Check Point CloudGuard Network Security vs Sophos Cyberoam UTM comparison

Cancel
You must select at least 2 products to compare!
Fortinet Logo
123,063 views|89,961 comparisons
90% willing to recommend
Check Point Software Technologies Logo
400 views|204 comparisons
96% willing to recommend
Sophos Logo
337 views|277 comparisons
84% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.

Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The flexibility and ease of configuration are the most valuable features.""We use a lot of function on the IPS and it works well for us.""Fortinet offers the latest versions to cater to the needs of enterprises.""Layer-3 firewall and routing are the most valuable features.""The most valuable features are SD-WAN, application control, IPS control, and FortiSandbox.""The feature I like most is the SD-WAN. It allows you to manage more than one ISP at the same time. And there is a high-availability mode, so if one of your ISPs is down, you still have a backup.""The most valuable feature is the FortiManager for centralized management.""Fortinet FortiGate protects against internet-based threats, both internal and external. It is scalable, stable, easy to use, and easy to install."

More Fortinet FortiGate Pros →

"Check Point CloudGuard is quick to deploy and easy for the customer to use.""Workflows across the company ecosystem have can flow smoothly without experiencing any challenges.""When browsing, it scans sites to ensure that they are safe and that no harm can be caused.""As per the solution's blade design, there are many options. For example, you have to buy a UTM blade and an advanced malware blade, etc. If the blade license is there, we can configure from the firewall GUI.""The most valuable feature of Check Point CloudGuard Network Security is the increased mail protection including spam.""The tool's most valuable features are IPS and blades. These features are valuable for security.""SSL/TLS traffic inspection features are used for advanced threat prevention against secure SSL traffic.""It makes securing our cloud workload super easy, and we are able to push any sort of policy changes we need pretty quickly"

More Check Point CloudGuard Network Security Pros →

"You can geofence yourself if there is an incoming attack or a continuous ping from a company outside your country.""User and network policies to be managed on a single screen with powerful filtering and search options.""The VPN is excellent on the solution.""Technical support is excellent.""I believe it's the advanced security software that offers SMPP protection for the agent.""The best feature is the flexibility the product offers, in terms of remote access. What we had before was a decentralized mechanism in our organization, but after having this product we were able to get the remote locations into the same LAN. We were able to control the bandwidth and were able to take virtual access of those machines and give them the support, as and when required.""It is a VPN that serves all your needs as an application firewall.""In terms of features and user-friendliness, the solution is good. It’s very stable. The solution is scalable. In Sophos Cyberoam UTM, the most valuable features are web and application filtering, routing functionalities, and VPN. It has helped us manage the bandwidth."

More Sophos Cyberoam UTM Pros →

Cons
"Fortinet needs to overhaul its documentation.""They need to improve their technical support.""Lacks sufficient security options.""Sometimes you do need to know some CLI commands, so it's a bit harder for technicians or new people that don't know it.""They should improve the interface to make it more user-friendly.""Fortinet FortiGate could improve by adding enhancements to FortiMail, FortiSOAR, and FortiDeceptor.""Fortinet FortiGate can be integrated with different platforms. They have integrations in place, but I can't say they're 100%.""I would like Fortinet to add more automation to FortiGate."

More Fortinet FortiGate Cons →

"In the past year, I noticed that the challenging part, especially in the cloud, is upgrading to the next release of the firewall. Unlike on-premise upgrades, it's not as simple in the cloud. You need to recreate the machine, which makes the process more complex.""We utilize logging systems, and geolocation is crucial for us as some applications must only be accessible from our country. However, there have been occasional issues with this feature.""Its architecture and user interface need improvement. The user experience for this solution also needs to be improved, particularly in implementation, management, and operations.""A threat categorization system can be added to give users the authority to define vulnerable attacks and classify areas that can threaten the workflow system.""The initial setup is difficult. It took me three tries to get it right. The setup took two or three hours.""The migration to TerraForm is a little more complicated, but we made it work.""The solution's integration with cloud providers has seen significant development in the past months, but there is room for improvement for better integration.""We have the product deployed on Azure China. One crucial concern is the version limitation; unfortunately, in Azure China, we are restricted to running version R80. Our architecture has a Load Balancer, VMSS CloudGuard, etc. The duplication in this setup prevents the application from seeing the original client IP. This poses a problem for certain applications that require the original IP for login purposes. Although we managed a workaround with a different architecture involving a WAF, it is not as straightforward as the standard Azure setup."

