We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We have been able to offer several services to customers in a single box."
"Its performance in fulfilling our requirements has been satisfactory."
"The threat prevention is the solution's most valuable aspect."
"Easy to implement, and it is also reliable."
"Its stability is the most valuable."
"The most valuable feature of this solution is Quota."
"Our security improved from being able to put in rules and close off unwanted traffic."
"I think that the UTM features are the most value, as it truly protects my infrastructure."
"The initial setup is pretty easy."
"The visibility, the one-pane-of-glass which allows me to see all of my edge protection through one window and one log, is great. Monitoring everything through that one pane of glass is extremely valuable."
"One of the main characteristics that Check Point CloudGuard Network Security has given us is granularity and visibility."
"It is dynamic and agile, and its features and utilities continuously improve and evolve."
"Monitoring using SmartConsole and all its features is extremely easy, and I find SmartEvent an excellent monitoring tool for spotting threats and user behaviour."
"The product has allowed us to develop applications from the cloud - even with large environments and well-segmented security lines."
"The CloudGuard Network Security's most valuable feature is implementing IPS for accessing our data center and server environment in Azure. It helps us to prevent attacks. By protecting our environment with Check Point, which we were already familiar with, it provided a solution that extended into the cloud environment."
"We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks."
"The solution's interface is user-friendly, and the web protection is good. The tool is highly stable. The product is scalable. The technical support is good. We chose Sophos Cyberoam UTM because their focus on security research is higher compared to other brands. It's an all-in-one solution with antivirus, EDR, wireless protection, and web protection integrated into one box. The initial setup was straightforward."
"Web and content filtering are valuable in preventing people from abusing the network and pushing up the bandwidth price."
"The solution is easy to integrate."
"The solution is easy to use."
"The most valuable feature of the solution stems from the fact that it is a very strong product with good support."
"It is very easy to use."
"All in one UTM appliance."
"Content filtering, as this enables me to control that which employees can view at different time quotas."
"I would like to see improvements in the support from Fortinet. Here in the Philippines, whenever we have problems with a Fortinet product, we mostly ask for support from distributors and resellers and not directly from Fortinet."
"Fortinet currently has many products bundled with FortiGate including the basic firewall and load balancer, and I think that that they need to have separate product portfolios for each of these specialized services."
"Fortinet already improved FortiGate, but in the current market, many brands of security devices have improved together. Fortinet still needs to catch up with market standards. Fortinet is lacking in features in comparison to competitors."
"In the future, I would like to see improvements made to cloud-based management."
"Stability and technical support are the two major issues I have found with Fortinet."
"Bandwidth usage in reporting could be improved for Fortinet FortiGate."
"Performance and technical support are the main issues with this solution."
"We would like to see a better training platform implemented."
"Check Point could show us use cases that would help us in Czech and could help us with security threats in our specific country."
"The solution lacks the capability to scale effectively."
"The API integration is complex, which is an area that should be improved."
"In the past year, I noticed that the challenging part, especially in the cloud, is upgrading to the next release of the firewall. Unlike on-premise upgrades, it's not as simple in the cloud. You need to recreate the machine, which makes the process more complex."
"A threat categorization system can be added to give users the authority to define vulnerable attacks and classify areas that can threaten the workflow system."
"The deployment phase takes too much time."
"They can improve their security features to the next advanced level so that their efficiency in catching the malware can become 100%, and there is no scope for any data loss or leakage from the system due to any issue."
"It can be difficult to install properly without prior training"
"I would say there's room for improvement in terms of the GUI. Because it is better than some of the other standard firewalls. They have the drag and drop features."
"It isn't missing anything."
"The reporting part could be more user-friendly for troubleshooting and identifying network issues. It should be more easy for a normal user to identify the problem in their network."
"It should have better VPN protection. Some of the VPN applications are not blocked by this firewall. Some VPNs are able to get through this firewall, which is why I am planning to replace this firewall with a good one in the near future."
"Once in a while, an unwanted email will slip in. You have to set your parameters to avoid that happening, but once in a while, an email has slipped past firewall. Once you update the firmware, you notice that it doesn't happen. If an email slips in, I get a little bit worried. I do get the report, but you just don't want that situation happening in the first place."
"We use different workarounds and find different solutions for it, depending on the client's needs. We shouldn't have to, we should just be able to use the product as it comes with Cyberoam, rather than having to revert to other products."
"The reporting should be improved as well as the backup."
"There needs to be more documentation that users can access to help them understand the solution or troubleshoot as necessary."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 117 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Untangle NG Firewall. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.