We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."What's most important is the ease of use."
"The pricing is great and very reasonable."
"We use a lot of function on the IPS and it works well for us."
"It is a one box solution, which covers most of the edge device’s requirements."
"The most valuable features of Fortinet FortiGate are the ease of use and there are several operating systems that can include the hardware capacities. In the newer releases, the resources were more useful because they were included in the operating system."
"The simplicity of the product is great. It's very easy to use, which is a compliment we get all the time in terms of feedback."
"It is simple to manage, and there are a lot of functionalities in the same box."
"The features that prevent internet connections, the filtering are the most valuable because we did not have any internet protection before."
"The installation process doesn't take very long."
"The tool's most valuable features are the REST APIs that help to automate the deployment and maintenance process. It helps us to reduce time to 15-25 minutes compared to the manual process which used to take around two to three hours."
"The IPS, application and URL filtering, as well as Identity Awareness, are all very valuable features."
"It makes securing our cloud workload super easy, and we are able to push any sort of policy changes we need pretty quickly"
"SSL/TLS traffic inspection features are used for advanced threat prevention against secure SSL traffic."
"We have complete visibility of attacks originating from email including spear-phishing, spoofing, etc."
"The most valuable feature I have found in CloudGuard Network Security is the flexibility to rebuild the firewall as needed."
"The most valuable feature for us is the ability to run the gateways as virtual machines in our virtual data center. The tool protects the virtual data centers."
"The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations."
"Web application filtering eases internet access control."
"I find Sophos Cyberoam UTM very good. I like the feature of being able to block off Mac IDs that host users. For example, you have a Mac or Windows laptop and you created a hotspot. Other devices like mobiles and tablets e.g. iPads connected to that hotspot. We can block those devices that connected to the hotspot we created, only through Sophos. It's a good feature we didn't find in other UTMs."
"The most valuable feature of Sophos Cyberoam UTM is the SD-WAN gateway."
"SD-WAN and IPSec features are valuable to me."
"I'm more inclined towards the conventional firewall. So for me, I'm more geared towards the standard firewall type functionalities as well as the web application firewall because that seems to work fine."
"In terms of features and user-friendliness, the solution is good. It’s very stable. The solution is scalable. In Sophos Cyberoam UTM, the most valuable features are web and application filtering, routing functionalities, and VPN. It has helped us manage the bandwidth."
"The best feature is the flexibility the product offers, in terms of remote access. What we had before was a decentralized mechanism in our organization, but after having this product we were able to get the remote locations into the same LAN. We were able to control the bandwidth and were able to take virtual access of those machines and give them the support, as and when required."
"I would like to see better pricing in the next release, as well as a simplification of the installation."
"When we cluster the two Fortinet FortiGate boxes together we have some issues."
"We would like to see a better training platform implemented."
"I think there could be more QoS features"
"Fortinet FortiGate could improve by having more capabilities for troubleshooting VPN connections. For example, I do get some feedback about the current status, but I could use some history and logging of important events. The information is logged in our Syslog server, but I could use that information from the device. If they could provide a GUI to have some more insight on what's going with my VPN would be useful."
"I have to say that the initial setup was complex. The deployment took a few days to get set up. Initially, we were using an IPVanish. We switched to this tool since we thought it would be easier. But it turns out it wasn't easier to set up and run."
"The support team for Fortinet FortiGate needs to be more customer friendly."
"The captive portal could be improved."
"The costs are high."
"The solution could improve to have a DLP feature."
"I hope that Check Point continues to improve its technical documentation regarding the Check Point CloudGuard IaaS gateway and management system."
"Clustering in Azure is a bit different, not using the Check Point cluster but relying on load balancing. It's not as instant as I'm used to; in Azure, it might take around half a minute to a minute, and during this time, services could be down. The delay is attributed to Azure using its load balancing mechanisms instead of the Check Point cluster."
"The solution lacks the capability to scale effectively."
"The price of the solution could be reduced, it is expensive."
"In future releases, I would like to see the data loss prevention (DLP) feature could scale along with the virtual machine scale sets."
"The biggest room for improvement is that, for a long time now, they've moved everything over to R80 but they still maintain some of the stuff in the old dashboard. They need to "buy in" and move everything to the modern dashboard so that you don't have to go to one place and to another place, at times, to configure the environment. It's time they just finish what they started and put everything in the new, modern dashboard."
"Sometimes, during part of the configuration, if you don't have a lot of technical knowledge, then you may struggle a bit to configure it."
"Smaller CR15 units don’t have a hard disc or built in IView software. These units could do with that feature."
"VPN configuration is not very swift."
"The following could be improved: Web Filtering using wildcards; clarity regarding the firewall rules; granular reporting features."
"The setup is a bit complex, so we needed help from a consultant."
"The blocking needs to be improved."
"Sometimes, users are timed out intermittently."
"Cyberoam configuration is done through the browser, which is one of the places that viruses spread."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.