We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We've found the solution to be pretty stable."
"We can use our devices to check all of the perimeters. It secures email websites."
"The initial setup is straightforward."
"It's a firewall that secures our internal network. I have been using it since 2013, and I find that most of the features are advanced, and very user friendly."
"I like how we can achieve total integration."
"We can detect any attack of viruses or malware at the first point of contact."
"User-friendly and affordable security solution that's recommended for SMB customers. This solution has good technical support."
"Its administrative panel is very intuitive and simple. It is simpler than the other solutions that we had. As an administrator, we are always looking for the easiest solution to manage network policies. We are able to filter everything on our network and also use the VPN feature, which is important these days when people are working remotely during COVID."
"The tool's deployment is rapid. Its dashboard is also useful. It's easy to deploy both on-premises and in Azure. In an office with VMware running, deployment is a simple process. Similarly, in Azure, deployment is easy and scalable. Adding more CPUs is a straightforward task – just shut it down, modify the security, and restart. This ease of use translates into cost and resource savings, and faster deployment times."
"The Identity Awareness blade and dynamic tagging in Azure are valuable because they make access management automatic. Instead of manually setting up access for each new resource, it happens automatically based on the same access policy. This dynamic setup is scalable."
"It is scalable. It's a cloud solution, so it's easy to implement and manage."
"The security configuration features have enhanced the reliable coordination of programs and data safety."
"This software is great in overall performance since it can locate any trouble across the networking system and provide solutions before it affects workflows."
"The solution has been quite stable."
"Check Point CloudGuard is quick to deploy and easy for the customer to use."
"The comprehensiveness of the CloudGuard’s threat prevention security is great, especially once they integrate Dome9 in the whole thing. That really ties the whole thing together, so you can tie your entire cloud environment together into one central location, which is nice. Previously, we had three or four different tools that we were trying to leverage to do the same stuff that we are able to do with CloudGuard."
"I'm more inclined towards the conventional firewall. So for me, I'm more geared towards the standard firewall type functionalities as well as the web application firewall because that seems to work fine."
"User and network policies to be managed on a single screen with powerful filtering and search options."
"There are plenty of features available, such as Full Guard and WAN."
"The most valuable feature is the solution is easy to configure for users."
"The initial setup was straightforward."
"The solution works perfectly without any users."
"The most valuable feature of Sophos Cyberoam UTM is the SD-WAN gateway."
"The VPN is excellent on the solution."
"The ease of use could be improved."
"The way everything is set up could be easier. Currently, people need a lot of experience and knowledge to administer it and to link it to devices."
"With the addition of some features, it is possible that FortiGate can be used in all verticals."
"It would be a benefit if Fortinet would release a one-stop solution that is better integrated with other products and an automated emergency response system."
"Fortinet should focus on enhancing the capabilities of FortiGate by consolidating its various products, such as FortiGate Cloud, FortiManager, and FortiAnalyzer."
"At first glance, the interface for the device is very confusing."
"The logging details need to be improved."
"The reports are very basic."
"Check Point has a history of moving fast with software release and upgrade cycles which are difficult to keep up with at times."
"The connection to the on-premises management requires using the CLI. It's not just a click, and you cannot edit in the management to prepare everything. You need to do it online and in real time. After that, you must execute a script, and then you should be happy that it appears in the management."
"The cost is relatively high compared to the cost of other products in the market."
"The convergence time between cluster members is still not perfect. It's far away from what we get in traditional appliances. If a company wants to move mission-critical applications for an environment to the cloud, it somehow has to accept that it could have downtime of up to 40 seconds, until cluster members switch virtual IP addresses between themselves and start accepting the traffic. That is a little bit too high in my opinion. It's not fully Check Point's fault, because it's a hybrid mechanism with AWS. The blame is 50/50."
"Check Point could show us use cases that would help us in Czech and could help us with security threats in our specific country."
"While Check Point does offer some VWAN offerings, they appear to be more static and less tailored to cloud-native environments compared to Palo Alto's dynamic and flexible approach."
"I want the upgrades of their CloudGuard solution to major versions to be easier. We have had a few small hiccups. They have different types of cloud clusters called Geo Clusters, and those just cannot be upgraded past a certain point, which is a hurdle that we are currently experiencing."
"Our biggest complaint concerns the high resource usage for IDP/IPS, as we cannot turn on all of the features even with new hardware."
"Sometimes, users are timed out intermittently."
"I would like to see improvements in the development of reports. The process needs to be made simple."
"The blocking needs to be improved."
"Sophos Cyberoam UTM could improve by adding VPN site-to-site capabilities. The correct version does not work with Microsoft Azure Cloud."
"Needs a mail alert/notification when the device loses any of its connections, during ISP redundancy implementation."
"The solution should improve its scalability because it cannot support enterprise networks."
"The following could be improved: Web Filtering using wildcards; clarity regarding the firewall rules; granular reporting features."
"What needs improvement in Sophos Cyberoam UTM is openness in the competition among Sophos partners or any other Sophos product. Another area for improvement in the solution is pricing. It could be cheaper."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.