We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most useful functionality of Fortinet FortiGate is the user interface, multiple engines, and their cloud with the latest integrations. Additionally, the Security Fabric tool is very good."
"The solution is scalable."
"Security, SD-WAN, and Streetscape are valuable features."
"Secure, user-friendly, stable, and scalable network security solution. Installation is straightforward."
"A strong point of FortiGate is that the graphical interface is complete and easy to use, especially if we think there is a list of operations that we are able to perform inside."
"Fortigate's most valuable feature is that it doesn't need a push policy when writing rules."
"Their reliability and their policy of pre-shipping replacements when a unit has failed."
"It is useful for protecting and segregating the internal networks from the internet. Most of our customers also use the FortiGate client to connect to their offices by using the VPN client, and of course, they usually activate the antivirus, deep inspection, and intrusion prevention services. They are also using it for web filtering and implementing various policies dealing with forwardings, NAT, etc."
"Monitoring using SmartConsole and all its features is extremely easy, and I find SmartEvent an excellent monitoring tool for spotting threats and user behaviour."
"The Capsule solution and application filters are the most valuable. It is pretty straightforward to implement, and it also has good stability and scalability. Their technical support is also really good."
"Auto Scaling is one of the features that make me want to choose CloudGuard over actual HW."
"The most valuable feature I have found in CloudGuard Network Security is the flexibility to rebuild the firewall as needed."
"The most valuable features are the ease of administration with the cloud management extension and the cloud licensing model."
"The visibility is most valuable. It allows us to see all of our devices from one place, and it gives us the ability to manage push updates and things like that from one place."
"The solution provides a centralized management console for easy administration and monitoring of security policies and events, making it easy for the security team."
"Identity awareness, URL filtering, IDS, DLP, Content Filtering, VPN, and Application Control are all excellent."
"User and network policies to be managed on a single screen with powerful filtering and search options."
"The product, itself, doesn't seem to have any bugs or glitches."
"Bandwidth Management and aggregation. It is valuable for combining two ISPs. Switching to a secondary/redundant ISP is thus seamless, in the event that the primary ISP goes down. The Bandwidth Management is also valuable for limiting heavy downloaders that may impact negatively on the experience of other users."
"The tool's robust features allow for the customization of policies, objects, and firewall settings."
"I'm more inclined towards the conventional firewall. So for me, I'm more geared towards the standard firewall type functionalities as well as the web application firewall because that seems to work fine."
"The most valuable feature of the solution stems from the fact that it is a very strong product with good support."
"In some circumstances, the malware functionality is the most important feature, and in other cases, some other features."
"The firewall feature has different branches, such as extended firewalls."
"Fortinet should focus on enhancing the capabilities of FortiGate by consolidating its various products, such as FortiGate Cloud, FortiManager, and FortiAnalyzer."
"The central management for the FortiGate Fortinet Firewall needs improvement. They have the manager to do the essential management for both SD-WAN and for the security policy. They should also improve the SD-WAN function."
"The initial setup and configuration are not intuitive and require training."
"The integration with third-party tools may be something that they should work on."
"It can be a little bit more user-friendly in terms of policy definition and implementation. It seems a little bit complicated, and it could be simplified."
"The customization could be improved. Cisco, for example, is much better at this. They need to work to be at least as good as they are."
"Monitoring and reporting could be better."
"Fortinet FortiGate could improve the user interface. There should be more functionality and options through the GUI."
"We utilize logging systems, and geolocation is crucial for us as some applications must only be accessible from our country. However, there have been occasional issues with this feature."
"I would like to see more focus on east-west traffic inspection and AWS."
"When upgrading the firewall, the old VPC containing the firewalls needs to be destroyed. After that, a new firewall is redeployed in the setup. Additionally, there's a need to separate the routing, and the routing from the old VPC has to be recreated in the new one."
"With the incorporation of a lot of AI and machine learning, they can build some sort of a matrix for low-level threats or low-level things that require attention. There can be automation of those tasks so that we don't have to take more time and effort. There should be machine learning to eliminate level-one types of tasks."
"I haven't used CloudGuard Network Security in the past couple of years as I moved out of the network security role. However, based on my previous experience, there were improvements, especially in in-place upgrades. Regarding cost, it might be potentially cheaper considering resource utilization in Azure and VM costs, but licensing could be improved, possibly moving towards a simpler model."
"The solution lacks the capability to scale effectively."
"Check Point could show us use cases that would help us in Czech and could help us with security threats in our specific country."
"The product needs to offer multi-tenancy."
"Hence, it needs to be easier to configure rules using the solution."
"While the security features are excellent, they could be improved."
"SD-WAN should be included in the tool."
"The product had a hang issue. We needed to reboot, recreate the image, and reconfigure the previous image because the product hanged frequently."
"Technical support could be faster."
"The product needs to improve its pricing."
"The product’s pricing has increased by approximately 45% in four months. This particular area needs improvement."
"There is a lot or room for improvement, because it is still not a fourth or fifth generation firewall. It lacks security features."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.