Currently, we are using the product on-premise. However, in the future, we would like to deploy an AWS instance too.
Brings greater visibility into the network traffic coming inside and passing away from the company
Pros and Cons
- "The initial configuration is straightforward thanks to the web GUI. In 30 minutes, you can have a running firewall with UTM protection enabled."
- "Brings greater visibility into the network traffic coming inside and passing away from the company."
- "Needs to improve the certificate management (ex. Let's Encrypt support)."
What is our primary use case?
How has it helped my organization?
This product helped us a lot in having a greater visibility into the network traffic coming inside and passing away from the company. The Sophos’s unique RED devices helped us a lot to build up extremely, easy Layer 2 VPN connections.
What is most valuable?
- Email and web proxy: for filtering unwanted emails and spam, and for web content and malicious url filtering
- SSL VPN and two-factor authentication: for secure remote access
- Layer 7 app control: for blocking P2P (ex. BitTorrent) and media streaming content
- WAF/reverse proxy: for securely publishing web applications and protecting Exchange services
- WAN load balancing: for multiple Internet connection management
What needs improvement?
- Certificate management (ex. Let’s Encrypt support)
- VPN: IKEv2 Support
Buyer's Guide
Sophos UTM
January 2026
Learn what your peers think about Sophos UTM. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
We have not encountered any issues with stability.
What do I think about the scalability of the solution?
The Sophos UTM solution is very scalable. You can build a hardware cluster with up to 10 nodes.
How are customer service and support?
Technical issues addressed to support team have been solved quickly.
Which solution did I use previously and why did I switch?
Before we were using Cisco solutions, we switched because of the lack of UTM features.
How was the initial setup?
The initial configuration is straightforward thanks to the web GUI. In 30 minutes, you can have a running firewall with UTM protection enabled.
What's my experience with pricing, setup cost, and licensing?
The pricing for Sophos UTM is quite acceptable compared to other UTM vendors. If you would like to run an active-passive HA system, you only need to buy an additional hardware without subscription. At other vendors, you need subscription for both devices.
In the case of a software/virtual appliance subscription, you pay by protecting user/IP addresses. You can do this to as much hardware resources as you like.
Which other solutions did I evaluate?
We evaluated SonicWall, WatchGuard, and Stormshield (Netasq) solutions.
What other advice do I have?
We highly recommend this solution for SMBs for its reasonable pricing and wide range of network services.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller and System Integrator.
It Forum Gruppen A/S
Network Protection and Web Filtering help us provide next-gen threat handling
Pros and Cons
- "They are all good, but most-used are Network Protection and Web Filtering."
- "Scaling out cannot be easier, as there are many migration paths."
- "VPN needs IKEv2, but it’s in the roadmap. Also, all new, cool features will only come to the new Sophos XG Firewall."
How has it helped my organization?
We give customers a device that can handle next-gen security threats, which is way better than a typical router.
What is most valuable?
They are all good, but most-used are the Network Protection and Web Filtering licenses.
What needs improvement?
VPN needs IKEv2, but it’s in the roadmap.
All other new, cool features will only come to the new Sophos XG Firewall.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
There are no more stability issues than with other vendors, so I would say it's very stable.
What do I think about the scalability of the solution?
Scaling out cannot be easier, as there are many migration paths.
How are customer service and technical support?
It’s satisfactory.
Which solution did I use previously and why did I switch?
No previous solution. For next-gen firewalls, I began with Sophos.
How was the initial setup?
It is straightforward. There is a wizard running at first boot, making it easy for you to select the level of protection you want.
What's my experience with pricing, setup cost, and licensing?
For under 50 users, MSP licensing is profitable.
What other advice do I have?
We don't use Sophos UTM on AWS.
I would recommend Sophos UTM. But also look at its successor, Sophos XG Firewall, as we do not know how many years Sophos UTM will "live." (Note that it will be free to migrate from UTM to XG).
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
Buyer's Guide
Sophos UTM
January 2026
Learn what your peers think about Sophos UTM. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Project Engineer
Initial configuration was super simple. Management and monitoring have never been easier.
Pros and Cons
- "It does not take much effort or thinking to understand how it works."
