Forcepoint Next Generation Firewall vs Sophos UTM vs Trellix Intrusion Prevention System comparison

Cancel
You must select at least 2 products to compare!
Fortinet Logo
120,425 views|88,209 comparisons
90% willing to recommend
Forcepoint Logo
2,393 views|1,984 comparisons
76% willing to recommend
Sophos Logo
3,175 views|2,221 comparisons
89% willing to recommend
Trellix Logo
1,533 views|1,131 comparisons
93% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Forcepoint Next Generation Firewall, Sophos UTM, and Trellix Intrusion Prevention System based on real PeerSpot user reviews.

Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls.
To learn more, read our detailed Firewalls Report (Updated: April 2024).
771,212 professionals have used our research since 2012.
Featured Review
report
Use our free recommendation engine to learn which Firewalls solutions are best for your needs.
771,212 professionals have used our research since 2012.
Questions from the Community
Top Answer: When you compare these firewalls you can identify them with different features, advantages, practices and usage at… more »
Top Answer:From my experience regarding both the Sophos and FortiGate firewalls, I personally would rather use FortiGate. I know… more »
Top Answer:As a solution, Sophos UTM offers a lot of functionality, it scales well, and the stability and performance are quite… more »
Top Answer:There is a need to make payments towards the licensing charges attached to the product. The product is not expensive.
Top Answer:The endpoint protection capabilities of the product are an area of concern where improvements are required.
Top Answer:The Sophos UTM is a UTM and Sophos XG is the NGFW. First, you must know about the difference between a UTM and NGFW… more »
Top Answer:The most valuable feature of Sophos UTM is the endpoint protection feature.
Top Answer:You cannot really say that the solution is expensive, given the protection it gives.
Top Answer:The threat intelligence updates are very accurate.
Top Answer:The tool is competitively priced. I rate the pricing a six out of ten.
Top Answer:Network Threat Behavior Analysis must be improved. The technical support must be improved. The support team must provide… more »
Comparisons
Also Known As
FortiGate 60b, FortiGate 60c, FortiGate 80c, FortiGate 50b, FortiGate 200b, FortiGate 110c, FortiGate
Forcepoint NGFW, Stonesoft Next Generation Firewall, McAfee Network Security Platform, Intel Security Network Security Platform
Astaro
McAfee Network Security Platform, McAfee NSP, IntruShield Network Intrusion Prevention System, IntruShield Network IPS
Learn More
Overview

Fortinet FortiGate enhances network security, prevents unauthorized access, and offers robust firewall protection. Valued features include advanced threat protection, reliable performance, and a user-friendly interface. It improves efficiency, streamlines processes, and boosts collaboration, providing valuable insights for informed decision-making and growth.

Forcepoint Next Generation Firewall is a versatile and comprehensive solution for perimeter security, offering features such as SD-WAN, IPS, VPN, and cloud or on-premises subscription keys. It is preferred by many clients over Cisco and is used for obligation redundancy, VPN access, and as the main point of security in infrastructure. 

The product is praised for its simplicity, flexibility, complete feature set, scalability, and central management capabilities. Other valuable features include IPS, firewall, sandbox, application control, filtering, security management center, connectivity, and integration capabilities.

Sophos UTM is a unified threat management platform designed to protect your businesses from known and emerging malware including viruses, rootkits and spyware. The solution provides a complete network security package with everything your organization needs in a single modular appliance.

Sophos UTM Features

Sophos UTM has many valuable key features. Some of the most useful ones include:

  • Web and Email Filtering
  • General Management
  • Network Protection
  • Network Routing and Services
  • Advanced Threat Protection
  • Authentication
  • Email Encryption and DLP
  • Web Policy
  • End-User Portal
  • VPN IPsec Client, VPN SSL Client, and Clientless VPN
  • Web Application Firewall Protection
  • UTM Endpoint Protection and Management
  • SEC Endpoint Integration
  • Logging and Reporting

Sophos UTM Benefits

There are many benefits to implementing Sophos UTM. Some of the biggest advantages the solution offers include:

  • Simplifies your IT security without the complexity of multiple point solutions
  • Intuitive interface to help you quickly create policies to control security risks
  • Provides clear, detailed reports to give you the insight you need to improve your network performance and protection
  • Complete control to block, allow, shape and prioritize applications
  • Two-factor authentication with one-time password (OTP)
  • Integrated wireless controller
  • Allows you to connect remote offices with easy VPN and Wi-Fi

Reviews from Real Users

Below are some reviews and helpful feedback written by PeerSpot users currently using the Sophos UTM solution.

PeerSpot user Dana B., Network Administrator at a manufacturing company, says “The web and email filtering are the two biggest and most valuable aspects of the solution for us. The solution overall has just been a good, cost-effective solution for us. The solution offers a lot of functionality. The solution scales well. We've found the technical support to be helpful. The stability and performance are quite good.”

A Technical Director at a security firm mentions, "Sophos SG UTM had all the basic functionality that you needed. It is user-friendly and easy to manage for any integrator."

Marek M., Senior Network Engineer at a computer software company, comments, “Sophos UTM is the simplest of these products to set up. If you follow the instructions using the wizard, which is just a few steps, then you will have a firewall to protect you and your customer.”

A Software Sales Manager at a tech services company explains, “The overall visibility of the console is what I find most valuable, plus it's very user-friendly. It can be integrated with other solutions such as SOAR, SIEM, etc., even when you have an existing firewall. I really like that the console can be integrated. You'll see everything on the same window, and the single window feature of the machine is so good. These are the features I really like.”

James D., IT Manager at Manual Workers Union, states, “The fact that it's on the cloud means we don't have to administer it on our network or deal with a physical machine, which saves us money. The solution has many great features. From the console, we can start different scannings on different machines. We enjoy the centralized reporting part of it. The initial setup is simple. We enjoy its general stability. The solution can scale. So far, the solution has been problem-free.”

Block More Intrusions
Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist.

Unify Virtual and Physical Security
Support network virtualization across private and public cloud platforms to scale security and evolve with changing IT dynamics.

Maximize Security and Performance
Scale hardware performance to speeds up to 100 Gbps and leverage data from multiple products.

Sample Customers
1. Amazon Web Services 2. Microsoft 3. IBM 4. Cisco 5. Dell 6. HP 7. Oracle 8. Verizon 9. AT&T 10. T-Mobile 11. Sprint 12. Vodafone 13. Orange 14. BT Group 15. Telstra 16. Deutsche Telekom 17. Comcast 18. Time Warner Cable 19. CenturyLink 20. NTT Communications 21. Tata Communications 22. SoftBank 23. China Mobile 24. Singtel 25. Telus 26. Rogers Communications 27. Bell Canada 28. Telkom Indonesia 29. Telkom South Africa 30. Telmex 31. Telia Company 32. Telkom Kenya
California Department of Corrections and Rehabilitation (CDCR)
One Housing Group
Desjardins Group, HollyFrontier, Nubia, Agbar, WNS Global Services, INAIL, Universidad de Las Américas Puebla (UDLAP), Cook County, China Pacific Insurance, Bank Central Asia, California Department of Corrections and Rehabilitation, City of Chicago, Macquarie Telecom, Sutherland Global Services, Texas Tech University Health Sciences Center, United Automotive Electronic Systems
Top Industries
REVIEWERS
Comms Service Provider16%
Computer Software Company9%
Financial Services Firm8%
Manufacturing Company7%
VISITORS READING REVIEWS
Educational Organization20%
Computer Software Company15%
Comms Service Provider8%
Manufacturing Company6%
REVIEWERS
Computer Software Company21%
Comms Service Provider21%
University11%
Integrator11%
VISITORS READING REVIEWS
Computer Software Company16%
Comms Service Provider11%
Government9%
Manufacturing Company8%
REVIEWERS
Comms Service Provider12%
Manufacturing Company12%
Financial Services Firm10%
Computer Software Company9%
VISITORS READING REVIEWS
Computer Software Company18%
Comms Service Provider10%
Government8%
Educational Organization6%
VISITORS READING REVIEWS
Computer Software Company19%
Government9%
Financial Services Firm9%
Manufacturing Company9%
Company Size
REVIEWERS
Small Business48%
Midsize Enterprise23%
Large Enterprise30%
VISITORS READING REVIEWS
Small Business27%
Midsize Enterprise32%
Large Enterprise40%
REVIEWERS
Small Business59%
Midsize Enterprise17%
Large Enterprise24%
VISITORS READING REVIEWS
Small Business27%
Midsize Enterprise15%
Large Enterprise58%
REVIEWERS
Small Business58%
Midsize Enterprise20%
Large Enterprise21%
VISITORS READING REVIEWS
Small Business37%
Midsize Enterprise19%
Large Enterprise44%
REVIEWERS
Small Business27%
Midsize Enterprise40%
Large Enterprise33%
VISITORS READING REVIEWS
Small Business20%
Midsize Enterprise12%
Large Enterprise68%
Buyer's Guide
Firewalls
April 2024
Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls. Updated: April 2024.
771,212 professionals have used our research since 2012.