it_user1065 - PeerSpot reviewer
Senior Manager of Data Center at a integrator with 51-200 employees
Vendor
Unified Threat Management is one of the best layer 8 application and web security appliances by Cyberoam

What is most valuable?

It is an excellent product with lots of pros such as- 1) AntiVirus 2) AntiSpam 3) Web and application level filtering 4) Intrusion detection with instant prevention of zero day attacks 5) Identity based policy creation 6) Access control criteria 7)Flexible policy creation with stacking and VPN support

What needs improvement?

Few cons of the product are 1) Incapable of handling new attacks without degradation in performance 2) High pricing 3) ASIC based hence cannot be reprogrammed for newer attacks, falls victim to new vulnerabilities and exploits 4) Older software architecture and lack of multi core technology 5) Performance is a legitimate concern under high traffic conditions

What other advice do I have?

Unified Threat Management System is an elite product which has been engineered for security, productivity, and connectivity to users across the wide area and local area networks. It specializes in application level filtering according to the OSI Model. Its Layer 8 technology makes it a class apart from the other firewalls available. Layer 8 filtering mechanism enables the user to filter keywords, URLs, and services for application layer filtering. It also has a built in packet inspection engine for packet intrusion prevention.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user903573 - PeerSpot reviewer
Assistant Manager IT at a insurance company with 11-50 employees
Real User
Web and content filtering, and bandwidth monitoring help keep bandwidth costs in check
Pros and Cons
  • "Web and content filtering are valuable in preventing people from abusing the network and pushing up the bandwidth price."
  • "Cyberoam configuration is done through the browser, which is one of the places that viruses spread."
  • "Once in a while, an unwanted email will slip in. You have to set your parameters to avoid that happening, but once in a while, an email has slipped past firewall. Once you update the firmware, you notice that it doesn't happen. If an email slips in, I get a little bit worried. I do get the report, but you just don't want that situation happening in the first place."

What is our primary use case?

The primary use is for our firewall, for intrusion detection and prevention. Other uses include internet web filtering, application content blocking, and some VPN. We also look at bandwidth optimization. We don't want users to abuse the network.

How has it helped my organization?

One of the benefits has been cost reduction because I am now able to monitor my bandwidth. I have just enough bandwidth to utilize within the organization, without having to spend significant amounts toward additional bandwidth. That has been one of the major benefits.

It has also increased productivity within the organization because now, fewer people are spending time abusing the network, and are focusing more on their jobs. I have not totally blocked everything, they do get their social life after hours, it's just a control during work hours.

What is most valuable?

For me, the web and content filtering are valuable because that, unfortunately, is where the abuse happens a lot. People are abusing the network and pushing up the bandwidth price.

What needs improvement?

Once in a while, an unwanted email will slip in. You have to set your parameters to avoid that happening, but once in a while, an email has slipped past firewall. Once you update the firmware, you notice that it doesn't happen. If an email slips in, I get a little bit worried. I do get the report, but you just don't want that situation happening in the first place.

When I look comparatively at certain products like Check Point - I haven't used Check Point but I have seen it in action - the people who have actually used it have confirmed that they have not had that experience before. 

However, I do know that Cyberoam is upgrading from Cyberoam to Sophos. I'd love to see the upgrade. I'd love to see a swap-out of the device. I should be able to swap out my device rather than I have to buy the whole unit again.

One of the places that viruses spread is through the browser. Unfortunately, Cyberoam configuration is done through the browser. That makes the configuration process is easier. But if your PC is clean and you're configuring Cyberoam then you should have no issues in the first place.

I've never used the console, so maybe that's an area of training that the Cyberoam should look into. That would enable me to configure the device without necessarily using a browser. But then again, if I am going to use a computer to configure it, my PC should be clean.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

The solution has been very stable. I have had no issues. Occasionally I do some penetration testing and I put it through its paces. I was quite impressed. I did not see any performance downgrade, which was impressive.

What do I think about the scalability of the solution?

I managed to scale up, but not from the model perspective. It began to fail only when the number of users grew significantly. I had to replace it but that was because we planned for 50 people and, suddenly, the organization doubled to 100 people, which was a significant jump.

How are customer service and technical support?

It is very good, both local as well as non-local. The technical support for the Cyberoam website was very helpful with regards to the few issues that I had. Here in Zambia, there is a Cyberoam representative, and we have no issues with the support. I have found it very helpful.

Which solution did I use previously and why did I switch?

One of the reasons we invested in the Cyberoam solution was that we were looking at content filtering. That was the initial discussion. While searching for content filtering, Cyberoam appeared. One of the advantages of Cyberoam, in particular is the Layer 8 technology, the user layer. That pushed us towards Cyberoam.

