We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's very easy to set up, it's very easy to make policies and, for an organization, that means you don't need IT expert in firewalls. You just need to have somebody who knows a little bit of IT, and that's it. With other products, you need someone with a "Masters" degree in firewalls."
"It is a one box solution, which covers most of the edge device’s requirements."
"Whenever I need something, Fortinet improves and updates the software for me."
"The base firewall features are quite valuable to us."
"Security management tool that's easy to integrate and easy to work with. No issues found with its stability and scalability."
"The most valuable feature of this solution is the analytics."
"The SD-WAN function is very developed. It has SD-WAN functionality with security features in one device. We can manage from one single console SD-WAN and the security policy."
"The CLI and GUI do a good job of putting a lot at your fingertips."
"Any kind of cloud environment anywhere can be protected through this effortlessly."
"The tool's deployment is rapid. Its dashboard is also useful. It's easy to deploy both on-premises and in Azure. In an office with VMware running, deployment is a simple process. Similarly, in Azure, deployment is easy and scalable. Adding more CPUs is a straightforward task – just shut it down, modify the security, and restart. This ease of use translates into cost and resource savings, and faster deployment times."
"I like the tool's ability to manage cloud traffic locally without routing it through our data centers."
"A unique architecture makes this product stand out from other solutions."
"Its blades and VSLS (Virtual System Load Sharing) work fine."
"The tool's most valuable features are the REST APIs that help to automate the deployment and maintenance process. It helps us to reduce time to 15-25 minutes compared to the manual process which used to take around two to three hours."
"SSL/TLS traffic inspection features are used for advanced threat prevention against secure SSL traffic."
"We primarily secure our network using CloudGuard Network Security's next-generation firewall features, including anti-spam, IPS, and URL filtering. Our chosen package for the go-to-market strategy is NGTP. For customers seeking more features, we provide options to upgrade to the tool's advanced packages."
"Web Filtering and Application Filtering saves a lot of my bandwidth and improves the user's productivity."
"The most valuable feature is the IPSec forwarding."
"The solution has good load balancers."
"It has been working fine. You just turn it on, and it works."
"Cyberoam UTM's most valuable feature is that it can be configured any way you like."
"I find Sophos Cyberoam UTM very good. I like the feature of being able to block off Mac IDs that host users. For example, you have a Mac or Windows laptop and you created a hotspot. Other devices like mobiles and tablets e.g. iPads connected to that hotspot. We can block those devices that connected to the hotspot we created, only through Sophos. It's a good feature we didn't find in other UTMs."
"The most valuable feature of Sophos Cyberoam UTM is the SD-WAN gateway."
"The solution's interface is user-friendly, and the web protection is good. The tool is highly stable. The product is scalable. The technical support is good. We chose Sophos Cyberoam UTM because their focus on security research is higher compared to other brands. It's an all-in-one solution with antivirus, EDR, wireless protection, and web protection integrated into one box. The initial setup was straightforward."
"FortiGate support could do some improvements on their IPv6 configuration. Right now it's still in the very early stage for utilizing in an enterprise level network environment."
"Currently, FortiGate is providing SSL VPN. But they're missing some features that are available in Palo Alto's SSL VPN."
"Fortinet Fortigate could benefit by simplifying some of their processes."
"There are some problems that support cannot give you a logical reason as to why it happened. For example, I had a case where I was dealing with a WhatsApp application that was giving issues. Technical support gave more than one reason it could be giving issues, but none of them solved the problem. Eventually I solved the problem, but it was far from the solutions that support had given."
"The command line is complicated, and the interface could be better."
"They've become quite expensive."
"It would be nice if backups could more easily migrate between different models."
"I would like to see more advanced developments of a wireless controller in the future."
"The complexity to deploy should be decreased."
"Check Point CloudGuard Network Security should give productive reports as per business requirements. It needs to improve support since the time-limit extended beyond a day. It should include more seamless API integrations."
"The memory and hard disk capability could be strengthened."
"We miss full blade support for all blades that are compatible with the cluster. Especially notable is the lack of support for Identity Awareness in active standby environments for customers. In our setup, transitioning to Connective clusters would be preferable for maintaining connections during failover situations."
"Its price is fair, but it can be more favorable."
"New features have been introduced recently, but they have not yet been integrated into CloudGuard Vsec."
"CloudGuard Network Security needs to include new features. One specific feature I would like to see is the ability to protect external resources using single sign-on integration with various identity providers, including custom identity providers. Its pricing could also be cheaper."
"People don't know about the tool's features. There's a lack of skill. Users require more knowledge on how to integrate it into the cloud environment and orchestrate routing. So, it's not necessarily a CloudGuard Network Security or Check Point issue but more about integration, knowledge, and understanding."
"There is a lot or room for improvement, because it is still not a fourth or fifth generation firewall. It lacks security features."
"The solution could be cheaper."
"Sometimes, during part of the configuration, if you don't have a lot of technical knowledge, then you may struggle a bit to configure it."
"Cyberoam UTM needs to have more certifications with third-parties, such as NSS Labs."
"Cyberoam configuration is done through the browser, which is one of the places that viruses spread."
"On-box sandstorm should be available. As of now, it is from their cloud."
"I would like to see a better content management pack and also the website searching should be better."
"The product had a hang issue. We needed to reboot, recreate the image, and reconfigure the previous image because the product hanged frequently."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.