Palo Alto Networks K2-Series vs Sophos Cyberoam UTM comparison

Cancel
You must select at least 2 products to compare!
Fortinet Logo
123,063 views|89,961 comparisons
90% willing to recommend
Palo Alto Networks Logo
1,031 views|140 comparisons
96% willing to recommend
Sophos Logo
337 views|277 comparisons
84% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Palo Alto Networks K2-Series and Sophos Cyberoam UTM based on real PeerSpot user reviews.

Find out in this report how the two Firewalls solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Palo Alto Networks K2-Series vs. Sophos Cyberoam UTM Report (Updated: March 2024).
769,065 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"We use the filtering feature the most. It has filtering and inbuilt securities. We can create customized rules to define which users can access a particular type of site. We can create policies inside the firewall.""The feature I like most is the SD-WAN. It allows you to manage more than one ISP at the same time. And there is a high-availability mode, so if one of your ISPs is down, you still have a backup.""Fortinet has a very good solution for Secure SD-WAN. One very good feature is that they have robust and simple FortiOS through which they provide all solutions. That's their strength. There's not much complexity involved with the Secure SD-WAN solution of Fortinet as compared to Cisco's solution, which has a lot of flexibility but complexity also comes with that flexibility.""Fortinet FortiGate's ease of management is the most valuable feature.""The reporting and monitoring are very good.""Web filtering and two-factor authentication are great features.""The solution is easy to configure and maintain remotely.""The initial setup of Fortinet FortiGate was straightforward."

More Fortinet FortiGate Pros →

"The company is inventive and always adds a lot of great features.""It is a stable solution.""Everything I could possibly want has already been implanted in the new version.""This is a very reliable firewall and we have never had problems with it.""As long as the solution is kept updated, it's pretty stable.""The solution is reliable and scales well.""Palo Alto has an approach that makes the configuration easier not only for the customers but also for the IT help for the customers.""It caters to typical use cases across various technologies. MDR and XDR, for example, focus on user and endpoint protection. It's pretty straightforward."

More Palo Alto Networks K2-Series Pros →

"Web and content filtering are valuable in preventing people from abusing the network and pushing up the bandwidth price.""Content filtering, as this enables me to control that which employees can view at different time quotas.""The product, itself, doesn't seem to have any bugs or glitches.""It is a VPN that serves all your needs as an application firewall.""Having a firewall solution with a data quota is very important when the bandwidth is limited, which really distinguishes it from other products.""The solution is excellent for web and application filtering and remote access with the VPN.""You can geofence yourself if there is an incoming attack or a continuous ping from a company outside your country.""All in one UTM appliance."

More Sophos Cyberoam UTM Pros →

Cons
"The ease of use could be improved.""The renewal price and the availability could be improved.""Improvement is needed in the Web Filter quotas to restrict users with allocated quotas.""Their software support needs improvement. I would prefer to have better support for bug fixes. Sometimes, we open a ticket, and it is very difficult to get a solution. Specifically, we are not at all happy with their support for load balancing.""In some cases, its initial setup could be hard for customers.""I need user-behavior analytics, to find threat scenarios from inside the organization, insider attacks. That would be very helpful for us. In addition, I would like next-generation features for small and medium businesses. These businesses require UTM, all in one product. Fortinet must include it.""Due to its higher cost, Fortinet FortiGate can lead to increased operational expenses.""There are problems with the custom reporting of the unique traffic. The data is there, but it is too difficult for us to extract."

More Fortinet FortiGate Cons →

"If we have issues, they take anywhere from two days to a week to respond. I even wrote to their CEO because there was no response. When it comes to support, this is the worst company.""The solution needs a series of OS changes.""Palo Alto doesn't have extended visibility to the end point in their firewalls.""We had some issues with upgrading in the past. They could make the process easier.""Some users do not accept cloud-based data processing. They prefer on-premises functionality, especially for advanced threat analysis. While the general trend is moving towards cloud, specific customer needs should be considered. Perhaps certain functionalities, particularly in advanced threat analysis, could be offered as an on-premises option for those clients.""I'd like to see more data protection on the system.""The tool needs to improve integration with more products from other vendors. I would like the product to add threat intelligence features as well.""The technical support, and how they provide it to the client, needs to be improved."

More Palo Alto Networks K2-Series Cons →

"The price is obviously a more sensitive area to focus on.""The product is at its end-of-life. There is nothing to improve as it will be discontinued.""The VPN needs to be improved.""Smaller CR15 units don’t have a hard disc or built in IView software. These units could do with that feature.""Hence, it needs to be easier to configure rules using the solution.""Needs a mail alert/notification when the device loses any of its connections, during ISP redundancy implementation.""There are some issues with logs and report limitations.""Technical support could be faster."

More Sophos Cyberoam UTM Cons →

Pricing and Cost Advice
  • "Fortinet has one or two license types, and the VPN numbers are only limited by the hardware chassis make."
  • "These boxes are not that expensive compared to what they can do, their functionality, and the reporting you receive. Fortinet licensing is straightforward and less confusing compared to Cisco."
  • "Go for long term pricing negotiated at the time of purchase."
  • "Work through partners for the best pricing."
  • "The value is the capability of having multiple services with one unique license, not having the limitation per user licensing schema, like other vendors."
  • "Easy to understand licensing requirements."
  • "​We saved a bundle by not needing all the past appliances from an NGFW.​"
  • "The cost is too high... They have to focus on more features with less cost for the customer. If you see the market, where it's going, there are a lot of players offering more features for less cost."
  • More Fortinet FortiGate Pricing and Cost Advice →

