


Sophos Cyberoam UTM and Juniper vSRX compete in integrated security solutions. Sophos Cyberoam UTM is favored for security visibility while Juniper vSRX is noted for flexibility and scalability, but Cyberoam's comprehensive security features give it the upper hand.
Features: Sophos Cyberoam UTM offers virus and spam filtration, web filtering, and identity-based policies with bandwidth management. Juniper vSRX provides robust traffic management, VPN capabilities, and application filtering with high performance in virtual environments.
Room for Improvement: Sophos Cyberoam UTM struggles with performance degradation during new attacks and has scalability issues and a cumbersome policy configuration process. Juniper vSRX faces challenges with GUI complexity, stability issues, and inconsistent support service.
Ease of Deployment and Customer Service: Sophos Cyberoam UTM supports on-premises deployment with reliable on-site support but mixed remote support experiences, praised for its efficient technical support. Juniper vSRX excels in public cloud deployments and hybrid environments but is criticized for support responsiveness.
Pricing and ROI: Sophos Cyberoam UTM offers competitive pricing in the mid-segment, seen as cost-effective with moderate ROI despite cumbersome licensing. Juniper vSRX has a high price point affecting smaller organizations, deemed a solid long-term investment but with questioned ROI due to high immediate costs.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
As a solution provider, when I encounter problems, I connect directly with Fortinet support, and they provide solutions within a very short time.
I would rate their support a ten out of ten.
They resolve issues timely once connected.
Technical support is effective and responsive.
I would rate their technical support a solid nine out of ten.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
Juniper vSRX is a highly scalable solution, and I would rate its scalability a nine out of ten.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
These sessions should be around five to ten minutes long, allowing users and partners to quickly grasp the information without disrupting their daily tasks.
The solution should be able to implement machine learning and analytics of all the logs for threat detection and protection.
It would be better for customers to get immediate replacements even with a standard subscription.
I would suggest improving the pricing, particularly the licensing model.
For Sophos Cyberoam UTM, you don't really have that access that can give you those network flexibilities that would allow you to do some other types of architectures.
It would be beneficial if phone calls or SMS for two-factor authentication were available.
Sophos Cyberoam UTM should move in the direction of AI capabilities, as the world is moving toward AI.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
The pricing is competitive, being neither the most expensive nor the cheapest option.
The price is appropriate, but if you want the real truth, it's actually quite expensive.
We got a firewall and gave an SSL VPN to my client to connect to their servers, after which, such kind of activities involving ransomware attacks stopped.
They put in a thing called the FortiCookbook, which is very easy to read with real-life scenarios that make networking tasks like joining networks very straightforward.
The firewall and VPN features are the most valuable in protecting our customers' networks.
These features are crucial for our network security.
It provides bandwidth management, category management of websites, blocking certain elements, IPS blocking, DDoS protection, and VPN management between sites and clients.
I assess the benefit of Sophos Cyberoam UTM's centralized management for multi-appliance handling as a welcome feature because you can manage all the devices at one location, giving you notifications of downtime and updates without necessarily logging into each appliance, so that central management is a very genius move.
The way the rule sets are configured makes it an easily understandable way to manage.
| Product | Mindshare (%) |
|---|---|
| Fortinet FortiGate | 26.6% |
| Sophos Cyberoam UTM | 2.5% |
| Juniper vSRX | 2.5% |
| Other | 68.4% |



| Company Size | Count |
|---|---|
| Small Business | 367 |
| Midsize Enterprise | 135 |
| Large Enterprise | 193 |
| Company Size | Count |
|---|---|
| Small Business | 23 |
| Midsize Enterprise | 8 |
| Large Enterprise | 9 |
| Company Size | Count |
|---|---|
| Small Business | 47 |
| Midsize Enterprise | 29 |
| Large Enterprise | 17 |
Fortinet FortiGate is a versatile network security tool offering features like VPN, firewall, web filtering, intrusion prevention, and scalability. It is known for its performance and integration with other Fortinet products, making it a preferred choice for robust cybersecurity.
Fortinet FortiGate stands out as a comprehensive cybersecurity solution with strong performance and ease of configuration. It delivers unified threat management, integrating features such as dynamic routing, SD-WAN support, and centralized management. Despite its strengths, improvements in the web interface's stability, pricing structures, and reporting capabilities are needed. Users seek better integration with third-party tools and automation advancements to enhance the experience further. These enhancements, alongside improvements in bandwidth management and the reduction of licensing costs, are points of interest for users looking to capitalize on FortiGate's extensive capabilities.
What are Fortinet FortiGate's key features?Fortinet FortiGate is widely implemented across industries as a primary firewall system for securing internet gateways and safeguarding data centers. It supports businesses in achieving SD-WAN integration and enhances cybersecurity by providing essential features like antivirus, web filtering, and application control. Enterprises utilize FortiGate for securing remote connections and ensuring compliance with security standards, making it adaptable for different network sizes and industries.
Juniper vSRX is ideal for network security, offering scalable solutions for high-traffic environments and supporting comprehensive VPNs. Its easy setup, flexibility, and role-based access ensure efficient management across departments.
Crafted for robust firewall and network security, Juniper vSRX provides effective intrusion prevention, VPN functionalities, and traffic management. Its high-performance architecture handles large traffic volumes, and offerings such as application filtering and graphical interface enhance user operations. Although there is feedback on outdated GUI and scalability issues during high traffic, the benefits of flexibility and ease of deployment remain. Licensing complexities and cloud integration pose challenges, yet its abilities in server protection and supporting geographically diverse operations through IP VPN tunnels are advantageous.
What are the key features of Juniper vSRX?Juniper vSRX finds applications across industries for firewall and network security. Its use in virtual firewall services in cloud environments ensures secure connectivity innovations, while also addressing maritime security and on-premises network protection needs. Organizations leverage its capabilities for managing load traffic, threat protection, and seamless network authentication effectively.
Sophos Cyberoam UTM integrates diverse security features for efficient network management. Its multifunctional platform supports scalability and robust protection, catering to sectors like finance, education, and government, effectively securing remote operations and managing internet connectivity.
Offering centralized management, Sophos Cyberoam UTM stands out for its thorough threat protection, identity-based security, and flexibility in remote access. Its seamless integration with Active Directory and strong endpoint protection are key highlights. Users benefit from comprehensive reporting, application filtering, and effective bandwidth management. Core strengths are countered by challenges in scalability, VPN consistency, and detailed reporting. There's a call for improvements in web filtering, documentation, and hardware reliability, along with enhanced GUI accessibility and added AI capabilities.
What are the key features of Sophos Cyberoam UTM?In finance, Sophos Cyberoam UTM aids in threat management and internet monitoring. Education sectors use it for secure access control. Government organizations deploy it for reliable remote connections and malware protection. It's pivotal for firms needing web filtering and app control to maintain network efficiency.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.