Check Point SandBlast


Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Work for Check Point SandBlast?

Learning about Check Point SandBlast?

We can help you find the solution that fits you best.

Check Point SandBlast Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
For Category
Showing 2 Check Point SandBlast reviews
LinkedIn Connections
Check Point SandBlast review by User in Hospital & Health Care
User in Hospital & Health Care
Validated Reviewer
Review Source

"Effective but very slow"

What do you like best?

Effective scanning of all downloads. I feel safe downloading things off my browser.

What do you dislike?

Half the time, it takes a very long time to download. Very frustrating when you need something and have to wait 3-5 minutes for it to scan and download.

What business problems are you solving with the product? What benefits have you realized?

No viruses have been downloaded since we’ve implemented CheckPoint.

Sign in to G2 to see what your connections have to say about Check Point SandBlast
Check Point SandBlast review by User in Information Technology and Services
User in Information Technology and Services
Validated Reviewer
Review Source

"Slow computer"

What do you like best?

It offers lots of security features, most importantly full disk encryption

What do you dislike?

It makes your computer so slow. Even worse it will destroy your battery when you boot up your machine

Recommendations to others considering the product

Users do not like checkpoint

What business problems are you solving with the product? What benefits have you realized?

Information security infrastructure

What Threat Intelligence solution do you use?

Thanks for letting us know!

There are not enough reviews of Check Point SandBlast for G2 to provide buying insight. Below are some alternatives with more reviews:

McAfee Threat Intelligence Exchange Logo
McAfee Threat Intelligence Exchange
McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.
F-Secure Logo
Going beyond malware protection, F-Secure provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.
Amazon GuardDuty Logo
Amazon GuardDuty
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
Cisco Talos Logo
Cisco Talos
Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.
Alert Logic Cybersecurity Logo
Alert Logic Cybersecurity
Alert Logic provides flexible security and compliance offerings to deliver optimal coverage across your environments.
Vectra AI Logo
Vectra AI
Vectra AI provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.
Flowmon Logo
Flowmon Networks provides a solution that helps companies to enhance performance of their networks and secure them against modern cyber threats.
SolarWinds MSP Threat Monitor Logo
SolarWinds MSP Threat Monitor
SolarWinds Threat Monitor empowers MSSPs of all sizes by reducing the complexity and cost of threat detection, response, and reporting. You get an all-in-one security operations center (SOC) that is unified, scalable, and affordable.
FortiSandbox Logo
FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.
SecureWorks Logo
SCWX is a cybersecurity company that works to provide an early warning system for evolving cyber threats, enabling to prevent, detect, rapidly respond to and predict cyberattacks.
Show more
Kate from G2

Learning about Check Point SandBlast?

I can help.
* We monitor all Check Point SandBlast reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.