When selecting a vendor, one of the key issues is the support. It's easy to buy something, but the after-sales support is very critical for me. It is very critical because half the stuff happens not during the purchases, but rather after I've bought the gadgets. I have it on my table, and, yay, it's working and, two days later, it's down and I can't get my support guys on site.

Another one of the determining factors was cost. I chose Cyberoam at a time when the organization was restructuring. We were trying to cut down on cost, so we analyzed the solution critically. Cyberoam has a recurring yearly cost. Competing products are good, but some of the initial setup costs were very high. And then you have to look at the ability to actually get the support in.

So support, pricing, and after-sales were key, as well as the ability to swap out the device should it be faulty. I should be able to swap it out within a specified period. There is no point in having my network down for five hours. Thankfully, I haven't experienced that.

How was the initial setup?

It was very straightforward. I'm a Cyberoam-certified practitioner, but I actually deployed Cyberoam before I got my practitioner license, and I had no issues. So it was very easy.

Which other solutions did I evaluate?

Cisco has a very good product, but there were only a handful of support people available in the country at that time. My vendors said that Cyberoam has very good support, you can actually learn it and they offer initial support. 

I took up the challenge. I bought the product, did the implementation, went to the user training, and the support was readily available for my vendors.

What other advice do I have?

See what your market is offering. Here in Zambia, Cyberoam has a lot of support. Take your time and make sure that when you're making a decision, your requirements are met. Cyberoam met our requirements. I was only looking at web filtering and I got a whole lot more than that.

Also, your after-sales support is crucial. Train yourself, because if you have the knowledge of a product, it's easy for you to set it up and use it to its fullest potential.

I rate this solution a nine out of ten. It has met many of my requirements even without subscription, just the base model. It's easy to use, easy to install, easy to implement. There isn't too much headache or cabling, you don't have to replace a whole, huge network. You're just replacing one thing and it can be implemented without an issue.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Sophos Cyberoam UTM
April 2024
Learn what your peers think about Sophos Cyberoam UTM. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,236 professionals have used our research since 2012.
IT Officer at Hospital
Real User
A stable solution that is easy to install, but the cloud integration needs to be improved
Pros and Cons
  • "The most valuable feature is the IPSec forwarding."
  • "The VPN needs to be improved."

What is our primary use case?

We are using this solution for remote access to some of our devices.

What is most valuable?

The most valuable feature is the IPSec forwarding.

What needs improvement?

The VPN needs to be improved.

Integration with the cloud needs to be improved.

For how long have I used the solution?

I have been working with Sophos Cyberoam UTM for two years.

What do I think about the stability of the solution?

The stability is fine and I haven't had any problems.

What do I think about the scalability of the solution?

Cyberoam seems scalable but I have not looked at all of the aspects.

How are customer service and technical support?

To this point, I have not used technical support from the vendor. When I have had trouble, I just review the site and perform searches using Google.

How was the initial setup?

The initial setup is easy. We deployed over a period of six months.

What other advice do I have?

All of the features are quite good and this is definitely a product that I recommend.

I would rate this solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Team Lead.Tech.Support (Network & Security) at a tech services company with 1-10 employees
Real User
Web Filtering and Application Filtering saves a lot of my bandwidth.
Pros and Cons
  • "Web Filtering and Application Filtering saves a lot of my bandwidth and improves the user's productivity."

    How has it helped my organization?

    By using this UTM, I can set bandwidth for a particular user. For example, If user A is downloading lots of stuff then I can restrict him through the application Web and Bandwidth Management features.

    What is most valuable?

    Web Filtering and Application Filtering saves a lot of my bandwidth and improves the user's productivity.

    What needs improvement?

    The Web Filter and Application Filter need improvement.

    In the Web Filter, there is a problem to block YouTube by HTTPS, so this needs to improve.

    What do I think about the stability of the solution?

    There were no stability issues.

    What do I think about the scalability of the solution?

    There were no scalability issues.

    How is customer service and technical support?

    I would give the technical support a 10/10 rating.

    How was the initial setup?

    The setup was straightforward and user-friendly.

    What's my experience with pricing, setup cost, and licensing?

    Compared to the other products, it is good.

    Which other solutions did I evaluate?

    We evaluated SonicWall.

    What other advice do I have?

    Close your eyes and just go for it.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    PeerSpot user
    Sr. System Administrator at a engineering company with 1,001-5,000 employees
    Vendor
    It has good bandwidth management, although licensing costs are high.

    Valuable Features

    • Management Console
    • Security
    • Bandwidth management

    Use of Solution

    I've used it for six years.

    Deployment Issues

    Yes once when we updated a new firmware, then we again rolled back to previous one.

    Customer Service and Technical Support

    Customer Service:

    Customer service is very poor.

    Technical Support:

    They have good technical support.

    Initial Setup

    When we purchased it, it was complex, but now it’s straightforward. The SSO is introduced in our premise only. At that time we only had the requirement of SSO.

    Implementation Team

    The first time through the vendor, and the second time our own in house team did it.

    Pricing, Setup Cost and Licensing

    Pricing and licensing is high.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user232035 - PeerSpot reviewer
    it_user232035Sr. System Administrator at a engineering company with 1,001-5,000 employees
    Vendor

    Sophos Cyberoam is a good UTM Device but in India the technical support has gone drastically poor after it merged with Sophos. needs to improve the technical support.

    See all 4 comments
    it_user300513 - PeerSpot reviewer
    Manager at a tech services company with 501-1,000 employees
    Consultant
    ​The initial setup is straightforward and simple, but it needs better support for multiple ISP segregation.

    What is most valuable?

    There are many features that are valuable, but the Bandwidth Management and Web/Application Filter policies are the most valuable.

    How has it helped my organization?

    It has minimized the bandwidth consumption as a result of which many other applications run smoothly.

    What needs improvement?

    The most important improvement Cyberoam needs is the multiple ISP segregation.

    For how long have I used the solution?

    I used this solution from 2012 through 2014.

    What do I think about the stability of the solution?

    Sometimes the proxy server turns idle, then we need to restart the service.

    How are customer service and technical support?

    Customer Service:

    It's one of the best.

    Technical Support:

    It's one of the best.

    Which solution did I use previously and why did I switch?

    I have not used a previous solution.

    How was the initial setup?

    The initial setup is straightforward and simple.

    What about the implementation team?

    We used a vendor team.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user254625 - PeerSpot reviewer
    Network Security Engineer at a tech services company with 501-1,000 employees
    Consultant
    It is very good and very near perfect.

    Valuable Features

    The UTM features. It’s a one stop IT security solution managed from the Cyberoam Central Console (CCC).

    Improvements to My Organization

    Dealing with security threats is a lot easier as it’s less of a CLI interface, and more of a GUI.

    Use of Solution

    I’ve used it for 12 months.

    Deployment Issues

    I met the whole system working when I resumed duty as a Network Security Support Engineer 12 months ago.

    Stability Issues

    Since I resumed my post, the entire Cyberoam system has been stable.

    Scalability Issues

    Since I resumed my post, the entire Cyberoam system has been stable.

    Customer Service and Technical Support

    Customer Service:

    8/10.

    Technical Support:

    8/10.

    Initial Setup

    I met an already functional system when I resumed my present appointment.

    Implementation Team

    I was made to understand that implementation was an in-house arrangement.

    ROI

    • Cost effectiveness
    • Easier to manage
    • Turnaround time in getting issues resolved faster

    Other Advice

    The product is very good and very near perfect in terms of service delivery, cost effectiveness and manageability.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Science Technician at a government with 201-500 employees
    Real User
    Effective load balancer, easy to use, but needs better documentation
    Pros and Cons
    • "The main features I have found best are the load balancer and ease of use."
    • "In my experience the solution can be easier to configure with more documentation, we need more training."

    What is our primary use case?

    I use the solution as a firewall to protect my network and the two main computers for our website.

    What is most valuable?

    The main features I have found best are the load balancer and ease of use.

    What needs improvement?

    In my experience the solution can be easier to configure with more documentation, we need more training.

    For how long have I used the solution?

    I have been using the solution for a short time.

    What do I think about the stability of the solution?

    The solution is stable.

    What do I think about the scalability of the solution?

    The solution is scalable. We had approximately 500 users using the solution.

    Which solution did I use previously and why did I switch?

    I was using Kerio Control before this solution and I liked some of the features but we only used it for a short time.

    How was the initial setup?

    The solution was easy to install, it was straightforward. It took approximately three hours to configure it. We have one security and network administrators for the maintenance of the solution.

    What about the implementation team?

    We have used consultants in the past for the implementation.

    What's my experience with pricing, setup cost, and licensing?

    There is a license for this solution and it is priced competitively. We paid approximately $2,000 for the license.

    What other advice do I have?

    We stopped using the solution because we needed more training and the documentation needed improvements.

    I would recommend this solution to others.

    I rate Sophos Cyberoam UTM a seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Sophos Cyberoam UTM Report and get advice and tips from experienced pros sharing their opinions.
    Updated: April 2024
    Buyer's Guide
    Download our free Sophos Cyberoam UTM Report and get advice and tips from experienced pros sharing their opinions.