56

Sophos UTM Software Network Protection - subscription license (1 year)

Mfg. Part: NPSH1CSAA | CDW Part: 3695161 | UNSPSC: 43233204
$622.00Advertised Price
Lease Option ($19.41 /month) Lease Availability
Close

Have leasing questions? Let us know how can we help.

Note: Leasing is available to organizations only. Leasing is not available to individuals.
800.808.4239
Mon-Fri 7am-7:30pm CT
Availability:In Stock
Ships same day if ordered before 4 PM CT
  • Subscription license (1 year)
  • up to 150 users
View More
Product Overview
Main Features
  • Subscription license (1 year)
  • up to 150 users
Sophos UTM gives you complete security from the network firewall to endpoint antivirus in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks. And clear, detailed reports will give you the insight you need to improve your network performance and protection.

Technical Specifications
Specifications are provided by the manufacturer. Refer to the manufacturer for an explanation of the print speed and other ratings.
Header
Brand: Sophos
Compatibility: PC
Manufacturer: Sophos Appliances
Packaged Quantity: 1
Product Line: Sophos UTM Software Network Protection

Service
Support Details Full Contract Period: 1 year

Service & Support Details
Service Type: New releases update

Software
License Category: Subscription license
License Qty: Up to 150 users
License Type: Subscription license
License Validation Period: 1 year

General
Category: Online & appliance based services
Installation Type: Locally installed
Subcategory: Online & appliance based services - firewall , Online & appliance based services - intrusion detection

