We performed a comparison between Check Point SandBlast Network and SonicWall Capture Advanced Threat Protection based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Palo Alto Networks, Fortinet and others in Advanced Threat Protection (ATP)."Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."
"It saves time with us trying to do the analysis. We use it to try to find out how something got into the network. We use it to stop something before it ever gets in."
"The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises."
"The product gives us advanced protection, including artificial intelligence and machine learning technologies and services."
"Threat extraction can help us to remove malicious content from documents by converting them to PDF."
"It looks out for new cyber threats and generates predictions based on behaviors that are already detected on a daily basis."
"Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided."
"You do not need to risk your network by using the in-line sandbox."
"They have a large database of commonly known things that they can catch automatically, then they have anything which is questionable go to the sandbox and be examined there before going into our network."
"It also has an easy configuration. The feedback that we get from our customers is that it's a good product."
"We use it for protection against viruses and ransomware attacks."
"The stability of the solution is good. We haven't had any breaches or crashes. It's been very stable for us."
"The ATP (Advanced Threat Protection) on scanning is the most valuable feature."
"The reporting that you get from it is the most valuable feature. You can see it via the appliance itself, and also via the MySonicWall account for the registered device. You are able to select the file if it's malicious, and you can select it in the reporting and see what triggered it, and things like that. I found that to be quite useful."
"We get alert messages whenever there is a new threat. We are notified at the firewall level that things are blocked, which keeps us in our comfort zone."
"Provides good protection and security."
"The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption."
"We have found a need for the application to be a bit more elastic, bringing it to SAS services and not IAS."
"The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."
"I imagine there will be improvements in later versions. There are hotfixes that come out all the time."
"The management of alerts could improve them a bit - especially in event management."
"I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it."
"There should be some improvement in the solution's stability and scalability."
"The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."
"We would like to get immediate alerts from the alerting system without using third-parties."
"SonicWall had a recent layoff. This is a concern for us, because now we are missing the local presence from both the engineering and sales side."
"It does fare well against enterprise products."
"The setup needs improvement. It needs to be made more user-friendly."
"If anything at all, it would be some very minor updates that need to be done, but in terms of changes, nothing comes to mind."
"SonicWall should promote their roadmap and improve their marketing to customers."
"I would say the solution needs a much simpler user interface, but the functionality of the firewall is quite extensive. You need the user interface to be that way. However, if there was a way to make the user interface a little easier, that would be great."
"I would like to have better documentation before starting with deployment because the deployment is a bit complex."
More Check Point SandBlast Network Pricing and Cost Advice →
More SonicWall Capture Advanced Threat Protection Pricing and Cost Advice →
Earn 20 points
Check Point SandBlast Network is ranked 8th in Advanced Threat Protection (ATP) with 33 reviews while SonicWall Capture Advanced Threat Protection is ranked 26th in Advanced Threat Protection (ATP). Check Point SandBlast Network is rated 8.4, while SonicWall Capture Advanced Threat Protection is rated 7.8. The top reviewer of Check Point SandBlast Network writes "High detection with few false positives and able to handle large volumes of data". On the other hand, the top reviewer of SonicWall Capture Advanced Threat Protection writes "When compared to other solutions, it is cheaper and more economical". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, Cisco Secure Network Analytics, Microsoft Defender for Office 365 and Trellix Network Detection and Response, whereas SonicWall Capture Advanced Threat Protection is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox and Microsoft Defender for Office 365.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.