Solved

How does barracuda work?

Posted on 2014-03-04
2
543 Views
Last Modified: 2014-03-17
How does Barracuda work to protect a network?  Is it easy to configure for the average person to block porn, malware, etc...  

Any articles or videos on it?
0
Comment
Question by:al4629740
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 16

Assisted Solution

by:Shaik M. Sajid
Shaik M. Sajid earned 250 total points
ID: 39905542
Barracuda works same way as follows...

now a days firewalls becomes Unified devices... which will having name specific content filtering...

for example xxx, porn... etc... which will find and blocks.

but actually a utm provider  (for example  Sonicwall/Cyberoam/Barracuda) will monitoring the internet traffic and collecting signatures over the internet  and when they found any signature which looks like virus or spam they immediately updates to its database..

this database will replicates to your Devise (UTM/Antispam) and updates Daily wise...

in the appliance the data packets received from out side it'll check these signatures and allows the data...

if any bad signature found it'll block or junk as per the policy..


thanks and regards
0
 
LVL 20

Accepted Solution

by:
carlmd earned 250 total points
ID: 39906087
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question