IronPort Virus Outbreak Filters on C300 appliance
June 06, 2006
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Enterprise-class security appliance offering comprehensive security.
- Weaknesses: Its sheer power could limit its appeal to larger enterprises.
- Verdict: A top quality, high-end offering that is impressively simple to deploy and manage.
We were impressed with the solid steel casing of this device, which reflects the enterprise quality build we have come to expect from IronPort.
The supplied documentation comes in the form of two hefty, but clearly written, manuals – one to guide users through simple deployments, another for more advanced users.
We were distressed by the initial startup fan noise, but this reduced to a more acceptable background hum. We were also pleased to note the presence of dual redundant power supplies.
The device is based on IronPort’s own hardened operating system, AsyncOS 4.5.5, with a feature base including anti-spam, anti-virus, mail-flow monitoring, message encryption and virtual gateway technology. New with the latest version is an enhanced overview page that gives users a useful snapshot of remote hosts connecting to the device. It also features enhanced anti-spam, AV and quarantine functions. For the first time, it boasts support for domain key signing.
Boot-up time for the OS was surprisingly long, but we will give it the benefit of the doubt because of the enterprise nature of the product. Web-based console users are initially prompted through a set-up wizard, which is very well-designed and intuitive.
Basic set-up tasks went smoothly, such as defining IP addresses and routing gateways and domain names from which the device’s inbound listener could accept mail. It was simple to define the filtering based on SenderBase reputation service scores. Out of the box there are three levels that can be set up here: conservative, moderate or aggressive. Users can also set their own custom levels.
We then went to the main user interface, which is pleasingly uncluttered and logically designed. After checking the status of the device through its monitor page, it was a simple matter to perform tasks, such as adding policies for incoming mail and checking the status of the anti-virus, anti-spam and other modules.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- British Airways says rewards accounts hacked, locked down
- Documents on NSA's zero-day policy provide little insight, EFF says
- GitHub on DDoS alert, efforts to curb its largest attack continue
- Shadow data: The monster that isn't just under your bed
- Puush urges users to change passwords after cyber attack