Meraki MX vs Sophos Cyberoam UTM comparison

Cancel
You must select at least 2 products to compare!
Cisco Logo
99,561 views|66,518 comparisons
Cisco Logo
36,182 views|29,267 comparisons
Sophos Logo
2,913 views|2,254 comparisons
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Meraki MX and Sophos Cyberoam UTM based on real PeerSpot user reviews.

Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Meraki MX vs. Sophos Cyberoam UTM Report (Updated: November 2022).
656,474 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"You can also put everything into a nice, neat, little package, as far as configuration goes. I was formerly a command-line guy with the ASA, and I was a little nervous about dealing with a GUI interface versus a command line, but after I did my first deployment, I got a lot more comfortable with doing it GUI based.""It is extremely stable I would say — at least after you deploy it.""Netting is one of the best features. We can modify it in different ways. Site-to-site VPN is also an awesome feature of Cisco ASA. The biggest advantage of Cisco products is technical support. They provide the best technical support.""One of the nice things about Firepower is that you can set it to discover the environment. If that is happening, then Firepower is learning about every device, software operating system, and application running inside or across your environment. Then, you can leverage the discovery intelligence to get Firepower to select the most appropriate intrusion prevention rules to use for your environment rather than picking one of the base policies that might have 50,000 IPS rules in it, which can put a lot of overhead on your firewall. If you choose the recommendations, as long as you update them regularly, you might be able to get your rule set down to only 1,000 or 1,500, which is a significant reduction in a base rule set. This means that the firewall will give you better performance because there are less rules being checked unnecessarily. That is really useful.""The solution is excellent for enterprise-level networks.""It has definitely improved our organization. It gives us remote connectivity, helps workers connect remotely, and also gives us good connectivity to our other branches.""The VPN feature is the most valuable to us because it accomplishes the task well. We're able to do everything we need to do.""I have access to the web version of Cisco Talos to see the reputation of IP addresses. I find this very helpful. It provides important information for my company to obtain the reputation of IP addresses. The information in Talos is quite complete."

More Cisco Secure Firewall Pros →

"Meraki makes it easy to be secure and know where the holes are to fix them. We have been fixing anything that we have ever found for 20 years. We keep up-to-date with firmware upgrades. We just try to stay on top of everything for security, like maintaining updates and getting rid of old systems. I feel like we're on top of it.""Point-to-point VPNs can dynamically follow IP changes with no need for static IPs.""I think cloud management is key. The cloud management and support are the two things that make the product great.""MX is easy to manage, configure and install.""To me, the analytics feature is one of the most valuable in Meraki MX. I also find that it has good usability as it's cloud-based. Another valuable feature of Meraki MX is that it's simple to use and it's user-friendly.""I love the simplicity of Meraki MX — specifically, the simplicity of the dashboard.""Dual WAN connections are greatly simplified and point-to-point VPNs automatically connect regardless of what WAN connection is active.""The technical support people from Meraki are brilliant."

More Meraki MX Pros →

"Technical support is excellent.""I find Sophos Cyberoam UTM very good. I like the feature of being able to block off Mac IDs that host users. For example, you have a Mac or Windows laptop and you created a hotspot. Other devices like mobiles and tablets e.g. iPads connected to that hotspot. We can block those devices that connected to the hotspot we created, only through Sophos. It's a good feature we didn't find in other UTMs.""The solution is easy to integrate.""The solution is easy to use.""The main features I have found best are the load balancer and ease of use.""There are plenty of features available, such as Full Guard and WAN.""It is very easy to use.""The solution is excellent for web and application filtering and remote access with the VPN."

More Sophos Cyberoam UTM Pros →

Cons
"I would like it if they made the newer generation a bit simpler. You can do ASA code and FXOS. It is just a bit confusing with the newer generational equipment on what it can do.""We only have an issue with time sync with Cisco ASA and NTP. If the time is out of sync, it will be a disaster for the failover.""One of the few things that are brought up is that for the overall management, it would be great to have a cloud instance of that. And not only just a cloud instance, but one of the areas that we've looked at is using an HA type of cloud. To have the ability to have a device file within a cloud. If we had an issue with one, the other one would pick up automatically.""Cisco is not cheap, however, it is worth investing in these technologies.""In the future, I would like to be able to use an IP phone over a VPN connection.""Cisco Firepower NGFW Firewall can be more secure.""We're getting support but there's a big delay until we get a response from their technical team. They're in the USA and we're in Africa, so that's the difficulty. When they're in the office, they respond.""I would like to see improvement when you create policies on Snort 3 IPS on Cisco Firepower. On Snort 2, it was more like a UI page where you had some multiple choices where you could tweak your config. On Snort 3, the idea is more to build some rules on the text file or JSON file, then push it. So, I would like to see a lot of improvements here."

