We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."UTM/NGFW features and FortiCloud for logs and backups are awesome."
"Its user interface is good, and it is always working fine."
"Whenever I need something, Fortinet improves and updates the software for me."
"The CLI and GUI do a good job of putting a lot at your fingertips."
"Initial setup is easy to configure."
"The most valuable feature of Fortinet FortiGate is security. They are known for efficiency and are on the top of Gartner Quadrant reviews. Fortinet FortiGate has an easy-to-use platform with a good graphical interface. The configuration is simple and the solution provides an overall good layer of security."
"Fortinet FortiGate has many valuable features, such as IDS, and intrusion detection. It has security features that are in part with the technologies that are available in the market."
"It enables our organization to become more productive. Also, it protects our NEtWare from viruses and malware."
"The most valuable feature is threat prevention."
"The most valuable feature for us is the ability to run the gateways as virtual machines in our virtual data center. The tool protects the virtual data centers."
"Additionally, the centralized reporting and management, accessible through a single pane of glass, offer consistency and efficiency across multi-cloud environments."
"I find it really useful that CloudGuard supports all the main players on the Public Clouds market including AWS, GCP, and Azure, as well as some exotic ones like Alibaba Cloud, Oracle Cloud, and IBM Cloud."
"Check Point CloudGuard Network Security has a beautiful threat emulation different from the market."
"This solution has good scalability and stability."
"The most valuable feature of this solution is that you can start off with a simple firewall and expand it to UTM."
"The most valuable feature is that we can use the same manager server that we use on our own Check Point firewalls. We integrated CloudGuard on that manager and we can use the same kind of protections that we use on the on-prem firewalls, like the IPS and antivirus policy. We can have the same kind of protection on the Cloud environment that we have on-premise."
"The most valuable feature of the solution stems from the fact that it is a very strong product with good support."
"Web application filtering eases internet access control."
"The product is a simple and user-friendly UTM that can handle accounting, reporting, firewall, IPS, and antivirus for industries."
"For a small-medium enterprise this solution is easy to manage and operate."
"Sophos Cyberoam UTM is used for perimeter security, web filtering, intrusion prevention and as a VPN."
"The most valuable feature is the solution is easy to configure for users."
"The product, itself, doesn't seem to have any bugs or glitches."
"Its portal is user-friendly. I am able to manage the user data and access control through this device."
"I'm not sure if it's something that they already have or are developing something, however, we need some dedicated features for container security."
"One area for improvement is the performance on the bandwidth demands for smaller devices, as well as better web filtering."
"I would suggest that Fortinet add sandboxing to their solution."
"The ease of use could be improved."
"It is very expensive, and their support is not very good. I hope that their technical support will be better in the future."
"It would be a benefit if Fortinet would release a one-stop solution that is better integrated with other products and an automated emergency response system."
"The solution lacks multi-language support."
"They need to improve their technical support."
"Some more built-in marketplace templates would be nice. It would be nice to see more vendor assistance in deployments and backup of recoveries versus having customers rely upon that themselves. That would make it a lot more seamless and aligned with the standard on-premise model that is there. Check Point can extend the same posture that they have to CloudGuard and make that transition very seamless."
"They are coming out with more SD-WAN express route support from a firewall perspective. That would be great."
"Zero touch removes any independence for configuring."
"The user experience might suffer if we don't have the time to follow up with our clients and ensure they are using the right options. Clients also want more local support in Portuguese and Spanish during their normal business hours. That's something I hear from my customers and my team, too."
"The API integration is complex, which is an area that should be improved."
"The connection to the on-premises management requires using the CLI. It's not just a click, and you cannot edit in the management to prepare everything. You need to do it online and in real time. After that, you must execute a script, and then you should be happy that it appears in the management."
"From the policy optimization point of view, they can do better. This is not just for CloudGuard. CloudGuard is one little piece managed by Check Point. They can also integrate a third-party policy management solution to improve that. For example, Tufin is focused on policy optimization and management."
"It's meeting our needs at this time. If I could make it better, it would be by making it more standalone. That would be beneficial to us. I say that because our current platform for virtualization is VMware. The issue isn't any fault of Check Point, it's more how the virtualization platform partners allow for that partnership and integration. There has to be close ties and partnerships between the vendors to ensure interoperability and sup-portability. There is only so far that Check Point, or any security vendor technology can go without the partnership and enablement of the virtualization platform vendor as it relies on "Service Insertion" to maintain optimal performance."
"Cyberoam configuration is done through the browser, which is one of the places that viruses spread."
"In my experience the solution can be easier to configure with more documentation, we need more training."
"I had an issue when I was trying to stop a user from using too much bandwidth while I was using Azure, I was not able to stop them."
"The product is at its end-of-life. There is nothing to improve as it will be discontinued."
"Sophos VPN connectivity could be improved, as it can be lengthy, and users take longer to connect"
"Cyberoam UTM needs to have more certifications with third-parties, such as NSS Labs."
"It should have a better VPN client. We decided to find something different than Cyberoam because of the VPN client software. It would be nice to have a user interface not only in English but also in different languages."
"The following could be improved: Web Filtering using wildcards; clarity regarding the firewall rules; granular reporting features."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.