February 01, 2003
Price on application
- Ease of Use:
- Value for Money:
- Overall Rating:
Excellent use of rules-based content filtering and delivery/receipt options.
Some functionality requires additional products to be installed.
A good product with some excellent features, slightly let down by the need to buy other related products for a complete solution.
Another approach to email security is to actively manage the emails being sent and received by your organization by means of rules and policies. This methodology is possibly more suited to those companies that require detailed audit trails, or who have had a problem with the unauthorized release of proprietary information via email, and it is the methodology espoused by Futuresoft's DynaComm i:series of products.
The control of email is the responsibility of DynaComm i:mail, which is fully integrated with the other products in the suite - these include an internet traffic filter and a file content scanner. Built into a dedicated SMTP server, the product can be positioned in a number of locations, depending on the configuration of your network and the needs of your business. It can also be located within the internal network, in which case all email - inbound and outgoing - will be processed. For smaller businesses with low email use - and smaller budgets - it can be located with the email server itself.
None of these installations is particularly troublesome, and Future soft's technical support is on hand to assist you. All configuration and administration is via a very usable management console.
DynaComm i:mail offers a number of extremely valuable security features such as the ability to block and filter emails by means of rules. There is no limit to the number of rules that can be applied.
Spam management is courtesy of a blacklisting function. As well as specifying your own banned IP addresses, it queries internet-based existing blacklists. Corresponding white lists can also be set up.
The content of emails can be monitored, using keywords to either ban or permit them. This function can be made even more effective by using the DynaComm i:scan product to look at attachments. DynaComm i:mail relies on third-party anti-virus software, however it comes pre-configured for all of the major products. All activities can be automated through a scheduling function, and there is extensive reporting and archiving available.
DynaComm i:mail is a versatile product, suitable for all businesses. Possibly the only drawback is that a lot of the functionality in other vendors' products requires the purchase of other members of the DynaComm i:series.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Information Security Risk Manager, £45-55k + bens
Infosec People - West Midlands, England, Coventry
SOC Analyst, Aldershot, £55-63k + benefits
Infosec People - England, Aldershot, Hampshire
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Sign up to our newsletters
SC Magazine UK Articles
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Met Police grab suspect with phone unlocked to get hold of data
- Cyber-security must reflect risk not just regulation
- Data centres are on the move - where will they end up?
- The information security implications of M&A deals
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Over 400,000 phishing sites have been detected each month in 2016
- TalkTalk customers urged to get routers swapped over hacker fears
- Report: Mirai 'is just the tip of the iceberg'
- Avalanche takedown involved searches in 40 countries
- India Supreme Court calls on tech giants to curb sexual assault, cyber-crime