Fortinet FortiMail-400C

Powered by SC Magazine
 

Many administrators are willing to trade ease of use for power and flexibility. The FortiMail-400C, while complicated to set up, offers an incredible feature set at an affordable price.

 

Installation of the device was easy enough as it ships with mounting hardware for both two-post and four-post rack configurations. It also included Ethernet and console cables, which was pleasant to see. Configuration was tricky, though. There was very little context-sensitive help on the device itself, so we had to review both the installation guide and the administrator's guide very carefully in order to make sense of the myriad options presented. Much like a firewall, policy order is vital. We found ourselves briefly frustrated while trying to set up an encryption rule before we realized that the test message also matched the criteria for a different rule we set up higher in the list. Once we began thinking of the device as a firewall for email, everything fell into place. There were some glitches. We were unable to get certain features to work without a call to support. Once we did have it working, though, the device functioned beautifully.

The device supports S/MIME, transport layer security (TLS) and identity-based encryption (IBE). Support is present for both self-signed certificates and existing public key infrastructure (PKI) implementations. The IBE implementation was a pleasure to see, especially considering that it is hosted entirely on the device itself - there is no need for users to authenticate to a third-party server, unlike many other venders' offerings. It provides all of its email routing and manipulation features through a series of policies and profiles, which can be linked together in multiple ways to provide a desired function. For example, policies can be set that will encrypt an outgoing message if it comes from a user in a particular Active Directory group, addressed to a specific external email address, contains a particular word or phrase or any combination of the three. Content filtering is achieved in the same way - by combining a series of conditions, actions and dictionaries into a policy, email can be sorted, redirected, modified and/or anti-virus scanned. 

Documentation comes on a CD and Fortinet also hosts a knowledge base and user forums. The installation and administrators guides are detailed, providing screen shots and step-by step instructions for configuring each module. Due to the complexity of the way each module interacts with the others, however, we would have liked to see some sample scenarios documented. As it was, we had to rely on the Fortinet support team to connect some of the dots for us. 

Fortinet offers the 400C as a standalone device or with eight-hours-a-day/five-days-a-week or 24/7 hour support. It also offers a remote installation service for $750 that users may want to consider as the complexity of the device can be daunting.

The offering retails for $6,995 as a standalone unit with no support, $9,145 with one year of eight-hours-a-day/five-days-a-week hardware/software support, or $10,177 with one year of 24/7 hardware/software support. Fortinet uses a flat rate pricing scheme for its FortiMail devices, there is no per user charge, and no component- or module-based pricing. All FortiMail devices come with all feature sets.

Copyright © SC Magazine, US edition


Fortinet FortiMail-400C
 
Overall Rating
Verdict:
If you have time to comb through documentation, or have a small amount of money in your budget for the remote installation service, the FortiMail 400C will serve your enterprise extremely well.
Product Info
Supplier:
 
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 337

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 140

Vote