EXCLUSIVE - eSoft ThreatWall 250

eSoft may be a relative newcomer to the UK content security market but competitors would be well advised to keep a close eye on it.

Price
£2,862

It may have been formed as long ago as 1984 but eSoft only made a move into the UK security appliance market last year. It comes in with a solid range of products and a key differentiator is that eSoft doesn't rely on third party vendors to provide any security features as it has developed all its own solutions. This is clearly reflected in the price but don't be fooled into thinking they are less worthy as during testing we found them to be anything but.

Advertisement - Article continues below

In this exclusive review we take a closer look at the ThreatWall 250, which represents the entry point of this product line. The ThreatWall appliances are aimed at businesses that already have a firewall in place and want to add web content and mail security. If you want to go for the whole hog then check out eSoft's InstaGate appliances, which add firewalling and a few other interesting features to their security menu.

The 250 appliance offers a reasonable specification and with a price tag of 1,532 for the hardware looks comparatively good value. It can be customised to suit as eSoft offers two ThreatPak software upgrades with each costing a very reasonable 665 per year. The Web ThreatPak delivers web content filtering, protection from spyware and phishing sites, gateway anti-virus, IPS, anti-spyware and IM and P2P app controls. The Email ThreatPak deploys message content filtering, more virus scanning, anti-spam and mail quarantining.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The 250 can also function as a full mail server that can handle SMTP, POP3, IMAP and webmail. eSoft is offering this upgrade as an Exchange replacement and for a modest outlay of 266 per year it looks a cost effective and more manageable alternative for smaller businesses.

eSoft supports a number of deployment scenarios although if you want everything including intra-LAN traffic to be scanned you should use the transparent or bridged mode. Standalone node and routed modes are also supported but in these configuration the 250 can't scan mail being sent over the LAN between users unless their clients are reconfigured.

For testing we installed the appliance in transparent bridge mode, dropped it between our firewall and LAN and had it up and running in a few minutes. The appliance offers four Fast Ethernet ports comprising LAN and WAN along with a pair of optional ports and in transparent mode the two main ones are automatically bridged. All administration is via the well designed web interface and on first contact it runs a quick start wizard that registers with eSoft, contacts its SoftPak Director and downloads all updates and options that have been purchased.

Advertisement - Article continues below

With initial installation completed the web interface home page opens with the ThreatMonitor screen. This provides a useful overview of activity as it has a row of tabbed folders each offering plenty of graphical information about performance and activity. For web security you get a bar graph showing the total web traffic, pie charts for blocked and permitted web sites, lists of the top ten blocked sites and recent web site activity. From the mail tab you can easily see spam volumes and what is being quarantined.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now

Most Popular

Visit/security/ransomware/355891/nasa-it-contractor-ransomware-hack
ransomware

Ransomware collective claims to have hacked NASA IT contractor

3 Jun 2020
Visit/security/exploits/355866/critical-vmware-cloud-director-exploit-lets-hackers-seize-corporate
exploits

VMware Cloud Director exploit lets hackers seize corporate servers

2 Jun 2020
Visit/data-insights/data-science/355678/how-data-science-is-transforming-business
Sponsored

How data science is transforming business

29 May 2020