CP Secure CSG 1500 and Worm Secure 500
June 06, 2006
CP Secure, Inc.Product:
$23,999 for CSG; $9,900 for Wormsecure
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Very good and scalable anti-malware solution offering heuristic scanning.
- Weaknesses: Not the best interface.
- Verdict: Strong scalable offering that is well worth shortlisting.
CP Secure offers both Content Security Gateway (CSG) 1500 and a dedicated anti-worm appliance, the Worm Secure 500.
The CSG 1500 is designed to meet the requirements of enterprise-class organizations and offices with up to several thousand nodes. It claims to handle HTTP traffic of 71 Mbps and SMTP traffic of 460,000 email messages per hour. It has dual redundant power supply units and options for failover.
Printed documentation was scant (just one quick set-up sheet), but the information on the bundled CD was comprehensive.
We began with the anti-virus configuration, which allowed us to scan on SMTP, IMAP, Pop3, HTTP, HTTPS and FTP.
The main screen gives a summary page listing all the protocols the unit is scanning, and provides details of files deleted, cleaned or quarantined. Administrators can define rules for dealing with identified viruses.
The WormSecure appliance can be set up in single or multi-bridge modes. As well as the dedicated admin port, there are seven Ethernet Gigabit ports that can be used to protect either six network segments in single bridge mode, or up to three different subnets in multi-bridge mode.
The management GUI presents a set-up wizard to configure the network settings, such as the device’s IP address, system clock, administrator email address for notifications and update settings.
Once this was done, we were presented with the main web-based management console. This ease of deployment is impressive – at this point, the device was up and running, protecting our network from worms.
The main console was informative and intuitive – the clearly laid-out screen gave us a summary of the device status for worm scanning, including pattern and engine firmware versions.
The device can be set to block incoming worms or disconnect the infected host for a set time. In the event of a worm outbreak, the device implements a policy of containment, and quarantines malicious traffic in an infected segment – preventing a worm from spreading across an enterprise infrastructure.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA 2015: Tension continues to grow between govt, cryptographers
- 'Aaron's Law' returns to Congress
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure