CronLab Pro 2000 Anti-Spam Appliance review

The Pro 2000 from CronLab is touted as a fire-and-forget anti-spam appliance with top detection rates. We put it through a barrage of live tests in the lab to see if it lives up to the hype.

Price
£5,555

There may be plenty of anti-spam appliances to choose from, but many businesses are put off them by the fact that some can be difficult to deploy and often require constant tinkering with their scoring systems to get good detection rates.

CronLab aims to avoid these problems. It claims the Pro 2000 can be up and running inside of ten minutes and requires no further configuration or customisation. We decided to put this to the test by dropping this compact 1U appliance into a live environment and leaving it for a few weeks to see how it faired.

The appliance provides anti-spam and anti-virus measures along with protection against phishing, spoofing and spyware. CronLab uses the open-source SpamAssassin mail filter preconfigured with a complete set of policies and augments this with a few proprietary techniques.

Anti-virus scanning is handled by ClamAV, but you can also add BitDefender if you want dual scanning engines. All updates are handled automatically and you don't have access to CronLab's policies or spam scoring system.

Initial contact is via a local connection where we ran through a simple setup routine. This only takes a couple of minutes as all we needed to do was provide a fixed IP address for the appliance, add DNS servers and set the time zone.

The next step is to use the web browser interface where we entered details of a domain and hostname for the appliance. Information about mail domains to be filtered is required and we added the URL of our mail server, its port number and protocol.

With the appliance configured we then visited our ISP account and altered the DNS MX record for our domain to point at the appliance. This meant that all mail for our entire domain went to the appliance first, was filtered and then passed on to our ISP where our clients could collect their mail as normal.

Featured Resources

2021 Thales access management index: Global edition

The challenges of trusted access in a cloud-first world

Free download

Transforming higher education for the digital era

The future is yours

Free download

Building a cloud-native, hybrid-multi cloud infrastructure

Get ready for hybrid-multi cloud databases, AI, and machine learning workloads

Free download

The next biggest shopping destination is the cloud

Know why retail businesses must move to the cloud

Free Download

Recommended

Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
Bahrain targets activists with NSO's Pegasus spyware
spyware

Bahrain targets activists with NSO's Pegasus spyware

24 Aug 2021
New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021
X-rated phishing attacks just keep growing
phishing

X-rated phishing attacks just keep growing

4 Jun 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Veritas Backup Exec 21.3 review: Covers every angle
backup software

Veritas Backup Exec 21.3 review: Covers every angle

14 Oct 2021