Try our new research platform with insights from 80,000+ expert users
reviewer1042635 - PeerSpot reviewer
Science Technician at a government with 201-500 employees
Real User
Effective load balancer, easy to use, but needs better documentation
Pros and Cons
  • "The main features I have found best are the load balancer and ease of use."
  • "In my experience the solution can be easier to configure with more documentation, we need more training."

What is our primary use case?

I use the solution as a firewall to protect my network and the two main computers for our website.

What is most valuable?

The main features I have found best are the load balancer and ease of use.

What needs improvement?

In my experience the solution can be easier to configure with more documentation, we need more training.

For how long have I used the solution?

I have been using the solution for a short time.

Buyer's Guide
Sophos Cyberoam UTM
November 2024
Learn what your peers think about Sophos Cyberoam UTM. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
823,875 professionals have used our research since 2012.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable. We had approximately 500 users using the solution.

Which solution did I use previously and why did I switch?

I was using Kerio Control before this solution and I liked some of the features but we only used it for a short time.

How was the initial setup?

The solution was easy to install, it was straightforward. It took approximately three hours to configure it. We have one security and network administrators for the maintenance of the solution.

What about the implementation team?

We have used consultants in the past for the implementation.

What's my experience with pricing, setup cost, and licensing?

There is a license for this solution and it is priced competitively. We paid approximately $2,000 for the license.

What other advice do I have?

We stopped using the solution because we needed more training and the documentation needed improvements.

I would recommend this solution to others.

I rate Sophos Cyberoam UTM a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Executive at a mining and metals company with 10,001+ employees
Vendor
It's easy to manage and handle. BW management and BW quota with limitation policy is easily deployed. The dashboard could be improved.

What is most valuable?

It's easy to manage and handle. BW management and BW quota with limitation policy is easily deployed.

How has it helped my organization?

Flat network was there and internet surfing was high. To minimise the risk and BW allocation, Cyberoam is used and it is very productive.

What needs improvement?

The dashboard could be improved.

For how long have I used the solution?

Since 2013

What was my experience with deployment of the solution?

We've had no issues with deployment.

What do I think about the stability of the solution?

We've had no issues with stability.

What do I think about the scalability of the solution?

We've had no issues with scalability.

How are customer service and technical support?

Customer Service:

8 out of 10

Technical Support:

9

Which solution did I use previously and why did I switch?

Yes

How was the initial setup?

The setup was not complex.

What about the implementation team?

We implemented it in-house.

What was our ROI?

The ROI is satisfactory.

Which other solutions did I evaluate?

We evaluated Dell Sonic.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Sophos Cyberoam UTM
November 2024
Learn what your peers think about Sophos Cyberoam UTM. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
823,875 professionals have used our research since 2012.
IT Support Engineer at a wholesaler/distributor with 201-500 employees
Real User
Solid provider of protection services but needs improved reporting
Pros and Cons
  • "The most valuable feature of this product is the threat protection."
  • "The reporting should be improved as well as the backup."

What is our primary use case?

My primary use case of this product is as threat protection services and it works well. 

How has it helped my organization?

This solution has improved my organization because it provides different angles. 

What is most valuable?

The most valuable feature of this product is the threat protection.

What needs improvement?

The reporting should be improved as well as the backup. 

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

The stability of the product is good. 

What do I think about the scalability of the solution?

The scalability of this product needs improvement.

How is customer service and technical support?

I have not used tech support. 

How was the initial setup?

I was not involved with the setup of the product.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user462609 - PeerSpot reviewer
Head of IT Services at a security firm with 10,001+ employees
Vendor
Helps us to aggregate/manage bandwidth from two ISPs, as a fail-safe
Pros and Cons
  • "Bandwidth Management and aggregation. It is valuable for combining two ISPs. Switching to a secondary/redundant ISP is thus seamless, in the event that the primary ISP goes down. The Bandwidth Management is also valuable for limiting heavy downloaders that may impact negatively on the experience of other users."
  • "Needs a mail alert/notification when the device loses any of its connections, during ISP redundancy implementation."

How has it helped my organization?

Helps us to aggregate/manage bandwidth from two ISPs, as a fail-safe.

What is most valuable?

Bandwidth Management and aggregation. It is valuable for combining two ISPs. Switching to a secondary/redundant ISP is thus seamless, in the event that the primary ISP goes down. 

The Bandwidth Management is also valuable for limiting heavy downloaders that may impact negatively on the experience of other users.

What needs improvement?

Needs a mail alert/notification when the device loses any of its connections, during ISP redundancy implementation.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

No stability issues.

What do I think about the scalability of the solution?

No scalability issues.

Which solution did I use previously and why did I switch?

No previous solution.

How was the initial setup?

My network engineers were able to find their way around it in a short time.

What's my experience with pricing, setup cost, and licensing?

It’s value for the money.

Which other solutions did I evaluate?

Check Point, Fortinet.

What other advice do I have?

I give it an eight out of 10. It’s functionally competitive with higher priced alternative brands.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user593490 - PeerSpot reviewer
Senior Network and Security Engineer
Real User
Helps control bandwidth use and enhances connectivity and security to remote locations
Pros and Cons
  • "The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations."
  • "The following could be improved: Web Filtering using wildcards; clarity regarding the firewall rules; granular reporting features."

How has it helped my organization?

The product has helped control bandwidth utilization, as well as enhanced connectivity and security to remote locations.

What is most valuable?

  1. URL filtering
  2. Content Filtering
  3. Remote Access/Site-to-Site VPN features
  4. Traffic Shaping/QoS
  5. Packet Capture

These features have helped control internet utilization and compliance in the organization.

What needs improvement?

  • Web Filtering using wildcards
  • Clarity on the firewall rules
  • Granular reporting features

What do I think about the stability of the solution?

No stability issues.

What do I think about the scalability of the solution?

No scalability issues.

How are customer service and technical support?

Tech support is good.

Which solution did I use previously and why did I switch?

Yes, I used other solutions previously. This product provides more technical options to solve critical issues.

How was the initial setup?

The initial setup was straightforward, without any issues.

What's my experience with pricing, setup cost, and licensing?

Contact partners for more information about pricing and licensing.

Which other solutions did I evaluate?

I evaluated Checkpoint, FortiGate and Cisco Firepower.

What other advice do I have?

The product is stable, and after migrating to the SFOS it is much better.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
P Choudhary - PeerSpot reviewer
P Choudharynetwork security engineer at Aadhar Infonet Pvt Ltd
Real User

awasome Dost

it_user395232 - PeerSpot reviewer
IT Consultant & Network Engineer at a tech services company with 1-10 employees
Consultant
​All in one UTM appliance.
Pros and Cons
  • "All in one UTM appliance."
  • "Smaller CR15 units don’t have a hard disc or built in IView software. These units could do with that feature."

How has it helped my organization?

Secure SSL VPN out of the box appliance. It just works; good web and spam filtering.

What is most valuable?

All in one UTM appliance.

What needs improvement?

Smaller CR15 units don’t have a hard disc or built in IView software. These units could do with that feature.

What do I think about the stability of the solution?

Very early CR15 unit prone to freeze.

What do I think about the scalability of the solution?

No, as long as you specify the user capacity you should be OK.

How are customer service and technical support?

When Cyberoam owned the product it was excellent. Now Sophos owns it and it's not as good.

Which solution did I use previously and why did I switch?

We used to use Fortinet UTM, but Cyberoam is much better in terms of virus scanning, web filtering and spam filtering.

How was the initial setup?

Very easy to set up.

What's my experience with pricing, setup cost, and licensing?

Licensing is very good value for the money.

Which other solutions did I evaluate?

No, we didn’t evaluate other products apart from Fortinet.

What other advice do I have?

Training is essential.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user2721 - PeerSpot reviewer
IT Administrator at a tech services company with 51-200 employees
Consultant
All in One, Outstanding UTM for complete Network protection and Management

Valuable Features:

Outstanding and must have product for efficient and effective network security. Cyberoam is the only identity-based UTM solution. It offers a well-coordinated protection through tightly integrated security solutions over a single interface.Most UTMs only offer IP-address based security. Cyberoam is the only UTM solution that offers user identity-based security, protecting enterprises from unpredictable, insider threats.Functioning with Layer 8 technology, Cyberoam gives complete visibility into “Who is doing What” in the network and allows policies to be created at the user level based on work profiles. Considering Active High Availability, load balancing, failover mechanism, bandwidth management capabilities and other features, it is worth buying.

