Netgear ProSecure STM300
Netgear moves firmly into the web and message content security market with a family of three appliances. The STM300 looks good value and in this exclusive review we see how well it performs.
Netgear's latest STM security appliances - the result of its acquisition of Chinese company CP Secure in 2008 - move it firmly into the web and message content security market. The family consists of three appliances with the STM300 in this exclusive review targeting mid-sized businesses with up to 300 concurrent users.
Netgear did actually launch these appliances a few months ago but at the time a number of important features had yet to be implemented. This has now been remedied so the STM300 includes the missing quarantining, IM and P2P app controls and support for Active Directory.
Few in the UK will have heard of CP Secure, but rest assured the STM300 offers a powerful partnership of security measures. Kaspersky looks after anti-virus and anti-malware scanning whilst Commtouch's RPD (recurrent pattern detection) and GlobalView services handle anti-spam and URL filtering.
The main contribution from CP Secure is its stream scanning technology. This uses a multithreaded approach which starts scanning and analysing traffic as it enters the network. Instead of waiting for a complete file to be received it scans bytes as they arrive and uses another thread to deliver them effectively providing near real-time scanning.
The STM300 is a 1U rack mount appliance offering a triplet of Gigabit ports with one for dedicated management access. The other two incorporate a hardware bypass circuit so if the appliance fails it won't take your internet connection with it.
Installation is swift as all STM appliances function as transparent gateways. For testing we just dropped the STM300 in between our LAN and main firewall without having to reconfigure our test clients. However, it would add value if Netgear implemented the SPI firewall included in its UTM appliances as smaller businesses could then use one appliance for all their gateway security needs.
In This Article
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now