More Check Point CloudGuard Network Security Cons →

"Cyberoam UTM needs to have more certifications with third-parties, such as NSS Labs.""The solution is at its end of life and some of the appliances are finishing.""I would say there's room for improvement in terms of the GUI. Because it is better than some of the other standard firewalls. They have the drag and drop features.""Technical support could be faster.""Once in a while, an unwanted email will slip in. You have to set your parameters to avoid that happening, but once in a while, an email has slipped past firewall. Once you update the firmware, you notice that it doesn't happen. If an email slips in, I get a little bit worried. I do get the report, but you just don't want that situation happening in the first place.""On-box sandstorm should be available. As of now, it is from their cloud.""Cyberoam configuration is done through the browser, which is one of the places that viruses spread.""What needs improvement in Sophos Cyberoam UTM is openness in the competition among Sophos partners or any other Sophos product. Another area for improvement in the solution is pricing. It could be cheaper."

More Sophos Cyberoam UTM Cons →

Pricing and Cost Advice
  • "Fortinet has one or two license types, and the VPN numbers are only limited by the hardware chassis make."
  • "These boxes are not that expensive compared to what they can do, their functionality, and the reporting you receive. Fortinet licensing is straightforward and less confusing compared to Cisco."
  • "Go for long term pricing negotiated at the time of purchase."
  • "Work through partners for the best pricing."
  • "The value is the capability of having multiple services with one unique license, not having the limitation per user licensing schema, like other vendors."
  • "Easy to understand licensing requirements."
  • "​We saved a bundle by not needing all the past appliances from an NGFW.​"
  • "The cost is too high... They have to focus on more features with less cost for the customer. If you see the market, where it's going, there are a lot of players offering more features for less cost."
  • More Fortinet FortiGate Pricing and Cost Advice →

  • "On average, it is normally on the lower end, being less expensive than Palo Alto or Cisco."
  • "It is more expensive than other solutions and would be more competetive in the market if it came down in price."
  • "We pay approximately ‎€150,000 ($166,000 USD) per year."
  • "Licensing is simply by the number of hosts that you are looking to protect within your environment. It makes it much easier to ensure that you are covering your environment."
  • "There is flexibility in the different licensing models that are offered."
  • "The pricing is pretty high, not just for your capital, for what you have to pay upfront, but for what you pay for your annual software renewals as well, compared to a lot of other vendors. Check Point is near the top, as far as how much it's going to cost you."
  • "Pricing of CloudGuard is pretty fair when you have a single account. It's comparable with other cloud providers. But for our use case, it got really pricey when we had to deploy multiple CloudGuards on multiple accounts in different regions, because you can't have CloudGuard protecting multiple regions. That's the big thing."
  • "The pricing and licensing have been good. We just had to do a license increase for our portion of it. We had that done within a couple of days. Given the fact that it's purely a software-based license, it ends up being even quicker than doing it for an on-prem firewall."
  • More Check Point CloudGuard Network Security Pricing and Cost Advice →

  • "It is very reasonably priced as compared to other solutions in the market."
  • "Licensing is a bit costly, mostly for features requiring subscription."
  • "Licensing is very good value for the money."
  • "It is more expensive than cheap routers, but it offers a lot of functionality, and that warrants the price."
  • "The price is very competitive and the licensing is easy."
  • "It’s value for the money. It’s functionally competitive with higher priced alternative brands."
  • "It is worth the value."
  • "Prices are very high."
  • More Sophos Cyberoam UTM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Unified Threat Management (UTM) solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: When you compare these firewalls you can identify them with different features, advantages, practices and usage at… more »
    Top Answer:From my experience regarding both the Sophos and FortiGate firewalls, I personally would rather use FortiGate. I know… more »
    Top Answer:As a solution, Sophos UTM offers a lot of functionality, it scales well, and the stability and performance are quite… more »
    Top Answer:The ease of administration with the cloud management extension and the cloud licensing model is valuable.
    Top Answer:We are using our BYOL. We are using our existing Check Point discounts to work with licensing. Overall, it is very… more »
    Top Answer:I have not dealt with it enough to find any pitfalls.
    Top Answer:The solution works perfectly without any users.
    Top Answer:There are some issues with logs and report limitations.
    Comparisons
    Also Known As
    FortiGate 60b, FortiGate 60c, FortiGate 80c, FortiGate 50b, FortiGate 200b, FortiGate 110c, FortiGate
    CloudGuard IaaS, Check Point vSEC, CloudGuard IaaS, Check Point Virtual Systems, Check Point CloudGuard Network Security
    Learn More
    Overview

    Fortinet FortiGate enhances network security, prevents unauthorized access, and offers robust firewall protection. Valued features include advanced threat protection, reliable performance, and a user-friendly interface. It improves efficiency, streamlines processes, and boosts collaboration, providing valuable insights for informed decision-making and growth.

    CloudGuard Network Security is a firewall solution that provides network security for cloud environments. It protects against cyber threats with multi-layered security for public, private, and hybrid clouds. 

    CloudGuard Network Security offers advanced threat prevention, firewall, VPN, and application security services, designed to secure cloud infrastructure, virtual networks, and cloud-based applications and workloads.

