Our primary use case of this solution is for security in our data centers.
Network Engineer at a hospitality company with 10,001+ employees
It's expandable across the cloud but the initial setup was complex
Pros and Cons
- "In terms of the scalability, it's expandable across the cloud."
- "The initial setup was complex because of the lack of information from the consultant."
What is our primary use case?
How has it helped my organization?
I am still learning the product.
What do I think about the stability of the solution?
I am still looking into the product's stability.
What do I think about the scalability of the solution?
In terms of the scalability, it is expandable across the cloud.
Buyer's Guide
Check Point SandBlast Network
June 2025

Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
How are customer service and support?
I haven't had to contact technical support yet.
Which solution did I use previously and why did I switch?
We switched because we were using Cisco and were moving away from using Cisco firewalls.
How was the initial setup?
The initial setup was complex because of the lack of information from the consultant.
What about the implementation team?
I used Check Point and a consultant for the deployment. My experience with them was so-so.
Which other solutions did I evaluate?
We looked at the big three: Palo Alto, Checkpoint, and Cisco.
I had a little bit of input in the decision-making process.
What other advice do I have?
Always try the product out first.
I would rate it about a six out of ten until I figure the product out.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Security Engineer at a individual & family service with 10,001+ employees
Ensures all of our emails, files coming through, and attachments are secure
Pros and Cons
- "It seems like it works all the time. We have never had an issue. We have never had something go undetected, anything major. All in all, it works pretty well."
- "I would like to see some speed improvements, e.g., how quickly you can get through all the menus. It crashes sometimes because we push so much through it. Therefore, I would like to see more small things behind the scenes, such as, back-end stability in terms of the management application."
What is our primary use case?
We use it as a method to ensure with all of our emails and the files coming through have secure attachments and no known issues: No malware, no known vulnerable hashes, nor anything malicious.
How has it helped my organization?
SandBlast has improved my organization in the way that we no longer have to worry as much about attachments which come in. Previously, it was a pretty frequent occurrence when we would get something malicious. So, it made it so that we could focus on other tasks and not have to worry nearly as much.
What is most valuable?
It seems like it works all the time. We have never had an issue. We have never had something go undetected, anything major. All in all, it works pretty well.
What needs improvement?
I would like to see some speed improvements, e.g., how quickly you can get through all the menus. It crashes sometimes because we push so much through it. Therefore, I would like to see more small things behind the scenes, such as, back-end stability in terms of the management application.
I would also like to improve the usability of the application to improve the quality of life of our users.
What do I think about the stability of the solution?
It seems very stable. We haven't seen any issues with it. The quality is great.
What do I think about the scalability of the solution?
It is definitely scalable. We have a massive amount of endpoints that it's working through right now, and it's definitely taking care of us.
How are customer service and technical support?
We are a Diamond partner, so we have a dedicated support rep who is always available and with a quick response and remediation.
Which solution did I use previously and why did I switch?
When I came onboard, this solution was already implemented.
How was the initial setup?
The initial setup was pretty straightforward and simple. We tested a few things to see how we could make it run a little better.
What about the implementation team?
We deployed it ourselves.
What other advice do I have?
I would rate it an eight out of ten because it is stable and works well. We have never run into an issue with it. It is frequently updated and our support rep goes through the findings and lets us know what type of stuff is being blocked and if we want to make any small configuration changes.
It's definitely a good way to go just because it's so simple. Once you have it set up, you don't really have to touch it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point SandBlast Network
June 2025

Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Network Engineer at a tech services company with 51-200 employees
If there's any malicious content in any of your files it gets segregated so it doesn't affect any of your existing infrastructure or network traffic
Pros and Cons
- "SandBlast has opened us up to a lot more opportunities where we can offer this service to clients, that way they don't have to go to a third-party to get this specific solution. It comes in the Check Point Infinity Package so it has helped us a lot."
- "The technical support could use some work, but it's okay. It's a little bit of a tedious process to get through."
What is our primary use case?
Our primary use case of this solution is for file extraction. We send it out to SandBlast to open up the file to see if there is any malicious content in the file. We then send it back into the client environment.
How has it helped my organization?
SandBlast has opened us up to a lot more opportunities where we can offer this service to clients. This way they don't have to go to a third-party to get this specific solution. It comes in the Check Point Infinity package, so it has helped us a lot.
What is most valuable?
We like that we get to segregate our network. If there's any malicious content in any of those files it gets segregated so it doesn't affect any of your existing infrastructure or network traffic.
What needs improvement?
I would like to see different types of network traffic that we could actually analyze, not just files, but the users as well.
What do I think about the stability of the solution?
The stability is good. R80.10 is really stable. It just has high usage of resources, but other than that, it has been a very stable product.
What do I think about the scalability of the solution?
The scalability is very good. It is easy to scale and use.
How are customer service and technical support?
The technical support could use some work, but it's okay. It's a little bit of a tedious process to get through.
How was the initial setup?
If you know what you're doing, then the initial setup is pretty straightforward.
What about the implementation team?
We implemented in-house.
Which other solutions did I evaluate?
The customer wanted this solution. They purchased the blade.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
IT Security Engineer at a government with 1,001-5,000 employees
Enabled us to detect a lot of threats and prevented a lot of threats from entering our environments
Pros and Cons
- "Check Point has enabled us to detect a lot of threats and prevented a lot of threats from entering our environments. It has kept us safe."
