PCI DSS Compliance. with the Barracuda NG Firewall. White Paper

Size: px
Start display at page:

Download "PCI DSS Compliance. with the Barracuda NG Firewall. White Paper"

Transcription

1 PCI DSS Compliance with the Barracuda NG Firewall White Paper

2 About Payment Card Industry Data Security Standard (PCI DSS) Requirements In response to the increase in identity theft and security breaches, major credit card companies collaborated to create the Payment Card Industry Data Security Standard (PCI DSS). PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data. It applies to all entities involved in payment card processing including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process, or transmit cardholder account data. The 12 PCI DSS requirements are organized into six main categories that prevent credit card fraud through increased controls around data and its exposure to compromise. To be fully compliant, an organization must satisfy all 12 requirements. This whitepaper will show how the Barracuda NG Firewall can help satisfy every specific requirement of PCI DSS compliance. RELEASE 3 About Barracuda NG Firewall The Barracuda NG Firewall is an ideal enterprise solution for IT administrators seeking to protect vital data in networks made chaotic and vulnerable by the explosion of mobile and BYOD devices, evasive Web 2.0 applications, and remote network users. The Barracuda NG Control Center adds a powerful and intuitive centralized management portal that makes it extremely simple to deploy, configure, update, and manage multiple units from a single location, while also providing comprehensive, real-time network visibility and reporting. As a result, it is an ideal solution for enterprises looking to manage large numbers of users or several sites with few IT personnel while meeting PCI Compliance requirements. Page 2 of 10

3 Build and Maintain a Secure Network #1 Install and maintain a firewall configuration to protect cardholder data The Barracuda NG Firewall is a full next-generation stateful firewall providing market-leading network security and data protection. Multiple firewalls can be managed through the Barracuda NG Firewall Control Center allowing full centralized management. The control center s Firewall Audit Viewer aggregates traffic information from multiple firewalls in one central location. For auditing purposes, you can activate the Revision Control System (RCS) (to support requirement 1.1.1). The RCS provides information on all configuration changes to your system as well as letting you retrieve and revert to older configuration versions. You can generate RCS Reports displaying information for specific configuration versions and administrator IP addresses. You can also search for information, export and import version settings, and print the RCS Report. When integrating multiple firewalls together into a single network architecture, we provide separate firewall service types to facilitate the efficient management of multiple devices. A single common ruleset for the common security policy is managed once, but shared across all the network firewalls, while cascading site local rulesets can be used to implement security policies specific to a network segment. This greatly reduces the administration overhead and hence the total cost of ownership. The Barracuda NG Firewall is the ideal device to place between the DMZ and the internal network or to protect access via one or more Internet connections (requirement 1.1.3). The Barracuda NG Firewall provides an ideal network segmentation gateway to police the border between trusted and untrusted networks. Rigorous security policies can be implemented to allow only required traffic for specific protocols or applications (requirement 1.2.1). It can also be used as a secure perimeter firewall between wireless networks and data environments. In addition, it can broadcast Wi-Fi networks (requirement 1.2.3) The Barracuda NG Firewall has the ability to enforce sophisticated firewall rules on traffic flows through the device. It integrates a comprehensive set of firewall technologies including: Layer 7 Application Control for Web 2.0 SSL Interception Stateful packet forwarding (in bridged or routed modes) Transparent proxying (TCP) NAT (src, dst, nets), NAPT, PAT Dynamic rules / timer triggers Virtual rule test environment User Authentication #1.1 Establish firewall and router configuration standards #1.2 Build firewall and router configurations that restrict connections between untrusted networks and any system components in the cardholder data environment Separate Barracuda NG Firewalls can be used to protect each network segment. Or a single high performance Barracuda NG Firewall can be used as a central network segmentation gateway that protects multiple network segments, with separate security policies. A large number of ports and VLAN support means a single Barracuda NG Firewall can easily manage hundreds of separate network segments. Page 3 of 10

4 The Barracuda NG Firewall can be easily configured to prevent direct access between the Internet and system components in the cardholder network segment. It can implement and manage a network zone for a DMZ (requirement 1.3.1), ensure that inbound Internet traffic can only access IP addresses in the DMZ (requirement 1.3.2), prevent direct connections (requirement 1.3.3), protect internal IP addresses (requirement 1.3.4), only allow specifically authorized outbound traffic (requirement 1.3.5), perform stateful inspection (requirement 1.3.6), segregate a network zone for cardholder data (requirement 1.3.7), and implement NAT as well as proxy services (requirement 1.3.8) The Barracuda NG Firewall can completely control what comes in and out of a network based on user, time of day, location, protocol, and application (more than 1200 applications can be detected). Our High Availability (HA) feature ensures continuity of service and our site-to-site VPN allows remote sites to be seamlessly integrated into a secure network architecture. The Barracuda Network Access Client provides a powerful firewall for PCs that can be easily rolled out and centrally configured via the Barracuda NG Firewall. Local reconfiguration of the personal firewall can be blocked. The Barracuda Network Access Client can also ensure that only computers meeting centrally defined security and health standards can connect to the organization s network. #2 Do not use vendor-supplied defaults for system passwords and other security parameters The Barracuda NG Firewall and associated documentation encourages customers to change supplied defaults (usernames, passwords, and IP addresses) before deployment. In addition the Setup Wizard prompts for password change. The Barracuda NG Firewall can help enforce this requirement by ensuring that only specific protocols, services, or applications are allowed to access specific services or network segments. If they are not required, they are blocked by default. The Barracuda NG Firewall administrative access is encrypted using SSL. Administration is via a Windows.exe application. The virtualized versions of the Barracuda NG Firewall (for example for VMware, KVM, and XenServer) allow deployments in virtualized networks on a single platform. This is ideal for shared hosting providers, as they can segregate the data from different organizations, while using a single platform. #1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment #1.4 Install personal firewall software on any mobile and/or employee-owned computers... #2.1 Always change vendor-supplied defaults before installing... #2.2 Develop configuration standards for all system components... #2.3 Encrypt all non-console administrative access using strong cryptography... #2.4 Shared hosting providers must protect each entity s hosted environment and cardholder data... Page 4 of 10

5 Protect Cardholder Data #3 Protect stored cardholder data This item is not addressed by the Barracuda NG Firewall. However, Barracuda s business partners can provide services to help an organization satisfy this requirement. #4 Encrypt transmission of cardholder data across open, public networks The Barracuda NG Firewall manages secure site-to-site (and client-to-site) VPN tunnels, across public networks, to deliver secure and stable remote office or cloud connectivity. VPN tunnels can be secured using either IPSec or the Barracuda hybrid protocol (IPSec s ESP and enhanced key exchange). Supported encryption includes AES- 128/256, 3DES, DES. The Barracuda NG Firewall s generic pattern matching provides DLP functionality and can be set up to include blocking PANs (credit card numbers). #4.1 Use strong cryptography and security protocols... #4.2 Never send unprotected PANs... Maintain a Vulnerability Management Program #5 Use and regularly update anti-virus software or programs The Barracuda NG Firewall integrates with the Barracuda Web Security Service to provide cloud-based malware scanning and content filtering without performance degradation. Barracuda NG Malware Protection provides gateway-based protection against malware, viruses, spyware, and other unwanted programs inside SMTP, HTTP, POP3, and FTP traffic. Features include: Configurable archive recursion depth Quarantine functionality for proxy Configurable unknown archive policy Configurable maximum archive size Archiver package support Office file-types support Proactive detection of new threats Advanced heuristics detection techniques Hundreds of thousands of signatures Multiple signature updates per day The Barracuda NG Web Filter is a subscription option that enforces Internet usage policies by blocking access to websites and Internet applications that are not related to business and/or a potential security risk. Features include: Customizable black and white lists Filter entire URL string beyond FQDN 69 content categories Multiple category selection ~100 million entries with ~100,000 new URL database entries everyday Temporal constraints User-specific / groupspecific restrictions Category database Local or online updates Hourly or continuously update interval Customizable block pages #5.1 Deploy anti-virus software on all systems... Page 5 of 10

6 The Barracuda Web Security Service, as a cloud service, is always up-to-date without any need for local updates. Malware signatures update continuously for fast response to new and know threats. Advanced heuristics block unknown web viruses and spyware. The service is also centrally manageable (via a web interface) with central reporting and drill down reports. Barracuda NG Malware Protection receives multiple signature updates per day. A virus scanner log can also be enabled for different levels to enable debugging or auditing. Barracuda NG Web Filter can be set to have an hourly or continuous update interval. You can log which requests are allowed and denied, and specify the types of statistics that are generated for the service. #6 Develop and maintain secure systems and applications The Barracuda NG Firewall Control Center provides centralized antivirus pattern updates and version monitoring across all of an organization s firewalls. Items #6.2 - #6.6 are not addressed by the Barracuda NG Firewall. However, Barracuda s business partners can provide services to help an organization satisfy this requirement. #5.2 Ensure that all antivirus mechanisms are current, actively running, and generating audit logs #6.1 Ensure that all system components and software are protected from known vulnerabilities... Implement Strong Access Control Measures #7 Restrict access to cardholder data by business need-to-know The Barracuda NG Firewall can be used to enforce access control policies via firewall rules that enforce granular access control based on users, time, application, and protocol. In addition, the Barracuda Network Access Client (NAC) can ensure that only healthy PCs and authenticated users are able to connect to the corporate network. Two factor authentication is also available by combining different authentication types (e.g., password and token (OTP, SMS PASSCODE). The Barracuda NG Firewall can implement access control policies based on user groups. For example, a particular network segment (containing cardholder data) can be protected by an NG Firewall and only users belonging to a specified user group (in Active Directory) are able to access the segment at specified times (e.g., office hours). #7.1 Limit access to system components... #7.2 Establish an access control system for systems components with multiple users... Page 6 of 10

7 #8 Assign a unique ID to each person with computer access User authentication, User Objects, for firewall rules, allows the Barracuda NG Firewall to control network access for authenticated users. The Barracuda NG Firewall supports numerous authentication types, including Microsoft Certificate Management, Microsoft Active Directory, LDAP, RADIUS, MSNT, RSAACE, External X509 certificates, SMS PASSCODE, RSA tokens, and Smart cards. In addition, ensuring that all PCs connect to the network via the Barracuda Network Access Client (NAC), means that users can only connect to the network via highly secure two-factor authentication and only from healthy PCs. #8.1 Assign all users an unique ID before allowing them to access system components or cardholder data #8.2 In addition to assigning an unique ID, employ at least one of the following methods to authenticate all users... The different authentication types (listed above) can also be combined to implement rock-solid two-factor authentication on a Barracuda NG Firewall. For even tighter security, it is possible enforce the use of strong or specific ciphers. All passwords used to connect to a Barracuda NG Firewall are rendered unreadable during transmission using strong cryptography. #9 Restrict physical access to cardholder data This item is not addressed by the Barracuda NG Firewall. However, Barracuda s business partners can provide services to help an organization satisfy this requirement. #8.3 Incorporate two-factor authentication for remote access... #8.4 Render all passwords unreadable during transmission and storage... Regularly Monitor and Test Networks #10 Track and monitor all access to network resources and cardholder data The Barracuda NG Firewall allows the use of separate administrative accounts for each system admin with varying privileges. #10.1 Establish a process for linking all access to system components... Page 7 of 10

8 The Audit Service in the Barracuda NG Control Center aggregates all audit information, across multiple firewalls, related to firewall sessions. It also allows complex queries. This enables the implementation of automated audit trails for those who have accessed (or attempted to access) cardholder data. The Barracuda NG Firewall implements detailed logging of data passing through the firewall. This data can be used to see who has accessed what network segment when. The Barracuda NG Firewall can continuously synchronize time using the network time protocol (NTP) and a trusted NTP Server. The log files that constitute an audit trail are securely stored on the Barracuda NG Firewall or the Barracuda NG Control Center so that they cannot be altered. All traffic relating to the logs is encrypted. In addition, the Syslog Service collects Revision Control System (RCS), as well as log messages, from Barracuda NG Firewalls that are managed by the Barracuda NG Control Center and streams those log messages to an external log host or sends them to the HA partner (with or without SSL encryption). This means that even changes made by the root user can be tracked and audited. On the Barracuda NG Firewall and Barracuda NG Control Center, you can configure notifications for specific system events. These event notifications can be sent via or SNMP trap messages. Notifications can be configured for the different event types. Logs can be easily exported from Barracuda NG Firewalls and Barracuda NG Control Centers for archiving. #10.2 Implement automated audit trails for all system components... #10.3 Record at least the following audit trail entries for all system components for each event... #10.4 Using timesynchronization technology, synchronize all critical system clocks and times... #10.5 Secure audit trails so they cannot be altered... #10.6 Review logs for all system components at least daily... #10.7 Retain audit trail history... #11.1 #11.2 #11.3 Page 8 of 10

9 #11 Regularly test security systems and processes Items # #11.3 are not addressed by the Barracuda NG Firewall. However, Barracuda s business partners can provide services to help an organization satisfy this requirement. The Barracuda NG Firewall provides easy to use out-of-the box Intrusion Prevention (IPS) against a vast number of exploits and vulnerabilities in operating systems, applications, and databases to prevent network attacks such as: SQL injections Arbitrary code executions Access control attempts and privilege escalations Cross-Site Scripting Buffer overflows Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks Directory traversal attempts Probing and scanning attempts Backdoor attacks, Trojans, rootkits, viruses, worms, and spyware #11.4 Use intrusiondetection systems, and/or intrusionprevention systems... Our firewall can block threats according to policy. Depending on the severity of the threat, highly granular actions can be assigned on a per firewall rule base enabling the Barracuda NG Firewall to allow, block, or log questionable traffic based on severity, location, user/group, type, and Layer 7 application detection. As part of the Barracuda Energize Updates subscription, automatic signature updates are delivered on a weekly schedule (or on an emergency basis) to ensure that the Barracuda NG Firewall is constantly up to date. If the firewall unit is centrally managed, the pattern updates are conveniently distributed by the Barracuda NG Control Center. Maintain an Information Security Policy #12 Maintain a policy that addresses information security This item is not addressed by the Barracuda NG Firewall. However, Barracuda s business partners can provide services to help an organization satisfy this requirement. Page 9 of 10

10 Conclusion The concept of protecting separate network segments with tailored security policies, has been supported by our (phion) netfence sectorwall and Barracuda NG Firewall since There are two architectural options: Separate Barracuda NG Firewalls can be used as individual network segmentation gateways to protect each network segment. Or a single high performance Barracuda NG Firewall can be used as a central network segmentation gateway that protects multiple network segments with separate security policies. A large number of ports and VLAN support means a single Barracuda NG Firewall can easily manage multiple network segments. Our support for virtual systems means that the Barracuda NG Firewall can also be used easily to implement network segments within a virtual environment. About Barracuda Networks, Inc. Protecting users, applications, and data for more than 150,000 organizations worldwide, Barracuda Networks has developed a global reputation as the go-to leader for powerful, easy-to-use, affordable IT solutions, The company s proven customer-centric business model focuses on delivering high-value, subscription-based IT solutions for security and data protection. For additional information, please visit barracuda.com. Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. in the United States. All other names are the property of their respective owners. Barracuda Networks 3175 S. Winchester Boulevard Campbell, CA United States (US & Canada) info@barracuda.com

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Barracuda Intrusion Detection and Prevention System

Barracuda Intrusion Detection and Prevention System Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9 NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document

More information

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment. REQUIREMENT 1 Install and Maintain a Firewall Configuration to Protect Cardholder Data Firewalls are devices that control computer traffic allowed between an entity s networks (internal) and untrusted

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Barracuda Web Site Firewall Ensures PCI DSS Compliance Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online

More information

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance

More information

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for PCI DSS V3.0 Network Security Compliance Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

LogRhythm and PCI Compliance

LogRhythm and PCI Compliance LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent

More information

PCI and PA DSS Compliance Assurance with LogRhythm

PCI and PA DSS Compliance Assurance with LogRhythm WHITEPAPER PCI and PA DSS Compliance Assurance PCI and PA DSS Compliance Assurance with LogRhythm MAY 2014 PCI and PA DSS Compliance Assurance with LogRhythm The Payment Card Industry (PCI) Data Security

More information

Retail Stores Networks and PCI compliance

Retail Stores Networks and PCI compliance Retail Stores Networks and PCI compliance Executive Summary: Given the increasing reliance on public networks (Wired and Wireless) and the large potential for brand damage and loss of customer trust, retail

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS) Payment Card Industry Data Security Standard (PCI / DSS) InterSect Alliance International Pty Ltd Page 1 of 12 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance

More information

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity) PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security

More information

Using the AppGate Network Segmentation Server TO ACHIEVE PCI COMPLIANCE

Using the AppGate Network Segmentation Server TO ACHIEVE PCI COMPLIANCE Using the AppGate Network Segmentation Server TO ACHIEVE PCI COMPLIANCE Version 2.0 January 2013 Jamie Bodley-Scott Cryptzone 2012 www.cryptzone.com Page 1 of 12 Contents Preface... 3 PCI DSS - Overview

More information

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category

More information

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs White Paper Meeting PCI Data Security Standards with Juniper Networks SECURE ANALYTICS When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright 2013, Juniper Networks,

More information

BARRACUDA NG FIREWALL TECHNOLOGY

BARRACUDA NG FIREWALL TECHNOLOGY Barracuda NG Firewall Technology Central Management Home Barracuda NG Network Access Clients Branch Office Barracuda NG Firewall F100 Branch Office Barracuda NG Firewall F300 Internet WAN Travel Barracuda

More information

Achieving PCI DSS Compliance with Cinxi

Achieving PCI DSS Compliance with Cinxi www.netforensics.com NETFORENSICS SOLUTION GUIDE Achieving PCI DSS Compliance with Cinxi Compliance with PCI is complex. It forces you to deploy and monitor dozens of security controls and processes. Data

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

PCI COMPLIANCE Protecting Against External Threats Protecting Against the Insider Threat

PCI COMPLIANCE Protecting Against External Threats Protecting Against the Insider Threat PCI COMPLIANCE Achieving Payment Card Industry (PCI) Data Security Standard Compliance With Lumension Security Vulnerability Management and Endpoint Security Solutions Cardholder Data at Risk While technology

More information

MEETING PCI DSS MERCHANT REQUIREMENTS WITH A WATCHGUARD FIREBOX

MEETING PCI DSS MERCHANT REQUIREMENTS WITH A WATCHGUARD FIREBOX MEETING PCI DSS MERCHANT REQUIREMENTS WITH A WATCHGUARD FIREBOX FEBRUARY 2008 Introduction Over the past few years there have been several high profile security breaches that have resulted in the loss

More information

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group Meeting PCI-DSS v1.2.1 Compliance Requirements By Compliance Research Group Table of Contents Technical Security Controls and PCI DSS Compliance...1 Mapping PCI Requirements to Product Functionality...2

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance REDSEAL NETWORKS SOLUTION BRIEF Proactive Network Intelligence Solutions For PCI DSS Compliance Overview PCI DSS has become a global requirement for all entities handling cardholder data. A company processing,

More information

The Comprehensive Guide to PCI Security Standards Compliance

The Comprehensive Guide to PCI Security Standards Compliance The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

Windows Azure Customer PCI Guide

Windows Azure Customer PCI Guide Windows Azure PCI Guide January 2014 Version 1.0 Prepared by: Neohapsis, Inc. 217 North Jefferson St., Suite 200 Chicago, IL 60661 New York Chicago Dallas Seattle PCI Guide January 2014 This document contains

More information

CorreLog Alignment to PCI Security Standards Compliance

CorreLog Alignment to PCI Security Standards Compliance CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment

More information

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance

More information

Automate PCI Compliance Monitoring, Investigation & Reporting

Automate PCI Compliance Monitoring, Investigation & Reporting Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently

More information

Payment Card Industry Self-Assessment Questionnaire

Payment Card Industry Self-Assessment Questionnaire How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

Becoming PCI Compliant

Becoming PCI Compliant Becoming PCI Compliant Jason Brown - brownj52@michigan.gov Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History

More information

Using Skybox Solutions to Achieve PCI Compliance

Using Skybox Solutions to Achieve PCI Compliance Using Skybox Solutions to Achieve PCI Compliance Achieve Efficient and Effective PCI Compliance by Automating Many Required Controls and Processes Skybox Security whitepaper August 2011 1 Executive Summary

More information

Mobile Network Access Control

Mobile Network Access Control Mobile Network Access Control Extending Corporate Security Policies to Mobile Devices WHITE PAPER Executive Summary Network Access Control (NAC) systems protect corporate assets from threats posed by devices

More information

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and

More information

Unified Security Anywhere PCI COMPLIANCE PCI COMPLIANCE WE CAN HELP MAKE IT HAPPEN

Unified Security Anywhere PCI COMPLIANCE PCI COMPLIANCE WE CAN HELP MAKE IT HAPPEN Unified Security Anywhere PCI COMPLIANCE PCI COMPLIANCE WE CAN HELP MAKE IT HAPPEN PCI COMPLIANCE COMPLIANCE MATTERS. The PCI Data Security Standard (DSS) was developed by the founding payment brands of

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2 Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2 An in-depth look at Payment Card Industry Data Security Standard Requirements 1, 2, 3, 4 Alex

More information

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI WHITEPAPER Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI About PCI DSS Compliance The widespread use of debit and credit cards in retail transactions demands

More information

Enforcing PCI Data Security Standard Compliance

Enforcing PCI Data Security Standard Compliance Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security & VideoSurveillance Cisco Italy 2008 Cisco Systems, Inc. All rights reserved. 1 The

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment PCI DSS Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment White Paper Published: February 2013 Executive Summary Today s retail environment has become increasingly

More information

Demystifying the Payment Card Industry - Data Security Standard

Demystifying the Payment Card Industry - Data Security Standard Demystifying the Payment Card Industry - Data Security Standard Does ADTRAN Comply? What is the PCI DSS? In short, the Payment Card Industry (PCI) Data Security Standard (DSS) is a stringent set of requirements

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Improving PCI Compliance with Network Configuration Automation

Improving PCI Compliance with Network Configuration Automation Improving PCI Compliance with Network Configuration Automation technical WHITE PAPER Table of Contents Executive Summary...1 PCI Data Security Standard Requirements...2 BMC Improves PCI Compliance...2

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard Build and Maintain a Secure Network Requirement 1: Requirement 2: Install and maintain a firewall configuration to protect data Do not use vendor-supplied defaults

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GmbH Vordergasse 59 CH-Schaffhausen Switzerland Phone: +41-526320-411 Fax: +41-52672-2010 Copyright 1999-2011

More information

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks 全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

How to Dramatically Reduce the Cost and Complexity of PCI Compliance

How to Dramatically Reduce the Cost and Complexity of PCI Compliance How to Dramatically Reduce the Cost and Complexity of PCI Compliance Using Network Segmentation and Policy-Based Control Over Applications, Users And Content to Protect Cardholder Data December 2008 Palo

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Secure Auditor PCI Compliance Statement

Secure Auditor PCI Compliance Statement Payment Card Industry (PCI) Data Security Standard is an international information security standard assembled by the Payment Card Industry Security Standards Council (PCI SSC). The standard was created

More information

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Compliance Brief The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Using Server Isolation and Encryption as a Regulatory Compliance Solution and IT Best Practice Introduction

More information

Firewall Feature Overview

Firewall Feature Overview Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises

More information

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card

More information

PCI Wireless Compliance with AirTight WIPS

PCI Wireless Compliance with AirTight WIPS A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use

More information

Meeting PCI Data Security Standards with

Meeting PCI Data Security Standards with WHITE PAPER Meeting PCI Data Security Standards with Juniper Networks STRM Series Security Threat Response Managers When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright

More information

Content-ID. Content-ID URLS THREATS DATA

Content-ID. Content-ID URLS THREATS DATA Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network. Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

You Can Survive a PCI-DSS Assessment

You Can Survive a PCI-DSS Assessment WHITE PAPER You Can Survive a PCI-DSS Assessment A QSA Primer on Best Practices for Overcoming Challenges and Achieving Compliance The Payment Card Industry Data Security Standard or PCI-DSS ensures the

More information

Mastering Common Core State Standards Challenges with Barracuda Next Generation Firewalls. White Paper

Mastering Common Core State Standards Challenges with Barracuda Next Generation Firewalls. White Paper Mastering Common Core State Standards Challenges with Barracuda Next Generation Firewalls White Paper Background State education chiefs and governors in 48 states came together to develop Common Core State

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

General Standards for Payment Card Environments at Miami University

General Standards for Payment Card Environments at Miami University General Standards for Payment Card Environments at Miami University 1. Install and maintain a firewall configuration to protect cardholder data and its environment Cardholder databases, applications, servers,

More information

With Globalscape EFT and the High-Security Module. The Case for Compliance

With Globalscape EFT and the High-Security Module. The Case for Compliance Facilitating Enterprise Compliance With Globalscape EFT and the High-Security Module Globalscape s Enhanced File Transfer (EFT ) High Security module (HSM), with the Auditing and Reporting module (ARM),

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

Firewall and Router Policy

Firewall and Router Policy Firewall and Router Policy Approved By: \S\ James Palmer CSC Loss Prevention Director PCI Policy # 1600 Version # 1.1 Effective Date: 12/31/2011 Revision Date: 12/31/2014 December 31, 2011 Date 1.0 Purpose:

More information

Payment Card Industry (PCI) Compliance. Management Guidelines

Payment Card Industry (PCI) Compliance. Management Guidelines Page 1 thehelpdeskllc.com 855-336-7435 Payment Card Industry (PCI) Compliance Management Guidelines About PCI Compliance Payment Card Industry (PCI) compliance is a requirement for all businesses that

More information

Nominee: Barracuda Networks

Nominee: Barracuda Networks Nominee: Barracuda Networks Nomination title: Barracuda Next Generation Firewall The Barracuda NG (Next Generation) Firewall is much more than a traditional firewall. It is designed to protect network

More information

Barracuda SSL VPN Administrator s Guide

Barracuda SSL VPN Administrator s Guide Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,

More information