Check Point NGFW vs Sophos Cyberoam UTM comparison

Cancel
You must select at least 2 products to compare!
Fortinet Logo
120,425 views|88,209 comparisons
90% willing to recommend
Check Point Software Technologies Logo
views| comparisons
96% willing to recommend
Sophos Logo
326 views|266 comparisons
84% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point NGFW and Sophos Cyberoam UTM based on real PeerSpot user reviews.

Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point NGFW vs. Sophos Cyberoam UTM Report (Updated: May 2024).
772,649 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable features are the enterprise modeling and the simple interface.""The most valuable features of Fortinet FortiGate are the rules and quality of service.""The network security and cloud security are most valuable.""The product is very stable, easy to troubleshoot, and configure, so it has reduced the time it takes for support.""I like several features that this product has, such as antivirus and internet navigation inspection. It is also simple to use.""The most valuable features are SD-WAN, application control, IPS control, and FortiSandbox.""We use a lot of function on the IPS and it works well for us.""It performs very well."

More Fortinet FortiGate Pros →

"It provides access to the Internet for corporate resources in a secure manner.""They utilize various gateway features, including Identity as a Service (IDaaS), anti-spam, antivirus, and other security measures, effectively creating a robust defense against a wide range of potential risks.""There are several ways to implement it.""Check Point offers excellent security.""I use it as well as a VM. We use it a lot because we have all fiber optic connections, so we could use almost all of that. The federation is beautiful because I can transfer all traffic to my main site where I can use just one link to the internet, and I can use it as a proxy as well. It is good to keep control and security.""Even though Check Point NGFW provides a set of security features that enforce protection on the network, the most valuable aspect is also the most used feature: the plain and simple firewall component. This is the core of the product and works to a great extent without the need for all other available bells and whistles.""HTTP forwarding is something I haven't seen elsewhere.""The event logs are relatively informative and can provide information on why traffic was accepted or rejected."

More Check Point NGFW Pros →

"The user interface is well laid out and understandable.""Our customers find it economical and offers good security. These two features are key. Ease of installation and implementation are also key factors.""The solution is excellent for web and application filtering and remote access with the VPN.""The most valuable feature of this product is the threat protection.""For a small-medium enterprise this solution is easy to manage and operate.""I believe it's the advanced security software that offers SMPP protection for the agent.""The dashboard is very good-looking and offers maximum features. If a customer's website has a problem, we can guide them over the phone because they can easily find the specific option on the dashboard. That's why we suggest buying Sophos.""The security capabilities are okay."

More Sophos Cyberoam UTM Pros →

Cons
"I would like to see better pricing in the next release, as well as a simplification of the installation.""Technical support is good but the response time could be faster.""One of the features that I would like to have is to do with endpoint production, it should be integrated. For example, the firewall gets notified of any kind of forensic event that needs to be done, such as if there is a ransomware attack and how it originated, all those records have to be available from the firewall, which is not.""MTBF: Hardware failure is more common when compared to SonicWall or Cisco ASA.""Some of the web policy reports could be improved.""I'm not sure if it's something that they already have or are developing something, however, we need some dedicated features for container security.""There were quite a few problems with the stability of the system.""The support from Fortinet FortiGate could improve. They are not easily accessible when we need them. They could improve their response time."

More Fortinet FortiGate Cons →

"The presentation of the reports need to be more user-friendly.""There is room for improvement in application-based filtering, as with other firewalls available in the market today.""This product has room for improvement in technical support for Africa.""Check Point Smart Dashboard does not support my Apple MacBook Air. It only supports Windows versions.""With the increase of volume of traffic, the required resource/hardware to properly run goes up. Therefore, the hardware engineering to architecture flow has to be more efficient.""Error logs can be more specific.""The level and availability of training should be improved.""I hope for product simplification. It would be better to use one security console, instead of many of them (for licensing and monitoring). The solution is hard for newcomers and takes much time to deep in. Also, I want a historical graph for throughput and system resources usage. Maybe it will be great to make easy step-by-step installation and configuration cookbooks as Fortinet did, and integrate the documentation within the solution."

More Check Point NGFW Cons →

"Sophos Cyberoam UTM could improve by adding VPN site-to-site capabilities. The correct version does not work with Microsoft Azure Cloud.""The setup is a bit complex, so we needed help from a consultant.""The product needs to improve its pricing.""I don't know whether this will be included in an upgrade, but I would like to get the user utility, like seeing where the users are using more of the data.""I would like to see a better content management pack and also the website searching should be better.""The product is at its end-of-life. There is nothing to improve as it will be discontinued.""It should have a better VPN client. We decided to find something different than Cyberoam because of the VPN client software. It would be nice to have a user interface not only in English but also in different languages.""The solution is at its end of life and some of the appliances are finishing."

More Sophos Cyberoam UTM Cons →

Pricing and Cost Advice
  • "Fortinet has one or two license types, and the VPN numbers are only limited by the hardware chassis make."
  • "These boxes are not that expensive compared to what they can do, their functionality, and the reporting you receive. Fortinet licensing is straightforward and less confusing compared to Cisco."
  • "Go for long term pricing negotiated at the time of purchase."
  • "Work through partners for the best pricing."
  • "The value is the capability of having multiple services with one unique license, not having the limitation per user licensing schema, like other vendors."
  • "Easy to understand licensing requirements."
  • "​We saved a bundle by not needing all the past appliances from an NGFW.​"
  • "The cost is too high... They have to focus on more features with less cost for the customer. If you see the market, where it's going, there are a lot of players offering more features for less cost."
  • More Fortinet FortiGate Pricing and Cost Advice →

  • "I don't think the product's pricing is a good value. I feel it's very overpriced. I feel a lot of the features for a next gen firewall are there. But I feel it's overpriced, because of the stability issues. As far as support goes, I really can't speak to direct Check Point support, but the third-party was pretty terrible... As far as the licensing goes, it's pretty complex. If anybody was to purchase the Check Point product, definitely make sure they have an account rep come on site, and explain it line by line, what each thing is. It's not straightforward. It's very convoluted. There's no way you could just figure it out by looking at it."
  • "Check Point solutions are very expensive here. They're good, but they're expensive... Check Point is only useful for customers that have a big IT budget."
  • "The price is high in comparison to other solutions."
  • "We pay $5,000-$6,000 a year."
  • "Maybe the pricing is a bit high but you get the durability and the duration."
  • "Licensing issues may be confusing at times."
  • "It is quite an expensive product, although security is a top priority."
  • "This product is not cheap and there are additional costs that depend on what model or package that you buy."
  • More Check Point NGFW Pricing and Cost Advice →

  • "It is very reasonably priced as compared to other solutions in the market."
  • "Licensing is a bit costly, mostly for features requiring subscription."
  • "Licensing is very good value for the money."
  • "It is more expensive than cheap routers, but it offers a lot of functionality, and that warrants the price."
  • "The price is very competitive and the licensing is easy."
  • "It’s value for the money. It’s functionally competitive with higher priced alternative brands."
  • "It is worth the value."
  • "Prices are very high."
  • More Sophos Cyberoam UTM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Unified Threat Management (UTM) solutions are best for your needs.
    772,649 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: When you compare these firewalls you can identify them with different features, advantages, practices and usage at… more »
    Top Answer:From my experience regarding both the Sophos and FortiGate firewalls, I personally would rather use FortiGate. I know… more »
    Top Answer:As a solution, Sophos UTM offers a lot of functionality, it scales well, and the stability and performance are quite… more »
    Top Answer:I have experience on both from Disti and channel experience. Please find below my comments (nothing new as such)… more »
    Top Answer:Azure Firewall is easy to use and provides excellent support. Valuable features include integration into the overall… more »
    Top Answer:Check Point NGFW provides essential security, featuring no-obligation access for secure connections, strong intrusion… more »
    Top Answer:The solution works perfectly without any users.
    Top Answer:There are some issues with logs and report limitations.
    Comparisons
    Also Known As
    FortiGate 60b, FortiGate 60c, FortiGate 80c, FortiGate 50b, FortiGate 200b, FortiGate 110c, FortiGate
    Check Point NG Firewall, Check Point Next Generation Firewall
    Learn More
    Overview

    Fortinet FortiGate enhances network security, prevents unauthorized access, and offers robust firewall protection. Valued features include advanced threat protection, reliable performance, and a user-friendly interface. It improves efficiency, streamlines processes, and boosts collaboration, providing valuable insights for informed decision-making and growth.

    Check Point NGFW is a next generation firewall that enables safe usage of internet applications by blocking malicious applications and unblocking safe applications. Check Point NGFW, which uses deep packet inspection to identify and control applications, has features such as application and user control and integrated intrusion prevention (IPS), as well as more advanced malware prevention capabilities like sandboxing.

    Check Point NGFW includes 23 firewall models optimized for running all threat prevention technologies simultaneously, including full SSL traffic inspection, without compromising on security or performance.

    Benefits of Check Point's Next Generation Firewall

    • Robust security: Check Point NGFW delivers the best possible threat prevention with SandBlast Zero Day protection. The SandBlast protection agent constantly inspects passing network traffic for exploits and vulnerabilities. Suspicious files are then emulated in a virtual sandbox in order to detect and report malicious behavior.

    • Security at hyperscale: On-demand hyperscale threat prevention performance provides cloud level expansion and resiliency on premises.

