Improve company productivity with a Business Account.Sign Up

x
?
Solved

SonicWall CSM 2200 vs Barracuda 310 - Which one should I go with?

Posted on 2008-10-03
4
Medium Priority
?
959 Views
Last Modified: 2008-10-08
I am trying to decide which one of these to go with and can not find any compartive reviews online.  They are both internet security devices and appear to do similiar things.  Anyone have experience with both?  

Basically looking for someone that can work with AD to allow some groups access and others not.  I want it to block IM, file types, torrents, radio, spam, virus, etc.  Yes I know neither wil perfecrtly do it.

Anyway, some pointers in the right direction would be helpfull. They both seem nice. Thanks!
0
Comment
Question by:ArdentJW
  • 3
4 Comments
 
LVL 5

Expert Comment

by:devangshroff
ID: 22640014
Go For Cyberoam  This is best suited for your requiremts, belive me
0
 
LVL 1

Author Comment

by:ArdentJW
ID: 22654362
No, that wont do.  And it isn't one of my available options.

Ive been given SonicWall, Barracuda, and Cisco ASA Security Plus as options.  Still do not know what to choose.
0
 
LVL 5

Expert Comment

by:devangshroff
ID: 22666885
Go for Sonicwall, with enhanced OS with bundle software , but i am not sure that it will work with AD , it will eork with LDAP, RADIUS.
0
 
LVL 5

Accepted Solution

by:
devangshroff earned 750 total points
ID: 22668386
Sonicwall witt work with AD. , u can go with sonicwall
0

Featured Post

Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Data security in the cloud is very much like a security in an on-premises data center - only without costs for maintaining facilities and computer hardware.
A discussion about Penetration Testing and the Tools used to help achieve this important task.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

579 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question