IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

FaceTime Communications USG530 - web filtering appliance review

Controlling IM and P2P apps in the workplace is a serious problem, but FaceTime goes where UTM appliances fear to tread as nothing slips under its radar.

Editor's Choice
Price
£28,695

Many businesses that think implementing Acceptable Use Policies is a sure-fire way of controlling internet access in the workplace are just fooling themselves as increasingly IT savvy staff are finding ways around these restrictions. IM and P2P apps are now serious problem and yet the majority of gateway security appliances pay little more than lip service to them.

FaceTime has traditionally focused on this problem area and its USG (unified security gateway) appliances offer a wide range of facilities to monitor, manage and control IP and P2P apps. They go much further by also offering sophisticated defences against malware, which includes packet analysis plus packet sequence recognition and have a built in awareness of problem social networking sites such as Facebook and MySpace.

Optional web content filtering is on the menu and the latest version adds a raft of new features. On review we have the USG530, which has the muscle to handle up to 5,000 users. The price for the review system is for 1,000 users and includes a one year subscription to the malware and web filtering services.

There is an argument in favour of allowing some access to social networking sites in the workplace and FaceTime takes this into account as the appliance doesn't just offer a single filter category but lists all their various services. It is fully aware of services such as chat, alerts, gaming, dating and classifieds so you can fine-tune what access you wish to allow.

The latest code release adds more controls over web applications and can audit instant messages sent by Blackberry users over the Lotus SameTime service. Global objects simplify security policy configuration and greynet traffic can have time and bandwidth quotas applied to them. Awareness of Microsoft's OCS has been extended to controlling IM messages passing through Edge Servers.

The appliance has three Gigabit network ports with one to monitor all traffic via switch port mirroring, a second providing dedicated management access and a third for FaceTime's IM proxy. The monitoring port can only block IM traffic whereas the proxy port provides a much finer control as it can analyse instant messages in real time.

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

WatchGuard Firebox M290 review: Stiff security at a great price
unified threat management (UTM)

WatchGuard Firebox M290 review: Stiff security at a great price

23 Feb 2022
Sophos XGS 3300 review: Xstream firewall performance
Security

Sophos XGS 3300 review: Xstream firewall performance

7 Jan 2022
Ubiquiti Networks UniFi Dream Machine Pro review: All the security you need in one handy box
Security

Ubiquiti Networks UniFi Dream Machine Pro review: All the security you need in one handy box

18 Nov 2021
Big zero-day flaw found in Palo Alto security appliance
internet security

Big zero-day flaw found in Palo Alto security appliance

11 Nov 2021

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers
ransomware

Linux-based Cheerscrypt ransomware found targeting VMware ESXi servers

26 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

24 May 2022