Try our new research platform with insights from 80,000+ expert users

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Check Point SandBlast Network offers robust detection and prevention of threats, keeping environments secure, and supports zero-day and signature-based protection.
Scalability across cloud environments and efficient threat intelligence application enhance its usability and effectiveness.
Threat emulation within Check Point SandBlast Network stops threats before they enter the network, providing thorough protection.
The use of artificial intelligence and machine learning in Check Point SandBlast Network ensures proactive threat detection and mitigation.
Check Point SandBlast Network reduces incidents and improves user confidence, yielding significant returns on investment.

CONS

Users report stability concerns with Check Point SandBlast Network, citing frequent outages and the need for back-end stability improvements.
Technical support for Check Point SandBlast Network is described as a tedious process, and users wish for more proactive assistance and faster attention times.
There is a request for speed improvements in navigation and processing times, particularly when handling large file emulations.
Integration with third-party vendors is limited, and users would like improved capabilities with EDR, CRM, and other systems.
Check Point SandBlast Network is considered to have high-end costs and requires precise performance metrics to ensure correct sizing and resource allocation.
 

Check Point SandBlast Network Pros review quotes

MW
May 8, 2025
Check Point SandBlast Network has positively impacted our organization by reducing incidents, improving user confidence, and saving time since implementing it. With around 2,000 users in our organization, after deploying threat emulation for network security, we haven't seen any incidents, including zero-day or ransomware attacks.
BD
May 29, 2021
The sandbox is able to scan files without adding a delay or compromising productivity.
RS
Feb 12, 2019
We didn't really have any IPS before. So, Check Point has improved our security posture. People get used to doing things certain ways, which might not be the best or most secure way, and they can't do that now, which just requires more education of the user base. With the endpoint client, we've started to use Check Point for remote access.
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
OP
Aug 29, 2020
It provides a high rate of catching the zero-day advanced threats.
KK
Aug 9, 2024
It is a stable solution.
Adrian Cambronero - PeerSpot reviewer
Dec 21, 2023
The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises.
HT
Aug 27, 2020
When our workers are downloading software, SandBlast Cloud is useful to emulate the downloads that the workers are doing. Then, there are no threats coming into the company.
AshleyMorales - PeerSpot reviewer
Nov 29, 2023
The solution can detect and prevent attacks that may be encrypted.
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Nov 14, 2022
It looks out for new cyber ​​threats and generates predictions based on behaviors that are already detected on a daily basis.
ST
Mar 25, 2021
Threat extraction can help us to remove malicious content from documents by converting them to PDF.
 

Check Point SandBlast Network Cons review quotes

MW
May 8, 2025
Improvements for Check Point SandBlast Network can be seen in dashboard usability; the threat emulation logs and analysis reports could be made more intuitive and visually appealing.
BD
May 29, 2021
The file types that can be scanned are limited, which means that if the file type is not listed or enabled for the sandbox, they are bypassed and it can lead to a security issue.
RS
Feb 12, 2019
There have been a couple of things that we've tried where we read through the documentation, and we were really looking for some help in implementing, and technical support wanted me to try it first, then call them if it breaks. It would be nicer if they would hold my hand a bit more. It makes me nervous in production, as I don't have a lab.
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
OP
Aug 29, 2020
The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption.
KK
Aug 9, 2024
The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool.
Adrian Cambronero - PeerSpot reviewer
Dec 21, 2023
When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization.
HT
Aug 27, 2020
I would like if it could emulate bigger files and somehow improve this usability. I don't know if this would be possible. However, if it was able to scan or emulate bigger files, then it would be safer for a company using it.
AshleyMorales - PeerSpot reviewer
Nov 29, 2023
The management of alerts could improve them a bit - especially in event management.
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Nov 14, 2022
Today, we have it as part of a solution or a package. However, we'd like there to be a way where we can have the solution's features available to us in a cheaper way in the future.
ST
Mar 25, 2021
In Check Point SandBlast, improvement has to be made with respect to the GUI.