We performed a comparison between Check Point UTM-1 [EOL] and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls."The most valuable feature is the SSL VPN, as it allows us to connect and it separates this product from other firewalls."
"It increases security posture and is helpful for firewall reporting, intrusion protection, web filtering, and SD-WAN implementation."
"I like Fortinet FortiGate's antispam filter, SPN, and clustering features."
"All of the features of Fortinet FortiGate are useful and the security protection is good."
"The application control features, such as Facebook blocking and Spotify blocking, are the most valuable."
"The features that prevent internet connections, the filtering are the most valuable because we did not have any internet protection before."
"Its performance in fulfilling our requirements has been satisfactory."
"We are a visual effects company, and there have been a number of high profile security issues in our industry. This has brought us to a higher standard of security, which our clients are very keen on these days."
"We can create a domain to separate and segregate some functions, some services."
"The databases and its signatures are its most important features."
"Firewalls help us a lot in controlling traffic on our network and preventing unauthorized access."
"The filtering was very good."
"The most outstanding feature is being able to centralize each of the functions in a single device."
"The most valuable feature for us was to implement negligent functionality, to direct functionality to viewer control and application control so we could disconnect, and at the same time, we installed checkpoints. We disconnected our proxy."
"The solution is very robust."
"It safeguards against cyber attacks."
"Having a firewall solution with a data quota is very important when the bandwidth is limited, which really distinguishes it from other products."
"Our customers find it economical and offers good security. These two features are key. Ease of installation and implementation are also key factors."
"Good user interface."
"I like the SSL VPN connection. Cyberoam works well for controlling users and authenticating their connection to the internet."
"Sophos Cyberoam UTM is used for perimeter security, web filtering, intrusion prevention and as a VPN."
"Web and content filtering are valuable in preventing people from abusing the network and pushing up the bandwidth price."
"The tool is stable."
"SD-WAN and IPSec features are valuable to me."
"The routing capability on the FortiGate devices has room for improvement."
"Improvement is needed in the Web Filter quotas to restrict users with allocated quotas."
"You do need some IT knowledge in order to effectively work with the solution."
"Vulnerability scanning could be improved."
"The support structure needs to be improved because every time we contact them, there is a delay in the response."
"There are mainly two areas of improvement in Fortinet FortiGate— the licensing cost and the timing of upgrading licenses for boxes."
"We sometimes have issues with FortiGate's routing table in the latest firmware update. We had to downgrade the device because our customers complained about bugs."
"Currently, FortiGate is providing SSL VPN. But they're missing some features that are available in Palo Alto's SSL VPN."
"While the technical support is good, the Indian level technical support could use an upgrade."
"What has been the issue of firewalls is they ask me for policies and content filtering application control and all these features that are now part of Harmony."
"Some features that could be improved are advanced threat protection, sandboxing, and vulnerability management."
"The interface needs improvement."
"Specifically on the user experience, sometimes the set up of things, such as the VPN SSL, takes a lot of time to load and a lot of time to get up and running on every session."
"The solution could be improved if there was a better way to report. The reporting functionality is not really good. Even though it's not the major function. Maybe adding a way to make a custom report."
"I am not able to see a demo."
"Technical support was very bad because the supplier who sold it to us, wasn't very supportive, and he wouldn't giving us direct links to the OEM."
"It should have better VPN protection. Some of the VPN applications are not blocked by this firewall. Some VPNs are able to get through this firewall, which is why I am planning to replace this firewall with a good one in the near future."
"The solution is at its end of life and some of the appliances are finishing."
"Sophos Cyberoam UTM could improve by adding VPN site-to-site capabilities. The correct version does not work with Microsoft Azure Cloud."
"Technical support could be faster."
"Network visibility is an area in the solution with shortcomings where improvements can be made."
"The solution had a feature to import users from a CSV file. However, the latest version does not have that option."
"Sometimes, users are timed out intermittently."
"The technical support response time could be faster."
Earn 20 points
Check Point UTM-1 [EOL] doesn't meet the minimum requirements to be ranked in Firewalls with 19 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point UTM-1 [EOL] is rated 8.2, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point UTM-1 [EOL] writes "Great firewalls, VPN, and Intrusion prevention capabilities". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point UTM-1 [EOL] is most compared with , whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.