As an MSP we run all kinds of combinations of single policy with 10 gateways to 10 policies for 12 gateways.
It all depends on commonalities and differences.
Anything that has a DMZ and a local office behind it that more or less uses the same outgoing policy as all branch offices, you can go either way, depending on the number of rules you need for the DMZ environment and the internet access rules.
To minimize problems that, when you need to allow a specific remote application for all your users, will pop up as you forget to add it to one of the policies, this will not happen when you have a single policy.
When you have a lot of lines for the DMZ and a few for internet access, you could opt for a single policy for that DMZ site and use a layer that you reuse for different policies.
Don't forget that you can also use the Install-On column when you have a mix, in these cases we use a group of rules specific to that location and use section titles to show where each location specific rules start.
So the bottom-line comes down to the point where you have to look at the functionalities, group them together when you have many overlapping rules and separate the others into a policy per function/location.
The version has nothing to do with it, if you feel you need to start using layered policies, you need to make sure the gateways this applies to are upgraded to R80.10.
Regards, Maarten