We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We can detect any attack of viruses or malware at the first point of contact."
"The solution is very user-friendly."
"FortiGate firewalls are user-friendly, and I like the security profiling features."
"It's a user-friendly firewall. Most of the tasks are very simple. It's simple to configure and troubleshoot this firewall."
"The IPS is good. It protect my network from attackers."
"The most valuable features are the policies, filtering, and configuration."
"The CLI and GUI do a good job of putting a lot at your fingertips."
"The technical support in our region is excellent."
"The tool's most valuable features for us are threat prevention, HTTPS inspection, and the Anti-Bot blade. Threat prevention helps to protect our assets from threats. HTTPS inspection ensures secure communication, and the Anti-Bot blade is particularly helpful in detecting C2 servers, enhancing our ability to identify malicious activities and protect our network."
"The most valuable feature is threat prevention."
"The features of the solution which I have found most valuable are its flexibility and agility. It's a fully scalable solution, from our perspective. We can define scaling groups and, based on the load, it will create new instances. It's truly a product which is oriented toward the cloud mindset, cloud agility, and this is a great feature."
"Its blades and VSLS (Virtual System Load Sharing) work fine."
"It makes securing our cloud workload super easy, and we are able to push any sort of policy changes we need pretty quickly"
"The Identity Awareness blade and dynamic tagging in Azure are valuable because they make access management automatic. Instead of manually setting up access for each new resource, it happens automatically based on the same access policy. This dynamic setup is scalable."
"The 24/7 online customer support services enhance effective operations and provide quick services in case of a system failure."
"We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks."
"Content filtering, as this enables me to control that which employees can view at different time quotas."
"The security capabilities are okay."
"There are plenty of features available, such as Full Guard and WAN."
"We consider the user level and control features of Sophos Cyberoam UTM to be the best."
"The product is a simple and user-friendly UTM that can handle accounting, reporting, firewall, IPS, and antivirus for industries."
"The port forwarding is good."
"The product, itself, doesn't seem to have any bugs or glitches."
"Bandwidth Management and aggregation. It is valuable for combining two ISPs. Switching to a secondary/redundant ISP is thus seamless, in the event that the primary ISP goes down. The Bandwidth Management is also valuable for limiting heavy downloaders that may impact negatively on the experience of other users."
"Tunnel flapping was one of the major things I had seen wherein your internet link remains but your VPN tunnel is down. However, since I got a fix from the TAC team, I have not noticed it, but the customer complained a few times that they couldn't access the internet because of this problem."
"Quality control on their firmware versions needs improvement. When they introduce new firmware, there tend to be bugs."
"The main aspect of FortiGate that could be improved is load balancing. Our management team does not want to buy another appliance for only load balancing."
"There are just some services that aren't available. For example, the Ethernet or point-to-point protocols. They could add these services to their product offering - especially services for ISPs."
"The user interface could be improved."
"The product does need better support in the cloud environment. It's not exactly cloud-native right now."
"It does not have key authentication for admin access."
"I would like some automated custom reporting."
"In the next release, including VRF support would be highly beneficial."
"With the incorporation of a lot of AI and machine learning, they can build some sort of a matrix for low-level threats or low-level things that require attention. There can be automation of those tasks so that we don't have to take more time and effort. There should be machine learning to eliminate level-one types of tasks."
"The solution’s technical support, DNS security and training could be improved."
"The user experience might suffer if we don't have the time to follow up with our clients and ensure they are using the right options. Clients also want more local support in Portuguese and Spanish during their normal business hours. That's something I hear from my customers and my team, too."
"It is somewhat problematic in the area of the cloud."
"The biggest room for improvement is that, for a long time now, they've moved everything over to R80 but they still maintain some of the stuff in the old dashboard. They need to "buy in" and move everything to the modern dashboard so that you don't have to go to one place and to another place, at times, to configure the environment. It's time they just finish what they started and put everything in the new, modern dashboard."
"Our biggest complaint concerns the high resource usage for IDP/IPS, as we cannot turn on all of the features even with new hardware."
"The user interface can be improved."
"The reports need to be more detailed and granular."
"The configuration requires an expert to be set up, so it could be made simpler."
"I would like to see improvements in the development of reports. The process needs to be made simple."
"The solution had a feature to import users from a CSV file. However, the latest version does not have that option."
"VPN configuration is not very swift."
"In my experience the solution can be easier to configure with more documentation, we need more training."
"Sophos Cyberoam UTM could have a more advanced reporting function."
"There are some issues with logs and report limitations."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.