Try our new research platform with insights from 80,000+ expert users
GaneshKhutwad - PeerSpot reviewer
Network security architect at a tech services company with 10,001+ employees
MSP
Top 5Leaderboard
Jul 30, 2024
Provides advanced threat prevention and utilizes geographic-based policies to mitigate attacks
Pros and Cons
  • "SandBlast Network enhances security by providing advanced threat prevention."
  • "The response times were slower, and getting support personnel on the call was more difficult."

What is our primary use case?

SandBlast Network enhances security by providing advanced threat prevention. It utilizes geographic-based policies to mitigate attacks. For example, it addresses the OWASP Top Ten security risks, which include common vulnerabilities such as XSS and SQL injection. These algorithms are designed to protect against the most prevalent and dangerous attacks in the world, making them an excellent solution for comprehensive security.

What needs improvement?

Check Point offers three types of support: Gold, Platinum, and Diamond. The level of support you receive should be based on the criticality of the issue, not solely on your client's support tier. While there are established support levels, I have experienced instances where the support provided was not categorized as Gold, Platinum, or Diamond but rather a standard support level. In such cases, the response times were slower, and getting support personnel on the call was more difficult.

For how long have I used the solution?


What do I think about the stability of the solution?

It integrate well into the environment. You can easily configure and trust all their devices.

I rate the solution's stability a nine out of ten.

Buyer's Guide
Check Point SandBlast Network
January 2026
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.

What do I think about the scalability of the solution?

There are 35000 US and 24000 UK users working on this solution.

I rate the solution's scalability a nine out of ten.

How are customer service and support?


Which solution did I use previously and why did I switch?

Check Point is a leading provider of network security solutions. Several vendors, such as Fortinet and Cisco, offer network security products, but Check Point stands out for its advanced features. Cisco is often preferred for routing devices and firewalls.

How was the initial setup?

The initial setup is neither very simple nor overly critical because it utilizes a three-tier architecture. This architecture has three tiers: the firewall, the central management system, and the security gateways, all of which must be interconnected. Generally, firewalls work based on this concept, using a three-tier architecture or similar solutions. If your device fails, you can restore your configuration from the centralized system or a local backup.

What was our ROI?

Check Point SandBlast Network products provide enhanced security. With geographic policies, you can easily block various types of traffic, including content-based filtering. This ensures that your network is highly secure within your environment.

What other advice do I have?

Overall, I rate the solution a nine out of teb=n.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2699931 - PeerSpot reviewer
Principal Cybersecurity Architect at a tech vendor with 10,001+ employees
Real User
Top 10
Apr 28, 2025
Rich features and strong customer support have enhanced malware inspection capabilities
Pros and Cons
  • "I have seen both money and time saved as a return on investment."
  • "Check Point SandBlast Network can be improved by adding more integration capabilities, such as integration with third-party firewalls, third-party EDR solutions, and SIEM."

What is our primary use case?

The primary use case for Check Point SandBlast Network is malware inspection, specifically the submission of files.

What is most valuable?

The product has rich features and excellent customer support. It's effective in meeting the specific needs of customers through deployment and integration. These features are important as they fulfill the purpose required by customers.

What needs improvement?

Check Point SandBlast Network can be improved by adding more integration capabilities, such as integration with third-party firewalls, third-party EDR solutions, and SIEM.

For how long have I used the solution?

I have been using Check Point SandBlast Network for more than five years.

What do I think about the stability of the solution?

Check Point SandBlast Network is almost stable.

What do I think about the scalability of the solution?

The scalability of Check Point SandBlast Network is good.

How are customer service and support?

The customer support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first solution I have used.

What was our ROI?

I have seen both money and time saved as a return on investment.

What's my experience with pricing, setup cost, and licensing?

The experience with pricing, setup costs, and licensing was good.

Which other solutions did I evaluate?

Before choosing Check Point SandBlast Network, I evaluated Fortinet and Trellix.

What other advice do I have?

I would advise others to evaluate thoroughly before deciding, especially in terms of integration with other third-party solutions. I would rate the overall solution nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Apr 28, 2025
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point SandBlast Network
January 2026
Learn what your peers think about Check Point SandBlast Network. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
AshleyMorales - PeerSpot reviewer
Cloud computing at a cloud solution provider with 51-200 employees
Real User
Nov 30, 2023
Helps detect and prevent attacks and offer helpful sandbox analysis
Pros and Cons
  • "The solution can detect and prevent attacks that may be encrypted."
  • "The management of alerts could improve them a bit - especially in event management."

What is our primary use case?

Check Point SandBlast Network was acquired when the company needed to improve its security posture in different characteristics. The company had a deficiency in monitoring the corporate network. This tool analyzes the traffic network in a way that is really efficient, and of course, the best thing is that it identifies suspicious patterns and behaviors. With this solution, we managed to improve the entire comprehensive posture of the critical assets of the organization's network.

