We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Whenever I need something, Fortinet improves and updates the software for me."
"Security, SD-WAN, and Streetscape are valuable features."
"The most valuable feature is the interface, which is very user friendly. We are utilizing most of the features, like content filtering. The firewall is powerful."
"The threat prevention is the solution's most valuable aspect."
"It's user-friendly and easy to operate."
"The VPN is the most valuable feature."
"I like several features that this product has, such as antivirus and internet navigation inspection. It is also simple to use."
"The security fabric is excellent."
"We have unified management. It is one of the advantages of this product."
"We consolidated from three management consoles and three clusters to only one, which is a big improvement."
"Check Point is one of the few solutions that pay attention to cloud security. Many others mostly focus on providing on-premises solutions."
"The SSL spectrum proved to be the most valuable for our incoming connections."
"Check Point CloudGuard is quick to deploy and easy for the customer to use."
"The most valuable feature is that we can use the same manager server that we use on our own Check Point firewalls. We integrated CloudGuard on that manager and we can use the same kind of protections that we use on the on-prem firewalls, like the IPS and antivirus policy. We can have the same kind of protection on the Cloud environment that we have on-premise."
"The solution is easier to manage than an on-premise firewall. It is easy to manage. The use of dynamic objects for these gateways made it easy to create the right rules and the right policies. Integration with Azure is also easy where we have to just add the subnets. In an on-premise setup, we have to add everything from scratch. We can automate a lot of actions."
"The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM."
"The most valuable feature is the solution is easy to configure for users."
"Good user interface."
"The most valuable features are the firewall section, the VPN, and how you control live users."
"Having a firewall solution with a data quota is very important when the bandwidth is limited, which really distinguishes it from other products."
"I like the SSL VPN connection. Cyberoam works well for controlling users and authenticating their connection to the internet."
"In some circumstances, the malware functionality is the most important feature, and in other cases, some other features."
"The most valuable feature of the solution stems from the fact that it is a very strong product with good support."
"Bandwidth Management and aggregation. It is valuable for combining two ISPs. Switching to a secondary/redundant ISP is thus seamless, in the event that the primary ISP goes down. The Bandwidth Management is also valuable for limiting heavy downloaders that may impact negatively on the experience of other users."
"Technical support could be better. You don't always get the level of help you need right away."
"In the next release, I would like to see the interface simplified to be more user-friendly."
"The support system could be improved."
"For the migration, everyone has a firewall in use and I am selling Fortinet. Typically, I am replacing another firewall. Previously, there was a tool available to convert configurations from one firewall, such as Palo Alto, to Fortinet, but this tool is no longer free. If it could be made free again, it would be very beneficial."
"Fortinet FortiGate needs to improve the protection, it did not prevent us from being attacked. Additionally, Fortinet FortiGate could provide more features for WAF devices. I should not have to purchase two solutions, it would be a benefit to combine these features into one solution."
"I have to say that the initial setup was complex. The deployment took a few days to get set up. Initially, we were using an IPVanish. We switched to this tool since we thought it would be easier. But it turns out it wasn't easier to set up and run."
"It would be nice if backups could more easily migrate between different models."
"I would like to see improvements in the support from Fortinet. Here in the Philippines, whenever we have problems with a Fortinet product, we mostly ask for support from distributors and resellers and not directly from Fortinet."
"Check Point CloudGuard is not a feature-centric product because Check Point concentrates on security."
"There is room for improvement in addressing bugs and support issues."
"The only pain points we have had with it were when we did major version upgrades. Rather than being able to do incremental upgrades on those, we had to completely redeploy. I know that has changed recently, but we had some hiccups when we did the upgrades. This is the only issue we have had."
"In the past year, I noticed that the challenging part, especially in the cloud, is upgrading to the next release of the firewall. Unlike on-premise upgrades, it's not as simple in the cloud. You need to recreate the machine, which makes the process more complex."
"New features have been introduced recently, but they have not yet been integrated into CloudGuard Vsec."
"It needs to cover additional kinds of infrastructure, like containers and serverless options. It's somewhat limited in that area."
"The challenge mainly revolves around the slower functionality of virtual IP switching in Azure Virtual Network compared to on-premise solutions. On-premise, switching between clusters is faster, taking only a few seconds, while in Azure, it can extend up to five minutes. The downtime is a concern for us."
"The business and product development team should introduce a high-end feedback collection mechanism and analyze the customer requirements constructively."
"I would like to see improvements in the development of reports. The process needs to be made simple."
"The price is obviously a more sensitive area to focus on."
"On-box sandstorm should be available. As of now, it is from their cloud."
"Once in a while, an unwanted email will slip in. You have to set your parameters to avoid that happening, but once in a while, an email has slipped past firewall. Once you update the firmware, you notice that it doesn't happen. If an email slips in, I get a little bit worried. I do get the report, but you just don't want that situation happening in the first place."
"Technical support could be faster."
"Maybe network traffic analysis for malware and malicious behavior."
"What needs improvement in Sophos Cyberoam UTM is openness in the competition among Sophos partners or any other Sophos product. Another area for improvement in the solution is pricing. It could be cheaper."
"The solution's pricing could be a problem for some small businesses."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.