Sophos Cyberoam UTM and Fortinet FortiGate compete in the network security category. Fortinet FortiGate seems to have the upper hand with users favoring its enhanced security features and better integration, particularly in large environments.
Features: Fortinet FortiGate includes robust SD-WAN capabilities, advanced threat protection, and seamless integration with Fortinet products. Sophos Cyberoam UTM offers identity-based policy creation, user-focused security management, and effective web filtering mechanisms.
Room for Improvement: Sophos Cyberoam UTM needs improvements in scalability, VPN setup, and reporting functionalities. Fortinet FortiGate could benefit from advances in support service quality, reduce licensing costs, and enhance integration flexibility.
Ease of Deployment and Customer Service: Fortinet FortiGate offers broad deployment options and supports diverse environments such as hybrid clouds, providing an advantage in adaptability. While Sophos Cyberoam offers strong after-sales support, both solutions face challenges in customer service related to knowledge and response times.
Pricing and ROI: Sophos Cyberoam UTM is typically more affordable, especially for smaller enterprises, offering a straightforward licensing process. Fortinet FortiGate, although more expensive, provides value relative to its features and scalability, being more suited for larger environments.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
They resolve issues timely once connected.
Technical support is effective and responsive.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security.
When considering Sophos XG, which we also use, the logging and reporting functionality is notably more efficient.
It would be beneficial if phone calls or SMS for two-factor authentication were available.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
The price is appropriate, but if you want the real truth, it's actually quite expensive.
In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.
FortiGate has helped reduce the risk of cyberattacks that might disrupt our client's production.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
It provides bandwidth management, category management of websites, blocking certain elements, IPS blocking, DDoS protection, and VPN management between sites and clients.
The way the rule sets are configured makes it an easily understandable way to manage.
Product | Market Share (%) |
---|---|
Fortinet FortiGate | 35.6% |
Sophos Cyberoam UTM | 0.7% |
Other | 63.699999999999996% |
Company Size | Count |
---|---|
Small Business | 350 |
Midsize Enterprise | 129 |
Large Enterprise | 187 |
Company Size | Count |
---|---|
Small Business | 46 |
Midsize Enterprise | 28 |
Large Enterprise | 17 |
Fortinet FortiGate excels in providing integrated VPN, firewalling, and Unified Threat Management (UTM) with centralized management and high availability. It supports remote access and comprehensive threat protection, making it a preferred choice for securing networks.
Fortinet FortiGate offers a robust security platform with features such as strong intrusion prevention, application control, and web filtering. Its integration with Active Directory and SD-WAN functionality provides scalable solutions for large networks. Users appreciate its ease of use through centralized management interfaces, ensuring robust security with flexible configurations. However, FortiGate could enhance its graphical interface and technical support responsiveness, address firmware bugs and costly licensing, improve logging, integrate better with third-party tools, and strengthen scalability and memory for log storage. Complexity in configuration and the need for intuitive features are noted challenges, and there's a demand for advanced security, zero-trust capabilities, and AI integration.
What are the key features of Fortinet FortiGate?Fortinet FortiGate is widely implemented across industries like education, finance, and government. Companies use it for firewall protection, VPN, and SD-WAN capabilities, ensuring secure perimeter and data center security. It facilitates remote access management and traffic routing optimization, offering reliable security and connectivity solutions.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.