We performed a comparison between Check Point SandBlast Network and Proofpoint Email Protection based on real PeerSpot user reviews.
Find out in this report how the two ATP (Advanced Threat Protection) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
"The basic features are okay and I'm satisfied with the Defender."
"Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links."
"The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not."
"The most valuable feature is the integration. It's a single console, so we don't have to switch around between multiple products. Another valuable feature is the ease of operations and maintenance."
"The deployment capability is a great feature."
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"The most valuable feature of Microsoft Defender for Office 365 is the ease of use."
"Very few false positives are detected, which gives the confidence to raise flags when needed, ensuring the IT department is aware of threats and acting fast."
"It enables my IT system to apply threat detection intelligence and diffuse the endpoint and potential threat attacks and phishing attacks onto the system in the most proactive and secure manner."
"The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
"The use of threat cloud protection with its artificial intelligence can automate possible threats."
"You do not need to risk your network by using the in-line sandbox."
"The sandbox is able to scan files without adding a delay or compromising productivity."
"Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us."
"Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."
"The most valuable feature of Proofpoint Email Protection is the blocking capabilities, it blocks a lot of potential threats."
"I like all the features with Proofpoint, such as how it filters the spam and marketing mail, lost reality mail, blocks phishing attacks, blocks malicious attachments, and stops phishing links. Also it can defend against the business email compromise impersonation technique. It is a complete solution for all email attacks. It filters for the bad, malicious attachments. If there is any executable file, it can be deleted. It is a good, complete solution."
"Its main defense is to stop malicious emails from coming through. There is a sandbox environment where you can open malicious or suspicious emails to make sure that they're not malicious, instead of taking the risk of having your employees do it. This is definitely something that everybody needs nowadays, especially with the rise in cyber attacks."
"They have customized security rules, mature rules, anti-virus protection, as well as email authentication similar to SPF, DKIM, and DMARC."
"The most valuable features of Proofpoint Email Protection are ease of use, data loss prevention, antivirus, and spam protection."
"The most valuable feature of Proofpoint Email Protection is the dashboards and their visibility, easy configuration, and artificial intelligence. Additionally, the reports are very important and helpful."
"Its anti-phishing functionality is the most valuable. Certainly, the biggest problem I have is phishing."
"It's a mature product. It does a good job in detection."
"We need a separate license and we don't know how to get the license that is required."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"I'd like some additional features any product can give me to protect our environment in a better way."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"It would be very good for Check Point to improve its support."
"The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."
"We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us."
"Check Point SandBlast Network can improve the integration with third-party vendors, such as EDR or CRM products. For example, IBM Curator."
"EDR and EPM solutions like Carbon Black or CyberArk have integrations with the cloud version of Sandblast, however, there must be on-premise Sandblast options also."
"There should be some customized price reductions in the offered packages."
"There is a limit on the number of files that can be scanned in real-time, which could lead to us being found with our guard down on a high-traffic day."
"In Check Point SandBlast, improvement has to be made with respect to the GUI."
"Pricing for the platform could still be cheaper."
"It's scalable, but the devil's in the details — you have to know your email volumes."
"Proofpoint Email Protection's interface is confusing and could be improved."
"The Secure Mail aspect should have an Outlook add-in, instead of an external dashboard that outside users have to access."
"It has too many screens. It is kind of a conglomeration of products. In other words, they built product A, product B, and product C, and they are yet to integrate them into a single administrative console. I would certainly like to see a more seamless administrative interface. I would also like to see them include more bang for the buck, by including features like email fraud protection, rather than making their product so piecemeal, where you are buying little pieces. I agree with the idea of having multiple tiers or layers, but maybe as small, medium, and large, as opposed to an a la carte menu."
"I would want better spear phishing protection in the essentials package."
"You only receive one model in Proofpoint Email Protection and the other ones you have to purchase at a high price. There should be more available with the solution and additional models should be less expensive."
"The false positives are an issue."
Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:
- Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.
- Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.
- A complete solution for collaboration that protects you from attacks across the kill chain.
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast
Proofpoint Email Protection is a machine learning email gateway that catches both known and unknown threats. Through Target Attack Protection, emails will be analyzed and potentially blocked from advanced threats while users gain visibility around these threats. The technology can also classify various types of email and can be deployed both on premises or as a cloud service. In addition, users can tag suspicious emails to help raise user awareness and track down any email quickly.
Proofpoint Email Protection offers Advanced BEC Defense, which can precisely detect and block different types of emails, even if they don’t involve a malicious payload, such as business email compromise (BEC). Email Protection, which is powered by NexusAI, is a sophisticated detection technique developed to stop a variety of kinds of email fraud from affecting compromised accounts. It’s specifically designed to analyze message components, such as the sender’s IP address (including reputation and x-originating IP), the message header, and the message body. Using machine learning and AI, it will then determine if that message is a BEC threat.
Benefits of Proofpoint Email Protection
Proofpoint Email Protection is a favorite for organizations looking to utilize their cybersecurity budget accurately, and provides the user with incredible visibility. While preventing email fraud, the technology can also detect and block advanced malware as well as identifying possible risks.
Email Protection offers many benefits, including:
Reviews from Real Users
Proofpoint Email Protection enables business continuity capabilities through their machine learning, AI-powered email gateway. With its innovative approach toward detecting, analyzing, identifying, and blocking advanced threats, users can gain unique visibility into their business data environments. Users especially like the ability to block spam, as well as the business email compromise protection.
An anonymous reviewer who is a principal consultant at a tech company, notes, "Proofpoint is the main tool for blocking spam because it denies the connection altogether."
Sridhar R., a security professional at Qatar Computer Services WLL, writes, "The most valuable features are the business email compromise protection and targeted attack prevention."
Check Point SandBlast Network is ranked 6th in ATP (Advanced Threat Protection) with 11 reviews while Proofpoint Email Protection is ranked 1st in Email Security with 19 reviews. Check Point SandBlast Network is rated 9.0, while Proofpoint Email Protection is rated 8.6. The top reviewer of Check Point SandBlast Network writes "Automatically cleans known file types, can detect local file changes, and offers Zero-day attack protection". On the other hand, the top reviewer of Proofpoint Email Protection writes "Flexible, very secure, and offers excellent technical support". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, FireEye Network Security, Symantec Advanced Threat Protection and Cisco Secure Network Analytics, whereas Proofpoint Email Protection is most compared with Palo Alto Networks WildFire, Microsoft Exchange Online Protection, Cisco Secure Email, Fortinet FortiMail and Barracuda Sentinel.
We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.