We performed a comparison between Sophos Cyberoam UTM and Sophos UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."For a small-medium enterprise this solution is easy to manage and operate."
"The most valuable feature is the IPSec forwarding."
"The VPN is excellent on the solution."
"The most valuable features are the firewall section, the VPN, and how you control live users."
"There are plenty of features available, such as Full Guard and WAN."
"The solution is excellent for web and application filtering and remote access with the VPN."
"The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations."
"I found that the best feature of Sophos Cyberoam UTM is reporting. Its reporting feature is excellent, fast, and easy to prep and launch."
"Configuration could not be made any easier."
"Monitoring and reporting are areas that need improvement."
"The intrusion prevention is great, and I like dual virus scanning on the network layer because we scan it through Avira and Sophos. Web filtering is also a fantastic option for clients who want to really lock down internet access."
"The most valuable features of Sophos UTM are the ease of use, it is very user-friendly. You can understand what they implement in the new firmware, and it's easy to manage the firewalls."
"I like the web filtering options."
"Sophos SG UTM had all the basic functionality that you needed. It is user-friendly and easy to manage for any integrator."
"Sophos UTM is the simplest of these products to setup."
"The most valuable feature of Sophos UTM is the simple-to-use interface."
"The product needs to improve its pricing."
"It isn't missing anything."
"It is not a scalable product. This is because if you want to increase the capacity of the solution, then you have to change the device."
"VPN configuration is not very swift."
"Technical support could be faster."
"The configuration requires an expert to be set up, so it could be made simpler."
"Smaller CR15 units don’t have a hard disc or built in IView software. These units could do with that feature."
"The VPN needs to be improved."
"Sophos should be more user-friendly, have more dashboards, and an easier implementation."
"During initial configuration, I encountered a few issues."
"The memory and processing were problematic. The interface could be better."
"The integration capabilities could be better."
"Sophos UTM could improve the way the configuration has to be done. I have to do the configuration through the command line interface but if it could be done through the graphical user interface it would be much better."
"In short, the UI and UX are the areas of improvement in Sophos UTM and similar solutions compared to Palo Alto."
"Stay away from the wireless models, since you cannot put them in HA. They start to give you some weird issues once you start getting into multiple SSIDs and networks."
"The reporting could improve by providing information on where, or from which device attacks are coming from. We are already given the country where the attack is coming from but more information would be beneficial."
Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews while Sophos UTM is ranked 1st in Unified Threat Management (UTM) with 110 reviews. Sophos Cyberoam UTM is rated 8.0, while Sophos UTM is rated 8.4. The top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". On the other hand, the top reviewer of Sophos UTM writes "It's a highly stable platform with very few hardware issues". Sophos Cyberoam UTM is most compared with Fortinet FortiGate, Netgate pfSense, Cisco Secure Firewall, Juniper SRX Series Firewall and Untangle NG Firewall, whereas Sophos UTM is most compared with Netgate pfSense, Fortinet FortiGate, Sophos XG, OPNsense and Palo Alto Networks NG Firewalls. See our Sophos Cyberoam UTM vs. Sophos UTM report.
See our list of best Unified Threat Management (UTM) vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.