Strengths: Very easy to set up and configure, with very clear documentation and easily accessible support.
Weaknesses: Deployment across the network was fiddly when using ISA Server 2004. Documentation for doing so was not as effective as it could have been.
Verdict: Stronger contender that covers all the bases; a top performer.
This was the second of our Best Buys. It is very simple to set up and work with.
The interface is clean, organized and intuitive. The set-up file is a simple executable installer that is mostly automated. Just start the installation and the product does almost everything else on its own with minimal input from the user. After setup is complete, configuration is laid out for the user in multiple guides that are clear and concise, with step-by-step easy-to-read instructions.
There was a problem with getting it to work properly with ISA Server 2004. We had to test a couple of different configurations for our network that were not made clear in documentation. Once configured, the program can be set to self update and will run smoothly with little need for further attention.
Webwasher is very well-documented at every step of the installation and configuration. Once the program is installed it opens a quick configuration pdf file which guides the user through the initial setup and configuration process. The documentation is very clear and straightforward. Once the initial setup is complete more guides can be found on the extranet.
Webwasher features many add-in scanners and filters that can be set up and customized for the needs of any network. These add-ins include a URL filter, three anti-virus engines, an anti-spam filter, a SSL scanner, content protection, content reporter, and an instant message filter. With automatic updates included with the license, it is always up-to-date and keeping the network protected with the latest databases.
This product performed very well under our testing. With the up-to-date URL blacklists in our test suite, we tried many types of sites and the product was able to block anything we tested. It has many detailed customizable logs and reports that help administrators gain access to any information that is needed regarding internet access across its protected network.