Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014
Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No centralized management No centralized deployment Intelligence No network optimization No traffic prioritization Security No Network Access Control No IDS/IPS No Secure Remote Access
Regaining Control is Essential Control Application Usage Cloud enablement & WAN virtualization Operations cost control Access Control & Mobility
Introducing the Barracuda NG Firewall Powerful network firewall Full application control Full user awareness Intelligent traffic management Comprehensive IDS/IPS Centrally manage all functionality
The Evolution of the Firewall WAN optimization Centralized management Scalability Remote network access Reporting/Audit capabilities Quality of Service (QoS) Application control Identity awareness Ports, packets, protocols Anti-virus scanning Barracuda NG Firewall Next Generation Firewall Traditional Firewall/UTM
Challenges: Port-Based Firewalls Loss of network control Application driven malware Block UDP traffic Block FTP traffic Allow HTTP Mimic Web Browsing HTTP Live Streaming Port Hopping
Regain Control Application Awareness Block unwanted applications Control and throttle acceptable traffic Preserve bandwidth and speed-up business critical applications Intercept SSL encrypted application traffic Business Critical? Acceptable? Security Flaw?
Traditional Use Case Block Traffic Block unwanted applications for certain users or groups
Get Smarter Selective Blocking Block unwanted applications for certain users or groups Enable or disable application specific sub-functions (e.g. Facebook Mail)
Improving Overall Network Quality Control and throttle acceptable traffic
Protect and Support the Business Control and throttle acceptable traffic Preserve bandwidth and speed up business-critical applications
Traffic Analysis and Live Application Control
Application-Based Link Selection ISP 1 ISP 2
All You Need to Know with Just One Click Real-time information and quick history drill downs
Application Context Discover the actual intentions of users & applications
Full User Awareness DC Agent (Domain Control Agent) Automatic user-ip mapping Exclude IP addresses manually (e.g. HTTP proxies and Terminal Servers) Monitor Active Directory remotely TS Agent (Terminal Server Agent) Map users to specific port ranges TS Agent connections are SSL encrypted Mapping information is sent only after successful connection establishment Debug log of identifying connection issues
Reports Create customizable Top Reports for: Applications, risk, category Protocols Users Sources & destinations Geo locations URLs etc. Automatic generation and delivery
Barracuda Report Creator
Cloud Enablement The uplink is your weakest link. 99.999% availability made easy. Ethernet xdsl xdsl DHCP Internet MPLS
Virtual Appliances Barracuda NG Firewall virtual images are available for: VMware ESX Hyper-V KVM Citrix XenServer Public cloud offerings:
Increase Network Throughput WAN Optimization Data compression TCP-flow optimization Protocol acceleration Data deduplication Headquarters Branch Office
VPN Effective Operations VPN is hard to setup, maintain, and troubleshoot? REALLY? Really?
Barracuda NG Control Center C400/VC400 Standard Edition C610/VC610 Enterprise Edition VC820 Global Edition
Industry Leading Centralized Management Daily Tasks, 1 Firewall 10 minutes
Industry Leading Centralized Management Daily Tasks, 100 Firewalls 16 hours
Industry Leading Centralized Management Daily Tasks, 100 Firewalls 10 minutes Multiple Locations, Multiple Firewalls Barracuda NG Control Center
Improve your Security Posture State-of-the-art inline IDS/IPS Real-time update of signatures Included with Energize Updates Network Access Client Customizable web-based SSL VPN Sophisticated Network Access Control (NAC) Centrally managed via the Barracuda NG Control Center
The Barracuda NG Firewall Product Line
Barracuda NG Firewall Advantage Understand what users are doing on your network Improve your security posture Cloud-based web security Intelligently regulate network traffic Optimize bandwidth usage and link availability Increase network throughput Centrally manage the corporate network Globally monitor your WAN Reduce associated management costs
Thank You