Enhancing the user interface to achieve the same level of flexibility as the older UTM interface could improve the product. The current XG interface needs to be more consistent during configuration.
Sophos UTM needs to streamline the VPN configuration. It also needs to fix the concerns related to the solution's Port Address Translation (PAT) rule. In the future, I want Sophos UTM to provide users with sandboxing features. The scalability of the product is an area with certain shortcomings where improvements are required. Sophos should give some flexibility to users, especially when you run low on things like memory and storage. The support team's turnaround time is an area of concern where improvements are required.
The application control is really bad. It needs a lot of enhancements. The traffic shaping and bandwidth control, and application control need a lot of work. In future releases, Sophos can enhance its quality of service.
I found just one instance of a virus on somebody's email, and Sophos cut it off immediately. Then the admin said, "Oh, this is a virus. That's a new one." They found out that I hadn't updated some virus information. The virus updates will always depend on new viruses that are discovered. Maybe they can send a notification or a reminder for update time.
In Sophos UTM, there is room for improvement in certain areas. For instance, I believe that its feature known as Synchronized Security could be enhanced. The solution's technical support for India needs to be improved. I will need to think about the additional features the solution needs to include in its next release.
The UTMs are end-of-life so the web interface is not top-notch and needs more speed. There is still support for the UTMs so they are the best we have right now. The solution needs better captive portals and they could have faster UIs. An improvement to the transparent proxy would help. A user should be able to open a webpage and be redirected to the captive portal like with WIFI or XGs. From there, the user should be able to log in with a username and password to gain internet access. Many clients migrate to XG due to this missing feature.
The sanctions make it difficult for us in Iran to take full advantage of this product, like many others. It needs a better user interface. The one they have is not so good.
Information Technology Network Administrator at abl
Real User
2022-10-07T13:00:30Z
Oct 7, 2022
The reporting system needs to allow for customizations because many reports do not include details that we expect. It would be beneficial to have a security fabric feature like FortiGate that integrates with UTM devices and reports to expose issues.
Sophos UTM could improve the way the configuration has to be done. I have to do the configuration through the command line interface but if it could be done through the graphical user interface it would be much better.
The support could be better. They need to improve their email protection. Their email protection is horrible. They have an email protection license that is paid for. However, they need to improve on email protection capabilities. They need to have proper reporting. What they offer no is weird. I need to get another application to give me a clear diagram of my network. This should instead come directly from Sophos.
Sophos' new generation firewall is missing the link that provides antivirus for each computer. It would be helpful if they could add that element. The technical support used to be excellent but recently they don't seem to be able to solve our problems.
I would like to see Sophos UTM add support for all the new threat-detection technologies and the ability to respond to novel security threats that come along every day. I'm in the process of switching every UTM device in all branches to Sophos, so I need visibility into each branch to see the activity. I need alerts for any threat that enters the network. If there is unauthorized access or some specific action that can threaten my network, I want to be notified.
Sophos UTM sometimes falls short in high-availability environments. They used to launch firmware that didn't work very well in a high-availability environment.
Software Sales Manager at a tech services company with 51-200 employees
Real User
2022-01-04T21:13:00Z
Jan 4, 2022
I have no suggestions for improvement for Sophos UTM. It's been a decade and it has been a very good product throughout the Pakistan market. Pricing could be improved. After-sales service is much better. Once you have a sales team and a technical team for any product, it definitely becomes very easy to pitch or get the revenues out of that product. Flexibility in pricing matters a lot.
Technical Director at a security firm with 1-10 employees
Real User
2021-08-07T02:36:18Z
Aug 7, 2021
There were a lot of features and functionality in Sophos SG UTM but nothing was state of the art in terms of technology. You did not get the latest functions. It was very monolithic as it was based on an old Linux PuTTY system. Everything has changed in the newer version of the solution from the SG to the XG. It was a completely new reborn version. You are not able to migrate from SG to XG using scripts. it is very difficult because of the differences. There was not a simple migration path from one to the other. In the Sophos SG UTM version, you cannot have any other functions. Sophos will tell you "It's a closed version. We will not have any more functions." However, in the new version, you have a lot of new functions, and every two or three months you have new features. For example, you can use Sophos Central to synchronize both strategy policies and even security, if you are equipped with Sophos antivirus on workstation and server. If your antivirus on the workstation finds a threat, your firewall will have the information of the station, what issue it had, and what other stations it communicated with. Sophos has to enable the Intercept X or an EDR function on the firewall because for the moment, the firewall is only equipped with sandboxing or something similar. Which, is quite good but there should be something easier for the user. For example, the logs at the moment are not as simple as they are in other solutions, such as Fortinet, it is very important to have a logging tool, log reporting, or a reporting engine. We need to see logs and find information within. However, 10 years ago, we do did not care about the logs but things have changed. We need them to analyze, to have a view of some of the layers but we do not have this. They could improve by providing better log functionality and features.
