o Iron Port having its own hardware & OS. It is difficult to understand
new architecture. Maintenance is difficult & backup, recovery can be
done by their experts only.
o To view the logs & mail flow another system required with Windows
2000/2003 server which costs more & to view only logs & mail flow one
more hardware required.
o Iron port email security appliance connected with iron port mail flow
central via ssh, scp means reports will be available after
synchronization if not done then current reports will not be available
o Control to administrator only, end user cannot define what he wants
to receive.
o It depends on third party online database(i.e. dsbl, sbl, cbl.....)
if they goes down then spam may come in to the network.
o Solution depends on previous experience of the technology spammers
use. If they adopt the new technology then Iron port will not stop that
till new patch plugged for that techonology.
o It adopts scoring methodology it means every mail first received then
it will check header & content of mail then will decide if mail spam or
not. Receiving every mail is bandwidth consuming & content filtering
slower down the mail receiving.
o In iron port Queue management is there. It means if email
verification server is down then it will keep accepting the mails
without checking if user exists or not after server up during the
delivery of mails it will check for user then bounce the mail means
doubles the traffic one for receiving the mail second bounce back the
mail.