SecPoint Protector P800
March 03, 2014
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Full UTM with added functionality of vulnerability assessment.
- Weaknesses: Can become expensive depending on environment.
- Verdict: Solid product with lots of functionality, but a somewhat expensive pricing model.
The Protector UTM appliance from SecPoint offers a full set of features packed into a single device. To ensure security across the entire network, this product features a firewall, intrusion prevention system, anti-virus and anti-malware, spam protection and web content filtering capability, along with built-in vulnerability assessment functionality. The anti-virus component of the system is driven by anti-virus engines from ClamAV, Bitdefender and Kaspersky and can all be active at the same time.
Overall, we found this appliance to be easy to deploy and configure. The initial setup consisted of connecting the appliance to the network and browsing to the default IP address of the product via a web browser. Once there, we were guided through a short setup wizard that allowed us to set the network settings and licensing information along with time and date settings. After the initial setup was complete, we were able to access the appliance's web-based management interface. We found this to be easy to navigate with an intuitive and well-organized layout. The Protector can be easily deployed in-line at the gateway without the need to reconfigure the entire network. This model allows for easy configuration with minimal downtime, as well as possible configuration errors that would lead to a decrease in protection functions.
The first thing we noticed when logging into the appliance for the first time was the dashboard, which is known as the Control Center. This featured an excellent overview of the appliance, active features and alert information. On the right side of the dashboard there is a section of alert meters that give a lucid visual overview of recent events, such as spam or viruses, which can then be clicked on for more information. Aside from its ease of management, this appliance also has solid policy options, including user-based policy that can be integrated directly with Active Directory users and groups. This user- and group-based policy engine can be used to assign not only web filtering policies, but also anti-virus and spam protection policies.
SecPoint provides a quick install guide that is straightforward and user friendly. It provides the user with different installation diagrams according to the model of the device. SecPoint uses both screen shots and images to navigate the user to system configuration. The admin guide, offered via CD format, comes either on the device or users can go to the website to obtain the manual. The admin guide is thorough and easy to understand. Screen shots provide the user with a step-by-step walkthrough of the configuration. The website also contains a large FAQ library.
SecPoint support includes 24/7 live chat assistance where users having problems can receive quick answers to their questions. Email aid is also included. To further assist the user, SecPoint provides customers with access to its user forum and online community videos.
With a price starting just shy of $700 for a five-user license, this product can be quite pricey for larger environments. However, we find the SecPoint Protector to be a good value for the money overall, based on its ease of use and comprehensive feature set.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure