CronLab Pro 2000 Anti-Spam Appliance review
The Pro 2000 from CronLab is touted as a fire-and-forget anti-spam appliance with top detection rates. We put it through a barrage of live tests in the lab to see if it lives up to the hype.
There may be plenty of anti-spam appliances to choose from, but many businesses are put off them by the fact that some can be difficult to deploy and often require constant tinkering with their scoring systems to get good detection rates.
CronLab aims to avoid these problems. It claims the Pro 2000 can be up and running inside of ten minutes and requires no further configuration or customisation. We decided to put this to the test by dropping this compact 1U appliance into a live environment and leaving it for a few weeks to see how it faired.
The appliance provides anti-spam and anti-virus measures along with protection against phishing, spoofing and spyware. CronLab uses the open-source SpamAssassin mail filter preconfigured with a complete set of policies and augments this with a few proprietary techniques.
Anti-virus scanning is handled by ClamAV, but you can also add BitDefender if you want dual scanning engines. All updates are handled automatically and you don't have access to CronLab's policies or spam scoring system.
Initial contact is via a local connection where we ran through a simple setup routine. This only takes a couple of minutes as all we needed to do was provide a fixed IP address for the appliance, add DNS servers and set the time zone.
The next step is to use the web browser interface where we entered details of a domain and hostname for the appliance. Information about mail domains to be filtered is required and we added the URL of our mail server, its port number and protocol.
With the appliance configured we then visited our ISP account and altered the DNS MX record for our domain to point at the appliance. This meant that all mail for our entire domain went to the appliance first, was filtered and then passed on to our ISP where our clients could collect their mail as normal.
In This Article
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now