No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point SandBlast Network vs Veritas Alta SaaS Protection comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point SandBlast Network
Ranking in Advanced Threat Protection (ATP)
6th
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
42
Ranking in other categories
No ranking in other categories
Veritas Alta SaaS Protection
Ranking in Advanced Threat Protection (ATP)
27th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
14
Ranking in other categories
SaaS Backup (18th), SaaS Management Platforms (9th)
 

Mindshare comparison

As of May 2026, in the Advanced Threat Protection (ATP) category, the mindshare of Check Point SandBlast Network is 3.5%, down from 4.3% compared to the previous year. The mindshare of Veritas Alta SaaS Protection is 1.6%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP) Mindshare Distribution
ProductMindshare (%)
Check Point SandBlast Network3.5%
Veritas Alta SaaS Protection1.6%
Other94.9%
Advanced Threat Protection (ATP)
 

Featured Reviews

MW
Technical Specialist at Softcell Technologies Limited
Comprehensive security solution mitigates advanced threats
Improvements for Check Point SandBlast Network can be seen in dashboard usability; the threat emulation logs and analysis reports could be made more intuitive and visually appealing. Enhancing the system for granular tuning to reduce false positives and allowing benign files to bypass checks more simply for non-expert users would be beneficial. Additionally, faster emulation times could be achieved by increasing file scanning speed through hardware productivity enhancements. A specific instance where file scanning speed posed an issue was when the time taken depended on the file size. Scanning can take less than a minute or up to 2 minutes for larger files. Enhancing the file scanning time would be a significant improvement to the system.
SG
Technical Manager at Rigor Systems Limited
Experience with offsite backup enhances data integrity and reduces on-premise reliance
One of the features of Veritas Alta SaaS Protection that customers are looking for is immutability. This is the most important feature. With the cloud, Veritas Alta SaaS Protection is actually in the cloud, which means they have unlimited space to do their backups. They can expand on a need-to-need basis. The automated recovery feature of Veritas Alta SaaS Protection makes the recovery much easier, as opposed to earlier methods where we were using scripts to do the restore. Currently, it's automated so you just do a click. You select the feature in a graphical interface, making it easy to use even for a newbie.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Working for a Check Point partner we utilise Check Point's endpoint solution in our day to day work and the most valuable benefit is knowing I am being protected from email, endpoint and removable media attacks and when attacks occur I am likely to weather the storm better than other users."
"The most valuable feature is comprehensive threat prevention, whether signature-based or a zero-day secure network."
"Check Point has enabled us to detect a lot of threats and prevented a lot of threats from entering our environments. It has kept us safe."
"Threat Emulation gives networks the necessary protection against unknown threats in files that are attached to emails. The Threat Emulation engine picks up malware at the exploit phase before it enters the network. It quickly quarantines and runs the files in a virtual sandbox, which imitates a standard operating system, to discover malicious behavior before hackers can apply evasion techniques to bypass the sandbox."
"It provides a high rate of catching the zero-day advanced threats."
"Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us."
"The forensics reports and the ability to sandbox malware are its most valuable features."
"The most efficient and protective characteristics of Check Point's SandBlast solution are that we can see a lot of this protection at the network and mail levels."
"It's very comprehensive. It's one of the first brands to appear in its field."
"The duplication is the solution's most valuable feature."
"What I like most about Veritas SaaS Backup is that it is easy to work on and has compatible features."
"I would recommend anybody to buy this solution and use it."
"The automated recovery feature of Veritas Alta SaaS Protection makes the recovery much easier, as opposed to earlier methods where we were using scripts to do the restore."
"The most valuable features are the ease of administration and the ease of configuration."
"The solution is stable; I haven't experienced any bugs or glitches on it."
"I think the most important feature is the ability of SaaS Backup to cover all modules proposed by Office 365, because competing solutions don't cover the total scope."
 

