M86 SWG 3000 v10
The latest SWG appliances from M86 Security takes a highly proactive stance tackling new web threats. Read this exclusive review of the SWG 3000 to see if its patented behavioural blocking technology provides the perfect security umbrella or not.
We were surprised to discover that HTTPS scanning is still an optional extra. Many vendors now consider this a necessity, and not a luxury, and include it as standard. Web caching is another option and we would suggest adding this before deployment. Costing 718, the kit comprises an extra 250GB hard disk - the appliance will need to be powered down to fit it.
Deployment in the lab was swift as the appliance defaults to an explicit proxy so we just needed to configure our Windows clients to use it. We did this manually but you can easily automate it with group policies or PAC scripts.
The web interface sees some graphical refreshment, but we've always found it well designed and easy to use anyway. The appliance uses policies to manage security and these comprise sets of rules each containing conditions and actions.
You get three default policies, so the appliance can start filtering traffic straight away for all users. These contain over forty rules apiece and include options for anti-virus scanning, URL filtering, file blocking and handling malicious code.
To create new policies you clone existing ones and modify them to suit by removing rules you don't need, adding new ones and re-ordering their priority. Although it works well enough, this seems a little clunky to us. The X-ray option is very useful for testing as it can be applied to an entire policy or individual rules so they only log what actions they would have taken.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download