It helps us with protection, with concurrent use of the VPN.
Cloud Network Administrator at a tech services company with 11-50 employees
We cannot use our network on a weekly basis without it.
Pros and Cons
- "It helps us with protection, with concurrent use of the VPN."
- "During initial configuration, I encountered a few issues."
What is our primary use case?
How has it helped my organization?
This solution improved our firewall capability. We installed an identity process, and this is extremely helpful.
What is most valuable?
The security is the most important, and without security, we cannot use our network on a weekly basis.
What needs improvement?
During initial configuration, I encountered a few issues.
Buyer's Guide
Sophos UTM
June 2025

Learn what your peers think about Sophos UTM. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,632 professionals have used our research since 2012.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
The stability is very good.
How was the initial setup?
The initial setup of this solution was easy. It was not complex.
What was our ROI?
When considering a product, I think support from the solution is very important.
Which other solutions did I evaluate?
We did not have experience with a firewall prior to installing this solution.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

CEO with 501-1,000 employees
Rapid deployment with great logging and analysis features
Pros and Cons
- "It now controls all the security aspects of our web servers with Sophos UTM WAF."
- "We use Sophos UTM as our main firewall with all its features included. Mainly, it controls all of our network perimeter security: firewall, IDS/IPS, and web application firewall (including VoIP)."
- "Reporting: We have had to work manually in many of our reports."
What is our primary use case?
We use Sophos UTM as our main firewall with all its features included. Mainly, it controls all of our network perimeter security: firewall, IDS/IPS, and web application firewall (including VoIP).
How has it helped my organization?
Web application firewall (WAF): We removed our old internal reverse proxy, and it now controls all the security aspects of our web servers with Sophos UTM WAF.
What is most valuable?
- Ease of use
- Rapid deployment with great logging and analysis features
What needs improvement?
Reporting: We have had to work manually in many of our reports.
For how long have I used the solution?
More than five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Sophos UTM
June 2025

Learn what your peers think about Sophos UTM. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,632 professionals have used our research since 2012.
Brings greater visibility into the network traffic coming inside and passing away from the company
Pros and Cons
- "The initial configuration is straightforward thanks to the web GUI. In 30 minutes, you can have a running firewall with UTM protection enabled."
- "Brings greater visibility into the network traffic coming inside and passing away from the company."
- "Needs to improve the certificate management (ex. Let's Encrypt support)."
What is our primary use case?
Currently, we are using the product on-premise. However, in the future, we would like to deploy an AWS instance too.
How has it helped my organization?
This product helped us a lot in having a greater visibility into the network traffic coming inside and passing away from the company. The Sophos’s unique RED devices helped us a lot to build up extremely, easy Layer 2 VPN connections.
What is most valuable?
- Email and web proxy: for filtering unwanted emails and spam, and for web content and malicious url filtering
- SSL VPN and two-factor authentication: for secure remote access
- Layer 7 app control: for blocking P2P (ex. BitTorrent) and media streaming content
- WAF/reverse proxy: for securely publishing web applications and protecting Exchange services
- WAN load balancing: for multiple Internet connection management
What needs improvement?
- Certificate management (ex. Let’s Encrypt support)
- VPN: IKEv2 Support
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
We have not encountered any issues with stability.
What do I think about the scalability of the solution?
The Sophos UTM solution is very scalable. You can build a hardware cluster with up to 10 nodes.
How are customer service and technical support?
Technical issues addressed to support team have been solved quickly.
Which solution did I use previously and why did I switch?
Before we were using Cisco solutions, we switched because of the lack of UTM features.
How was the initial setup?
The initial configuration is straightforward thanks to the web GUI. In 30 minutes, you can have a running firewall with UTM protection enabled.
What's my experience with pricing, setup cost, and licensing?
The pricing for Sophos UTM is quite acceptable compared to other UTM vendors. If you would like to run an active-passive HA system, you only need to buy an additional hardware without subscription. At other vendors, you need subscription for both devices.
In the case of a software/virtual appliance subscription, you pay by protecting user/IP addresses. You can do this to as much hardware resources as you like.
Which other solutions did I evaluate?
