Try our new research platform with insights from 80,000+ expert users

Check Point SandBlast Network vs Proofpoint Email Protection vs Trellix Network Detection and Response comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.6
SandBlast Network boosted ROI by enhancing security, reducing incidents, and increasing productivity through advanced threat protection and filtering.
Sentiment score
6.5
Proofpoint Email Protection effectively reduced threats and costs, excelling in phishing defense, leading to significant efficiency improvements.
Sentiment score
8.5
Trellix Network Detection and Response exceeded expectations by improving threat prevention and detection, boosting productivity and reducing response times.
Protecting around 2,000 users from cyber threats, including ransomware, has positively impacted the organization's growth by reducing disruptions and business loss.
I have seen both money and time saved as a return on investment.
 

Customer Service

Sentiment score
5.7
Check Point SandBlast Network support is generally effective, with high ratings but some users desire faster responses and proactive guidance.
Sentiment score
7.1
Proofpoint Email Protection's customer service is praised for responsiveness and expertise, though some report slow responses or portal issues.
Sentiment score
6.8
Trellix's support is praised for responsiveness, but improvements in expertise and incident response promptness are suggested by some.
The customer support for Check Point SandBlast Network could be improved as they are sometimes late with their responses.
I am familiar with the granular policy control feature of Proofpoint Email Protection, and I find their support excellent for modifying those policies.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
 

Scalability Issues

Sentiment score
7.7
Check Point SandBlast Network scales well for most organizations, with challenges primarily in larger firms, yet supports robust expansion.
Sentiment score
7.5
Proofpoint Email Protection excels in adaptability and scalability, serving both small and large enterprises with ease and flexibility.
Sentiment score
7.8
Trellix Network Detection and Response scales effectively in various industries, performing well in large enterprises without latency issues.
The scalability of Check Point SandBlast Network meets our organization's needs as we grow.
The scalability of Check Point SandBlast Network is very nice.
It is scalable but requires growing the box itself because it is a resource-intensive solution.
Proofpoint is scalable for multi-site organizations with thousands of users.
 

Stability Issues

Sentiment score
7.9
Check Point SandBlast Network is generally stable, with reliable performance, some outages, good integration, and effective support solutions.
Sentiment score
8.2
Users rate Proofpoint Email Protection highly for reliability and performance, with minor UI challenges and rare stability issues.
Sentiment score
7.7
Trellix Network Detection and Response is stable and reliable, with consistent performance and high user satisfaction despite occasional minor issues.
When configured correctly with adequate resources, it functions properly.
 

Room For Improvement

Check Point SandBlast Network needs better integration, responsiveness, performance, usability, scalability, cost management, setup ease, and false positive reduction.
Proofpoint Email Protection struggles with setup complexity, feature enhancements, pricing issues, and requires improved support and interface design.
Trellix Network Detection needs improved customization, integration, AI capabilities, support services, and a more user-friendly interface at reduced pricing.
The customer support for Check Point SandBlast Network could be improved as they are sometimes late with their responses.
Simplification of granular tuning for false positive reduction and bypassing benign files would benefit non-expert users.
When we enable sandboxing for all users, the CPU utilization of the firewall increases significantly.
Proofpoint could expand its phishing detection capabilities to improve its efficiency.
More security could be implemented.
I believe they still need to improve by consolidating some portals, as currently, you have to log in separately to a few of them.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
 

Setup Cost

Check Point SandBlast Network involves high initial costs but offers a favorable cost-benefit ratio with negotiation opportunities.
Proofpoint Email Protection is considered costly, with pricing starting at $8 per user and varying by features.
Trellix Network Detection is costly but effective, with yearly licensing, discounts, and competitive pricing against some competitors like Palo Alto.
Pricing is a bit costly, but considering the features and security offered by Check Point SandBlast Network, it is reasonable.
Customers pay around $90,000 yearly for a 1,000-user organization, with the subscription license being the main expense, apart from implementation fees.
Additional costs do come in, but it enhances security.
 

Valuable Features

Check Point SandBlast Network offers zero-day prevention, real-time protection, and AI-driven threat detection, ensuring secure file delivery.
Proofpoint Email Protection offers advanced threat defense, user-friendly interface, and seamless Office 365 integration for comprehensive email security.
Trellix excels in threat protection with AI-driven analysis, automation, and enhanced visibility, benefiting security operations and incident management.
The key features of Check Point SandBlast Network include its ability to detect zero-day attacks, provide sandboxing capabilities, and offer real-time protection with threat extraction.
Check Point SandBlast Network has positively impacted my organization as it's very accurate and gives almost no false positives, providing excellent threat prevention and protecting against server zero-day attacks.
The best feature Check Point SandBlast Network offers is real-time threat extraction capabilities, which sanitizes the files, mails, and other content before reaching the end-users.
The most beneficial feature of Proofpoint Email Protection is mostly spam filtering; it was very efficient, and we were very happy with the functionality as only relevant emails were allowed for mailboxes.
I appreciate that it's the industry leader, and its firewalling is very easy to manage and implement.
The main feature I find most effective is that Proofpoint Email Protection scans emails and quarantines the doubtful ones.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
 

