SlideShare a Scribd company logo
Protección y acceso a tu información y
aplicaciones en Azure y O365
Version 3.0 | May 2016
Miguel López
Country Manager – Iberia
mlopez@barracuda.com
Who is Barracuda Networks?
• FirstsecurityvendorcommerciallyenabledintheAzure
marketplace
• FirstMicrosoftAzureCertifiedsecurityappliance
• Firstsecurityvendor toprovideadditional
enhancementstoExpressRoute
• FirstinfrastructurevendorintegratedwithAzureAD&
SecurityCenter
• FirstsecurityvendortosupportAzureAppService
environment
• Winnerfor2016MicrosoftAzureCertifiedISVSolution
PartneroftheYear
StorageSecurity
Barracuda NG Firewall
Barracuda Email Security
Barracuda Web Security
Barracuda Firewall
Barracuda
Web Application Firewall
Barracuda Load Balancer ADC
Barracuda SSL VPN
Barracuda Link Balancer
Barracuda Backup
Barracuda
Message Archiver
Barracuda CudaSign
Comprehensive Portfolio
No Per-User Fees 30 Day Eval Hardware Refresh
A reputed provider
A reputed provider
A reputed provider
You define controls
and security
IN the CloudYour company
Customer’s Responsibility in a Shared
Security Model
Azure takes care of the
Security
OF the Cloud
Azure Platform
Physical
Infrastructure
Network
Infrastructure
Virtualization
Layer
Customer Applications & Content
Network Security
Identity &
Access Control
Operating
Systems / Platform
Data Encryption
Barracuda Security Solutions for Microsoft
Accelerating Your Journey to a Safe Cloud
Security
Ensure users, data and
applications are protected
Employ multi-layer security,
data protection technology
Optimize user productivity
Improve company-wide
collaboration and minimize
employee downtime
Compliance
Seamless, unified experience
Continue the same level of
familiarity with the technologies
as workloads are moved from
on-premises to the cloud
Migration
Maximize Azure investment
Overcome potential adoption
challenges to realize the value
of your investment faster
Control
Barracuda Web Application Firewall
Websites are the Least Secured Vector
0%
2%
2%
4%
5%
7%
8%
9%
23%
40%
DoS Attacks
Crimeware
Physical Theft/Loss
Payment Card Skimmers
Everything Else
Cyber-espionage
Privilege Misuse
Miscellaneous Errors
POS Intrusions
Web App Attacks
FREQUENCY OF INCIDENTS
Source: Verizon Data Breach Report, 2016
Web App Threats: the Top Emerging Vector
Percentage of
vulnerabilities that
are web-based
80%
Percentage of
cyberattacks that
target web
applications
75%
Number of malicious
ad impressions
per year
$12B
Number of websites
defaced in the last
five years
$5M
Recognized by NSS Labs
A Leader in security effectiveness
99.9%
100%
100%
0.71%
Security effectiveness
Highest Marks
Against evasion techniques
Stability and reliability tests
False positive rate
App-AwareFirewalls Don’t SecureWebApps
Network
Firewall
Layer 7
Network Firewall
IDS/IPS Web
Server
HTTP Request
(legitimate)
HTTP Request
(attack)
TCP Port 80
TCP Port 80
HTTP
TCP Port 80 HTTP
No matching Signature
WAFs vs.…
Network
Firewall
Layer 7
Network Firewall
IDS/IPS Web
Application
Firewall
Web
Server
HTTP Request
(legitimate)
HTTP Request
(attack)
TCP Port 80
TCP Port 80
HTTP
TCP Port 80 HTTP
No matching Signature
Obfuscated XSS attack
Request blocked
Complete Application Protection
Outbound InspectionInbound Inspection
Comprehensive Application Security
OWASP Top-10 Attacks
Application DDOS
Proactive Defense
Geo-IP Control
Application Cloaking
Data Loss Prevention
Credit Card Numbers
Social Security Number
Custom Patterns
Authentication
& Access
Control
Logging &
Reporting
Barracuda Vulnerability Manager
• Scan for web application vulnerabilities across entire website
• Granular capability
• Detailed vulnerability scan reports
• Integration with Barracuda Web Application Firewall
• Free service forever
Easy Identification and Remediation
Azure AD Integration
Azure Active Directory integration
for identity
and access management for the
cloud
Application Security
Protecting custom apps from SQL
injection,
cross-site scripting, application
distributed denial-of-service (DDoS)
Load Balancing
Load balancing with persistence for
highly
secure and scalable application
infrastructure
Data Loss Prevention
Inspecting all inbound traffic for
attacks and outbound traffic for
sensitive data
ADFS
Microsoft Active Directory
Federation Services (ADFS) can
provide security as well as pre-
authentication
Most Common Use Cases
Dynamic Scaling in Azure
Protect Multiple Applications with Single Cluster of WAFs Use Case – Web Apps
Barracuda NextGen Firewall F
Cloud Security Threats
Community gaps
Exploited system
vulnerabilities
Remote access
Barracuda NextGen Firewall F on Azure
The Ultimate Protection Against Network Security Threats
Networking &
Infrastructure
 IPS/IDS
 Integrated intrusion prevention
 URL filtering
 User and application aware
 IPsec VPNs secure remote connectivity
 Dynamically scales with your network
Networking Protection
Multi-Tier Architecture
Build secure multi-tier architecture
in Azure to keep a level of
segregation between tiers
VPN Tunnels
Unlimited site-to-site VPN tunnels to
connect two networks protected by
F-Series Firewalls
Traffic Control
Inbound/outbound traffic control while
providing IPS/IDS functionality and
control traffic based on application,
URL, AV, user
Access to Resources
Access to resources in Azure
(unlimited client-to-site VPN, SSL VPN)
ExpressRoute
Visibility and control on all traffic
coming across the ExpressRoute
connection
Most Common Use Cases
Deploying Multi-Tier Network Architectures
WAF Tier Web Tier App Tier
FW Tier
DB Tier
VNET
Use Case – Multi-Tier
Deploying Multi-Tier Architecture in Azure
Secure remote access for
mobile users
• Dedicated VPN clients available for Windows,
Mac, Linux
• Clientless SSL VPN
• Multiple supported protocols: TINA, IPsec, L2TP,
PPTP
Multiple site-to-site
connectivity
• VNET-to-VNET connectivity
• Automatic user ID synchronization across sites
• Supports multiple ISPs
• Built-in WAN optimization
• Full ExpressRoute support
Comprehensive
security enforcement
