We performed a comparison between Check Point SandBlast Network and Digital Guardian based on real PeerSpot user reviews.
Find out in this report how the two ATP (Advanced Threat Protection) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
"It also gives the vulnerability status according to the versions you have selected. Let's say you have Google Chrome. It mentions the versions it has, and it updates. Within two hours of an update, it is reflected in the dashboard. That's really nice to have."
"The basic features are okay and I'm satisfied with the Defender."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"The most valuable feature is the integration. It's a single console, so we don't have to switch around between multiple products. Another valuable feature is the ease of operations and maintenance."
"The most valuable feature of Microsoft Defender for Office 365 is the ease of use."
"Microsoft Defender for Office 365 is a stable solution."
"Does a thorough job of examining email and URLs for malicious content."
"Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links."
"The Check Point SandBlast Network gives us incredibly good features."
"Threat extraction can help us to remove malicious content from documents by converting them to PDF."
"The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises."
"The sandbox is able to scan files without adding a delay or compromising productivity."
"Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast."
"It shares the information of all its devices, this generates more robust perimeter security in addition to generating trust of the company with the manufacturer to prevent threats."
"Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."
"The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
"It has been scalable."
"It can scale from 100 to 10,000. There's no problem with the scalability."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"I'd like some additional features any product can give me to protect our environment in a better way."
"This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products."
"The custom alerts have to improve a lot."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"Configuration requires going to a lot of places rather than just accessing one tab."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"There should be some customized price reductions in the offered packages."
"It would be very good for Check Point to improve its support."
"EDR and EPM solutions like Carbon Black or CyberArk have integrations with the cloud version of Sandblast, however, there must be on-premise Sandblast options also."
"We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us."
"When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization."
"Check Point SandBlast Network can improve the integration with third-party vendors, such as EDR or CRM products. For example, IBM Curator."
"The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."
"There is a limit on the number of files that can be scanned in real-time, which could lead to us being found with our guard down on a high-traffic day."
"The initial setup is a bit more complex than other solutions."
"There are a lot of issues with the current version of the Endpoint agent. It's not stable, it's resource-consuming, and there are some performance issues. If they could improve the stability of the agent it would be great."
Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:
- Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.
- Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.
- A complete solution for collaboration that protects you from attacks across the kill chain.
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast
Digital Guardian Endpoint Data Loss Prevention (DLP) protects sensitive data on all your endpoints. It protects intellectual property and personal information. An endpoint agent that captures and records all system, user and data events on or off the network. It has a granular control of all data movement that can be configured to automatically block, justify or encrypt sensitive data in or attached to email, files moved to removable drives, cloud storage, or web - malware and malware-free - before sensitive data is lost. It has a built-in advanced data classification that creates and modifies classification and usage policies through content inspection, context-awareness and user classification. It provides design policies with controls that won't block actions that comply with corporate policy so employees remain productive while the data stays safe.
Check Point SandBlast Network is ranked 6th in ATP (Advanced Threat Protection) with 12 reviews while Digital Guardian is ranked 13th in ATP (Advanced Threat Protection) with 2 reviews. Check Point SandBlast Network is rated 8.8, while Digital Guardian is rated 6.6. The top reviewer of Check Point SandBlast Network writes "Automatically cleans known file types, can detect local file changes, and offers Zero-day attack protection". On the other hand, the top reviewer of Digital Guardian writes "Reliable, easy to expand, and has nice data security features". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, FireEye Network Security, Proofpoint Email Protection and Symantec Advanced Threat Protection, whereas Digital Guardian is most compared with Forcepoint Data Loss Prevention, Carbon Black CB Defense, Microsoft Defender for Endpoint, Microsoft Purview Data Loss Prevention and Symantec Data Loss Prevention. See our Check Point SandBlast Network vs. Digital Guardian report.
See our list of best ATP (Advanced Threat Protection) vendors.
We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.