- "The product is extremely intuitive."
- "Configuration could not be made any easier."
- "With over 150 firewalls in our portal, management and monitoring have never been easier."
- "This product could use some improvement with web filtering. It takes a lot of time and effort to set up and maintain."
- "Finding information about Sophos’ sizing guidelines can actually be difficult. Also, Sophos does not make it clear what they mean by “users” when you are sizing a firewall, which then leads to undersized implementations."
- "I am going to flat out say technical support is terrible. Being a Platinum level customer, I am not happy with the support."
- "Stay away from the wireless models, since you cannot put them in HA. They start to give you some weird issues once you start getting into multiple SSIDs and networks."
What is our primary use case?
We have been rolling out the Sophos UTM platform to our clients over the past two years. About 80% of our managed clients have been moved to Sophos UTM. We have been migrating them mostly from SonicWall and Cisco ASA.
We do not use Sophos UTM in AWS. However, we have deployed a few Sophos XGs in an Azure environment.
How has it helped my organization?
The UTM product has definitely improved the way our organization functions. We have set a standard across clients and engineers. Everyone is trained on the product and knows how to manage the devices. UTM is probably the most complete all-in-one firewall that I have used to date. Having the UTM Manager has probably made the most impact, with over 150 firewalls in our portal, management and monitoring have never been easier.
What is most valuable?
The most valuable to features are: Web Application Firewall, Sophos UTM Manager, IDS/IPS, Remote Access, and RED.
- WAF: This is excellent for hardening web servers. The firewall will reverse proxy your web servers, eliminating the need to open ports. Instead the firewall will run an instance of Apache and proxy all traffic to and from the real web servers. (This is also handy when you have a single public IP.)
- SUM: The Sophos UTM Manager is a must have for any MSP. The SUM is a centralized portal for quick access to all the firewalls you manage. This also keeps track of who logs into the firewall by AD account. It is great for keeping track of a help desk, and who is making changes.
- IDS/IPS: General Intrusion Prevention and detection. It works very well.
- Remote Access: VPN access is always a need, and the UTM includes this free with all their license models. A very nice feature that I use a lot is the HTML5 portal. The portal allows you to have web-based access to resources behind the firewall. The best use for this would be when a client does not have any servers on-site. You can set up the HTML5 portal with SSH/Telnet to manage switches on-site, all done through the browser.
- RED: REDs simplify the setup for multi-location clients. A license is not required for a RED, and only one UTM is needed. REDs are great for mobile sites, as they can be tossed in a bag and can run off 4G/LTE. Configuration is effortless, and they create a direct tunnel back to the main office, getting you up and online in no time.
What needs improvement?
This product could use some improvement with web filtering. It takes a lot of time and effort to set up and maintain.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
I have never come across any major stability issues. I have seen some bugs on newer firmware releases which have only affected units configured in HA. Sophos is usually quick to fix these bugs.
What do I think about the scalability of the solution?
You should never come across a scalability issue if you follow Sophos’ sizing guidelines. Finding this information can actually be difficult. Also, Sophos does not make it clear what they mean by “users” when you are sizing a firewall, which then leads to undersized implementations.
How are customer service and technical support?
I am going to flat out say technical support is terrible. I will admit that it has gotten better over the past year. Previously, hold times would be 45 minutes at minimum. After the long hold times, you would receive an extremely under qualified engineer. The knowledge of engineers has definitely increased over the year and the time on hold has gone way down.
Being a Platinum level customer, I am not happy with the support.
Which solution did I use previously and why did I switch?
SonicWall used to be our primary choice of firewall. I am just an engineer and I do not have control over which products we use. We started using Sophos Antivirus, then they eventually sold us on firewalls, encryption, mobile control, and a lot more of their products. The synchronized security model is really what was sold flexible to the product.
How was the initial setup?
Initial configuration was super simple. I am a network engineer, so simple to me may not be simple to someone who does not understand routing and switching. When we were told we were switching to Sophos UTM, I downloaded a trial of the virtual firewall and was able to get it up and running in about an hour with no prior training. After actually going to the training courses provided by Sophos, configuration became even easier.
