CronLab Pro 2000 Anti-Spam Appliance review
The Pro 2000 from CronLab is touted as a fire-and-forget anti-spam appliance with top detection rates. We put it through a barrage of live tests in the lab to see if it lives up to the hype.
There may be plenty of anti-spam appliances to choose from, but many businesses are put off them by the fact that some can be difficult to deploy and often require constant tinkering with their scoring systems to get good detection rates.
CronLab aims to avoid these problems. It claims the Pro 2000 can be up and running inside of ten minutes and requires no further configuration or customisation. We decided to put this to the test by dropping this compact 1U appliance into a live environment and leaving it for a few weeks to see how it faired.
The appliance provides anti-spam and anti-virus measures along with protection against phishing, spoofing and spyware. CronLab uses the open-source SpamAssassin mail filter preconfigured with a complete set of policies and augments this with a few proprietary techniques.
Anti-virus scanning is handled by ClamAV, but you can also add BitDefender if you want dual scanning engines. All updates are handled automatically and you don't have access to CronLab's policies or spam scoring system.
Initial contact is via a local connection where we ran through a simple setup routine. This only takes a couple of minutes as all we needed to do was provide a fixed IP address for the appliance, add DNS servers and set the time zone.
The next step is to use the web browser interface where we entered details of a domain and hostname for the appliance. Information about mail domains to be filtered is required and we added the URL of our mail server, its port number and protocol.
With the appliance configured we then visited our ISP account and altered the DNS MX record for our domain to point at the appliance. This meant that all mail for our entire domain went to the appliance first, was filtered and then passed on to our ISP where our clients could collect their mail as normal.
In This Article
How virtual desktop infrastructure enables digital transformation
Challenges and benefits of VDIFree download
The Okta digital trust index
Exploring the human edge of trustFree download
Optimising workload placement in your hybrid cloud
Deliver increased IT agility with the cloudFree Download
Modernise endpoint protection and leave your legacy challenges behind
The risk of keeping your legacy endpoint security toolsDownload now