Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/15/2017
12:05 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Barracuda Announces New Cloud Generation Firewall Capabilities

Campbell, Calif. (Nov 15, 2017) – Barracuda Networks, Inc. (NYSE: CUDA), a leading provider of cloud-enabled security and data protection solutions, today announced expanded public cloud functionality for the Barracuda Web Application Firewall and Barracuda NextGen Firewall. The updated Cloud Generation Firewalls allow for utility-based consumption and automated security controls for DevSecOps workflows, giving customers an easy migration path to public cloud. Barracuda will demonstrate its award-winning Cloud Generation Firewalls in booth number 1533 during AWS re:Invent, Nov. 27- Dec. 1, in Las Vegas.
 
Earlier this year, Barracuda sponsored a survey revealing that more than 40 percent of respondents’ organizations are currently running a portion of their infrastructure in the public cloud. According to the survey, respondents cited easy integration with legacy technology (61%), strong protection of applications (54%), and strong protection of access to applications in the public cloud (48%) as important drivers for their cloud adoption. These organizations face an increasingly sophisticated threat landscape, as 50 percent reported being hit with some sort of cyberattack. Barracuda Cloud Generation Firewalls give customers flexibility to cost-effectively deploy security at critical points—in the cloud, in hybrid or multi-cloud environments, and throughout the development lifecycle. New capabilities include:
 

  • Usage-based billing using the AWS Marketplace Metering Service Billing – Barracuda NextGen Firewall is now available as a metered billing service in the AWS Marketplace, joining the Barracuda Web Application Firewall, which became available with the same service last year. AWS Marketplace Metering Service Billing ensures that all evaluation, pricing, and provisioning is done entirely within the AWS Marketplace, removing any licensing friction and offering a pricing structure based on actual traffic secured. Customers are able to build CI/CD pipelines that include their ISV partner solutions, and charges are based on the total bandwidth consumed across deployed firewalls and standard Amazon Elastic Compute Cloud (EC2) charges per instance.
  • DevSecOps with Puppet – The REST API framework can be used to automate the configuration of the Barracuda Web Application Firewall, which now includes Puppet integration within AWS, making it easier for customers to integrate security controls into their cloud native applications on AWS. This integration enables cloud security and operations teams to codify their firewall policies as code so they can be tested and secured as part of the overall application delivery process. Puppet maintains the desired state of the Barracuda Web Application Firewall, automatically remediates unauthorized changes, and enables security teams to quickly identify and remediate known vulnerabilities. This benefits the business because it helps increase application velocity, security, and reliability.

 
“Perimeter-based firewalls create tightly-coupled environments that scale vertically, which makes perfect sense on-premises but is entirely the wrong model for the public cloud. This is really about using the right tool for the job,” said Tim Jefferson, vice president, public cloud, Barracuda. “Customers should look to automate the orchestration, deployment, and configuration of security architectures that are loosely coupled and scale elastically. In today’s hybrid environments, customers need consistent security across on-premises and cloud-based environments—Barracuda Cloud Generation Firewalls help address this requirement.”
 
Barracuda Cloud Generation Firewalls are engineered to provide network and application security for cloud-only and hybrid-cloud environments. These solutions provide cloud-specific features including metered billing, API support for DevSecOps teams, fully meshed connectivity, and scalability to help organizations align security with their cloud deployments. Organizations looking for scalability and automation benefits of the public cloud should demand Cloud Generation Firewall functionality, including:
 

  • Well-architected for the public cloud – Integrate directly with public cloud fabric, provide API integrations for DevOps tools and automation workflows, and centrally manage across hybrid environments. This gives customers all the benefits of the cloud without compromising their security posture.
  • Support for cloud-specific use cases – Support unique requirements of the cloud including horizontal scalability, distributed policy sets, fully meshed connectivity, and north-south traffic management. Meeting these requirements allows customers to leverage the benefits of cloud automation around deployment, autoscaling, high-availability, networking, and monitoring.
  • Match Customer’s Cloud Consumption Models – Licensing that allows customers to deploy security in alignment with their current public cloud consumption model.

“Real-time, proactive security throughout the development process is critical for tighter application security in today’s threat environment,” Samm DiStasio, vice president, business development, Puppet. “Barracuda is our first security partner in public cloud to help us bridge the security gap in DevOps. Our integration with Barracuda Web Application Firewall helps speed up application delivery by automating management of critical security policies.”
 
“We are using Barracuda firewalls provisioned through the AWS Marketplace to effectively guard our applications against web-based attacks and application-layer attacks,” said Max Longin, Founding Partner, Club Automation. “The Barracuda solution plugs into our AWS environment, and is doing its job of minimizing the attack surface area and helping our customers keep club member cardholder data protected.”

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20925
PUBLISHED: 2020-11-24
An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions...
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.