


Find out in this report how the two Firewalls solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
Check Point Harmony SASE (formerly Perimeter 81) blocked access to those URLs at the network level before users could click through.
We are saving 40% of our time, which is good.
I have seen a return on investment with Sophos UTM, and I can share that the price is around thirty percent better, especially if you count in the employee time.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
As a solution provider, when I encounter problems, I connect directly with Fortinet support, and they provide solutions within a very short time.
I would rate support 10 out of 10.
People working really hard, listening to every issue and request, and replying within hours.
The technical support by Sophos is amazing, especially when I pay for the enhanced support.
I would rate the technical support by Sophos a 10.
I would rate the technical support with Sophos a seven because sometimes the time of the first resolution is not ideal.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
The cloud-native model ensures we are not tied to any specific location or hardware, which has been a great game changer in terms of agility.
I would rate it nine out of ten for scalability.
Check Point Harmony SASE's scalability is good; it can handle growth easily, allowing me to easily add another region and gateway to have more people join in.
You can have high availability clusters, so very, very scalable in my opinion.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
Check Point Harmony SASE is stable most of the time, but there are still some issues that are hard to troubleshoot.
When considering Sophos XG, which we also use, the logging and reporting functionality is notably more efficient.
These sessions should be around five to ten minutes long, allowing users and partners to quickly grasp the information without disrupting their daily tasks.
The solution should be able to implement machine learning and analytics of all the logs for threat detection and protection.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
One area for improvement is integration with third-party identity providers.
The product is lacking features that other competitors have, making it quite challenging to migrate customers to this solution because it feels very much unfinished.
If you want to really implement some rules that are a little bit more difficult, Sophos always recommends getting the dedicated WAF, or web application firewall, but I would prefer to have more features on the web application firewall in the firewall itself because it would make more sense.
I would prefer to see additional features in the next release of Sophos UTM because cyber crime increases every day, so we also need to improve our game to prevent any chances for intrusion.
I would love to see artificial intelligence capabilities integrated into Sophos UTM.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
The cost is a bit expensive for most users.
It is a bit expensive.
Pricing has become expensive recently due to the dollar hike and naira value changes in Nigeria.
The value between what I receive and what I pay is the best in the industry.
The pricing would be more economical if sold directly to the user compared to going through a partner, as they need to take their percentage.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
The most valuable feature of FortiGate is FortiView which provides proactive monitoring.
We got a firewall and gave an SSL VPN to my client to connect to their servers, after which, such kind of activities involving ransomware attacks stopped.
The firewall management is the most valuable feature for me.
The Zero Trust Network Access (ZTNA) feature is a major highlight as it gives users seamless and secure access to internal resources without requiring a full-blown VPN, which improves both security and user experience.
The Zero Trust and segmentation have helped my team and our customers significantly because we are able to protect every scope and allow the work-from-home users to access internal resources while passing through a threat prevention gateway, ensuring that everything is safe.
The zero-day protection and firewall rules are some of the most effective features for threat management.
It helps us quite a lot, especially because since we use Sophos UTM, malware intrusions are not rampant.
Sophos UTM's valuable features include the cost, which is very competitive when compared with other vendors, balanced with the features that it delivers.



| Company Size | Count |
|---|---|
| Small Business | 357 |
| Midsize Enterprise | 132 |
| Large Enterprise | 188 |
| Company Size | Count |
|---|---|
| Small Business | 52 |
| Midsize Enterprise | 19 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 74 |
| Midsize Enterprise | 28 |
| Large Enterprise | 25 |
Fortinet FortiGate is a versatile network security tool offering features like VPN, firewall, web filtering, intrusion prevention, and scalability. It is known for its performance and integration with other Fortinet products, making it a preferred choice for robust cybersecurity.
Fortinet FortiGate stands out as a comprehensive cybersecurity solution with strong performance and ease of configuration. It delivers unified threat management, integrating features such as dynamic routing, SD-WAN support, and centralized management. Despite its strengths, improvements in the web interface's stability, pricing structures, and reporting capabilities are needed. Users seek better integration with third-party tools and automation advancements to enhance the experience further. These enhancements, alongside improvements in bandwidth management and the reduction of licensing costs, are points of interest for users looking to capitalize on FortiGate's extensive capabilities.
What are Fortinet FortiGate's key features?Fortinet FortiGate is widely implemented across industries as a primary firewall system for securing internet gateways and safeguarding data centers. It supports businesses in achieving SD-WAN integration and enhances cybersecurity by providing essential features like antivirus, web filtering, and application control. Enterprises utilize FortiGate for securing remote connections and ensuring compliance with security standards, making it adaptable for different network sizes and industries.
Check Point Harmony SASE, formerly Perimeter 81, offers robust security features like split tunneling, MFA, and Zero Trust Network Access focused on secure remote access and optimized connectivity for remote teams.
Check Point Harmony SASE delivers advanced security through a user-friendly interface, efficient VPN connections, and a centralized management console. It enhances security with real-time threat intelligence from ThreatCloud and traffic management via built-in optimization. Firewall as a Service and Secure Web Gateway safeguard against unauthorized access and phishing. While users seek enhanced networking customizations and better integration with identity providers, there's an emphasis on improving reporting, real-time analytics, and policy management. Requests also include a Chrome extension, traffic balancing, and simplified configuration to address some resource-intensive aspects.
What are the key features of Check Point Harmony SASE?
How can organizations benefit from using Check Point Harmony SASE?
Check Point Harmony SASE is used across industries for secure remote access and connectivity, protecting sensitive data, and managing access to corporate resources. It is ideal for those with hybrid cloud models and requires comprehensive security measures combined with existing IT infrastructures to meet specific industry demands.
Sophos UTM is a unified threat management platform designed to protect your businesses from known and emerging malware including viruses, rootkits and spyware. The solution provides a complete network security package with everything your organization needs in a single modular appliance.
Sophos UTM Features
Sophos UTM has many valuable key features. Some of the most useful ones include:
Sophos UTM Benefits
There are many benefits to implementing Sophos UTM. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by PeerSpot users currently using the Sophos UTM solution.
PeerSpot user Dana B., Network Administrator at a manufacturing company, says “The web and email filtering are the two biggest and most valuable aspects of the solution for us. The solution overall has just been a good, cost-effective solution for us. The solution offers a lot of functionality. The solution scales well. We've found the technical support to be helpful. The stability and performance are quite good.”
A Technical Director at a security firm mentions, "Sophos SG UTM had all the basic functionality that you needed. It is user-friendly and easy to manage for any integrator."
Marek M., Senior Network Engineer at a computer software company, comments, “Sophos UTM is the simplest of these products to set up. If you follow the instructions using the wizard, which is just a few steps, then you will have a firewall to protect you and your customer.”
A Software Sales Manager at a tech services company explains, “The overall visibility of the console is what I find most valuable, plus it's very user-friendly. It can be integrated with other solutions such as SOAR, SIEM, etc., even when you have an existing firewall. I really like that the console can be integrated. You'll see everything on the same window, and the single window feature of the machine is so good. These are the features I really like.”
James D., IT Manager at Manual Workers Union, states, “The fact that it's on the cloud means we don't have to administer it on our network or deal with a physical machine, which saves us money. The solution has many great features. From the console, we can start different scannings on different machines. We enjoy the centralized reporting part of it. The initial setup is simple. We enjoy its general stability. The solution can scale. So far, the solution has been problem-free.”
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.