M86 SWG 3000 v10

The latest SWG appliances from M86 Security takes a highly proactive stance tackling new web threats. Read this exclusive review of the SWG 3000 to see if its patented behavioural blocking technology provides the perfect security umbrella or not.

Price
£4,345

The majority of network security products can only react to web-based threats once they've been identified and the vendor has come up with an attack database update, a new signature file or a patch to protect against them. The SWG appliances from M86 Security aim to be more proactive and are designed to provide instant protection as new threats emerge.

In this exclusive review we look at the entry-level SWG 3000 which introduces M86's latest v10 code that was announced in October. The SWG 3000 targets mid-sized companies of up to 1,000 users and is based on the good-quality IBM System x3250 M3 rack server.

IT PRO Innovation Award

When we reported on the new v10 code release, M86 advised IT Pro about its Dynamic Web Repair feature which cleanses web pages of malicious code before presenting them to the user. In reality this has been in the SWG products from the start and is part of its active real-time content inspection.

The more common sandbox technique requires suspect code to be run in a fenced off area in memory. Rather than do this, the appliance passively inspects the code as it comes in to determine what it is trying to do. If the code is deemed to be malicious it blocks and removes it, so presenting the user with a sanitised web page. It didn't affect web page rendering speeds in our tests, nor did it mark any legitimate code or pages as malicious even when using web apps.

Dynamic Web Repair is included in the yearly SWG subscription which also provides protection against spyware. It includes M86's Anti.dote service which automatically pushes a new set of rules to the appliance to provide additional protection when a new threat is spotted.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020