What's my experience with pricing, setup cost, and licensing?
I am not in sales and cannot comment on this. I design and implement network configurations.
I would recommend to follow Sophos’ sizing guidelines for choosing which license and model to use. Sophos has their own way of going about this and supplies partners with all the information required. If you follow their documentation and guidelines, there should be zero questions about licensing and sizing.
Sophos also offers free training when selling their products from within the partner portal.
Which other solutions did I evaluate?
As a networking engineer, all new products in this category interest me. I find myself testing a lot of different products personally. Here at Flexible Systems, I did not try any other products prior to switching to Sophos. Since we are an MSP, we have had plenty of exposure to many brands of firewalls (Cisco ASA, SonicWall, WatchGuard, Fortinet, ADTRAN, and Edgewater). I personally would choose the Sophos UTM over any other product, including the Sophos XG platform.
What other advice do I have?
I can’t recommend this product more!
Though, stay away from the wireless models, since you cannot put them in HA. They start to give you some weird issues once you start getting into multiple SSIDs and networks. The number one piece of advice is to read and follow the sizing guide, if you do not, you will undersize the firewall.
Just to reiterate:
- Configuration could not be made any easier.
- The product is extremely intuitive.
- It does not take much effort or thinking to understand how it works.
My company has rolled out devices as small as the SG 105 and as large as the SG 330. I personally have an SG 210 in my home. I have gone through all the training involved for configuration and implementation. I also use the product at home and have been extremely happy with Sophos UTM overall.
Disclosure: My company has a business relationship with this vendor other than being a customer. Platinum partner.
Network Administrator at a government with 11-50 employees
Web Server Protection is an elegant solution and can even hide the server's base system
Pros and Cons
- "It is not an easy task to protect your web servers from the big bad internet. The Web Server Protection in this solution does it elegantly and, if configured correctly, even hides the server's base system from prying eyes."
- "The UI can be cumbersome and, sometimes, features are not where you think they should be."
How has it helped my organization?
We use to use a sort of "security as a service," and I had all kinds of issues getting visibility into the system to see if there were issues with my network. That is no longer a problem, I can now see every packet that passes in and out of my network.
What is most valuable?
To me it is the Web Server Protection, it is not an easy task to protect your web servers from the big bad internet. This solution does it elegantly and, if configured correctly, even hides the server's base system from prying eyes.
What needs improvement?
The UI can be cumbersome and, sometimes, features are not where you think they should be.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No stability issues at all.
What do I think about the scalability of the solution?
Our current use of the product doesn't need any scaling out.
How are customer service and technical support?
Their support is prompt and will find the issue for you.
Which solution did I use previously and why did I switch?
We were using an offsite solution that was at least 20 times the cost over a year.
What's my experience with pricing, setup cost, and licensing?
Go to a vendor and let them assess your needs so you can get a right-sized device.
What other advice do I have?
I use it in a self-hosted implementation.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Snr Dev Ops Engineer at a tech services company
Define your requirements and find what best suits you
Pros and Cons
- "It allows our developers to be able to securely log into servers to deploy and manage software."
- "It has allowed us to design a bespoke cloud space for our clients, while still having an excellent level of protection."
- "There is absolutely no support when using AWS. If you buy the on-premise Sophos solution, you get support."
- "It is a pretty straightforward setup, but it should be some sort of documentation that takes you step-by-step to help set it up for your VPC."
What is our primary use case?
We have quite a lot of web service hosting, either websites or hosting APIs. We use Sophos as a two-factor authentication process. So, if they are outside or working in a remote office, they will need to use the Sophos VPN, which is gotten from the Sophos UTM, then ideally they will be developers. However, they can also be BI guys, DevOps people, etc.
Sophos UTM allows you to compartmentalize different sections or different people, having those people connect to different services.
We use it for primarily for two-factor authentication, for VPN to allow employees security access the servers and to ensure people do not access things they should not have access to.
How has it helped my organization?
- It has allowed us to have one solution for our AWS needs.
- It allows our developers to be able to securely log into servers to deploy and manage software.
- It has allowed us to design a bespoke cloud space for our clients, while still having an excellent level of protection.
What is most valuable?
- The combination of server protection
- Seamless incorporation with AWS
- Its VPN feature
What needs improvement?
You (currently) need to buy the Sophos software per availability, zone, and per VPC. It should offer an account-based solution.
When you buy a Sophos license, you have to buy a license for each location. We have clients in the US. We have clients in Ireland. We have clients in the UK. With GD-PI coming, the clients' data needs to stay in-house, so when you buy the Sophos license, it only works for the UK. Then, you have to buy another in the USA and another one in Ireland, then you have to have a VPN tunnel between all of them to have them talk to each other because Sophos blocks them talking to each other.
So, ideally, a multi-VPC or a multi-talented Sophos would be great because it would take away the fact that you need to build a tunnel and you have one management console for all your different locations. Instead of having three different locations with three different IP addresses and having to add users to probably two out of three, sometimes all three, having just one centralized location would be good.
What do I think about the stability of the solution?
No, we did not. Backups were done daily, and its Linux backend gave us no issues.
What do I think about the scalability of the solution?
Adding new servers was seamless. Adding new users and allowing for VPN access was also fantastic.
How are customer service and technical support?
For the AWS version, it was atrocious. None really. For the bespoke cloud space that we designed though, they were very good.
To further clarify, there is absolutely no support when using AWS. If you buy the on-premise Sophos solution, you get support and you get all the stuff. Whereas if you are using the AWS version, you do not. So, you kind of have to research. There's something simple really which affects Sophos quite a bit during setup.
Which solution did I use previously and why did I switch?
No, we didn't. It was our first choice and it was definitely a good one.
How was the initial setup?
For a user who hasn't done it before, it may be a bit complex but with a general understanding of networks, it was fine.
However, when you build everything up using the AWS version (setup), it actually does not work until you write it on the Sophos UTM and in the networking, you have to change the source destination check. You have to do that at the end of it, but there is nowhere in the documentation or anything where it tells you that. It was just somebody happened to find that out. It is a pretty straightforward setup, but it should be some sort of documentation that takes you step-by-step to help set it up for your VPC. There really is not that much difference setting it up in different VPCs, but there is not enough information out there. It is a very good solution that a lot of people would be using more of except you are doing different things, and you have to try and figure it out yourself.
The support, there is none; AWS themselves, they support it the best, because they have some knowledge of it, but they do not fully support it because it is not their product. It is a third-party product.
What's my experience with pricing, setup cost, and licensing?
Licensing is a bit complicated, as it is based on products -- so define your requirements and find what best suits you, as you do not need the whole suite of software they provide.
For AWS, it is pretty straightforward. You buy it, then you have all your licenses that you need, approximately 60 or 70, or it might even be unlimited. However, that is for one margin to expand to different margins. If you have an on-premise AWS, or one of our clients wanted on-premise AWS Assistant, the problem is to build the Sophos UTM on it. We get the software, then the licensing was not explained well because when you buy the licenses, you buy five (or 50) licenses, that is for the first module. So if you expand to second module, you have to buy more licenses of that.
Again, it is one of those things where it is not well explained. Unless you are in the United States, or you have to use Sophos, you can't contact Sophos directly. You have to use a third-party company, and they all have different ways of how they explain their licensing. So, we have clients that want the database on-premise, and we went to get the Sophos licensing system and stuff like that. It was just they were doing it a different way to who we had in Ireland, so the conformity is a bit iffy.
It is one of those things where it is not very well explained, so it is a lot of grunt work, a lot research has to be done before you progress, and there are the pitfalls that you encounter. There are quite a few of them. Once you get it working, it is a fantastic product. It is just getting it that is the issue.
Which other solutions did I evaluate?
We looked at a few, but I can't remember right now.
What other advice do I have?
Great product which works without issues or downtime.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at a manufacturing company with 1,001-5,000 employees
Supports all the traditional firewall components, but the install was slow due to the GUI
Pros and Cons
- "The UTM features are reasonably strong and the patterns are updated on a regular basis"
- "The lack of import/export functions for network and service options drives me mad."
What is our primary use case?
- Providing the firewall to my small business office. We run it on a fanless PC and a supporting 50Mb/s VDSL connection.
- Supports 10 devices and has 40 rules.
- Using UTM and IPS extensively.
What is most valuable?
- Using the Home version to help Sophos develop the XG. I have not used the earlier UTM, which colleagues have recommended.
- The UTM features are reasonably strong and the patterns are updated on a regular basis
- Supports all the traditional firewall components
How has it helped my organization?
Not applicable.
What needs improvement?
- The lack of import/export functions for network and service options drives me mad.
- No route to NULL
- No Dshield.org integration
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No.
What do I think about the scalability of the solution?
Not applicable.
How are customer service and technical support?
Not applicable.
Which solution did I use previously and why did I switch?
Originally Cisco 871 IOS IP Advanced Security, then Juniper SSG20, which was getting old and service contracts were too expensive.
How was the initial setup?
Slow because of GUI and lack of .csv style object import.
What about the implementation team?
In-house
What was our ROI?
Not applicable.
What's my experience with pricing, setup cost, and licensing?
If you can afford it, go for a small Check Point, as it is easier to manage.
Which other solutions did I evaluate?
Linux ipchains and modern equivalents.
What other advice do I have?
Takes awhile to build a comprehensive rule set because of the relatively slow Web GUI.
If you build, backup, restore and reconfig between the boxes.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer II at a legal firm with 1,001-5,000 employees
Configuring the network was the easiest part of implementation, but the internet failover needs to work better.
Pros and Cons
- "If a computer does get infected the Sophos appliance lets us know via it's Advanced Threat Protection so we can get a much faster response time."
- "As it stands right now, when we have an internet failure on WAN1, it takes several minutes before our WAN2 connection picks up the traffic"
What is most valuable?
- Firewall
- NAT
- Intrusion prevention
- Site-to-Site VPN
- Web filter
- Anti-virus
How has it helped my organization?
Before using the Sophos appliance, we consistently struggled with users clicking on things they shouldn't be. This led to virus/malware infections that seemed to propagate through the network at an alarming speed. Since we incorporated the appliance into our network, we don't have to worry as much since it does in-line virus checking, and if a computer does get infected the Sophos appliance lets us know via it's Advanced Threat Protection so we can get a much faster response time.
What needs improvement?
I wish the internet failover worked better. As it stands right now, when we have an internet failure on WAN1, it takes several minutes before our WAN2 connection picks up the traffic, with many things not working until I manually fail over to the other WAN.
For how long have I used the solution?
I've used it for seven years.
What was my experience with deployment of the solution?
Initially, we had issues configuring the web filter and getting the right policies applied to the right users. After several calls to Sophos, they were able to assist us in getting to where we wanted to be. Other than that, deployment was easy as long as you pay attention to what you are doing and have the setup guide handy for any questions you have.
What do I think about the stability of the solution?
The appliance has been very stable, only being rebooted to apply patches for security vulnerabilities, which fortunately is not very often.
What do I think about the scalability of the solution?
The UTM 220 has served our purposes very well, it has allowed us to scale up on the computing side as well as the server side with no issues at all.
How are customer service and technical support?
Customer Service:
Their customer service is fantastic.
Technical Support:I have never had an issue go unanswered when I've had to involve Sophos technical support. Above all, it's their technical expertise that truly sets them apart from other vendors we have tried.
Which solution did I use previously and why did I switch?
We did originally try to use PFSense. The software was hard to use, and the level of technical expertise was not good. Ultimately, after several demos of both products, we decided that Astaro (at the time we purchased our original device) was the right vendor to work with. Since that time, Sophos purchased Astaro and it would appear that they kept a lot of the same people working on these devices because the transition was smooth, and the level of knowledge never faltered.
How was the initial setup?
The initial setup was very straightforward. I will say that you do need to have a certain level of knowledge to set up the more advanced functions. Configuring the network was the easiest part, and the firewall was very straightforward once you figured out exactly what rules you needed to put in place. NAT was a bit confusing to start with, but once you went through the process it was easy. Intrusion prevention was easy to set up, flip the switch to the on position and decide what rules you want to apply. Web filtering took a few calls to Sophos to set up properly, as we were trying to set up filtering policies based on Active Directory groups, and were not successful in the initial configuration, but we did finally get this implemented.