More Cisco Secure Firewall Cons →

"We had minor issues with Meraki MX. We had a couple of RMAs, so that could be an area for improvement, but in terms of how the RMAs went, the turnaround time and getting those back into redeployment were quick. Another area for improvement in Meraki MX is that when you're scaling for multiple locations, you need to use the same model, but the model you'd need is only available for a short time. The specific model you require could be out of stock, or Meraki isn't making that model anymore, so Meraki should improve that.""Meraki tech support staff have a lot more visibility into your network than you do, which is frustrating at times. I understand the approach is to keep the dashboard easier to understand. This will frustrate more advanced users at times.​""Meraki MX firewalls are great for small to medium-sized businesses, but other solutions are better for enterprise-sized companies.""It would be nice if the different services, including the SIEM SOC and endpoint detection and response (EDR) were integrated into one, so that I don't have to go to different vendors for different services.""You cannot use switching behaviors as you see on the Meraki switch.""An area for improvement in Meraki MX is that it needs some provision, as supplying the unit through Cisco can be tedious at times, but as far as the product itself and its offerings, Meraki MX is five-star all the way.""They need to improve the link between Meraki and Active Directory.""Meraki has some hidden features and information that is only privy to their engineers. If that information became available to us, then it would improve our ease of management, and we would be able to make certain adjustments instead of having to go to them."

More Meraki MX Cons →

"The VPN is an area that can be improved.""The solution is at its end of life and some of the appliances are finishing.""I had an issue when I was trying to stop a user from using too much bandwidth while I was using Azure, I was not able to stop them.""The configuration requires an expert to be set up, so it could be made simpler.""The policy is a bit too vague.""Sophos Cyberoam UTM could improve by adding VPN site-to-site capabilities. The correct version does not work with Microsoft Azure Cloud.""The implementation policy needs improvment.""While the security features are excellent, they could be improved."

More Sophos Cyberoam UTM Cons →

Pricing and Cost Advice
  • "They seem to be at the top end in terms of pricing, but they are worth the price. They are probably a little bit lower than Palo Alto. If the customers are relying on Cisco products and they are thinking more in terms of scaling to another layer in a year, it is pretty much in a good price range."
  • "We're using the smart license for this firewall. The models that we have require licensing for remote access."
  • "There are licensing costs."
  • "I just bought it off the shelf, and I'm using it with my previous one, so I have not spent that much."
  • "The price is fair. It's not the cheapest, but it's not bad."
  • "For me, personally, as an individual, Cisco Firepower NGFW Firewall is expensive."
  • "The product is very expensive."
  • "This is an expensive product, although when you buy this solution, you can do many things so it provides good value for the investment."
  • More Cisco Secure Firewall Pricing and Cost Advice →

  • "Its licensing cost could be better."
  • "The price could be lower, but compared to the TCO of other products, it's not really that expensive."
  • "Like any Cisco product, the license is really expensive for small business clients. It needs to be cheaper. If you look it up, you might go, "That doesn't make any sense.""
  • "We just have to pay for the product and the license. We have a license for three years, and it is renewed every three years. It costs $1,200 for three years for one endpoint. Meraki had a good promotion for remote workers or remote workforce. The discount is very good. This promotion continues till the next fiscal year of Cisco."
  • "​Other content filtering solutions that I have used had more bells and whistles, but given the cost, complexity, and management overhead, I am very pleased with Meraki’s solution."
  • "I think the price is comparable with other solutions of the same kind. Depending on the use case it could be cheaper or more expensive, I think it offers good value."
  • "The price of Meraki MX is between $8 and $1,200. Additionally, we typically purchase a three-year enterprise license, and we pay approximately $899 and mark it up a bit."
  • "The pricing for Meraki MX is all right, but as the hardware needs to be licensed, the cost depends on the complexity of the device and the term. Pricing could be $100 to $10,000 yearly or even more for a more complex device."
  • More Meraki MX Pricing and Cost Advice →

  • "I had an issue when I was trying to stop a user from using too much bandwidth while I was using Azure, I was not able to stop them."
  • "We pay for licensing the solution. It's my understanding that it is not overly expensive. It may be somewhere around $2,000 for a license."
  • "It is a cheap firewall. We are not paying for any license."
  • "There is a license for this solution and it is priced competitively. We paid approximately $2,000 for the license."
  • "The licensing is on an annual basis and is very reasonably priced."
  • "There is a license required for this solution and we are on a three-year contract. I am satisfied with the price."
  • "The solution comes with a yearly licensing fee."
  • "The pricing for this product is good. Its pricing is very low, enticing small businesses to purchase it over its competitors."
  • More Sophos Cyberoam UTM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Unified Threat Management (UTM) solutions are best for your needs.
    656,474 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: When you compare these firewalls you can identify them with different features, advantages, practices and… more »
    Top Answer:One of our favorite things about Fortinet Fortigate is that you can deploy on the cloud or on premises. Fortinet… more »
    Top Answer:It is easy to integrate Cisco ASA with other Cisco products and also other NAC solutions. When you understand the Cisco… more »
    Top Answer:We have Meraki Mx devices now, we are looking to replace them. But that is because the Meraki MX platform lacks SSL… more »
    Top Answer: Cisco Adaptive Security Appliance (ASA) software is the operating software for the Cisco ASA suite. It supports… more »
    Top Answer:Meraki equipment requires a current license in order to operate. This also gets you hardware replacement and tech… more »
    Top Answer:We use Sophos for handling restrictions and the inspection group. For example, HR and finance sites. We also use it for… more »
    Top Answer:Separate license keys are required for different solutions that we implement in the server room, which are an additional… more »
    Comparisons
    Also Known As
    Cisco ASA Firewall, Cisco Adaptive Security Appliance (ASA) Firewall, Cisco ASA NGFW, Cisco ASA, Adaptive Security Appliance, ASA, Cisco Sourcefire Firewalls, Cisco ASAv, Cisco Firepower NGFW Firewall
    MX64, MX64W, MX84, MX100, MX400, MX600
    Learn More
    Overview

    The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security that is both agile and integrated- leading to the strongest security posture available today and tomorrow.

      From your data center, branch offices, cloud environments, and everywhere in between, you can leverage the power of Cisco to turn your existing network infrastructure into an extension of your firewall solution, resulting in world class security controls everywhere you need them.

      Investing in a Secure Firewall appliance today gives you robust protections against even the most sophisticated threats without compromising performance when inspecting encrypted traffic. Further, integrations with other Cisco and 3rd party solutions provides you with a broad and deep portfolio of security products, all working together to correlate previously disconnected events, eliminate noise, and stop threats faster.

      Cisco Meraki MX appliances are next-generation firewalls with all the advanced security services needed for today’s IT security. The appliances are ideal for organizations considering a unified threat management (UTM) solution for branch offices, data centers, distributed sites, or campuses. Since Meraki MX is 100% cloud-managed, installation and remote management are simple and zero-touch.

      Meraki MX’s hardware and virtual appliances are configurable in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform, and private cloud support is offered through Cisco NFVIS and Alibaba Cloud.

      Organizations of all sizes and across all industries rely on Meraki MX to deliver secure connectivity to hub locations or multi-cloud environments, as well as application quality of experience (QoE) through advanced analytics with machine learning.

      Cisco Meraki’s advanced QoE analytics offers:

      • End-to-end health of web applications at a glance across the LAN, WAN, and application server.
      • Autonomous machine-learned smart application thresholds applied to identify true anomalies that are based on past behavioral patterns.
      • Ability to monitor the health of all MX WAN links across an entire organization.
      • Ability to detail hop-by-hop VoIP performance analysis across all uplinks.

      Cisco Meraki’s SD-WAN offers:

      The Meraki MX’s SD-WAN is unique in that it can be easily extended to deliver optimized access to resources in public and private cloud environments with virtual MX appliances. Its SD-WAN lowers operational costs and improves the performance of remotely-accessed resources. Users can ensure the availability of the apps and services their employees use most through dynamic path selection, policy-based routing, support for application-layer profiles, and VPN.

      Meraki MX offers industry-leading cloud management that has template-based settings which can scale easily from small deployments to tens of thousands of devices. It features an intuitive web-based dashboard for managing mobile devices, united firewalls, switching, and wireless LAN. Users can also benefit from role-based administration, configurable email alerts for a variety of important events, and easily auditable change logs. Meraki MX is capable of producing summary reports with device, user, and application details archived in the cloud.

      Meraki MX Key Features

      MX has a robust suite of network services in an all-in-one device, which saves you money by eliminating the need for multiple appliances. These services include:

      • SD-WAN capabilities
      • SNORT®-based intrusion detection and prevention
      • Layer 7 fingerprinting
      • Web caching
      • Application-based firewalling
      • Anti-malware
      • Geo-based firewalling
      • Content filtering
      • Site-to-site auto VPN and client VPN
      • Web search filtering
      • Cisco Advanced Malware Protection (AMP)
      • 4G cellular failover
      • Dynamic path selection
      • Web application health and VoIP health

      Reviews from Real Users

      Meraki MX stands out among its competitors for a number of reasons. Two major ones are its easy management and its ability to be accessed remotely. Below is some feedback from PeerSpot users who are currently using Meraki MX as their firewall security solution.

      Craig B., a central services engineer at Liberty Technology, writes, “The web console for managing everything keeps everything on Meraki and keeps us from going somewhere else. It is why I think a lot of people like Meraki. Comparing it to SonicWall or even a different Cisco firewall, like traditional ASAs, managing Meraki is a thousand times easier because of fluidity. You don't have to rebuild a table just to change one rule. It's much more readable for a human.”

      Edgardo C., an IT director, notes,”By using the VPN, we can connect remotely. We have two offices, and we could connect them through the VPN. We could establish a network between two sites, and that has improved and increased communication and productivity. Our remote site is able to access the server remotely.”

      Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective.
      Offer
      Learn more about Cisco Secure Firewall
      Learn more about Meraki MX
      Learn more about Sophos Cyberoam UTM
      Sample Customers
      There are more than one million Adaptive Security Appliances deployed globally. Top customers include First American Financial Corp., Genzyme, Frankfurt Airport, Hansgrohe SE, Rio Olympics, The French Laundry, Rackspace, and City of Tomorrow.
      Hyatt, ONS
      Gulf Corporation for Technology, Maridive & Oil Services, Fidelity Bank, Petra University, Capital FM Kenya, Safari Park Hotel and Casino, Mayfair Casino, Pacific International Lines, Mozambique Ministry of Education, University of Namibia, Royal Hospital for Neuro-disability, University of Hawai, New Delhi Municipal Council
      Top Industries
      REVIEWERS
      Financial Services Firm16%
      Comms Service Provider13%
      Computer Software Company9%
      Government8%
      VISITORS READING REVIEWS
      Comms Service Provider20%
      Computer Software Company19%
      Government7%
      Educational Organization5%
      REVIEWERS
      Comms Service Provider26%
      Financial Services Firm9%
      Performing Arts9%
      Consumer Goods Company9%
      VISITORS READING REVIEWS
      Computer Software Company19%
      Comms Service Provider17%
      Government6%
      Retailer5%
      REVIEWERS
      Manufacturing Company15%
      Non Profit12%
      Financial Services Firm6%
      Construction Company6%
      VISITORS READING REVIEWS
      Comms Service Provider26%
      Computer Software Company20%
      Energy/Utilities Company8%
      Government7%
      Company Size
      REVIEWERS
      Small Business36%
      Midsize Enterprise24%
      Large Enterprise40%
      VISITORS READING REVIEWS
      Small Business28%
      Midsize Enterprise19%
      Large Enterprise53%
      REVIEWERS
      Small Business60%
      Midsize Enterprise23%
      Large Enterprise17%
      VISITORS READING REVIEWS
      Small Business36%
      Midsize Enterprise18%
      Large Enterprise46%
      REVIEWERS
      Small Business48%
      Midsize Enterprise35%
      Large Enterprise17%
      VISITORS READING REVIEWS
      Small Business30%
      Midsize Enterprise22%
      Large Enterprise48%
      Buyer's Guide
      Meraki MX vs. Sophos Cyberoam UTM
      November 2022
      Find out what your peers are saying about Meraki MX vs. Sophos Cyberoam UTM and other solutions. Updated: November 2022.
      656,474 professionals have used our research since 2012.

      Meraki MX is ranked 2nd in Unified Threat Management (UTM) with 13 reviews while Sophos Cyberoam UTM is ranked 5th in Unified Threat Management (UTM) with 17 reviews. Meraki MX is rated 8.8, while Sophos Cyberoam UTM is rated 8.2. The top reviewer of Meraki MX writes "Makes it easy to stay on top of everything for security". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Reliable, easy to set up, and excellent for remote access with the VPN". Meraki MX is most compared with Fortinet FortiGate, Palo Alto Networks NG Firewalls, Sophos XG, SonicWall NSa and pfSense, whereas Sophos Cyberoam UTM is most compared with Fortinet FortiGate, Sophos UTM, pfSense, Sophos XG and GajShield Next Generation Firewall. See our Meraki MX vs. Sophos Cyberoam UTM report.

      See our list of best Unified Threat Management (UTM) vendors and best Firewalls vendors.

      We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.