Sophos XG and Check Point Harmony SASE compete in the network security category. Sophos XG may hold the upper hand due to its ease of use, flexible configuration, and robust integrated features.
Features: Sophos XG provides robust application control, email protection, and an efficient intrusion prevention system. Its synchronized security feature effectively connects endpoints to the firewall. Check Point Harmony SASE offers zero trust network access and remote browser isolation. It is praised for threat prevention features and centralized security management.
Room for Improvement: Sophos XG could enhance its user interface and expand AWS and Azure support, streamline HTTPS filtering setup, and improve VPN stability. Check Point Harmony SASE would benefit from enriched integration with third-party systems, improved support responsiveness, and more intuitive UI features.
Ease of Deployment and Customer Service: Both Sophos XG and Check Point Harmony SASE offer flexible deployment options. Sophos is often easier to install and configure, whereas Check Point may be more complex, requiring technical acumen. Sophos receives mixed reviews for support, while Check Point is noted for responsive support on complex issues.
Pricing and ROI: Sophos XG is competitively priced, offering good value for money through bundled features, with its pricing structure appealing to mid-sized businesses. Check Point Harmony SASE, although priced higher, is justified by its advanced security features, offering scalable options suited for larger enterprises. Both solutions provide ROI through reduced reliance on extensive IT skills and prevention of security incidents.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
Check Point Harmony SASE (formerly Perimeter 81) blocked access to those URLs at the network level before users could click through.
We are saving 40% of our time, which is good.
The graphical interface of Sophos XG simplifies configurations, saving time in support and troubleshooting compared to the Linux-based solution I previously used.
We purchased endpoint security for the first time last year, and even without endpoint security, it provides comprehensive security.
It's good, but I would still say it's higher by about 10-15 percent compared to other market products with similar configurations.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
I would rate support 10 out of 10.
People working really hard, listening to every issue and request, and replying within hours.
After updating firmware, data utilization was visible for a few days before collapsing again.
They are professional, respond quickly, and help resolve issues effectively.
I rate the technical support a ten out of ten.
Their team was quick to diagnose and resolve the problem by exchanging the equipment within two weeks.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
The cloud-native model ensures we are not tied to any specific location or hardware, which has been a great game changer in terms of agility.
The scalability of Check Point Harmony SASE (formerly Perimeter 81) is good, and I can add more users and devices easily as my organization grows.
I would rate it nine out of ten for scalability.
You can scale up to multiple firewalls with centralized management.
You can't upgrade memory or storage on a specific model, which limits scalability.
I rate the scalability a nine out of ten.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
Even the support team does not have a proper solution for this issue.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
Sophos XG is very stable, even when serving as a DHCP server.
Sophos XG is resource-greedy, affecting performance even on newer computers.
It's on 24/7 and has consistently been reliable over the years.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
The constant daily revisions necessitate meticulous identification of the relevant documents to prevent the use of outdated information that could jeopardize our environment.
While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security.
An example of when the support cycle took longer than expected was when I had a ticket open for nearly six to seven months regarding a simple issue.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
One area for improvement is integration with third-party identity providers.
The solution should have the ability to be up to date with the most recent threats.
This suggests a vulnerability that needs addressing to ensure administrators can update patches without losing access.
Business cannot stop just because of issues with support.
FortiGate is priced lower than Palo Alto.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It is about 20% cheaper.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
It is a bit expensive.
My experience with pricing, setup cost, and licensing for Check Point Harmony SASE (formerly Perimeter 81) is that it is a rental service, but I find it satisfactory.
I rate the pricing a ten out of ten.
Currently, it costs about four million shillings in Kenya.
The cost depends on the package you are in, such as full threat management or basic.
In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.
FortiGate has helped reduce the risk of cyberattacks that might disrupt our client's production.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
The firewall management is the most valuable feature for me.
The Zero Trust Network Access (ZTNA) feature is a major highlight as it gives users seamless and secure access to internal resources without requiring a full-blown VPN, which improves both security and user experience.
The Zero Trust and segmentation have helped my team and our customers significantly because we are able to protect every scope and allow the work-from-home users to access internal resources while passing through a threat prevention gateway, ensuring that everything is safe.
I particularly like the visibility it provides into network traffic, allowing us to identify and address issues efficiently.
The firewall feature of Sophos XG has been the most effective for threat prevention.
Integration with endpoint security products ensures seamless traffic flow and rule enforcement, even when endpoints are not directly connected to the firewall.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Check Point Harmony SASE, formerly Perimeter 81, offers robust security features like split tunneling, MFA, and Zero Trust Network Access focused on secure remote access and optimized connectivity for remote teams.
Check Point Harmony SASE delivers advanced security through a user-friendly interface, efficient VPN connections, and a centralized management console. It enhances security with real-time threat intelligence from ThreatCloud and traffic management via built-in optimization. Firewall as a Service and Secure Web Gateway safeguard against unauthorized access and phishing. While users seek enhanced networking customizations and better integration with identity providers, there's an emphasis on improving reporting, real-time analytics, and policy management. Requests also include a Chrome extension, traffic balancing, and simplified configuration to address some resource-intensive aspects.
What are the key features of Check Point Harmony SASE?
How can organizations benefit from using Check Point Harmony SASE?
Check Point Harmony SASE is used across industries for secure remote access and connectivity, protecting sensitive data, and managing access to corporate resources. It is ideal for those with hybrid cloud models and requires comprehensive security measures combined with existing IT infrastructures to meet specific industry demands.
Sophos XG is a versatile network security solution that offers network protection, firewall management, VPN access, web filtering, and intrusion prevention, providing comprehensive security for businesses from small offices to large enterprises.
Sophos XG stands out for its Synchronized Security, easy setup, and robust templates. It manages VPN access, protects against threats, and handles load balancing and traffic monitoring. The cloud-based management, centralized dashboard, and detailed logging make it user-friendly and reliable. Integration of features like email protection, SD-WAN, and unified threat management ensures a broad spectrum of security needs are covered. However, it could benefit from improvements in network security, user portals, technical support, and more scalable SD-WAN features.
What are the key features of Sophos XG?Sophos XG is implemented across industries such as healthcare, education, and finance to secure sensitive data and ensure regulatory compliance. It aids in endpoint protection, application control, load balancing, and traffic monitoring essential for these industries. Enhancing network security, simplifying VPN setup, and integrating adaptive security features remain focal points for businesses.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.