How has it helped my organization?

Within the first six months of implementing Check Point SandBlast Network, we have managed to improve the security posture little by little. We have managed to reduce some threats, and with this, we have managed to locate where to improve the defense against malware, exploits, and zero-day attacks. 

One of the features that has helped us a lot is the capacity for sandboxing analysis and deep inspection of SSL/TLS traffic, which has enabled us to neutralize malware that the other technologies we have were not able to identify.

What is most valuable?

SandBlast Network has five very notable features, including a sandbox analysis. It allows you to execute files in a controlled environment to identify malicious behavior without having to affect the productive side. It has SSL traffic inspection. 

The solution can detect and prevent attacks that may be encrypted.

Integration with third-party tools has been of great help, the visibility it gives over the entire network.

The reports are helpful.

What needs improvement?

The configuration could be optimized. The usability could improve. They need to make the guides more specific with images, as it is very complicated to guess where each option is located.

The management of alerts could improve them a bit - especially in event management.

In terms of performance, at some point, I have come to feel that it drops during certain hours. 

Some additional features that can be added may be the use of Artificial Intelligence (AI) and Machine Learning (ML).

For how long have I used the solution?

I've used Check Point SandBlast Network for approximately three years. 

What do I think about the stability of the solution?

It is a reliable and stable solution that resists large workloads.

What do I think about the scalability of the solution?

It has great scalability with third-party tools and has shown a remarkable ability to adapt.

How are customer service and support?

We have only used support once. For the moment, the response to incidents has been good. They should improve the guides since they are somewhat complicated to understand.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before SandBlast Network, we used a combination of solutions and some of the same Check Point products that we had several years ago. We saw the need to opt for this and leave others out.

How was the initial setup?

There is a certain degree of complexity in the setup process, and the guides are not very clear.

What about the implementation team?

The implementation was generated with the vendor. Its configuration with the other tools is a little different and complex. However, the overall experience was very good.

What was our ROI?

The ROI can vary since. You can cover future expenses with security tools that help achieve a reduction of incidents, improved regulatory compliance for fewer fines, and business continuity.

What's my experience with pricing, setup cost, and licensing?

The cost and licensing will always be expensive. That said, we opted for this tool and removed two others, so we felt we achieved a good amount of savings.

Which other solutions did I evaluate?

This brand has always been evaluated since we already have some Check Point tools.

What other advice do I have?

Always evaluate the technologies that have been implemented. Check in with the new ones that are on the market. That can help you save money.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at a financial services firm with 51-200 employees
Real User
Feb 9, 2023
Helps detect and understand vulnerabilities with good advanced protection
Pros and Cons
  • "The product gives us advanced protection, including artificial intelligence and machine learning technologies and services."
  • "We have found a need for the application to be a bit more elastic, bringing it to SAS services and not IAS."

What is our primary use case?

With so many threats at the computer level, we have sought solutions that allow us to improve our internal perimeter security at the technological level to minimize exposure and one by one ability to reduce recovery time in the event of an attack. 

As a necessary part of security, we needed a solution that could integrate easily with other solutions and third-party solutions to allow us an in-depth defense against any threat that we detect. Based on all this, we effectively wanted to protect ourselves with the best solution and brand on the market. 

How has it helped my organization?

The product gives us advanced protection, including artificial intelligence and machine learning technologies and services. It is managing to protect us from malware fishing, cyber-attacks, and network exploits and allows us to emulate each of these attacks in a controlled environment. It is one of the few solutions that manage to emulate in real-time and minimize exposure to vulnerabilities since it detects if items have been analyzed and emulated, thus giving a 100% solvency solution before any infiltration.

What is most valuable?

One of its most outstanding characteristics is that it offers us a fairly accurate forensic analysis. It is detailed and it does allow us to equip and understand the causes and the impact of each of the vulnerabilities or attacks. This allows us to take preventive measures and react to disasters, giving us correct solvency guidelines. All these characteristics allow us to understand in depth what has happened and why this reaction to the attack is one of the characteristics that we must understand that is outstanding and of a lot of help or guidance. 

What needs improvement?

We have found a need for the application to be a bit more elastic, bringing it to SAS services and not IAS. We need to understand where to find edge analytics in Edge. Right now, it's a bit sparse and not available for some of the products that we have in the services suite. I'd like to see it integrate with more third-party services so that we would have the ability to be an edge service and have high emulation in functionality. 

For how long have I used the solution?

I've used the solution for two years.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Suraj Varma - PeerSpot reviewer
Sr. Network Security Engineer at a outsourcing company with 11-50 employees
Real User
Top 5Leaderboard
Aug 6, 2024
Frequent updates with zero-day threats and decent pricing
Pros and Cons
  • "The most valuable thing about this product is that it keeps the network secure against zero-day threats."
  • "Sometimes, Check Point Sandblast requires more resources, which impacts network performance if it has been deployed with limited resources."