Service & Support
Type: New releases update

Product Reviews
Rated 3.6 out of 5 by 7reviewers.
Rated 4 out of 5 by We do not have misuse of bandwidth and the firewall and anti-spam filter work great for me. Valuable Features:Most valuable feature I am using I would say is the bandwidth management for users. I have users who misuse the net and I have given them caps so it is properly utilized. Another feature I use is the VPN. I have an entity that requires 24x7x365 connectivity and the Cyberoam is very simple when it comes to monitoring that or refreshing that connection.Improvements to My Organization:A simple example would be the bandwidth usage. We do not have misuse of bandwidth and the firewall and anti-spam filter work great for me. I see a lot of dos attacks that are stopped which is also a plus point. So organizations productivity is higher thanks to the Cyberoam as users are restricted from unnecessary websites and bandwidth is capped and company functions do not suffer.Room for Improvement:Not many things would need to be added but I strongly feel it could be made more robust. For example, the cooling system in the device could do with a good revamp. There are times when the device gets too hot and begins to misbehave. Other things that could be improved are the password complexity policy and the password history policy. One thing that could be done as well is to create role based users like we have in the active directory. There are times when we have users who are not admins but need to monitor the device and access levels do not exist for such users.Technical Support:We don't contact Sophos directly. It is usually through a local partner/vendor.Other Advice:I would recommend for others to go and view the demo. Make sure this device will suit you needs especially in terms of expansion. Also look into support as not many times support is available. It is a simple to understand product but does require some skill to manage and maintain the device for optimal usage.Disclaimer: I am a real user, and this review is based on my own experience and opinions. April 21, 2016
Rated 4 out of 5 by We can block malicious and unproductive application and sites to improve productivity. Valuable Features:* NG Firewall* Application Filter* Web Filter* IPSAll these features are valuable to us because we can block malicious and unproductive application and sites to improve productivity and security in our network, audit users and machines and protect us against exploitation.Improvements to My Organization:It's improved productivity as well as user and network security.. It's helped with internet access management and provides security against external attacks.Room for Improvement:We have had issues with malicious sites and external scans.Deployment Issues:We didn't have any issues with deployment.Stability Issues:We haven't had issues with stability.Scalability Issues:We haven't had issues with scalability.Other Advice:You should hire a Cyberoam specialist to manage it.Disclaimer: I am a real user, and this review is based on my own experience and opinions. March 30, 2016
Rated 4 out of 5 by Virtual Cyberoam allows the customer granular controls at their level and then allows us overriding controls at a parental level. Valuable Features:Cyberoam is our low-end product that we use for smaller customers or ones where application security is not a priority. Cyberoam has good AD integration for user configuration and web controls which we like a lot and it’s easy to manage and maintain. We mostly use the virtual models in VMware.Improvements to My Organization:The virtual cyberoam has allowed us to segment our cloud customers via a virtual firewall instance per customer as a second level of security behind our primary systems firewalls. This allows the customer granular controls at their level and then allows us overriding controls at a parental level. Makes for great security.Room for Improvement:You can now load the Sophos software onto a Cyberoam box to use the new feature set, although it would be nice if it came with it.Sophos bought Cyberoam a short while ago and they have amalgamated the Sophos technologies with the existing Sophos ones and some from astaro which they previously bought.. So there is now a Sophos firmware which you can install onto the Cyberoam instead of the Cyberoam one. Because it’s Linux based it’s very portable.Other Solutions Considered:Great product for the price.Other Advice:Cyberoam was bought by Sophos and the new Sophos firewalls take the next step adding more functionality and capability in the box. Cyberoam was bought by Sophos and the new Sophos firewalls take the next step adding more functionality and capability in the box.Disclaimer: My company has a business relationship with this vendor other than being a customer:We are a Gold Partner with Cyberoam. March 29, 2016
Rated 2 out of 5 by It has good bandwidth management, although licensing costs are high. Valuable Features:* Management Console* Security* Bandwidth managementUse of Solution:I've used it for six years.Deployment Issues:Yes once when we updated a new firmware, then we again rolled back to previous one.Customer Service:Customer service is very poor.Technical Support:They have good technical support.Initial Setup:When we purchased it, it was complex, but now it’s straightforward. The SSO is introduced in our premise only. At that time we only had the requirement of SSO.Implementation Team:The first time through the vendor, and the second time our own in house team did it.Cost and Licensing Advice:Pricing and licensing is high.Disclaimer: I am a real user, and this review is based on my own experience and opinions. February 17, 2016
Rated 4 out of 5 by It has good performance but their quality control needs to be improved. Valuable Features:* Web filtering* Application filtering* IPS* QoSImprovements to My Organization:I used to work for a Cyberoam distributor. In one of my projects, I deployed it in a university with 1500 users (students), all of whom had different QoS and web category policies, different authentication policies. I then had to connect the university’s branches, in different cities, with a Site to Site VPN using AD authentication available for just the account. This was to restrict access only to the accounting application server of the other branch. It was quite complicated to do, but it was very successful.In another project for a bank, I secured a banking application server and attached a database using two Cyberoam devices on the edge, with a Juniper device in the middle. This was for securing three different segments - internal users, internal developers and external visitors. The final topology was so secure that, even for some testing purposes, we were not able to break in to change the configuration and access the system as a third party.Room for Improvement:Not very often, but there are some minor bugs in the products. I think their quality control can improve.Use of Solution:I’ve used it since 2008, so seven years so far.It is a complex product so I’d rate the performance and number of features as 10/10, and 7/10 for the consistency and programing.Deployment Issues:Generally speaking, the Cyberoam development is quite simple, easy and straight forward. Overall it depends on the network complexity.Stability Issues:Compared to a Cisco router, Cyberoam UTMs need to be restarted more often. From my point of view, this is acceptable, since many aspects of the product functions in layer seven, while a Cisco router just routes!Scalability Issues:Since all the products models from the smallest to the strongest have the same features and capabilities, I can say that the product is extremely scalable. However, if you need to upgrade the whole device to a stronger model, I would say scalability is 8/10, which considering the differences between the number of ports in different models (I could even give 9/10, but let’s stay with 8/10!).Customer Service:It really depends on the retailer, representative and local distributor. Nothing much to say.Technical Support:One of the most considerable advantages of Cyberoam over the competitors is the after sales support. The 24/7 support assists the customers, even from minor to very major issues, and they chase up the issue until the final resolution by email and phone. They are really trustworthy.Previous Solutions:In a different continent, a different company, and as a customer (not a distributor) I still used the same brand, Cyberoam! It’s cheap, flexible, easy to configure and easy to manage.Initial Setup:I’ve been using the product for ages and I have deployed it in hundreds of networks and complexities. However, using the configuration wizard, the initial configuration is extremely easy and straightforward (depending on the network complexity of course).Implementation Team:I have always installed it myself.Cost and Licensing Advice:It's hard to estimate, as it depends on the complexity, and scale of the network.It takes anywhere from one day to less than a week in normal situations.Other Solutions Considered:I have evaluated Juniper, WatchGuard and a couple of minor brands. So far, I can still raise the flag of Cyberoam.Other Advice:Since the features on the model are the same, and it is just the hardware that gets improved for higher models, I usually advise a model one and a half times bigger than the number of the network users. For instance a 1000 user network can be easily served by a 1500NG. However based on my experience, since not all the users are active simultaneously, even 1 to 1 is sufficient. Considering the capability of HA, expansion is simple if needed.Disclaimer: I am a real user, and this review is based on my own experience and opinions. September 30, 2015
Rated 3 out of 5 by It's good, yet it needs a few improvements. Valuable Features:* Firewall rules* Full control on access management* It's simpleRoom for Improvement:The scalability needs work.Use of Solution:I've used it for four years.Deployment Issues:No issues encountered.Stability Issues:No issues encountered.Scalability Issues:It needs improvement.Customer Service:8/10.Technical Support:8/10.Previous Solutions:We used Cisco, but it was complicated and expensive so we switched.Implementation Team:We used a vendor to do the implementation, and they were 8/10.Other Solutions Considered:CiscoDisclaimer: I am a real user, and this review is based on my own experience and opinions. June 15, 2015
Rated 4 out of 5 by It is very good and very near perfect. Valuable Features:The UTM features. It’s a one stop IT security solution managed from the Cyberoam Central Console (CCC).Improvements to My Organization:Dealing with security threats is a lot easier as it’s less of a CLI interface, and more of a GUI.Use of Solution:I’ve used it for 12 months.Deployment Issues:I met the whole system working when I resumed duty as a Network Security Support Engineer 12 months ago.Stability Issues:Since I resumed my post, the entire Cyberoam system has been stable.Scalability Issues:Since I resumed my post, the entire Cyberoam system has been stable.Customer Service:8/10.Technical Support:8/10.Initial Setup:I met an already functional system when I resumed my present appointment.Implementation Team:I was made to understand that implementation was an in-house arrangement.ROI:* Cost effectiveness* Easier to manage* Turnaround time in getting issues resolved fasterOther Advice:The product is very good and very near perfect in terms of service delivery, cost effectiveness and manageability.Disclaimer: I am a real user, and this review is based on my own experience and opinions. June 15, 2015
  • 2016-10-30 T09:17:22.299-05:00
  • bvseo_lps, prod_bvrr, vn_prr_5.6
  • cp-1, bvpage1
  • co_hasreviews, tv_7, tr_7
  • loc_en_US, sid_3695161, prod, sort_default
1-7 of 7
 
Adding to Cart...
12/10/2016 10:44:58 PM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.

Error!

Something went wrong.

Please try again later.

License Selector

    The license selector is not currently available. Please try again later.