Check Point CloudGuard Network Security vs Sophos Cyberoam UTM comparison

Cancel
You must select at least 2 products to compare!
Fortinet Logo
123,063 views|89,961 comparisons
90% willing to recommend
Check Point Software Technologies Logo
400 views|204 comparisons
96% willing to recommend
Sophos Logo
337 views|277 comparisons
84% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.

Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Fortigate's most valuable feature is that it doesn't need a push policy when writing rules.""The stability of the solution is excellent, as it is with other Fortinet products.""The response is very quick and they can visually resolve our problems in a short period.""It is a safe product.""The most important features with FortiGate are the web filter and application controls. We can control our internet usage and use the web filter for application purposes.""One of the nice things about FortiGate is that it can be deployed on the cloud or on-premises. You can actually do both. That's the biggest reason why I stick with this solution as opposed to something like Cisco Meraki. Another nice thing is that I can log directly into a FortiGate or get to it through their FortiCloud access products. They're pretty reliable and consistent. One of the reasons why I started using the product was their single pane of management. I can deploy their line of firewalls in conjunction with their switching and access points, and I can manage the entire network from one interface. I don't have to log into one interface for the firewall, another one for the access points, and another one for the switches. These firewalls have access point controller functionality built right into the system, so I don't even have to purchase additional devices to manage them.""We were looking for the VPN feature and controlling the inflow and outflow of all the traffic within the site and across the sites. We are also using it for the VPN and VLANs.""With FortiClient, you can easily connect when you are home, check out what you want to do, and connect to your network when you are not at work. You can switch on servers and you can check what is wrong."

More Fortinet FortiGate Pros →

"The solution is easier to manage than an on-premise firewall. It is easy to manage. The use of dynamic objects for these gateways made it easy to create the right rules and the right policies. Integration with Azure is also easy where we have to just add the subnets. In an on-premise setup, we have to add everything from scratch. We can automate a lot of actions.""Some retail customers find the scale-up and scale-down features valuable, particularly with scale sets. This is useful for handling increased loads on devices and utilizing firewalls, similar to on-premises setups with active standby configurations.""The features of the solution which I have found most valuable are its flexibility and agility. It's a fully scalable solution, from our perspective. We can define scaling groups and, based on the load, it will create new instances. It's truly a product which is oriented toward the cloud mindset, cloud agility, and this is a great feature.""The most valuable feature is threat prevention.""This solution brings us closer to having a better security score, which helps us a lot in complying with information regulations based on security.""The most valuable features are the ease of administration with the cloud management extension and the cloud licensing model.""We find all the features valuable, particularly the firewall, application control, URL filtering, and HTTPS detection.""The most valuable feature is the centralized dashboard, which is used for managing all of the Check Point Security Gateways."

More Check Point CloudGuard Network Security Pros →

"The solution's web filtering is an important feature for us in our company.""The dashboard is very good-looking and offers maximum features. If a customer's website has a problem, we can guide them over the phone because they can easily find the specific option on the dashboard. That's why we suggest buying Sophos.""The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations.""Web and content filtering are valuable in preventing people from abusing the network and pushing up the bandwidth price.""The most valuable feature of this product is the threat protection.""Web application filtering eases internet access control.""The VPN is excellent on the solution.""The port forwarding is good."

More Sophos Cyberoam UTM Pros →

Cons
"The feedback that I have received is that the performance could be better, and the user experience is not as good compared to a previous solution we used. It could be more user-friendly. Of course, it still works fine for our operations.""They have to just improve its performance when we enable all UTM features. When you enable all the features, the performance of FortiGate, as well as of Sophos and SonicWall, goes down.""Its reporting capabilities can be improved. It should have some out-of-the-box reporting capabilities and some degree of customization. The basic reporting that it currently has is not sufficient to create more usable reports. It needs some sort of out-of-the-box reporting. They try to make customers purchase FortiAnalyzer for this kind of reporting, which is an additional cost. Other firewall vendors, such as SonicWall and Sophos, provide this sort of reporting without any additional cost.""There are some complex administration tasks in their administration portal. That needs to be improved.""To the best of my knowledge, Fortinet does not have a CASB solution and Fortinet does not have a Zero trust solution.""The solution's framework needs to be frequently updated in order to have a stable solution.""Maybe they could make some features more accessible, such as a way to translate directions between two networks that share the same subnets.""MTBF: Hardware failure is more common when compared to SonicWall or Cisco ASA."

