We performed a comparison between Check Point CloudGuard Network Security and Sophos Cyberoam UTM based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The IPsec tunnels are very easily created, and quite interoperable with devices from other vendors."
"The SD-WAN feature is the most valuable. This feature evolved from link load balancing. It has helped us in terms of our uptime and privatizing applications whenever we experience an outage. The SD-WAN feature has been a plus for us. Two-factor authentication has allowed us to add more users in terms of remote working. We have two-factor authentication for remote workers to authenticate them before they get on the network."
"The network security and cloud security are most valuable."
"The features that prevent internet connections, the filtering are the most valuable because we did not have any internet protection before."
"This product is definitely scalable."
"Easy to implement, and it is also reliable."
"The solution is very user friendly. The user interface in particular is quite nice."
"Good load balancing feature."
"The capability to auto-scale in or out, depending on the resource demand is great."
"Additionally, the centralized reporting and management, accessible through a single pane of glass, offer consistency and efficiency across multi-cloud environments."
"This solution has good scalability and stability."
"The initial setup is pretty easy."
"The most valuable feature for us is the simplicity of creating this environment. Even though our current cloud usage is limited, the process of setting up machines in the product and establishing an HR system was straightforward."
"The program is very stable."
"We are using gateways, and I appreciate the high-availability gateways they have. They stand out more than the competitors."
"The IPS, application and URL filtering, as well as Identity Awareness, are all very valuable features."
"I found that the best feature of Sophos Cyberoam UTM is reporting. Its reporting feature is excellent, fast, and easy to prep and launch."
"The most valuable feature of this product is the threat protection."
"In some circumstances, the malware functionality is the most important feature, and in other cases, some other features."
"You can geofence yourself if there is an incoming attack or a continuous ping from a company outside your country."
"SD-WAN and IPSec features are valuable to me."
"The most valuable feature of the solution stems from the fact that it is a very strong product with good support."
"The product, itself, doesn't seem to have any bugs or glitches."
"All in one UTM appliance."
"Fortinet needs more memory to save the log files. We need it to save the logs on the hardware and not in the cloud. I know this feature is available in FortiCloud, but if we need this log locally, it is not available."
"There is room for improvement related to the logging and reporting aspect."
"There are some license issues. Not every feature must have a separate license. There must be some of kind synergy between the license so we don't have to pay for every individual license that we would like to have."
"They should improve high CPU and memory usage that occurs."
"The search tool needs improvement. It's very difficult to search for policies right now."
"The cloud management and automation capability could be improved."
"It could use more templates for third-party site-to-site VPN setups other than FortiGate and Cisco."
"They should offer special pricing to premium partners and customers."
"There is room for improvement in addressing bugs and support issues."
"The operations require skilled manpower with extended experience of working with networking systems for better results."
"The product needs to offer multi-tenancy."
"The business and product development team should introduce a high-end feedback collection mechanism and analyze the customer requirements constructively."
"The solution needs to support more hypervisors."
"The product needs to improve support. They don't consider my case the number one priority even though I want a quick resolution."
"CheckPoint CloudGuard could be better at solving cases."
"The initial setup is difficult. It took me three tries to get it right. The setup took two or three hours."
"The blocking needs to be improved."
"The reports need to be more detailed and granular."
"Sophos Cyberoam UTM could improve by adding VPN site-to-site capabilities. The correct version does not work with Microsoft Azure Cloud."
"Maybe network traffic analysis for malware and malicious behavior."
"It is not a scalable product. This is because if you want to increase the capacity of the solution, then you have to change the device."
"Sophos Cyberoam UTM could have a more advanced reporting function."
"Sophos VPN connectivity could be improved, as it can be lengthy, and users take longer to connect"
"The configuration requires an expert to be set up, so it could be made simpler."
More Check Point CloudGuard Network Security Pricing and Cost Advice →
Check Point CloudGuard Network Security is ranked 5th in Unified Threat Management (UTM) with 121 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Check Point CloudGuard Network Security is rated 8.6, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Check Point CloudGuard Network Security writes "Highly reliable, great visibility, and centralized management". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Check Point CloudGuard Network Security is most compared with VMware NSX, Azure Firewall, Akamai Guardicore Segmentation, Cisco Secure Firewall and Fortinet FortiGate-VM, whereas Sophos Cyberoam UTM is most compared with Cisco Secure Firewall, Netgate pfSense, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Check Point CloudGuard Network Security vs. Sophos Cyberoam UTM report.
See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.