We performed a comparison between Check Point UTM-1 [EOL] and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls."You can create multiple Virtual Domains (VDOMs), which are treated as separate firewall instances."
"Easy to implement, and it is also reliable."
"The technical support is great."
"The most valuable features are the policies, filtering, and configuration."
"The features that I have found most valuable are that it is good to use, and most importantly, the pricing. The customer especially likes the discount when they trade up or something like that."
"The features that we have found most valuable are the SSL VPN and the User Portal."
"The features that I have found most valuable are the SD-WAN and their IP4 policy."
"Some of the valuable features are the firewall, IPS, web filter, and gateway capabilities. Additionally, it is easy to use and flexible."
"We can create a domain to separate and segregate some functions, some services."
"The solution is very robust."
"The most outstanding feature is being able to centralize each of the functions in a single device."
"The filtering was very good."
"The UTM platform has been the most valuable."
"It safeguards against cyber attacks."
"The databases and its signatures are its most important features."
"Firewalls help us a lot in controlling traffic on our network and preventing unauthorized access."
"The interface is user-friendly."
"Having a firewall solution with a data quota is very important when the bandwidth is limited, which really distinguishes it from other products."
"Content filtering, as this enables me to control that which employees can view at different time quotas."
"The best feature is the flexibility the product offers, in terms of remote access. What we had before was a decentralized mechanism in our organization, but after having this product we were able to get the remote locations into the same LAN. We were able to control the bandwidth and were able to take virtual access of those machines and give them the support, as and when required."
"I find Sophos Cyberoam UTM very good. I like the feature of being able to block off Mac IDs that host users. For example, you have a Mac or Windows laptop and you created a hotspot. Other devices like mobiles and tablets e.g. iPads connected to that hotspot. We can block those devices that connected to the hotspot we created, only through Sophos. It's a good feature we didn't find in other UTMs."
"There are plenty of features available, such as Full Guard and WAN."
"There are plenty of features that are valuable in the Sophos Cyberoam UTM. We use all the features, such as email Security, firewall rules, web server security, web devices, web protection."
"The port forwarding is good."
"I would like to see improvements in the product's application rules."
"One area for improvement is the performance on the bandwidth demands for smaller devices, as well as better web filtering."
"Compared to some other products, the DLP is not at par for the moment."
"I would like to have logs, monitoring, and reporting for a month without extra fees."
"The support is the main thing that needs to be improved."
"It needs more available central management."
"I would like to see improvements in the support from Fortinet. Here in the Philippines, whenever we have problems with a Fortinet product, we mostly ask for support from distributors and resellers and not directly from Fortinet."
"The integration with third-party tools may be something that they should work on."
"The solution could be improved if there was a better way to report. The reporting functionality is not really good. Even though it's not the major function. Maybe adding a way to make a custom report."
"Technical support was very bad because the supplier who sold it to us, wasn't very supportive, and he wouldn't giving us direct links to the OEM."
"I am not able to see a demo."
"Some features that could be improved are advanced threat protection, sandboxing, and vulnerability management."
"What has been the issue of firewalls is they ask me for policies and content filtering application control and all these features that are now part of Harmony."
"Specifically on the user experience, sometimes the set up of things, such as the VPN SSL, takes a lot of time to load and a lot of time to get up and running on every session."
"The solution should be more user-friendly."
"The interface needs improvement."
"I would like to see a better content management pack and also the website searching should be better."
"It is not a scalable product. This is because if you want to increase the capacity of the solution, then you have to change the device."
"The data support response time should be improved."
"The documentation is not straightforward."
"The following could be improved: Web Filtering using wildcards; clarity regarding the firewall rules; granular reporting features."
"The implementation policy needs improvment."
"I don't know whether this will be included in an upgrade, but I would like to get the user utility, like seeing where the users are using more of the data."
"The VPN needs to be improved."
Earn 20 points
Check Point UTM-1 [EOL] doesn't meet the minimum requirements to be ranked in Firewalls with 19 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point UTM-1 [EOL] is rated 8.2, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point UTM-1 [EOL] writes "Great firewalls, VPN, and Intrusion prevention capabilities". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point UTM-1 [EOL] is most compared with , whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.