Cons

"We have noticed a slight performance hit when the Threat Emulation and Extraction features were enabled, but the protection trade-off is worth it for us."
"The knowledge base of Check Point SandBlast Network contains some confusing context, which might be confusing while configuring and designing."
"I would like for them to improve the visibility in the product."
"We have found a need for the application to be a bit more elastic, bringing it to SAS services and not IAS."
"The Threat Emulation software blade significantly affects the performance of the NGFWs, we have a significant increase in the CPU and memory consumption."
"There have been a couple of things that we've tried where we read through the documentation, and we were really looking for some help in implementing, and technical support wanted me to try it first, then call them if it breaks. It would be nicer if they would hold my hand a bit more. It makes me nervous in production, as I don't have a lab."
"The guides or best practices of Check Point are difficult to find for the client. Therefore, it is sometimes difficult to make better implementations."
"I would like for them to improve the visibility in the product."
"Licensing has been a struggle. It went from bronze, silver to gold. Licensing needs more sophistication. It has features that are sold as separate add-ons."
"The solution does lack a lot of features, and we're considering switching."
"In the future, we would like to see support for virtualized machines."
"The usability of the solution isn't the best."
"Other people will prefer this solution because they're used to it. However, from my point of view, you have more breaks, more failures on it than you will with Commvault."
"An area for improvement is the product's performance, especially how long it takes to do a job."
"The implementation could be improved. The server setup is very easy, but some specific client implementation, for example, Oracle or SQL servers, are a little bit complicated. they should offer a bit more assistance with the setup for these particular items."
"The program is quite expensive and I am not impressed by their technical support."
 

Pricing and Cost Advice

"I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market."
"The pricing is quite effective, not excessively high. On a scale of one to ten, where ten is the highest price, I rate the pricing a nine."
"We would like to try the Threat Extraction blade, but you need to buy a license. Check Point is expensive. I would like to buy things, but I would need the funding."
"The cost of Check Point SandBlast Network is annually, and there is only a standard license."
"We have seen ROI."
"The cost is not significantly high and it can be negotiated during any purchase of NGFW."
"The product's cost is high."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"I would rate this solution's pricing as five out of five."
"This solution is not cheap and not expensive but priced in the mid-range."
"SaaS Backup isn't the most expensive solution."
"The tool is expensive compared to Veeam."
"The program is quite expensive."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
9%
Construction Company
8%
Comms Service Provider
7%
Marketing Services Firm
7%
Manufacturing Company
12%
Healthcare Company
8%
Financial Services Firm
7%
Construction Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business30
Midsize Enterprise8
Large Enterprise14
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise1
Large Enterprise4
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point SandBlast Network?
My experience with pricing and setup cost is that pricing was a bit high, but the setup cost was initially justified.
What needs improvement with Check Point SandBlast Network?
I feel that Check Point SandBlast Network could be improved with slight delays in cleaning the file delivery. Additionally, I think it requires proper tuning to avoid unnecessary notifications.
What is your primary use case for Check Point SandBlast Network?
My main use case for Check Point SandBlast Network is advanced threat protection, especially for scanning emails, attachments, web downloads, and incoming files through a sandbox environment. A qui...
What is your experience regarding pricing and costs for Veritas Alto SaaS Protection?
Veritas Alta SaaS Protection is slightly expensive, but they can do more on it. The exact figure for Veritas Alta SaaS Protection depends on the size of data being stored, the region, and the type ...
What needs improvement with Veritas Alto SaaS Protection?
For Veritas Alta SaaS Protection, the only challenge is downtime and the impact of time synchronization whereby different customers are on different time zones, and Veritas Alta SaaS Protection is ...
What is your primary use case for Veritas Alto SaaS Protection?
For the customers that I'm dealing with, they are using Veritas Alta SaaS Protection for long-term retention and offline backups. This means they don't have to constrain their on-premise resources....
 

Also Known As

No data available
SaaS Backup
 

Overview

 

Sample Customers

Edenred, State Transport Leasing Company (STLC), Edel AG, Laurenty, Conseil Départemental du Val de Marne, Koch Media
Information Not Available
Find out what your peers are saying about Check Point SandBlast Network vs. Veritas Alta SaaS Protection and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.