CronLab Pro 2000 Anti-Spam Appliance review
The Pro 2000 from CronLab is touted as a fire-and-forget anti-spam appliance with top detection rates. We put it through a barrage of live tests in the lab to see if it lives up to the hype.
There may be plenty of anti-spam appliances to choose from, but many businesses are put off them by the fact that some can be difficult to deploy and often require constant tinkering with their scoring systems to get good detection rates.
The appliance provides anti-spam and anti-virus measures along with protection against phishing, spoofing and spyware. CronLab uses the open-source SpamAssassin mail filter preconfigured with a complete set of policies and augments this with a few proprietary techniques.
Anti-virus scanning is handled by ClamAV, but you can also add BitDefender if you want dual scanning engines. All updates are handled automatically and you don't have access to CronLab's policies or spam scoring system.
Initial contact is via a local connection where we ran through a simple setup routine. This only takes a couple of minutes as all we needed to do was provide a fixed IP address for the appliance, add DNS servers and set the time zone.
The next step is to use the web browser interface where we entered details of a domain and hostname for the appliance. Information about mail domains to be filtered is required and we added the URL of our mail server, its port number and protocol.
With the appliance configured we then visited our ISP account and altered the DNS MX record for our domain to point at the appliance. This meant that all mail for our entire domain went to the appliance first, was filtered and then passed on to our ISP where our clients could collect their mail as normal.
In This Article
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now