Check Point SandBlast Network vs ThreatLocker Protect comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Check Point SandBlast Network
Ranking in Advanced Threat Protection (ATP)
8th
Average Rating
8.4
Number of Reviews
33
Ranking in other categories
No ranking in other categories
ThreatLocker Protect
Ranking in Advanced Threat Protection (ATP)
16th
Average Rating
9.2
Number of Reviews
13
Ranking in other categories
Network Access Control (NAC) (5th), Endpoint Protection Platform (EPP) (26th), Application Control (4th), ZTNA (9th), Ransomware Protection (6th)
 

Market share comparison

As of June 2024, in the Advanced Threat Protection (ATP) category, the market share of Check Point SandBlast Network is 7.8% and it increased by 32.9% compared to the previous year. The market share of ThreatLocker Protect is 0.4% and it increased by Infinity% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
Unique Categories:
No other categories found
Network Access Control (NAC)
0.3%
Endpoint Protection Platform (EPP)
0.7%
 

Featured Reviews

AshleyMorales - PeerSpot reviewer
Nov 29, 2023
Helps detect and prevent attacks and offer helpful sandbox analysis
Check Point SandBlast Network was acquired when the company needed to improve its security posture in different characteristics. The company had a deficiency in monitoring the corporate network. This tool analyzes the traffic network in a way that is really efficient, and of course, the best thing…
Sam Perry - PeerSpot reviewer
Dec 14, 2023
Helps verify specific access requests, and provides us with peace of mind, but the learning curve is wide
The current process for viewing software approval requests from end users has room for improvement. While it's generally functional, some users find it confusing. This can be due to either unfamiliarity with the process, unexpected appearance of the request window, or lack of clear instructions. Additionally, the notification box might not be sufficiently noticeable, as some users have reported missing it entirely. Adding applications to the allowlist can sometimes feel overwhelming. The numerous fields, coupled with navigating the unfamiliar portal, can be daunting, especially on our first attempt. Even with explanations, recalling the necessary information and understanding the required actions for file inclusion can be tricky. I believe the initial learning curve for allowlisting is relatively steep. However, once mastered, it proves to be a valuable tool. My main concern lies with the initial learning hurdle.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has caught some harmful attachments and downloads."
"Check Point SandBlast is best in terms of the extraction function. Customers can get a clean firewall with extraction after I've cleaned and scanned it from Check Point. It's easy for users, too."
"The most efficient and protective characteristics of Check Point's SandBlast solution are that we can see a lot of this protection at the network and mail levels."
"The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
"The forensics reports and the ability to sandbox malware are its most valuable features."
"It enables my IT system to apply threat detection intelligence and diffuse the endpoint and potential threat attacks and phishing attacks onto the system in the most proactive and secure manner."
"The product gives us advanced protection, including artificial intelligence and machine learning technologies and services."
"The technology is impressive in general."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
 

Cons

"Using it in the beginning was difficult because I had never used anything similar. In terms of navigating the UI, it was all not too bad, but there is definitely a learning curve."
"The technical support could use some work, but it's okay. It's a little bit of a tedious process to get through."
"We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us."
"The management of alerts could improve them a bit - especially in event management."
"I would like for them to improve the visibility in the product."
"They need to improve the GUI interface."
"There have been a couple of things that we've tried where we read through the documentation, and we were really looking for some help in implementing, and technical support wanted me to try it first, then call them if it breaks. It would be nicer if they would hold my hand a bit more. It makes me nervous in production, as I don't have a lab."
"I imagine there will be improvements in later versions. There are hotfixes that come out all the time."
"We identified several areas that we would like to see improved."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"ThreatLocker Allowlisting needs to improve its user interface and overall workflow."
"The reporting could be improved."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"There are some times when applications get submitted, the hashes don't really line up."
"Adding applications to the allowlist can sometimes feel overwhelming."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
 

Pricing and Cost Advice

"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
"We have seen ROI."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"The pricing is fair and there is no hard sell."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"ThreatLocker's pricing seems justifiable."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
787,061 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
15%
Government
12%
Security Firm
10%
Computer Software Company
39%
Retailer
6%
Government
5%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point SandBlast Network?
The solution can detect and prevent attacks that may be encrypted.
What is your experience regarding pricing and costs for Check Point SandBlast Network?
The cost and licensing will always be expensive. That said, we opted for this tool and removed two others, so we felt we achieved a good amount of savings.
What needs improvement with Check Point SandBlast Network?
The configuration could be optimized. The usability could improve. They need to make the guides more specific with images, as it is very complicated to guess where each option is located. The manag...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
ThreatLocker's pricing seems justifiable. We get a lot of value for what we pay, with excellent support, the program itself, and everything related to it being top-notch. If my CTO ever suggested d...
What needs improvement with ThreatLocker Allowlisting?
The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself.
 

Also Known As

No data available
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Information Not Available
Find out what your peers are saying about Check Point SandBlast Network vs. ThreatLocker Protect and other solutions. Updated: May 2024.
787,061 professionals have used our research since 2012.