    • Unified management: Check Point's SmartConsole makes it easy to manage and configure network security environments and policies. With the SmartConsole, users can manage all the firewall gateways and access logs and install databases from one location. Unified management control across the network increases the efficiency of security operations and reduces IT costs.
    • Continuous logging: Check Point NGFW’s Threat Management feature detects vulnerabilities and logs them. Using the logged data, users can easily create and implement efficient security policies.

    • Remote access: The remote access VPN provides a seamless connection for remote users.

    Check Point NGFW is suitable for organizations of all sizes, from small businesses to larger enterprises.

    Reviews from Real Users

    Check Point NGFW stands out among its competitors for a number of reasons. Two major ones are its intrusion prevention feature as well as its centralized management, which makes it very easy to deploy firewall policies to many firewalls with one click.

    Shivani J., a network security administrator, writes, "Check Point has a lot of features. The ones I love are the antivirus, intrusion prevention, and data loss prevention."

    G., a network administrator at Secretaría de Finanzas de Aguascalientes, writes, “Within the organization, the inspection of packages has given us great help in detecting traffic that may be a threat to the institution. The configuration of policies has allowed us to maintain control of access and users for each institution that is incorporated into our headquarters.”

    Arun J., a senior network engineer, notes, “The nicest feature is the centralized management of multiple firewalls. With the centralized management, we can easily use and operate multiple firewalls as well as create a diagram of them.”

    Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective.
    Sample Customers
    1. Amazon Web Services 2. Microsoft 3. IBM 4. Cisco 5. Dell 6. HP 7. Oracle 8. Verizon 9. AT&T 10. T-Mobile 11. Sprint 12. Vodafone 13. Orange 14. BT Group 15. Telstra 16. Deutsche Telekom 17. Comcast 18. Time Warner Cable 19. CenturyLink 20. NTT Communications 21. Tata Communications 22. SoftBank 23. China Mobile 24. Singtel 25. Telus 26. Rogers Communications 27. Bell Canada 28. Telkom Indonesia 29. Telkom South Africa 30. Telmex 31. Telia Company 32. Telkom Kenya
    Control Southern, Optimal Media
    Gulf Corporation for Technology, Maridive & Oil Services, Fidelity Bank, Petra University, Capital FM Kenya, Safari Park Hotel and Casino, Mayfair Casino, Pacific International Lines, Mozambique Ministry of Education, University of Namibia, Royal Hospital for Neuro-disability, University of Hawai, New Delhi Municipal Council
    Top Industries
    REVIEWERS
    Comms Service Provider16%
    Computer Software Company9%
    Financial Services Firm8%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Educational Organization20%
    Computer Software Company15%
    Comms Service Provider7%
    Manufacturing Company6%
    REVIEWERS
    Financial Services Firm22%
    Computer Software Company15%
    Comms Service Provider7%
    Manufacturing Company6%
    VISITORS READING REVIEWS
    Educational Organization51%
    Computer Software Company7%
    Financial Services Firm5%
    Government4%
    REVIEWERS
    Manufacturing Company12%
    Non Profit10%
    Financial Services Firm8%
    Government8%
    VISITORS READING REVIEWS
    Computer Software Company25%
    Financial Services Firm13%
    Media Company10%
    Government9%
    Company Size
    REVIEWERS
    Small Business48%
    Midsize Enterprise23%
    Large Enterprise30%
    VISITORS READING REVIEWS
    Small Business28%
    Midsize Enterprise32%
    Large Enterprise40%
    REVIEWERS
    Small Business32%
    Midsize Enterprise18%
    Large Enterprise49%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise59%
    Large Enterprise27%
    REVIEWERS
    Small Business50%
    Midsize Enterprise31%
    Large Enterprise19%
    VISITORS READING REVIEWS
    Small Business40%
    Midsize Enterprise16%
    Large Enterprise44%
    Buyer's Guide
    Check Point NGFW vs. Sophos Cyberoam UTM
    May 2024
    Find out what your peers are saying about Check Point NGFW vs. Sophos Cyberoam UTM and other solutions. Updated: May 2024.
    772,649 professionals have used our research since 2012.

    Check Point NGFW doesn't meet the minimum requirements to be ranked in Unified Threat Management (UTM) with 279 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point NGFW is rated 8.8, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point NGFW writes "Good antivirus protection and URL filtering with very good user identification capabilities". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point NGFW is most compared with Palo Alto Networks NG Firewalls, Sophos XG, Cisco Secure Firewall, Netgate pfSense and Azure Firewall, whereas Sophos Cyberoam UTM is most compared with Cisco Secure Firewall, Netgate pfSense, Juniper SRX Series Firewall, Sophos UTM and SonicWall NSa. See our Check Point NGFW vs. Sophos Cyberoam UTM report.

    See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.

    We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.