We performed a comparison between Check Point NGFW and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The product offers very good security."
"It is easy to use and performs very well."
"User-friendly and affordable security solution that's recommended for SMB customers. This solution has good technical support."
"We use a southern institution that's audited for IT security and the reporting that automatically comes off the unit makes it much easier to meet compliance standards and makes it easier as far as the amount of time that has to be spent to compile that information. If you get your reporting set up correctly when you initially set it up, you just select the one you want and hit print. The auditing trail on it is the best feature."
"The features that I have found most valuable are the SD-WAN and their IP4 policy."
"It does a lot for you for intrusion protection and as an antivirus. The threat management bundle is worth the money. You don't need another company to monitor your web traffic for you. You can do everything yourself on the firewall. You restrict your own black list for people on the firewall. You don't need to pay some other company for another product to do that for you. The firewall can do that for you. So, it's an easy-to-use product for people to be independent. They don't need to rely on other vendors to do what the firewall can do. They can do everything."
"With FortiClient, you can easily connect when you are home, check out what you want to do, and connect to your network when you are not at work. You can switch on servers and you can check what is wrong."
"The most valuable features are SD-WAN, application control, IPS control, and FortiSandbox."
"The most valuable feature is the IPsec VPN."
"The tool provides great security."
"Being able to access almost everything in one location manage all your gateways and get all your logs is great."
"Now we can add application signature in the same rule base & don't have to create a different policy for that."
"Check Point has strong security features as well as some decent monitoring and management capabilities."
"Check Point has a centralized console that makes it possible to manage all the deployed equipment. It also has a built-in VPN service that lets users connect through VPN to our organization, which facilitates teleworking while cutting off unauthorized access to the organization's internal network."
"Check Point helps a lot with automatization which definitely reduces the effort to maintain the environment."
"Check Point NGFW is easy to use, flexible and provides good performance. The security of the product is excellent, we do not have to do a lot of patching or upgrades because of vulnerabilities."
"Having a firewall solution with a data quota is very important when the bandwidth is limited, which really distinguishes it from other products."
"The main features I have found best are the load balancer and ease of use."
"Web Filtering and Application Filtering saves a lot of my bandwidth and improves the user's productivity."
"The interface is user-friendly."
"We consider the user level and control features of Sophos Cyberoam UTM to be the best."
"The security capabilities are okay."
"The port forwarding is good."
"In terms of features and user-friendliness, the solution is good. It’s very stable. The solution is scalable. In Sophos Cyberoam UTM, the most valuable features are web and application filtering, routing functionalities, and VPN. It has helped us manage the bandwidth."
"One area for improvement is the performance on the bandwidth demands for smaller devices, as well as better web filtering."
"Fortinet already improved FortiGate, but in the current market, many brands of security devices have improved together. Fortinet still needs to catch up with market standards. Fortinet is lacking in features in comparison to competitors."
"I need user-behavior analytics, to find threat scenarios from inside the organization, insider attacks. That would be very helpful for us. In addition, I would like next-generation features for small and medium businesses. These businesses require UTM, all in one product. Fortinet must include it."
"I think that the infrastructure for the VPN could be improved. The way that it is bundled also made it difficult to use and sell as it is too expensive."
"The support we receive when we need to upgrade is not satisfactory and has room for improvement."
"The solution could have licensing fees reduced in the future."
"They have to just improve its performance when we enable all UTM features. When you enable all the features, the performance of FortiGate, as well as of Sophos and SonicWall, goes down."
"Fortinet FortiGate is a stable solution. However, my issue is the performance only. When I use all the profiles, this affects the performance. From the beginning, I should have had a better sizing of the box."
"The Check Point support needs a lot of improvement."
"The biggest improvement they could make is having one software to install on all three levels of their products, so that the SMBs, the normal models, and the chassis would all run the same software. Now, while there is central management, everything that has to be configured on the gateway itself works differently on the three kinds of devices."
"Complex and not very easy to use."
"The current model is predominantly hardware appliance-based, which can incur substantial costs"
"The virtual environment is not stable at all. We have some customers who are using the virtual environment feature, and sometimes it crashes. We have many tickets open and the response is not as good as expected. We have to wait months for a resolution."
"The solution could improve by keeping more up-to-date with technology. For example, if Amazon releases something in the security field, Check Point should have integration or adoption of this feature a bit faster than it is today. Sometimes we can hear a lot of the marketing information about an attractive feature, which we would like to have, but the feature will be released in two years. This timeframe should decrease."
"We find the GUI to be wrong and the CLI doesn't always show all of the connections."
"There needs to be more storage space for reporting."
"It is not a scalable product. This is because if you want to increase the capacity of the solution, then you have to change the device."
"Sometimes, users are timed out intermittently."
"It should have a better VPN client. We decided to find something different than Cyberoam because of the VPN client software. It would be nice to have a user interface not only in English but also in different languages."
"Maybe network traffic analysis for malware and malicious behavior."
"The Traffic Discovery feature should allow administrators to disconnect unnecessary live connections."
"The price is obviously a more sensitive area to focus on."
"I don't know whether this will be included in an upgrade, but I would like to get the user utility, like seeing where the users are using more of the data."
"The product needs to improve its pricing."
Check Point NGFW doesn't meet the minimum requirements to be ranked in Unified Threat Management (UTM) with 278 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point NGFW is rated 8.8, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point NGFW writes "Good antivirus protection and URL filtering with very good user identification capabilities". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point NGFW is most compared with Palo Alto Networks NG Firewalls, Sophos XG, Cisco Secure Firewall, Netgate pfSense and Azure Firewall, whereas Sophos Cyberoam UTM is most compared with Cisco Secure Firewall, Netgate pfSense, Juniper SRX Series Firewall, Sophos UTM and SonicWall NSa. See our Check Point NGFW vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.