Try our new research platform with insights from 80,000+ expert users

Check Point SandBlast Network vs Check Point Security Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point SandBlast Network
Ranking in Advanced Threat Protection (ATP)
10th
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
37
Ranking in other categories
No ranking in other categories
Check Point Security Manage...
Ranking in Advanced Threat Protection (ATP)
15th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
63
Ranking in other categories
Log Management (10th), Threat Intelligence Platforms (5th)
 

Mindshare comparison

As of May 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point SandBlast Network is 5.7%, up from 5.4% compared to the previous year. The mindshare of Check Point Security Management is 0.6%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

GaneshKhutwad - PeerSpot reviewer
Provides advanced threat prevention and utilizes geographic-based policies to mitigate attacks
Check Point offers three types of support: Gold, Platinum, and Diamond. The level of support you receive should be based on the criticality of the issue, not solely on your client's support tier. While there are established support levels, I have experienced instances where the support provided was not categorized as Gold, Platinum, or Diamond but rather a standard support level. In such cases, the response times were slower, and getting support personnel on the call was more difficult.
Ozan Durmus - PeerSpot reviewer
Good documentation and proxy support with a helpful community available for troubleshooting
It's useful that we can find unused objects. This helps us to get rid of unused objects in our database, Proxy support is valuable for us. We can apply centralized proxy settings to get additional databases when we need them. Revision history and detailed audit log is a good feature with this we can always feeling safe if somethings go wrong, I'm sure that I can go back the old one. Smart Event is a very good feature. It provides a graphical view of the traffics and provides history. The filter syntax is very good and helps control when we need it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It provides a high rate of catching the zero-day advanced threats."
"You do not need to risk your network by using the in-line sandbox."
"The main feature of the solution is that it protects against malicious threats from the outside."
"SandBlast updates the threat signatures frequently."
"The most efficient and protective characteristics of Check Point's SandBlast solution are that we can see a lot of this protection at the network and mail levels."
"The product gives us advanced protection, including artificial intelligence and machine learning technologies and services."
"Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."
"When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company."
"It has brought significant improvements, including features like spam and anti-spam measures, intrusion prevention (IPS), and advanced filtering."
"The intuitive interface also allows new team members to adapt to the technology if they are not familiar with it initially. It doesn't take much for one to familiarize themselves with the product."
"The cluster solution made our job easier any fault to the device will not halt entire internet connectivity."
"The tool is cost-effective."
"The compliance is great."
"We love the ability to monitor performance in real-time, and gather critical information about network flows and traffic."
"Key features include the ability to include logs for everything that you do for admin. Also, it has web filtering built in and VPN."
"I love the URL filtering as well as the identification capabilities which link with the Active Directory and work for me even with bandwidth regulation. These allow me to select to whom to do what, and when."
 

Cons

"The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption."
"The management of alerts could improve them a bit - especially in event management."
"Today, we have it as part of a solution or a package. However, we'd like there to be a way where we can have the solution's features available to us in a cheaper way in the future."
"I would like to see these solutions being easier to manage from mobile applications - from either iOS or Android - including other operating systems that appear in the future."
"I would like for them to improve the visibility in the product."
"The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool."
"I think Check Point provides standard time which ideally most other vendors take to identify behaviors of a file by sending them into a sandbox environment for inspection."
"The initial setup was complex because of the lack of information from the consultant."
"Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration."
"Check Point's hybrid cloud integration needs significant improvements. These resources need to evolve as data transfers to the cloud increase, so hybrid cloud models are easier to implement. Better hybrid cloud integration would improve how we manage our security logs and provide our administrators with a low-cost solution that enables them to meet all our essential requirements."
"There is room for improvement in reliability."
"Check Point Security Management lacks some of the competitor features."
"Troubleshooting is quite complicated within multi-domain management. If an issue arises, the local administrator has to keep in mind that there are other domains that could be also affected."
"I would like the ability to have an overview, cross-site: One portal that does all firewalls. Also, the user interface is overly complicated."
"I would like it to be the administrator of equipment or Next Generation firewalls (which have to be managed on this platform) and to be able to manage other services (like Harmony) that also belong to Check Point."
"The tracking of new threats could be improved."
 

Pricing and Cost Advice

"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"The product's cost is high."
"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"We have seen ROI."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"Price-wise, it is an expensive solution."
"The solution is expensive."
"This product can be used for 25 security gateways on a basic license."
"Check Point is much cheaper than the competition ($4/server as compared to $17/server)."
"The solution is expensive and there is an annual license."
"If one will be very expensive, and ten means low price, I rate the tool's price as a three out of ten."
"The pricing can be estimated around 3 or 4 out of 10 in terms of expense."
"Do the homework because Check Point is rather expensive."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
14%
Government
11%
Energy/Utilities Company
6%
Computer Software Company
14%
Financial Services Firm
11%
Government
10%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point SandBlast Network?
The solution can detect and prevent attacks that may be encrypted.
What needs improvement with Check Point SandBlast Network?
The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool.
What do you like most about Check Point Security Management?
The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as...
What needs improvement with Check Point Security Management?
One case I saw was with the logs, which gave me the transfer and the vibration. There's a lot of logs, and I'm unsure about their validity, however, they take up a lot of space. We had to provision...
What is your primary use case for Check Point Security Management?
This is the Wi-Fi documentation. I work with the service, and we are partners with Check Point. One of our clients, Parliament, required an upgrade from physical to virtual implementation. This was...
 

Also Known As

No data available
R80.10, R80, R77.30, R77, Check Point R80.10 Security Management, R80 Security Management
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Hedgetec, Geiger
Find out what your peers are saying about Check Point SandBlast Network vs. Check Point Security Management and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.