Sophos Cyberoam UTM and Check Point CloudGuard Network Security are competitors in the network security category. Check Point CloudGuard seems to have the upper hand due to its advanced threat prevention and better suitability for cloud environments.
Features: Sophos Cyberoam UTM offers comprehensive network security with identity-based features, antivirus, and web filtering. It supports VPN and integrates well with Active Directory. Check Point CloudGuard Network Security provides advanced threat prevention, integrates with various cloud platforms, and offers auto-scaling capabilities, making it suitable for dynamic cloud environments.
Room for Improvement: Sophos Cyberoam UTM has performance issues under high traffic and scalability limitations, with concerns about VPN features and product lifecycle. Check Point CloudGuard Network Security users report challenges with complex deployment and version upgrades, requesting better technical documentation and support.
Ease of Deployment and Customer Service: Sophos Cyberoam UTM is generally praised for its on-premises deployment and reliable technical support, despite occasional concerns about response times post-acquisition. Check Point CloudGuard Network Security, while robust, struggles with deployment complexity but has mostly positive customer feedback, although technical support response times can be slow.
Pricing and ROI: Sophos Cyberoam UTM is competitively priced though license costs can be high. It is viewed as cost-effective for small businesses with good ROI. Check Point CloudGuard Network Security is regarded as expensive despite its flexible licensing model; however, users find the investment worthwhile for its enhanced security features.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
The value lies in maintaining operational integrity with zero downtime or incidents, facilitating secure, ongoing business operations.
Implementing CloudGuard has resulted in an excellent return on investment over one hundred percent ROI.
The unified policy is comprehensive and helps me to create firewall policies that are shared across all our facilities and plants.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
They usually respond quite fast, and they are very knowledgeable about what they do.
We had an endless loop of emails trying to fix this, and the suggestion was to reinstall the gateway and do it from scratch, which was not an option at that point because it would leave that specific location without access.
Available twenty-four by seven.
They resolve issues timely once connected.
Technical support is effective and responsive.
I would rate their technical support a solid nine out of ten.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
I can deploy it everywhere I need it.
We have transitioned from 1,000 to 500 users without any issue.
We perform minor and major upgrades, and it works seamlessly.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
I have not observed any downtime.
For instance, when we are working on a release and do an upgrade, we start experiencing unexpected issues.
The solution is stable.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security.
When considering Sophos XG, which we also use, the logging and reporting functionality is notably more efficient.
Scalability could be improved as well; needing to purchase a new license each time I want to add a new interface is not ideal.
Better documentation would be welcome.
The user interface could be more intuitive, and the initial setup and configuration can be complex, requiring a technical team.
It would be beneficial if phone calls or SMS for two-factor authentication were available.
Sophos Cyberoam UTM should move in the direction of AI capabilities, as the world is moving toward AI.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
The pricing and licensing are expensive, costing between seven thousand to eight thousand dollars.
Check Point is expensive, however, with the features and capabilities, I can justify the cost.
It is the highest in the market.
The price is appropriate, but if you want the real truth, it's actually quite expensive.
In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.
FortiGate has helped reduce the risk of cyberattacks that might disrupt our client's production.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
One of the most valuable features is the automated threat prevention, which helps us detect and block potential cyberattacks in real-time, minimizing data breaches.
Centralized management is the feature I like best, resulting in reduced workload and more continuous policy.
Network Security provides us with unified security management across hybrid and cloud as well as on-prem.
It provides bandwidth management, category management of websites, blocking certain elements, IPS blocking, DDoS protection, and VPN management between sites and clients.
I assess the benefit of Sophos Cyberoam UTM's centralized management for multi-appliance handling as a welcome feature because you can manage all the devices at one location, giving you notifications of downtime and updates without necessarily logging into each appliance, so that central management is a very genius move.
The way the rule sets are configured makes it an easily understandable way to manage.
Product | Market Share (%) |
---|---|
Fortinet FortiGate | 35.1% |
Check Point CloudGuard Network Security | 1.9% |
Sophos Cyberoam UTM | 0.6% |
Other | 62.4% |
Company Size | Count |
---|---|
Small Business | 350 |
Midsize Enterprise | 130 |
Large Enterprise | 187 |
Company Size | Count |
---|---|
Small Business | 59 |
Midsize Enterprise | 38 |
Large Enterprise | 75 |
Company Size | Count |
---|---|
Small Business | 46 |
Midsize Enterprise | 29 |
Large Enterprise | 17 |
Fortinet FortiGate excels in providing integrated VPN, firewalling, and Unified Threat Management (UTM) with centralized management and high availability. It supports remote access and comprehensive threat protection, making it a preferred choice for securing networks.
Fortinet FortiGate offers a robust security platform with features such as strong intrusion prevention, application control, and web filtering. Its integration with Active Directory and SD-WAN functionality provides scalable solutions for large networks. Users appreciate its ease of use through centralized management interfaces, ensuring robust security with flexible configurations. However, FortiGate could enhance its graphical interface and technical support responsiveness, address firmware bugs and costly licensing, improve logging, integrate better with third-party tools, and strengthen scalability and memory for log storage. Complexity in configuration and the need for intuitive features are noted challenges, and there's a demand for advanced security, zero-trust capabilities, and AI integration.
What are the key features of Fortinet FortiGate?Fortinet FortiGate is widely implemented across industries like education, finance, and government. Companies use it for firewall protection, VPN, and SD-WAN capabilities, ensuring secure perimeter and data center security. It facilitates remote access management and traffic routing optimization, offering reliable security and connectivity solutions.
Check Point CloudGuard Network Security offers centralized management, robust threat prevention, and seamless integration with major public clouds, ensuring consistent security for cloud and on-premises environments. It combines ease of use with flexibility across diverse IT infrastructure.
Check Point CloudGuard Network Security provides comprehensive protection for IT infrastructures in AWS, Azure, and hybrid environments. It ensures firewall security, managing traffic and securing cloud infrastructures while maintaining network protection and compliance enforcement. Organizations benefit from its centralized security governance, enhanced visibility, and threat prevention for both perimeter and internal security. It offers seamless integration with leading cloud platforms, allowing for efficient deployment and scalability, aligning with modern cloud requirements.
What are the key features of Check Point CloudGuard Network Security?In industries such as finance, healthcare, and tech, Check Point CloudGuard Network Security is vital for protecting sensitive data, managing compliance, and safeguarding daily operations. Its robust integration capabilities support diverse infrastructure setups, assisting companies in maintaining high-security standards efficiently.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.