Room for Improvement:

Policy configuration and implementation is a bit lengthy process. Nothing else of any significance that we found but yes, it is a bit pricey.

Other Advice:

After implementing Cyberoam UTM in our data-center. We tested it by initiating various kind of DDOS attacks. Cyberoam identified every attack, notified us about it and prevented the network from any kind of damage and disturbance. It controls bandwidth to a great extent by use of policy for single user to groups. Easy deployment, good hardware specification, classy reporting tools, no user count restrictions etc. A features-packed and powerful UTM appliance at the higher end of the price spectrum, but worth it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user231909 - PeerSpot reviewer
Presales Engineer at a tech company with 201-500 employees
Consultant
It has good performance but their quality control needs to be improved.

What is most valuable?

  • Web filtering
  • Application filtering
  • IPS
  • QoS

How has it helped my organization?

I used to work for a Cyberoam distributor. In one of my projects, I deployed it in a university with 1500 users (students), all of whom had different QoS and web category policies, different authentication policies. I then had to connect the university’s branches, in different cities, with a Site to Site VPN using AD authentication available for just the account. This was to restrict access only to the accounting application server of the other branch. It was quite complicated to do, but it was very successful.

In another project for a bank, I secured a banking application server and attached a database using two Cyberoam devices on the edge, with a Juniper device in the middle. This was for securing three different segments - internal users, internal developers and external visitors. The final topology was so secure that, even for some testing purposes, we were not able to break in to change the configuration and access the system as a third party.

What needs improvement?

Not very often, but there are some minor bugs in the products. I think their quality control can improve.

For how long have I used the solution?

I’ve used it since 2008, so seven years so far.It is a complex product so I’d rate the performance and number of features as 10/10, and 7/10 for the consistency and programing.

What was my experience with deployment of the solution?

Generally speaking, the Cyberoam development is quite simple, easy and straight forward. Overall it depends on the network complexity.

What do I think about the stability of the solution?

Compared to a Cisco router, Cyberoam UTMs need to be restarted more often. From my point of view, this is acceptable, since many aspects of the product functions in layer seven, while a Cisco router just routes!

What do I think about the scalability of the solution?

Since all the products models from the smallest to the strongest have the same features and capabilities, I can say that the product is extremely scalable. However, if you need to upgrade the whole device to a stronger model, I would say scalability is 8/10, which considering the differences between the number of ports in different models (I could even give 9/10, but let’s stay with 8/10!).

How are customer service and technical support?

Customer Service:

It really depends on the retailer, representative and local distributor. Nothing much to say.

Technical Support:

One of the most considerable advantages of Cyberoam over the competitors is the after sales support. The 24/7 support assists the customers, even from minor to very major issues, and they chase up the issue until the final resolution by email and phone. They are really trustworthy.

Which solution did I use previously and why did I switch?

In a different continent, a different company, and as a customer (not a distributor) I still used the same brand, Cyberoam! It’s cheap, flexible, easy to configure and easy to manage.

How was the initial setup?

I’ve been using the product for ages and I have deployed it in hundreds of networks and complexities. However, using the configuration wizard, the initial configuration is extremely easy and straightforward (depending on the network complexity of course).

What about the implementation team?

I have always installed it myself.

What's my experience with pricing, setup cost, and licensing?

It's hard to estimate, as it depends on the complexity, and scale of the network.It takes anywhere from one day to less than a week in normal situations.

Which other solutions did I evaluate?

I have evaluated Juniper, WatchGuard and a couple of minor brands. So far, I can still raise the flag of Cyberoam.

What other advice do I have?

Since the features on the model are the same, and it is just the hardware that gets improved for higher models, I usually advise a model one and a half times bigger than the number of the network users. For instance a 1000 user network can be easily served by a 1500NG. However based on my experience, since not all the users are active simultaneously, even 1 to 1 is sufficient. Considering the capability of HA, expansion is simple if needed.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user216420 - PeerSpot reviewer
it_user216420Sr network Administrator at a tech services company with 1,001-5,000 employees
Consultant

Very elaborated review with good categorization....

See all 2 comments