CronLab Pro 2000 Anti-Spam Appliance review

The Pro 2000 from CronLab is touted as a fire-and-forget anti-spam appliance with top detection rates. We put it through a barrage of live tests in the lab to see if it lives up to the hype.

Unlike products such as Barracuda's Spam and Firewall appliances, you don't have to populate the Pro 2000 with user names as it does this all for you. As messages come in, the appliance automatically updates its internal list of valid email addresses as new ones are detected and sets up user accounts for each one.

All users have their own personal Message Center which they access by logging into the appliance's web interface with their own email address. Even here, you don't have to do anything as, on first contact, the appliance generates a password for the user and emails it to them.

Spam digests are emailed out to each user on a daily basis and from their personal area they can release clean messages and delete those they know to be spam. Releasing a message tells the appliance it wasn't spam whilst deleting one says it definitely was spam and it'll update its own rules accordingly.

The appliance adds footers to all inbound and outbound mail but users can switch this off for either direction from their own account. Email that may be phishing attempts will have warning messages inserted into the message body. However, if the user thinks any are safe they can declare the site to the appliance so it stops blocking it.

Only the reporting features require some intervention, although there's not much to do here either. Reports on all activities can be emailed to multiple recipients so you just need to add their email addresses and decide on the frequency each one should receive them.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
Bahrain targets activists with NSO's Pegasus spyware
spyware

Bahrain targets activists with NSO's Pegasus spyware

24 Aug 2021
New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021
X-rated phishing attacks just keep growing
phishing

X-rated phishing attacks just keep growing

4 Jun 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021