We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The SD-WAN feature is the most valuable. This feature evolved from link load balancing. It has helped us in terms of our uptime and privatizing applications whenever we experience an outage. The SD-WAN feature has been a plus for us. Two-factor authentication has allowed us to add more users in terms of remote working. We have two-factor authentication for remote workers to authenticate them before they get on the network."
"I like several features that this product has, such as antivirus and internet navigation inspection. It is also simple to use."
"The web tutor and automatic rules by schedule are good features."
"The initial setup is straightforward."
"We have been able to offer several services to customers in a single box."
"The most valuable feature of FortiGate is FortiView which provides proactive monitoring."
"The pricing is great and very reasonable."
"Whenever we raise a complaint with FortiGate, their response and resolution times are minimal."
"We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks."
"The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM."
"The most valuable feature is the centralized dashboard, which is used for managing all of the Check Point Security Gateways."
"Check Point CloudGuard is quick to deploy and easy for the customer to use."
"Its blades and VSLS (Virtual System Load Sharing) work fine."
"The IPS, application and URL filtering, as well as Identity Awareness, are all very valuable features."
"The solution's most valuable feature is scalability. We can increase the number of CPUs, memory, and firewall throughput easily. Using CloudGuard Network Security for managing cloud firewall rules is considered easier than using the normal security groups provided by Azure or AWS."
"The 24/7 online customer support services enhance effective operations and provide quick services in case of a system failure."
"SD-WAN and IPSec features are valuable to me."
"Cyberoam UTM's most valuable feature is that it can be configured any way you like."
"The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations."
"In terms of features and user-friendliness, the solution is good. It’s very stable. The solution is scalable. In Sophos Cyberoam UTM, the most valuable features are web and application filtering, routing functionalities, and VPN. It has helped us manage the bandwidth."
"The dashboard is very good-looking and offers maximum features. If a customer's website has a problem, we can guide them over the phone because they can easily find the specific option on the dashboard. That's why we suggest buying Sophos."
"Having a firewall solution with a data quota is very important when the bandwidth is limited, which really distinguishes it from other products."
"Our customers find it economical and offers good security. These two features are key. Ease of installation and implementation are also key factors."
"Good user interface."
"If they could extend their fabric towards other vendor environments for integration, that would be great."
"The customization could be improved. Cisco, for example, is much better at this. They need to work to be at least as good as they are."
"They should improve the interface to make it more user-friendly."
"There are SD-WAN network monitoring, SD-WAN features, Industrial Databases, Internet of Things, Detection, etc., however, we do have not licenses for those features. We thought that if you bought a product, you should have all of the features it offers. Why should you need to make so many extra purchases to enable features? They should have one price for the entire offering."
"There are some cloud-based features that could be much more flexible than they currently are."
"Fortinet FortiGate can be integrated with different platforms. They have integrations in place, but I can't say they're 100%."
"I haven't had a single issue since using Fortinet."
"The monitor and the visibility, in this proxy, is very weak."
"In the next release, including VRF support would be highly beneficial."
"The cost is relatively high compared to the cost of other products in the market."
"The costs are high."
"This application can be more integrated with web application firewalls. Better integrations would provide more granularity, which would be helpful for focusing on the application itself and preventing attacks. It would be good to include the cross-domain search. If you have multiple firewalls that are managed on the same platform and you want to check who is using some particular objects or where a specific ID is being used, it should provide an option for this kind of search instead of having to check one by one on each firewall."
"The solution needs to support more hypervisors."
"Its price is fair, but it can be more favorable."
"We miss full blade support for all blades that are compatible with the cluster. Especially notable is the lack of support for Identity Awareness in active standby environments for customers. In our setup, transitioning to Connective clusters would be preferable for maintaining connections during failover situations."
"From the policy optimization point of view, they can do better. This is not just for CloudGuard. CloudGuard is one little piece managed by Check Point. They can also integrate a third-party policy management solution to improve that. For example, Tufin is focused on policy optimization and management."
"Sophos Cyberoam UTM has room for improvement in specific rules-based objects and redesign. The solution also needs to improve in adding rules and policies, including renewing and finding policies."
"The solution could be cheaper."
"The solution had a feature to import users from a CSV file. However, the latest version does not have that option."
"It isn't missing anything."
"The VPN needs to be improved."
"It is not a scalable product. This is because if you want to increase the capacity of the solution, then you have to change the device."
"The reporting should be improved as well as the backup."
"We have had some issues with technical support, which is an area that needs improvement."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.