We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Fortinet FortiGate is a scalable solution."
"The technical support is great."
"The web filtering feature and the intrusion protection system are the most valuable. It is a resilient appliance. I never had an issue with it in terms of any security breaches."
"It's a user-friendly firewall. Most of the tasks are very simple. It's simple to configure and troubleshoot this firewall."
"It's great for capturing the traffic and troubleshooting it."
"The pipe filter application is an outstanding feature."
"Overall security features and performance routing is good."
"With FortiClient, you can easily connect when you are home, check out what you want to do, and connect to your network when you are not at work. You can switch on servers and you can check what is wrong."
"Advanced check prevention is a great feature that provides threat intelligence at speed."
"I find it really useful that CloudGuard supports all the main players on the Public Clouds market including AWS, GCP, and Azure, as well as some exotic ones like Alibaba Cloud, Oracle Cloud, and IBM Cloud."
"The solution is easier to manage than an on-premise firewall. It is easy to manage. The use of dynamic objects for these gateways made it easy to create the right rules and the right policies. Integration with Azure is also easy where we have to just add the subnets. In an on-premise setup, we have to add everything from scratch. We can automate a lot of actions."
"It makes securing our cloud workload super easy, and we are able to push any sort of policy changes we need pretty quickly"
"What's most valuable to me is that it's a contiguous solution that aligns well with the components that we've relied on and trusted from a traditional hardware, firewall, and unified threat management system. My engineers and analysts don't have to learn another platform. We have already entrusted our security controls to Check Point for perimeter and physical security, and now we can do so at the virtual layer as well, which is key to us."
"The most valuable feature of Check Point CloudGuard Network Security is the increased mail protection including spam."
"The solution has been quite stable."
"The most valuable feature I have found in CloudGuard Network Security is the flexibility to rebuild the firewall as needed."
"Bandwidth Management and aggregation. It is valuable for combining two ISPs. Switching to a secondary/redundant ISP is thus seamless, in the event that the primary ISP goes down. The Bandwidth Management is also valuable for limiting heavy downloaders that may impact negatively on the experience of other users."
"Good user interface."
"The firewall feature has different branches, such as extended firewalls."
"The user interface is well laid out and understandable."
"The port forwarding is good."
"User and network policies to be managed on a single screen with powerful filtering and search options."
"The tool's robust features allow for the customization of policies, objects, and firewall settings."
"The main features I have found best are the load balancer and ease of use."
"I don't really have anything negative to say as far as Fortinet firewalls are concerned. If anything, they can support a user a little bit better. They can stop being so time-sensitive about how much time the support call has taken, and they can help you do it yourself."
"As far as wanting more scalability or things in the network diagram, it's going to cost you."
"The improvement is related to logs. Instead of the CLI, we should be able to have more insights into the logs of the firewall in the GUI."
"While FortiGate is cheaper than most other solutions, we're seeing increased license renewal costs. Most of our clients are asking for more significant discounts because the price is going up."
"Fortinet FortiGate could improve by adding enhancements to FortiMail, FortiSOAR, and FortiDeceptor."
"Some of the filtering is not robust, you can escape it with a VPN. Some of the users bypass some of the filters. It catches some but it also misses some, that area could be improved. It's functioning reasonably but there's room for improvement in that area."
"The solution is very expensive."
"They need to improve their technical support."
"Check Point CloudGuard Network Security could improve by making it easier to configure."
"The memory and hard disk capability could be strengthened."
"The stability of the solution could be improved, but this is the problem of all the solutions in the market. This isn't just a problem specific to Check Point."
"The business and product development team should introduce a high-end feedback collection mechanism and analyze the customer requirements constructively."
"The convergence time between cluster members is still not perfect. It's far away from what we get in traditional appliances. If a company wants to move mission-critical applications for an environment to the cloud, it somehow has to accept that it could have downtime of up to 40 seconds, until cluster members switch virtual IP addresses between themselves and start accepting the traffic. That is a little bit too high in my opinion. It's not fully Check Point's fault, because it's a hybrid mechanism with AWS. The blame is 50/50."
"As an administrator, I can say that among all of the Check Point products I have been working with so far, the Virtual Systems solution is one of the most difficult."
"In case the device is inaccessible due to some issue such as CPU or memory, there is no separate port or hardware partition provided for troubleshooting purposes."
"Easier optimization techniques can definitely help with better performance of the OS, as using the vanilla software doesn't actually showcase the real capability of the software."
"The price is obviously a more sensitive area to focus on."
"The Traffic Discovery feature should allow administrators to disconnect unnecessary live connections."
"There needs to be more documentation that users can access to help them understand the solution or troubleshoot as necessary."
"There are some issues with logs and report limitations."
"I had an issue when I was trying to stop a user from using too much bandwidth while I was using Azure, I was not able to stop them."
"I would say there's room for improvement in terms of the GUI. Because it is better than some of the other standard firewalls. They have the drag and drop features."
"I have problems with the email filtering. Emails pass through without any filtering affecting them. When I get back to them and tell them this is the issue, they check everything and say it is not in their database signature and they have to update it. But you know, by that time, my user has already opened it."
"Sophos Cyberoam UTM could improve by adding VPN site-to-site capabilities. The correct version does not work with Microsoft Azure Cloud."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 117 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Untangle NG Firewall. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.