    CloudGuard Network Security Features

    CloudGuard Network Security has many valuable key features. Some of the most useful ones include:

    • Advanced threat prevention: The solution Includes anti-virus, anti-bot, and intrusion prevention to defend against known and unknown threats.
    • Firewall: It has a stateful inspection firewall and network address translation (NAT) to secure traffic flow between cloud resources and the internet.
    • VPN: CloudGuard Network Security offers secure and encrypted connectivity for remote users and between cloud resources.
    • Application security: It includes a web application firewall (WAF) and SSL inspection to secure web applications and protect against cyber attacks.
    • Cloud-native architecture: The solution is designed specifically for cloud environments and integrates with cloud-native services like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
    • Compliance and governance: It helps organizations comply with regulations such as PCI DSS, HIPAA, and GDPR by providing detailed reporting and auditing capabilities.
    • Multi-layered security: CloudGuard Network Security provides a comprehensive security solution with multiple layers of defense for maximum protection.

    CloudGuard Network Security Benefits

    There are many benefits to implementing CloudGuard Network Security. Some of the biggest advantages the solution offers include:

    • Scalability and flexibility: The solution supports dynamic scaling and flexible deployment options to meet the changing needs of cloud environments.
    • Automated deployment and management: CloudGuard Network Security enables fast and efficient deployment and management of security services through a centralized, cloud-based management console.
    • Future-proof: Designed for the cloud and integrated with cloud-native services, CloudGuard Network Security helps organizations prepare for future cloud requirements and advancements.

    Reviews from Real Users

    CloudGuard Network Security is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has good cloud security, is cost-effective, has no false positives, improves productivity, and much more.

    Bernard O., Technical Engineer at Harnssen Group Limited, says, "Check Point is one of the few solutions that pay attention to cloud security. Many others mostly focus on providing on-premises solutions."

    Another PeerSpot reviewer, Shrinkhala S., Senior Manager at Agriculture Skill Council of India appreciates the solution for many reasons: “There are no security lapses and 100% restriction of threat entrants in the system or server. It's a cost-effective solution with no false positive cases. The product helps in bringing productivity and enhanced customer experience for users.

    We have a happy workforce and more workforce retention and increased IT environment sustainability. There is 100% proactive detection of root causes and root sources. It is dynamic and agile, and its features and utilities continuously improve and evolve. It's the best-unified endpoint management solution for IT systems globally. The product is available for all kinds of business users.”

    "One of the main characteristics that CloudGuard Network Security has given us isgranularity and visibility,” explains Adriamcam, Consultant at ITQS.

    Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective.
    Sample Customers
    1. Amazon Web Services 2. Microsoft 3. IBM 4. Cisco 5. Dell 6. HP 7. Oracle 8. Verizon 9. AT&T 10. T-Mobile 11. Sprint 12. Vodafone 13. Orange 14. BT Group 15. Telstra 16. Deutsche Telekom 17. Comcast 18. Time Warner Cable 19. CenturyLink 20. NTT Communications 21. Tata Communications 22. SoftBank 23. China Mobile 24. Singtel 25. Telus 26. Rogers Communications 27. Bell Canada 28. Telkom Indonesia 29. Telkom South Africa 30. Telmex 31. Telia Company 32. Telkom Kenya
    Physicians Choice Laboratory Services, Helvetica Insurance
    Gulf Corporation for Technology, Maridive & Oil Services, Fidelity Bank, Petra University, Capital FM Kenya, Safari Park Hotel and Casino, Mayfair Casino, Pacific International Lines, Mozambique Ministry of Education, University of Namibia, Royal Hospital for Neuro-disability, University of Hawai, New Delhi Municipal Council
    Top Industries
    REVIEWERS
    Comms Service Provider16%
    Computer Software Company9%
    Financial Services Firm8%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Educational Organization20%
    Computer Software Company15%
    Comms Service Provider8%
    Manufacturing Company6%
    REVIEWERS
    Computer Software Company15%
    Manufacturing Company13%
    Financial Services Firm12%
    Security Firm10%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Financial Services Firm13%
    Manufacturing Company7%
    Comms Service Provider7%
    REVIEWERS
    Manufacturing Company12%
    Non Profit10%
    Government8%
    Financial Services Firm8%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Financial Services Firm12%
    Comms Service Provider11%
    Media Company9%
    Company Size
    REVIEWERS
    Small Business48%
    Midsize Enterprise23%
    Large Enterprise30%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise32%
    Large Enterprise41%
    REVIEWERS
    Small Business35%
    Midsize Enterprise20%
    Large Enterprise44%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise15%
    Large Enterprise59%
    REVIEWERS
    Small Business50%
    Midsize Enterprise31%
    Large Enterprise19%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise16%
    Large Enterprise47%
    Buyer's Guide
    Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM
    March 2024
    Find out what your peers are saying about Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM and other solutions. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.

    See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.

    We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.