We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's great for capturing the traffic and troubleshooting it."
"I only deal with it from a security analyst's point of view. I don't really get into the features of the actual FortiGate. From the security point of view, it works, and it does its job."
"The FortiGate controls the user's activities and maximizes my bandwidth use overall."
"It is useful for protecting and segregating the internal networks from the internet. Most of our customers also use the FortiGate client to connect to their offices by using the VPN client, and of course, they usually activate the antivirus, deep inspection, and intrusion prevention services. They are also using it for web filtering and implementing various policies dealing with forwardings, NAT, etc."
"The most valuable features of Fortinet FortiGate are the ease of use and there are several operating systems that can include the hardware capacities. In the newer releases, the resources were more useful because they were included in the operating system."
"Fortinet FortiGate appears to be scalable."
"The features that I have found most valuable are that it is good to use, and most importantly, the pricing. The customer especially likes the discount when they trade up or something like that."
"It has improved our organization with control data."
"The solution helps protect network security by offering threat prevention, addressing vulnerabilities, and utilizing blades."
"The most valuable feature is the centralized dashboard, which is used for managing all of the Check Point Security Gateways."
"Some retail customers find the scale-up and scale-down features valuable, particularly with scale sets. This is useful for handling increased loads on devices and utilizing firewalls, similar to on-premises setups with active standby configurations."
"Customers appreciate the CME plugin for automatically understanding assets within the cloud. This information appears in the manager, allowing users to tag the assets and adjust policies and rules accordingly."
"The tool's most valuable features are firewalls and IPS."
"Auto Scaling is one of the features that make me want to choose CloudGuard over actual HW."
"Check Point CloudGuard Network Security has a beautiful threat emulation different from the market."
"It matches what we have on-prem. We kept the same management and the same functionality that we were having on-prem. It has simplified things for us because there is no new dashboard to touch."
"It is very easy to use."
"We consider the user level and control features of Sophos Cyberoam UTM to be the best."
"The most valuable feature of this product is the threat protection."
"Its portal is user-friendly. I am able to manage the user data and access control through this device."
"Our customers find it economical and offers good security. These two features are key. Ease of installation and implementation are also key factors."
"I believe it's the advanced security software that offers SMPP protection for the agent."
"I like Sophos Cyberoam UTM as a security component or device for organizations. Performance-wise, it's a satisfactory solution, and it works okay. It also has good features."
"Bandwidth Management and aggregation. It is valuable for combining two ISPs. Switching to a secondary/redundant ISP is thus seamless, in the event that the primary ISP goes down. The Bandwidth Management is also valuable for limiting heavy downloaders that may impact negatively on the experience of other users."
"The user interface could be improved."
"We would like to see a better training platform implemented."
"The initial setup and configuration are not intuitive and require training."
"In the next release, I would like to see the interface simplified to be more user-friendly."
"Security is a continuous process. In every product, there is a requirement for improvement. Its pricing should also be improved according to Indian market requirements. They must also improve on the reporting part. Its reporting can be more precise. If we can get a real-time report in a specific format, it will be helpful for customers to know about the current status of their security."
"Cisco Meraki products are rising very quickly in the cloud and the connected era. Meraki products offer much better ROI, upgradability, and manageability."
"Performance and technical support are the main issues with this solution."
"It would be a benefit if Fortinet would release a one-stop solution that is better integrated with other products and an automated emergency response system."
"What I would like for future updates would be faster updates to apply, and perhaps a greater presence in the local language for the regions of Latin America."
"We have Microsoft CASB cloud app security and it's one of the least compatible firewalls. They really need to look at this, as both Check Point and Microsoft are major players. Why aren't they compatible? If we had Palo Alto then we wouldn't have this problem."
"Lacks the ability to integrate with other security solutions."
"Our biggest complaint concerns the high resource usage for IDP/IPS, as we cannot turn on all of the features even with new hardware."
"While Check Point does offer some VWAN offerings, they appear to be more static and less tailored to cloud-native environments compared to Palo Alto's dynamic and flexible approach."
"This application can be more integrated with web application firewalls. Better integrations would provide more granularity, which would be helpful for focusing on the application itself and preventing attacks. It would be good to include the cross-domain search. If you have multiple firewalls that are managed on the same platform and you want to check who is using some particular objects or where a specific ID is being used, it should provide an option for this kind of search instead of having to check one by one on each firewall."
"In the next release, including VRF support would be highly beneficial."
"Having a web UI in the VSX (or something similar) would be nice."
"Needs a mail alert/notification when the device loses any of its connections, during ISP redundancy implementation."
"The price is obviously a more sensitive area to focus on."
"On-box sandstorm should be available. As of now, it is from their cloud."
"We use different workarounds and find different solutions for it, depending on the client's needs. We shouldn't have to, we should just be able to use the product as it comes with Cyberoam, rather than having to revert to other products."
"The policy is a bit too vague."
"The product fails to provide proper reports, making it an area where improvements are required."
"Its scalability is not that great."
"Sophos Cyberoam UTM could have a more advanced reporting function."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 117 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Untangle NG Firewall. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.