Solved

How does barracuda work?

Posted on 2014-03-04
2
520 Views
Last Modified: 2014-03-17
How does Barracuda work to protect a network?  Is it easy to configure for the average person to block porn, malware, etc...  

Any articles or videos on it?
0
Comment
Question by:al4629740
2 Comments
 
LVL 16

Assisted Solution

by:Shaik M. Sajid
Shaik M. Sajid earned 250 total points
ID: 39905542
Barracuda works same way as follows...

now a days firewalls becomes Unified devices... which will having name specific content filtering...

for example xxx, porn... etc... which will find and blocks.

but actually a utm provider  (for example  Sonicwall/Cyberoam/Barracuda) will monitoring the internet traffic and collecting signatures over the internet  and when they found any signature which looks like virus or spam they immediately updates to its database..

this database will replicates to your Devise (UTM/Antispam) and updates Daily wise...

in the appliance the data packets received from out side it'll check these signatures and allows the data...

if any bad signature found it'll block or junk as per the policy..


thanks and regards
0
 
LVL 20

Accepted Solution

by:
carlmd earned 250 total points
ID: 39906087
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco VPN client v5 migration to Anyconnect VPN? 8 37
CPU at 100% usage, why? 27 133
Quieter Keyboard 6 42
Guidelines for building a gaming PC 17 43
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question