We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The usage in general is pretty good."
"The most valuable features are the enterprise modeling and the simple interface."
"It is quite easy to handle."
"FortiGate has a strong security topic which allows all of the Fortinet devices to communicate and share information which makes their security more powerful."
"Consolidated our network environment at all locations, but mainly at our datacenter."
"One of the valuable features is a standardized OS."
"The most valuable feature is the ease of configuration."
"Fortinet FortiGate appears to be scalable."
"Our clients choose CloudGuard as a natural progression of their solutions. They understand Microsoft and CloudGuard fits."
"The comprehensiveness of the CloudGuard’s threat prevention security is great, especially once they integrate Dome9 in the whole thing. That really ties the whole thing together, so you can tie your entire cloud environment together into one central location, which is nice. Previously, we had three or four different tools that we were trying to leverage to do the same stuff that we are able to do with CloudGuard."
"The 24/7 online customer support services enhance effective operations and provide quick services in case of a system failure."
"The most valuable feature for us is the simplicity of creating this environment. Even though our current cloud usage is limited, the process of setting up machines in the product and establishing an HR system was straightforward."
"The most valuable feature for us is the ability to run the gateways as virtual machines in our virtual data center. The tool protects the virtual data centers."
"The solution is reliable."
"Security effectiveness is the most valuable feature. Operational efficiency, reporting, and support are also good."
"The tool's most valuable features for us are threat prevention, HTTPS inspection, and the Anti-Bot blade. Threat prevention helps to protect our assets from threats. HTTPS inspection ensures secure communication, and the Anti-Bot blade is particularly helpful in detecting C2 servers, enhancing our ability to identify malicious activities and protect our network."
"The solution is easy to integrate."
"The security capabilities are okay."
"The reporting features are very good."
"Technical support is excellent."
"Web application filtering eases internet access control."
"The most valuable feature is the solution is easy to configure for users."
"SD-WAN and IPSec features are valuable to me."
"Web and content filtering are valuable in preventing people from abusing the network and pushing up the bandwidth price."
"It could use more templates for third-party site-to-site VPN setups other than FortiGate and Cisco."
"We have an issue with hotel guest vouchers."
"The UI could be improved."
"It would be nice if backups could more easily migrate between different models."
"The scalability could be better."
"One area for improvement is the performance on the bandwidth demands for smaller devices, as well as better web filtering."
"The support costs and licensing are sometimes so expensive."
"We would like to have the ability to disable some of the security functionalities."
"The API integration is complex, which is an area that should be improved."
"The product needs to offer multi-tenancy."
"There are some usability issues we'd like to see improved."
"We did not use the AWS Transit Gateway, and that's one of the things that we're currently using. I believe we will be working with Check Point again, in the near future, to implement it, once they start having proper support for a single customer with multiple accounts. When we were using them, we had to install Check Point on each and every single account."
"The convergence time between cluster members is still not perfect. It's far away from what we get in traditional appliances. If a company wants to move mission-critical applications for an environment to the cloud, it somehow has to accept that it could have downtime of up to 40 seconds, until cluster members switch virtual IP addresses between themselves and start accepting the traffic. That is a little bit too high in my opinion. It's not fully Check Point's fault, because it's a hybrid mechanism with AWS. The blame is 50/50."
"In case the device is inaccessible due to some issue such as CPU or memory, there is no separate port or hardware partition provided for troubleshooting purposes."
"Most clients nowadays tend to move to the cloud and their data security is key. If CloudGuard could be able to give the client that full visibility of how their data is protected on the cloud, then that would be a great selling point for Check Point."
"Some more built-in marketplace templates would be nice. It would be nice to see more vendor assistance in deployments and backup of recoveries versus having customers rely upon that themselves. That would make it a lot more seamless and aligned with the standard on-premise model that is there. Check Point can extend the same posture that they have to CloudGuard and make that transition very seamless."
"Once in a while, an unwanted email will slip in. You have to set your parameters to avoid that happening, but once in a while, an email has slipped past firewall. Once you update the firmware, you notice that it doesn't happen. If an email slips in, I get a little bit worried. I do get the report, but you just don't want that situation happening in the first place."
"It is not a scalable product. This is because if you want to increase the capacity of the solution, then you have to change the device."
"It should have better VPN protection. Some of the VPN applications are not blocked by this firewall. Some VPNs are able to get through this firewall, which is why I am planning to replace this firewall with a good one in the near future."
"Cyberoam UTM needs to have more certifications with third-parties, such as NSS Labs."
"The price is obviously a more sensitive area to focus on."
"Its scalability is not that great."
"I don't know whether this will be included in an upgrade, but I would like to get the user utility, like seeing where the users are using more of the data."
"The solution had a feature to import users from a CSV file. However, the latest version does not have that option."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 117 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Untangle NG Firewall. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.