It is a fine product, however, I need more endpoint protection. They should release a license for more than 50 IPs. As of now I have had some discussion about with management, and we need to do some planning and around that to see if we can change things. The pricing is too high. There are other options that are less expensive, such as Bitdefender. In fact, Bitdefender is very good, aside from lacking a firewall such as this. Beyond that, it's a very good product with central management on-premises. It would be nice if it had basic features, such as DLP (Data Loss Prevention).
Head of IT at a manufacturing company with 10,001+ employees
Real User
Top 20
2022-09-29T11:32:05Z
Sep 29, 2022
At the very least, keep existing. I will continue to use Sophos. If Sophos maintains its current ease of management, I believe I will continue to use it. I would like them to keep the features as they are. The GUI can be improved. It is not as good as Trend Micro, but I still like it. The GUI could be more user-friendly. Now, they offer a SaaS product in comparison to XDR and, TRM, which stands for automatic analysis of virus behavior or deadline. Currently, for example, when there is a threat, we analyze it ourselves, but now they offer automatic analysis because Sophos' XDR is based on cloud PCS. I would like them to include automatic analysis for virus behavior and also cloud PCS.
System Administrator at a insurance company with 51-200 employees
Real User
2022-07-20T15:12:00Z
Jul 20, 2022
I would like this solution to support ICAP. Also, they no longer support on-premises management, and are forcing clients to use centralized management via the cloud, which I don't agree with.
Senior Network Security Engineer at a tech services company with 51-200 employees
Real User
Top 5
2022-06-06T09:41:33Z
Jun 6, 2022
There's an issue that when we deploy UTM on fiber, it automatically upgrades to the latest version without giving an option to stay on the current one.
Sophos UTM could be simplified, and they can improve on the many other features, like SD-WAN and load balancing. Sophos UTM is missing a few features that their competitors have. For example, if you have multiple branches you would like to connect, the load balancing features aren't available on multilink. If we create a VPM for multiple LAN links, we cannot load balance the traffic.
In Sophos UTM there is always a problem with the routing tables. If you want to see the routing table, you have to use the UI. You can't do it via a web browser. The routing table is better in Fortinet.
I think the interface configuration could be improved. It's very complex for now. They need to provide more videos and have more documentation. I think that's missing at the moment. By chance, I found something on a video that wasn't in the documentation and it was a lifesaver. I upgraded my hardware from 100 megabytes to 1,000 megabytes and had many problems. I had to start from scratch and get someone to help me with it.
We don't need any extra features. We only use it for the servers and the workstations. We'd like to see them offer their services on mobile devices like tablets. I'm not sure if that's an option or not.
The solution needs to do better at covering mobile devices, although they may have an integrated solution for that purpose. I don't really know how it behaves when it comes to web server protection. We have no web servers of our own. I don't know how it behaves if we open our servers to the outside. My sense is that the degree of protection must be higher.
The application server needs to be improved because currently, the classification segregation of applications needs to be more defined. Also, we used to be able to open the firewall using LAN IPS but that's no longer possible and needs to be solved. I'd like to see an improvement in central categorizing. These days with all the applications and threats, getting everything filtered down needs to be a finer, more granular process. There are times when you find that a website seems to be legit, but there is a code running behind it that can act as a proxy or some kind of a bot. The sites are always logged on, but at times we have to open for a few clients or a few sites and in that time they're open to attack.
I can't recall dealing with any missing features. Lately, I've dealt more with Fortinet, and haven't focused too much on Sophos. The initial setup may be difficult for those not familiar with the product.
