for the deployment of the Check Point SandBlast Network.

What's my experience with pricing, setup cost, and licensing?

The cost of Check Point SandBlast Network is annually, and there is only a standard license.

What other advice do I have?

I rate Check Point SandBlast Network an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Download our free Check Point SandBlast Network Report and get advice and tips from experienced pros sharing their opinions.
Updated: July 2025
Buyer's Guide
Download our free Check Point SandBlast Network Report and get advice and tips from experienced pros sharing their opinions.