SlideShare a Scribd company logo
Barracuda Networks
Your journey, secured
Version 5.1 | July 2018
Remote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
Enabling
Remote/Cloud
Manage
Hybrid
Networks
Prevent
Advanced
Threats
Things to secure In Current Scenario
Remote access Email
Data Web apps
Scaling Access :- New Remote workers (Client-to-Site & SSLVPN) can login securely into corporate or
Cloud network to access applications.
Use Cases in current Scenario
Remote users not accessing malicious content on Internet , not downloading malwares and are
productivity they should only access the content allowed as per corporate policy.
Spear Phishing and Social Engineering attacks based on current context , how to secure office 365
mailboxes
Office 365 back-up , Exchange ,SharePoint and OneDrive aren’t backed-up on its own, What if users
deletes the data or Exchange folder
Your Business is run by your Web Apps, How do we protect public facing Web applications: NGFW aren’t
capable to block Layer 7 Attacks
How to Secure business during Unusual circumstances
Secure Web Applications
Two things to consider
Scaling App Security
Use the public cloud to scale up quickly
Enable protection from:
• OWASP Top 10
• DDoS attacks
• Advanced Bots
Strategies for scaling and securing applications
What does it do?
A security device for a website or web application.
Additional layer of security for your infrastructure, NOT the same as
an application aware network firewall.
Most websites today are Web Applications – more features and more
security vulnerabilities.
Do you have a login? Take personal or financial info? Have specific
industry or government security requirements?
You need a WAF!
Web Application Firewall
Remote Workforces Secure by Barracuda
Network
Firewall
Layer 7
Network Firewall
IDS/IPS Web
Server
HTTP Request
(legitimate)
HTTP Request
(attack)
TCP Port 80
TCP Port 80
HTTP
TCP Port 80 – HTTP
No matching Signature
Network
Firewall
Layer 7
Network Firewall
IDS/IPS Web
Application
Firewall
Web
Server
HTTP Request
(legitimate)
HTTP Request
(attack)
TCP Port 80
TCP Port 80
HTTP
TCP Port 80 – HTTP
No matching Signature
Obfuscated XSS attack
Request blocked
Network
Firewall
Layer 7
Network Firewall
IDS/IPS Web
Application
Firewall
Web
Server
HTTP Request
(legitimate)
HTTP Request
(attack)
TCP Port 80
TCP Port 80
HTTP
TCP Port 80 – HTTP
No matching Signature
Obfuscated XSS attack
Request blocked
Credit Card Number Found
Request blocked
Everyone is a Target
Web exploitation kits available
• Easyto procure
• Noexpertiserequired
• Theyoperatelikecompanies
• Canattackthousandsofservers
inseconds
Web Applications Health Check-up
Barracuda Vulnerability Manager
• Scan web applications for vulnerabilities
• Provides detailed vulnerability scan reports
• Integrated with Barracuda WAF
• Free
Barracuda WAF-as-a-Service
Built on the same proven technology
Simple 5-step setup wizard adds protection in minutes
Intuitive component-based structure for fine-tuning policies
Fully featured REST API
Unmetered DDoS protection included
Automated vulnerability identification and remediation
Enterprise-proven application security delivered in minutes
More WAF deployment options
Public
Cloud SaaS
Physical
Appliance
Virtual
Appliance
Vx
