IronPort Virus Outbreak Filters on C300 appliance
June 06, 2006
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Enterprise-class security appliance offering comprehensive security.
- Weaknesses: Its sheer power could limit its appeal to larger enterprises.
- Verdict: A top quality, high-end offering that is impressively simple to deploy and manage.
We were impressed with the solid steel casing of this device, which reflects the enterprise quality build we have come to expect from IronPort.
The supplied documentation comes in the form of two hefty, but clearly written, manuals – one to guide users through simple deployments, another for more advanced users.
We were distressed by the initial startup fan noise, but this reduced to a more acceptable background hum. We were also pleased to note the presence of dual redundant power supplies.
The device is based on IronPort’s own hardened operating system, AsyncOS 4.5.5, with a feature base including anti-spam, anti-virus, mail-flow monitoring, message encryption and virtual gateway technology. New with the latest version is an enhanced overview page that gives users a useful snapshot of remote hosts connecting to the device. It also features enhanced anti-spam, AV and quarantine functions. For the first time, it boasts support for domain key signing.
Boot-up time for the OS was surprisingly long, but we will give it the benefit of the doubt because of the enterprise nature of the product. Web-based console users are initially prompted through a set-up wizard, which is very well-designed and intuitive.
Basic set-up tasks went smoothly, such as defining IP addresses and routing gateways and domain names from which the device’s inbound listener could accept mail. It was simple to define the filtering based on SenderBase reputation service scores. Out of the box there are three levels that can be set up here: conservative, moderate or aggressive. Users can also set their own custom levels.
We then went to the main user interface, which is pleasingly uncluttered and logically designed. After checking the status of the device through its monitor page, it was a simple matter to perform tasks, such as adding policies for incoming mail and checking the status of the anti-virus, anti-spam and other modules.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure