We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Our project needs to link two sides through the internet. One of these was in Cairo and the other in another city. We used FortiGate as the integrating solution between the two locations, i.e. the Fortinet 30E & 100E."
"A strong point of FortiGate is that the graphical interface is complete and easy to use, especially if we think there is a list of operations that we are able to perform inside."
"It works very well. It has a lot of different functionalities. Its cost is also fine for our customers."
"The solution is very easy to understand. It's not overly complex."
"The dashboard I have found the most valuable in Fortinet FortiGate."
"The stability and scalability of this solution are satisfactory. Its SD-WAN, VPN, and URL filtering features are very useful."
"The scalability is good in Fortinet FortiGate."
"There are lots of features and most of them are deployed for internet security. Users are protected if they accidentally go to some malicious sites."
"Auto Scaling is one of the features that make me want to choose CloudGuard over actual HW."
"The notifications, the visibility, and the deployment are the most valuable. It could be packaged in such a way that it took a lot of time and resources off our hands, so it was more efficient."
"The visibility, the one-pane-of-glass which allows me to see all of my edge protection through one window and one log, is great. Monitoring everything through that one pane of glass is extremely valuable."
"The Capsule solution and application filters are the most valuable. It is pretty straightforward to implement, and it also has good stability and scalability. Their technical support is also really good."
"The visibility is most valuable. It allows us to see all of our devices from one place, and it gives us the ability to manage push updates and things like that from one place."
"This software is great in overall performance since it can locate any trouble across the networking system and provide solutions before it affects workflows."
"It is scalable. It's a cloud solution, so it's easy to implement and manage."
"All the features that we subscribe to from CloudGuard NGTP are valuable. All the threat prevention and access control features give us the network security that we expect."
"The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations."
"I'm more inclined towards the conventional firewall. So for me, I'm more geared towards the standard firewall type functionalities as well as the web application firewall because that seems to work fine."
"The solution's web filtering is an important feature for us in our company."
"The product is worth the investment."
"Sophos Cyberoam UTM is used for perimeter security, web filtering, intrusion prevention and as a VPN."
"The most valuable feature of this product is the threat protection."
"The most valuable feature of Sophos Cyberoam UTM is the SD-WAN gateway."
"Good user interface."
"They should make the rule sets more understandable for the end user. When you're trying to explain to somebody how a computer network is secured, sometimes it's difficult for an end user or customer to understand. If there was a way to make the terminology more accessible to the end user, the set up could be easier. They should translate the technical jargon to an easily relatable and understandable conversation for the end user, the customer, that would be brilliant. Particularly in an environment where the IT structure is audited regularly, there's always pressure from the auditor to up the standards and up the security and you get your USCERT's that come out and there's a warning about this and the customer will want to lock out so much and when you apply it they run into issue where they can't search the internet or print to their remote office. Of course they can't print to your remote office, they just locked it up. They should make the language more understandable for the customer. If there's a product out there that made the jargon understandable to John Q. Public, I would buy that."
"I think there could be more QoS features"
"There are some problems that support cannot give you a logical reason as to why it happened. For example, I had a case where I was dealing with a WhatsApp application that was giving issues. Technical support gave more than one reason it could be giving issues, but none of them solved the problem. Eventually I solved the problem, but it was far from the solutions that support had given."
"Some of the features in the graphical user interface do not work, which requires that we used the command-line-interface."
"I could not configure sFlow from the FortiGate graphical user interface. I realized that the sFlow configuration is available only from the CLI, and discovered that sFlow is not supported on virtual interfaces, such as VDOM links, IPsec, or GRE."
"While FortiGate is cheaper than most other solutions, we're seeing increased license renewal costs. Most of our clients are asking for more significant discounts because the price is going up."
"You do need some IT knowledge in order to effectively work with the solution."
"The license renewal process, annual renewal price, and the web application firewall features should be improved."
"The solution’s technical support, DNS security and training could be improved."
"For major upgrades, it's still necessary to destroy the VMs and re-create them again. Doing that would mean new public IPs as well."
"I would like to see more focus on east-west traffic inspection and AWS."
"The solution is not that flexible when deploying on-prem."
"The product needs to offer multi-tenancy."
"The operations require skilled manpower with extended experience of working with networking systems for better results."
"Micro-Segmentation functionality for EAST-WEST traffic is not native and requires integration with a third-party OEM."
"There is room for improvement, especially concerning the integration with the management center. It would be beneficial if tasks that currently require scripts could be performed directly from the GUI."
"The reports need to be more detailed and granular."
"The solution is at its end of life and some of the appliances are finishing."
"I would like to see real-time alerts on traffic insights."
"Hence, it needs to be easier to configure rules using the solution."
"The VPN needs to be improved."
"We have had some issues with technical support, which is an area that needs improvement."
"It is not a scalable product. This is because if you want to increase the capacity of the solution, then you have to change the device."
"The solution should improve its scalability because it cannot support enterprise networks."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 119 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "The solution has good threat emulation, threat extraction, and reporting features". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with Azure Firewall, VMware NSX, Cisco Secure Firewall, Akamai Guardicore Segmentation and Palo Alto Networks VM-Series, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.