Remote Workforces Secure by Barracuda
Secure Email
• We’re seeing a lot of COVID-19 related email attacks
What about Email and O365 Backup?
Conversation hijacking
Attacks are getting more sophisticated
Hi Mike
Domain Impersonation
Request changes in payment
method
Reply to existing conversation
Increased risks over the last decade
RiskandComplexity
2000 2010
Spam &
malware
Regulatory
compliance
Zero-day
attacks
Phishing
Brand
impersonation
This decade brought sophisticated threats
RiskandComplexity
2011 2019
Ransomware
Spear phishing/
social
engineering
Business email
compromise
Account
takeover
In the early days, it was simple
Mail Server Corporate
Inbox
EmployeesInternet
Legitimate Mail
Spam firewalls kept bad things out
Mail Server Corporate
Inbox
EmployeesInternet
Spam/malware
Spam
Firewall
Legitimate
Mail
Over time, we built a better gateway
Mail Server Corporate
Inbox
EmployeesInternet
Spam/malware
Spam
Firewall,
DLP,
Backup,
Archiving
Legitimate
Mail
Sandboxing stopped zero day threats
Mail Server Corporate
Inbox
EmployeesInternet
Spam/malware
Spam
Firewall,
DLP,
Backup,
Archiving,
Sandboxing
Legitimate
Mail
Zero Day
Gateways are blind to social engineering
Spam/malware
Spam
Firewall,
DLP,
Backup,
Archiving,
Sandboxing
Mail Server Corporate
Inbox
EmployeesInternet
Legitimate
Mail
Zero Day
Account takeover is the newest threat
Personal
Email
Spear
Phishing
Mail Server Corporate
Inbox
EmployeesInternet
ATOSpam
Firewall,
DLP,
Backup,
Archiving,
Sandboxing
Legitimate
Mail
Zero Day
Securing the gateway is still necessary,
but no longer sufficient
Multi-Layered Email Protection
O365 | G Suite | Exchange
Inbound/Outbound
Security
Encryption and DLP
for Secure Messaging
Archiving for
Compliance
Gateway Defense
Phishing Simulation and Training
Security
Awareness
Resiliency Cloud Backup Email Continuity
AI for Social
Engineering
Account Takeover
Defense
Brand Protection
DMARC Reporting
Inbox Defense
Barracuda Total Email Protection
Gateway Defense
Resilience
Barracuda
Essentials
Security Awareness
Barracuda
PhishLine
Inbox Defense
Barracuda
Sentinel
Office 365 Health checkup
Barracuda Email Threat Scanner (ETS) https://scan.barracudanetworks.com/signup
Moving forward
Scaling Access :- New Remote workers (Client-to-Site & SSLVPN) can login securely into corporate or
Cloud network to access applications.
https://www.barracuda.com/products/cloudgenfirewall/use_cases/remote-vpn-access
Remember the Use Cases in current Scenario
Remote users accessing malicious content on Internet , not downloading malwares , are productivity and
will only access the content allowed as per corporate policy.
https://www.barracuda.com/products/contentshield
Spear Phishing and Social Engineering Attacks based on current context , how to secure office 365
mailboxes https://www.barracuda.com/products/totalemailprotection
Office 365 back-up , Exchange ,SharePoint and OneDrive aren’t backed-up on its own, What if users
deletes the data or Exchange folder https://www.barracuda.com/products/cloudtocloudbackup
Your Business is run by your Web Apps, How do we protect public facing Web applications: NGFW aren’t
capable to block Layer 7 Attacks https://www.barracuda.com/waf-as-a-service
Detect Prevent Recover
Thank You and Stay Safe
Version 5.1 | July 2018

