We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."You can purchase switches and you don't need to do anything with them. You just put in the firewall and the switches get all the policies and rules that you already have in the firewall. With Fortinet, you just connect the FortiSwitch to the Fortinet and that's it."
"The SD-WAN is the most valuable feature."
"This is an easy solution to deploy."
"The technical support is great."
"It is a one box solution, which covers most of the edge device’s requirements."
"It is a safe product."
"I like Fortinet's cloud management. It allows me to manage all my devices in different branches for three cloud accounts. Even though I use on-prem devices, I can manage everything on the cloud."
"There are lots of features and most of them are deployed for internet security. Users are protected if they accidentally go to some malicious sites."
"We are using gateways, and I appreciate the high-availability gateways they have. They stand out more than the competitors."
"The tool's most valuable feature is its scalability. You will only have to pay less for scaling up. Its notable benefit is deployment complexity. Regional deployment is simpler compared to on-premise setup."
"The tool's most valuable features are firewalls and IPS."
"It was very easy to install the solution, and the architecture meant we didn't have to worry about exceeding the solution's capacity."
"Check Point CloudGuard is quick to deploy and easy for the customer to use."
"It really is a pretty complete solution."
"We find all the features valuable, particularly the firewall, application control, URL filtering, and HTTPS detection."
"What's most valuable to me is that it's a contiguous solution that aligns well with the components that we've relied on and trusted from a traditional hardware, firewall, and unified threat management system. My engineers and analysts don't have to learn another platform. We have already entrusted our security controls to Check Point for perimeter and physical security, and now we can do so at the virtual layer as well, which is key to us."
"The most valuable feature is the solution is easy to configure for users."
"It is a VPN that serves all your needs as an application firewall."
"Its portal is user-friendly. I am able to manage the user data and access control through this device."
"The best feature is the flexibility the product offers, in terms of remote access. What we had before was a decentralized mechanism in our organization, but after having this product we were able to get the remote locations into the same LAN. We were able to control the bandwidth and were able to take virtual access of those machines and give them the support, as and when required."
"The port forwarding is good."
"The solution's interface is user-friendly, and the web protection is good. The tool is highly stable. The product is scalable. The technical support is good. We chose Sophos Cyberoam UTM because their focus on security research is higher compared to other brands. It's an all-in-one solution with antivirus, EDR, wireless protection, and web protection integrated into one box. The initial setup was straightforward."
"The solution is easy to use."
"All in one UTM appliance."
"Fortinet FortiGate could improve the user interface. There should be more functionality and options through the GUI."
"Maybe they could make some features more accessible, such as a way to translate directions between two networks that share the same subnets."
"Fortinet FortiGate is a stable solution. However, my issue is the performance only. When I use all the profiles, this affects the performance. From the beginning, I should have had a better sizing of the box."
"The pricing could always be better."
"The command line is complicated, and the interface could be better."
"A sandbox would be good in order to be able to inspect the emails containing spam and be able to validate the emails that contain malware, prior to delivering to the customer."
"FortiGate is really good. We have been using it for quite some time. Initially, when we started off, we had around 70 plus devices of FortiGate, but then Check Point and Palo Alto took over the place. From the product perspective, there are no issues, but from the account perspective, we have had issues. Fortinet's presence in our company is very less. I don't see any Fortinet account managers talking to us, and that presence has diluted in the last two and a half or three years. We have close to 1,500 firewalls. Out of these, 60% of firewalls are from Palo Alto, and a few firewalls are from Check Point. FortiGate firewalls are very less now. It is not because of the product; it is because of the relationship. I don't think they had a good relationship with us, and there was some kind of disconnect for a very long time. The relationship between their accounts team and my leadership team seems to be the reason for phasing out FortiGate."
"The web-cache feature which was previously on the FortiGate device, but was deleted with the recent upgrade should be returned. It was a very valuable feature for us."
"The initial deployment using the ARM template in Azure was straightforward, but migrating to Terraform added complexity, although we managed to make it work."
"Clustering in Azure is a bit different, not using the Check Point cluster but relying on load balancing. It's not as instant as I'm used to; in Azure, it might take around half a minute to a minute, and during this time, services could be down. The delay is attributed to Azure using its load balancing mechanisms instead of the Check Point cluster."
"The threat scanning system should categorize the level of threats to enhance reliable data interpretation."
"There is a limitation with the version upgrade. We are using version 81.10 and from what I understand, it is problematic to upgrade this version. I do not know if that is true."
"The product needs to offer multi-tenancy."
"The licensing structure is unclear, so a transparent and flexible licensing structure would be preferable."
"Its architecture and user interface need improvement. The user experience for this solution also needs to be improved, particularly in implementation, management, and operations."
"The initial setup is complex and could be made simpler."
"The technical support response time could be faster."
"Network visibility is an area in the solution with shortcomings where improvements can be made."
"There needs to be more documentation that users can access to help them understand the solution or troubleshoot as necessary."
"The product strategy of the manufacturer is strange. I don't understand what they are doing in that regard."
"The blocking needs to be improved."
"There are some issues with logs and report limitations."
"Maybe network traffic analysis for malware and malicious behavior."
"The policy is a bit too vague."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.