EXCLUSIVE - eSoft ThreatWall 250

eSoft may be a relative newcomer to the UK content security market but competitors would be well advised to keep a close eye on it.

Price
£2,862

It may have been formed as long ago as 1984 but eSoft only made a move into the UK security appliance market last year. It comes in with a solid range of products and a key differentiator is that eSoft doesn't rely on third party vendors to provide any security features as it has developed all its own solutions. This is clearly reflected in the price but don't be fooled into thinking they are less worthy as during testing we found them to be anything but.

In this exclusive review we take a closer look at the ThreatWall 250, which represents the entry point of this product line. The ThreatWall appliances are aimed at businesses that already have a firewall in place and want to add web content and mail security. If you want to go for the whole hog then check out eSoft's InstaGate appliances, which add firewalling and a few other interesting features to their security menu.

The 250 appliance offers a reasonable specification and with a price tag of 1,532 for the hardware looks comparatively good value. It can be customised to suit as eSoft offers two ThreatPak software upgrades with each costing a very reasonable 665 per year. The Web ThreatPak delivers web content filtering, protection from spyware and phishing sites, gateway anti-virus, IPS, anti-spyware and IM and P2P app controls. The Email ThreatPak deploys message content filtering, more virus scanning, anti-spam and mail quarantining.

The 250 can also function as a full mail server that can handle SMTP, POP3, IMAP and webmail. eSoft is offering this upgrade as an Exchange replacement and for a modest outlay of 266 per year it looks a cost effective and more manageable alternative for smaller businesses.

eSoft supports a number of deployment scenarios although if you want everything including intra-LAN traffic to be scanned you should use the transparent or bridged mode. Standalone node and routed modes are also supported but in these configuration the 250 can't scan mail being sent over the LAN between users unless their clients are reconfigured.

For testing we installed the appliance in transparent bridge mode, dropped it between our firewall and LAN and had it up and running in a few minutes. The appliance offers four Fast Ethernet ports comprising LAN and WAN along with a pair of optional ports and in transparent mode the two main ones are automatically bridged. All administration is via the well designed web interface and on first contact it runs a quick start wizard that registers with eSoft, contacts its SoftPak Director and downloads all updates and options that have been purchased.

With initial installation completed the web interface home page opens with the ThreatMonitor screen. This provides a useful overview of activity as it has a row of tabbed folders each offering plenty of graphical information about performance and activity. For web security you get a bar graph showing the total web traffic, pie charts for blocked and permitted web sites, lists of the top ten blocked sites and recent web site activity. From the mail tab you can easily see spam volumes and what is being quarantined.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Most Popular

Citrix buys Slack competitor Wrike in record $2.25bn deal
collaboration

Citrix buys Slack competitor Wrike in record $2.25bn deal

19 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
SolarWinds hackers hit Malwarebytes through Microsoft exploit
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021