IronPort Virus Outbreak Filters on C300 appliance
June 06, 2006
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Enterprise-class security appliance offering comprehensive security.
- Weaknesses: Its sheer power could limit its appeal to larger enterprises.
- Verdict: A top quality, high-end offering that is impressively simple to deploy and manage.
We were impressed with the solid steel casing of this device, which reflects the enterprise quality build we have come to expect from IronPort.
The supplied documentation comes in the form of two hefty, but clearly written, manuals – one to guide users through simple deployments, another for more advanced users.
We were distressed by the initial startup fan noise, but this reduced to a more acceptable background hum. We were also pleased to note the presence of dual redundant power supplies.
The device is based on IronPort’s own hardened operating system, AsyncOS 4.5.5, with a feature base including anti-spam, anti-virus, mail-flow monitoring, message encryption and virtual gateway technology. New with the latest version is an enhanced overview page that gives users a useful snapshot of remote hosts connecting to the device. It also features enhanced anti-spam, AV and quarantine functions. For the first time, it boasts support for domain key signing.
Boot-up time for the OS was surprisingly long, but we will give it the benefit of the doubt because of the enterprise nature of the product. Web-based console users are initially prompted through a set-up wizard, which is very well-designed and intuitive.
Basic set-up tasks went smoothly, such as defining IP addresses and routing gateways and domain names from which the device’s inbound listener could accept mail. It was simple to define the filtering based on SenderBase reputation service scores. Out of the box there are three levels that can be set up here: conservative, moderate or aggressive. Users can also set their own custom levels.
We then went to the main user interface, which is pleasingly uncluttered and logically designed. After checking the status of the device through its monitor page, it was a simple matter to perform tasks, such as adding policies for incoming mail and checking the status of the anti-virus, anti-spam and other modules.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- U.S. government extends offer to protect states from electoral cyberthreats
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought