Review: DynaComm i:mail

By

Another approach to email security is to actively manage the emails being sent and received by your organization by means of rules and policies. This methodology is possibly more suited to those companies that require detailed audit trails, or who have had a problem with the unauthorized release of proprietary information via email, and it is the methodology espoused by Futuresoft's DynaComm i:series of products.

The control of email is the responsibility of DynaComm i:mail, which is fully integrated with the other products in the suite - these include an internet traffic filter and a file content scanner. Built into a dedicated SMTP server, the product can be positioned in a number of locations, depending on the configuration of your network and the needs of your business. It can also be located within the internal network, in which case all email - inbound and outgoing - will be processed. For smaller businesses with low email use - and smaller budgets - it can be located with the email server itself.

Another approach to email security is to actively manage the emails being sent and received by your organization by means of rules and policies. This methodology is possibly more suited to those companies that require detailed audit trails, or who have had a problem with the unauthorized release of proprietary information via email, and it is the methodology espoused by Futuresoft's DynaComm i:series of products.

The control of email is the responsibility of DynaComm i:mail, which is fully integrated with the other products in the suite - these include an internet traffic filter and a file content scanner. Built into a dedicated SMTP server, the product can be positioned in a number of locations, depending on the configuration of your network and the needs of your business. It can also be located within the internal network, in which case all email - inbound and outgoing - will be processed. For smaller businesses with low email use - and smaller budgets - it can be located with the email server itself.


None of these installations is particularly troublesome, and Future­ soft's technical support is on hand to assist you. All configuration and administration is via a very usable management console.

DynaComm i:mail offers a number of extremely valuable security features such as the ability to block and filter emails by means of rules. There is no limit to the number of rules that can be applied.

Spam management is courtesy of a blacklisting function. As well as specifying your own banned IP addresses, it queries internet-based existing blacklists. Corresponding white lists can also be set up.

The content of emails can be monitored, using keywords to either ban or permit them. This function can be made even more effective by using the DynaComm i:scan product to look at attachments. DynaComm i:mail relies on third-party anti-virus software, however it comes pre-configured for all of the major products. All activities can be automated through a scheduling function, and there is extensive reporting and archiving available.

DynaComm i:mail is a versatile product, suitable for all businesses. Possibly the only drawback is that a lot of the functionality in other vendors' products requires the purchase of other members of the DynaComm i:series. 

For:

Excellent use of rules-based content filtering and delivery/receipt options.


Against:

Some functionality requires additional products to be installed.


Verdict:

A good product with some excellent features, slightly let down by the need to buy other related products for a complete solution.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Log In

  |  Forgot your password?