More Related Content

PPTX
Web Application Firewall (WAF) DAST/SAST combination
PDF
SOC-as-a-Service - comSpark 2019
PPTX
Radware - WAF (Web Application Firewall)
PDF
Microsoft Office 365 Advanced Threat Protection
PPTX
Owasp 2017 oveview
PDF
Benefits of Web Application Firewall
PPTX
Palo Alto Networks 28.5.2013
PDF
Palo Alto Networks CASB
Web Application Firewall (WAF) DAST/SAST combination
SOC-as-a-Service - comSpark 2019
Radware - WAF (Web Application Firewall)
Microsoft Office 365 Advanced Threat Protection
Owasp 2017 oveview
Benefits of Web Application Firewall
Palo Alto Networks 28.5.2013
Palo Alto Networks CASB

What's hot (18)

PPTX
Cyber Security 101
PDF
Thr30117 - Securely logging to Microsoft 365
PPT
Presentation Flow Part A – The Challenge
PPTX
PPTX
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
PPTX
Zero trust for everybody: 3 ways to get there fast
PPTX
PASTA: Risk-centric Threat Modeling
PPTX
F5's IP Intelligence Service
PDF
Palo Alto Networks y la tecnología de Next Generation Firewall
PPTX
Two for Attack: Web and Email Content Protection
PDF
Securely logging to Microsoft 365
PDF
Solution Brief
PDF
12 palo alto app-id concept
PDF
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
PDF
Azure Information Protection
PDF
Cisco umbrella overview
PDF
Web Application Security
PDF
Understanding ransomware
Cyber Security 101
Thr30117 - Securely logging to Microsoft 365
Presentation Flow Part A – The Challenge
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
Zero trust for everybody: 3 ways to get there fast
PASTA: Risk-centric Threat Modeling
F5's IP Intelligence Service
Palo Alto Networks y la tecnología de Next Generation Firewall
Two for Attack: Web and Email Content Protection
Securely logging to Microsoft 365
Solution Brief
12 palo alto app-id concept
El riesgo para tu negocio crece; cómo protegerte frente al Ransomware y otras...
Azure Information Protection
Cisco umbrella overview
Web Application Security
Understanding ransomware
Ad

Similar to Remote Workforces Secure by Barracuda (20)

PPT
Information Security
PPT
Presentation Flow Part A – The Challenge
PPTX
Check Point Solutions Portfolio- Detailed
PPTX
The Avoidable Risks of Remote Working
PDF
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
PDF
Security in the cloud protecting your cloud apps
PPTX
3rd Party Cyber Security: Manage your ecosystem!
PPT
Panda Cloud Services
PPTX
00. introduction to app sec v3
PPTX
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
PDF
Cisco Network Insider Series: Securing Your Branch for DIA
PPTX
FortiMail-Email-Secure-Gateway-May-2018_v1.pptx
PPT
Cisco Managed Security
PDF
A Different Approach to Securing Your Cloud Journey
PPT
GDI Product Presentation
PDF
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
PDF
Advanced threat security - Cyber Security For The Real World
PDF
Security & Compliance for Startups
PPTX
Presentatie McAfee: Optimale Endpoint Protection 26062015
PPT
Partner Zymbian & Fortinet webinar on Web2.0 security
Information Security
Presentation Flow Part A – The Challenge
Check Point Solutions Portfolio- Detailed
The Avoidable Risks of Remote Working
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Security in the cloud protecting your cloud apps
3rd Party Cyber Security: Manage your ecosystem!
Panda Cloud Services
00. introduction to app sec v3
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Cisco Network Insider Series: Securing Your Branch for DIA
FortiMail-Email-Secure-Gateway-May-2018_v1.pptx
Cisco Managed Security
A Different Approach to Securing Your Cloud Journey
GDI Product Presentation
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Advanced threat security - Cyber Security For The Real World
Security & Compliance for Startups
Presentatie McAfee: Optimale Endpoint Protection 26062015
Partner Zymbian & Fortinet webinar on Web2.0 security
Ad

More from Prime Infoserv (20)

