


Sophos Cyberoam UTM and Check Point Cloud Firewall compete in the network security space. Check Point Cloud Firewall is seen as the superior product due to its advanced features and comprehensive capabilities despite a higher cost.
Features: Sophos Cyberoam UTM offers centralized management with web and application filtering, VPN capabilities, and user-identity-based security. Check Point Cloud Firewall provides advanced threat prevention, real-time threat detection, and automation for cloud deployment, making it suitable for hybrid environments.
Room for Improvement: Sophos Cyberoam UTM needs enhancement in scalability, documentation, and reporting capabilities. Check Point Cloud Firewall requires better PaaS integration, simplified licensing, and improved technical support.
Ease of Deployment and Customer Service: Sophos Cyberoam UTM is largely on-premises and offers highly rated 24/7 technical support. Check Point Cloud Firewall is used in cloud environments with competitive support, yet users note difficulties in cloud configuration.
Pricing and ROI: Sophos Cyberoam UTM is cost-effective for small to medium businesses, with satisfactory ROI through centralized management. Check Point Cloud Firewall is more expensive but offers substantial value and strong ROI with its robust security features and scalability.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
The value lies in maintaining operational integrity with zero downtime or incidents, facilitating secure, ongoing business operations.
Implementing CloudGuard has resulted in an excellent return on investment over one hundred percent ROI.
The unified policy is comprehensive and helps me to create firewall policies that are shared across all our facilities and plants.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
As a solution provider, when I encounter problems, I connect directly with Fortinet support, and they provide solutions within a very short time.
They usually respond quite fast, and they are very knowledgeable about what they do.
We had an endless loop of emails trying to fix this, and the suggestion was to reinstall the gateway and do it from scratch, which was not an option at that point because it would leave that specific location without access.
Available twenty-four by seven.
They resolve issues timely once connected.
Technical support is effective and responsive.
I would rate their technical support a solid nine out of ten.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
I can deploy it everywhere I need it.
We have transitioned from 1,000 to 500 users without any issue.
We perform minor and major upgrades, and it works seamlessly.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
I have not observed any downtime.
For instance, when we are working on a release and do an upgrade, we start experiencing unexpected issues.
The solution is stable.
These sessions should be around five to ten minutes long, allowing users and partners to quickly grasp the information without disrupting their daily tasks.
The solution should be able to implement machine learning and analytics of all the logs for threat detection and protection.
It would be better for customers to get immediate replacements even with a standard subscription.
Scalability could be improved as well; needing to purchase a new license each time I want to add a new interface is not ideal.
Better documentation would be welcome.
The user interface could be more intuitive, and the initial setup and configuration can be complex, requiring a technical team.
For Sophos Cyberoam UTM, you don't really have that access that can give you those network flexibilities that would allow you to do some other types of architectures.
It would be beneficial if phone calls or SMS for two-factor authentication were available.
Sophos Cyberoam UTM should move in the direction of AI capabilities, as the world is moving toward AI.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
The pricing and licensing are expensive, costing between seven thousand to eight thousand dollars.
Check Point is expensive, however, with the features and capabilities, I can justify the cost.
It is the highest in the market.
The price is appropriate, but if you want the real truth, it's actually quite expensive.
We got a firewall and gave an SSL VPN to my client to connect to their servers, after which, such kind of activities involving ransomware attacks stopped.
They put in a thing called the FortiCookbook, which is very easy to read with real-life scenarios that make networking tasks like joining networks very straightforward.
The firewall and VPN features are the most valuable in protecting our customers' networks.
One of the most valuable features is the automated threat prevention, which helps us detect and block potential cyberattacks in real-time, minimizing data breaches.
Centralized management is the feature I like best, resulting in reduced workload and more continuous policy.
Network Security provides us with unified security management across hybrid and cloud as well as on-prem.
It provides bandwidth management, category management of websites, blocking certain elements, IPS blocking, DDoS protection, and VPN management between sites and clients.
I assess the benefit of Sophos Cyberoam UTM's centralized management for multi-appliance handling as a welcome feature because you can manage all the devices at one location, giving you notifications of downtime and updates without necessarily logging into each appliance, so that central management is a very genius move.
The way the rule sets are configured makes it an easily understandable way to manage.
| Product | Mindshare (%) |
|---|---|
| Fortinet FortiGate | 28.6% |
| Check Point CloudGuard Network Security | 4.1% |
| Sophos Cyberoam UTM | 2.0% |
| Other | 65.3% |



| Company Size | Count |
|---|---|
| Small Business | 365 |
| Midsize Enterprise | 135 |
| Large Enterprise | 191 |
| Company Size | Count |
|---|---|
| Small Business | 67 |
| Midsize Enterprise | 41 |
| Large Enterprise | 76 |
| Company Size | Count |
|---|---|
| Small Business | 47 |
| Midsize Enterprise | 29 |
| Large Enterprise | 17 |
Fortinet FortiGate is a versatile network security tool offering features like VPN, firewall, web filtering, intrusion prevention, and scalability. It is known for its performance and integration with other Fortinet products, making it a preferred choice for robust cybersecurity.
Fortinet FortiGate stands out as a comprehensive cybersecurity solution with strong performance and ease of configuration. It delivers unified threat management, integrating features such as dynamic routing, SD-WAN support, and centralized management. Despite its strengths, improvements in the web interface's stability, pricing structures, and reporting capabilities are needed. Users seek better integration with third-party tools and automation advancements to enhance the experience further. These enhancements, alongside improvements in bandwidth management and the reduction of licensing costs, are points of interest for users looking to capitalize on FortiGate's extensive capabilities.
What are Fortinet FortiGate's key features?Fortinet FortiGate is widely implemented across industries as a primary firewall system for securing internet gateways and safeguarding data centers. It supports businesses in achieving SD-WAN integration and enhances cybersecurity by providing essential features like antivirus, web filtering, and application control. Enterprises utilize FortiGate for securing remote connections and ensuring compliance with security standards, making it adaptable for different network sizes and industries.
Check Point Cloud Firewall delivers advanced threat prevention and administration ease with centralized management of hybrid clouds. It offers seamless cloud platform integration, maintaining consistent security policies and enhancing efficiency.
Check Point Cloud Firewall is designed for comprehensive cloud security, ensuring perimeter protection, traffic inspection, and threat prevention. It is often used for safeguarding workloads and applications in public cloud settings like AWS and Azure. The firewall effectively controls both east-west and north-south traffic and supports hybrid cloud setups. Utilizing features like VPN, IPS, and URL filtering, it secures environments across multiple platforms, helping manage compliance effectively while addressing latency, API integration, and onboarding challenges.
What are the key features?Check Point Cloud Firewall sees frequent use in sectors needing robust perimeter protection, such as finance and healthcare, where compliance is critical. Its capabilities suit businesses utilizing public cloud infrastructures, managing complex hybrid models, or requiring strong VPN services and traffic control.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.