What is our primary use case?

We are using this solution to keep our organization network secure from threats as it provides a virtual environment for the files to scan and emulate.

How has it helped my organization?

It keeps our organization secure and is effective against zero-day threats as it gets frequently updated. 

What is most valuable?

The most valuable thing about this product is that it keeps the network secure against zero-day threats, as nowadays, many organizations are compromised by emerging threats.  

What needs improvement?

Sometimes, Check Point Sandblast requires more resources, which impacts network performance if it has been deployed with limited resources.

For how long have I used the solution?

I've been using the device for the last year.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is excellent.

How are customer service and support?

Our experience with customer service and support is excellent.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are using Check Point only.

How was the initial setup?

We followed the procedure provided by the OEM, and it is easy.

What about the implementation team?

We implemented it through an in-house team.

What's my experience with pricing, setup cost, and licensing?

As of now, everything is good enough.

Which other solutions did I evaluate?

No, we haven't evaluated other options.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at a tech services company with 51-200 employees
Reseller
Top 5Leaderboard
Jul 7, 2023
An affordable and easy-to-deploy tool that is useful for protection against malicious threats
Pros and Cons
  • "The main feature of the solution is that it protects against malicious threats from the outside."
  • "There should be some improvement in the solution's stability and scalability."

What is our primary use case?

We are using it on top of email security and web security.

What is most valuable?

The main feature of the solution is that it protects against malicious threats from the outside. We utilize SandBlast solution to mitigate threats from outside to inside. As an ATP, the solution's role is to defend against threats and provide protection to the customer using the SandBlast as an ATP solution.

What needs improvement?

There should be some improvement in the solution's stability and scalability.

For how long have I used the solution?

I have been using Check Point SandBlast Network for the past three months.

What do I think about the stability of the solution?

Since the stability of the tool is good, I rate it nine out of ten.

What do I think about the scalability of the solution?

We have more than 50 customers, including IT heads, CTOs, and all are working on the solution.

I rate the solution's scalability a nine out of ten.

How was the initial setup?

The initial setup is straightforward, and it's a cloud-based solution.

The deployment is very easy. So, the deployment team is deploying this solution to the customer environment.

For deployment, I do not have any idea since I do the PoC part. It depends on the customer environment, the customer's use cases, and the design of the solution. We provide the solution based on the deployment. So it's not complex. It is very easy.

What about the implementation team?

We have certified engineers in-house who are responsible for deploying and implementing the solution. We have expert engineers specialized in Check Point.

What's my experience with pricing, setup cost, and licensing?

The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine.


What other advice do I have?

We are pitching the customer the benefits of the cloud. However, I don't have detailed knowledge about Check Point. So, to be honest, I lack deep visibility or specific information regarding the need for a Check Point experience.

I would tell those individuals seeking anti-threat protection on top of web security and email security to consider SandBlast. By using SandBlast, we can effectively manage everything.

The solution is a single premium package suitable for heavy usage.

Overall, I rate the solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
William Cambronero - PeerSpot reviewer
Consultant at a security firm with 51-200 employees
Reseller
Top 5Leaderboard
Jun 23, 2025
Improves security, scans fast, and has lots of helpful features
Pros and Cons
  • "The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises."
  • "When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization."

What is our primary use case?

One of the great needs that our company was going through was the need to protect its infrastructure against hackers or malicious bots, as well as cyber-attacks.

We wanted a robust technology that would meet our objectives. We wanted to prevent attacks on our business environment. In addition, as a company, we already use various Check Point technologies and we wanted to continue with the same scope and security that they have offered us in recent years. That's why Check Point SandBlast Network provides us with that security by scanning everything that passes through our network.

How has it helped my organization?

Since implementing the Check Point SandBlast Network tool in the organization, in an environment of around 200 servers (both physical and virtual), we also have three high-availability clusters. 

Before, we only depended on a firewall; however, this acquisition has helped us a lot to improve the entire security environment of our company. In addition, the tool has excellent features such as Threat Emulation and Threat Extraction as well as sandboxing. We can even extract the malicious content of the files or block files completely and can also work as email APT and can remove malicious content from the email body.

What is most valuable?

We have found several valuable features in the Check Point SandBlast Network. One of those features is that we can download a file and emulate it outside of our company and know that it is clean.

Like any other company that handles sensitive data, we needed a tool that would protect our network and be able to improve security day by day.

The Check Point SandBlast Network uses caching and static analysis to actually reduce the time it takes to scan and isolate the same file for incoming data compromises.

What needs improvement?

When you have to scan emails that come with attachments, it takes a long time to examine them, which causes other emails not to be scanned, which can cause some danger to our organization. Another problem is that some PC with minimum characteristics makes them slow, causing slowness in computers where we have to invest in PCs to increase their performance or change them

Another point to improve is the support since they do not give an effective and fast solution to the clients when they have problems with any tool or feature.