PDF
Face Recognition under COVID19 crisis
PDF
Face Chk - Face Recognition
PDF
Data Protection and E-contracting
PDF
Trend micro research covid19 threat brief summary 27 mar
PPTX
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
PDF
IBM Qradar & resilient
PDF
DLP solution - InDefend in WFH Situations
PDF
Crush Cloud Complexity, Simplify Security - Shield X
PDF
Endpoint Detection & Response - FireEye
PPTX
Corporate Presentation - Netmagic
PDF
Teamwork with Microsoft Teams
PDF
Microsoft Teams-flyer
PDF
Windows Virtual Desktop Customer benefits
PDF
Email Security – Everyone is a Target
PDF
Secure Access – Anywhere by Prisma, PaloAlto
PDF
BCM Webinar presentation
PDF
FireEye Portfolio
PDF
PaloAlto Enterprise Security Solution
PDF
Phishing Simulation By Shield Alliance
PDF
FireEye Solutions
Face Recognition under COVID19 crisis
Face Chk - Face Recognition
Data Protection and E-contracting
Trend micro research covid19 threat brief summary 27 mar
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
IBM Qradar & resilient
DLP solution - InDefend in WFH Situations
Crush Cloud Complexity, Simplify Security - Shield X
Endpoint Detection & Response - FireEye
Corporate Presentation - Netmagic
Teamwork with Microsoft Teams
Microsoft Teams-flyer
Windows Virtual Desktop Customer benefits
Email Security – Everyone is a Target
Secure Access – Anywhere by Prisma, PaloAlto
BCM Webinar presentation
FireEye Portfolio
PaloAlto Enterprise Security Solution
Phishing Simulation By Shield Alliance
FireEye Solutions

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
A Presentation on Artificial Intelligence
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
Digital-Transformation-Roadmap-for-Companies.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
A Presentation on Artificial Intelligence
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Unlocking AI with Model Context Protocol (MCP)
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Remote Workforces Secure by Barracuda

  • 1. Barracuda Networks Your journey, secured Version 5.1 | July 2018
  • 6. Things to secure In Current Scenario Remote access Email Data Web apps
  • 7. Scaling Access :- New Remote workers (Client-to-Site & SSLVPN) can login securely into corporate or Cloud network to access applications. Use Cases in current Scenario Remote users not accessing malicious content on Internet , not downloading malwares and are productivity they should only access the content allowed as per corporate policy. Spear Phishing and Social Engineering attacks based on current context , how to secure office 365 mailboxes Office 365 back-up , Exchange ,SharePoint and OneDrive aren’t backed-up on its own, What if users deletes the data or Exchange folder Your Business is run by your Web Apps, How do we protect public facing Web applications: NGFW aren’t capable to block Layer 7 Attacks
  • 8. How to Secure business during Unusual circumstances
  • 10. Two things to consider Scaling App Security
  • 11. Use the public cloud to scale up quickly Enable protection from: • OWASP Top 10 • DDoS attacks • Advanced Bots Strategies for scaling and securing applications
  • 12. What does it do? A security device for a website or web application. Additional layer of security for your infrastructure, NOT the same as an application aware network firewall. Most websites today are Web Applications – more features and more security vulnerabilities. Do you have a login? Take personal or financial info? Have specific industry or government security requirements? You need a WAF! Web Application Firewall
  • 14. Network Firewall Layer 7 Network Firewall IDS/IPS Web Server HTTP Request (legitimate) HTTP Request (attack) TCP Port 80 TCP Port 80 HTTP TCP Port 80 – HTTP No matching Signature
  • 15. Network Firewall Layer 7 Network Firewall IDS/IPS Web Application Firewall Web Server HTTP Request (legitimate) HTTP Request (attack) TCP Port 80 TCP Port 80 HTTP TCP Port 80 – HTTP No matching Signature Obfuscated XSS attack Request blocked
  • 16. Network Firewall Layer 7 Network Firewall IDS/IPS Web Application Firewall Web Server HTTP Request (legitimate) HTTP Request (attack) TCP Port 80 TCP Port 80 HTTP TCP Port 80 – HTTP No matching Signature Obfuscated XSS attack Request blocked Credit Card Number Found Request blocked
  • 17. Everyone is a Target Web exploitation kits available • Easyto procure • Noexpertiserequired • Theyoperatelikecompanies • Canattackthousandsofservers inseconds
  • 18. Web Applications Health Check-up Barracuda Vulnerability Manager • Scan web applications for vulnerabilities • Provides detailed vulnerability scan reports • Integrated with Barracuda WAF • Free
  • 19. Barracuda WAF-as-a-Service Built on the same proven technology Simple 5-step setup wizard adds protection in minutes Intuitive component-based structure for fine-tuning policies Fully featured REST API Unmetered DDoS protection included Automated vulnerability identification and remediation Enterprise-proven application security delivered in minutes
  • 20. More WAF deployment options Public Cloud SaaS Physical Appliance Virtual Appliance Vx
  • 23. • We’re seeing a lot of COVID-19 related email attacks What about Email and O365 Backup?
  • 24. Conversation hijacking Attacks are getting more sophisticated Hi Mike Domain Impersonation Request changes in payment method Reply to existing conversation
  • 25. Increased risks over the last decade RiskandComplexity 2000 2010 Spam & malware Regulatory compliance Zero-day attacks Phishing Brand impersonation
  • 26. This decade brought sophisticated threats RiskandComplexity 2011 2019 Ransomware Spear phishing/ social engineering Business email compromise Account takeover
  • 27. In the early days, it was simple Mail Server Corporate Inbox EmployeesInternet Legitimate Mail
  • 28. Spam firewalls kept bad things out Mail Server Corporate Inbox EmployeesInternet Spam/malware Spam Firewall Legitimate Mail
  • 29. Over time, we built a better gateway Mail Server Corporate Inbox EmployeesInternet Spam/malware Spam Firewall, DLP, Backup, Archiving Legitimate Mail
  • 30. Sandboxing stopped zero day threats Mail Server Corporate Inbox EmployeesInternet Spam/malware Spam Firewall, DLP, Backup, Archiving, Sandboxing Legitimate Mail Zero Day
  • 31. Gateways are blind to social engineering Spam/malware Spam Firewall, DLP, Backup, Archiving, Sandboxing Mail Server Corporate Inbox EmployeesInternet Legitimate Mail Zero Day
  • 32. Account takeover is the newest threat Personal Email Spear Phishing Mail Server Corporate Inbox EmployeesInternet ATOSpam Firewall, DLP, Backup, Archiving, Sandboxing Legitimate Mail Zero Day
  • 33. Securing the gateway is still necessary, but no longer sufficient
  • 34. Multi-Layered Email Protection O365 | G Suite | Exchange Inbound/Outbound Security Encryption and DLP for Secure Messaging Archiving for Compliance Gateway Defense Phishing Simulation and Training Security Awareness Resiliency Cloud Backup Email Continuity AI for Social Engineering Account Takeover Defense Brand Protection DMARC Reporting Inbox Defense
  • 35. Barracuda Total Email Protection Gateway Defense Resilience Barracuda Essentials Security Awareness Barracuda PhishLine Inbox Defense Barracuda Sentinel
  • 36. Office 365 Health checkup Barracuda Email Threat Scanner (ETS) https://scan.barracudanetworks.com/signup
  • 38. Scaling Access :- New Remote workers (Client-to-Site & SSLVPN) can login securely into corporate or Cloud network to access applications. https://www.barracuda.com/products/cloudgenfirewall/use_cases/remote-vpn-access Remember the Use Cases in current Scenario Remote users accessing malicious content on Internet , not downloading malwares , are productivity and will only access the content allowed as per corporate policy. https://www.barracuda.com/products/contentshield Spear Phishing and Social Engineering Attacks based on current context , how to secure office 365 mailboxes https://www.barracuda.com/products/totalemailprotection Office 365 back-up , Exchange ,SharePoint and OneDrive aren’t backed-up on its own, What if users deletes the data or Exchange folder https://www.barracuda.com/products/cloudtocloudbackup Your Business is run by your Web Apps, How do we protect public facing Web applications: NGFW aren’t capable to block Layer 7 Attacks https://www.barracuda.com/waf-as-a-service
  • 40. Thank You and Stay Safe Version 5.1 | July 2018