


Sophos Cyberoam UTM and Cisco Meraki MX compete in the network security solutions category. Cisco Meraki MX appears to have the upper hand due to its ease of management through cloud capabilities.
Features: Sophos Cyberoam UTM provides a robust security suite featuring antivirus protection, comprehensive web and application-level filtering, and identity-based policy creation. This makes it suitable for diverse business sizes with effective bandwidth management. Cisco Meraki MX offers cloud-managed unified threat management, auto VPN, and intuitive dashboards, emphasizing simplified remote management and SD-WAN functionalities.
Room for Improvement: Sophos Cyberoam UTM faces performance issues under high traffic and lacks flexibility due to an ASIC-based architecture alongside high pricing concerns. Cisco Meraki MX is constrained by its lack of advanced enterprise features, complex setup, and high licensing costs. Both products present financial challenges, with Cyberoam’s architectural limitations and Meraki's costs being significant concerns.
Ease of Deployment and Customer Service: Sophos Cyberoam UTM is primarily deployed on-premises, offering versatility for diverse infrastructure setups and is noted for excellent 24/7 customer support. Cisco Meraki MX stands out in cloud deployment scenarios, ensuring smooth integration for remote management and garnering positive feedback for its customer service, albeit slightly lower than the satisfaction levels with Cyberoam's service.
Pricing and ROI: Sophos Cyberoam UTM is competitively priced and regarded as cost-effective with varied licensing options, though some users find it pricey. Cisco Meraki MX is more expensive but appreciated for its cloud-managed solutions and advanced security licenses. Both offer satisfactory ROI, Cyberoam noted for management efficiency and Cisco Meraki for reducing travel expenses and effective remote management.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
As a solution provider, when I encounter problems, I connect directly with Fortinet support, and they provide solutions within a very short time.
When we raise a ticket with Meraki MX, they instantly become available to support us for configurations or troubleshooting.
Cisco's TAC support for Cisco Meraki MX is excellent because no other OEM provides support at this level.
Cisco is one of the best vendors in the market.
They resolve issues timely once connected.
Technical support is effective and responsive.
I would rate their technical support a solid nine out of ten.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
When you have hundreds of thousands of people it is very difficult to scale in Meraki.
We have Juniper solutions, and I would say the Juniper solutions can scale better, however, this solution is still very scalable.
The biggest one is for 120 users, but our company is a big one.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
There have been no outages, no stability issues, and we have not found any vulnerabilities during security audits.
When considering Sophos XG, which we also use, the logging and reporting functionality is notably more efficient.
These sessions should be around five to ten minutes long, allowing users and partners to quickly grasp the information without disrupting their daily tasks.
The solution should be able to implement machine learning and analytics of all the logs for threat detection and protection.
It should automatically remediate and find out the issue and then resolve it on its own without interrupting the work of the employees.
Data is the only path, so optimization is essential.
An improvement would be to use Cisco Meraki MX as a software solution as well, which might reduce the cost.
It would be beneficial if phone calls or SMS for two-factor authentication were available.
Sophos Cyberoam UTM should move in the direction of AI capabilities, as the world is moving toward AI.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
I get it for $25,000, a device that can connect up to 75-100 users, whereas in Meraki MX, it goes to 75,000-80,000 per access point.
The price could be reduced by around 30% to make it more comfortable.
In terms of pricing, I would say it is not the cheapest, but it was comparable to the others.
The price is appropriate, but if you want the real truth, it's actually quite expensive.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
The most valuable feature of FortiGate is FortiView which provides proactive monitoring.
We got a firewall and gave an SSL VPN to my client to connect to their servers, after which, such kind of activities involving ransomware attacks stopped.
Meraki MX is among those top solutions in their exceptional approach towards VPN-less, Zero Trust client access to office private networks.
Advanced security is the second tier of Cisco Meraki MX. It brings you the main next-generation firewalling features such as URL filtering, advanced malware protection, and threat protection.
We understand that Cisco solutions are very reliable, and we really like the simple management.
It provides bandwidth management, category management of websites, blocking certain elements, IPS blocking, DDoS protection, and VPN management between sites and clients.
I assess the benefit of Sophos Cyberoam UTM's centralized management for multi-appliance handling as a welcome feature because you can manage all the devices at one location, giving you notifications of downtime and updates without necessarily logging into each appliance, so that central management is a very genius move.
The way the rule sets are configured makes it an easily understandable way to manage.
| Product | Market Share (%) |
|---|---|
| Fortinet FortiGate | 31.9% |
| Cisco Meraki MX | 10.0% |
| Sophos Cyberoam UTM | 1.3% |
| Other | 56.800000000000004% |



| Company Size | Count |
|---|---|
| Small Business | 357 |
| Midsize Enterprise | 132 |
| Large Enterprise | 188 |
| Company Size | Count |
|---|---|
| Small Business | 42 |
| Midsize Enterprise | 19 |
| Large Enterprise | 16 |
| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 29 |
| Large Enterprise | 17 |
Fortinet FortiGate is a versatile network security tool offering features like VPN, firewall, web filtering, intrusion prevention, and scalability. It is known for its performance and integration with other Fortinet products, making it a preferred choice for robust cybersecurity.
Fortinet FortiGate stands out as a comprehensive cybersecurity solution with strong performance and ease of configuration. It delivers unified threat management, integrating features such as dynamic routing, SD-WAN support, and centralized management. Despite its strengths, improvements in the web interface's stability, pricing structures, and reporting capabilities are needed. Users seek better integration with third-party tools and automation advancements to enhance the experience further. These enhancements, alongside improvements in bandwidth management and the reduction of licensing costs, are points of interest for users looking to capitalize on FortiGate's extensive capabilities.
What are Fortinet FortiGate's key features?Fortinet FortiGate is widely implemented across industries as a primary firewall system for securing internet gateways and safeguarding data centers. It supports businesses in achieving SD-WAN integration and enhances cybersecurity by providing essential features like antivirus, web filtering, and application control. Enterprises utilize FortiGate for securing remote connections and ensuring compliance with security standards, making it adaptable for different network sizes and industries.
Cisco Meraki MX offers cloud-managed security with user-friendly setup and efficient management, enhancing VPN and firewall functionalities for businesses.
Cisco Meraki MX is known for its robust cloud-based network management, featuring AutoVPN, SD-WAN, and advanced security. Its centralized control over firewall, traffic shaping, and monitoring ensures excellent connectivity and security. The interface allows easy management by non-technical staff, offering remote access and seamless network performance through real-time alerts and troubleshooting. It supports global connectivity with minimal effort, addressing needs across small to enterprise environments. Despite its strengths, users point out areas needing improvement like load balancing, VPN features, more flexible logging, and session capabilities. Pricing, integration limits, and licensing need enhancement.
What are the key features of Cisco Meraki MX?In industries like retail, finance, and education, Cisco Meraki MX provides enhanced security and connectivity. Retail chains benefit from easy VPN setups for secure multi-site networking, while educational institutions find value in its ability to manage large campuses efficiently. Financial services leverage its robust security features to protect sensitive data, ensuring compliance and trust.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.