We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of this solution is Quota."
"The most important feature, normally for small business customers, is link load balancing."
"I like how we can achieve total integration."
"The most valuable feature is the SSL VPN, as it allows us to connect and it separates this product from other firewalls."
"The CLI and GUI do a good job of putting a lot at your fingertips."
"We use the FortiGate Sandbox to detect zero-day vulnerabilities, such as anomalies or malware, that are unknown and have not yet been discovered."
"The most valuable feature is the interface, which is very user friendly. We are utilizing most of the features, like content filtering. The firewall is powerful."
"The UTM feature is quite good. FortiAP is easy to deploy because both Fortigate and FortiAP are under the same brand. Otherwise, you need to do more work on the configuration."
"The SSL spectrum proved to be the most valuable for our incoming connections."
"The features of the solution which I have found most valuable are its flexibility and agility. It's a fully scalable solution, from our perspective. We can define scaling groups and, based on the load, it will create new instances. It's truly a product which is oriented toward the cloud mindset, cloud agility, and this is a great feature."
"Auto Scaling is one of the features that make me want to choose CloudGuard over actual HW."
"Check Point CloudGuard Network Security has a beautiful threat emulation different from the market."
"The endpoint VPN is super stable. The routing is also very good. We tried a competing product first, but we could not make it work. We came across CloudGuard. The network routing across different virtual networks in Azure and AWS was way ahead of any of the other technologies. That helped us be able to cover the whole network using one single cluster."
"The most valuable feature for me is that you have just one license. You can test and implement everything you need with one license. You do not need to pay for separate module licenses when you want IPS or other features."
"Advanced check prevention is a great feature that provides threat intelligence at speed."
"The security configuration features have enhanced the reliable coordination of programs and data safety."
"There are plenty of features that are valuable in the Sophos Cyberoam UTM. We use all the features, such as email Security, firewall rules, web server security, web devices, web protection."
"User and network policies to be managed on a single screen with powerful filtering and search options."
"The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations."
"I like the SSL VPN connection. Cyberoam works well for controlling users and authenticating their connection to the internet."
"The tool's robust features allow for the customization of policies, objects, and firewall settings."
"The solution's interface is user-friendly, and the web protection is good. The tool is highly stable. The product is scalable. The technical support is good. We chose Sophos Cyberoam UTM because their focus on security research is higher compared to other brands. It's an all-in-one solution with antivirus, EDR, wireless protection, and web protection integrated into one box. The initial setup was straightforward."
"For a small-medium enterprise this solution is easy to manage and operate."
"The reporting features are very good."
"It does not have key authentication for admin access."
"If I had any criticism that I would give FortiGate, it would be that they need to stop changing their logging format. Every time we do a firmware upgrade, it is a massive issue on the SIM. Parsers have to be rebuilt. Even the FortiGate guys came in and said that they don't play well in the sandbox."
"There are a lot of bugs I have found in the solution and it is difficult to upgrade. These areas need improvement."
"Web security solutions can be improved."
"There are SD-WAN network monitoring, SD-WAN features, Industrial Databases, Internet of Things, Detection, etc., however, we do have not licenses for those features. We thought that if you bought a product, you should have all of the features it offers. Why should you need to make so many extra purchases to enable features? They should have one price for the entire offering."
"The firmware needs improvement because there are bugs when a new release comes through. Sometimes, the configuration changes, and it's a bit harder to see where the fail is. The first time that you have the firmware, it tends to have some issues, and it's better to wait a bit to update the equipment."
"The web-cache feature which was previously on the FortiGate device, but was deleted with the recent upgrade should be returned. It was a very valuable feature for us."
"Fortinet FortiGate could improve by having more storage in the hardware for log data."
"There is room for improvement in the integration with PaaS services from the public cloud. It would be very helpful."
"The solution needs to support more hypervisors."
"I think they have pretty much mastered what can be done. There are some nuances like when you fail over from one cluster member to the other, the external IP address takes about two minutes to fail over."
"CloudGuard Network Security needs to include new features. One specific feature I would like to see is the ability to protect external resources using single sign-on integration with various identity providers, including custom identity providers. Its pricing could also be cheaper."
"With the incorporation of a lot of AI and machine learning, they can build some sort of a matrix for low-level threats or low-level things that require attention. There can be automation of those tasks so that we don't have to take more time and effort. There should be machine learning to eliminate level-one types of tasks."
"Check Point could show us use cases that would help us in Czech and could help us with security threats in our specific country."
"CheckPoint CloudGuard could be better at solving cases."
"The user interface can be improved."
"The solution should improve its scalability because it cannot support enterprise networks."
"The setup is a bit complex, so we needed help from a consultant."
"The data support response time should be improved."
"The configuration requires an expert to be set up, so it could be made simpler."
"The price is obviously a more sensitive area to focus on."
"The technical support response time could be faster."
"SD-WAN should be included in the tool."
"The reporting part could be more user-friendly for troubleshooting and identifying network issues. It should be more easy for a normal user to identify the problem in their network."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.