Most Helpful Review
Find out what your peers are saying about Palo Alto Networks VM-Series vs. Sophos Cyberoam UTM and other solutions.
310,271 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Embedding it into my application development lifecycle prevents data loss and business disruption, allowing the adoption to operate at the speed of my AWS Cloud.
It has a good performance which helps you with the stability of your virtual environment.
In AWS, Palo Alto provides us a better view than flow logs for network traffic.
App-ID and User-ID have repeatedly shown value in securing business critical systems.
It provides complete security posture from end-to-end. This has given us better visibility into what our security aspects are.
You already can scale it if you put it in Auto Scaling groups. If you put it in a load balancer, it should already be able to scale.
It allows us to see all our traffic to properly secure it and only allow what is needed through the firewall.
It offers a single pane of glass for all the different types of installations.
The most valuable feature of this product is the threat protection.
It is a VPN that serves all your needs as an application firewall.
Web and content filtering are valuable in preventing people from abusing the network and pushing up the bandwidth price.
We have never had to restart a firewall. The firewalls have all worked perfectly fine.
The best feature is the flexibility the product offers, in terms of remote access. What we had before was a decentralized mechanism in our organization, but after having this product we were able to get the remote locations into the same LAN. We were able to control the bandwidth and were able to take virtual access of those machines and give them the support, as and when required.
Bandwidth Management and aggregation. It is valuable for combining two ISPs. Switching to a secondary/redundant ISP is thus seamless, in the event that the primary ISP goes down. The Bandwidth Management is also valuable for limiting heavy downloaders that may impact negatively on the experience of other users.
The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations.
User and network policies to be managed on a single screen with powerful filtering and search options.
It can definitely improve on the performance.
It has to be more scalable for the deployment of VMs on the cloud.
I would like to see a more thorough QA process. We have had some difficulties from bugs in releases.
We have ran into issues with Palo Alto’s limitations for resolving large IP lists from DNS lookups, as well as the antivirus interfering with App-ID.
The product could provide protection above Layer 3, which gets into the application layer and provides better visibility into those aspects of application security.
On the cloud side, they need to come up with more HA solutions to support the multi-region.
AWS doesn't integrate well with third-party firewalls.
I would like a way to do everything programmatically, or be able to copy the configs from different prices at different levels.
The reporting should be improved as well as the backup.
Its scalability is not that great.
Cyberoam configuration is done through the browser, which is one of the places that viruses spread.
Once in a while, an unwanted email will slip in. You have to set your parameters to avoid that happening, but once in a while, an email has slipped past firewall. Once you update the firmware, you notice that it doesn't happen. If an email slips in, I get a little bit worried. I do get the report, but you just don't want that situation happening in the first place.
I would like to see a better content management pack and also the website searching should be better.
I have problems with the email filtering. Emails pass through without any filtering affecting them. When I get back to them and tell them this is the issue, they check everything and say it is not in their database signature and they have to update it. But you know, by that time, my user has already opened it.
There is a lot or room for improvement, because it is still not a fourth or fifth generation firewall. It lacks security features.
Needs a mail alert/notification when the device loses any of its connections, during ISP redundancy implementation.
Pricing and Cost Advice
The pricing and licensing of this product on AWS should be from $1.28/hr or $4,500.00/yr. Then, it would be a good price for the performance that it delivers.
We used BYOL, because of the cost to own.
The pricing and licensing of this product on AWS for a three-year commitment is a great deal, if you can plan that far ahead.
Because the solution was getting deployed on AWS, it was the best place to go and it was available there.
One of the factors for selecting Palo Alto was they had flexible pricing. They had a pay-as-you-go model. Comparable to other products, such as Check Point, the price point was definitely a plus.
The pricing was expensive but it was comparable to the competition.
AWS is available as a AMI that you can purchase from the AWS Marketplace. Therefore, you need to purchase the licensing, since it is per AMI. Then, you deploy it on a regular EC2. Then, for on-premise, you can use both Palo Alto's software and hardware.
The price is not bad. They have a yearly renewal fee, and the pricing is exactly where we expect it to be.
I have no comment about the pricing.
Prices are very high.
It is worth the value.
It’s value for the money. It’s functionally competitive with higher priced alternative brands.
The price is very competitive and the licensing is easy.
It is more expensive than cheap routers, but it offers a lot of functionality, and that warrants the price.
Licensing is a bit costly, mostly for features requiring subscription.
It is very reasonably priced as compared to other solutions in the market.
out of 47 in Firewalls
out of 47 in Firewalls
Compared 26% of the time.
Compared 11% of the time.
Compared 9% of the time.
Compared 24% of the time.
Compared 22% of the time.
Compared 13% of the time.
|Palo Alto Networks||Sophos|
The VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Amazon Web Services, Microsoft, Citrix and KVM.
The VM-Series natively analyzes all traffic in a single pass to determine the application identity, the content within, and the user identity. These core elements of your business can then be used as integral components of your security policy, enabling you to improve your security efficacy through a positive control model and reduce your incident response time though complete visibility into applications across all ports.
In both private and public cloud environments, the VM-Series can be deployed as a perimeter gateway, an IPsec VPN termination point, and a segmentation gateway, protecting your workloads with application enablement and threat prevention policies.
|Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective.|
Learn more about Palo Alto Networks VM-Series
Learn more about Sophos Cyberoam UTM
|Warren Rogers Associates||Gulf Corporation for Technology, Maridive & Oil Services, Fidelity Bank, Petra University, Capital FM Kenya, Safari Park Hotel and Casino, Mayfair Casino, Pacific International Lines, Mozambique Ministry of Education, University of Namibia, Royal Hospital for Neuro-disability, University of Hawai, New Delhi Municipal Council|
No Data Available
Non Tech Company7%
Financial Services Firm7%
Mining And Metals Company7%
Financial Services Firm13%
Comms Service Provider9%
Non Tech Company7%