Barracuda Networks Spam and Virus Firewall 900 review
Barracuda’s Spam and Virus Firewall 900 claims an impressive anti-spam performance, but at a high price. In this exclusive review, Dave Mitchell finds out if its real world performance and messaging security features are worth digging deep for.
All further configuration is via the appliance's web interface, which opens with an informative status screen showing tables and graphs of hourly and daily inbound and outbound mail traffic. It's all colour-coded, so it's easy to see what mail is being allowed, blocked, tagged or quarantined.
Barracuda's web interface provides easy access to all security features and opens with a detailed graphical overview of inbound and outbound message activity.
Next, mail recipient domains and the addresses of the mail servers the appliance will be routing mail for are added. Incoming mail must also be routed to the appliance and this can be achieved with a firewall port-forwarding rule, or by changing the DNS MX record.
For inbound mail, Barracuda uses an impressive arsenal of spam detection tools which include Bayesian algorithms, real-time blacklists, reverse DNS lookups, IP reputation analysis, fingerprinting, content filtering, keyword blocking and intent analysis. These are used to derive a score for each message and determine whether suspect messages are blocked, quarantined or tagged.
The Energize Update subscription seems high, but this does also include free access to Barracuda's Cloud Protection Layer (CPL). This can reduce local traffic by applying pre-filters to incoming mail, so spam and mail-borne viruses are stopped before they even get to the local network.
You can tweak the spam detection scoring system but we found it worked very well on the default values.
Rather than use bogus or old samples of harvested spam to test detection rates, we opted to set up the appliance to scan incoming mail in a totally live environment. This is a far more realistic test of the appliance's detection techniques, since it has to handle new and emerging threats in real time.
We left the spam scores and actions at their default settings and configured our Outlook clients to move any tagged messages into a separate folder. The appliance's message log was monitored during the test and, on completion, was exported into a spreadsheet for further analysis.
In This Article
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now