Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Are Barracuda appliances worth the money?

Posted on 2014-12-27
3
Medium Priority
?
146 Views
Last Modified: 2015-01-01
This only came up, because I have had some recent issues with ESET. They have not been so quick to respond. In fact, I run ESET on my clients, and it does real time scanning, scheduled scans and detects anything that is malware if it occurs. I had MBAM Pro running on the computer but with no scheduled scans or real time scanning. I didn't want it to interfere with ESET.

I recently had what I think was a Trojan trying to start a new cold war with Putin as it was dialing out to Russian hackers. MBAM stopped it but ESET did not. Now, of course, maybe MBAM is a microsecond quicker. But, it is not typically that type of A/V. I usually use it to look for malware when I am suspicious.

Anyway, I am possibly looking for a new solution and one that would be easily compatible with the server.

I have always shied away from Barracuda, because it seemed to be focused on a higher end business as it seemed somewhat pricey. I thought it started more in the backup and email archiving business, two things I pretty much have covered, but I would be willing to look at that. It now seems to be into malware detection as well. Actually, it seems to be into many things.

Does anyone think that Barracuda is a good product. It still doesn't seem as though it would supply client malware protection. Of course, MSE, could provide that.

Thank you.
0
Comment
Question by:Bert2005
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 26

Accepted Solution

by:
Fred Marshall earned 2000 total points
ID: 40519959
I can't answer your question about Barracuda.
What I can say is that *no* tool is 100% capable.
It's good to look around for what you believe will be the best for your needs nonetheless.
0
 
LVL 1

Author Comment

by:Bert2005
ID: 40519972
Agreed. I just find Barracuda so different than the other solutions, being an appliance, I was just looking for insight from those who have used it.

There are also those who recommend A/V software on a domain computer such as SBS vs those who do not.

Thanks for your input.
0
 
LVL 26

Expert Comment

by:Fred Marshall
ID: 40527299
Thanks for the points.
Well, I used to use BlueCoat firewall software that ran on a PC.  Then they switched to being an appliance provider.
At that stage we switched to Juniper Networks and are now on our second generation of Juniper Networks firewall.  
And, I have no experience with Barracuda but it looks similar.

There are arguments that an "edge" device is all that's needed.  I don't agree.  I believe that defense in depth is more appropriate.  So, you put AV, etc. on all the computers in addition.  In fact, the latter is more common than using an edge device.

One problem we ran into was that edge devices can clog up the internet connections if you ask too much of them.  You have to have a plenty capable edge device (i.e. processor and memory) to accommodate high traffic AND AV scanning.  Finding out just how much traffic a device can handle can be tough.  Finding out that a clogged connection is due to your edge device can be quite difficult.  So, overkill is a good idea.
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

VM backup deduplication is a method of reducing the amount of storage space needed to save VM backups. In most organizations, VMs contain many duplicate copies of data, such as VMs deployed from the same template, VMs with the same OS, or VMs that h…
Your data is at risk. Probably more today that at any other time in history. There are simply more people with more access to the Web with bad intentions.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question