We performed a comparison between Check Point UTM-1 [EOL] and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls."We use the filtering feature the most. It has filtering and inbuilt securities. We can create customized rules to define which users can access a particular type of site. We can create policies inside the firewall."
"The management console is pretty simple, so anyone who understands networking can initially deploy the solution."
"I like how we can achieve total integration."
"The solution can scale well."
"The pricing is excellent. It's much less expensive than Cisco."
"The web filtering facility and application control are the most valuable features from the point of view of our clients. The VPN feature is also quite popular amongst our clients. Two-factor authentication is one of the good features in Fortinet. These features are important for the current scenario of security. Security has become a necessity nowadays. With cyber-attacks becoming more common, protecting an organization's data is one of the major tasks. It is also very stable and scalable, and it is very straightforward to configure. Their technical support is also good."
"The web filtering feature and the intrusion protection system are the most valuable. It is a resilient appliance. I never had an issue with it in terms of any security breaches."
"The reporting and monitoring are very good."
"The filtering was very good."
"The solution is very robust."
"The databases and its signatures are its most important features."
"The most outstanding feature is being able to centralize each of the functions in a single device."
"We can create a domain to separate and segregate some functions, some services."
"The most valuable feature for us was to implement negligent functionality, to direct functionality to viewer control and application control so we could disconnect, and at the same time, we installed checkpoints. We disconnected our proxy."
"It safeguards against cyber attacks."
"The UTM platform has been the most valuable."
"Technical support is excellent."
"Its portal is user-friendly. I am able to manage the user data and access control through this device."
"The best feature is the flexibility the product offers, in terms of remote access. What we had before was a decentralized mechanism in our organization, but after having this product we were able to get the remote locations into the same LAN. We were able to control the bandwidth and were able to take virtual access of those machines and give them the support, as and when required."
"Cyberoam UTM's most valuable feature is that it can be configured any way you like."
"There are plenty of features available, such as Full Guard and WAN."
"The reporting features are very good."
"The solution works perfectly without any users."
"The most valuable feature of Sophos Cyberoam UTM is the SD-WAN gateway."
"I would like to see a more intuitive dashboard."
"Due to its higher cost, Fortinet FortiGate can lead to increased operational expenses."
"Some of the web policy reports could be improved."
"When we cluster the two Fortinet FortiGate boxes together we have some issues."
"The support team for Fortinet FortiGate needs to be more customer friendly."
"Cisco Meraki products are rising very quickly in the cloud and the connected era. Meraki products offer much better ROI, upgradability, and manageability."
"Some configuration elements cannot be easily altered once created."
"Compared to some other products, the DLP is not at par for the moment."
"Specifically on the user experience, sometimes the set up of things, such as the VPN SSL, takes a lot of time to load and a lot of time to get up and running on every session."
"Some features that could be improved are advanced threat protection, sandboxing, and vulnerability management."
"What has been the issue of firewalls is they ask me for policies and content filtering application control and all these features that are now part of Harmony."
"The solution should be more user-friendly."
"The interface needs improvement."
"Technical support was very bad because the supplier who sold it to us, wasn't very supportive, and he wouldn't giving us direct links to the OEM."
"The solution could be improved if there was a better way to report. The reporting functionality is not really good. Even though it's not the major function. Maybe adding a way to make a custom report."
"As we don't have a representative of Check Point in Mozambique, this makes it very difficult when we have some issues to resolve."
"It should have a better VPN client. We decided to find something different than Cyberoam because of the VPN client software. It would be nice to have a user interface not only in English but also in different languages."
"The VPN needs to be improved."
"The reporting should be improved as well as the backup."
"We have had some issues with technical support, which is an area that needs improvement."
"Sometimes, users are timed out intermittently."
"The data support response time should be improved."
"Its scalability is not that great."
"Cyberoam UTM needs to have more certifications with third-parties, such as NSS Labs."
Earn 20 points
Check Point UTM-1 [EOL] doesn't meet the minimum requirements to be ranked in Firewalls with 19 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point UTM-1 [EOL] is rated 8.2, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point UTM-1 [EOL] writes "Great firewalls, VPN, and Intrusion prevention capabilities". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point UTM-1 [EOL] is most compared with , whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Untangle NG Firewall.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.