theDocumentId => 1139990 New Barracuda Web Filter Models Feature 10 GbE ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/24/2013
02:47 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New Barracuda Web Filter Models Feature 10 GbE Interfaces

New models feature increased performance and capacity to offer comprehensive Web content filtering and malware protection at multigigabit speeds

Campbell, Calif. (June 19, 2013) – Barracuda Networks, Inc., a leading provider of security and storage solutions, today announced new high-performance 10 GbE interfaces for the Barracuda Web Filter 1010 and 1011 models. The new models feature increased performance and capacity to offer comprehensive web content filtering and malware protection at multi-gigabit speeds on even the most demanding networks.

A recent IEEE report projected 32% annual growth in global IP traffic through 2015, largely driven by the increases of Internet users, access devices, and services such as video on demand and social media.1 In response to these trends, the Federal Communications Commission (FCC) recommends a minimum connection speed of 1 Gbps for community anchor institutions such as hospitals and libraries2, while the State Educational Technology Directors Association (SETDA) now recommends at least 1 Gbps per 1,000 students/staff to keep up with growing traffic.3

"The Barracuda Web Filter 1010 has been deployed in several large-scale networks since its introduction in 2009," said Steve Pao, GM of the Security Business at Barracuda Networks. "These hardware enhancements and the introduction of fiber interfaces on the 1011 will enable high-end network customers to adopt the Barracuda Web Filter as a key element of their IT security strategy."

Specifications

The Barracuda Web Filter 1010 / 1011 is an integrated appliance that provides content filtering, application blocking, malware protection, and built-in reporting. A single device can support 100,000 simultaneous TCP Connections at 2 Gbps throughput and provides four network interfaces that can be used simultaneously in a WCCP deployment or as two LAN/WAN pairs in an inline deployment.

Multiple Barracuda Web Filter 1010 / 1011 devices can be clustered for both scalability and redundancy. Barracuda Web Filter models of different sizes can be centrally managed through the Barracuda Control Center, enabling enforcement of Internet policy across an entire distributed organization.

The Barracuda Web Filter 410 and above include the Barracuda Web Security Agent (WSA), a downloadable client that can be installed on remote, off-network laptops or desktops to transparently filter web traffic for remote users. They also include the Barracuda Safe Browser (BSB), a secure browser application that transparently filters web traffic on off-network iPhones and iPads.

Pricing and Availability

The Barracuda Web Filter 1010 featuring 10 GbE copper interfaces and the Barracuda Web Filter 1011 featuring 10 GbE SFP+ fiber interfaces are immediately available worldwide.

The Barracuda Web Filter 1010 and 1011 are priced at US$79,999 for the appliance and US$26,399 per year for Energize Updates subscriptions in North America. Energize Updates subscriptions include ongoing content filtering, application, antispyware, antivirus, and security definitions. International pricing and availability varies by region.

Special pricing is currently available for educational institutions. For more information, please visit http://www.barracuda.com/edu.

Resources

Videos: The Barracuda YouTube channel features customers that leverage Barracuda's award-winning solutions to protect their networks:

Dysart Unified School District discusses how it is using the Barracuda Web Filter to protect its growing network – http://bit.ly/DysartSchool

Southfield Public Schools talks about how it is protecting its students with the Barracuda Web Filter – http://bit.ly/SouthfieldSchool

About the Barracuda Web Filter

The Barracuda Web Filter is a web content filtering solution that enables the connected business to benefit from new technologies and online tools, without being exposed to lost productivity, wasted bandwidth, and data loss. As new requirements emerge, such as social-networking control, the Barracuda Web Filter is automatically updated with new capabilities to meet those requirements. It enables highly granular, real-time visibility into online activity, broken down by individual users and applications, letting administrators create and enforce effective content and access policies. Included free are unlimited agents and software licenses to enforce content and access policies on mobile devices being used outside the corporate network. To learn more, visit: http://www.barracuda.com/webfilter.

About Barracuda Networks, Inc.

Protecting users, applications, and data for more than 150,000 organizations worldwide, Barracuda Networks has developed a global reputation as the go-to leader for powerful, easy-to-use, affordable IT solutions. The company's proven customer-centric business model focuses on delivering high-value, subscription-based IT solutions for security and storage. For additional information, please visit http://www.barracuda.com or follow us on Twitter: @barracuda.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32686
PUBLISHED: 2021-07-23
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and ...
CVE-2021-32783
PUBLISHED: 2021-07-23
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy rem...
CVE-2021-3169
PUBLISHED: 2021-07-23
An issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.
CVE-2020-20741
PUBLISHED: 2021-07-23
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if t...
CVE-2021-25808
PUBLISHED: 2021-07-23
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.