• Internal and cross-region
network segmentation
• Access control based on user
and instance identity
• Full traffic visibility and monitoring
Use Case – Multi-Tier
ExpressRoute Architecture with F-Series
LAN / DC
Public Internet
router network
ER local
network
Transport networks (public / private) Azure VNet
MPLS Router
NGF
on-prem
Express Route
Azure
Gateway
Web Tier
App Tier
FW Tier DB Tier
ExpressRoute Architecture with F-Series
LAN / DC
Public Internet
router network
ER local
network
Transport networks (public / private) Azure VNet
MPLS Router
NGF
on-prem
Express Route
Azure
Gateway
Internet
Internet Router
Web Tier
App Tier
FW Tier DB Tier
Use Case - ExpressRoute
Protecting Microsoft Azure ExpressRoute
Security
• Encrypts traffic across ExpressRoute
• Prevents direct traffic flow between
applications and the cloud
• Inspects and logs all inbound
and outbound traffic for
reporting purposes
Reliability
• VNET-to-VNET connectivity
• Automatically sets up a VPN for secondary
connection in the
event of failure
• Allows multiple ExpressRoutes;
one primary and one secondary
Intelligence
• Prioritizes traffic from any specified application
and sends it via a configured link
• Blocks specific application traffic from going to
and from Azure
• Allows or denies certain users based on
credentials and access privileges
Use Case – ExpressRoute
Secure, High Performance Connectivity
Barracuda NextGen
Control Center
Major brand
VPN client
On-premises
F-Series
Remote
Access
CudaLaunch
app
Dedicated VPN
and NAC Clients
Browser-based
SSL VPN
XY
On-premises 3rd party
Next-Generation Firewall
XY
Data Center
1
Data Center
N
Standard IPsec VPN
Secure, High Performance Connectivity
Barracuda NextGen
Control Center
Major brand
VPN client
On-premises
F-Series
Remote
Access
CudaLaunch
app
Dedicated VPN
and NAC Clients
Browser-based
SSL VPN
XY
On-premises 3rd party
Next-Generation Firewall
XY
Data Center
1
Data Center
N
Standard IPsec VPN
Secure, High Performance Connectivity
Barracuda NextGen
Control Center
Major brand
VPN client
On-premises
F-Series
Remote
Access
CudaLaunch
app
Dedicated VPN
and NAC Clients
Browser-based
SSL VPN
XY
On-premises 3rd party
Next-Generation Firewall
XY
Data Center
1
Data Center
N
Standard IPsec VPN
TINA VPN Mgmt Tunnels
Barracuda Email Security Service for O365
Barracuda Email Security Service
Easy-to-use, cloud-based email security
• Industry-leading spam and virus defense with a long-standing heritage
• Protection against zero-hour and targeted attacks with ADVANCED THREAT
DETECTION
• Agentless Encryption without complicated key management
• Email Continuity Service Ensure business continuity and email user access
up to 96 hours during email server disruptions
• Real-Time-Protection & Threat Intelligence, 24x7 support by Barracuda
Central
• Advanced, granular policy management
• Protection from data loss and reputation damage
Block
File or Email
Allow
File or Email
Full system emulation sandbox
Safely open files to identify risks
Remote detonation of malicious payload
Without compromising security at the
expense of user experience
Signatures
Virus Protection
Malware protection
IP reputation
Heuristics (static analysis)
Sandboxing (dynamic analysis)
Introducing Barracuda Email Threat Scanner
• BarracudaEmail Threat Scanner(ETS)
• Cloud-basedservicethatprovidesanon-intrusive
O365mailboxscantoidentifyadvancedthreatsat
restandtheownersofsaidthreats.
• Providesdetailedreportsandrecommendations
ETScanhelptosellEssentials
• DemonstratevalueofAdvancedThreatDetection
• DemonstratevalueofEssentialsontopofEOP
• Onboardcustomersintwoclicks
• Providepersonalriskassessment
Barracuda Cloud Archiving Service for
O365
Barracuda Cloud Archiving Service
Cloud-based archiving from Office 365
for compliance and eDiscovery
• 100% cloud-based SaaS (no HW/SW). Unlimited Storage
• Hosted in secure Barracuda Cloud in EMEA
• eDiscovery search, hold, and export
• Import historical data (Exchange/Office 365). PST migration with PST
Enterprise
• Role-based administration
• Full-featured mobile app
• Works with Exchange and Office 365, including hybrid deployment
• Easy management for inactive users
Barracuda Cloud to Cloud Backup for
O365
Cloud-to-Cloud Backup
Cloud-to-cloud backup option for Office 365
mailboxes, SharePoint Online and OneDrive for
Business
• Protect against accidental deletion
• Set custom retention policies with unlimited storage capacity (daily
retention for ever)
• Automatic or manual backups
• Multi-selection restores
• All-in-one protection for data hosted locally and offsite.
• Integrated management with Backup appliances for local server data
retention (optional)
Barracuda Essentials Editions
Conclusion: Microsoft & Barracuda offering
On-Premises Azure/Public Cloud SaaS
• Hardware and virtual appliances offer Exchange & Office 365 integration, greater control
over security, compliance, and data protection policies • Rapid deployment, 100% hardware free,
low management overhead
Email Security
Gateway
Next-Gen
Firewall
Archiving PST Mgt. Backup
Email Security
Gateway
Next-Gen
Firewall
Web Application
Firewall
Archiving
BackupArchivingEmail
Security
Service
PST Mgt.
Next Steps and Resources
1. Learn more
For a rich library of resources, visit the Barracuda Azure website www.barracuda.com/azure and the Barracuda O365
https://www.barracuda.com/products/essentials
2. Contact Barracuda
azure_support@barracuda.com / Iberia_Team@barracuda.com
3. Start a 30-day free trial
• https://azure.microsoft.com/en-us/marketplace/partners/barracudanetworks/barracuda-wafwaf-byol/
• https://azure.microsoft.com/en-us/marketplace/partners/barracudanetworks/barracuda-ng-firewall/
• https://azure.microsoft.com/en-us/marketplace/partners/barracudanetworks/barracuda-ng-cc/
• https://billing.barracudanetworks.com/service/select?service=o365&barracuda_web_visitor_id=24349309
AskTryContactLearn
Videos Technical Briefs Deployment Architecture Diagrams
Thank you
Miguel López
Country Manager – Iberia
mlopez@barracuda.com