I'm still exploring the features and I haven't used them in totality. I think that additional metrics features are needed to be able to monitor other areas or to monitor as much as you can, at a fine-grain resolution. This would be good. Somewhat similar to what Darktrace can do. Proactively understand and using AI intelligence to monitor and see activities that are away from the norm and then proactively see how they can either isolate the quarantine system and inject it back into the system upon validation. They could explore most of the products in Symantec's and Fresh Services and run from the same file to see what additional feature one is offering. I would also like it if they could work on the price because it is expensive.
Network Administrator at a manufacturing company with 51-200 employees
Real User
2021-03-04T05:33:34Z
Mar 4, 2021
The ease of use could be a bit better. It's something they could work on. The ease of configuration could be improved. It's not as simple as it could be just yet. However, it's kind of the nature of it. They're kind of difficult to get set up sometimes. Some of the detail in the web filter and the email filtering could be better outlined in the reporting. It is not as good as the two separate standalone solutions we used previously. However, it does also gives us a lot of other stuff that those two solutions didn't. It's a trade-off.
Senior Network Engineer at a computer software company with 11-50 employees
Real User
2021-02-07T11:07:40Z
Feb 7, 2021
Sophos UTM is sensitive when it comes to setting up the SSL VPN, with the certificate. The bandwidth speeds are limited, although this could be because they're doing web filtering. They need to have the time to filter all of the traffic. The logs are not clear, which means that you need an additional piece of software in order to read them clearly. This is the main issue with Sophos UTM. Essentially, you need to spend time looking through the logs and if you want quicker access then you need to have third-party software.
Sophos has a very small crew of people who continue to work on enhancing the UTM. At some point, they had actually stopped enhancing it and the word on the street was that they weren't going to enhance it any more because everybody was going to go over to XG, but they found that 50% of their users were still on the UTM and that was five years after they'd come out with the XG line. They decided they were going to rebuild some core parts of XG, and that would take a while. It's been six years and they're still not there. The updates come out agonizingly slowly. They just trickle out and when there's a problem with an update it takes a while to sort out. It's still a viable product but the more they improve XG, the less you have a need to stick with SG.
Digital Transformation and Technological Innovation Manager at a educational organization with 501-1,000 employees
Real User
2020-12-10T05:09:53Z
Dec 10, 2020
There needs to be some improvement in the IPsec VPN. There is implementation only support. I have version one. I'd be most interested in having IP version two from the protocol.
Presales & Implementation Engineer at a tech services company with 11-50 employees
Real User
2020-11-27T12:59:00Z
Nov 27, 2020
Sophos is good for endpoint security but Trend Micro is better than Sophos. APEX is better than Sophos because it has a friendly, usable dashboard, and the implementation is very easy. Sophos should be more user-friendly, have more dashboards, and an easier implementation.
Sophos should improve its ability to check something like bandwidth consumption for users or something more real-time. real time trafic graph most show specific info from user, ip and bandwith, in my personal opinion i have seen better traffic graphs in open source firewalls.
System Administrator Server and Networks at a manufacturing company with 201-500 employees
Real User
2020-11-03T15:26:59Z
Nov 3, 2020
I think the behavior with the zones was a little bit tricky to understand at the beginning of this project. It can be hard to manage at first, but overall, we don't have many problems with this solution.
IT Architect at a consultancy with 11-50 employees
Real User
2019-11-04T21:38:00Z
Nov 4, 2019
We would be happy with fewer new features over the same time, but with more stable updates! We would like to have unique viewable IDs for rules and in the packet filter logfile, for easier debugging of old log files. Sophos UTM shouldn't die.
Network & Hardware Administrator at Nile Projects & Trading Co.
Real User
Top 20
2019-07-22T07:55:00Z
Jul 22, 2019
I would like to see the SD-WAN feature improved. I want to manage many lines and load-balance them, getting high availability by making SLA tests according to: * Check interval. * Failures before inactive. * Restore link after. * SD-WAN Rules to control bandwidth, download and upload stream.
Support for IKEv2 is needed in this solution. But, the handwriting is on the wall that Sophos will probably stop development in favor of their XG Firewall. No timeframe on that yet though.
Pre-sales manager at National Information Technology Company
Real User
Top 20
2019-04-02T07:02:00Z
Apr 2, 2019
There is definitely room for improvement with Sophos UTM. For the SG version of Sophos UTM, they can add blocking of countries in the NAT section, not only in the firewall section. When you are mapping, they should also add the ability to block countries in that section. That's not available right now. It's only available in the firewall if you want to block incoming traffic. With Sophos UTM, there is a general rule in the firewall when the country blocking can block some countries from accessing your data. In the current version, you still need to add it by putting in the IP range. This feature would be helpful for administrators and it gives them the advantage to block stuff in less time. The web filter needs additional enhancement but that's the point of the XG upgrade. If they're going to continue with the production of the XG, then they will not add the same features to the basic version of Sophos UTM.
One additional feature that should be included in the next release is synchronized security, which would enable all the security to work together as a system. Another suggestion is to add advanced threat protection (ATP) to defend against sophisticated Malware. Seeing these additional improvements would be a great thing going forward.
It does have built-in policies which enable you to disable USB devices, etc. It would be nice if they had more policies because there are not that many of them.
The UI on it could stand a little improvement. In some areas, it is a little slow and clunky. It is sometimes not easy to find something. However, once you get used to it, it is pretty normal to use.
Director of Cloud Technology at Avalere Health\Inovalon
Real User
2018-12-04T07:57:00Z
Dec 4, 2018
I would like them to move from the Classic Load Balancer to the Network Load Balancer. This would make it easier to do certain things with Amazon. They are able to do some enhancements with Network Load Balancer that they are unable to do with Classic Load Balancer.
Initially, there were problems of wireless access points not getting detected and lease lines were getting disconnected after one hour. Sophos replaced the appliance, but the issue was not resolved . The matter got escalated to their international support and the issue was identified as a bug where long distance fiber connections are used over single mode fiber. The patch was shipped by Sophos with a promise to fix the issue in the next release. Now, the appliance is working fine. The issue of wireless access points was due to some compatibility issues with the D-Link switch. I provided the Cisco 2900 series switches to connect to the wireless access points by creating a separate wireless LAN port on the firewall.
IT SM & Security Consultant at a tech services company with 1,001-5,000 employees
Consultant
2018-01-17T17:21:00Z
Jan 17, 2018
There is still room for improvement in wireless protection. I don't mean their WiFi device is bad, but there are still things to improve on, such as WiFi roaming.
Sophos UTM has many improvements that I would suggest, but the main one is for the Application Control to be managed with users as well, and with timeframes (schedules) for the administrator to allow certain apps outside an specific timeframe, or vice versa.
Sophos UTM is a unified threat management platform designed to protect your businesses from known and emerging malware including viruses, rootkits and spyware. The solution provides a complete network security package with everything your organization needs in a single modular appliance.
Sophos UTM Features
Sophos UTM has many valuable key features. Some of the most useful ones include:
Web and Email Filtering
General Management
Network Protection
Network Routing and Services
Advanced...
Enhancing the user interface to achieve the same level of flexibility as the older UTM interface could improve the product. The current XG interface needs to be more consistent during configuration.
The technical support team’s response time could be improved.
Sophos UTM needs to streamline the VPN configuration. It also needs to fix the concerns related to the solution's Port Address Translation (PAT) rule. In the future, I want Sophos UTM to provide users with sandboxing features. The scalability of the product is an area with certain shortcomings where improvements are required. Sophos should give some flexibility to users, especially when you run low on things like memory and storage. The support team's turnaround time is an area of concern where improvements are required.
The application control is really bad. It needs a lot of enhancements. The traffic shaping and bandwidth control, and application control need a lot of work. In future releases, Sophos can enhance its quality of service.
I didn't like it much. It suits only small businesses. It isn't scalable and reliable. There is a very critical issue with the power supply.
I found just one instance of a virus on somebody's email, and Sophos cut it off immediately. Then the admin said, "Oh, this is a virus. That's a new one." They found out that I hadn't updated some virus information. The virus updates will always depend on new viruses that are discovered. Maybe they can send a notification or a reminder for update time.
In Sophos UTM, there is room for improvement in certain areas. For instance, I believe that its feature known as Synchronized Security could be enhanced. The solution's technical support for India needs to be improved. I will need to think about the additional features the solution needs to include in its next release.
The UTMs are end-of-life so the web interface is not top-notch and needs more speed. There is still support for the UTMs so they are the best we have right now. The solution needs better captive portals and they could have faster UIs. An improvement to the transparent proxy would help. A user should be able to open a webpage and be redirected to the captive portal like with WIFI or XGs. From there, the user should be able to log in with a username and password to gain internet access. Many clients migrate to XG due to this missing feature.
The sanctions make it difficult for us in Iran to take full advantage of this product, like many others. It needs a better user interface. The one they have is not so good.
Sophos UTM's internet security could be better.
The reporting system needs to allow for customizations because many reports do not include details that we expect. It would be beneficial to have a security fabric feature like FortiGate that integrates with UTM devices and reports to expose issues.
Sophos UTM could improve the way the configuration has to be done. I have to do the configuration through the command line interface but if it could be done through the graphical user interface it would be much better.
The support could be better. They need to improve their email protection. Their email protection is horrible. They have an email protection license that is paid for. However, they need to improve on email protection capabilities. They need to have proper reporting. What they offer no is weird. I need to get another application to give me a clear diagram of my network. This should instead come directly from Sophos.
Sophos' new generation firewall is missing the link that provides antivirus for each computer. It would be helpful if they could add that element. The technical support used to be excellent but recently they don't seem to be able to solve our problems.
The reporting could be a lot better and technical support could be improved.
I would like to see Sophos UTM add support for all the new threat-detection technologies and the ability to respond to novel security threats that come along every day. I'm in the process of switching every UTM device in all branches to Sophos, so I need visibility into each branch to see the activity. I need alerts for any threat that enters the network. If there is unauthorized access or some specific action that can threaten my network, I want to be notified.
Sophos UTM sometimes falls short in high-availability environments. They used to launch firmware that didn't work very well in a high-availability environment.
I have no suggestions for improvement for Sophos UTM. It's been a decade and it has been a very good product throughout the Pakistan market. Pricing could be improved. After-sales service is much better. Once you have a sales team and a technical team for any product, it definitely becomes very easy to pitch or get the revenues out of that product. Flexibility in pricing matters a lot.
There were a lot of features and functionality in Sophos SG UTM but nothing was state of the art in terms of technology. You did not get the latest functions. It was very monolithic as it was based on an old Linux PuTTY system. Everything has changed in the newer version of the solution from the SG to the XG. It was a completely new reborn version. You are not able to migrate from SG to XG using scripts. it is very difficult because of the differences. There was not a simple migration path from one to the other. In the Sophos SG UTM version, you cannot have any other functions. Sophos will tell you "It's a closed version. We will not have any more functions." However, in the new version, you have a lot of new functions, and every two or three months you have new features. For example, you can use Sophos Central to synchronize both strategy policies and even security, if you are equipped with Sophos antivirus on workstation and server. If your antivirus on the workstation finds a threat, your firewall will have the information of the station, what issue it had, and what other stations it communicated with. Sophos has to enable the Intercept X or an EDR function on the firewall because for the moment, the firewall is only equipped with sandboxing or something similar. Which, is quite good but there should be something easier for the user. For example, the logs at the moment are not as simple as they are in other solutions, such as Fortinet, it is very important to have a logging tool, log reporting, or a reporting engine. We need to see logs and find information within. However, 10 years ago, we do did not care about the logs but things have changed. We need them to analyze, to have a view of some of the layers but we do not have this. They could improve by providing better log functionality and features.
The integration capabilities could be better.
It is a fine product, however, I need more endpoint protection. They should release a license for more than 50 IPs. As of now I have had some discussion about with management, and we need to do some planning and around that to see if we can change things. The pricing is too high. There are other options that are less expensive, such as Bitdefender. In fact, Bitdefender is very good, aside from lacking a firewall such as this. Beyond that, it's a very good product with central management on-premises. It would be nice if it had basic features, such as DLP (Data Loss Prevention).
In the next release, the solution should contain an administration security user to access the interface.
At the very least, keep existing. I will continue to use Sophos. If Sophos maintains its current ease of management, I believe I will continue to use it. I would like them to keep the features as they are. The GUI can be improved. It is not as good as Trend Micro, but I still like it. The GUI could be more user-friendly. Now, they offer a SaaS product in comparison to XDR and, TRM, which stands for automatic analysis of virus behavior or deadline. Currently, for example, when there is a threat, we analyze it ourselves, but now they offer automatic analysis because Sophos' XDR is based on cloud PCS. I would like them to include automatic analysis for virus behavior and also cloud PCS.
The VPN could be better. We need a better VPN client for the customers. We'd like better logging.
I would like this solution to support ICAP. Also, they no longer support on-premises management, and are forcing clients to use centralized management via the cloud, which I don't agree with.
They could use more SSL VPN support. We'd like the setup to be even easier, if possible.
Sophos UTM's firewall is a bit weak, and some of its features lack depth compared to other products like F5.
There's an issue that when we deploy UTM on fiber, it automatically upgrades to the latest version without giving an option to stay on the current one.
Sophos UTM could be simplified, and they can improve on the many other features, like SD-WAN and load balancing. Sophos UTM is missing a few features that their competitors have. For example, if you have multiple branches you would like to connect, the load balancing features aren't available on multilink. If we create a VPM for multiple LAN links, we cannot load balance the traffic.
In Sophos UTM there is always a problem with the routing tables. If you want to see the routing table, you have to use the UI. You can't do it via a web browser. The routing table is better in Fortinet.
I think the interface configuration could be improved. It's very complex for now. They need to provide more videos and have more documentation. I think that's missing at the moment. By chance, I found something on a video that wasn't in the documentation and it was a lifesaver. I upgraded my hardware from 100 megabytes to 1,000 megabytes and had many problems. I had to start from scratch and get someone to help me with it.
We don't need any extra features. We only use it for the servers and the workstations. We'd like to see them offer their services on mobile devices like tablets. I'm not sure if that's an option or not.
The solution needs to do better at covering mobile devices, although they may have an integrated solution for that purpose. I don't really know how it behaves when it comes to web server protection. We have no web servers of our own. I don't know how it behaves if we open our servers to the outside. My sense is that the degree of protection must be higher.
The application server needs to be improved because currently, the classification segregation of applications needs to be more defined. Also, we used to be able to open the firewall using LAN IPS but that's no longer possible and needs to be solved. I'd like to see an improvement in central categorizing. These days with all the applications and threats, getting everything filtered down needs to be a finer, more granular process. There are times when you find that a website seems to be legit, but there is a code running behind it that can act as a proxy or some kind of a bot. The sites are always logged on, but at times we have to open for a few clients or a few sites and in that time they're open to attack.
I can't recall dealing with any missing features. Lately, I've dealt more with Fortinet, and haven't focused too much on Sophos. The initial setup may be difficult for those not familiar with the product.
I'm still exploring the features and I haven't used them in totality. I think that additional metrics features are needed to be able to monitor other areas or to monitor as much as you can, at a fine-grain resolution. This would be good. Somewhat similar to what Darktrace can do. Proactively understand and using AI intelligence to monitor and see activities that are away from the norm and then proactively see how they can either isolate the quarantine system and inject it back into the system upon validation. They could explore most of the products in Symantec's and Fresh Services and run from the same file to see what additional feature one is offering. I would also like it if they could work on the price because it is expensive.
We need to speed up the support.
The ease of use could be a bit better. It's something they could work on. The ease of configuration could be improved. It's not as simple as it could be just yet. However, it's kind of the nature of it. They're kind of difficult to get set up sometimes. Some of the detail in the web filter and the email filtering could be better outlined in the reporting. It is not as good as the two separate standalone solutions we used previously. However, it does also gives us a lot of other stuff that those two solutions didn't. It's a trade-off.
We are very happy with Sophos. I can't think of any pressing issues that need to be addressed.
Sophos UTM is sensitive when it comes to setting up the SSL VPN, with the certificate. The bandwidth speeds are limited, although this could be because they're doing web filtering. They need to have the time to filter all of the traffic. The logs are not clear, which means that you need an additional piece of software in order to read them clearly. This is the main issue with Sophos UTM. Essentially, you need to spend time looking through the logs and if you want quicker access then you need to have third-party software.
Monitoring and reporting are areas that need improvement.
There are things missing when it comes to policies. The web filtering capability should be improved. Anti-phishing functionality should be improved.
Sophos has a very small crew of people who continue to work on enhancing the UTM. At some point, they had actually stopped enhancing it and the word on the street was that they weren't going to enhance it any more because everybody was going to go over to XG, but they found that 50% of their users were still on the UTM and that was five years after they'd come out with the XG line. They decided they were going to rebuild some core parts of XG, and that would take a while. It's been six years and they're still not there. The updates come out agonizingly slowly. They just trickle out and when there's a problem with an update it takes a while to sort out. It's still a viable product but the more they improve XG, the less you have a need to stick with SG.
There needs to be some improvement in the IPsec VPN. There is implementation only support. I have version one. I'd be most interested in having IP version two from the protocol.
The five-factor authentication needs improvement. It needs central management.
Sophos is good for endpoint security but Trend Micro is better than Sophos. APEX is better than Sophos because it has a friendly, usable dashboard, and the implementation is very easy. Sophos should be more user-friendly, have more dashboards, and an easier implementation.
Sophos should improve its ability to check something like bandwidth consumption for users or something more real-time. real time trafic graph most show specific info from user, ip and bandwith, in my personal opinion i have seen better traffic graphs in open source firewalls.
I think the behavior with the zones was a little bit tricky to understand at the beginning of this project. It can be hard to manage at first, but overall, we don't have many problems with this solution.
We would be happy with fewer new features over the same time, but with more stable updates! We would like to have unique viewable IDs for rules and in the packet filter logfile, for easier debugging of old log files. Sophos UTM shouldn't die.
I would like to see the SD-WAN feature improved. I want to manage many lines and load-balance them, getting high availability by making SLA tests according to: * Check interval. * Failures before inactive. * Restore link after. * SD-WAN Rules to control bandwidth, download and upload stream.
Support for IKEv2 is needed in this solution. But, the handwriting is on the wall that Sophos will probably stop development in favor of their XG Firewall. No timeframe on that yet though.
Setup: Getting an exchange server to work behind Sophos is incredibly difficult with rules invoked that are simple numbers (e.g. 9054).
There is definitely room for improvement with Sophos UTM. For the SG version of Sophos UTM, they can add blocking of countries in the NAT section, not only in the firewall section. When you are mapping, they should also add the ability to block countries in that section. That's not available right now. It's only available in the firewall if you want to block incoming traffic. With Sophos UTM, there is a general rule in the firewall when the country blocking can block some countries from accessing your data. In the current version, you still need to add it by putting in the IP range. This feature would be helpful for administrators and it gives them the advantage to block stuff in less time. The web filter needs additional enhancement but that's the point of the XG upgrade. If they're going to continue with the production of the XG, then they will not add the same features to the basic version of Sophos UTM.
One additional feature that should be included in the next release is synchronized security, which would enable all the security to work together as a system. Another suggestion is to add advanced threat protection (ATP) to defend against sophisticated Malware. Seeing these additional improvements would be a great thing going forward.
* SUM cannot manage app control * Improve app control system as a whole * Extend support for SG until XG has improved significantly.
It does have built-in policies which enable you to disable USB devices, etc. It would be nice if they had more policies because there are not that many of them.
The solution could be improved by adding cloud soundboxing.
They could reduce the price.
The support needs improvement.
The printed provisioning is the primary thing that needs improvement.
The product could be simplified and made more self-explanatory.
The UI on it could stand a little improvement. In some areas, it is a little slow and clunky. It is sometimes not easy to find something. However, once you get used to it, it is pretty normal to use.
We had some problems with the configuration. They had provided a CloudFormation template, and we had to go several rounds to make it work.
I would like them to move from the Classic Load Balancer to the Network Load Balancer. This would make it easier to do certain things with Amazon. They are able to do some enhancements with Network Load Balancer that they are unable to do with Classic Load Balancer.
The memory and processing were problematic. The interface could be better.
The price is an issue to consider for improvement.
During initial configuration, I encountered a few issues.
Initially, there were problems of wireless access points not getting detected and lease lines were getting disconnected after one hour. Sophos replaced the appliance, but the issue was not resolved . The matter got escalated to their international support and the issue was identified as a bug where long distance fiber connections are used over single mode fiber. The patch was shipped by Sophos with a promise to fix the issue in the next release. Now, the appliance is working fine. The issue of wireless access points was due to some compatibility issues with the D-Link switch. I provided the Cisco 2900 series switches to connect to the wireless access points by creating a separate wireless LAN port on the firewall.
There is still room for improvement in wireless protection. I don't mean their WiFi device is bad, but there are still things to improve on, such as WiFi roaming.
Sophos UTM has many improvements that I would suggest, but the main one is for the Application Control to be managed with users as well, and with timeframes (schedules) for the administrator to allow certain apps outside an specific timeframe, or vice versa.