We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I'm pretty happy with its reliability. It is also very scalable."
"Valuable features include the Web Application Firewall, and it even has DLP (data leak prevention)."
"The security features that they have are quite good. On top of that, their licensing model is quite nice where they don't charge you anything for the SD-WAN functionality for the firewall."
"The most valuable features of the solution are SD-WAN, filtering testing applications, web filtering, and the new VPN."
"We were looking for the VPN feature and controlling the inflow and outflow of all the traffic within the site and across the sites. We are also using it for the VPN and VLANs."
"One of the nice things about FortiGate is that it can be deployed on the cloud or on-premises. You can actually do both. That's the biggest reason why I stick with this solution as opposed to something like Cisco Meraki. Another nice thing is that I can log directly into a FortiGate or get to it through their FortiCloud access products. They're pretty reliable and consistent. One of the reasons why I started using the product was their single pane of management. I can deploy their line of firewalls in conjunction with their switching and access points, and I can manage the entire network from one interface. I don't have to log into one interface for the firewall, another one for the access points, and another one for the switches. These firewalls have access point controller functionality built right into the system, so I don't even have to purchase additional devices to manage them."
"This is an easy solution to deploy."
"It blocks the vulnerabilities that can negatively impact us."
"The query feature is going to be a game-changer for us as we move forward."
"Check Point CloudGuard is quick to deploy and easy for the customer to use."
"The multiple virtual firewalls on one box are extremely useful and the interconnection with virtual switches is simple and easy to understand."
"The features of the solution which I have found most valuable are its flexibility and agility. It's a fully scalable solution, from our perspective. We can define scaling groups and, based on the load, it will create new instances. It's truly a product which is oriented toward the cloud mindset, cloud agility, and this is a great feature."
"The SSL spectrum proved to be the most valuable for our incoming connections."
"We consolidated from three management consoles and three clusters to only one, which is a big improvement."
"CloudGuard Network Security provides unified security management across hybrid clouds as well as on-prem. It's very important because when I have unified security, I have better control of the situation. If there's an attack or something like that, we can react faster. It's easier for everyone in the organization to work with the Infinity platform."
"The most valuable feature I have found in CloudGuard Network Security is the flexibility to rebuild the firewall as needed."
"The solution's interface is user-friendly, and the web protection is good. The tool is highly stable. The product is scalable. The technical support is good. We chose Sophos Cyberoam UTM because their focus on security research is higher compared to other brands. It's an all-in-one solution with antivirus, EDR, wireless protection, and web protection integrated into one box. The initial setup was straightforward."
"Web and content filtering are valuable in preventing people from abusing the network and pushing up the bandwidth price."
"The port forwarding is good."
"The tool is stable."
"The most valuable features are the firewall section, the VPN, and how you control live users."
"The solution is easy to use."
"The solution works perfectly without any users."
"We have never had to restart a firewall. The firewalls have all worked perfectly fine."
"Its filtering is sometimes too precise or strict. We sometimes have to bypass and authorize some of the sites, but they get blocked. We know that they are trusted sites, but they are blocked, and we don't know why."
"One of the features that I would like to have is to do with endpoint production, it should be integrated. For example, the firewall gets notified of any kind of forensic event that needs to be done, such as if there is a ransomware attack and how it originated, all those records have to be available from the firewall, which is not."
"I feel that the reporting needs to be improved."
"Bandwidth usage in reporting could be improved for Fortinet FortiGate."
"It should come integrated or have its own type of network monitor tool in a module. There should just be one package, and you are good to go."
"I would like to see improvements in the product's application rules."
"Fortinet FortiGate could improve by having more storage in the hardware for log data."
"Fortinet FortiGate needs to improve the protection, it did not prevent us from being attacked. Additionally, Fortinet FortiGate could provide more features for WAF devices. I should not have to purchase two solutions, it would be a benefit to combine these features into one solution."
"The cost is relatively high compared to the cost of other products in the market."
"In future releases, I would like to see the data loss prevention (DLP) feature could scale along with the virtual machine scale sets."
"The cost needs improvement as it is currently quite expensive."
"Most clients nowadays tend to move to the cloud and their data security is key. If CloudGuard could be able to give the client that full visibility of how their data is protected on the cloud, then that would be a great selling point for Check Point."
"The solution lacks the capability to scale effectively."
"Greater automation would reduce the need for manual configuration and management."
"Improvements needed include better integration with Azure features to match on-premises capabilities."
"There is room for improvement regarding the technical support provided."
"In my experience the solution can be easier to configure with more documentation, we need more training."
"The product fails to provide proper reports, making it an area where improvements are required."
"Sophos Cyberoam UTM has room for improvement in specific rules-based objects and redesign. The solution also needs to improve in adding rules and policies, including renewing and finding policies."
"The product needs to improve its pricing."
"Its scalability is not that great."
"The reports need to be more detailed and granular."
"What needs improvement in Sophos Cyberoam UTM is openness in the competition among Sophos partners or any other Sophos product. Another area for improvement in the solution is pricing. It could be cheaper."
"On-box sandstorm should be available. As of now, it is from their cloud."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 117 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.