We performed a comparison between Check Point SandBlast Network and Veritas Alta SaaS Protection based on real PeerSpot user reviews.
Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us."
"Check Point SandBlast Network Solution provides signature-based as well as zero-day threat protection. Also sandboxing can be performed on an on-premise device, cloud as well as the combination of both. Threat emulation is done on multiple OS & verdict is provided."
"We didn't really have any IPS before. So, Check Point has improved our security posture. People get used to doing things certain ways, which might not be the best or most secure way, and they can't do that now, which just requires more education of the user base. With the endpoint client, we've started to use Check Point for remote access."
"The solution can detect and prevent attacks that may be encrypted."
"The most valuable feature of Check Point SandBlast Network is the sandboxing of PDF and Microsoft system files."
"It enables my IT system to apply threat detection intelligence and diffuse the endpoint and potential threat attacks and phishing attacks onto the system in the most proactive and secure manner."
"SandBlast updates the threat signatures frequently."
"Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox."
"The solution is stable; I haven't experienced any bugs or glitches on it."
"he most valuable feature is that it's not so intrusive with computer resources."
"What I like most about Veritas SaaS Backup is that it is easy to work on."
"We're comfortable using this kind of technology. It's user-friendly."
"It's a good solution. It's pretty stable."
"The most valuable features are the ease of administration and the ease of configuration."
"The duplication is the solution's most valuable feature."
"Veritas is loaded with features because the appliance is ready to integrate with the cloud in cases where the customers have a hybrid or cloud environment."
"I am very leery right now about the stability. We've had three outages in the last month because of Check Point, not because of something that the customer has done, but because of changes on the Check Point side."
"The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue."
"The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."
"Today, we have it as part of a solution or a package. However, we'd like there to be a way where we can have the solution's features available to us in a cheaper way in the future."
"I would like to see some speed improvements, e.g., how quickly you can get through all the menus. It crashes sometimes because we push so much through it. Therefore, I would like to see more small things behind the scenes, such as, back-end stability in terms of the management application."
"I would like to see these solutions being easier to manage from mobile applications - from either iOS or Android - including other operating systems that appear in the future."
"In Check Point SandBlast, improvement has to be made with respect to the GUI."
"SandBlast takes longer than FortiSandbox to complete a scan."
"The usability of the solution isn't the best."
"Technical support can be improved."
"The implementation could be improved. The server setup is very easy, but some specific client implementation, for example, Oracle or SQL servers, are a little bit complicated. they should offer a bit more assistance with the setup for these particular items."
"When you finish a project, the client should have the opportunity to browse the files rather than simply ending the contract. Also, it's not possible to recover earlier versions. It should be possible to have a database for recovering files after you finish a contract. There's no solution for this from Veritas."
"Currently, it isn't possible to use anything other than Veritas cloud to back up to. I think today it's important to cover the three major cloud provider: GCP, Azure and AWS."
"Licensing has been a struggle. It went from bronze, silver to gold. Licensing needs more sophistication. It has features that are sold as separate add-ons."
"The technical team wasn't very helpful."
"An area for improvement is the product's performance, especially how long it takes to do a job."
More Check Point SandBlast Network Pricing and Cost Advice →
Check Point SandBlast Network is ranked 8th in Advanced Threat Protection (ATP) with 33 reviews while Veritas Alta SaaS Protection is ranked 25th in Advanced Threat Protection (ATP) with 12 reviews. Check Point SandBlast Network is rated 8.4, while Veritas Alta SaaS Protection is rated 8.0. The top reviewer of Check Point SandBlast Network writes "High detection with few false positives and able to handle large volumes of data". On the other hand, the top reviewer of Veritas Alta SaaS Protection writes "It's a user-friendly solution that helps us migrate our customers from their local servers". Check Point SandBlast Network is most compared with Palo Alto Networks WildFire, Fortinet FortiSandbox, Cisco Secure Network Analytics, Microsoft Defender for Office 365 and Trellix Network Detection and Response, whereas Veritas Alta SaaS Protection is most compared with Veritas NetBackup, Commvault Cloud, AWS Backup, Veritas Backup Exec and Azure Backup. See our Check Point SandBlast Network vs. Veritas Alta SaaS Protection report.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.