We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Fortigate represents a really scalable way of delivering perimeter network security, some level of layer 7 security, WAF, and also a way to create a meshed ADVPN solution."
"Fortinet FortiGate appears to be scalable."
"The pricing is excellent. It's much less expensive than Cisco."
"Mainly the FortiGate reporting system is very good. It guides us through all the expectations of security. Fortinet provides us all that we need for security. Also, Fortinet FortiGate is a next-generation firewall. It is much more advanced than others."
"The dashboard I have found the most valuable in Fortinet FortiGate."
"It has very easy management and an amazing ETM configuration."
"The most valuable features of the solution are SD-WAN, filtering testing applications, web filtering, and the new VPN."
"FortiGate is very simple to manage and easy to use."
"The initial setup is pretty easy."
"The solution provides a centralized management console for easy administration and monitoring of security policies and events, making it easy for the security team."
"The ease of deployment has been nice. It is like managing any of our on-prem firewalls."
"It improves the availability of engineers to carry out projects."
"All the features that we subscribe to from CloudGuard NGTP are valuable. All the threat prevention and access control features give us the network security that we expect."
"The tool's most valuable feature is its scalability. You will only have to pay less for scaling up. Its notable benefit is deployment complexity. Regional deployment is simpler compared to on-premise setup."
"It offers remarkable flexibility in how we configure and utilize the resources."
"The tool's most valuable features are the REST APIs that help to automate the deployment and maintenance process. It helps us to reduce time to 15-25 minutes compared to the manual process which used to take around two to three hours."
"The dashboard is very good-looking and offers maximum features. If a customer's website has a problem, we can guide them over the phone because they can easily find the specific option on the dashboard. That's why we suggest buying Sophos."
"We consider the user level and control features of Sophos Cyberoam UTM to be the best."
"I find Sophos Cyberoam UTM very good. I like the feature of being able to block off Mac IDs that host users. For example, you have a Mac or Windows laptop and you created a hotspot. Other devices like mobiles and tablets e.g. iPads connected to that hotspot. We can block those devices that connected to the hotspot we created, only through Sophos. It's a good feature we didn't find in other UTMs."
"The most valuable feature of Sophos Cyberoam UTM is the SD-WAN gateway."
"The solution's interface is user-friendly, and the web protection is good. The tool is highly stable. The product is scalable. The technical support is good. We chose Sophos Cyberoam UTM because their focus on security research is higher compared to other brands. It's an all-in-one solution with antivirus, EDR, wireless protection, and web protection integrated into one box. The initial setup was straightforward."
"The product is easy to maintain."
"In some circumstances, the malware functionality is the most important feature, and in other cases, some other features."
"Having a firewall solution with a data quota is very important when the bandwidth is limited, which really distinguishes it from other products."
"If they had better integration with security products, such as Cisco ISE or Rapid Threat Containment, then it would be an improvement."
"The command line is complicated, and the interface could be better."
"A sandbox would be good in order to be able to inspect the emails containing spam and be able to validate the emails that contain malware, prior to delivering to the customer."
"In terms of what could be improved, the SD-WAN is quite difficult, because if you install the new box, 15 is okay, but if you change from an old configuration, if there is already configuration and a policy when you change to SD-WAN, you must change the whole policy that you see in the interface."
"The captive portal could be improved."
"It would be a benefit if Fortinet would release a one-stop solution that is better integrated with other products and an automated emergency response system."
"The solution is very expensive."
"The performance and speed are aspects of the solution that could always be improved upon."
"I would like to see a step-by-step initial installation of the firewall. That would be really helpful. Like in Oracle appliances, when you start it asks you, what's your current IP address? An initial setup should be a step by step and intuitive process. You click on "begin," it asks you some simple questions. You fill in the blanks - your current IP address, what you want to do, you want to set up a site to site VPN, for example, that kind of thing. That would be the smartest thing to have."
"The initial setup is difficult. It took me three tries to get it right. The setup took two or three hours."
"Check Point CloudGuard Network Security should give productive reports as per business requirements. It needs to improve support since the time-limit extended beyond a day. It should include more seamless API integrations."
"Regarding CloudGuard Network Security's integration with various resources like application gateways and application-based security groups, there's room for exploring dynamic access in those areas. A significant concern is the upgrade process. Unlike an in-place upgrade, upgrading the tool in Azure requires deploying a new resource, which can be hectic and less reliable. We have to spend something new to have the tool's latest version."
"While Check Point does offer some VWAN offerings, they appear to be more static and less tailored to cloud-native environments compared to Palo Alto's dynamic and flexible approach."
"Check Point has a history of moving fast with software release and upgrade cycles which are difficult to keep up with at times."
"It is somewhat problematic in the area of the cloud."
"It is a very expensive program and there are additional costs despite the standard licensing fees."
"The product’s pricing has increased by approximately 45% in four months. This particular area needs improvement."
"We have had some issues with technical support, which is an area that needs improvement."
"Hence, it needs to be easier to configure rules using the solution."
"Sophos Cyberoam UTM could improve by adding VPN site-to-site capabilities. The correct version does not work with Microsoft Azure Cloud."
"Network visibility is an area in the solution with shortcomings where improvements can be made."
"The VPN is an area that can be improved."
"The solution could be cheaper."
"SD-WAN should be included in the tool."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Akamai Guardicore Segmentation, Cisco Secure Firewall and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Cisco Secure Firewall, Netgate pfSense, Juniper SRX Series Firewall, Sophos UTM and SonicWall NSa. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.