Try our new research platform with insights from 80,000+ expert users

Check Point SandBlast Network vs Proofpoint Targeted Attack Protection comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point SandBlast Network
Ranking in Advanced Threat Protection (ATP)
7th
Average Rating
8.4
Reviews Sentiment
7.4
Number of Reviews
40
Ranking in other categories
No ranking in other categories
Proofpoint Targeted Attack ...
Ranking in Advanced Threat Protection (ATP)
30th
Average Rating
7.0
Reviews Sentiment
7.1
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point SandBlast Network is 4.0%, down from 6.0% compared to the previous year. The mindshare of Proofpoint Targeted Attack Protection is 1.7%, down from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Check Point SandBlast Network4.0%
Proofpoint Targeted Attack Protection1.7%
Other94.3%
Advanced Threat Protection (ATP)
 

Featured Reviews

Abnet Tsegaye Belay - PeerSpot reviewer
Has prevented zero-day attacks by analyzing and disarming suspicious files before delivery
Check Point SandBlast Network offers wide protocol coverage. It inspects emails through SMTP, POP3, and IMAP, web downloads through HTTP and HTTPS, and file transfers. Original files are analyzed in the sandbox while users get clean copies instantly to their inbox. It detects zero-day exploits in suspicious and normal files, and includes forensic and reporting features that provide detailed incident analysis, malware behavior reports, and indicators of compromise. The wide protocol coverage is particularly valuable because suspicious activities happen across different protocols. With Check Point SandBlast Network supporting multiple protocols, there is strong protection for our networks. Since implementing Check Point SandBlast Network, we have gained enhancement in our email and web security. It protects our files, complies with different standards, and reduces lateral movement in our networks.
KC
Dynamic runtime engine and good protection, but needs better support and a single console
We have two to three issues per month. We contact Proofpoint's customer support for these issues. I am a major point of contact for support. If I am not able to resolve an issue, we will be reaching out to them. Proofpoint can take a couple of days to get back. I also deal with other applications from Okta and Microsoft, and we get the support within a couple of hours. There is a lot of difference between a couple of hours and a couple of days. So, Proofpoint's support should be improved. Okta and Microsoft are also able to do a Zoom or video call, but Proofpoint provides support only through email communication. Only if you request, it would be a Zoom or video session.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable thing about this product is that it keeps the network secure against zero-day threats."
"Threat extraction can help us to remove malicious content from documents by converting them to PDF."
"SandBlast Network enhances security by providing advanced threat prevention."
"It looks out for new cyber ​​threats and generates predictions based on behaviors that are already detected on a daily basis."
"You do not need to risk your network by using the in-line sandbox."
"Check Point SandBlast Network stops unknown malware and zero-day attacks, and we rely on it to prevent zero-day threats before they enter our enterprise network to protect our productivity, so it has to sanitize files that are delivered immediately to our users in our organization."
"The technology is impressive in general."
"The forensics reports and the ability to sandbox malware are its most valuable features."
"It has a dynamic runtime engine, which gives it an advantage over Prisma that has a static engine. In Prisma, we have to do additional malware analysis, which is not required in Proofpoint."
 

Cons

"Check Point SandBlast Network can improve the integration with third-party vendors, such as EDR or CRM products. For example, IBM Curator."
"I would like to see these solutions being easier to manage from mobile applications - from either iOS or Android - including other operating systems that appear in the future."
"They need to improve the GUI interface."
"There have been a couple of things that we've tried where we read through the documentation, and we were really looking for some help in implementing, and technical support wanted me to try it first, then call them if it breaks. It would be nicer if they would hold my hand a bit more. It makes me nervous in production, as I don't have a lab."
"There should be some improvement in the solution's stability and scalability."
"The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption."
"I am very leery right now about the stability. We've had three outages in the last month because of Check Point, not because of something that the customer has done, but because of changes on the Check Point side."
"EDR and EPM solutions like Carbon Black or CyberArk have integrations with the cloud version of Sandblast, however, there must be on-premise Sandblast options also."
"We are using the TRAP console that has a Linux-based UI, which is not user-friendly. The TAP console looks very advanced. Currently, we are maintaining three different consoles, and it is sometimes hard to switch between them or try to grab the data."
 

Pricing and Cost Advice

"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
"The product's cost is high."
"We have seen ROI."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
Information not available
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
869,202 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
10%
Energy/Utilities Company
8%
Manufacturing Company
6%
Manufacturing Company
12%
Financial Services Firm
9%
Healthcare Company
7%
Transportation Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business27
Midsize Enterprise8
Large Enterprise13
No data available
 

Questions from the Community

What do you like most about Check Point SandBlast Network?
The solution can detect and prevent attacks that may be encrypted.
What is your experience regarding pricing and costs for Check Point SandBlast Network?
I'm not in charge of costing regarding Check Point SandBlast Network, so I cannot comment on the pricing, setup cost, and licensing.
What needs improvement with Check Point SandBlast Network?
Check Point SandBlast Network could be improved as sometimes the cost can be limiting even if the feature is very nice, and the UI can be optimized. The customer support for Check Point SandBlast N...
Ask a question
Earn 20 points
 

Also Known As

No data available
Targeted Attack Protection
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Brinker Capital
Find out what your peers are saying about Palo Alto Networks, Microsoft, Fortinet and others in Advanced Threat Protection (ATP). Updated: September 2025.
869,202 professionals have used our research since 2012.