IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Reviews

EXCLUSIVE - eSoft ThreatWall 250

eSoft may be a relative newcomer to the UK content security market but competitors would be well advised to keep a close eye on it.

Price
£2,862

It may have been formed as long ago as 1984 but eSoft only made a move into the UK security appliance market last year. It comes in with a solid range of products and a key differentiator is that eSoft doesn't rely on third party vendors to provide any security features as it has developed all its own solutions. This is clearly reflected in the price but don't be fooled into thinking they are less worthy as during testing we found them to be anything but.

In this exclusive review we take a closer look at the ThreatWall 250, which represents the entry point of this product line. The ThreatWall appliances are aimed at businesses that already have a firewall in place and want to add web content and mail security. If you want to go for the whole hog then check out eSoft's InstaGate appliances, which add firewalling and a few other interesting features to their security menu.

The 250 appliance offers a reasonable specification and with a price tag of 1,532 for the hardware looks comparatively good value. It can be customised to suit as eSoft offers two ThreatPak software upgrades with each costing a very reasonable 665 per year. The Web ThreatPak delivers web content filtering, protection from spyware and phishing sites, gateway anti-virus, IPS, anti-spyware and IM and P2P app controls. The Email ThreatPak deploys message content filtering, more virus scanning, anti-spam and mail quarantining.

The 250 can also function as a full mail server that can handle SMTP, POP3, IMAP and webmail. eSoft is offering this upgrade as an Exchange replacement and for a modest outlay of 266 per year it looks a cost effective and more manageable alternative for smaller businesses.

eSoft supports a number of deployment scenarios although if you want everything including intra-LAN traffic to be scanned you should use the transparent or bridged mode. Standalone node and routed modes are also supported but in these configuration the 250 can't scan mail being sent over the LAN between users unless their clients are reconfigured.

For testing we installed the appliance in transparent bridge mode, dropped it between our firewall and LAN and had it up and running in a few minutes. The appliance offers four Fast Ethernet ports comprising LAN and WAN along with a pair of optional ports and in transparent mode the two main ones are automatically bridged. All administration is via the well designed web interface and on first contact it runs a quick start wizard that registers with eSoft, contacts its SoftPak Director and downloads all updates and options that have been purchased.

With initial installation completed the web interface home page opens with the ThreatMonitor screen. This provides a useful overview of activity as it has a row of tabbed folders each offering plenty of graphical information about performance and activity. For web security you get a bar graph showing the total web traffic, pie charts for blocked and permitted web sites, lists of the top ten blocked sites and recent web site activity. From the mail tab you can easily see spam volumes and what is being quarantined.

Featured Resources

The 3D skills report

Add 3D skills to your creative toolkits and play a sizeable role in the digital future

Free Download

The increasing need for environmental intelligence solutions

How sustainability has become a major business priority and is continuing to grow in importance

Free Download

2022 State of the multi-cloud report

What are the biggest multi-cloud motivations for decision-makers, and what are the leading challenges

Free Download

Solve global challenges with machine learning

Tackling our word's hardest problems with ML

Free Download

Most Popular

Why energy efficient technology is key to a sustainable business
Sponsored

Why energy efficient technology is key to a sustainable business

16 Jan 2023
Yandex data breach reveals source code littered with racist language
data breaches

Yandex data breach reveals source code littered with racist language

30 Jan 2023
Dutch hacker steals data from virtually entire population of Austria
data breaches

Dutch hacker steals data from virtually entire population of Austria

26 Jan 2023