Top Rated Check Point SandBlast Network Alternatives

The most favourable feature is that Checkpoint Point Sandblast is very accurate and gives a almost no false positives, it has great threat prevention against severe zero day attacks.Great TAC team support.Deployement is easy. Review collected by and hosted on G2.com.
The UI and the cost can be improved ,Higher CPU utilization in some instances. Review collected by and hosted on G2.com.
14 out of 15 Total Reviews for Check Point SandBlast Network

Check Point Sandblast provide threat prevention and sandboxing feature that helps of in anti-bot, anti-virus and many more sandboxing feature.
also it is veru easy yo use, simple integration . Review collected by and hosted on G2.com.
as far there is no point which I dislike about check point. Review collected by and hosted on G2.com.
The Sandblast network delivers true zero day protection to your network that can stop the first outbreak of an attack. Nothing is allowed into the network until Sandblast says that its ok Review collected by and hosted on G2.com.
Only included on the upper tier of licenses so it can be expensive to maintain across your entire network and for east-west traffic. Would be good to see lower tiers of the product. Review collected by and hosted on G2.com.
Non intrusive advanced threat protection (including 0 day threats) with a high detection and low false positives Review collected by and hosted on G2.com.
Initial configuration is not straight forward if you don't have experience in checkpoint products. There is a best practices guide but not easy to find Review collected by and hosted on G2.com.
Sandblast network can be used in a private network or in the cloud with the same features. There are several companies that do not have this option available. As the current trend is the cloud, on-premise solutions lack many features. For the cloud usage called TX is very easy to activate within several clicks, then it's working. Licensing is simple. TE gives you broad coverage for 0 days of several protocols. Threat extraction is unique; even some vendors have dedicated solutions for the extraction of pds and macros. TEX does not damage the original files. MacOS support is a big plus as MacOS support of related security services is lacking, MacOS TE support gives us confidence. I do not need to invest in an additional sandboxing product with TX. I have one platform to cover all network security solutions. Review collected by and hosted on G2.com.
TX annual pricing is costly compared to the initial investment of the product. In case of problems related to TX, support always directs it to the latest HFA, even to the new version. I see in some cases, the TE process hangs and needs to be restarted. You don't get regular updates if the ATP vectors are covered with TX. There's no specific service to use the sandblast networking in the cloud just for info exchange or api. I can't track or query our uploaded data to the cloud. Review collected by and hosted on G2.com.

Checkpoint Sandblast combines evasion resistance Threat Emulation, and Threat Extraction technology which detects and blocks Zero-day attacks, including CPU level.
Emulation is nothing but to detect signature which was previously unknown into checkpoint's virtual server environment knows as traditional sandbox technology, but its beyond that which makes more accurate and fastest response service.
Threat extraction is to sanitized the emails and downloaded file content from web browsers which leads to avoiding phishing emails. Review collected by and hosted on G2.com.
The onboarding process is simple but requires more CPU as emulation is a very CPU-intensive process, either on the cloud or on-premises.
Filtering real-time web browser traffic and emails that require more memory and devices sometimes stop responding to it.
Email gets stuck in quarantine which sometimes needs to involve the TAC team. Review collected by and hosted on G2.com.
The way that SanBlast Cloud emulates the downloads when all work personal try to download any software from the internet service protecting the LAN environment within our infrastructure Review collected by and hosted on G2.com.
The high performance that it takes when Threat Emulation is enabled, and some times this affects our operations with some latency issues when they try to navigate to the internet service Review collected by and hosted on G2.com.
It is a one-stop shop for Endpoint protection—features minimal zero-day threats, full disk encryption, Monitoring, and blocking malicious files. Filtering phishing emails is a modern-day threat under social engineering.
Centralized management, Minimal Zero day threats, FDE(Full Disk Encryption, blocking malicious files and mails. Review collected by and hosted on G2.com.
The End user machine slowness due to consuming max of the CPU usage. Review collected by and hosted on G2.com.
Features such as FDE (Full Disk Encrytion), very high rate of Zero Day Threat catch, extraction/blocking malicious files and/or content after scanning the file and understanding the behaviour if the file was opened on the system in a virtual environment before it is shared to the end user,
Most important one is the Phishing emails which have become quite a normal norm before of work from home. Review collected by and hosted on G2.com.
Many end machine resources are consumed by enabling the features, which is expected but can become a nuisance sometimes due to delay/slow performance. Review collected by and hosted on G2.com.
Check Point differentiates with its zero-day protection. Static analyses, dynamic analyses,CPU-level protection, plus sandboxing engine. With these capabilities, the product can hold malwares even at first time . No gap for security. Review collected by and hosted on G2.com.
Forensics reports can be more detailed like Check Point do for Endpoints. Review collected by and hosted on G2.com.
SandBlast network secure our organization from zero day attack and make it safe from them for on-prem as well as roaming users. Review collected by and hosted on G2.com.
It is very good solution for protection against zeroday, no dislike. Review collected by and hosted on G2.com.