We evaluated SonicWall, WatchGuard, and Stormshield (Netasq) solutions.
What other advice do I have?
We highly recommend this solution for SMBs for its reasonable pricing and wide range of network services.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller and System Integrator.
It Forum Gruppen A/S
Network Protection and Web Filtering help us provide next-gen threat handling
Pros and Cons
- "They are all good, but most-used are Network Protection and Web Filtering."
- "Scaling out cannot be easier, as there are many migration paths."
- "VPN needs IKEv2, but it’s in the roadmap. Also, all new, cool features will only come to the new Sophos XG Firewall."
How has it helped my organization?
We give customers a device that can handle next-gen security threats, which is way better than a typical router.
What is most valuable?
They are all good, but most-used are the Network Protection and Web Filtering licenses.
What needs improvement?
VPN needs IKEv2, but it’s in the roadmap.
All other new, cool features will only come to the new Sophos XG Firewall.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
There are no more stability issues than with other vendors, so I would say it's very stable.
What do I think about the scalability of the solution?
Scaling out cannot be easier, as there are many migration paths.
How are customer service and technical support?
It’s satisfactory.
Which solution did I use previously and why did I switch?
No previous solution. For next-gen firewalls, I began with Sophos.
How was the initial setup?
It is straightforward. There is a wizard running at first boot, making it easy for you to select the level of protection you want.
What's my experience with pricing, setup cost, and licensing?
For under 50 users, MSP licensing is profitable.
What other advice do I have?
We don't use Sophos UTM on AWS.
I would recommend Sophos UTM. But also look at its successor, Sophos XG Firewall, as we do not know how many years Sophos UTM will "live." (Note that it will be free to migrate from UTM to XG).
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
Project Engineer
Initial configuration was super simple. Management and monitoring have never been easier.
Pros and Cons
- "It does not take much effort or thinking to understand how it works."
- "The product is extremely intuitive."
- "Configuration could not be made any easier."
- "With over 150 firewalls in our portal, management and monitoring have never been easier."
- "This product could use some improvement with web filtering. It takes a lot of time and effort to set up and maintain."
- "Finding information about Sophos’ sizing guidelines can actually be difficult. Also, Sophos does not make it clear what they mean by “users” when you are sizing a firewall, which then leads to undersized implementations."
- "I am going to flat out say technical support is terrible. Being a Platinum level customer, I am not happy with the support."
- "Stay away from the wireless models, since you cannot put them in HA. They start to give you some weird issues once you start getting into multiple SSIDs and networks."
What is our primary use case?
We have been rolling out the Sophos UTM platform to our clients over the past two years. About 80% of our managed clients have been moved to Sophos UTM. We have been migrating them mostly from SonicWall and Cisco ASA.
We do not use Sophos UTM in AWS. However, we have deployed a few Sophos XGs in an Azure environment.
How has it helped my organization?
The UTM product has definitely improved the way our organization functions. We have set a standard across clients and engineers. Everyone is trained on the product and knows how to manage the devices. UTM is probably the most complete all-in-one firewall that I have used to date. Having the UTM Manager has probably made the most impact, with over 150 firewalls in our portal, management and monitoring have never been easier.
What is most valuable?
The most valuable to features are: Web Application Firewall, Sophos UTM Manager, IDS/IPS, Remote Access, and RED.
- WAF: This is excellent for hardening web servers. The firewall will reverse proxy your web servers, eliminating the need to open ports. Instead the firewall will run an instance of Apache and proxy all traffic to and from the real web servers. (This is also handy when you have a single public IP.)
- SUM: The Sophos UTM Manager is a must have for any MSP. The SUM is a centralized portal for quick access to all the firewalls you manage. This also keeps track of who logs into the firewall by AD account. It is great for keeping track of a help desk, and who is making changes.
- IDS/IPS: General Intrusion Prevention and detection. It works very well.
- Remote Access: VPN access is always a need, and the UTM includes this free with all their license models. A very nice feature that I use a lot is the HTML5 portal. The portal allows you to have web-based access to resources behind the firewall. The best use for this would be when a client does not have any servers on-site. You can set up the HTML5 portal with SSH/Telnet to manage switches on-site, all done through the browser.