  • "Products by the leader in the field are justifiably a bit more expensive compared to other vendors."
  • "The price of this solution is too high."
  • "This solution is expensive compared to other, similar products."
  • "This is an expensive solution, although you will get value for the price."
  • "Pricing is a sensitive issue because the cost is high in this market."
  • "Palo Alto firewalls are very expensive."
  • "It would be nice if they lowered their prices for small businesses."
  • "The price of the solution is expensive."
  • More Palo Alto Networks K2-Series Pricing and Cost Advice →

  • "It is very reasonably priced as compared to other solutions in the market."
  • "Licensing is a bit costly, mostly for features requiring subscription."
  • "Licensing is very good value for the money."
  • "It is more expensive than cheap routers, but it offers a lot of functionality, and that warrants the price."
  • "The price is very competitive and the licensing is easy."
  • "It’s value for the money. It’s functionally competitive with higher priced alternative brands."
  • "It is worth the value."
  • "Prices are very high."
  • More Sophos Cyberoam UTM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Firewalls solutions are best for your needs.
    769,065 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: When you compare these firewalls you can identify them with different features, advantages, practices and usage at… more »
    Top Answer:From my experience regarding both the Sophos and FortiGate firewalls, I personally would rather use FortiGate. I know… more »
    Top Answer:As a solution, Sophos UTM offers a lot of functionality, it scales well, and the stability and performance are quite… more »
    Top Answer:In the best tradition of these questions, Feature-wise both are quite similar, but each has things it's better at, it… more »
    Top Answer:It caters to typical use cases across various technologies. MDR and XDR, for example, focus on user and endpoint… more »
    Top Answer:The solution works perfectly without any users.
    Top Answer:There are some issues with logs and report limitations.
    Comparisons
    Also Known As
    FortiGate 60b, FortiGate 60c, FortiGate 80c, FortiGate 50b, FortiGate 200b, FortiGate 110c, FortiGate
    Learn More
    Overview

    Fortinet FortiGate enhances network security, prevents unauthorized access, and offers robust firewall protection. Valued features include advanced threat protection, reliable performance, and a user-friendly interface. It improves efficiency, streamlines processes, and boosts collaboration, providing valuable insights for informed decision-making and growth.

    Designed to handle growing throughput needs due to increasing amounts of application-, user-, and device-generated data, the K2-Series offers amazing performance and threat prevention capabilities to stop advanced cyberattacks and secure mobile network infrastructure, subscribers, and services.

    Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective.
    Sample Customers
    1. Amazon Web Services 2. Microsoft 3. IBM 4. Cisco 5. Dell 6. HP 7. Oracle 8. Verizon 9. AT&T 10. T-Mobile 11. Sprint 12. Vodafone 13. Orange 14. BT Group 15. Telstra 16. Deutsche Telekom 17. Comcast 18. Time Warner Cable 19. CenturyLink 20. NTT Communications 21. Tata Communications 22. SoftBank 23. China Mobile 24. Singtel 25. Telus 26. Rogers Communications 27. Bell Canada 28. Telkom Indonesia 29. Telkom South Africa 30. Telmex 31. Telia Company 32. Telkom Kenya
    State of North Dakota, SEGA, Alameda County Office of Education, Temple University, VERGE, CAME
    Gulf Corporation for Technology, Maridive & Oil Services, Fidelity Bank, Petra University, Capital FM Kenya, Safari Park Hotel and Casino, Mayfair Casino, Pacific International Lines, Mozambique Ministry of Education, University of Namibia, Royal Hospital for Neuro-disability, University of Hawai, New Delhi Municipal Council
    Top Industries
    REVIEWERS
    Comms Service Provider16%
    Computer Software Company9%
    Financial Services Firm8%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Educational Organization20%
    Computer Software Company15%
    Comms Service Provider8%
    Manufacturing Company6%
    REVIEWERS
    Financial Services Firm36%
    Comms Service Provider21%
    Computer Software Company21%
    Transportation Company7%
    VISITORS READING REVIEWS
    Computer Software Company25%
    Energy/Utilities Company10%
    Real Estate/Law Firm8%
    Healthcare Company6%
    REVIEWERS
    Manufacturing Company12%
    Non Profit10%
    Government8%
    Financial Services Firm8%
    VISITORS READING REVIEWS
    Computer Software Company22%
    Financial Services Firm12%
    Comms Service Provider11%
    Media Company9%
    Company Size
    REVIEWERS
    Small Business48%
    Midsize Enterprise23%
    Large Enterprise30%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise32%
    Large Enterprise41%
    REVIEWERS
    Small Business41%
    Midsize Enterprise17%
    Large Enterprise41%
    VISITORS READING REVIEWS
    Small Business28%
    Midsize Enterprise22%
    Large Enterprise51%
    REVIEWERS
    Small Business50%
    Midsize Enterprise31%
    Large Enterprise19%
    VISITORS READING REVIEWS
    Small Business37%
    Midsize Enterprise16%
    Large Enterprise47%
    Buyer's Guide
    Palo Alto Networks K2-Series vs. Sophos Cyberoam UTM
    March 2024
    Find out what your peers are saying about Palo Alto Networks K2-Series vs. Sophos Cyberoam UTM and other solutions. Updated: March 2024.
    769,065 professionals have used our research since 2012.

    Palo Alto Networks K2-Series is ranked 27th in Firewalls with 29 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Palo Alto Networks K2-Series is rated 8.4, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Palo Alto Networks K2-Series writes "Easy to implement and manage, and the documentation is good". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Palo Alto Networks K2-Series is most compared with Palo Alto Networks NG Firewalls, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Palo Alto Networks K2-Series vs. Sophos Cyberoam UTM report.

    See our list of best Firewalls vendors.

    We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.