We performed a comparison between Check Point UTM-1 [EOL] and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls."The feature I like most is the SD-WAN. It allows you to manage more than one ISP at the same time. And there is a high-availability mode, so if one of your ISPs is down, you still have a backup."
"The next-gen features, the unified threat management capabilities are something that just about everybody is interested in at this point."
"Overall, the pricing of the solution is very good. The product offers good value."
"It increases security posture and is helpful for firewall reporting, intrusion protection, web filtering, and SD-WAN implementation."
"This is an easy solution to deploy."
"User-friendly and affordable security solution that's recommended for SMB customers. This solution has good technical support."
"The web filtering facility and application control are the most valuable features from the point of view of our clients. The VPN feature is also quite popular amongst our clients. Two-factor authentication is one of the good features in Fortinet. These features are important for the current scenario of security. Security has become a necessity nowadays. With cyber-attacks becoming more common, protecting an organization's data is one of the major tasks. It is also very stable and scalable, and it is very straightforward to configure. Their technical support is also good."
"It's user-friendly and easy to operate."
"The most outstanding feature is being able to centralize each of the functions in a single device."
"The solution is very robust."
"The UTM platform has been the most valuable."
"The databases and its signatures are its most important features."
"The most valuable feature for us was to implement negligent functionality, to direct functionality to viewer control and application control so we could disconnect, and at the same time, we installed checkpoints. We disconnected our proxy."
"It safeguards against cyber attacks."
"We can create a domain to separate and segregate some functions, some services."
"The filtering was very good."
"The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations."
"We are using it as a security shield. It does not allow access before that in case we have restricted a few things from users, so it helps me in that."
"Content filtering, as this enables me to control that which employees can view at different time quotas."
"Sophos Cyberoam UTM is used for perimeter security, web filtering, intrusion prevention and as a VPN."
"The most valuable feature of the solution stems from the fact that it is a very strong product with good support."
"The interface is user-friendly."
"User and network policies to be managed on a single screen with powerful filtering and search options."
"The most valuable feature of Sophos Cyberoam UTM is the SD-WAN gateway."
"I could not configure sFlow from the FortiGate graphical user interface. I realized that the sFlow configuration is available only from the CLI, and discovered that sFlow is not supported on virtual interfaces, such as VDOM links, IPsec, or GRE."
"Fortinet FortiGate could improve if it had a cloud-managed solution."
"The support from Fortinet FortiGate could improve. They are not easily accessible when we need them. They could improve their response time."
"FortiGate should have a better way of detecting and managing the system memory because otherwise if the memory is too low, a system restart is required."
"The feature which gives us a lot of pain is ASIC architecture."
"The sniffing packets or packet captures, can be simplified and improved because it's a little confusing."
"I would like to see more advanced developments of a wireless controller in the future."
"The scalability could be better."
"The solution should be more user-friendly."
"The interface needs improvement."
"As we don't have a representative of Check Point in Mozambique, this makes it very difficult when we have some issues to resolve."
"Some features that could be improved are advanced threat protection, sandboxing, and vulnerability management."
"Specifically on the user experience, sometimes the set up of things, such as the VPN SSL, takes a lot of time to load and a lot of time to get up and running on every session."
"While the technical support is good, the Indian level technical support could use an upgrade."
"What has been the issue of firewalls is they ask me for policies and content filtering application control and all these features that are now part of Harmony."
"I am not able to see a demo."
"Its scalability is not that great."
"The reporting should be improved as well as the backup."
"I had an issue when I was trying to stop a user from using too much bandwidth while I was using Azure, I was not able to stop them."
"The Traffic Discovery feature should allow administrators to disconnect unnecessary live connections."
"The implementation policy needs improvment."
"The price is obviously a more sensitive area to focus on."
"The blocking needs to be improved."
"SD-WAN should be included in the tool."
Earn 20 points
Check Point UTM-1 [EOL] doesn't meet the minimum requirements to be ranked in Firewalls with 19 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point UTM-1 [EOL] is rated 8.2, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point UTM-1 [EOL] writes "Great firewalls, VPN, and Intrusion prevention capabilities". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point UTM-1 [EOL] is most compared with , whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.