- RED: REDs simplify the setup for multi-location clients. A license is not required for a RED, and only one UTM is needed. REDs are great for mobile sites, as they can be tossed in a bag and can run off 4G/LTE. Configuration is effortless, and they create a direct tunnel back to the main office, getting you up and online in no time.
What needs improvement?
This product could use some improvement with web filtering. It takes a lot of time and effort to set up and maintain.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
I have never come across any major stability issues. I have seen some bugs on newer firmware releases which have only affected units configured in HA. Sophos is usually quick to fix these bugs.
What do I think about the scalability of the solution?
You should never come across a scalability issue if you follow Sophos’ sizing guidelines. Finding this information can actually be difficult. Also, Sophos does not make it clear what they mean by “users” when you are sizing a firewall, which then leads to undersized implementations.
How are customer service and technical support?
I am going to flat out say technical support is terrible. I will admit that it has gotten better over the past year. Previously, hold times would be 45 minutes at minimum. After the long hold times, you would receive an extremely under qualified engineer. The knowledge of engineers has definitely increased over the year and the time on hold has gone way down.
Being a Platinum level customer, I am not happy with the support.
Which solution did I use previously and why did I switch?
SonicWall used to be our primary choice of firewall. I am just an engineer and I do not have control over which products we use. We started using Sophos Antivirus, then they eventually sold us on firewalls, encryption, mobile control, and a lot more of their products. The synchronized security model is really what was sold flexible to the product.
How was the initial setup?
Initial configuration was super simple. I am a network engineer, so simple to me may not be simple to someone who does not understand routing and switching. When we were told we were switching to Sophos UTM, I downloaded a trial of the virtual firewall and was able to get it up and running in about an hour with no prior training. After actually going to the training courses provided by Sophos, configuration became even easier.
What's my experience with pricing, setup cost, and licensing?
I am not in sales and cannot comment on this. I design and implement network configurations.
I would recommend to follow Sophos’ sizing guidelines for choosing which license and model to use. Sophos has their own way of going about this and supplies partners with all the information required. If you follow their documentation and guidelines, there should be zero questions about licensing and sizing.
Sophos also offers free training when selling their products from within the partner portal.
Which other solutions did I evaluate?
As a networking engineer, all new products in this category interest me. I find myself testing a lot of different products personally. Here at Flexible Systems, I did not try any other products prior to switching to Sophos. Since we are an MSP, we have had plenty of exposure to many brands of firewalls (Cisco ASA, SonicWall, WatchGuard, Fortinet, ADTRAN, and Edgewater). I personally would choose the Sophos UTM over any other product, including the Sophos XG platform.
What other advice do I have?
I can’t recommend this product more!
Though, stay away from the wireless models, since you cannot put them in HA. They start to give you some weird issues once you start getting into multiple SSIDs and networks. The number one piece of advice is to read and follow the sizing guide, if you do not, you will undersize the firewall.
Just to reiterate:
- Configuration could not be made any easier.
- The product is extremely intuitive.
- It does not take much effort or thinking to understand how it works.
My company has rolled out devices as small as the SG 105 and as large as the SG 330. I personally have an SG 210 in my home. I have gone through all the training involved for configuration and implementation. I also use the product at home and have been extremely happy with Sophos UTM overall.
Disclosure: My company has a business relationship with this vendor other than being a customer. Platinum partner.
Network Administrator at a government with 11-50 employees
Web Server Protection is an elegant solution and can even hide the server's base system
Pros and Cons
- "It is not an easy task to protect your web servers from the big bad internet. The Web Server Protection in this solution does it elegantly and, if configured correctly, even hides the server's base system from prying eyes."
- "The UI can be cumbersome and, sometimes, features are not where you think they should be."
How has it helped my organization?
We use to use a sort of "security as a service," and I had all kinds of issues getting visibility into the system to see if there were issues with my network. That is no longer a problem, I can now see every packet that passes in and out of my network.
What is most valuable?
To me it is the Web Server Protection, it is not an easy task to protect your web servers from the big bad internet. This solution does it elegantly and, if configured correctly, even hides the server's base system from prying eyes.
What needs improvement?
The UI can be cumbersome and, sometimes, features are not where you think they should be.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No stability issues at all.
What do I think about the scalability of the solution?
Our current use of the product doesn't need any scaling out.
How are customer service and technical support?
Their support is prompt and will find the issue for you.
Which solution did I use previously and why did I switch?
We were using an offsite solution that was at least 20 times the cost over a year.
What's my experience with pricing, setup cost, and licensing?
Go to a vendor and let them assess your needs so you can get a right-sized device.
What other advice do I have?
I use it in a self-hosted implementation.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Snr Dev Ops Engineer at a tech services company
Define your requirements and find what best suits you
Pros and Cons
- "It allows our developers to be able to securely log into servers to deploy and manage software."
- "It has allowed us to design a bespoke cloud space for our clients, while still having an excellent level of protection."
- "There is absolutely no support when using AWS. If you buy the on-premise Sophos solution, you get support."
- "It is a pretty straightforward setup, but it should be some sort of documentation that takes you step-by-step to help set it up for your VPC."
What is our primary use case?
We have quite a lot of web service hosting, either websites or hosting APIs. We use Sophos as a two-factor authentication process. So, if they are outside or working in a remote office, they will need to use the Sophos VPN, which is gotten from the Sophos UTM, then ideally they will be developers. However, they can also be BI guys, DevOps people, etc.
Sophos UTM allows you to compartmentalize different sections or different people, having those people connect to different services.
We use it for primarily for two-factor authentication, for VPN to allow employees security access the servers and to ensure people do not access things they should not have access to.
How has it helped my organization?
- It has allowed us to have one solution for our AWS needs.
- It allows our developers to be able to securely log into servers to deploy and manage software.
- It has allowed us to design a bespoke cloud space for our clients, while still having an excellent level of protection.
What is most valuable?
- The combination of server protection
- Seamless incorporation with AWS
- Its VPN feature
What needs improvement?
You (currently) need to buy the Sophos software per availability, zone, and per VPC. It should offer an account-based solution.
When you buy a Sophos license, you have to buy a license for each location. We have clients in the US. We have clients in Ireland. We have clients in the UK. With GD-PI coming, the clients' data needs to stay in-house, so when you buy the Sophos license, it only works for the UK. Then, you have to buy another in the USA and another one in Ireland, then you have to have a VPN tunnel between all of them to have them talk to each other because Sophos blocks them talking to each other.
So, ideally, a multi-VPC or a multi-talented Sophos would be great because it would take away the fact that you need to build a tunnel and you have one management console for all your different locations. Instead of having three different locations with three different IP addresses and having to add users to probably two out of three, sometimes all three, having just one centralized location would be good.
What do I think about the stability of the solution?
No, we did not. Backups were done daily, and its Linux backend gave us no issues.
What do I think about the scalability of the solution?
Adding new servers was seamless. Adding new users and allowing for VPN access was also fantastic.
How are customer service and technical support?
For the AWS version, it was atrocious. None really. For the bespoke cloud space that we designed though, they were very good.
To further clarify, there is absolutely no support when using AWS. If you buy the on-premise Sophos solution, you get support and you get all the stuff. Whereas if you are using the AWS version, you do not. So, you kind of have to research. There's something simple really which affects Sophos quite a bit during setup.
Which solution did I use previously and why did I switch?
No, we didn't. It was our first choice and it was definitely a good one.
How was the initial setup?
For a user who hasn't done it before, it may be a bit complex but with a general understanding of networks, it was fine.
However, when you build everything up using the AWS version (setup), it actually does not work until you write it on the Sophos UTM and in the networking, you have to change the source destination check. You have to do that at the end of it, but there is nowhere in the documentation or anything where it tells you that. It was just somebody happened to find that out. It is a pretty straightforward setup, but it should be some sort of documentation that takes you step-by-step to help set it up for your VPC. There really is not that much difference setting it up in different VPCs, but there is not enough information out there. It is a very good solution that a lot of people would be using more of except you are doing different things, and you have to try and figure it out yourself.
The support, there is none; AWS themselves, they support it the best, because they have some knowledge of it, but they do not fully support it because it is not their product. It is a third-party product.
What's my experience with pricing, setup cost, and licensing?
