We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The CLI is robust and powerful, enabling rapid, consistent changes via SSH."
"Fortinet FortiGate is a security device. It can optimize security on the networks of a company. It actually protects the company from attacks from outside. With FortiGate, you can categorize the users. You can create a group of users that can access all of the websites for their work. You can limit other users' access."
"SSL-VPN is very useful for us and has been very reliable."
"The most valuable features are the enterprise modeling and the simple interface."
"Whenever I need something, Fortinet improves and updates the software for me."
"The solution is easy to configure and maintain remotely."
"It is simple to manage, and there are a lot of functionalities in the same box."
"Good performance, stability, and virtual domain ability."
"What's most valuable to me is that it's a contiguous solution that aligns well with the components that we've relied on and trusted from a traditional hardware, firewall, and unified threat management system. My engineers and analysts don't have to learn another platform. We have already entrusted our security controls to Check Point for perimeter and physical security, and now we can do so at the virtual layer as well, which is key to us."
"We have unified management. It is one of the advantages of this product."
"Check Point CloudGuard Network Security has a beautiful threat emulation different from the market."
"SSL/TLS traffic inspection features are used for advanced threat prevention against secure SSL traffic."
"The main benefit of the Check Point Virtual Systems solution is its ability to split up the hardware appliances that we have into several logical, virtual devices with separate traffic handling policies, as well as the switching and routing."
"The VPN features in CloudGuard Network Security have been the most valuable for us."
"The installation process doesn't take very long."
"The visibility, the one-pane-of-glass which allows me to see all of my edge protection through one window and one log, is great. Monitoring everything through that one pane of glass is extremely valuable."
"I find Sophos Cyberoam UTM very good. I like the feature of being able to block off Mac IDs that host users. For example, you have a Mac or Windows laptop and you created a hotspot. Other devices like mobiles and tablets e.g. iPads connected to that hotspot. We can block those devices that connected to the hotspot we created, only through Sophos. It's a good feature we didn't find in other UTMs."
"There are plenty of features available, such as Full Guard and WAN."
"The port forwarding is good."
"I like the SSL VPN connection. Cyberoam works well for controlling users and authenticating their connection to the internet."
"The most valuable feature of this product is the threat protection."
"I believe it's the advanced security software that offers SMPP protection for the agent."
"The most valuable feature of the solution stems from the fact that it is a very strong product with good support."
"The tool's robust features allow for the customization of policies, objects, and firewall settings."
"Fortinet FortiGate could improve by having better visibility. Palo Alto has better visibility."
"The sniffing packets or packet captures, can be simplified and improved because it's a little confusing."
"The support from Fortinet FortiGate could improve. They are not easily accessible when we need them. They could improve their response time."
"There are just some services that aren't available. For example, the Ethernet or point-to-point protocols. They could add these services to their product offering - especially services for ISPs."
"The support costs and licensing are sometimes so expensive."
"Improvement is needed in the Web Filter quotas to restrict users with allocated quotas."
"I would like to see improvements in the product's application rules."
"We would like to see better pricing."
"We did not use the AWS Transit Gateway, and that's one of the things that we're currently using. I believe we will be working with Check Point again, in the near future, to implement it, once they start having proper support for a single customer with multiple accounts. When we were using them, we had to install Check Point on each and every single account."
"Greater automation would reduce the need for manual configuration and management."
"It's meeting our needs at this time. If I could make it better, it would be by making it more standalone. That would be beneficial to us. I say that because our current platform for virtualization is VMware. The issue isn't any fault of Check Point, it's more how the virtualization platform partners allow for that partnership and integration. There has to be close ties and partnerships between the vendors to ensure interoperability and sup-portability. There is only so far that Check Point, or any security vendor technology can go without the partnership and enablement of the virtualization platform vendor as it relies on "Service Insertion" to maintain optimal performance."
"Zero touch removes any independence for configuring."
"In the past year, I noticed that the challenging part, especially in the cloud, is upgrading to the next release of the firewall. Unlike on-premise upgrades, it's not as simple in the cloud. You need to recreate the machine, which makes the process more complex."
"The operations require skilled manpower with extended experience of working with networking systems for better results."
"The only pain points we have had with it were when we did major version upgrades. Rather than being able to do incremental upgrades on those, we had to completely redeploy. I know that has changed recently, but we had some hiccups when we did the upgrades. This is the only issue we have had."
"We miss full blade support for all blades that are compatible with the cluster. Especially notable is the lack of support for Identity Awareness in active standby environments for customers. In our setup, transitioning to Connective clusters would be preferable for maintaining connections during failover situations."
"The price is obviously a more sensitive area to focus on."
"The implementation policy needs improvment."
"The product needs to improve its pricing."
"The solution should improve its scalability because it cannot support enterprise networks."
"The reporting should be improved as well as the backup."
"It should have a better VPN client. We decided to find something different than Cyberoam because of the VPN client software. It would be nice to have a user interface not only in English but also in different languages."
"VPN configuration is not very swift."
"The product had a hang issue. We needed to reboot, recreate the image, and reconfigure the previous image because the product hanged frequently."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 117 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Untangle NG Firewall. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.