Reviews

CronLab Pro 2000 Anti-Spam Appliance review

The Pro 2000 from CronLab is touted as a fire-and-forget anti-spam appliance with top detection rates. We put it through a barrage of live tests in the lab to see if it lives up to the hype.

Price
£5,555

There may be plenty of anti-spam appliances to choose from, but many businesses are put off them by the fact that some can be difficult to deploy and often require constant tinkering with their scoring systems to get good detection rates.

CronLab aims to avoid these problems. It claims the Pro 2000 can be up and running inside of ten minutes and requires no further configuration or customisation. We decided to put this to the test by dropping this compact 1U appliance into a live environment and leaving it for a few weeks to see how it faired.

The appliance provides anti-spam and anti-virus measures along with protection against phishing, spoofing and spyware. CronLab uses the open-source SpamAssassin mail filter preconfigured with a complete set of policies and augments this with a few proprietary techniques.

Anti-virus scanning is handled by ClamAV, but you can also add BitDefender if you want dual scanning engines. All updates are handled automatically and you don't have access to CronLab's policies or spam scoring system.

Initial contact is via a local connection where we ran through a simple setup routine. This only takes a couple of minutes as all we needed to do was provide a fixed IP address for the appliance, add DNS servers and set the time zone.

The next step is to use the web browser interface where we entered details of a domain and hostname for the appliance. Information about mail domains to be filtered is required and we added the URL of our mail server, its port number and protocol.

With the appliance configured we then visited our ISP account and altered the DNS MX record for our domain to point at the appliance. This meant that all mail for our entire domain went to the appliance first, was filtered and then passed on to our ISP where our clients could collect their mail as normal.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Education and government most at risk from email threats
phishing

Education and government most at risk from email threats

26 Nov 2021
Attackers use CSS to fool anti-phishing systems
phishing

Attackers use CSS to fool anti-phishing systems

11 Nov 2021
Hackers could use new Wslink malware in highly targeted cyber attacks
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

1 Nov 2021
FBI raids Chinese POS business following cyber attack claims
malware

FBI raids Chinese POS business following cyber attack claims

27 Oct 2021

Most Popular

Sony pulls out of MWC 2022
Business operations

Sony pulls out of MWC 2022

14 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
Dell XPS 15 (2021) review: The best just got better
Laptops

Dell XPS 15 (2021) review: The best just got better

14 Jan 2022