More Fortinet FortiGate Cons →

"It's meeting our needs at this time. If I could make it better, it would be by making it more standalone. That would be beneficial to us. I say that because our current platform for virtualization is VMware. The issue isn't any fault of Check Point, it's more how the virtualization platform partners allow for that partnership and integration. There has to be close ties and partnerships between the vendors to ensure interoperability and sup-portability. There is only so far that Check Point, or any security vendor technology can go without the partnership and enablement of the virtualization platform vendor as it relies on "Service Insertion" to maintain optimal performance.""Most clients nowadays tend to move to the cloud and their data security is key. If CloudGuard could be able to give the client that full visibility of how their data is protected on the cloud, then that would be a great selling point for Check Point.""It is somewhat problematic in the area of the cloud.""The relationship between AWS and Check Point could be better. We had issues related to the type of instance and how it interconnects with AWS or cloud-native solutions. We overcame the pain points that we had, and now, AWS is evolving in a way that will facilitate how Check Point works. Our pain points were minimized, but they were there.""From the policy optimization point of view, they can do better. This is not just for CloudGuard. CloudGuard is one little piece managed by Check Point. They can also integrate a third-party policy management solution to improve that. For example, Tufin is focused on policy optimization and management.""The complexity to deploy should be decreased.""The management console can be simplified because at the moment, it is a bit of a challenge to use.""Some more built-in marketplace templates would be nice. It would be nice to see more vendor assistance in deployments and backup of recoveries versus having customers rely upon that themselves. That would make it a lot more seamless and aligned with the standard on-premise model that is there. Check Point can extend the same posture that they have to CloudGuard and make that transition very seamless."

More Check Point CloudGuard Network Security Cons →

"On-box sandstorm should be available. As of now, it is from their cloud.""VPN configuration is not very swift.""Cyberoam configuration is done through the browser, which is one of the places that viruses spread.""Sophos Cyberoam UTM could improve by adding VPN site-to-site capabilities. The correct version does not work with Microsoft Azure Cloud.""It should have a better VPN client. We decided to find something different than Cyberoam because of the VPN client software. It would be nice to have a user interface not only in English but also in different languages.""Cyberoam UTM needs to have more certifications with third-parties, such as NSS Labs.""We have had some issues with technical support, which is an area that needs improvement.""The solution is at its end of life and some of the appliances are finishing."

More Sophos Cyberoam UTM Cons →

Pricing and Cost Advice
  • "Fortinet has one or two license types, and the VPN numbers are only limited by the hardware chassis make."
  • "These boxes are not that expensive compared to what they can do, their functionality, and the reporting you receive. Fortinet licensing is straightforward and less confusing compared to Cisco."
  • "Go for long term pricing negotiated at the time of purchase."
  • "Work through partners for the best pricing."
  • "The value is the capability of having multiple services with one unique license, not having the limitation per user licensing schema, like other vendors."
  • "Easy to understand licensing requirements."
  • "​We saved a bundle by not needing all the past appliances from an NGFW.​"
  • "The cost is too high... They have to focus on more features with less cost for the customer. If you see the market, where it's going, there are a lot of players offering more features for less cost."
  • More Fortinet FortiGate Pricing and Cost Advice →

  • "On average, it is normally on the lower end, being less expensive than Palo Alto or Cisco."
  • "It is more expensive than other solutions and would be more competetive in the market if it came down in price."
  • "We pay approximately ‎€150,000 ($166,000 USD) per year."
  • "Licensing is simply by the number of hosts that you are looking to protect within your environment. It makes it much easier to ensure that you are covering your environment."
  • "There is flexibility in the different licensing models that are offered."
  • "The pricing is pretty high, not just for your capital, for what you have to pay upfront, but for what you pay for your annual software renewals as well, compared to a lot of other vendors. Check Point is near the top, as far as how much it's going to cost you."
  • "Pricing of CloudGuard is pretty fair when you have a single account. It's comparable with other cloud providers. But for our use case, it got really pricey when we had to deploy multiple CloudGuards on multiple accounts in different regions, because you can't have CloudGuard protecting multiple regions. That's the big thing."
  • "The pricing and licensing have been good. We just had to do a license increase for our portion of it. We had that done within a couple of days. Given the fact that it's purely a software-based license, it ends up being even quicker than doing it for an on-prem firewall."
  • More Check Point CloudGuard Network Security Pricing and Cost Advice →

  • "It is very reasonably priced as compared to other solutions in the market."
  • "Licensing is a bit costly, mostly for features requiring subscription."
  • "Licensing is very good value for the money."
  • "It is more expensive than cheap routers, but it offers a lot of functionality, and that warrants the price."
  • "The price is very competitive and the licensing is easy."
  • "It’s value for the money. It’s functionally competitive with higher priced alternative brands."
  • "It is worth the value."
  • "Prices are very high."
  • More Sophos Cyberoam UTM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Unified Threat Management (UTM) solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: When you compare these firewalls you can identify them with different features, advantages, practices and usage at… more »
    Top Answer:From my experience regarding both the Sophos and FortiGate firewalls, I personally would rather use FortiGate. I know… more »
    Top Answer:As a solution, Sophos UTM offers a lot of functionality, it scales well, and the stability and performance are quite… more »
    Top Answer:The ease of administration with the cloud management extension and the cloud licensing model is valuable.
    Top Answer:We are using our BYOL. We are using our existing Check Point discounts to work with licensing. Overall, it is very… more »
    Top Answer:I have not dealt with it enough to find any pitfalls.
    Top Answer:The solution works perfectly without any users.
    Top Answer:There are some issues with logs and report limitations.
    Comparisons
    Also Known As
    FortiGate 60b, FortiGate 60c, FortiGate 80c, FortiGate 50b, FortiGate 200b, FortiGate 110c, FortiGate
    CloudGuard IaaS, Check Point vSEC, CloudGuard IaaS, Check Point Virtual Systems, Check Point CloudGuard Network Security
    Learn More
    Overview

    Fortinet FortiGate enhances network security, prevents unauthorized access, and offers robust firewall protection. Valued features include advanced threat protection, reliable performance, and a user-friendly interface. It improves efficiency, streamlines processes, and boosts collaboration, providing valuable insights for informed decision-making and growth.

    CloudGuard Network Security is a firewall solution that provides network security for cloud environments. It protects against cyber threats with multi-layered security for public, private, and hybrid clouds. 

    CloudGuard Network Security offers advanced threat prevention, firewall, VPN, and application security services, designed to secure cloud infrastructure, virtual networks, and cloud-based applications and workloads.

    CloudGuard Network Security Features

    CloudGuard Network Security has many valuable key features. Some of the most useful ones include:

    • Advanced threat prevention: The solution Includes anti-virus, anti-bot, and intrusion prevention to defend against known and unknown threats.
    • Firewall: It has a stateful inspection firewall and network address translation (NAT) to secure traffic flow between cloud resources and the internet.
    • VPN: CloudGuard Network Security offers secure and encrypted connectivity for remote users and between cloud resources.
    • Application security: It includes a web application firewall (WAF) and SSL inspection to secure web applications and protect against cyber attacks.
    • Cloud-native architecture: The solution is designed specifically for cloud environments and integrates with cloud-native services like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
    • Compliance and governance: It helps organizations comply with regulations such as PCI DSS, HIPAA, and GDPR by providing detailed reporting and auditing capabilities.
    • Multi-layered security: CloudGuard Network Security provides a comprehensive security solution with multiple layers of defense for maximum protection.

    CloudGuard Network Security Benefits

    There are many benefits to implementing CloudGuard Network Security. Some of the biggest advantages the solution offers include:

    • Scalability and flexibility: The solution supports dynamic scaling and flexible deployment options to meet the changing needs of cloud environments.
    • Automated deployment and management: CloudGuard Network Security enables fast and efficient deployment and management of security services through a centralized, cloud-based management console.
    • Future-proof: Designed for the cloud and integrated with cloud-native services, CloudGuard Network Security helps organizations prepare for future cloud requirements and advancements.

    Reviews from Real Users

    CloudGuard Network Security is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has good cloud security, is cost-effective, has no false positives, improves productivity, and much more.

    Bernard O., Technical Engineer at Harnssen Group Limited, says, "Check Point is one of the few solutions that pay attention to cloud security. Many others mostly focus on providing on-premises solutions."

    Another PeerSpot reviewer, Shrinkhala S., Senior Manager at Agriculture Skill Council of India appreciates the solution for many reasons: “There are no security lapses and 100% restriction of threat entrants in the system or server. It's a cost-effective solution with no false positive cases. The product helps in bringing productivity and enhanced customer experience for users.

    We have a happy workforce and more workforce retention and increased IT environment sustainability. There is 100% proactive detection of root causes and root sources. It is dynamic and agile, and its features and utilities continuously improve and evolve. It's the best-unified endpoint management solution for IT systems globally. The product is available for all kinds of business users.”

    "One of the main characteristics that CloudGuard Network Security has given us isgranularity and visibility,” explains Adriamcam, Consultant at ITQS.

    Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective.
    Sample Customers
    1. Amazon Web Services 2. Microsoft 3. IBM 4. Cisco 5. Dell 6. HP 7. Oracle 8. Verizon 9. AT&T 10. T-Mobile 11. Sprint 12. Vodafone 13. Orange 14. BT Group 15. Telstra 16. Deutsche Telekom 17. Comcast 18. Time Warner Cable 19. CenturyLink 20. NTT Communications 21. Tata Communications 22. SoftBank 23. China Mobile 24. Singtel 25. Telus 26. Rogers Communications 27. Bell Canada 28. Telkom Indonesia 29. Telkom South Africa 30. Telmex 31. Telia Company 32. Telkom Kenya
    Physicians Choice Laboratory Services, Helvetica Insurance
    Gulf Corporation for Technology, Maridive & Oil Services, Fidelity Bank, Petra University, Capital FM Kenya, Safari Park Hotel and Casino, Mayfair Casino, Pacific International Lines, Mozambique Ministry of Education, University of Namibia, Royal Hospital for Neuro-disability, University of Hawai, New Delhi Municipal Council
    Top Industries
    REVIEWERS
    Comms Service Provider16%
    Computer Software Company9%
    Financial Services Firm8%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Educational Organization20%
    Computer Software Company15%
    Comms Service Provider8%
    Manufacturing Company6%
    REVIEWERS
    Computer Software Company15%
    Manufacturing Company13%
    Financial Services Firm12%
    Security Firm10%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Financial Services Firm13%
    Manufacturing Company7%
    Comms Service Provider7%
    REVIEWERS
    Manufacturing Company12%
    Non Profit10%
    Government8%
    Financial Services Firm8%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Financial Services Firm12%
    Comms Service Provider11%
    Media Company9%
    Company Size
    REVIEWERS
    Small Business48%
    Midsize Enterprise23%
    Large Enterprise30%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise32%
    Large Enterprise41%
    REVIEWERS
    Small Business35%
    Midsize Enterprise20%
    Large Enterprise44%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise15%
    Large Enterprise59%
    REVIEWERS
    Small Business50%
    Midsize Enterprise31%
    Large Enterprise19%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise16%
    Large Enterprise46%
    Buyer's Guide
    Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM
    March 2024
    Find out what your peers are saying about Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM and other solutions. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.

    See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.

    We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.