Barracuda for MSPs Features
Administration (17)
Usage Information
Offers visibility into employee device activity
Integrations
Allows for integration of support, chat, diagnostic or other IT management tools
Diagnostics
Provides administrators with performance information to
Session Recording
Provides the ability to record remote access and support sessions
Session Transfer
Allows remote access and support sessions to be transferred between users
Unattended Access
Allows administrators access to devices, regardless of end-user's presence
File Sharing
Allows remote users to share files with other remote users
Policy Management
Provides network security features to customize network access rules, workflows, and compliance requirements.
Logging and Reporting
Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis.
Application Gateway
Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers.
Concurrent Sessions
Determines the number of connections a firewall is able to track and facilitate securely.
Screen Sharing
Provides screen sharing options to allow access to view or control real-time activities.
File Sharing
Provides easy and seamless file transfer and sharing capabilities to increase productivity and collaboration while working remotely.
Session Recording
Provides the ability to record remote access and support sessions.
Unattended Remote Access
Provides remote access to computers at any time, without an end-user present.
Multi - Session Handling
Provides multiple technician support simultaneously.
Multi-Monitor Support
Allows users to switch between multiple end users’ monitors with a single click.
Platform (4)
Cross-Platform Access
Allows remote usage and access across a range of operating systems and device types
Mobile Device Access
Allows remote desktop administrators access to connected mobile devices
Applications Management
Centrally manages, configures, and oversees applications on employee devices
Remote Device Control
Allows administators to take control of a connected endpoint device
Security (5)
Remote Wipe
Enable the remote locking down and encryption of employee devices
Device Management
Unifies endpoint management of employee devices
Device Enrollment
Registers employee-owned or company-distributed devices for IT access
Data Encryption
Implements encryption standards to secure data both in transit and at rest.
Compliance
Provides compliance to multiple industry standards like HIPAA and GDPR.
Compatibility (4)
File Server Backup
The ability to store information from filesystems.
Database Server Backup
The ability to backup data from relational and NoSQL databases.
Virtual Machines
Support for secure virtualized tape or disk storage.
Repository Models
Support for various backup storage and operational processes. Examples include system imaging, incremental backup, or differential backup.
Management (9)
Continuous Backup
The abillity to automate backups or have backup storage updated continuously.
Disaster Recovery
Delegate backup settings to facilitate specific recovery in the result of a disaster.
Storage Capacity
The ability to store large amounts of data or scale capacity to fit storage needs.
Remote Backup
Provides remote access dashboards designed to manage and store data from familiar applications.
Activity Monitoring
Actively monitor status of work stations either on-premise or remote.
Infrastructure Compatibility
Be compatible with a variety of cloud and/or virtual infrastructure.
Solution Integration
Integrate with other management, resilience, and backup solutions.
Real-Time Analytics
Track data and system backups, replication, and failover events.
RTO and RPO Management
Specify recovery time objectives (RTOs) and recovery point objectives (RPOs), and track how those objectives are met.
Compliance (3)
Security Standards
The ability to set standards for asset and risk management.
Cloud Data Protection
Provides high quality and wide scope of in-cloud and offline data security capabilities.
Data Deduplication
Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.
Inventory Management - Remote Monitoring & Management (RMM) (3)
Device Management
Unifies endpoint management of employee devices
Asset Management
Maintains detailed records of network assets and their activity; detects new assets accessing the network
ITIL Policy Compliance
Supports implementation and adherence to ITIL processes and regulations
Monitoring and Management (4)
Remote Monitoring
Monitor IT asset activity remotely from an administrator terminal.
Application Deployment
Releases applications for access on desktop or mobile devices.
Patch Management
Automates the updating of security measures on enterprise devices.
Asset Tracking
Tracks IT assets including financial and lifecycle data.
IT Operations & Workflow - Remote Monitoring & Management (RMM) (1)
Workflow Management
Enables creation and optimization of workflows for IT support and service delivery
Service Management (3)
Remote Access
Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.
Service Management (Issue Prioritization)
Analyzes operational data to proactively identify and prioritize IT issues.
Ticketing
Provides tools for creating and managing support tickets across departments
Monitoring (4)
Load Balancing
Monitors traffic and distribute resources and scales infrastructure workloads to match traffic.
Continuous Analysis
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Intrusion Prevention
Enforces security paramaters to prevent unauthorized access.
Intrusion Detection
Detects unauthorized access and use of privileged systems.
Functionality (4)
Virtual Private Network (VPN)
Provides a virtualized network for client network to mask identity, location, and other sensitive information.
Antivirus
Provides malware protection capabilities in addition to traditional firewall barrier technology.
URL Filtering
Provides access control tools to categorize and block traffic and match traffic to firewall policies.
Availability
Deploys firewall(s) configured in sync to prevent network failure and provide business continuity.
Solution Provision (5)
Service Provision
Offer disaster recovery capabilities as a third-party provider.
Pay by Usage
Services are offered under a pay-as-you-go or utilization-based purchase model.
System Failover
Provide as-before failover capabilities for cloud environments.
Off-Site Data Storage
Store all secured data off-site of the data source.
Data Replication
Replicate data and infrastructure in real time on a separate system for immediate, seamless failover.
Maintenance (2)
Remote Reboot
Remotely wake, restart, and install applications on sleeping devices.
Remote Printing
Print files from remote computer onto the local printer, without having to transfer the file between computers.
Communication (4)
Text Chat
Connects instantly via group chats, web-based chats, offline messaging, persistent chat groups, and customer-initiated chat.
VoIP
Provides voice over IP calling solutions.
Video Conference Call
Provides pre-session or in-session video call options to resolve issues.
Screen Annotations
Allows to draw, highlight, encircle, and box certain areas on the screen of the remote computer to enhance support and communicate better.
Device Support (3)
Mobile Device Access
Allows mobile device access to provide support or connect to your computer from anywhere.
Multi-Platform Support
Provides support across iOS, Mac, Android, PC and other devices.
Cross-Platform
Allows cross-platform device support, supporting Windows, Mac, Linux, iOS, Android, and Chromebook devices.
Performance (1)
Reporting
Provides robust reporting capbilities like session details, technician performance information, and end users’ survey summaries.
Generative AI (1)
AI Text Summarization
Condenses long documents or text into a brief summary.
Artificial Intelligence - Firewall (1)
AI Firewall
Utilizes AI to monitor network traffic, identify anomalies, and block attacks.
Agentic AI - Firewall Software (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience
Agentic AI - Disaster Recovery as a Service (DRaaS) (5)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Server Backup (6)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Remote Monitoring & Management (RMM) (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives




