"Microsoft Defender for Office 365 is a stable solution."
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not."
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."
"The most valuable feature is the integration. It's a single console, so we don't have to switch around between multiple products. Another valuable feature is the ease of operations and maintenance."
"The basic features are okay and I'm satisfied with the Defender."
"Does a thorough job of examining email and URLs for malicious content."
"The deployment capability is a great feature."
"When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company."
"It enables my IT system to apply threat detection intelligence and diffuse the endpoint and potential threat attacks and phishing attacks onto the system in the most proactive and secure manner."
"The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
"You do not need to risk your network by using the in-line sandbox."
"Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us."
"The sandbox is able to scan files without adding a delay or compromising productivity."
"Threat extraction can help us to remove malicious content from documents by converting them to PDF."
"Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."
"Very functional and good for detecting malicious traffic."
"The server appliance is good."
"I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went."
"It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
"The most valuable feature is the network security module."
"They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not."
"The custom alerts have to improve a lot."
"Configuration requires going to a lot of places rather than just accessing one tab."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"I'd like some additional features any product can give me to protect our environment in a better way."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"We need a separate license and we don't know how to get the license that is required."
"It would be very good for Check Point to improve its support."
"The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."
"In Check Point SandBlast, improvement has to be made with respect to the GUI."
"When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization."
"There should be some customized price reductions in the offered packages."
"The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."
"I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it."
"EDR and EPM solutions like Carbon Black or CyberArk have integrations with the cloud version of Sandblast, however, there must be on-premise Sandblast options also."
"I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet."
"It is very expensive, the price could be better."
"Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone."
"Technical packaging could be improved."
"Technical support could be improved."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically."
Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:
- Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.
- Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.
- A complete solution for collaboration that protects you from attacks across the kill chain.
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast
FireEye Network Security is an advanced threat protection and breach detection platform that provides industry leading threat visibility and protection against the world’s most sophisticated and damaging attacks. By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core.
Check Point SandBlast Network is ranked 5th in ATP (Advanced Threat Protection) with 12 reviews while FireEye Network Security is ranked 8th in ATP (Advanced Threat Protection) with 6 reviews. Check Point SandBlast Network is rated 8.8, while FireEye Network Security is rated 8.8. The top reviewer of Check Point SandBlast Network writes "Automatically cleans known file types, can detect local file changes, and offers Zero-day attack protection". On the other hand, the top reviewer of FireEye Network Security writes "A reliable and complete network protection solution that protects from signature-based and signature-less attacks and has powerful logging". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, Proofpoint Email Protection, Symantec Advanced Threat Protection and Cisco Stealthwatch, whereas FireEye Network Security is most compared with Palo Alto Networks WildFire, Zscaler Internet Access, Fortinet FortiSandbox, Cisco Stealthwatch and Fortinet FortiGate. See our Check Point SandBlast Network vs. FireEye Network Security report.
See our list of best ATP (Advanced Threat Protection) vendors.
We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.