M86 SWG 3000 v10

The latest SWG appliances from M86 Security takes a highly proactive stance tackling new web threats. Read this exclusive review of the SWG 3000 to see if its patented behavioural blocking technology provides the perfect security umbrella or not.

We were surprised to discover that HTTPS scanning is still an optional extra. Many vendors now consider this a necessity, and not a luxury, and include it as standard. Web caching is another option and we would suggest adding this before deployment. Costing 718, the kit comprises an extra 250GB hard disk - the appliance will need to be powered down to fit it.

Deployment in the lab was swift as the appliance defaults to an explicit proxy so we just needed to configure our Windows clients to use it. We did this manually but you can easily automate it with group policies or PAC scripts.

The web interface sees some graphical refreshment, but we've always found it well designed and easy to use anyway. The appliance uses policies to manage security and these comprise sets of rules each containing conditions and actions.

You get three default policies, so the appliance can start filtering traffic straight away for all users. These contain over forty rules apiece and include options for anti-virus scanning, URL filtering, file blocking and handling malicious code.

To create new policies you clone existing ones and modify them to suit by removing rules you don't need, adding new ones and re-ordering their priority. Although it works well enough, this seems a little clunky to us. The X-ray option is very useful for testing as it can be applied to an entire policy or individual rules so they only log what actions they would have taken.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020