Licensing is a bit complicated, as it is based on products -- so define your requirements and find what best suits you, as you do not need the whole suite of software they provide.
For AWS, it is pretty straightforward. You buy it, then you have all your licenses that you need, approximately 60 or 70, or it might even be unlimited. However, that is for one margin to expand to different margins. If you have an on-premise AWS, or one of our clients wanted on-premise AWS Assistant, the problem is to build the Sophos UTM on it. We get the software, then the licensing was not explained well because when you buy the licenses, you buy five (or 50) licenses, that is for the first module. So if you expand to second module, you have to buy more licenses of that.
Again, it is one of those things where it is not well explained. Unless you are in the United States, or you have to use Sophos, you can't contact Sophos directly. You have to use a third-party company, and they all have different ways of how they explain their licensing. So, we have clients that want the database on-premise, and we went to get the Sophos licensing system and stuff like that. It was just they were doing it a different way to who we had in Ireland, so the conformity is a bit iffy.
It is one of those things where it is not very well explained, so it is a lot of grunt work, a lot research has to be done before you progress, and there are the pitfalls that you encounter. There are quite a few of them. Once you get it working, it is a fantastic product. It is just getting it that is the issue.
Which other solutions did I evaluate?
We looked at a few, but I can't remember right now.
What other advice do I have?
Great product which works without issues or downtime.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at a manufacturing company with 1,001-5,000 employees
Supports all the traditional firewall components, but the install was slow due to the GUI
Pros and Cons
- "The UTM features are reasonably strong and the patterns are updated on a regular basis"
- "The lack of import/export functions for network and service options drives me mad."
What is our primary use case?
- Providing the firewall to my small business office. We run it on a fanless PC and a supporting 50Mb/s VDSL connection.
- Supports 10 devices and has 40 rules.
- Using UTM and IPS extensively.
What is most valuable?
- Using the Home version to help Sophos develop the XG. I have not used the earlier UTM, which colleagues have recommended.
- The UTM features are reasonably strong and the patterns are updated on a regular basis
- Supports all the traditional firewall components
How has it helped my organization?
Not applicable.
What needs improvement?
- The lack of import/export functions for network and service options drives me mad.
- No route to NULL
- No Dshield.org integration
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
Not applicable.
How are customer service and technical support?
Not applicable.
Which solution did I use previously and why did I switch?
Originally Cisco 871 IOS IP Advanced Security, then Juniper SSG20, which was getting old and service contracts were too expensive.
How was the initial setup?
Slow because of GUI and lack of .csv style object import.
What about the implementation team?
In-house
What was our ROI?
Not applicable.
What's my experience with pricing, setup cost, and licensing?
If you can afford it, go for a small Check Point, as it is easier to manage.
Which other solutions did I evaluate?
Linux ipchains and modern equivalents.
What other advice do I have?
Takes awhile to build a comprehensive rule set because of the relatively slow Web GUI.
If you build, backup, restore and reconfig between the boxes.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Sophos UTM Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Unified Threat Management (UTM)Popular Comparisons
Meraki MX
Check Point NGFW
WatchGuard Firebox
Juniper SRX Series Firewall
Untangle NG Firewall
KerioControl
Zyxel Unified Security Gateway
Stormshield Network Security
Huawei NGFW
Check Point CloudGuard Network Security
Sophos Cyberoam UTM
LANCOM R&S Unified Firewalls
Seqrite UTM
Buyer's Guide
Download our free Sophos UTM Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which would you recommend to your boss, Fortinet FortiGate or Sophos UTM?
- What Is The Biggest Difference Between Sophos UTM and Sophos XG?
- What are the biggest technical differences between Sophos UTM and Fortinet FortiGate?
- What Is The Biggest Difference Between Sophos and pfSense?
- Who provides a better antivirus solution: Bitdefender or Sophos?
- What are the biggest differences between Meraki and Sophos? Which one is good for security and SD-WAN?
- What is the biggest difference between Fortinet FortiGate and Sophos UTM?
- When evaluating Unified Threat Management (UTM), what aspect do you think is the most important to look for?
- What UTM solution do you recommend?
- Why is a UTM solution important?