Sophos Cyberoam UTM and Check Point Quantum Force (NGFW) are competitors in the network security appliance sector. Check Point holds an upper hand due to comprehensive threat detection and scalability, albeit at a higher cost.
Features: Sophos Cyberoam UTM provides antivirus, web and application filtering, and identity-based security. Check Point Quantum Force (NGFW) offers advanced intrusion detection, threat prevention, and centralized management through SmartConsole.
Room for Improvement: Sophos Cyberoam UTM could improve scalability, cloud integration, and documentation. Check Point Quantum Force (NGFW) needs to simplify its user interface, enhance support services, and improve cost transparency.
Ease of Deployment and Customer Service: Sophos Cyberoam UTM is praised for a simpler deployment process, requiring expert configuration for optimal use. Check Point Quantum Force (NGFW) offers broader deployment options but is noted for complexity during installation. Sophos offers consistent 24/7 support, while Check Point support varies by region.
Pricing and ROI: Sophos Cyberoam UTM is a cost-effective solution with flexible licensing, valued by small and medium enterprises. Check Point Quantum Force (NGFW), despite high pricing and complex licensing, is chosen for its robust security, considered a long-term investment by enterprises focused on comprehensive protection.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
This is a time-saving measure because we don't need to deploy a cluster or a firewall each time; we just create a virtual system on the management server using the same appliance.
Incident response time has reduced significantly, and downtime due to network issues has been minimized, leading to an improved return on investment.
The fact that we've not had any breach toward the data center side is plenty enough.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
The support team we engaged was knowledgeable and well-versed with the application.
We have escalated issues to Check Point technical support multiple times and have received timely and very good responses.
Even challenging issues like those with VPNs have been resolved efficiently with their help.
They resolve issues timely once connected.
Technical support is effective and responsive.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
If specified correctly, even the smaller boxes offer high session and bandwidth rates, making the solution highly scalable, even up to telco-level requirements.
Scalability must be carefully planned for, considering future growth and user base increases.
They offer multiple solutions from SMBs to enterprise data centers, making it an easily scalable solution with no issues in scalability.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
While the solution is generally stable, there are complications, such as requiring SmartConsole for deployment and upgrades, which can be time-consuming.
I have worked with Check Point products for 15 years and haven't found any stability or performance issues.
The use of Check Point firewalls has helped improve our security posture without any downtime.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
The constant daily revisions necessitate meticulous identification of the relevant documents to prevent the use of outdated information that could jeopardize our environment.
While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security.
Other products, like FortiGate, are perceived as more intuitive because they are easier to configure from the start.
More granularity and control for threat prevention, especially on the OT side, would be beneficial.
I believe Check Point NGFW can be improved by making its initial configuration and deployment easier in the future because the first-time setup is really hard.
It would be beneficial if phone calls or SMS for two-factor authentication were available.
FortiGate is priced lower than Palo Alto.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It is about 20% cheaper.
In comparison to Fortinet and other products, the pricing may be considered high.
Compared to other solutions, the pricing of Check Point NGFW is high.
The perception is that Check Point NGFW is expensive, especially when all software modules are included.
The price is appropriate, but if you want the real truth, it's actually quite expensive.
In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.
FortiGate has helped reduce the risk of cyberattacks that might disrupt our client's production.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
The firewall's default behavior of blocking all traffic, including a cleanup rule that blocks everything from external to internal sources, is highly valuable for protecting our network.
The most valuable features in my experience include perimeter firewalling, cloud and mobile security, application control, URL filtering, DLP, threat prevention, intrusion protection, and safeguarding against malware, botnets, and zero-day attacks.
Since implementing it, we have noticed a lot less getting through that maybe other antivirus within firewalls had failed to catch.
It provides bandwidth management, category management of websites, blocking certain elements, IPS blocking, DDoS protection, and VPN management between sites and clients.
The way the rule sets are configured makes it an easily understandable way to manage.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Check Point Quantum Force NGFW provides centralized management with scalable security for network perimeters. As a reliable firewall, it ensures advanced threat prevention and offers seamless integration, making it suitable for various network environments.
Offering comprehensive security, Check Point Quantum Force NGFW helps control ingress and egress traffic, secures data center firewalls, and integrates seamlessly with cloud and on-premises setups. Users appreciate its application control, deep packet inspection, and identity awareness features for enhanced protection against cyber threats. Despite pricing issues and interface complexity, its IPsec VPN and robust logging provide valuable insights into network activities.
What are the key features of Check Point Quantum Force NGFW?Check Point Quantum Force NGFW is deployed across industries for securing network boundaries, supporting critical data center operations, and enabling secure VPN connections. In finance, it helps meet stringent compliance standards, while in healthcare, it's crucial for protecting sensitive patient data through robust security protocols.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.