More Related Content

What's hot

Govern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for SuccessGovern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for Success
Alert Logic
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
Five Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureFive Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud Architecture
Amazon Web Services
 
CSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeCSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in Practice
Alert Logic
 
Barracuda in Microsoft Azure
Barracuda in Microsoft AzureBarracuda in Microsoft Azure
Barracuda in Microsoft Azure
responsiveX
 
Azure Saturday: Security + DevOps + Azure = Awesomeness
Azure Saturday: Security + DevOps + Azure = AwesomenessAzure Saturday: Security + DevOps + Azure = Awesomeness
Azure Saturday: Security + DevOps + Azure = Awesomeness
Karl Ots
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
Gaurav "GP" Pal
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Alert Logic
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
Alert Logic
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
Amazon Web Services
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Amazon Web Services
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
 
Power of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure securityPower of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure security
Bruno Capuano
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
Amazon Web Services
 
CSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web AppsCSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web Apps
Alert Logic
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
Allen Brokken
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in Practice
Alert Logic
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
AWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAmazon Web Services
 

What's hot (20)

Govern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for SuccessGovern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for Success
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Five Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureFive Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud Architecture
 
CSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeCSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in Practice
 
Barracuda in Microsoft Azure
Barracuda in Microsoft AzureBarracuda in Microsoft Azure
Barracuda in Microsoft Azure
 
Azure Saturday: Security + DevOps + Azure = Awesomeness
Azure Saturday: Security + DevOps + Azure = AwesomenessAzure Saturday: Security + DevOps + Azure = Awesomeness
Azure Saturday: Security + DevOps + Azure = Awesomeness
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Power of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure securityPower of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure security
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
CSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web AppsCSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web Apps
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in Practice
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
AWS Security
AWS Security AWS Security
AWS Security
 
AWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - Keynote
 

Similar to Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda

CCI2019 - Architecting and Implementing Azure Networking
CCI2019 - Architecting and Implementing Azure NetworkingCCI2019 - Architecting and Implementing Azure Networking
CCI2019 - Architecting and Implementing Azure Networking
walk2talk srl
 
Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185
jtaylor707
 
Brk30176 enterprise class networking in azure
Brk30176 enterprise class networking in azureBrk30176 enterprise class networking in azure
Brk30176 enterprise class networking in azure
Abou CONDE
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-security
ober64
 
CCI2018 - Azure Network - Security Best Practices
CCI2018 - Azure Network - Security Best PracticesCCI2018 - Azure Network - Security Best Practices
CCI2018 - Azure Network - Security Best Practices
walk2talk srl
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
Robb Boyd
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Canada
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
Amazon Web Services
 
Staying Secure in the Cloud
Staying Secure in the CloudStaying Secure in the Cloud
Staying Secure in the Cloud
Amazon Web Services
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
MarketingArrowECS_CZ
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
Amazon Web Services
 
Manjesh cv
Manjesh cvManjesh cv
Manjesh cv
Manjesh N
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud Adoption
Amazon Web Services
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
Robb Boyd
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
Amazon Web Services
 
Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network Security
Scott Hoag
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
Ajay Nawani
 

Similar to Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda (20)

CCI2019 - Architecting and Implementing Azure Networking
CCI2019 - Architecting and Implementing Azure NetworkingCCI2019 - Architecting and Implementing Azure Networking
CCI2019 - Architecting and Implementing Azure Networking
 
Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185Securing your cloud perimeter with azure network security brk3185
Securing your cloud perimeter with azure network security brk3185
 
Brk30176 enterprise class networking in azure
Brk30176 enterprise class networking in azureBrk30176 enterprise class networking in azure
Brk30176 enterprise class networking in azure
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-security
 
CCI2018 - Azure Network - Security Best Practices
CCI2018 - Azure Network - Security Best PracticesCCI2018 - Azure Network - Security Best Practices
CCI2018 - Azure Network - Security Best Practices
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
Staying Secure in the Cloud
Staying Secure in the CloudStaying Secure in the Cloud
Staying Secure in the Cloud
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
 
Manjesh cv
Manjesh cvManjesh cv
Manjesh cv
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud Adoption
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network Security
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 

More from Plain Concepts

R y Python con Power BI, la ciencia y el análisis de datos, juntos
R y Python con Power BI, la ciencia y el análisis de datos, juntosR y Python con Power BI, la ciencia y el análisis de datos, juntos
R y Python con Power BI, la ciencia y el análisis de datos, juntos
Plain Concepts
 
Video kills the radio star: e-mail is crap and needed disruption
 Video kills the radio star: e-mail is crap and needed disruption Video kills the radio star: e-mail is crap and needed disruption
Video kills the radio star: e-mail is crap and needed disruption
Plain Concepts
 
Cómo redefinir tu organización con IA
Cómo redefinir tu organización con IACómo redefinir tu organización con IA
Cómo redefinir tu organización con IA
Plain Concepts
 
Dx29: assisting genetic disease diagnosis with physician-focused AI pipelines
Dx29: assisting genetic disease diagnosis with physician-focused AI pipelinesDx29: assisting genetic disease diagnosis with physician-focused AI pipelines
Dx29: assisting genetic disease diagnosis with physician-focused AI pipelines
Plain Concepts
 
¿Qué es real? Cuando la IA intenta engañar al ojo humano
¿Qué es real? Cuando la IA intenta engañar al ojo humano¿Qué es real? Cuando la IA intenta engañar al ojo humano
¿Qué es real? Cuando la IA intenta engañar al ojo humano
Plain Concepts
 
Inteligencia artificial para detectar el cáncer de mama
Inteligencia artificial para  detectar el cáncer de mamaInteligencia artificial para  detectar el cáncer de mama
Inteligencia artificial para detectar el cáncer de mama
Plain Concepts
 
¿Está tu compañía preparada para el reto de la Inteligencia Artificial?
¿Está tu compañía preparada para el reto de la Inteligencia Artificial?¿Está tu compañía preparada para el reto de la Inteligencia Artificial?
¿Está tu compañía preparada para el reto de la Inteligencia Artificial?
Plain Concepts
 
Cognitive Services en acción
Cognitive Services en acciónCognitive Services en acción
Cognitive Services en acción
Plain Concepts
 
El Hogar Inteligente. De los datos de IoT a los hábitos de una familia a trav...
El Hogar Inteligente. De los datos de IoT a los hábitos de una familia a trav...El Hogar Inteligente. De los datos de IoT a los hábitos de una familia a trav...
El Hogar Inteligente. De los datos de IoT a los hábitos de una familia a trav...
Plain Concepts
 
What if AI was your daughter?
What if AI was your daughter?What if AI was your daughter?
What if AI was your daughter?
Plain Concepts
 
Recomendación Basada en Contenidos con Deep Learning: Qué queríamos hacer, Qu...
Recomendación Basada en Contenidos con Deep Learning: Qué queríamos hacer, Qu...Recomendación Basada en Contenidos con Deep Learning: Qué queríamos hacer, Qu...
Recomendación Basada en Contenidos con Deep Learning: Qué queríamos hacer, Qu...
Plain Concepts
 
Revolucionando la experiencia de cliente con Big Data e IA
Revolucionando la experiencia de cliente con Big Data e IARevolucionando la experiencia de cliente con Big Data e IA
Revolucionando la experiencia de cliente con Big Data e IA
Plain Concepts
 
IA Score en InfoJobs
IA Score en InfoJobsIA Score en InfoJobs
IA Score en InfoJobs
Plain Concepts
 
Recuperación de información para solicitantes de empleo
Recuperación de información para solicitantes de empleoRecuperación de información para solicitantes de empleo
Recuperación de información para solicitantes de empleo
Plain Concepts
 
La nueva revolución Industrial: Inteligencia Artificial & IoT Edge
La nueva revolución Industrial: Inteligencia Artificial & IoT EdgeLa nueva revolución Industrial: Inteligencia Artificial & IoT Edge
La nueva revolución Industrial: Inteligencia Artificial & IoT Edge
Plain Concepts
 
DotNet 2019 | Sherry List - Azure Cognitive Services with Native Script
DotNet 2019 | Sherry List - Azure Cognitive Services with Native ScriptDotNet 2019 | Sherry List - Azure Cognitive Services with Native Script
DotNet 2019 | Sherry List - Azure Cognitive Services with Native Script
Plain Concepts
 
DotNet 2019 | Quique Fernández - Potenciando VUE con TypeScript, Inversify, V...
DotNet 2019 | Quique Fernández - Potenciando VUE con TypeScript, Inversify, V...DotNet 2019 | Quique Fernández - Potenciando VUE con TypeScript, Inversify, V...
DotNet 2019 | Quique Fernández - Potenciando VUE con TypeScript, Inversify, V...
Plain Concepts
 
DotNet 2019 | Daniela Solís y Manuel Rodrigo Cabello - IoT, una Raspberry Pi ...
DotNet 2019 | Daniela Solís y Manuel Rodrigo Cabello - IoT, una Raspberry Pi ...DotNet 2019 | Daniela Solís y Manuel Rodrigo Cabello - IoT, una Raspberry Pi ...
DotNet 2019 | Daniela Solís y Manuel Rodrigo Cabello - IoT, una Raspberry Pi ...
Plain Concepts
 
El camino a las Cloud Native Apps - Introduction
El camino a las Cloud Native Apps - IntroductionEl camino a las Cloud Native Apps - Introduction
El camino a las Cloud Native Apps - Introduction
Plain Concepts
 
El camino a las Cloud Native Apps - Azure AI
El camino a las Cloud Native Apps - Azure AIEl camino a las Cloud Native Apps - Azure AI
El camino a las Cloud Native Apps - Azure AI
Plain Concepts
 

More from Plain Concepts (20)

R y Python con Power BI, la ciencia y el análisis de datos, juntos
R y Python con Power BI, la ciencia y el análisis de datos, juntosR y Python con Power BI, la ciencia y el análisis de datos, juntos
R y Python con Power BI, la ciencia y el análisis de datos, juntos
 
Video kills the radio star: e-mail is crap and needed disruption
 Video kills the radio star: e-mail is crap and needed disruption Video kills the radio star: e-mail is crap and needed disruption
Video kills the radio star: e-mail is crap and needed disruption
 
Cómo redefinir tu organización con IA
Cómo redefinir tu organización con IACómo redefinir tu organización con IA
Cómo redefinir tu organización con IA
 
Dx29: assisting genetic disease diagnosis with physician-focused AI pipelines
Dx29: assisting genetic disease diagnosis with physician-focused AI pipelinesDx29: assisting genetic disease diagnosis with physician-focused AI pipelines
Dx29: assisting genetic disease diagnosis with physician-focused AI pipelines
 
¿Qué es real? Cuando la IA intenta engañar al ojo humano
¿Qué es real? Cuando la IA intenta engañar al ojo humano¿Qué es real? Cuando la IA intenta engañar al ojo humano
¿Qué es real? Cuando la IA intenta engañar al ojo humano
 
Inteligencia artificial para detectar el cáncer de mama
Inteligencia artificial para  detectar el cáncer de mamaInteligencia artificial para  detectar el cáncer de mama
Inteligencia artificial para detectar el cáncer de mama
 
¿Está tu compañía preparada para el reto de la Inteligencia Artificial?
¿Está tu compañía preparada para el reto de la Inteligencia Artificial?¿Está tu compañía preparada para el reto de la Inteligencia Artificial?
¿Está tu compañía preparada para el reto de la Inteligencia Artificial?
 
Cognitive Services en acción
Cognitive Services en acciónCognitive Services en acción
Cognitive Services en acción
 
El Hogar Inteligente. De los datos de IoT a los hábitos de una familia a trav...
El Hogar Inteligente. De los datos de IoT a los hábitos de una familia a trav...El Hogar Inteligente. De los datos de IoT a los hábitos de una familia a trav...
El Hogar Inteligente. De los datos de IoT a los hábitos de una familia a trav...
 
What if AI was your daughter?
What if AI was your daughter?What if AI was your daughter?
What if AI was your daughter?
 
Recomendación Basada en Contenidos con Deep Learning: Qué queríamos hacer, Qu...
Recomendación Basada en Contenidos con Deep Learning: Qué queríamos hacer, Qu...Recomendación Basada en Contenidos con Deep Learning: Qué queríamos hacer, Qu...
Recomendación Basada en Contenidos con Deep Learning: Qué queríamos hacer, Qu...
 
Revolucionando la experiencia de cliente con Big Data e IA
Revolucionando la experiencia de cliente con Big Data e IARevolucionando la experiencia de cliente con Big Data e IA
Revolucionando la experiencia de cliente con Big Data e IA
 
IA Score en InfoJobs
IA Score en InfoJobsIA Score en InfoJobs
IA Score en InfoJobs
 
Recuperación de información para solicitantes de empleo
Recuperación de información para solicitantes de empleoRecuperación de información para solicitantes de empleo
Recuperación de información para solicitantes de empleo
 
La nueva revolución Industrial: Inteligencia Artificial & IoT Edge
La nueva revolución Industrial: Inteligencia Artificial & IoT EdgeLa nueva revolución Industrial: Inteligencia Artificial & IoT Edge
La nueva revolución Industrial: Inteligencia Artificial & IoT Edge
 
DotNet 2019 | Sherry List - Azure Cognitive Services with Native Script
DotNet 2019 | Sherry List - Azure Cognitive Services with Native ScriptDotNet 2019 | Sherry List - Azure Cognitive Services with Native Script
DotNet 2019 | Sherry List - Azure Cognitive Services with Native Script
 
DotNet 2019 | Quique Fernández - Potenciando VUE con TypeScript, Inversify, V...
DotNet 2019 | Quique Fernández - Potenciando VUE con TypeScript, Inversify, V...DotNet 2019 | Quique Fernández - Potenciando VUE con TypeScript, Inversify, V...
DotNet 2019 | Quique Fernández - Potenciando VUE con TypeScript, Inversify, V...
 
DotNet 2019 | Daniela Solís y Manuel Rodrigo Cabello - IoT, una Raspberry Pi ...
DotNet 2019 | Daniela Solís y Manuel Rodrigo Cabello - IoT, una Raspberry Pi ...DotNet 2019 | Daniela Solís y Manuel Rodrigo Cabello - IoT, una Raspberry Pi ...
DotNet 2019 | Daniela Solís y Manuel Rodrigo Cabello - IoT, una Raspberry Pi ...
 
El camino a las Cloud Native Apps - Introduction
El camino a las Cloud Native Apps - IntroductionEl camino a las Cloud Native Apps - Introduction
El camino a las Cloud Native Apps - Introduction
 
El camino a las Cloud Native Apps - Azure AI
El camino a las Cloud Native Apps - Azure AIEl camino a las Cloud Native Apps - Azure AI
El camino a las Cloud Native Apps - Azure AI
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda

  • 1. Protección y acceso a tu información y aplicaciones en Azure y O365 Version 3.0 | May 2016 Miguel López Country Manager – Iberia mlopez@barracuda.com
  • 2. Who is Barracuda Networks? • FirstsecurityvendorcommerciallyenabledintheAzure marketplace • FirstMicrosoftAzureCertifiedsecurityappliance • Firstsecurityvendor toprovideadditional enhancementstoExpressRoute • FirstinfrastructurevendorintegratedwithAzureAD& SecurityCenter • FirstsecurityvendortosupportAzureAppService environment • Winnerfor2016MicrosoftAzureCertifiedISVSolution PartneroftheYear
  • 3. StorageSecurity Barracuda NG Firewall Barracuda Email Security Barracuda Web Security Barracuda Firewall Barracuda Web Application Firewall Barracuda Load Balancer ADC Barracuda SSL VPN Barracuda Link Balancer Barracuda Backup Barracuda Message Archiver Barracuda CudaSign Comprehensive Portfolio No Per-User Fees 30 Day Eval Hardware Refresh
  • 7. You define controls and security IN the CloudYour company Customer’s Responsibility in a Shared Security Model Azure takes care of the Security OF the Cloud Azure Platform Physical Infrastructure Network Infrastructure Virtualization Layer Customer Applications & Content Network Security Identity & Access Control Operating Systems / Platform Data Encryption
  • 8. Barracuda Security Solutions for Microsoft Accelerating Your Journey to a Safe Cloud Security Ensure users, data and applications are protected Employ multi-layer security, data protection technology Optimize user productivity Improve company-wide collaboration and minimize employee downtime Compliance Seamless, unified experience Continue the same level of familiarity with the technologies as workloads are moved from on-premises to the cloud Migration Maximize Azure investment Overcome potential adoption challenges to realize the value of your investment faster Control
  • 9.
  • 11. Websites are the Least Secured Vector 0% 2% 2% 4% 5% 7% 8% 9% 23% 40% DoS Attacks Crimeware Physical Theft/Loss Payment Card Skimmers Everything Else Cyber-espionage Privilege Misuse Miscellaneous Errors POS Intrusions Web App Attacks FREQUENCY OF INCIDENTS Source: Verizon Data Breach Report, 2016
  • 12. Web App Threats: the Top Emerging Vector Percentage of vulnerabilities that are web-based 80% Percentage of cyberattacks that target web applications 75% Number of malicious ad impressions per year $12B Number of websites defaced in the last five years $5M
  • 13. Recognized by NSS Labs A Leader in security effectiveness 99.9% 100% 100% 0.71% Security effectiveness Highest Marks Against evasion techniques Stability and reliability tests False positive rate
  • 14. App-AwareFirewalls Don’t SecureWebApps Network Firewall Layer 7 Network Firewall IDS/IPS Web Server HTTP Request (legitimate) HTTP Request (attack) TCP Port 80 TCP Port 80 HTTP TCP Port 80 HTTP No matching Signature
  • 15. WAFs vs.… Network Firewall Layer 7 Network Firewall IDS/IPS Web Application Firewall Web Server HTTP Request (legitimate) HTTP Request (attack) TCP Port 80 TCP Port 80 HTTP TCP Port 80 HTTP No matching Signature Obfuscated XSS attack Request blocked
  • 16. Complete Application Protection Outbound InspectionInbound Inspection Comprehensive Application Security OWASP Top-10 Attacks Application DDOS Proactive Defense Geo-IP Control Application Cloaking Data Loss Prevention Credit Card Numbers Social Security Number Custom Patterns Authentication & Access Control Logging & Reporting
  • 17. Barracuda Vulnerability Manager • Scan for web application vulnerabilities across entire website • Granular capability • Detailed vulnerability scan reports • Integration with Barracuda Web Application Firewall • Free service forever
  • 18. Easy Identification and Remediation
  • 19. Azure AD Integration Azure Active Directory integration for identity and access management for the cloud Application Security Protecting custom apps from SQL injection, cross-site scripting, application distributed denial-of-service (DDoS) Load Balancing Load balancing with persistence for highly secure and scalable application infrastructure Data Loss Prevention Inspecting all inbound traffic for attacks and outbound traffic for sensitive data ADFS Microsoft Active Directory Federation Services (ADFS) can provide security as well as pre- authentication Most Common Use Cases
  • 20. Dynamic Scaling in Azure Protect Multiple Applications with Single Cluster of WAFs Use Case – Web Apps
  • 22. Cloud Security Threats Community gaps Exploited system vulnerabilities Remote access Barracuda NextGen Firewall F on Azure The Ultimate Protection Against Network Security Threats Networking & Infrastructure  IPS/IDS  Integrated intrusion prevention  URL filtering  User and application aware  IPsec VPNs secure remote connectivity  Dynamically scales with your network Networking Protection
  • 23. Multi-Tier Architecture Build secure multi-tier architecture in Azure to keep a level of segregation between tiers VPN Tunnels Unlimited site-to-site VPN tunnels to connect two networks protected by F-Series Firewalls Traffic Control Inbound/outbound traffic control while providing IPS/IDS functionality and control traffic based on application, URL, AV, user Access to Resources Access to resources in Azure (unlimited client-to-site VPN, SSL VPN) ExpressRoute Visibility and control on all traffic coming across the ExpressRoute connection Most Common Use Cases
  • 24. Deploying Multi-Tier Network Architectures WAF Tier Web Tier App Tier FW Tier DB Tier VNET
  • 25. Use Case – Multi-Tier Deploying Multi-Tier Architecture in Azure Secure remote access for mobile users • Dedicated VPN clients available for Windows, Mac, Linux • Clientless SSL VPN • Multiple supported protocols: TINA, IPsec, L2TP, PPTP Multiple site-to-site connectivity • VNET-to-VNET connectivity • Automatic user ID synchronization across sites • Supports multiple ISPs • Built-in WAN optimization • Full ExpressRoute support Comprehensive security enforcement • Internal and cross-region network segmentation • Access control based on user and instance identity • Full traffic visibility and monitoring Use Case – Multi-Tier
  • 26. ExpressRoute Architecture with F-Series LAN / DC Public Internet router network ER local network Transport networks (public / private) Azure VNet MPLS Router NGF on-prem Express Route Azure Gateway Web Tier App Tier FW Tier DB Tier
  • 27. ExpressRoute Architecture with F-Series LAN / DC Public Internet router network ER local network Transport networks (public / private) Azure VNet MPLS Router NGF on-prem Express Route Azure Gateway Internet Internet Router Web Tier App Tier FW Tier DB Tier
  • 28. Use Case - ExpressRoute Protecting Microsoft Azure ExpressRoute Security • Encrypts traffic across ExpressRoute • Prevents direct traffic flow between applications and the cloud • Inspects and logs all inbound and outbound traffic for reporting purposes Reliability • VNET-to-VNET connectivity • Automatically sets up a VPN for secondary connection in the event of failure • Allows multiple ExpressRoutes; one primary and one secondary Intelligence • Prioritizes traffic from any specified application and sends it via a configured link • Blocks specific application traffic from going to and from Azure • Allows or denies certain users based on credentials and access privileges Use Case – ExpressRoute
  • 29. Secure, High Performance Connectivity Barracuda NextGen Control Center Major brand VPN client On-premises F-Series Remote Access CudaLaunch app Dedicated VPN and NAC Clients Browser-based SSL VPN XY On-premises 3rd party Next-Generation Firewall XY Data Center 1 Data Center N Standard IPsec VPN
  • 30. Secure, High Performance Connectivity Barracuda NextGen Control Center Major brand VPN client On-premises F-Series Remote Access CudaLaunch app Dedicated VPN and NAC Clients Browser-based SSL VPN XY On-premises 3rd party Next-Generation Firewall XY Data Center 1 Data Center N Standard IPsec VPN
  • 31. Secure, High Performance Connectivity Barracuda NextGen Control Center Major brand VPN client On-premises F-Series Remote Access CudaLaunch app Dedicated VPN and NAC Clients Browser-based SSL VPN XY On-premises 3rd party Next-Generation Firewall XY Data Center 1 Data Center N Standard IPsec VPN TINA VPN Mgmt Tunnels
  • 32. Barracuda Email Security Service for O365
  • 33. Barracuda Email Security Service Easy-to-use, cloud-based email security • Industry-leading spam and virus defense with a long-standing heritage • Protection against zero-hour and targeted attacks with ADVANCED THREAT DETECTION • Agentless Encryption without complicated key management • Email Continuity Service Ensure business continuity and email user access up to 96 hours during email server disruptions • Real-Time-Protection & Threat Intelligence, 24x7 support by Barracuda Central • Advanced, granular policy management • Protection from data loss and reputation damage
  • 34. Block File or Email Allow File or Email Full system emulation sandbox Safely open files to identify risks Remote detonation of malicious payload Without compromising security at the expense of user experience Signatures Virus Protection Malware protection IP reputation Heuristics (static analysis) Sandboxing (dynamic analysis)
  • 35. Introducing Barracuda Email Threat Scanner • BarracudaEmail Threat Scanner(ETS) • Cloud-basedservicethatprovidesanon-intrusive O365mailboxscantoidentifyadvancedthreatsat restandtheownersofsaidthreats. • Providesdetailedreportsandrecommendations ETScanhelptosellEssentials • DemonstratevalueofAdvancedThreatDetection • DemonstratevalueofEssentialsontopofEOP • Onboardcustomersintwoclicks • Providepersonalriskassessment
  • 36. Barracuda Cloud Archiving Service for O365
  • 37. Barracuda Cloud Archiving Service Cloud-based archiving from Office 365 for compliance and eDiscovery • 100% cloud-based SaaS (no HW/SW). Unlimited Storage • Hosted in secure Barracuda Cloud in EMEA • eDiscovery search, hold, and export • Import historical data (Exchange/Office 365). PST migration with PST Enterprise • Role-based administration • Full-featured mobile app • Works with Exchange and Office 365, including hybrid deployment • Easy management for inactive users
  • 38. Barracuda Cloud to Cloud Backup for O365
  • 39. Cloud-to-Cloud Backup Cloud-to-cloud backup option for Office 365 mailboxes, SharePoint Online and OneDrive for Business • Protect against accidental deletion • Set custom retention policies with unlimited storage capacity (daily retention for ever) • Automatic or manual backups • Multi-selection restores • All-in-one protection for data hosted locally and offsite. • Integrated management with Backup appliances for local server data retention (optional)
  • 41. Conclusion: Microsoft & Barracuda offering On-Premises Azure/Public Cloud SaaS • Hardware and virtual appliances offer Exchange & Office 365 integration, greater control over security, compliance, and data protection policies • Rapid deployment, 100% hardware free, low management overhead Email Security Gateway Next-Gen Firewall Archiving PST Mgt. Backup Email Security Gateway Next-Gen Firewall Web Application Firewall Archiving BackupArchivingEmail Security Service PST Mgt.
  • 42. Next Steps and Resources 1. Learn more For a rich library of resources, visit the Barracuda Azure website www.barracuda.com/azure and the Barracuda O365 https://www.barracuda.com/products/essentials 2. Contact Barracuda azure_support@barracuda.com / Iberia_Team@barracuda.com 3. Start a 30-day free trial • https://azure.microsoft.com/en-us/marketplace/partners/barracudanetworks/barracuda-wafwaf-byol/ • https://azure.microsoft.com/en-us/marketplace/partners/barracudanetworks/barracuda-ng-firewall/ • https://azure.microsoft.com/en-us/marketplace/partners/barracudanetworks/barracuda-ng-cc/ • https://billing.barracudanetworks.com/service/select?service=o365&barracuda_web_visitor_id=24349309 AskTryContactLearn Videos Technical Briefs Deployment Architecture Diagrams
  • 43. Thank you Miguel López Country Manager – Iberia mlopez@barracuda.com