We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's user-friendly and easy to operate."
"We can use our devices to check all of the perimeters. It secures email websites."
"One of the nice things about FortiGate is that it can be deployed on the cloud or on-premises. You can actually do both. That's the biggest reason why I stick with this solution as opposed to something like Cisco Meraki. Another nice thing is that I can log directly into a FortiGate or get to it through their FortiCloud access products. They're pretty reliable and consistent. One of the reasons why I started using the product was their single pane of management. I can deploy their line of firewalls in conjunction with their switching and access points, and I can manage the entire network from one interface. I don't have to log into one interface for the firewall, another one for the access points, and another one for the switches. These firewalls have access point controller functionality built right into the system, so I don't even have to purchase additional devices to manage them."
"Fortinet FortiGate is user-friendly and affordable."
"The solution is stable."
"The main benefit is the grouping of our security monitoring."
"A strong point of FortiGate is that the graphical interface is complete and easy to use, especially if we think there is a list of operations that we are able to perform inside."
"The email protection and VPN features are the most valuable."
"The product offers an easy and nice way to manage the gateways, similar to on-prem hardware. It has packet filtering features. Our security operations are faster and less prone to errors. We selected CloudGuard Network Security due to its visibility."
"It makes securing our cloud workload super easy, and we are able to push any sort of policy changes we need pretty quickly"
"It offers remarkable flexibility in how we configure and utilize the resources."
"Monitoring using SmartConsole and all its features is extremely easy, and I find SmartEvent an excellent monitoring tool for spotting threats and user behaviour."
"This solution brings us closer to having a better security score, which helps us a lot in complying with information regulations based on security."
"The most valuable feature for us is the cluster support."
"The versatility is the solution's most valuable feature."
"What's most valuable to me is that it's a contiguous solution that aligns well with the components that we've relied on and trusted from a traditional hardware, firewall, and unified threat management system. My engineers and analysts don't have to learn another platform. We have already entrusted our security controls to Check Point for perimeter and physical security, and now we can do so at the virtual layer as well, which is key to us."
"The interface is user-friendly."
"The tool is stable."
"The product is a simple and user-friendly UTM that can handle accounting, reporting, firewall, IPS, and antivirus for industries."
"Sophos Cyberoam UTM is used for perimeter security, web filtering, intrusion prevention and as a VPN."
"The most valuable feature of this product is the threat protection."
"You can geofence yourself if there is an incoming attack or a continuous ping from a company outside your country."
"There are plenty of features that are valuable in the Sophos Cyberoam UTM. We use all the features, such as email Security, firewall rules, web server security, web devices, web protection."
"Bandwidth Management and aggregation. It is valuable for combining two ISPs. Switching to a secondary/redundant ISP is thus seamless, in the event that the primary ISP goes down. The Bandwidth Management is also valuable for limiting heavy downloaders that may impact negatively on the experience of other users."
"There are problems with the custom reporting of the unique traffic. The data is there, but it is too difficult for us to extract."
"FortiOS is not simple."
"The routing capability on the FortiGate devices has room for improvement."
"Cisco Meraki products are rising very quickly in the cloud and the connected era. Meraki products offer much better ROI, upgradability, and manageability."
"This product needs to have an analysis feature, rather than having the analysis done through the integration of a different product."
"It should come integrated or have its own type of network monitor tool in a module. There should just be one package, and you are good to go."
"The support system could be improved."
"They should offer special pricing to premium partners and customers."
"As an administrator, I can say that among all of the Check Point products I have been working with so far, the Virtual Systems solution is one of the most difficult."
"The product needs to improve technical support."
"There is room for improvement in addressing bugs and support issues."
"Lacks the ability to integrate with other security solutions."
"Its price is fair, but it can be more favorable."
"CloudGuard Network Security needs to include new features. One specific feature I would like to see is the ability to protect external resources using single sign-on integration with various identity providers, including custom identity providers. Its pricing could also be cheaper."
"For major upgrades, it's still necessary to destroy the VMs and re-create them again. Doing that would mean new public IPs as well."
"The initial setup is complex and could be made simpler."
"The VPN needs to be improved."
"The product strategy of the manufacturer is strange. I don't understand what they are doing in that regard."
"Network visibility is an area in the solution with shortcomings where improvements can be made."
"The solution should improve its scalability because it cannot support enterprise networks."
"The solution had a feature to import users from a CSV file. However, the latest version does not have that option."
"The VPN is an area that can be improved."
"Sometimes, during part of the configuration, if you don't have a lot of technical knowledge, then you may struggle a bit to configure it."
"We use different workarounds and find different solutions for it, depending on the client's needs. We shouldn't have to, we should just be able to use the product as it comes with Cyberoam, rather than having to revert to other products."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 117 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Untangle NG Firewall. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.