2019-01-28T12:30:00Z

What is your primary use case for Check Point SandBlast?

Miriam Tover - PeerSpot reviewer
  • 0
  • 1
PeerSpot user
14

14 Answers

TK
Real User
2019-03-17T12:17:00Z
Mar 17, 2019

We have it on our endpoints.

Search for a product comparison
it_user830025 - PeerSpot reviewer
Real User
2019-02-12T12:12:00Z
Feb 12, 2019

Our primary use case of this solution is for Edge firewalls and our cloud.

AA
Real User
2019-02-12T12:12:00Z
Feb 12, 2019

Our primary use case of this solution is for file extraction. We send it out to SandBlast to open up the file to see if there is any malicious content in the file. We then send it back into the client environment.

RA
MSP
2019-02-12T12:12:00Z
Feb 12, 2019

We use SandBlast to protect our mobile devices, as well as our iPads and Samsung tablets.

MF
Real User
2019-02-12T12:12:00Z
Feb 12, 2019

We were looking to upgrade our protection to our endpoints, giving us more of a forensics backbone into when something happens on a machine. The product can let us know what happened, where it came from, etc. Our primary use case is for more insight into what is happening.

BW
Real User
2019-02-12T12:12:00Z
Feb 12, 2019

We use it as a method to ensure with all of our emails and the files coming through have secure attachments and no known issues: No malware, no known vulnerable hashes, nor anything malicious.

Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,319 professionals have used our research since 2012.
JC
Reseller
2019-02-12T12:12:00Z
Feb 12, 2019

We are a reseller, so we implement this solution for our customers.

CP
Real User
2019-02-12T12:12:00Z
Feb 12, 2019

My primary use of this solution is to supplement my existing antivirus and enable/enhance my anti-ransomware capabilities.

SC
Real User
2019-02-12T12:12:00Z
Feb 12, 2019

Our primary use case of this solution is for security in our data centers.

AB
MSP
2019-02-12T12:12:00Z
Feb 12, 2019

Our customers use this solution because it takes an .exe and applications, then scans them. So, it is good threat protection.

MY
Real User
2019-02-12T12:12:00Z
Feb 12, 2019

Our primary use case is using it to virtualize environments or create a sandbox in which we can use it to test malware.

ES
Real User
2019-02-12T12:12:00Z
Feb 12, 2019

We use the Threat Emulation blade feature on the Security Gateway.

RS
Real User
2019-02-12T12:12:00Z
Feb 12, 2019

Check Point is our main perimeter firewall vendor. We have several Check Point clusters doing different things within our environment.

it_user967395 - PeerSpot reviewer
Real User
2019-01-28T12:30:00Z
Jan 28, 2019

My primary use case for this solution is to integrate with mobile device management.

Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast
Download Check Point SandBlast Network ReportRead more