We performed a comparison between Check Point SandBlast Network and Proofpoint Targeted Attack Protection based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Palo Alto Networks, Fortinet and others in Advanced Threat Protection (ATP)."It seems like it works all the time. We have never had an issue. We have never had something go undetected, anything major. All in all, it works pretty well."
"Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox."
"When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company."
"The sandbox is able to scan files without adding a delay or compromising productivity."
"The solution can detect and prevent attacks that may be encrypted."
"Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us."
"The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
"Check Point has enabled us to detect a lot of threats and prevented a lot of threats from entering our environments. It has kept us safe."
"It has a dynamic runtime engine, which gives it an advantage over Prisma that has a static engine. In Prisma, we have to do additional malware analysis, which is not required in Proofpoint."
"There should be some customized price reductions in the offered packages."
"Most of the time stability is okay, but sometimes, we're not able to contact the cloud. It won't last for long. The product could be faster."
"Check Point SandBlast Network can improve the integration with third-party vendors, such as EDR or CRM products. For example, IBM Curator."
"I imagine there will be improvements in later versions. There are hotfixes that come out all the time."
"SandBlast takes longer than FortiSandbox to complete a scan."
"The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."
"The management of alerts could improve them a bit - especially in event management."
"There is a limit on the number of files that can be scanned in real-time, which could lead to us being found with our guard down on a high-traffic day."
"We are using the TRAP console that has a Linux-based UI, which is not user-friendly. The TAP console looks very advanced. Currently, we are maintaining three different consoles, and it is sometimes hard to switch between them or try to grab the data."
More Check Point SandBlast Network Pricing and Cost Advice →
Earn 20 points
Check Point SandBlast Network is ranked 8th in Advanced Threat Protection (ATP) with 33 reviews while Proofpoint Targeted Attack Protection is ranked 23rd in Advanced Threat Protection (ATP). Check Point SandBlast Network is rated 8.4, while Proofpoint Targeted Attack Protection is rated 7.0. The top reviewer of Check Point SandBlast Network writes "High detection with few false positives and able to handle large volumes of data". On the other hand, the top reviewer of Proofpoint Targeted Attack Protection writes "Dynamic runtime engine and good protection, but needs better support and a single console". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, Cisco Secure Network Analytics, Microsoft Defender for Office 365 and Trellix Network Detection and Response, whereas Proofpoint Targeted Attack Protection is most compared with Microsoft Defender for Office 365, Avanan, IRONSCALES, Palo Alto Networks WildFire and Microsoft Defender for Identity.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.