Check Point SandBlast Network

Check Point's multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Languages supported:

5.6/10 (Expert Score) ★★★★★
Product is rated as #11 in category Network Sandboxing Software
Ease of use
Support
Ease of Setup

Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Check Point SandBlast Network
Check Point SandBlast Network

Show more categories

Customer Reviews

Check Point SandBlast Network Reviews

Oleg P.

Advanced user of Check Point SandBlast Network
★★★★★
Zero-day treats protection

What do you like best?

1. High rate of catching the zero-day advanced threats (I suppose due to the integrated AI-engine).

2. The Threat Extraction feature, when the suspicious document is converted to the other type/extension, which is harmless, like doc to pdf.

3. Very easy processes of the software blade activation and configuration.

4. In addition, Check Point SandBlast Network provides the protection against the phishing emails.

5. Good logging and reporting capabilities, on the level of other Check Point products.

6. Built-in compliance checks, with a reasonable set of the default regulations provided.

What do you dislike?

Some users report the poor performance of the software, but I believe that is valid for every enpoint security solution with a rich set of functionality.

What problems are you solving with the product? What benefits have you realized?

The overall security of the environment has been greatly improved by the Check Point NGFWs with the п»їSandBlast Network blade activated. Before implementing the Check Point solutions, we relied on the Cisco ACLs and Zone-Based firewalls configured on the switches and routers, which in fact a simple stateful firewall, and currently appear to be not an efficient solution for protecting from the advanced threats. The Check Point SandBlast Network software blade has increased the protection of our environment by enabling the Threat Emulation and Threat Extraction features. The first feature performs the sandboxing of the suspicious file types (over 70 file types may be emulated) in the Windows and MacOS virtual machines. The second feature works faster by just converting the files to the clean file of the PDF format thus deleting potentially dangerous Macroses, JavaScript Actions etc.

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide