Perimeter 81 vs Sophos Cyberoam UTM comparison

Cancel
You must select at least 2 products to compare!
Fortinet Logo
123,063 views|89,961 comparisons
90% willing to recommend
Perimeter 81 Logo
366 views|199 comparisons
97% willing to recommend
Sophos Logo
337 views|277 comparisons
84% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Perimeter 81 and Sophos Cyberoam UTM based on real PeerSpot user reviews.

Find out in this report how the two Firewalls solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Perimeter 81 vs. Sophos Cyberoam UTM Report (Updated: March 2024).
769,065 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The technical support in our region is excellent.""In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.""It has improved our organization with control data.""The most valuable features are that it is very simple to configure and to manage.""Initial setup is straightforward. There weren't too many issues with setting it up. It takes one hour or so.""Fortinet FortiGate has many valuable features, such as IDS, and intrusion detection. It has security features that are in part with the technologies that are available in the market.""The customization potential is quite impressive.""I like that you are able to manage FortiGate from the FortiManager to create a more centralized environment."

More Fortinet FortiGate Pros →

"Our operators can work from home without any problems.""Perimeter 81 provides a very secure and non-disruptive experience.""The setup is really easy...I rate the support team a ten out of ten.""The ease of use not only translates to quick adoption rates - it also ensures that our employees remain compliant with our cybersecurity protocols, enhancing the overall security posture of our organization.""Logging back into Perimeter 81 is relatively user-friendly as I just need to re-type my Windows credentials in to access the VPN.""Distributing the agent was very simple, allowing us to enforce security posture on our devices (i.e. S1, Disk-encryption, etc.).""It is a scalable solution.""Scaling Perimeter 81 was easy to do."

More Perimeter 81 Pros →

"The most valuable feature is the IPSec forwarding.""For a small-medium enterprise this solution is easy to manage and operate.""Our customers find it economical and offers good security. These two features are key. Ease of installation and implementation are also key factors.""The most valuable feature is the solution is easy to configure for users.""I like the SSL VPN connection. Cyberoam works well for controlling users and authenticating their connection to the internet.""The most valuable feature of the solution stems from the fact that it is a very strong product with good support.""The solution is easy to integrate.""We consider the user level and control features of Sophos Cyberoam UTM to be the best."

More Sophos Cyberoam UTM Pros →

Cons
"They should improve the interface to make it more user-friendly.""I'm not sure if it's something that they already have or are developing something, however, we need some dedicated features for container security.""The support team for Fortinet FortiGate needs to be more customer friendly.""Sometimes you do need to know some CLI commands, so it's a bit harder for technicians or new people that don't know it.""Fortinet Fortigate could benefit by simplifying some of their processes.""​It needs to improve its ISP load balancing.​""Fortinet FortiGate is a stable solution. However, my issue is the performance only. When I use all the profiles, this affects the performance. From the beginning, I should have had a better sizing of the box.""We would like to see better pricing."

More Fortinet FortiGate Cons →

"The platform still lacks relevant dashboards and the ability to customize them based on our needs.""Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed insights into network activity.""It would be nice to have a notification sound when Perimeter81 disconnects, as I sometimes don't notice when the icon shows that it's disconnected, and I end up wasting time waiting for my browser to load a page that shows an error, usually error 404.""I would suggest adding more networking and security features that allow more customization within their platform.""I don't know if it is technically feasible, however, if the Desktop App could be used as a Web App or a Chrome Extension it would be very nice.""The overall UI could be improved and updated to bring a simpler feel to the application.""If I were to be nitpicky, I would ask that Perimeter 81 offer the option for us to change the color of the graphical user interface, like maybe pink or green or so on.""There is a very small amount of downtime."

More Perimeter 81 Cons →

"I would like to see real-time alerts on traffic insights.""The reporting should be improved as well as the backup.""Sophos Cyberoam UTM could improve by adding VPN site-to-site capabilities. The correct version does not work with Microsoft Azure Cloud.""I had an issue when I was trying to stop a user from using too much bandwidth while I was using Azure, I was not able to stop them.""Sometimes, users are timed out intermittently.""When it comes to web filtering and application filtering, it does not contain enough signatures to determine all of the sites that need to be blocked.""The reporting part could be more user-friendly for troubleshooting and identifying network issues. It should be more easy for a normal user to identify the problem in their network.""I would like to see improvements in the development of reports. The process needs to be made simple."

More Sophos Cyberoam UTM Cons →

Pricing and Cost Advice
  • "Fortinet has one or two license types, and the VPN numbers are only limited by the hardware chassis make."
  • "These boxes are not that expensive compared to what they can do, their functionality, and the reporting you receive. Fortinet licensing is straightforward and less confusing compared to Cisco."
  • "Go for long term pricing negotiated at the time of purchase."
  • "Work through partners for the best pricing."
  • "The value is the capability of having multiple services with one unique license, not having the limitation per user licensing schema, like other vendors."
  • "Easy to understand licensing requirements."
  • "​We saved a bundle by not needing all the past appliances from an NGFW.​"
  • "The cost is too high... They have to focus on more features with less cost for the customer. If you see the market, where it's going, there are a lot of players offering more features for less cost."
  • More Fortinet FortiGate Pricing and Cost Advice →

  • "Overall I am very happy with the solution’s flexibility and pricing."
  • "The cost of the solution's licenses depends on the particular use cases."
  • "The solution is priced appropriately considering its uses. For an essential license, a user pays only 30 USD per month. For an enterprise version, the prices can be negotiated with the company."
  • "Perimeter 81 charges separately for gateways and VPN connectivity, but compared to Azure, it seemed more reasonable."
  • More Perimeter 81 Pricing and Cost Advice →

  • "It is very reasonably priced as compared to other solutions in the market."
  • "Licensing is a bit costly, mostly for features requiring subscription."
  • "Licensing is very good value for the money."
  • "It is more expensive than cheap routers, but it offers a lot of functionality, and that warrants the price."
  • "The price is very competitive and the licensing is easy."
  • "It’s value for the money. It’s functionally competitive with higher priced alternative brands."
  • "It is worth the value."
  • "Prices are very high."
  • More Sophos Cyberoam UTM Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Firewalls solutions are best for your needs.
    769,065 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: When you compare these firewalls you can identify them with different features, advantages, practices and usage at… more »
    Top Answer:From my experience regarding both the Sophos and FortiGate firewalls, I personally would rather use FortiGate. I know… more »
    Top Answer:As a solution, Sophos UTM offers a lot of functionality, it scales well, and the stability and performance are quite… more »
    Top Answer:Even after restarting, it tries to quickly reestablish connection which is very helpful.
    Top Answer:It's essential to consider the organization's specific requirements and budget. Here are some general recommendations: *… more »
    Top Answer:In terms of improvement, Perimeter 81 could enhance its reporting and analytics capabilities to provide more detailed… more »
    Top Answer:The solution works perfectly without any users.
    Top Answer:There are some issues with logs and report limitations.
    Comparisons
    Also Known As
    FortiGate 60b, FortiGate 60c, FortiGate 80c, FortiGate 50b, FortiGate 200b, FortiGate 110c, FortiGate
    Learn More
    Overview

    Fortinet FortiGate enhances network security, prevents unauthorized access, and offers robust firewall protection. Valued features include advanced threat protection, reliable performance, and a user-friendly interface. It improves efficiency, streamlines processes, and boosts collaboration, providing valuable insights for informed decision-making and growth.

    Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.  

    Perimeter 81 Benefits:

    • Easy to use
    • Flexible access policies
    • Strong encryption and authentication protocols
    • Scalable
    • Compatible with various devices and platforms

    Perimeter 81 Features:

    • Secure Network Access: Perimeter 81 provides secure access to internal resources and cloud-based applications through its client applications and gateways.
    • Software-Defined Perimeter (SDP): SDP is a security framework that focuses on dynamically creating secure connections between users and resources on a need-to-know basis. 
    • Zero Trust Network Access (ZTNA): Perimeter 81 follows the Zero Trust security model, which assumes that no user or device can be inherently trusted. 
    • Multi-Cloud and Hybrid Cloud Support: Perimeter 81 is designed to secure access to resources across multi-cloud and hybrid cloud environments.
    • User and Device Management: The solution offers centralized user and device management capabilities, allowing administrators to define access policies, manage user roles, and enforce multi-factor authentication (MFA) for enhanced security. 
    • Network Segmentation: Perimeter 81 enables organizations to segment their network resources, creating isolated environments based on logical groupings. 
    • Centralized Management and Analytics: Perimeter 81 provides a centralized management console where administrators can configure and monitor their network security settings.

    Reviews from Real Users

    PeerSpot user, Frontend Developer at Limelight Networks, states that "We use some VPN solutions, and Perimeter 81 has the best user experience for desktop or mobile".

    Daniel Goldfeld, Vice President of Customer Success at Mine - The All-in-One Privacy Suite, says that Perimeter 81 has "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions".

    Another PeerSpot user, Accounts Payable Specialist at Simera, writes that "The feature that I have found to be most valuable is the reputation that the company has regarding privacy. Nowadays, this is critical, especially when you do all of your work online."

      Cyberoam Unified Threat Management hardware appliances offer comprehensive security to organizations, ranging from large enterprises to small and branch offices. Multiple security features integrated over a single, Layer 8 Identity-based platform make security simple, yet highly effective.
      Sample Customers
      1. Amazon Web Services 2. Microsoft 3. IBM 4. Cisco 5. Dell 6. HP 7. Oracle 8. Verizon 9. AT&T 10. T-Mobile 11. Sprint 12. Vodafone 13. Orange 14. BT Group 15. Telstra 16. Deutsche Telekom 17. Comcast 18. Time Warner Cable 19. CenturyLink 20. NTT Communications 21. Tata Communications 22. SoftBank 23. China Mobile 24. Singtel 25. Telus 26. Rogers Communications 27. Bell Canada 28. Telkom Indonesia 29. Telkom South Africa 30. Telmex 31. Telia Company 32. Telkom Kenya
      Aqua Security, Cognito, Multipoint, Kustomer, Postman, Meredith
      Gulf Corporation for Technology, Maridive & Oil Services, Fidelity Bank, Petra University, Capital FM Kenya, Safari Park Hotel and Casino, Mayfair Casino, Pacific International Lines, Mozambique Ministry of Education, University of Namibia, Royal Hospital for Neuro-disability, University of Hawai, New Delhi Municipal Council
      Top Industries
      REVIEWERS
      Comms Service Provider16%
      Computer Software Company9%
      Financial Services Firm8%
      Manufacturing Company7%
      VISITORS READING REVIEWS
      Educational Organization20%
      Computer Software Company15%
      Comms Service Provider8%
      Manufacturing Company6%
      REVIEWERS
      Computer Software Company58%
      University8%
      Media Company8%
      Construction Company8%
      VISITORS READING REVIEWS
      Computer Software Company22%
      Financial Services Firm7%
      Manufacturing Company7%
      Government6%
      REVIEWERS
      Manufacturing Company12%
      Non Profit10%
      Government8%
      Financial Services Firm8%
      VISITORS READING REVIEWS
      Computer Software Company22%
      Financial Services Firm12%
      Comms Service Provider11%
      Media Company9%
      Company Size
      REVIEWERS
      Small Business48%
      Midsize Enterprise23%
      Large Enterprise30%
      VISITORS READING REVIEWS
      Small Business27%
      Midsize Enterprise32%
      Large Enterprise41%
      REVIEWERS
      Small Business48%
      Midsize Enterprise30%
      Large Enterprise22%
      VISITORS READING REVIEWS
      Small Business34%
      Midsize Enterprise19%
      Large Enterprise47%
      REVIEWERS
      Small Business50%
      Midsize Enterprise31%
      Large Enterprise19%
      VISITORS READING REVIEWS
      Small Business37%
      Midsize Enterprise16%
      Large Enterprise47%
      Buyer's Guide
      Perimeter 81 vs. Sophos Cyberoam UTM
      March 2024
      Find out what your peers are saying about Perimeter 81 vs. Sophos Cyberoam UTM and other solutions. Updated: March 2024.
      769,065 professionals have used our research since 2012.

      Perimeter 81 is ranked 11th in Firewalls with 22 reviews while Sophos Cyberoam UTM is ranked 7th in Unified Threat Management (UTM) with 81 reviews. Perimeter 81 is rated 9.2, while Sophos Cyberoam UTM is rated 8.0. The top reviewer of Perimeter 81 writes "Great SAML and SCIM support with the ability to deploy site-2-site tunnels with specific IP restrictions". On the other hand, the top reviewer of Sophos Cyberoam UTM writes "Stable and has a straightforward setup; reporting is fast and easy". Perimeter 81 is most compared with Zscaler Zero Trust Exchange, Cato SASE Cloud Platform, Prisma Access by Palo Alto Networks, Cloudflare Access and Tailscale, whereas Sophos Cyberoam UTM is most compared with Netgate pfSense, Cisco Secure Firewall, Sophos UTM, Juniper SRX Series Firewall and Sophos XG. See our Perimeter 81 vs. Sophos Cyberoam UTM report.

      See our list of best Firewalls vendors.

      We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.