- Firewalls
- Developer access
- VPN traffic
- Rerouting and routing.
I am using it to route traffic for developer access or regular traffic for my instances. I have a web application, and I control access to and from it in one of my environments.
I am using it to route traffic for developer access or regular traffic for my instances. I have a web application, and I control access to and from it in one of my environments.
All my needs are met at the moment.
Our policy is launch and forget. It works well without any maintenance. So far, it has worked pretty well regardless of the traffic.
The product could be simplified and made more self-explanatory.
I am stressing it quite a bit, and the stability is great. I haven't performed any maintenance on the instances in quite a while now. It works. I am happy because everything works well.
My throughput is moderate versus high throughput applications.
I am always holding a predefined number of instances, so I haven't had any issues.
I have not used the technical support.
The configuration was pretty complex on my side compared to OpenVPN. However, this might imply that Sophos has more use cases and capabilities. It depends.
I am also using OpenVPN.
Partially, for historic reasons, things were built prior to me being able to evaluate stuff. At the moment, we are using both solutions. In terms of pricing, when I need to spin up anything small with smaller requirements, I am using the free OpenVPN instead of Sophos UTM.
Do your homework. Compare products. Use what you need depending on your needs.
We are only using the AWS version of the product.
Our Sophos UTM provides a secure VPN solution. It allows us to have a VPN solution that limits access to certain sensitive areas in our environment.
It has made our organization more secure, because we are using a VPN. We are not accessing services directly. It allows us to segregate some of the traffic for individuals which may be more of a developer role rather than an operational role needing access to developer resources, but not necessarily production operational resources.
Previously, it was all intermixed, and access was kept under control by other means. This makes it easier and more streamlined.
The UI on it could stand a little improvement. In some areas, it is a little slow and clunky. It is sometimes not easy to find something. However, once you get used to it, it is pretty normal to use.
We haven't had an issue with it yet.
Any given day, we have easily ten to 15 users on it constantly, plus some other ancillary services which go across the VPN to access resources in our environment.
It works for what we have, as we only need a couple of them. Scalability-wise, we don't need a whole lot.
We have used technical support one time for a weird upgrade issue. Their response was good.
It integrated well with AWS. The documentation was a little fuzzy on getting it to work with how the whole public exposure versus private exposure, then routing some of the traffic. However, once you read the documentation carefully, it comes out well. This goes back to the UI issue.
It makes it a lot easier for us to maintain things. Prior to it, things were more difficult. This means less time on us. We can focus on other things. The recovery is more in man-hours for us than anything else.
Purchasing through the AWS Marketplace is pretty straightforward. Because were entirely on AWS and don't have anything anywhere else. It made the most sense for us as a one stop shop.
The pricing is pretty reasonable. I don't think that it is overly expensive.
We looked at a couple other products. However, overall, Sophos UTM seemed to fit the bill. It has allowed us to have a solution that we can maintain and not have to babysit all the time.
It is definitely worth looking at. It is a pretty good product.
It is integrated with our LDAP solution, and that integration is okay. Any LDAP integration can be hit or miss. It doesn't matter what it is, because it's LDAP. Since we use LDAP as a service, it's a little different, but it does work well.
We use it for the AWS version.
We are using as a firewall product.
It helped to connect our satellite offices to the main Amazon infrastructure in a circular way.
It provides a solid firewall.
We had some problems with the configuration. They had provided a CloudFormation template, and we had to go several rounds to make it work.
It's pretty stable. For our usage, it has been pretty good.
We are a small company with a small infrastructure. For our infrastructure, it is perfectly solid. I don't have experience using it on a larger scale.
They could definitely improve on the support, especially in other countries. Right now, it is just average. For example, we have a team in India. When they face issues, they have to go to Australia or talk to somebody in the US to receive support. They should be more responsive and have more local offices.
AWS has been pretty good. It is well integrated and pretty user-friendly. Initially, we experienced issues with the configuration because Sophos provided us a CloudFormation template, which caused us some back and forth. By now, the process may have improved.
Purchasing it through the AWS Marketplace went smoothly. We did not have any issues and the pricing was decent.
We decided to purchase through the AWS Marketplace because of the integration with the AWS infrastructure, firing it up and configuring it was very seamless.
We originally considered Barracuda and another solution.
We chose Sophos because we thought that it provided superior service. Also, they have a long history in the market, and I received a recommendation from one of my consultants.
I would recommend to take a look a product, as it is a good product apart from the improvements that I mentioned. We are very happy with the product so far.
It is used as a standalone. We don't integrate it with other systems.
We are using the AWS version of this product.
Every single Virtual Private Cloud (VPC) has Sophos in front of it. I also use it for Outbound Gateways in my WorkSpaces environment.
Our company trusts Sophos without even seeing it, as it provides us comfortability while allowing for flexibility.
Its scaling capability.
Sophos has a single pane of glass which allows me to manage all my VPCs from a single instance, managing all my firewall from one place, which is huge for me. When you have multiple VPCs and multiple accounts, it becomes too cumbersome to use a product that you have to look at individually. With Sophos, I can look at one place and see everything: my logs, filters, firewall rules, etc.
I would like them to move from the Classic Load Balancer to the Network Load Balancer. This would make it easier to do certain things with Amazon. They are able to do some enhancements with Network Load Balancer that they are unable to do with Classic Load Balancer.
I have never had a stability issue with Sophos. It self-heals.
I have not run into a scalability issue since it is scalable past my license.
I have had great technical support. The only issues that I have experienced with technical support are when I get a Tier 1 support person who knows about the on-premise product, not the AWS side of the product.
The implementation and configuration through AWS is easy. They have cloud configuration templates, which are easy to deploy.
We originally purchased the solution through the AWS Marketplace. I started my proof of concept doing pay-as-you-go, then moved to a VAR for a 'Bring Your Own Licence' (BYOL) licensing model. The BYOL license still requires you to accept the terms of the AWS Marketplace to deploy.
It is easy to purchase through the AWS Marketplace. In addition, if you have a budget for the AWS Marketplace, then your purchases will appear on your regular Amazon bill, which makes things even easier.
I went and looked at Check Point eight years ago, because back then, I loved Check Point. They also weren't many solutions like this back then. AWS Marketplace did not even exist eight years ago!
After comparing Check Point and Sophos pricing, I questioned whether the decimal for Sophos was in the wrong spot. Sophos's competitors were so much higher in price.
Originally, cost sold me because Check Point and Sophos had the same features. Now, Sophos has surpassed Check Point's features.
If you haven't tried it, do so.
Amazon has their products (e.g., Amazon GuardDuty). However, when you are working in a multiple VPC environment along with digital enhancements and features, some of those enhancements and features are not always available with Amazon, but are with Sophos.
The primary use case for using this product is as a firewall.
It has ease-of-use and it fits the purpose of our firewall protection needs.
The most valuable feature is that it is easy to administer.
The price is an issue to consider for improvement.
The stability of the product is good.
We are not a very big organization, so we do not see any issues going into the future. We feel that it will continue to scale appropriately for our organization's needs.
We have experience with Sophus, as well.
The price is something that one will need to consider.
My primary use case is as a VPN, a firewall and a web filter.
We have a better level of protection and we have the ability for our devices to be more of a self-sustained type of resource.
The most valuable features are:
The memory and processing were problematic. The interface could be better.
I have no problem with the cost or licensing of this solution. This is a primary reason whay I wanted this solution. It does the same thing cheaper than other name brands.
It helps us with protection, with concurrent use of the VPN.
This solution improved our firewall capability. We installed an identity process, and this is extremely helpful.
The security is the most important, and without security, we cannot use our network on a weekly basis.
During initial configuration, I encountered a few issues.
The stability is very good.
The initial setup of this solution was easy. It was not complex.
When considering a product, I think support from the solution is very important.
We did not have experience with a firewall prior to installing this solution.
We use Sophos UTM as our main firewall with all its features included. Mainly, it controls all of our network perimeter security: firewall, IDS/IPS, and web application firewall (including VoIP).
Web application firewall (WAF): We removed our old internal reverse proxy, and it now controls all the security aspects of our web servers with Sophos UTM WAF.
Reporting: We have had to work manually in many of our reports.
