MXtreme Mail Firewall
May 01, 2003
BorderWare Technologies, Inc.Product:
- Ease of Use:
- Value for Money:
- Overall Rating:
Specially functionally targeted purely at email.
You may need to buy another firewall for more general internet security.
If your main concern is email, this is the product you should consider.
Old hand BorderWare has decided to focus on one particular area of network security - email. Whereas most companies are happy enough to bundle email in with the rest of its internet traffic and allow the firewall to handle all of it, BorderWare's MXtreme MX-200 appliance specifically focuses on the problems of email traffic.
The device is very pleasantly designed. It comes as a 1U rack-mounted appliance in a very striking blue. Design is simple - a plain fascia with all of the ports hidden away at the rear.
The MX-200 is the baby of the range, aimed at small businesses. There are two larger models for enterprises, but the basic operation is the same.
Installation is perfectly straightforward. You simply plug in a standard keyboard and monitor (temporarily) to configure the device's network address. Then it can be managed from anywhere on the network via the web-based management application. The software runs on a specially hardened OS.
The appliance offers a number of security features specifically targeted at email. There is an impressive battery of spam filters which should remove virtually all spam from your network.
You can specify permitted servers, scan the contents and even set a figure for bulk email, above which it will be stopped. Black and white lists of sending IP addresses can also be configured.
There is also the option to integrate the product with Trend Micros anti-virus scanner. This is configured to receive hourly updates of its signature file for added protection.
The appliance also detects mal-formed messages which may be hiding viruses and blocks them or places them in a quarantined zone where they can be more properly investigated.
Authentication is provided by a number of means. You can use RSA SecureID or CryptoCard if you want to use tokens, or you can use RADIUS.
The MX-200 provides comprehensive logging options. Most impressive is the transport log which contains a record of all mail that has passed through - or not passed through - the firewall.
The accompanying documentation is plainly written, with all stages of installation and configuration addressed in a step-by-step manner.
If you are looking for a firewall which provides all of the functionality of a fully-fledged email security application, you can't go wrong with BorderWare's MX-200 device.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry