Security & Compliance
Barracuda | (BNGF80a-a)
Barracuda CloudGen Firewall F80 with Advanced Threat Protection
List price at $1,400
The Barracuda CloudGen Firewall F80 is designed for distributed
enterprises and offers advanced threat detection capabilities.
It serves as a next-generation firewall (NGFW) that optimizes
performance, security, and availability for today’s dispersed
enterprise SD-WANs.
Full Next-Generation Security
Firewalling, IPS, URL filtering, dual antivirus, and applicatio
n control are directly integrated into the data path.
Resource-intensive tasks like sandboxing
(essential for protecting against ransomware) seamlessly
occur in the cloud.Provides consistent security across branch
offices and headquarters.
Full SD-WAN Capability
Replaces costly MPLS connections with cost-efficient broadband
connections. Supports up to 24 broadband connections per VPN
tunnel for increased bandwidth at a lower cost.
Advanced Threat Protection (ATP)
Includes sandboxing for analyzing suspicious files
as well as built-in web security and IDS/IPS.
Cloud-Ready Application-Based
Provider Selection
Choose how you deploy: hardware, virtual, or cloud.
Manage configuration and lifecycle via a graphical user
interface without needing a command-line interface
"Thanks to our long term partner, Datalink Networks,
Microsoft Teams is able to hook into many of the education
software program (Aeries, Canvas, and Google
Classroom) that [BCCHS] currently uses. Teams will be
able to take attendence much more efficiently than Zoom,
provide additional security features, and offer built in
collaboration space to replace out in-person meetings."
Sarah Obloy, Instructional Technology CoordinatorSatisfied Customer!
SPECS
- Integrated Cloud-Based Service that analyzes traffic across all major threat vectors, including: Email Web browsing, Web applications, Remote users, Mobile devices, Network perimeter
- 4 Layered Defense Approach: Layer 1: Advanced Threat Signatures: Barracuda maintains a massive database of known threat signatures. Whenever a new threat is identified , its signature is immediately added to the database and shared across all security products and subscribers in real time. Layer 2: Behavioral and Heuristic Analysis: This layer analyzes questionable code and scripts in a controlled environment, looking for suspicious activities such as replication, file overwrites, and obfuscation attempts. Layer 3: Static Code Analysis: Examines parts of any executable file to find questionable code without executing it. Layer 4: CPU-Emulation Sandboxing: The final layer detonates suspect files using comprehensive CPU emulation. This approach detects threats designed to evade traditional virtualization-based sandboxes
- Interface Copper Ethernet NICs- 4x1 GbE USB 2.0- 4 Serial / console - 1x RJ45 VGA- Yes
- Performance Firewall throughput- 1.35 Gbps VPN throughput2- 240 Mbps IPS throughput 3- 500 Mbps NGFW throughput [Mbps] 4- 400 Mbps Concurrent sessions- 80,000 New sessions/s- 8,000
- Memory RAM 4 GB
- Dimensions Weight appliance 4.4 lbs Appliance size: width x depth x height 9.1 x 6 x 1.7 inch Form factor Desktop
- Mass Storage Type SSD Size 80 GB SSD MTBF N/A
- Mass Storage Type SSD Size 80 GB SSD MTBF N/A