SandBlast Threat Extraction

As part of the Check Point Zero-Day Protection SandBlast solution, the Threat Extraction capability removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.

Languages supported:

9.2/10 (Expert Score) ★★★★★
Product is rated as #6 in category Digital Forensics Software
Ease of use
Support
Ease of Setup

As part of the Check Point Zero-Day Protection SandBlast solution, the Threat Extraction capability removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow.

SandBlast Threat Extraction
SandBlast Threat Extraction

Show more categories

Customer Reviews

SandBlast Threat Extraction Reviews

Oleg P.

Advanced user of SandBlast Threat Extraction
★★★★★
Fast files convertion into the safe types

What do you like best?

1. The solution works with both interned-downloaded documents and email attchments.

2. The processing time is really short, especially in comparison with the threat emulation solutions.

3. The original files (before the processing) are stored for the configured time in case the access for them is needed.

What do you dislike?

I hope that the range of the file types supported would be increased by Check Point.

What problems are you solving with the product? What benefits have you realized?

It think that the implementation of the SandBlast Threat Extraction software blade by Check Point has improved the security protection level of our company. Before implementing the Check Point solutions, we relied on the Cisco ACLs and Zone-Based firewalls configured on the switches and routers accross the infrastructure. Nowadays this approach appears to be not an efficient solution for protecting from the advanced threats. The Check Point SandBlast Threat Extraction software blade works really fast by just converting the suspicious files destined to the users to the "clean" files of the PDF format by deleting all the potentially dangerous parts of the initial files, like Macroses, JavaScript Actions etc. All the info and file structures are preserved, so the end users can work with the files without any downsides.

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide