Product Demo

Barracuda offers risk-free 30-day evaluations on all of our security and storage products. Visit this page to request yours.

Latest Posts


AAA and PFS in Barracuda Load Balancer ADC version 5.2

Today’s complex networking environment often requires coordinating a high-volume, high-capacity load balancing configuration with robust authentication and authorization.  Users may connect to a VPN through mobile access points such as consumer-grade DSL or Cable connections, WiFi, or even dial-up nodes. Those connections usually use dynamic IPs, which can change during the connection. If you configure RADIUS load balancing on the Barracuda Load Balancer ADC appliance to support persistent client connections to RADIUS authentication servers, the appliance uses the user logon or the specified RADIUS attribute instead of the client IP as the session ID.  This directs all connections and records associated with that user session to the same RADIUS server. Users are therefore able to log on to … [Read More...]


Congratulations to the winners of the Barracuda SJSU Programming Contest

We recently wrapped up a programming contest that asked the fine students at San Jose State University to help us out with a task.  Unlike our 24 hour contests where students create bots to compete against each other, this challenge allowed contestants to download a programming problem and work on it over a period of 5 weeks.  In the final week, the entries were submitted to a panel of judges for review.  Finalists were chosen to then present their work in person, and these presentations determine the outcome. Here's how it went. The Problem Per the problem specification, contestants were tasked with writing a Lua script to run within a Barracuda-provided VM that would scan the detected devices, parse device/driver mapping files, and provide a list of drivers to be loaded based on … [Read More...]


PCI DSS 3.0 Updates and Ramifications for Network and Application Security

The PCI DSS 3.0 is here. Since Jan 1, 2015 organizations under its purview are required to comply with the updated standard. Many of the changes stem from the recent high profile breaches, despite being compliant. In this post we will concern ourselves mainly with the impact that 3.0 poses to application and network security. Certain requirements in sections 6 and 11 have an extended deadline of June 30, 2015. The amount of effort needed to meet the updated standard could be substantial and should not be underestimated. For context, PCI DSS compliance is becoming increasingly important, as losses due to global card fraud continue to escalate: … [Read More...]


The challenge of moving data to the cloud

Organizations and consumers alike are becoming increasingly dependent on online communications and high-tech IT networks, but sometimes can a more traditional low-tech solution work better? It’s becoming a connected world It seems possible now for us to do almost anything online, from managing our finances or paying a bill, right through to doing our grocery shopping, watching TV or sharing our photos with friends. We are encouraged to store our data ‘in the cloud’, and to download our music over the internet rather than going out and buying a CD. In this highly connected world, the links between all our computer systems and end user devices are becoming of critical importance. … [Read More...]


Take a look at the new Barracuda Firewall version 6.6

Barracuda recently released Barracuda Firewall version 6.6, which includes several new features and performance improvements that enhance the user experience while adding functionality that improves malicious traffic detection.  Here's a quick look at some of the new stuff: Administrators have the option to run Anti-Virus scanning on-box (including SSL encrypted web traffic) or off-box using Barracuda’s Web Security Service.  Please note that a subscription to Barracuda Web Security Service is required for the off-box option.  Anti-Virus scanning of SSL encrypted traffic allows the firewall to scan encrypted traffic for anti-virus and malware.  With the growing use of encrypted traffic on the Internet, this feature is increasingly in demand.  Use of encrypted traffic just in the US … [Read More...]


A constant game of cat and mouse

Stephen Pao, our GM Security Business, takes part in this Marketplace segment on what many are calling, "one of the largest bank heists ever." The heist was pulled off through the use of a phishing scheme that deposited malware on victim machines.  The malware was present on victim networks for an average of 42 days before money was funneled out of the bank. There are a handful of key takeaways from an incident like this: Patching is extremely important!  As Brian Krebs notes here, the malware took advantage of unpatched Microsoft systems. Hackers are sophisticated, combining spear phishing, known vulnerabilities, and human intelligence.  As the Kaspersky report (pdf) notes, "… they studied the victim´s internal procedures and pinpointed who they should impersonate locally in … [Read More...]

Protect your business emails

The business risks of using personal email accounts

A customer recently asked us a question that raises some interesting points when individuals use personal accounts such Hotmail or Yahoo for business-related emails:  “When is it OK to use a personal email for business purposes?” The short answer is never, but individual proprietors, consultants, can often revert to “personal” email accounts.   The smart ones will set-up a secondary account that reflects their business or business name (virtually all service providers, i.e. folks like Verizon, Comcast, etc. include the ability to create several email accounts at no additional charge). For larger businesses, the inherent risks along with general availability of mobile email should be enough to preclude using a personal email account for business purposes.   If for example that user is … [Read More...]

Web Filter 410--10C

3 ways the Barracuda Web Filter can protect your classroom from cyberbullying

I recently talked about the different types of cyberbullying.  Today I'd like to take you through some of the ways the Barracuda Web Filter can help you mitigate these risks in your school. The Barracuda Web Filter is an award-winning appliance that allows an organization safe access to online applications and other web content.  It does this by blocking threats and by allowing IT administrators to configure the types of content the web filter should allow.   It has tons of features that fit perfectly into a K12 environment, including technologies designed to protect users from activities like cyberbullying. Anti-malware technologies The Barracuda Web Filter has multiple layers of protection against spyware and viruses.  This protection defends network devices by monitoring … [Read More...]


3 types of cyberbullying that threaten students

It's sad news when research centers can't agree on whether cyberbullying affects one-in-three, one-in-four, or one-in-five teens.  It isn't the specific number that's important; it's the fact that the number never goes below 20%.  Imagine being in a classroom of 25 people, knowing that this classroom is not "normal" unless at least five of those students are being bullied. There are as many ways to cyberbully someone as there are ways to create content online.  Social networks?  Check.  Forums?  Check.  Blogs?  Check.  You get the picture.  Still, most cyberbullying breaks down into 3 basic types: … [Read More...]


How to get started with Barracuda Email Security Service

Barracuda has been in the spam-fighting business since 2003, when we launched our award-winning Barracuda Spam Firewall.  Business messaging has evolved over the years, to the point where it doesn't always make sense to drop a spam firewall into a network.  Companies may be using Office365, they may have multiple locations to protect, or they just don't want to deploy any more hardware or software on-premises.  If you find yourself in a situation like this, Barracuda Email Security Service (BESS) is a great option to consider. BESS is a cloud-based solution that is affordable and easy to use.  It provides inbound and outbound protection against email-borne threats as well as data leaks.  Here are some of the features included: … [Read More...]