8e6 R3000 and Enterprise Reporter
February 01, 2007
c£10 per user for 1,000 users
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Flexible, good for large and medium-sized organisations, solid, detailed documentation
- Weaknesses: Nothing we could find during this group test
- Verdict: For its solid performance, flexibility and value we rate the 8e6 Enterprise Reporter our Best Buy
The 8e6 R3000 and Enterprise Reporter is a superb product. The feature-rich appliance was easy to set up and performed well. The setup procedure is typical of more advanced appliances. Once a keyboard and monitor are connected to the appliance, a wizard guides the user through setup. Once the initial configuration is complete, policy development is quick and easy thanks to the intuitive web interface.
The documentation is clear and walks the user through initial configuration in great detail. The user guide, an indexed pdf file, describes policy configuration, network settings and customisation in an easy-to-read style with many screen shots and examples.
Performance was excellent and, in addition to URL and content filtering, included spyware, phishing, instant messaging and peer-to-peer protection. The tool can be used in conjunction with other 8e6 products such as the Threat Analysis Reporter. Also, there is the capability of archiving large amounts of information in the optional storage repository.
The device sports more than 90 different content categories making it one of the most flexible products of its type. These categories include all of those one would expect (illegal drugs, pornography, gambling), plus several others such as explicit art or comics. Additionally, there is a mobile client to use with notebook computers. One of the product's more useful features is its ability to lock a user out of the internet after a pre-configured number of attempts to access forbidden sites. This prevents users from attempting to bypass the device by trying different sites repeatedly.
The support site is strong and includes all of the resources you would expect. Users can also get help by phone or email. The support site contains quite a bit more than we are used to seeing, however. For example, there is a section on end-of-life and how obsolete products are supported, along with a list of those products. Clicking on a discontinued product produces a complete description of its discontinuation.
The pricing range goes from about the middle of the pricing spectrum for up to 1,000 users to a very reasonable price per user at 5,000 users. For its value, power and flexibility we rate R3000 and Enterprise Reporter our Best Buy.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry