Engineering at Barracuda
On the edge of tech trends and culture at Barracuda.
We build our solutions with APIs first, so customers can configure, monitor and operate our products programmatically in addition to the User Interface;
By doing “API first” we can easily develop new user interfaces according to customer needs;
This approach promotes stronger integration between our own products and with pre-existing ecosystems customers use.
Microservices not Monolithic
With microservices, we scale individual components based on demand;
We reuse these microservices between product offerings;
Engineering teams move more quickly including using CI/CD pipelines;
“Friends don’t let friends build data centers”- Charles Phillips, Infor CEO
We build our solutions “cloud-native.”
Our solutions are built on public cloud infrastructure, utilizing native services and capabilities from Azure, AWS, and GCP;
For our SaaS offerings, we package our software to fit into runtime units which are portable and scalable; From Kubernetes-orchestrated containers to serverless functions
With public clouds, we scale our solutions much faster and cover the globe much better
“Be like water.”- Bruce Lee
Cloud Security is about instrumenting native security controls, continuously and programmatically.
Our Cloud Security Posture Management works with native security controls and functions for each public cloud provider, morphing to suit each environment.
“Empty your mind, be formless. Shapeless, like water. If you put water in a cup, it becomes the cup. You put water into a bottle and it becomes the bottle. You put it in a teapot it becomes the teapot. Now, water can flow or it can crash. Be water, my friend…”
- Bruce Lee
In a world with dispersed networks and complex number of devices
We see millions of malicious attacks everyday which are critical for training our algorithms;
Cybersecurity attacks are evolving rapidly. We use AI in our solutions for speed and accuracy;
We operationalize Machine Learning in our microservices and integrated with all of our products;
As a portfolio cybersecurity company, we embrace synergy between products so we can protect our customers in every phase of the cybersecurity kill chain
Trust-based security architecture
Our endpoint security solutions support the new “work-from-anywhere” trend.
Identify, quantify, and qualify security postures for access control
Use contextual information as a key element security policy design
We build secured connectivity solutions to protect our customers in their transformation to public cloud for application delivery.
In a “cloud-native” way, we interconnect cloud infrastructures, branch offices to endpoint devices;
We build devices which can securely connect IoT devices from manufacturing floor to retail stores