We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Easy to use support and licensing portal as well as activation process."
"FortiGate firewalls are easy to manage through a user-friendly web interface. They also have advanced features like DDoS and DLP. However, I wouldn't recommend enabling all of these features on one device because it can cause performance issues."
"The solution is stable."
"The initial setup is straightforward."
"The most valuable features of Fortinet FortiGate are the ease of use and there are several operating systems that can include the hardware capacities. In the newer releases, the resources were more useful because they were included in the operating system."
"The solution is very user friendly. The user interface in particular is quite nice."
"Good performance, stability, and virtual domain ability."
"The technical support in our region is excellent."
"We have found the overall functionality of the product to be exactly similar to the physical product. The one good advantage is that it is cloud-based and can be deployed either as a part of a scale set or one can shut down the virtual machine and adjust the physical parameters of the virtual machine easily and bring it right back up."
"I find it really useful that CloudGuard supports all the main players on the Public Clouds market including AWS, GCP, and Azure, as well as some exotic ones like Alibaba Cloud, Oracle Cloud, and IBM Cloud."
"One of the main characteristics that Check Point CloudGuard Network Security has given us is granularity and visibility."
"This software is great in overall performance since it can locate any trouble across the networking system and provide solutions before it affects workflows."
"Any kind of cloud environment anywhere can be protected through this effortlessly."
"The versatility is the solution's most valuable feature."
"We find all the features valuable, particularly the firewall, application control, URL filtering, and HTTPS detection."
"Moving into the cloud without having to change a lot of our internal processes and retrain staff is one of the biggest benefits of this solution."
"I believe it's the advanced security software that offers SMPP protection for the agent."
"The most valuable feature is the solution is easy to configure for users."
"Web and content filtering are valuable in preventing people from abusing the network and pushing up the bandwidth price."
"The best feature is the flexibility the product offers, in terms of remote access. What we had before was a decentralized mechanism in our organization, but after having this product we were able to get the remote locations into the same LAN. We were able to control the bandwidth and were able to take virtual access of those machines and give them the support, as and when required."
"The solution's web filtering is an important feature for us in our company."
"The product, itself, doesn't seem to have any bugs or glitches."
"The solution is excellent for web and application filtering and remote access with the VPN."
"Having a firewall solution with a data quota is very important when the bandwidth is limited, which really distinguishes it from other products."
"The performance could be a bit better. Right now, I find it to be lacking. Having good performance is very important for our work."
"The setup is pretty complex and not easy to implement."
"Its reporting and pricing need improvement."
"The performance and speed are aspects of the solution that could always be improved upon."
"It can be a little bit more user-friendly in terms of policy definition and implementation. It seems a little bit complicated, and it could be simplified."
"One issue that I have had is that sometimes I need to monitor the traffic, so I need to filter it according to the user and which user is using it the most. I experience a bottleneck most of the time, particularly at the peak time when the number of contracts and users are at maximum."
"Some configuration elements cannot be easily altered once created."
"We sometimes have issues with FortiGate's routing table in the latest firmware update. We had to downgrade the device because our customers complained about bugs."
"Regarding CloudGuard Network Security's integration with various resources like application gateways and application-based security groups, there's room for exploring dynamic access in those areas. A significant concern is the upgrade process. Unlike an in-place upgrade, upgrading the tool in Azure requires deploying a new resource, which can be hectic and less reliable. We have to spend something new to have the tool's latest version."
"New features have been introduced recently, but they have not yet been integrated into CloudGuard Vsec."
"With the incorporation of a lot of AI and machine learning, they can build some sort of a matrix for low-level threats or low-level things that require attention. There can be automation of those tasks so that we don't have to take more time and effort. There should be machine learning to eliminate level-one types of tasks."
"At CPX, we heard that we can see all the things on the same platform. That is what we have been asking for, and hopefully, we are going to start seeing it this year."
"A threat categorization system can be added to give users the authority to define vulnerable attacks and classify areas that can threaten the workflow system."
"It is somewhat problematic in the area of the cloud."
"The challenge mainly revolves around the slower functionality of virtual IP switching in Azure Virtual Network compared to on-premise solutions. On-premise, switching between clusters is faster, taking only a few seconds, while in Azure, it can extend up to five minutes. The downtime is a concern for us."
"Check Point support, beyond CloudGuard, does need some improvement."
"The following could be improved: Web Filtering using wildcards; clarity regarding the firewall rules; granular reporting features."
"It should have a better VPN client. We decided to find something different than Cyberoam because of the VPN client software. It would be nice to have a user interface not only in English but also in different languages."
"There needs to be more documentation that users can access to help them understand the solution or troubleshoot as necessary."
"Smaller CR15 units don’t have a hard disc or built in IView software. These units could do with that feature."
"The VPN needs to be improved."
"The reports need to be more detailed and granular."
"Its scalability is not that great."
"The reporting part could be more user-friendly for troubleshooting and identifying network issues. It should be more easy for a normal user to identify the problem in their network."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.