Mindshare comparison

Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Check Point SandBlast Network4.0%
Palo Alto Networks WildFire10.7%
Microsoft Defender for Endpoint9.0%
Other76.3%
Advanced Threat Protection (ATP)
Secure Email Gateway (SEG) Market Share Distribution
ProductMarket Share (%)
Proofpoint Email Protection21.0%
Microsoft Defender for Office 36527.6%
Mimecast Email Security12.5%
Other38.9%
Secure Email Gateway (SEG)
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Trellix Network Detection and Response5.2%
Palo Alto Networks WildFire10.7%
Microsoft Defender for Endpoint9.0%
Other75.1%
Advanced Threat Protection (ATP)
 

Featured Reviews

Abnet Tsegaye Belay - PeerSpot reviewer
Has prevented zero-day attacks by analyzing and disarming suspicious files before delivery
Check Point SandBlast Network offers wide protocol coverage. It inspects emails through SMTP, POP3, and IMAP, web downloads through HTTP and HTTPS, and file transfers. Original files are analyzed in the sandbox while users get clean copies instantly to their inbox. It detects zero-day exploits in suspicious and normal files, and includes forensic and reporting features that provide detailed incident analysis, malware behavior reports, and indicators of compromise. The wide protocol coverage is particularly valuable because suspicious activities happen across different protocols. With Check Point SandBlast Network supporting multiple protocols, there is strong protection for our networks. Since implementing Check Point SandBlast Network, we have gained enhancement in our email and web security. It protects our files, complies with different standards, and reduces lateral movement in our networks.
AhmedRamadan - PeerSpot reviewer
Optimize email security with effective sandboxing and auto Pull for quarantine
Proofpoint is used as an email security gateway for big enterprises, primarily for their on-premises servers. Many customers also use it alongside Office 365 Proofpoint offers a complete solution for email security with features like DLP, email archiving, and encryption. The most valuable…
BiswabhanuPanda - PeerSpot reviewer
Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one
The in-depth investigation capabilities are a major advantage. When the system flags something as malicious, it provides a packet capture of that activity within the environment. That helps my team quickly identify additional context that most other tools wouldn't offer – like source IP or base64 encoded data. We can also see DNS requests and other details that aren't readily available in solutions like Check Point or others that we've tried. The detection itself is solid, and their sandboxing is powerful. There's a learning curve – you need a strong grasp of OS-level changes, process forking, registry changes, and the potential impact of those. But with that knowledge, the level of information Trellix provides is far greater than what we've seen elsewhere. The real-time response capability of Trellix has been quite effective, although it's not very fast. The key is this solution's concept of 'preference zero.' They don't immediately act on a zero-day. For example, the solution has seen a piece of malware for the first time. It'll let it in, then do sandboxing. Maybe after four or five minutes, it identifies that specific file's DNX Secure Store as malicious. At that point, they update the static analysis engine, and it gets detected if anything else tries to download the same file. There is that initial 'preference zero' concept, like with Panda. You may not hold traffic in the network. That's standard in the industry; we don't do much about it. To address that, we also have endpoint solutions. We use SentinelOne in our environment, which helps us identify threats like Western Bureaus and others.
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
870,701 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
9%
Energy/Utilities Company
7%
Comms Service Provider
6%
Computer Software Company
14%
Financial Services Firm
10%
Manufacturing Company
9%
Government
6%
Financial Services Firm
13%
Comms Service Provider
13%
Manufacturing Company
11%
Government
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business29
Midsize Enterprise7
Large Enterprise13
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise13
Large Enterprise17
By reviewers
Company SizeCount
Small Business19
Midsize Enterprise8
Large Enterprise19
 

Questions from the Community

What do you like most about Check Point SandBlast Network?
The solution can detect and prevent attacks that may be encrypted.
What is your experience regarding pricing and costs for Check Point SandBlast Network?
I'm not in charge of costing regarding Check Point SandBlast Network, so I cannot comment on the pricing, setup cost,...
What needs improvement with Check Point SandBlast Network?
It has some performance overhead, as sandboxing takes time and real-time delivery depends on threat extraction, requi...
What is your experience regarding pricing and costs for Proofpoint Email Protection?
In terms of pricing, it is okay compared to others. I would say it is normal. Additional costs do come in, but it enh...
What needs improvement with Proofpoint Email Protection?
I believe they still need to improve by consolidating some portals, as currently, you have to log in separately to a ...
What do you like most about FireEye Network Security?
We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. Wi...
What is your experience regarding pricing and costs for FireEye Network Security?
While I do not handle pricing directly, it is known that there is a variety of customers with different licensing nee...
What needs improvement with FireEye Network Security?
The Trellix solution could be improved by enhancing the Central Management Console for faster visibility, which would...
 

Also Known As

No data available
Proofpoint Enterprise Protection, Cofense PhishMe, Proofpoint Digital Protection
FireEye Network Security, FireEye
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Blocket, University of Waterloo, Lincoln Memorial University, WellSpan Health, U-Haul, Carestream Health, Westinghouse
FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
Find out what your peers are saying about Palo Alto Networks, Microsoft, Fortinet and others in Advanced Threat Protection (ATP). Updated: October 2025.
870,701 professionals have used our research since 2012.