Agree with the other posters in that more details are needed. Your need to protect competitive secrets is important when early in product development. However, at this stage, when you're asking for beta testers, it sounds like it's nearly ready to go, or at least at a critical stage of the product development cycle.
How does it work? How do you hook it up? What is, or will be, the cost? How does your product differ from the others, at least in general? As a consumer, why would I decide it's better than what I'm now using or the holes it fills? Besides being a computer geek, I'm also a fair marketer and a CPA. Try some role playing internally ... sit someone down and convince them they need your product while they tell you why they don't need it without either side of the role play being nutty about it. Then go to work on eliminating the objections. Repeat. Or run an internal contest of "the Objection of the Day", then overcome it. Are they technical or perception problems?
To me, false positives are the big issue with professional level UTM products. Companies can set policies and dedicate employees to keeping the network going. Home users just ultimately want the home network to work as uneventfully as the home microwave oven. How does cujo assist with that?
For example, I'm playing with LinuxMint as a Win 10 alternative. (Opensuse and Fedora were both unsuitable due to the little usability issues that make a home OS worth using.) For a couple of hours, Snort on my pfSense router just killed my app loading abilities. I found a block that clearly stated 'No Security Issue", but it just didn't like me downloading from repositories. I suppressed that rule after I discovered it and have had no problems since. Prior to finding it, I was about ready to toss out the Win10 replacement concept. So far, Mint is pretty good. Going to try Wine in a couple of weeks to see how well my preferred Windows apps work. Haven't got OpenVPN client working yet.
Of course, Snort is not an antivirus, or a malware detector, or a firewall. It's an IP signature detector that acts out if anything looks suspicious, such as a scan or probe. People without open ports don't need it. pfBlockerNG blocks (in/out/both) ip addresses from lists you feed it. They're supposed to be bad sites you don't want to get involved with. ClamAV is supposed to be good with email scans ... haven't tried it yet ... still on the list. Also, still trying to sort out the whole "linux needs no antivirus" thing.
How would using cujo avoid my hassles with common, current UTM based solutions such as Snort?