We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I like Fortinet's cloud management. It allows me to manage all my devices in different branches for three cloud accounts. Even though I use on-prem devices, I can manage everything on the cloud."
"The initial setup of Fortinet FortiGate was straightforward."
"Good performance, stability, and virtual domain ability."
"The solution is very user friendly. The user interface in particular is quite nice."
"Easy to implement, and it is also reliable."
"The IPsec tunnels are very easily created, and quite interoperable with devices from other vendors."
"We can use our devices to check all of the perimeters. It secures email websites."
"We use the FortiGate Sandbox to detect zero-day vulnerabilities, such as anomalies or malware, that are unknown and have not yet been discovered."
"Check Point CloudGuard is quick to deploy and easy for the customer to use."
"The solution is reliable."
"The most valuable feature for us is the scale set, which allows us to scale horizontally, vertically and dynamically depending on the traffic load."
"Additionally, the centralized reporting and management, accessible through a single pane of glass, offer consistency and efficiency across multi-cloud environments."
"This solution brings us closer to having a better security score, which helps us a lot in complying with information regulations based on security."
"We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks."
"The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM."
"This solution has good scalability and stability."
"The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations."
"The most valuable feature is the solution is easy to configure for users."
"We have never had to restart a firewall. The firewalls have all worked perfectly fine."
"The main features I have found best are the load balancer and ease of use."
"The solution's web filtering is an important feature for us in our company."
"The product is worth the investment."
"It has been working fine. You just turn it on, and it works."
"The solution works perfectly without any users."
"FortiGate support could do some improvements on their IPv6 configuration. Right now it's still in the very early stage for utilizing in an enterprise level network environment."
"The reports are very basic."
"One area for improvement is the performance on bandwidth demands for smaller devices, as well as better web filtering."
"Scalability for Fortinet FortiGate needs to be improved. SD-WAN security for this solution also needs some improvement."
"Application management can be improved."
"The platform's interface could improve."
"They have to just improve its performance when we enable all UTM features. When you enable all the features, the performance of FortiGate, as well as of Sophos and SonicWall, goes down."
"There are some tiny bugs that sometimes affect the operations. In the past revision of it, there was a bug. Because of the bug, we had to downgrade the version. It happened only with the last revision."
"The stability of the solution could be improved, but this is the problem of all the solutions in the market. This isn't just a problem specific to Check Point."
"When upgrading the firewall, the old VPC containing the firewalls needs to be destroyed. After that, a new firewall is redeployed in the setup. Additionally, there's a need to separate the routing, and the routing from the old VPC has to be recreated in the new one."
"The initial setup is complex and could be made simpler."
"The convergence time between cluster members is still not perfect. It's far away from what we get in traditional appliances. If a company wants to move mission-critical applications for an environment to the cloud, it somehow has to accept that it could have downtime of up to 40 seconds, until cluster members switch virtual IP addresses between themselves and start accepting the traffic. That is a little bit too high in my opinion. It's not fully Check Point's fault, because it's a hybrid mechanism with AWS. The blame is 50/50."
"We did not use the AWS Transit Gateway, and that's one of the things that we're currently using. I believe we will be working with Check Point again, in the near future, to implement it, once they start having proper support for a single customer with multiple accounts. When we were using them, we had to install Check Point on each and every single account."
"Regarding CloudGuard Network Security's integration with various resources like application gateways and application-based security groups, there's room for exploring dynamic access in those areas. A significant concern is the upgrade process. Unlike an in-place upgrade, upgrading the tool in Azure requires deploying a new resource, which can be hectic and less reliable. We have to spend something new to have the tool's latest version."
"While Check Point does offer some VWAN offerings, they appear to be more static and less tailored to cloud-native environments compared to Palo Alto's dynamic and flexible approach."
"There is room for improvement regarding the technical support provided."
"The policy is a bit too vague."
"The setup is a bit complex, so we needed help from a consultant."
"The implementation policy needs improvment."
"The VPN needs to be improved."
"When it comes to web filtering and application filtering, it does not contain enough signatures to determine all of the sites that need to be blocked."
"The reporting part could be more user-friendly for troubleshooting and identifying network issues. It should be more easy for a normal user to identify the problem in their network."
"The solution's pricing could be a problem for some small businesses."
"I don't know whether this will be included in an upgrade, but I would like to get the user utility, like seeing where the users are using more of the data."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 117 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Untangle NG Firewall. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.