IT Central Station is now PeerSpot: Here's why

Check Point SandBlast Network vs FireEye Network Security comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Buyer's Guide
Check Point SandBlast Network vs. FireEye Network Security
July 2022
Find out what your peers are saying about Check Point SandBlast Network vs. FireEye Network Security and other solutions. Updated: July 2022.
620,987 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Microsoft Defender for Office 365 is a stable solution.""Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features.""The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not.""The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time.""The most valuable feature is the integration. It's a single console, so we don't have to switch around between multiple products. Another valuable feature is the ease of operations and maintenance.""The basic features are okay and I'm satisfied with the Defender.""Does a thorough job of examining email and URLs for malicious content.""The deployment capability is a great feature."

More Microsoft Defender for Office 365 Pros →

"When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.""It enables my IT system to apply threat detection intelligence and diffuse the endpoint and potential threat attacks and phishing attacks onto the system in the most proactive and secure manner.""The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files.""You do not need to risk your network by using the in-line sandbox.""Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us.""The sandbox is able to scan files without adding a delay or compromising productivity.""Threat extraction can help us to remove malicious content from documents by converting them to PDF.""Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."

More Check Point SandBlast Network Pros →

"Very functional and good for detecting malicious traffic.""The server appliance is good.""I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went.""It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye.""It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities.""The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design.""The most valuable feature is the network security module."

More FireEye Network Security Pros →

Cons
"They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not.""The custom alerts have to improve a lot.""Configuration requires going to a lot of places rather than just accessing one tab.""It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers.""I'd like some additional features any product can give me to protect our environment in a better way.""The visibility for the weaknesses in the system and unauthorized access can be improved.""We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email.""We need a separate license and we don't know how to get the license that is required."

More Microsoft Defender for Office 365 Cons →

"It would be very good for Check Point to improve its support.""The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations.""In Check Point SandBlast, improvement has to be made with respect to the GUI.""When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization.""There should be some customized price reductions in the offered packages.""The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue.""I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it.""EDR and EPM solutions like Carbon Black or CyberArk have integrations with the cloud version of Sandblast, however, there must be on-premise Sandblast options also."

More Check Point SandBlast Network Cons →

"I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet.""It is very expensive, the price could be better.""Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone.""Technical packaging could be improved.""Technical support could be improved.""They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules.""FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically."

More FireEye Network Security Cons →

Pricing and Cost Advice
  • "It's a user-base subscription."
  • "From the pricing point of view, like any other product in the market, there is scope for negotiation."
  • "Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
  • "For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
  • "Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
  • "Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
  • More Microsoft Defender for Office 365 Pricing and Cost Advice →

  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
  • "I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
  • "The cost is not significantly high and it can be negotiated during any purchase of NGFW."
  • "The cost of Check Point SandBlast Network is annually, and there is only a standard license."
  • More Check Point SandBlast Network Pricing and Cost Advice →

  • "The user fee is not as high but the maintenance fee is expensive."
  • "It's an expensive solution."
  • "Its price is a bit high. A small customer cannot buy it. Its licensing is on a yearly basis."
  • "When you purchase FireEye Network Security NX, will need to purchase a megabit per second package. You must know your needs from day one."
  • More FireEye Network Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which ATP (Advanced Threat Protection) solutions are best for your needs.
    620,987 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature of Microsoft Defender for Office 365 is the ease of use.
    Top Answer:Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system.
    Top Answer:Microsoft Defender for Office 365 could improve by giving customers information on techniques to prevent threats. For… more »
    Top Answer:The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and… more »
    Top Answer:Check Point offers good prices. There are costs. However, that should not stop a company from maintaining good security.
    Top Answer:When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails… more »
    Top Answer:It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is… more »
    Top Answer:Its price is a bit high. A small customer cannot buy it. Its licensing is on a yearly basis.
    Top Answer:Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official… more »
    Comparisons
    Also Known As
    MS Defender for Office 365
    FireEye
    Learn More
    Overview

    Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:

    - Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.

    - Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.

    - A complete solution for collaboration that protects you from attacks across the kill chain.

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

    Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast

    FireEye Network Security is an advanced threat protection and breach detection platform that provides industry leading threat visibility and protection against the world’s most sophisticated and damaging attacks. By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core.

    Offer
    Learn more about Microsoft Defender for Office 365
    Learn more about Check Point SandBlast Network
    Learn more about FireEye Network Security
    Sample Customers
    Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
    Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
    FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
    Top Industries
    REVIEWERS
    Manufacturing Company25%
    Comms Service Provider25%
    Performing Arts13%
    Logistics Company13%
    VISITORS READING REVIEWS
    Computer Software Company21%
    Comms Service Provider20%
    Government7%
    Financial Services Firm6%
    REVIEWERS
    Computer Software Company21%
    Security Firm14%
    Financial Services Firm14%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Comms Service Provider23%
    Computer Software Company22%
    Financial Services Firm10%
    Government9%
    REVIEWERS
    Financial Services Firm27%
    Government13%
    University13%
    Manufacturing Company13%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Comms Service Provider17%
    Financial Services Firm9%
    Government8%
    Company Size
    REVIEWERS
    Small Business29%
    Midsize Enterprise29%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise19%
    Large Enterprise54%
    REVIEWERS
    Small Business45%
    Midsize Enterprise21%
    Large Enterprise34%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise22%
    Large Enterprise59%
    REVIEWERS
    Small Business37%
    Midsize Enterprise20%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise15%
    Large Enterprise65%
    Buyer's Guide
    Check Point SandBlast Network vs. FireEye Network Security
    July 2022
    Find out what your peers are saying about Check Point SandBlast Network vs. FireEye Network Security and other solutions. Updated: July 2022.
    620,987 professionals have used our research since 2012.

    Check Point SandBlast Network is ranked 5th in ATP (Advanced Threat Protection) with 12 reviews while FireEye Network Security is ranked 8th in ATP (Advanced Threat Protection) with 6 reviews. Check Point SandBlast Network is rated 8.8, while FireEye Network Security is rated 8.8. The top reviewer of Check Point SandBlast Network writes "Automatically cleans known file types, can detect local file changes, and offers Zero-day attack protection". On the other hand, the top reviewer of FireEye Network Security writes "A reliable and complete network protection solution that protects from signature-based and signature-less attacks and has powerful logging". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, Proofpoint Email Protection, Symantec Advanced Threat Protection and Cisco Stealthwatch, whereas FireEye Network Security is most compared with Palo Alto Networks WildFire, Zscaler Internet Access, Fortinet FortiSandbox, Cisco Stealthwatch and Fortinet FortiGate. See our Check Point SandBlast Network vs. FireEye Network Security report.

    See our list of best ATP (Advanced Threat Protection) vendors.

    We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.