- "I am very leery right now about the stability. We've had three outages in the last month because of Check Point, not because of something that the customer has done, but because of changes on the Check Point side."
What is our primary use case?
Our primary use case of this solution is for Edge firewalls and our cloud.
How has it helped my organization?
Check Point has enabled us to detect a lot of threats and prevented a lot of threats from entering our environments. It has kept us safe.
What is most valuable?
When they work, the log correlation, IPS, antivirus, anti-bot, and the SandBlast are the most valuable features.
What needs improvement?
I would like to see more fine-tune MDM integration, specifically iPhones and Symantec pieces. It integrated in great, but not all of the features went in smoothly. They should expand the partnership with some of the bigger MDM companies that the product relies on.
Every time we try to do SandBlast, we run into a conundrum where the certificate issue comes into play. We've gone through it with engineers and it's very painful to keep up on that process. There could be improvements with changing the HTTPS inspection mechanism, or how it's done. That would be huge. Everybody that I've spoken to engineer-wise has said that is very painful and time-consuming. This would be one of the things that I would recommend that they fix.
I just want the product to work and make sure it's reliable. That's my biggest thing from the security aspect.
What do I think about the stability of the solution?
I am very leery right now about the stability. We've had three outages in the last month because of Check Point, not because of something that the customer has done, but because of changes on the Check Point side. This is what we were advise of.
What do I think about the scalability of the solution?
In terms of scalability. CloudGuard looks amazing. The auto-scaling, the HA, or whatever option you select, I like it. It will add bang for the buck once we get it in there, and finalize it. It should work as designed. Then, I'll be ecstatic.
How are customer service and technical support?
When I call support, I'll go around and around for a couple of weeks to finally get the issue solved. I would like to see better and more specific support areas for certain products. On some of our engagements, we had Check Point come in and advise us on what to upgrade to since we had an older version. We specified that we didn't want any outages. Then, as soon as we upgraded, within a week, we had an outage.
Which solution did I use previously and why did I switch?
We wanted to keep our eggs in one basket, not having a knowledge gap between multiple tools. That is why we decided to go with this product. Up until recently, we had a good scorecard with them.
How was the initial setup?
The initial setup depends on your environment. For the cloud stuff, it was pretty straightforward. On-premise is an ever-evolving thing.
What about the implementation team?
Initial deployment has been in for years. We went through Check Point support and our technical account managers (TAMs) to receive resources and engineers.
I would advise someone considering this solution to engage with the Diamond engineers for implementation.
What was our ROI?
We have seen ROI.
What other advice do I have?
I would rate it an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date.
Valuable Features:
Pro-active prevention techniques mean that files sent to my endpoint are automatically cleansed and filtered for malicious content without a delay. The Check Point Threat Cloud auto updates with new malware found from users worldwide meaning my protection is constantly up to date. Independent tests have verified that Check Point Threat Prevention has the highest catch rate in the industry. Working for a Check Point partner we utilise Check Point's endpoint solution in our day to day work and the most valuable benefit is knowing I am being protected from email, endpoint and removable media attacks and when attacks occur I am likely to weather the storm better than other users.
Improvements to My Organization:
When files are sent they are automatically sandboxed and cleansed in real time meaning we don't need to wait for our filters to do their work before we see the output. I know my laptop is safe.
Room for Improvement:
The day to day files like doc, xls, pdf, zip and rar can be scanned and cleaned by threat extraction in real time but there are still some file types which require further inspection. With the machine learning capabilities of sandblast there should be scope for more coverage, butI would like to feel certain 'no' file type is left uncovered. Any vendor that can find a way to do this is on to a winner!
Disclosure: My company has a business relationship with this vendor other than being a customer: Pentesec are 4 star Check Point partners and one of 2 companies with End Point Collaborative Support certifications, making us the most qualified Check Point End Point partners in the United Kingdom. We are vendor agnostic by default, so by choosing to utilise Check Point's End Point solution over alternatives is an endorsement in itself.
Network Engineer at a tech services company with 51-200 employees
We don't lose any data with solution
Pros and Cons
- "Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."
How has it helped my organization?
We don't lose any data now that we are using SandBlast.
What is most valuable?
Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too.
For how long have I used the solution?
We started using SandBlast maybe two year ago.
What do I think about the stability of the solution?
SandBlast is stable.
What do I think about the scalability of the solution?
We have 10 customer companies. They are mid-sized enterprises with between 100 and 200 users.
How are customer service and support?
Check Point support is good.
How was the initial setup?
Setting up SandBlast isn't complex. The total deployment time is maybe around three months.
What about the implementation team?
Sometimes we use outside support.
What other advice do I have?
I rate Check Point SandBlast 10 out of 10. For those thinking about implementing SandBlast, I recommend assessing their organization and business requirements. Also, I would consider the costs. It will run you about $5,000 a year.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point SandBlast Network Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Advanced Threat Protection (ATP)Popular Comparisons
Microsoft Defender for Office 365
Palo Alto Networks WildFire
Trend Micro Deep Discovery
Fortinet FortiSandbox
Trellix Network Detection and Response
Symantec Advanced Threat Protection
Buyer's Guide
Download our free Check Point SandBlast Network Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How much do independent test results affect your security purchases?
- Holding Security Vendors Accountable
- What can businesses do to improve their security posture?
- When evaluating Advanced Threat Protection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- Compromise Assessment vs Threat Hunting
- What are the main evaluation criteria for you when choosing the right vendor for brand protection services?
- Why is ATP (Advanced Threat Protection) important for companies?