SecPoint Protector P800
March 03, 2014
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Full UTM with added functionality of vulnerability assessment.
- Weaknesses: Can become expensive depending on environment.
- Verdict: Solid product with lots of functionality, but a somewhat expensive pricing model.
The Protector UTM appliance from SecPoint offers a full set of features packed into a single device. To ensure security across the entire network, this product features a firewall, intrusion prevention system, anti-virus and anti-malware, spam protection and web content filtering capability, along with built-in vulnerability assessment functionality. The anti-virus component of the system is driven by anti-virus engines from ClamAV, Bitdefender and Kaspersky and can all be active at the same time.
Overall, we found this appliance to be easy to deploy and configure. The initial setup consisted of connecting the appliance to the network and browsing to the default IP address of the product via a web browser. Once there, we were guided through a short setup wizard that allowed us to set the network settings and licensing information along with time and date settings. After the initial setup was complete, we were able to access the appliance's web-based management interface. We found this to be easy to navigate with an intuitive and well-organized layout. The Protector can be easily deployed in-line at the gateway without the need to reconfigure the entire network. This model allows for easy configuration with minimal downtime, as well as possible configuration errors that would lead to a decrease in protection functions.
The first thing we noticed when logging into the appliance for the first time was the dashboard, which is known as the Control Center. This featured an excellent overview of the appliance, active features and alert information. On the right side of the dashboard there is a section of alert meters that give a lucid visual overview of recent events, such as spam or viruses, which can then be clicked on for more information. Aside from its ease of management, this appliance also has solid policy options, including user-based policy that can be integrated directly with Active Directory users and groups. This user- and group-based policy engine can be used to assign not only web filtering policies, but also anti-virus and spam protection policies.
SecPoint provides a quick install guide that is straightforward and user friendly. It provides the user with different installation diagrams according to the model of the device. SecPoint uses both screen shots and images to navigate the user to system configuration. The admin guide, offered via CD format, comes either on the device or users can go to the website to obtain the manual. The admin guide is thorough and easy to understand. Screen shots provide the user with a step-by-step walkthrough of the configuration. The website also contains a large FAQ library.
SecPoint support includes 24/7 live chat assistance where users having problems can receive quick answers to their questions. Email aid is also included. To further assist the user, SecPoint provides customers with access to its user forum and online community videos.
With a price starting just shy of $700 for a five-user license, this product can be quite pricey for larger environments. However, we find the SecPoint Protector to be a good value for the money overall, based on its ease of use and comprehensive feature set.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context