Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/24/2012
02:37 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Barracuda Networks Offers Free Email Security for Six Months To Google Postini Customers

Transition plan is offered to customers who are looking to replace Google Postini

Barracuda Networks Inc., the leading provider of security, networking and data protection solutions, today announced it is offering six months of free email security via the Barracuda Email Security Service and Barracuda Spam & Virus Firewall. This featured transition plan is offered to customers who are looking to replace Google Postini, as Google is forcing customers to transfer their accounts to Google Apps.

Barracuda Networks is making this bold transition available on the heels of Google's announcement that the company is retiring the Postini service by next year. According to an article on CNET (1), Postini customers who choose not to transfer their accounts to Google Apps will see their Postini service terminated, leaving their inboxes open to spam, phishing attacks and other email-security threats.

"While Google is trying to push their customers to Google Apps, we recognize that many organizations want a choice," said Stephen Pao, vice president of product management for Barracuda Networks. "Between our pure cloud solutions, our hardware appliance and our virtual appliance deployment options, we've found we can fit into just about any customer environment fulfilling a broad spectrum of privacy requirements. We welcome Postini customers to try Barracuda Networks' email security solutions risk free for six months, particularly as they are going through this forced transition period."

Current Postini customers have the option to stay with Google by transferring their accounts to Google Apps for email security; however, they will be required to adopt a privacy policy and will reportedly lose features like email encryption (2). Postini customers who need to renew in November are being notified of the switch this month, requiring them to adopt the new changes and giving them little time to make a decision.

Why make the switch?

In addition to the cost benefits of receiving six months of email security free of charge, Barracuda Networks makes the transition from Google Postini an easy one with multiple benefits:

* Controlled privacy - Customers concerned with privacy issues related to Google Apps can be assured that Barracuda Networks does not collect any information for the purpose of serving advertisements.

* Attractive pricing - Barracuda Networks is known for its cost-effective solutions, with all-inclusive pricing on email security, web security, application security, next generation firewalls, storage, backup and more. Both the Barracuda Spam & Virus Firewall and Barracuda Email Security Service provide more competitive pricing than Google Postini.

* Encryption and other advanced features - Barracuda Networks' email security solutions include advanced features such as encryption and Data Loss Prevention (DLP) for no additional charge.

Google Postini customers interested in taking advantage of the Barracuda Networks offer for free email security for six months can sign up at: https://www.barracudanetworks.com/postini

Connect with Barracuda Networks Online:

* Barracuda Networks YouTube Channel: http://www.youtube.com/barracuda

* Barracuda Networks on Facebook: http://www.facebook.com/barracudanetworks

* Barracuda Networks on Twitter: http://www.twitter.com/barracuda

* Barracuda Labs on Twitter: http://www.twitter.com/barracudalabs

Footnotes:

1. CNET: Google to Retire Postini, Migrate Features to Google Apps: http://news.cnet.com/8301-1023_3-57497844-93/google-to-retire-postini-migrate-features-to-google-apps/

2. Support.google.com: http://support.google.com/postini/bin/answer.py?hl=en&answer=2717451&topic=2717405&ctx=topic

About the Barracuda Spam & Virus Firewall

The Barracuda Spam & Virus Firewall provides a powerful, easy-to-use and affordable solution for complete protection of an organization's email infrastructure. It eliminates spam and virus intrusions while safeguarding an organization's reputation through content inspection based on policy for both inbound and outbound email. Outbound filtering also prevents confidential or sensitive information from being purposely or inadvertently leaked outside the organization.

About the Barracuda Email Security Service

The Barracuda Email Security Service is a comprehensive and affordable cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses, worms, phishing and denial of service attacks. Barracuda Email Security Service also includes email encryption and Data Loss Prevention features at no additional charge.

About Barracuda Networks

Barracuda Networks combines premises-based gateways and software, virtual appliances, cloud services, and sophisticated remote support to deliver comprehensive content and network security, data protection and application delivery solutions. The company's expansive product portfolio includes offerings for protection against email and Web threats as well as products that improve application delivery and network access, message archiving, backup and data protection. Coca-Cola, FedEx, Harvard University, IBM, L'Oreal, and Europcar are among the more than 150,000 organizations protecting their IT infrastructures with Barracuda Networks' range of affordable, easy-to-deploy and manage solutions. Barracuda Networks is privately held with its International Headquarters in Campbell, Calif. For more information, please visithttp://www.barracudanetworks.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26814
PUBLISHED: 2021-03-06
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service sc...
CVE-2021-27581
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
CVE-2021-28042
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
CVE-2021-28041
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2021-3377
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.