CronLab Pro 2000 Anti-Spam Appliance review
The Pro 2000 from CronLab is touted as a fire-and-forget anti-spam appliance with top detection rates. We put it through a barrage of live tests in the lab to see if it lives up to the hype.
Unlike products such as Barracuda's Spam and Firewall appliances, you don't have to populate the Pro 2000 with user names as it does this all for you. As messages come in, the appliance automatically updates its internal list of valid email addresses as new ones are detected and sets up user accounts for each one.
All users have their own personal Message Center which they access by logging into the appliance's web interface with their own email address. Even here, you don't have to do anything as, on first contact, the appliance generates a password for the user and emails it to them.
Spam digests are emailed out to each user on a daily basis and from their personal area they can release clean messages and delete those they know to be spam. Releasing a message tells the appliance it wasn't spam whilst deleting one says it definitely was spam and it'll update its own rules accordingly.
The appliance adds footers to all inbound and outbound mail but users can switch this off for either direction from their own account. Email that may be phishing attempts will have warning messages inserted into the message body. However, if the user thinks any are safe they can declare the site to the appliance so it stops blocking it.
Only the reporting features require some intervention, although there's not much to do here either. Reports on all activities can be emailed to multiple recipients so you just need to add their email addresses and decide on the frequency each one should receive them.
In This Article
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download