Check Point CloudGuard Network Security vs Sophos Cyberoam UTM comparison

Cancel
You must select at least 2 products to compare!
Fortinet Logo
123,063 views|89,961 comparisons
90% willing to recommend
Check Point Software Technologies Logo
400 views|204 comparisons
96% willing to recommend
Sophos Logo
337 views|277 comparisons
84% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.

Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM Report (Updated: March 2024).
767,667 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The usage in general is pretty good.""The most valuable features are the enterprise modeling and the simple interface.""It is quite easy to handle.""FortiGate has a strong security topic which allows all of the Fortinet devices to communicate and share information which makes their security more powerful.""Consolidated our network environment at all locations, but mainly at our datacenter.""One of the valuable features is a standardized OS.""The most valuable feature is the ease of configuration.""Fortinet FortiGate appears to be scalable."

More Fortinet FortiGate Pros →

"Our clients choose CloudGuard as a natural progression of their solutions. They understand Microsoft and CloudGuard fits.""The comprehensiveness of the CloudGuard’s threat prevention security is great, especially once they integrate Dome9 in the whole thing. That really ties the whole thing together, so you can tie your entire cloud environment together into one central location, which is nice. Previously, we had three or four different tools that we were trying to leverage to do the same stuff that we are able to do with CloudGuard.""The 24/7 online customer support services enhance effective operations and provide quick services in case of a system failure.""The most valuable feature for us is the simplicity of creating this environment. Even though our current cloud usage is limited, the process of setting up machines in the product and establishing an HR system was straightforward.""The most valuable feature for us is the ability to run the gateways as virtual machines in our virtual data center. The tool protects the virtual data centers.""The solution is reliable.""Security effectiveness is the most valuable feature. Operational efficiency, reporting, and support are also good.""The tool's most valuable features for us are threat prevention, HTTPS inspection, and the Anti-Bot blade. Threat prevention helps to protect our assets from threats. HTTPS inspection ensures secure communication, and the Anti-Bot blade is particularly helpful in detecting C2 servers, enhancing our ability to identify malicious activities and protect our network."

More Check Point CloudGuard Network Security Pros →

"The solution is easy to integrate.""The security capabilities are okay.""The reporting features are very good.""Technical support is excellent.""Web application filtering eases internet access control.""The most valuable feature is the solution is easy to configure for users.""SD-WAN and IPSec features are valuable to me.""Web and content filtering are valuable in preventing people from abusing the network and pushing up the bandwidth price."

More Sophos Cyberoam UTM Pros →

Cons
"It could use more templates for third-party site-to-site VPN setups other than FortiGate and Cisco.""We have an issue with hotel guest vouchers.""The UI could be improved.""It would be nice if backups could more easily migrate between different models.""The scalability could be better.""One area for improvement is the performance on the bandwidth demands for smaller devices, as well as better web filtering.""The support costs and licensing are sometimes so expensive.""We would like to have the ability to disable some of the security functionalities."

More Fortinet FortiGate Cons →

"The API integration is complex, which is an area that should be improved.""The product needs to offer multi-tenancy.""There are some usability issues we'd like to see improved.""We did not use the AWS Transit Gateway, and that's one of the things that we're currently using. I believe we will be working with Check Point again, in the near future, to implement it, once they start having proper support for a single customer with multiple accounts. When we were using them, we had to install Check Point on each and every single account.""The convergence time between cluster members is still not perfect. It's far away from what we get in traditional appliances. If a company wants to move mission-critical applications for an environment to the cloud, it somehow has to accept that it could have downtime of up to 40 seconds, until cluster members switch virtual IP addresses between themselves and start accepting the traffic. That is a little bit too high in my opinion. It's not fully Check Point's fault, because it's a hybrid mechanism with AWS. The blame is 50/50.""In case the device is inaccessible due to some issue such as CPU or memory, there is no separate port or hardware partition provided for troubleshooting purposes.""Most clients nowadays tend to move to the cloud and their data security is key. If CloudGuard could be able to give the client that full visibility of how their data is protected on the cloud, then that would be a great selling point for Check Point.""Some more built-in marketplace templates would be nice. It would be nice to see more vendor assistance in deployments and backup of recoveries versus having customers rely upon that themselves. That would make it a lot more seamless and aligned with the standard on-premise model that is there. Check Point can extend the same posture that they have to CloudGuard and make that transition very seamless."

More Check Point CloudGuard Network Security Cons →

"Once in a while, an unwanted email will slip in. You have to set your parameters to avoid that happening, but once in a while, an email has slipped past firewall. Once you update the firmware, you notice that it doesn't happen. If an email slips in, I get a little bit worried. I do get the report, but you just don't want that situation happening in the first place.""It is not a scalable product. This is because if you want to increase the capacity of the solution, then you have to change the device.""It should have better VPN protection. Some of the VPN applications are not blocked by this firewall. Some VPNs are able to get through this firewall, which is why I am planning to replace this firewall with a good one in the near future.""Cyberoam UTM needs to have more certifications with third-parties, such as NSS Labs.""The price is obviously a more sensitive area to focus on.""Its scalability is not that great.""I don't know whether this will be included in an upgrade, but I would like to get the user utility, like seeing where the users are using more of the data.""The solution had a feature to import users from a CSV file. However, the latest version does not have that option."

More Sophos Cyberoam UTM Cons →

Pricing and Cost Advice
  • "Fortinet has one or two license types, and the VPN numbers are only limited by the hardware chassis make."
  • "These boxes are not that expensive compared to what they can do, their functionality, and the reporting you receive. Fortinet licensing is straightforward and less confusing compared to Cisco."
  • "Go for long term pricing negotiated at the time of purchase."
  • "Work through partners for the best pricing."
  • "The value is the capability of having multiple services with one unique license, not having the limitation per user licensing schema, like other vendors."
  • "Easy to understand licensing requirements."
  • "​We saved a bundle by not needing all the past appliances from an NGFW.​"
  • "The cost is too high... They have to focus on more features with less cost for the customer. If you see the market, where it's going, there are a lot of players offering more features for less cost."
  • More Fortinet FortiGate Pricing and Cost Advice →

  • "On average, it is normally on the lower end, being less expensive than Palo Alto or Cisco."
  • "It is more expensive than other solutions and would be more competetive in the market if it came down in price."
  • "We pay approximately ‎€150,000 ($166,000 USD) per year."
  • "Licensing is simply by the number of hosts that you are looking to protect within your environment. It makes it much easier to ensure that you are covering your environment."
  • "There is flexibility in the different licensing models that are offered."
  • "The pricing is pretty high, not just for your capital, for what you have to pay upfront, but for what you pay for your annual software renewals as well, compared to a lot of other vendors. Check Point is near the top, as far as how much it's going to cost you."
  • "Pricing of CloudGuard is pretty fair when you have a single account. It's comparable with other cloud providers. But for our use case, it got really pricey when we had to deploy multiple CloudGuards on multiple accounts in different regions, because you can't have CloudGuard protecting multiple regions. That's the big thing."
  • "The pricing and licensing have been good. We just had to do a license increase for our portion of it. We had that done within a couple of days. Given the fact that it's purely a software-based license, it ends up being even quicker than doing it for an on-prem firewall."
  • More Check Point CloudGuard Network Security Pricing and Cost Advice →

  • "It is very reasonably priced as compared to other solutions in the market."
  • "Licensing is a bit costly, mostly for features requiring subscription."
  • "Licensing is very good value for the money."
  • "It is more expensive than cheap routers, but it offers a lot of functionality, and that warrants the price."
  • "The price is very competitive and the licensing is easy."
  • "It’s value for the money. It’s functionally competitive with higher priced alternative brands."
  • "It is worth the value."
  • "Prices are very high."
  • More Sophos Cyberoam UTM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Unified Threat Management (UTM) solutions are best for your needs.
    767,667 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: When you compare these firewalls you can identify them with different features, advantages, practices and usage at… more »
    Top Answer:From my experience regarding both the Sophos and FortiGate firewalls, I personally would rather use FortiGate. I know… more »
    Top Answer:As a solution, Sophos UTM offers a lot of functionality, it scales well, and the stability and performance are quite… more »
    Top Answer:The ease of administration with the cloud management extension and the cloud licensing model is valuable.
    Top Answer:We are using our BYOL. We are using our existing Check Point discounts to work with licensing. Overall, it is very… more »
    Top Answer:I have not dealt with it enough to find any pitfalls.
    Top Answer:The solution works perfectly without any users.
    Top Answer:There are some issues with logs and report limitations.
    Comparisons
    Also Known As
    FortiGate 60b, FortiGate 60c, FortiGate 80c, FortiGate 50b, FortiGate 200b, FortiGate 110c, FortiGate
    CloudGuard IaaS, Check Point vSEC, CloudGuard IaaS, Check Point Virtual Systems, Check Point CloudGuard Network Security
    Learn More
    Overview

    Fortinet FortiGate enhances network security, prevents unauthorized access, and offers robust firewall protection. Valued features include advanced threat protection, reliable performance, and a user-friendly interface. It improves efficiency, streamlines processes, and boosts collaboration, providing valuable insights for informed decision-making and growth.

    CloudGuard Network Security is a firewall solution that provides network security for cloud environments. It protects against cyber threats with multi-layered security for public, private, and hybrid clouds. 

    CloudGuard Network Security offers advanced threat prevention, firewall, VPN, and application security services, designed to secure cloud infrastructure, virtual networks, and cloud-based applications and workloads.

    CloudGuard Network Security Features

    CloudGuard Network Security has many valuable key features. Some of the most useful ones include:

    • Advanced threat prevention: The solution Includes anti-virus, anti-bot, and intrusion prevention to defend against known and unknown threats.
    • Firewall: It has a stateful inspection firewall and network address translation (NAT) to secure traffic flow between cloud resources and the internet.
    • VPN: CloudGuard Network Security offers secure and encrypted connectivity for remote users and between cloud resources.
    • Application security: It includes a web application firewall (WAF) and SSL inspection to secure web applications and protect against cyber attacks.
    • Cloud-native architecture: The solution is designed specifically for cloud environments and integrates with cloud-native services like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
    • Compliance and governance: It helps organizations comply with regulations such as PCI DSS, HIPAA, and GDPR by providing detailed reporting and auditing capabilities.
    • Multi-layered security: CloudGuard Network Security provides a comprehensive security solution with multiple layers of defense for maximum protection.

    CloudGuard Network Security Benefits

    There are many benefits to implementing CloudGuard Network Security. Some of the biggest advantages the solution offers include:

    • Scalability and flexibility: The solution supports dynamic scaling and flexible deployment options to meet the changing needs of cloud environments.
    • Automated deployment and management: CloudGuard Network Security enables fast and efficient deployment and management of security services through a centralized, cloud-based management console.
    • Future-proof: Designed for the cloud and integrated with cloud-native services, CloudGuard Network Security helps organizations prepare for future cloud requirements and advancements.

    Reviews from Real Users

    CloudGuard Network Security is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has good cloud security, is cost-effective, has no false positives, improves productivity, and much more.

    Bernard O., Technical Engineer at Harnssen Group Limited, says, "Check Point is one of the few solutions that pay attention to cloud security. Many others mostly focus on providing on-premises solutions."

    Another PeerSpot reviewer, Shrinkhala S., Senior Manager at Agriculture Skill Council of India appreciates the solution for many reasons: “There are no security lapses and 100% restriction of threat entrants in the system or server. It's a cost-effective solution with no false positive cases. The product helps in bringing productivity and enhanced customer experience for users.

    We have a happy workforce and more workforce retention and increased IT environment sustainability. There is 100% proactive detection of root causes and root sources. It is dynamic and agile, and its features and utilities continuously improve and evolve. It's the best-unified endpoint management solution for IT systems globally. The product is available for all kinds of business users.”

    "One of the main characteristics that CloudGuard Network Security has given us isgranularity and visibility,” explains Adriamcam, Consultant at ITQS.

    Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective.
    Sample Customers
    1. Amazon Web Services 2. Microsoft 3. IBM 4. Cisco 5. Dell 6. HP 7. Oracle 8. Verizon 9. AT&T 10. T-Mobile 11. Sprint 12. Vodafone 13. Orange 14. BT Group 15. Telstra 16. Deutsche Telekom 17. Comcast 18. Time Warner Cable 19. CenturyLink 20. NTT Communications 21. Tata Communications 22. SoftBank 23. China Mobile 24. Singtel 25. Telus 26. Rogers Communications 27. Bell Canada 28. Telkom Indonesia 29. Telkom South Africa 30. Telmex 31. Telia Company 32. Telkom Kenya
    Physicians Choice Laboratory Services, Helvetica Insurance
    Gulf Corporation for Technology, Maridive & Oil Services, Fidelity Bank, Petra University, Capital FM Kenya, Safari Park Hotel and Casino, Mayfair Casino, Pacific International Lines, Mozambique Ministry of Education, University of Namibia, Royal Hospital for Neuro-disability, University of Hawai, New Delhi Municipal Council
    Top Industries
    REVIEWERS
    Comms Service Provider16%
    Computer Software Company9%
    Financial Services Firm8%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Educational Organization20%
    Computer Software Company15%
    Comms Service Provider8%
    Manufacturing Company6%
    REVIEWERS
    Computer Software Company15%
    Manufacturing Company13%
    Financial Services Firm12%
    Security Firm10%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Financial Services Firm13%
    Manufacturing Company7%
    Comms Service Provider7%
    REVIEWERS
    Manufacturing Company12%
    Non Profit10%
    Government8%
    Financial Services Firm8%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Financial Services Firm12%
    Comms Service Provider11%
    Media Company9%
    Company Size
    REVIEWERS
    Small Business48%
    Midsize Enterprise23%
    Large Enterprise30%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise32%
    Large Enterprise41%
    REVIEWERS
    Small Business35%
    Midsize Enterprise20%
    Large Enterprise44%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise15%
    Large Enterprise59%
    REVIEWERS
    Small Business50%
    Midsize Enterprise31%
    Large Enterprise19%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise16%
    Large Enterprise47%
    Buyer's Guide
    Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM
    March 2024
    Find out what your peers are saying about Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM and other solutions. Updated: March 2024.
    767,667 professionals have used our research since 2012.

    Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 117 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Untangle NG Firewall. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.

    See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.

    We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.