We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable features of Fortinet FortiGate are the rules and quality of service."
"FortiGate has a strong security topic which allows all of the Fortinet devices to communicate and share information which makes their security more powerful."
"It's user-friendly and easy to operate."
"I like several features that this product has, such as antivirus and internet navigation inspection. It is also simple to use."
"The solution is easy to configure and maintain remotely."
"Fortinet FortiGate is easy to use."
"Reliability is the best feature. We faced some issues when we were setting it up, but the service, portal, and administration are good."
"Fortinet FortiGate is a security device. It can optimize security on the networks of a company. It actually protects the company from attacks from outside. With FortiGate, you can categorize the users. You can create a group of users that can access all of the websites for their work. You can limit other users' access."
"The solution's most valuable feature is scalability. We can increase the number of CPUs, memory, and firewall throughput easily. Using CloudGuard Network Security for managing cloud firewall rules is considered easier than using the normal security groups provided by Azure or AWS."
"The endpoint VPN is super stable. The routing is also very good. We tried a competing product first, but we could not make it work. We came across CloudGuard. The network routing across different virtual networks in Azure and AWS was way ahead of any of the other technologies. That helped us be able to cover the whole network using one single cluster."
"The Identity Awareness blade and dynamic tagging in Azure are valuable because they make access management automatic. Instead of manually setting up access for each new resource, it happens automatically based on the same access policy. This dynamic setup is scalable."
"The most valuable feature for us is the cluster support."
"The notifications, the visibility, and the deployment are the most valuable. It could be packaged in such a way that it took a lot of time and resources off our hands, so it was more efficient."
"It matches what we have on-prem. We kept the same management and the same functionality that we were having on-prem. It has simplified things for us because there is no new dashboard to touch."
"The initial setup is pretty easy."
"The solution has been quite stable."
"The most valuable feature of Sophos Cyberoam UTM is the SD-WAN gateway."
"The most valuable feature of this product is the threat protection."
"The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations."
"The reporting features are very good."
"Cyberoam UTM's most valuable feature is that it can be configured any way you like."
"The solution works perfectly without any users."
"The best feature is the flexibility the product offers, in terms of remote access. What we had before was a decentralized mechanism in our organization, but after having this product we were able to get the remote locations into the same LAN. We were able to control the bandwidth and were able to take virtual access of those machines and give them the support, as and when required."
"The firewall feature has different branches, such as extended firewalls."
"We would like to see better pricing."
"I don't like that anything more than very basic reporting is not included."
"In terms of what could be improved, the SD-WAN is quite difficult, because if you install the new box, 15 is okay, but if you change from an old configuration, if there is already configuration and a policy when you change to SD-WAN, you must change the whole policy that you see in the interface."
"Fortinet FortiGate could improve by having more storage in the hardware for log data."
"The debugging and troubleshooting has room for improvement."
"It needs more available central management."
"At first glance, the interface for the device is very confusing."
"We would like to have the ability to disable some of the security functionalities."
"We faced issues while upgrading our CloudGuard Network Gateway. When we tried to use the template that Check Point offers on their site, it was not available for the second to the latest version, so I was forced to upgrade my management server. That was very challenging for us."
"Having a web UI in the VSX (or something similar) would be nice."
"The solution needs to improve the interruptions that happen during gateway upgrades."
"I haven't used CloudGuard Network Security in the past couple of years as I moved out of the network security role. However, based on my previous experience, there were improvements, especially in in-place upgrades. Regarding cost, it might be potentially cheaper considering resource utilization in Azure and VM costs, but licensing could be improved, possibly moving towards a simpler model."
"Our biggest complaint concerns the high resource usage for IDP/IPS, as we cannot turn on all of the features even with new hardware."
"They can improve their security features to the next advanced level so that their efficiency in catching the malware can become 100%, and there is no scope for any data loss or leakage from the system due to any issue."
"There is room for improvement in the integration with PaaS services from the public cloud. It would be very helpful."
"It can be difficult to install properly without prior training"
"I don't know whether this will be included in an upgrade, but I would like to get the user utility, like seeing where the users are using more of the data."
"The solution should improve its scalability because it cannot support enterprise networks."
"The VPN is an area that can be improved."
"It should have better VPN protection. Some of the VPN applications are not blocked by this firewall. Some VPNs are able to get through this firewall, which is why I am planning to replace this firewall with a good one in the near future."
"I would like to see improvements in the development of reports. The process needs to be made simple."
"There is a lot or room for improvement, because it is still not a fourth or fifth generation firewall. It lacks security features."
"The Traffic Discovery feature should allow administrators to disconnect unnecessary live connections."
"The solution had a feature to import users from a CSV file. However, the latest version does not have that option."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.