IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Reviews

EXCLUSIVE - eSoft ThreatWall 250

eSoft may be a relative newcomer to the UK content security market but competitors would be well advised to keep a close eye on it.

Price
£2,862

It may have been formed as long ago as 1984 but eSoft only made a move into the UK security appliance market last year. It comes in with a solid range of products and a key differentiator is that eSoft doesn't rely on third party vendors to provide any security features as it has developed all its own solutions. This is clearly reflected in the price but don't be fooled into thinking they are less worthy as during testing we found them to be anything but.

In this exclusive review we take a closer look at the ThreatWall 250, which represents the entry point of this product line. The ThreatWall appliances are aimed at businesses that already have a firewall in place and want to add web content and mail security. If you want to go for the whole hog then check out eSoft's InstaGate appliances, which add firewalling and a few other interesting features to their security menu.

The 250 appliance offers a reasonable specification and with a price tag of 1,532 for the hardware looks comparatively good value. It can be customised to suit as eSoft offers two ThreatPak software upgrades with each costing a very reasonable 665 per year. The Web ThreatPak delivers web content filtering, protection from spyware and phishing sites, gateway anti-virus, IPS, anti-spyware and IM and P2P app controls. The Email ThreatPak deploys message content filtering, more virus scanning, anti-spam and mail quarantining.

The 250 can also function as a full mail server that can handle SMTP, POP3, IMAP and webmail. eSoft is offering this upgrade as an Exchange replacement and for a modest outlay of 266 per year it looks a cost effective and more manageable alternative for smaller businesses.

eSoft supports a number of deployment scenarios although if you want everything including intra-LAN traffic to be scanned you should use the transparent or bridged mode. Standalone node and routed modes are also supported but in these configuration the 250 can't scan mail being sent over the LAN between users unless their clients are reconfigured.

For testing we installed the appliance in transparent bridge mode, dropped it between our firewall and LAN and had it up and running in a few minutes. The appliance offers four Fast Ethernet ports comprising LAN and WAN along with a pair of optional ports and in transparent mode the two main ones are automatically bridged. All administration is via the well designed web interface and on first contact it runs a quick start wizard that registers with eSoft, contacts its SoftPak Director and downloads all updates and options that have been purchased.

With initial installation completed the web interface home page opens with the ThreatMonitor screen. This provides a useful overview of activity as it has a row of tabbed folders each offering plenty of graphical information about performance and activity. For web security you get a bar graph showing the total web traffic, pie charts for blocked and permitted web sites, lists of the top ten blocked sites and recent web site activity. From the mail tab you can easily see spam volumes and what is being quarantined.

Featured Resources

Meeting the future of education with confidence

How the switch to digital learning has created an opportunity to meet the needs of every student, always

Free Download

The Total Economic Impact™ of IBM Cloud Pak® for Watson AIOps with Instana

Cost savings and business benefits

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

Technology reimagined

Why PCaaS is perfect for modern schools

Free Download

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

7 Jun 2022
Delivery firm Yodel disrupted by cyber attack
cyber attacks

Delivery firm Yodel disrupted by cyber attack

21 Jun 2022
Swift exit: How the world cut off Russian banks
finance

Swift exit: How the world cut off Russian banks

24 Jun 2022