Protect your business from evolving email threats

×

Barracuda Sentinel

Get AI-based protection from phishing and account takeover.

Available as: SaaS

Stop Targeted Attacks with AI

Barracuda Sentinel can automatically detect and prevent spear phishing attacks that evade traditional email security systems. The Barracuda Sentinel AI engine learns each organization's unique communication patterns, and leverages these patterns to identify anomalies and quarantine spear phishing attacks in real-time.

Barracuda Sentinel automatically quarantines Business Email Compromise attacks, by detecting anomalies in the email header, as well as the content of the email. The AI does not require any manual rules or user setup, and can detect any type of BEC attack automatically from day one.

Barracuda Sentinel can detect any type of employee impersonation, including impersonation of executives, as well as mid and low level employees. It can detect spoofed emails, typo-squatted domains, and impersonation emails sent from free or personal email clients.

By discovering anomalous communication patterns, within the body of the email, the link or the email header, Barracuda Sentinel can stop zero-day phishing attacks that evade other email security systems. It can detect any type of zero-day phishing attack attacks, including links leading to a fake sign in page, as well as links to malicious websites.

Barracuda Sentinel has been trained to recognize and automatically quarantine phishing emails that impersonate web services, such as Microsoft Outlook, Docusign, Dropbox. The Barracuda Sentinel AI can prevent web impersonations, even when they use deceptive characters or zero-day links.

Barracuda Sentinel automatically stops attacks that impersonate employees by spoofing their email address. The AI engine recognizes the anomalies in spoofing emails and quarantines them.

Customers can report false positives and missed attacks to Barracuda Sentinel, which are used to retrain the AI classifiers. This enables the AI to continuously improve its precision and adapt its detection capabilities.

The raw data from the AI detections can be exported to a CSV file.

Stop Account Takeover with AI

Detect suspicious log-ins by tracking IPs that exhibit suspicious behavior, such as failed sign-ins, and share intelligence across all users and accounts. Track each user’s access patterns and alert IT administrators when Sentinel observes unusual sign-in activity such as from an unusual device or geography. Sentinel tracks both user-level pattern and organization wide level patterns.

By detecting anomalies in internal employee communications, Barracuda Sentinel can automatically detect when employee accounts become compromised and send malicious emails to internal and external recipients. Administrators get alerted when an account has been compromised and can take immediate action.

Barracuda Sentinel automatically quarantines phishing emails that allow attackers to steal employee credentials, and lead to account takeovers.

Barracuda Sentinel can automatically identify which malicious emails were sent from a compromised account and flag them for administrators.

Barracuda Sentinel's account takeover remediation tool allows administrators to delete all phishing emails sent from compromised accounts from within employee mailboxes.

Barracuda Sentinel allows administrators to identify which external recipients received emails from compromised accounts and notify them of the attack.

Barracuda Sentinel helps administrators lock out attackers from compromised accounts, and prevents them from using the compromised account to launch phishing campaigns and forward emails externally.

Changes to users’ email inbox rules can potentially indicate an account takeover. Sentinel lets IT administrators review and investigate recent changes to inbox rules. The Inbox Rules Change Feed provides visibility across the entire email environment, and lets you investigate rules changes for a specific email or account.

Domain Fraud Prevention

Barracuda Sentinel's domain fraud prevention solution prevents third parties from maliciously spoofing domains. The solution leverages DMARC to gain visibility both to legitimate and non-legitimate emails being sent with a particular domain, and enables customers to make sure their legitimate emails are delivered correctly while blocking the malicious senders.

DMARC reports are automatically gathered, analyzed and visualized within Barracuda Sentinel. Customers simply need to change their DNS record using Barracuda Sentinel's setup wizard, and Barracuda Sentinel takes care of the reporting and analysis of the DMARC logs.

Customers can get high level insights on the different email systems sending emails with their domains, as well as gain access to in-depth information, including which IPs are passing and failing DMARC, domain misalignment, and spoofing samples.

Barracuda Sentinel helps customers correctly configure their DKIM and SPF, as well as troubleshoot common problems in SPF/DKIM configuration, such as domain misalignment.

Barracuda Sentinel can help customers increase their legitimate email deliverability, by ensuring that their emails pass email authentication.

By leveraging Barracuda Network's IP reputation databases, Barracuda Sentinel can provide detailed information on the source of spoofing emails, including geographic and sender information, as well as samples of spoofing emails.

Barracuda Sentinel can automatically detect misconfigured legitimate senders, and helps customers correctly configure their SPF and DKIM to ensure that legitimate emails are delivered.

Barracuda Sentinel protects customer brands by ensuring that attackers cannot impersonate domains to trick clients, employees and third parties.

All DMARC reports can be exported into CSV files.

Flexible API-based Deployment

Unlike traditional gateway-based email security systems, Barracuda Sentinel connects directly to the Office 365 APIs. The APIs allow Barracuda Sentinel to both learn customer historical communication patterns, as well as detect and quarantine emails in real-time. Barracuda Sentinel is a cloud-based SaaS solution that requires no maintenance or installation.

You can setup Barracuda Sentinel in 1 minute, by simply signing up and connecting Sentinel to your Office 365 tenant. No need to change your MX records or install any software.

The API architecture of Barracuda Sentinel allows it to work alongside any existing gateway-based email security solution as a last layer of defense for targeted attacks. In particular, Barracuda Sentinel works seamlessly with Barracuda Essentials and Email Security Gateway.

The Barracuda Sentinel AI engine can be applied to historical emails, using the Email Threat Scanner for Office 365. This allows customers to generate a free email risk report to see what types attacks are not being stopped by their existing systems, understand the value that Barracuda Sentinel can provide, and provide ROI for senior executives. The Email Threat Scanner for Office 365 takes two minutes to set up and is completely free.

Barracuda Sentinel's AI can automatically predict which employees are likely to be targeted by spear phishing attacks, based on their role and their day-to-day access to sensitive information.

Forensics and Incident Response

*Requires access to both Essentials and Sentinel

Users can report phishing and other suspicious emails to their IT administrators directly from the Outlook Essentials Message Actions add-in. This provides end users with a simpler way to report suspicious emails to their IT department. Reported messages will appear within Forensics and Incident Response for IT to review, investigate, and take corrective action.

Forensics and Incident Response lets you identify, track, and resolve email attacks that originate outside your organization, such as a phishing or ransomware attack. You can search for any ALLOWED email (by subject and/or sender) that your users report to you as malicious, identify all recipients, and perform remediation action on the same.

Use Forensics and Incident Response to identify users that received malicious email and automatically send alerts notifying them of an incident. These emails can be sent in bulk to all affected users.

Use Forensics and Incident Response to identify users that received malicious email and permanently remove malicious emails directly from user inboxes. This action can be taken by IT administrator without need to involve end users.

Identity all users who received malicious emails and clicked on links within these messages. Automatically send them email notifications with instructions to change their passwords and other necessary remediation actions.

Forensics and Incident Response gives you access to Insights, to glean more information about email use patterns. This intelligence can be used to identify anomalies within delivered mail and to uncover instances of phishing attacks that might otherwise go undetected.