What about the implementation team?
I implemented the product in-house. The one bit of advice that I can give is to organize yourself prior to deployment. Determine what services you want to utilize in your environment, and focus your learning to those parts of the guide, this will make your deployment much easier.
What was our ROI?
Our return on investment is the fact that we are protecting the business' data, lowering administrative costs, and are better able to manage every bit of our network security.
What's my experience with pricing, setup cost, and licensing?
The licensing model is very straightforward, it's a bit pricey, but for what you get, it's well worth it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Quality Officer at a tech services company with 10,001+ employees
I know I am secure against threats from the internet
What is most valuable?
The IPS and endpoint protection function.
A standard Firewall of an access router, monitoring up to OSI level 4, is unacceptable anymore these days. The endpoint protection solution is integrated, thus running along with the notification function.
How has it helped my organization?
All the necessary functions being incorporated into one solution with notifications configured, I know I am secure against threats from the internet. (Up to the limits of the solution in the constantly evolving and dangerous Internet).
What needs improvement?
- A cleaning up function to remove unused references.
- A dashboard to show that the various parts of the solution really do their tasks and not only have been activated or configured (e.g., From the live log of the IPS function it is difficult to understand if the solution (snort) is running or experiences a problem and has stopped working.
- The possibility to add the sandbox (and possible future) function, paid for, to the free Home version.
For how long have I used the solution?
I've used this solution for three years.
What do I think about the stability of the solution?
Some with the IPS function (snort).
In my case, when restarting the system (because of an update), I doubt that snort starts correctly and do a manual restart of the IPS function (see my answer for 'Room for Improvement').
What do I think about the scalability of the solution?
How are customer service and technical support?
As a free home user, I have not used the support services up until now.
Once, I did upload an Office document that appeared to give a false positive, but never got a notification. I understand this because of the priorities that have to be given, but I would have liked to receive a (even small) reaction.
Which solution did I use previously and why did I switch?
I did take a look at other open source solutions, but found the Sophos UTM, being the best professional free for Home UTM solutions, full blown, and updated daily, to be the best solution.
How was the initial setup?
The setup wizard provided me with just enough insight into the basics of the solution -- to be able to start using the solution fully after some self-study and exploration of the various knowledge bases and forums.
What's my experience with pricing, setup cost, and licensing?
I looked at some open source variants but being able to use the best professional (free for the home version) product with regular updates -- convinced me to use the Sophos UTM solution at Home.
Which other solutions did I evaluate?
The instability and best effort service of a community of the open source solution did not give the right trust to depend on in the battle against the negative sides of the worldwide internet
What other advice do I have?
Start simple and step-by-step, and start using the product fully.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Sophos UTM Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Unified Threat Management (UTM)Popular Comparisons
Fortinet FortiGate
WatchGuard Firebox
Cisco Meraki MX
Check Point Quantum Force (NGFW)
Juniper SRX Series Firewall
KerioControl
Check Point CloudGuard Network Security
Untangle NG Firewall
Stormshield Network Security
Zyxel Unified Security Gateway
Huawei NGFW
Juniper vSRX
Sophos Cyberoam UTM
LANCOM R&S Unified Firewalls
Seqrite UTM
Buyer's Guide
Download our free Sophos UTM Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which would you recommend to your boss, Fortinet FortiGate or Sophos UTM?
- What Is The Biggest Difference Between Sophos UTM and Sophos XG?
- What are the biggest technical differences between Sophos UTM and Fortinet FortiGate?
- What Is The Biggest Difference Between Sophos and pfSense?
- Who provides a better antivirus solution: Bitdefender or Sophos?
- What are the biggest differences between Meraki and Sophos? Which one is good for security and SD-WAN?
- What is the biggest difference between Fortinet FortiGate and Sophos UTM?
- When evaluating Unified Threat Management (UTM), what aspect do you think is the most important to look for?
- What UTM solution do you recommend?
- Why is a UTM solution important?















interesting