Libra ESVA 2.0 review

Libra ESVA combines an impressive arsenal of anti-spam measures in a VMware virtual appliance. It's surprisingly inexpensive too, but how does it perform in our live lab tests? Read on to find out.

Price
£254

The appeal of the virtual appliance for messaging security hasn't been missed with most vendors now offering versions of their anti-spam software for VMware environments, but Italian company Libra goes further. Not only does is its ESVA (email security virtual appliance) product designed to run only in VMware virtual machines (VMs) but it also claims a very high spam detection rate and looks very affordable for smaller businesses.

ITPRO_Value

ESVA is delivered as an OVF file so it can be used with VMware Server, ESX Server, Workstation or Player. Libra has an image available for Microsoft's Virtual PC but stresses that, along with VMware Workstation and Player, this should only be used for evaluation purposes. Libra advised us that it will also be supporting Microsoft's Hyper-V and should have this available by the end of this year.

The open source community may well have come across ESVA before as it was originally developed by Global Domination and is still available as a free download. However, as with many of these types of projects, support has been very patchy with the developer disappearing for most of this year making it a risky choice to use in a business environment.

Libra started supporting the project in 2008 but after making substantial improvements to the core functions of the software, went commercial with its own version shortly afterwards. Libra ESVA is now a very different beast to the open source version and the company provides full support for its paying customers.

Libra claims a ten minute installation process which we can verify. After downloading the OVF file, we deployed it as a template to our ESX Server 4.0 system and had a new VM with the appliance loaded on it in a few minutes.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020