



Find out what your peers are saying about Fortinet, Check Point Software Technologies, WatchGuard and others in Unified Threat Management (UTM).
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
The value lies in maintaining operational integrity with zero downtime or incidents, facilitating secure, ongoing business operations.
Implementing CloudGuard has resulted in an excellent return on investment over one hundred percent ROI.
The unified policy is comprehensive and helps me to create firewall policies that are shared across all our facilities and plants.
I have seen a return on investment with Sophos UTM, and I can share that the price is around thirty percent better, especially if you count in the employee time.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
As a solution provider, when I encounter problems, I connect directly with Fortinet support, and they provide solutions within a very short time.
They usually respond quite fast, and they are very knowledgeable about what they do.
We had an endless loop of emails trying to fix this, and the suggestion was to reinstall the gateway and do it from scratch, which was not an option at that point because it would leave that specific location without access.
Available twenty-four by seven.
Technical support is very good.
The technical support by Sophos is amazing, especially when I pay for the enhanced support.
I would rate the technical support by Sophos a 10.
I would rate the technical support with Sophos a seven because sometimes the time of the first resolution is not ideal.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
I can deploy it everywhere I need it.
We have transitioned from 1,000 to 500 users without any issue.
We perform minor and major upgrades, and it works seamlessly.
Customers buy new Juniper SRX Series Firewall units, and we migrate configurations on the new units very easily and quickly.
You can have high availability clusters, so very, very scalable in my opinion.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
I have not observed any downtime.
For instance, when we are working on a release and do an upgrade, we start experiencing unexpected issues.
The solution is stable.
The solution has absolutely high stability.
These sessions should be around five to ten minutes long, allowing users and partners to quickly grasp the information without disrupting their daily tasks.
The solution should be able to implement machine learning and analytics of all the logs for threat detection and protection.
It would be better for customers to get immediate replacements even with a standard subscription.
Scalability could be improved as well; needing to purchase a new license each time I want to add a new interface is not ideal.
Better documentation would be welcome.
The user interface could be more intuitive, and the initial setup and configuration can be complex, requiring a technical team.
With a better user interface and graphical interface, the Juniper SRX Series Firewall could be a superior solution compared to what it is now.
With my extensive experience with the Juniper SRX Series Firewall, the robustness of the SD-Cloud or Security Director interface and overall functionality needs to be improved to compete with leading firewall solutions.
It is working only with firewall and VPN concentrator and router functionality.
If you want to really implement some rules that are a little bit more difficult, Sophos always recommends getting the dedicated WAF, or web application firewall, but I would prefer to have more features on the web application firewall in the firewall itself because it would make more sense.
I would prefer to see additional features in the next release of Sophos UTM because cyber crime increases every day, so we also need to improve our game to prevent any chances for intrusion.
It would make my work much simpler because it makes decision-making much easier.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
The pricing and licensing are expensive, costing between seven thousand to eight thousand dollars.
Check Point is expensive, however, with the features and capabilities, I can justify the cost.
It is the highest in the market.
The Juniper SRX Series Firewall is affordable and cost-effective.
Pricing has become expensive recently due to the dollar hike and naira value changes in Nigeria.
The value between what I receive and what I pay is the best in the industry.
The pricing would be more economical if sold directly to the user compared to going through a partner, as they need to take their percentage.
We got a firewall and gave an SSL VPN to my client to connect to their servers, after which, such kind of activities involving ransomware attacks stopped.
They put in a thing called the FortiCookbook, which is very easy to read with real-life scenarios that make networking tasks like joining networks very straightforward.
The firewall and VPN features are the most valuable in protecting our customers' networks.
One of the most valuable features is the automated threat prevention, which helps us detect and block potential cyberattacks in real-time, minimizing data breaches.
Centralized management is the feature I like best, resulting in reduced workload and more continuous policy.
Network Security provides us with unified security management across hybrid and cloud as well as on-prem.
The routing, Layer 2, 3, 4 solutions in the network layers are valuable features.
Juniper SRX Series Firewall helps in terms of network security for my customers by protecting end-users from any form of cyber attack or threat, with a good database that updates and pushes out signatures to defend against threats.
The most valuable feature is the HA high availability cluster for active-active Juniper SRX Series Firewall.
The zero-day protection and firewall rules are some of the most effective features for threat management.
It helps us quite a lot, especially because since we use Sophos UTM, malware intrusions are not rampant.
Sophos UTM's valuable features include the cost, which is very competitive when compared with other vendors, balanced with the features that it delivers.
| Product | Mindshare (%) |
|---|---|
| Fortinet FortiGate | 30.5% |
| Check Point CloudGuard Network Security | 3.6% |
| Sophos UTM | 8.2% |
| Juniper SRX Series Firewall | 6.9% |
| Other | 50.800000000000004% |




| Company Size | Count |
|---|---|
| Small Business | 364 |
| Midsize Enterprise | 135 |
| Large Enterprise | 190 |
| Company Size | Count |
|---|---|
| Small Business | 67 |
| Midsize Enterprise | 40 |
| Large Enterprise | 76 |
| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 32 |
| Company Size | Count |
|---|---|
| Small Business | 75 |
| Midsize Enterprise | 28 |
| Large Enterprise | 27 |
Fortinet FortiGate is a versatile network security tool offering features like VPN, firewall, web filtering, intrusion prevention, and scalability. It is known for its performance and integration with other Fortinet products, making it a preferred choice for robust cybersecurity.
Fortinet FortiGate stands out as a comprehensive cybersecurity solution with strong performance and ease of configuration. It delivers unified threat management, integrating features such as dynamic routing, SD-WAN support, and centralized management. Despite its strengths, improvements in the web interface's stability, pricing structures, and reporting capabilities are needed. Users seek better integration with third-party tools and automation advancements to enhance the experience further. These enhancements, alongside improvements in bandwidth management and the reduction of licensing costs, are points of interest for users looking to capitalize on FortiGate's extensive capabilities.
What are Fortinet FortiGate's key features?Fortinet FortiGate is widely implemented across industries as a primary firewall system for securing internet gateways and safeguarding data centers. It supports businesses in achieving SD-WAN integration and enhances cybersecurity by providing essential features like antivirus, web filtering, and application control. Enterprises utilize FortiGate for securing remote connections and ensuring compliance with security standards, making it adaptable for different network sizes and industries.
Check Point CloudGuard Network Security offers centralized management, robust threat prevention, and seamless integration with major public clouds, ensuring consistent security for cloud and on-premises environments. It combines ease of use with flexibility across diverse IT infrastructure.
Check Point CloudGuard Network Security provides comprehensive protection for IT infrastructures in AWS, Azure, and hybrid environments. It ensures firewall security, managing traffic and securing cloud infrastructures while maintaining network protection and compliance enforcement. Organizations benefit from its centralized security governance, enhanced visibility, and threat prevention for both perimeter and internal security. It offers seamless integration with leading cloud platforms, allowing for efficient deployment and scalability, aligning with modern cloud requirements.
What are the key features of Check Point CloudGuard Network Security?In industries such as finance, healthcare, and tech, Check Point CloudGuard Network Security is vital for protecting sensitive data, managing compliance, and safeguarding daily operations. Its robust integration capabilities support diverse infrastructure setups, assisting companies in maintaining high-security standards efficiently.
Juniper SRX is a next-generation security solution that enables users to expand and secure their networks without incurring heavy costs or sacrificing performance.
Benefits of Juniper SRX
Some of the benefits of using Juniper SRX include:
Reviews from Real Users
Juniper SRX stands out among their competitors for a number of reasons. Two major ones are their central management capabilities and the robustness of their suite of security features. Juniper SRX is designed to make it easy for users to take control of their network’s security. From one location, administrators can manage all aspects of their infrastructure’s security. The many features that it offers allows users to tailor their security to meet their specific needs.
Shashidhara N., director of technology solutions & services at Connectivity IT Services Private Limited, writes, “On the SRX box, it has what I call a one model concept for security. I work especially with hybrid environments. With an SRX we have a single management dashboard. We can manage the internal framework easily with the centralized management component. You can work with threat prevention, you can work with integration, you can work with traffic management. Another good part about SRX is that you have opportunities for automation. Another thing that is very good is that all the operating systems for all Juniper boxes are the same. You do not work on different operating systems using different boxes.”
Pradip J., the owner of Shree Atharva Sales Corporation, writes, “It is a complete security bundle. The cloud-based Sky Advanced Threat Prevention feature is very valuable. I am 100% satisfied with the performance of the Juniper firewall. It has a very good throughput. It works very fine. We use our firewall as a site-to-site VPN or Software-Defined Wide Area Network (SD-WAN). In both cases, it has a very good and optimum performance.Their service support is very good in India. I get really good support from the Juniper team."
Sophos UTM is a unified threat management platform designed to protect your businesses from known and emerging malware including viruses, rootkits and spyware. The solution provides a complete network security package with everything your organization needs in a single modular appliance.
Sophos UTM Features
Sophos UTM has many valuable key features. Some of the most useful ones include:
Sophos UTM Benefits
There are many benefits to implementing Sophos UTM. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by PeerSpot users currently using the Sophos UTM solution.
PeerSpot user Dana B., Network Administrator at a manufacturing company, says “The web and email filtering are the two biggest and most valuable aspects of the solution for us. The solution overall has just been a good, cost-effective solution for us. The solution offers a lot of functionality. The solution scales well. We've found the technical support to be helpful. The stability and performance are quite good.”
A Technical Director at a security firm mentions, "Sophos SG UTM had all the basic functionality that you needed. It is user-friendly and easy to manage for any integrator."
Marek M., Senior Network Engineer at a computer software company, comments, “Sophos UTM is the simplest of these products to set up. If you follow the instructions using the wizard, which is just a few steps, then you will have a firewall to protect you and your customer.”
A Software Sales Manager at a tech services company explains, “The overall visibility of the console is what I find most valuable, plus it's very user-friendly. It can be integrated with other solutions such as SOAR, SIEM, etc., even when you have an existing firewall. I really like that the console can be integrated. You'll see everything on the same window, and the single window feature of the machine is so good. These are the features I really like.”
James D., IT Manager at Manual Workers Union, states, “The fact that it's on the cloud means we don't have to administer it on our network or deal with a physical machine, which saves us money. The solution has many great features. From the console, we can start different scannings on different machines. We enjoy the centralized reporting part of it. The initial setup is simple. We enjoy its general stability. The solution can scale. So far, the solution has been problem-free.”