For how long have I used the solution?

I have been using and implementing this tool for about three years..

What do I think about the stability of the solution?

It presents medium stability. Sometimes the portal is hard to enter, and that affects the performance of equipment, however, in general, it has excellent stability.

What do I think about the scalability of the solution?

The solution has excellent scalability.

How are customer service and support?

The support they offer is not very good since they take a long time to provide a solution to your problem.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously we had a firewall and we chose to implement this tool since we have always worked with this brand, and it has been very feasible for us to continue to do so.

How was the initial setup?

The configuration is simple it is very user-friendly.

What about the implementation team?

The provider provided us with a support agent to ensure that the configuration was made.

What was our ROI?

Of importance in a company is the security of its computer platforms. When making an investment with these tools, you are taking care of an important heritage that will double your profits.

What's my experience with pricing, setup cost, and licensing?

Check Point offers good prices. There are costs. However, that should not stop a company from maintaining good security.

Which other solutions did I evaluate?

Other brands are not evaluated since we wanted to have the Check Point trend and not mix brands.

What other advice do I have?

It is a very good, reliable, and robust tool. You can be confident that it will protect the organization.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jun 23, 2025
Flag as inappropriate
PeerSpot user
Head of IT Department at a tech services company with 11-50 employees
Real User
Top 5
Aug 20, 2024
Secures emails and prevents security breaches
Pros and Cons
  • "It is a stable solution."
  • "The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool."

What is our primary use case?

I use the solution in my company for securing incoming emails, specifically the ones with attachments. The tool scans the incoming documents for specific network traffic. We also use the tool to inspect and download files for malware or malicious content.

How has it helped my organization?

With the tool, malware does not get into our environment, and the user does not open emails with malware in them. We don't get any security breaches, which is the most important benefit of using the tool in our company.

What is most valuable?

The most valuable feature of the solution stems from the fact that since the tool is in front of the traffic, it catches a lot of stuff that some of our email cloud protection products don't see, as they are mostly antivirus-based. Check Point SandBlast Network is a behavioral-based tool.

What needs improvement?

The cost is a little bit high-end, and you need to get precise performance metrics in order to get the correct size. Improvements are required in both areas of the tool.

For how long have I used the solution?

I have been using Check Point SandBlast Network for four or five years. I work with Check Point R81.20.

What do I think about the stability of the solution?

It is a stable solution.

What do I think about the scalability of the solution?

In terms of scalability, as we have an appliance in place, I would say that we can add additional appliances and use the load-balancing functionalities in the tool. If we are looking at things from just a single appliance perspective, we are stuck with it. You need to upgrade an appliance to another one if you need more performance. Check Point SandBlast Network is not optional as a virtual machine.

In our company, we use just one appliance.

All of our employee traffic goes through the tool. Around 300 people in our company use the tool.

How are customer service and support?

In our company, we haven't had so much need for support because the product is more or less a standard one. We had one issue a few years ago with false positives, but that was quickly resolved.

Which solution did I use previously and why did I switch?

I have not worked with any product similar to Check Point SandBlast Network.

How was the initial setup?

The setup was quite easy initially because you have many different options on how you want to set it up, like whether you want it to be able to monitor or intercept. Fine-tuning was needed because of the scaling needs. Sometimes, you get false positives, as with any product.

The solution was deployed by two people.

The solution can be deployed within a day.

Firstly, we had a PoC where the vendor supplied us with the device, which we plugged into a passive mode. We checked how it works, what it protects, and what our other solutions do. When we bought the tool, we implemented it as an email gateway, so all the traffic goes through it, and now it blocks everything that it finds bad.

What about the implementation team?

For the product's deployment phase, my company got help from Check Point and a third party.

What was our ROI?

Our company gained peace of mind from using the tool. With Check Point's firewall tools, it is quite hard to pinpoint the investment.

What's my experience with pricing, setup cost, and licensing?

The product's cost is high.

Which other solutions did I evaluate?

I think we tried Check Point SandBlast Network as the first tool in our company, and we stuck with it because it made sense because it was quite well integrated into the other Check Point products, and we didn't want to try to integrate it with other tools.

What other advice do I have?

Though I think it could become a complex task, the feature set is there in the tool to meet the needs of its users.

When it comes to the maintenance part, one needs to understand that when it comes to Check Point, the releases are the same, and it is almost the same as the gateway.

I recommend the tool to others. Other people need to test the tool before purchasing it. There is also a cloud version, so one should test whether that is a better option. Yeah. Actually, it is quite a valuable product.

I rate the tool an eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point SandBlast Network Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free Check Point SandBlast Network Report and get advice and tips from experienced pros sharing their opinions.