Finjan Vital Security Web Appliance NG-5100
August 09, 2006
c£17,800 for 1,000 users for one-year subscription
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Best-of-breed anti-virus and web filter engines provide strong anti-malware security
- Weaknesses: Difficult to configure and has a large price tag. Lacks some basic features usually found in multi-function security appliances
- Verdict: Powerful, but expensive, this high-end appliance is for organisations willing to pay for an anti-malware focused product that packs a punch
This appliance is in-depth and focused on malware, lacking VPN and IDS/IPS capabilities. The configurations are granular and take a lot of time to put in place. While the setup and installation of the NG-5100 are very simple, configuration is not an easy task. That said, documentation plays a large role in making the configuration process much less arduous.
This appliance incorporates many protective features in one product. It uses multiple, overlapping anti-virus engines from Sophos, McAfee and Kaspersky and also brings together web filtering from SurfControl and Secure Computing, along with its own features such as application blocking and anti-spyware.
It brings to the table its own vulnerability scanner, known as Anti.dote, which performs virtual patching for zero-hour protection against known vulnerabilities.
This box performs excellently. It includes solid third-party anti-virus and web filters, along with its own anti-spyware, and vulnerability protection together into one box. It also incorporates detailed logs and reports which can be customised to analyse specific areas.
The Finjan NG-5100 comes supplied with three pieces of documentation. Manuals include a guide to get started, outlining the steps in the setup wizard, an installation guide that elaborates on the setup wizard and details basic installation tasks, and a management console reference guide with details on specific device and policy settings.
All the manuals are clear and easy to understand and include screenshots and tables.
Although Finjan offers a lot of support options, all come at a price. Free support is only offered via email, while all other options must be purchased as a part of a support package. These packages include options such as telephone support and automatic download of product upgrades and updates.
With such a high price tag, at the top end of the category, this product is a hefty investment for any organisation.
Although it offers best-of-breed software packages, this protection does not come cheap. Couple that with support and subscription fees, and we find that the price becomes even more daunting.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry