April 12, 2005
- Ease of Use:
- Value for Money:
- Overall Rating:
Provides a useful defense
email-based attacks and exploits. Against The anti-spam duties still devolve to the mail server.
A useful device that would complement a dedicated mail filtering system.
Tumbleweed Communications' MailGate Edge has been designed to protect your mail system from attacks, rather than filter all your email traffic to detect the presence of spam.
With a 1U-height rack-mountable chassis, it offers one Ethernet port, a status screen and a six-button control cluster to configure its IP address, subnet mask and default gateway address.
Further set-up and administration is via a web browser, while the display shows operational information.
The administrative interface is uncomplicated, with a wizard to guide you through the rest of the configuration process.
The system provides several ways to defend the corporate mail system, from simple block lists to more complex Directory Harvesting Attack (DHA) and Denial of Service (DoS) defenses.
You can restrict mail traffic characteristics such as maximum message size and number of recipients per message.
It will reject connections from other servers if the request appears to be suspicious, while administrators can add entries to its block list, which is also updated automatically by the DHA and DoS defense systems.
Individual blocks can set up to last any length of time.
As well as these general protection features, the system's DHA and DoS systems will detect and react to attacks automatically, and can be tuned to meet specific circumstances.
These features do have to be enabled by an administrator, but we feel that it would be better if they were enabled by default.
Both systems monitor and analyze mail traffic, looking for unusual usage patterns. In the case of a DHA attempt, the primary characteristic is an excessive amount of messages addressed to non-existent recipients from any one host.
Once a DHA attempt has been detected, the originating host is then automatically placed on the block list.
The DoS system functions in a similar way, in this case based on the volumes of traffic from individual hosts, but the system lacks flexibility.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry