Barracuda Web Security Service

Cloud-Based Web Content Filtering and Malware Protection

Download PDF

Overview

Barracuda's powerful Web Security Service provides a complete and affordable way to easily manage web security via a cloud-based, highly scalable solution. Built for maximum performance and cloud intelligence, the Barracuda Web Security Service lets you scale security to all offices or users easily and cost-effectively.

The Barracuda Advantage

  • Increased security and reduced costs
  • Direct-to-cloud access
  • World class customer support
  • Full SSL inspection
  • Run in data centers throughout the world to reduce latency

Product Spotlight

  • Real-time analytics
  • Inspects every byte of traffic for comprehensive protection
  • Policies by users, locations, and AD groups

Cost Efficiency

The Barracuda Web Security Services provides an affordable and simplified way to protect your entire network.

Lifecycle costs: Pay as you go subscription model.

Deployment costs: Are minimized due to the cloud-based solution. As a standalone service, there are no appliances to administer, patch, or update.

Operating costs: The Barracuda Web Security Service helps to significantly reduce the cost associated with security management, while providing extra functionality via a single interface. It eliminates backhauling costs and keeps you from needing to buy excess capacity as your cloud solution scales elastically.

Security Management with Ease

Cloud-based web security that gives you full defense in depth by protecting you from a broad range of threats including malicious URL requests, viruses, advanced persistent threats, adware, spyware, botnets, cross-site scripting and much more.

The Barracuda Web Security Service sits between your organization and the internet, protecting your business from cyber threats. It globally monitors and manages your network and user activity from a single management console.
Cloud-based protection that safeguards your network from malicious activity while also allowing customizable access to areas of the web that are critical to business agility

Cloud-based protection that safeguards your network from malicious activity while also allowing customizable access to areas of the web that are critical to business agility

Technical Specs

Technical Specs

Key Benefits

  • Protects all web traffic
  • Real-time, constant inline blocking
  • Stops data exfiltration and botnet communications
  • Full SSL inspection
  • Instantaneous cloud-wide updates
  • Near-zero latency
  • Works as a standalone service or in conjunction with nextgeneration firewalls

Security

  • Bidirectional inspection of every byte of web traffic
  • Blocks malware and cyberattacks
  • MD5 signature blocking
  • Antivirus
  • Intrusion detection
  • Content inspection
  • Machine learning
  • Threat assessment
  • SSL decryption
  • Risk profiling
  • Sandboxing
  • Advanced persistent threat protection
  • Barracuda support

Cloud Application Control

  • Discover, monitor, and control access to thousands of web applications

License Center

  • Fully GUI-based access
  • Strong authentication and AES encryption
  • Role-based administration
  • Customizable dashboards
  • Configurable administrative domains
  • Multiple domains per administrator
  • Configurable access notification

URL Filtering

  • Manage access to web content for users, groups, and locations
  • URLs filtered by global reputation
  • 90 categories, 30 super categories, and 6 classes

Unified Policy and Reporting

  • Unified Console to create web policy across security and internet access management
  • Administrators can manage their policies, and changes are instantly reflected across the entire cloud
  • Single pane of glass to view and analyze all traffic across all devices and locations in real time
  • Allows you to view logs, run reports, and correlate data across devices, locations, and applications
  • Real-time visibility into internet usage by user, location, and application
  • Granular web app access policies across users, devices, and locations
  • Control-center resource utilization

Editions & Options

Editions

Basic

  • Inline Anti-Virus and Anti-Spyware

  • Signature-based anti-malware protection for any file size
  • Full inbound/outbound file inspection with near-zero latency
  • True file type by users, groups, and destinations

+ Show more - Show less

  • Web Access Control

  • Ensure outdated versions of browsers are forced to upgrade
  • Ensure known browser vulnerabilities are patched
  • Mobile Applications and Devices

  • - Granular reporting of mobile applications and device types
  • - Security policy for mobile applications
  • Cloud Application Controls

  • Granular application controls (i.e., allow viewing/block uploads)
  • Streaming media - YouTube, Hulu, Google video, etc.
  • Social networking and blogs - Facebook, Twitter, Orkut, etc.
  • Webmail and Web IM - Gmail, Yahoo mail, Hotmail, etc.
  • Collaboration, business applications
  • Advanced Threat Protection

  • Botnet protection (C2 servers)
  • - Botnet protection (C2 traffic)
  • - Cross-site scripting (XSS) protection (cookie stealing; potentially malicious requests)
  • Fraud protection - known phishing sites
  • - Fraud protection - suspected phishing sites
  • - Fraud protection - spyware callback
  • - Fraud protection - web spam
  • - Malicious active content protection - browser exploits
  • - Malicious active content protection (malicious content and sites, vulnerable ActiveX controls,
    file format vulnerabilities, blocked malicious URLs)
  • P2P file sharing protection (BitTorrent)
  • P2P anonymizer protection (Tor)
  • - P2P VoIP protection (Google Talk, Skype)
  • - Suspicious content protection (PageRiskTM)
  • - Suspicious destinations protection (blocked countries)
  • - Unauthorized communication protection (IRC tunneling)
  • - Unauthorized communication protection (SSH tunneling)
  • Unauthorized communication protection (Anonymizers)
  • SSL Inspection

  • SSL inspection of any content with 2048 bit certificate support
  • Granular policy for exclusion of content to be inspected

Advanced

  • Inline Anti-Virus and Anti-Spyware

  • Signature-based anti-malware protection for any file size
  • Full inbound/outbound file inspection with near-zero latency
  • True file type by users, groups, and destinations

+ Show more - Show less

  • Web Access Control

  • Ensure outdated versions of browsers are forced to upgrade
  • Ensure known browser vulnerabilities are patched
  • Mobile Applications and Devices

  • Granular reporting of mobile applications and device types
  • Security policy for mobile applications
  • Cloud Application Controls

  • Granular application controls (i.e., allow viewing/block uploads)
  • Streaming media - YouTube, Hulu, Google video, etc.
  • Social networking and blogs - Facebook, Twitter, Orkut, etc.
  • Webmail and Web IM - Gmail, Yahoo mail, Hotmail, etc.
  • Collaboration, business applications
  • Advanced Threat Protection

  • Botnet protection (C2 servers)
  • Botnet protection (C2 traffic)
  • Cross-site scripting (XSS) protection (cookie stealing; potentially malicious requests)
  • Fraud protection - known phishing sites
  • Fraud protection - suspected phishing sites
  • Fraud protection - spyware callback
  • Fraud protection - web spam
  • Malicious active content protection - browser exploits
  • Malicious active content protection (malicious content and sites, vulnerable ActiveX controls,
    file format vulnerabilities, blocked malicious URLs)
  • P2P file sharing protection (BitTorrent)
  • P2P anonymizer protection (Tor)
  • P2P VoIP protection (Google Talk, Skype)
  • Suspicious content protection (PageRiskTM)
  • Suspicious destinations protection (blocked countries)
  • Unauthorized communication protection (IRC tunneling)
  • Unauthorized communication protection (SSH tunneling)
  • Unauthorized communication protection (Anonymizers)
  • SSL Inspection

  • SSL inspection of any content with 2048 bit certificate support
  • Granular policy for exclusion of content to be inspected