SlideShare a Scribd company logo
PROTECT YOUR USERS, YOUR
NETWORK AND YOUR DEVICES
Cloud Generation Firewalls for GCP, Azure and AWS
WHEREVER
THEY ARE
WHAT DOES YOUR CLOUD JOURNEY LOOK LIKE?
Are you entirely on-premises? Completely in the cloud? Or a combination of both?
SOME SaaS
ON PREMISE
DATA CENTER
APP APP APP
HQ
PUBLIC CLOUD
AND SaaS
HYBRID
APP
HQ
PUBLIC CLOUD
AND SaaS
PUBLIC CLOUD
“ALL IN”
HQ
BUT CARRYING OVER YOUR
ON-PREMISES SECURITY TO THE CLOUD
ERA CAN BE A COSTLY MISTAKE
NEXTGEN FIREWALLS VS. CLOUDGEN FIREWALLS
On-premise firewalls aren’t cut out for the cloud. You need firewalls built for the cloud era.
NEXTGEN CLOUDGEN
Vertical scaling
Backhauled networks
Aggregated policy
Monolithic architecture
“Feature” heavy
Not orchestrated
Expensive
Horizontal scaling
Distributed policy
Central management
Secure connectivity
No-MPLS
Traffic regulation
Zero-touch deployment
Visibility
Security at source
Elastic scaling
Dispersed workloads
Orchestration API
Support cloud use cases
Cloud integration
Flexible licensing
HQ
HQ
ACHIEVE YOUR
CLOUD ASPIRATIONS
WITH BARRACUDA
CLOUD GENERATION
FIREWALLS
Enables secure, improved
connectivity
Designed for distributed
workloads
Supports cloud use cases and
deployment best practices
Managed in a single,
central place
Includes flexible licensing
options (BYOL, PAYG, metered)
Integrates with public
cloud platforms
WE UNDERSTAND
SECURITY IN
THE CLOUD
Barracuda
CloudGen Firewall
TRUST IN YOUR SECURITY PROVIDER
“Barracuda should be considered by enterprises that
have a cloud infrastructure and want to secure it.”
“Barracuda provides a cloud-native solution with the required
baseline level of integration with AWS. Barracuda supported
additional features and functionality that are above and beyond this
baseline of support, based on their target market and use cases.”
IMPROVED, SECURE
CONNECTIVITY FOR
NETWORKS, DATA
AND DEVICES
Barracuda
CloudGen Firewall
The Barracuda CloudGen Firewall:
Enables branch-to-cloud connectivity with SD-WAN
Accelerates public cloud adoption
Secures IoT deployment
Protects your network, users, devices and workloads
Connects your remote workers securely
C OMPREHENSIVE,
INTEGRATED,
AUTOMATED
SECURITY FOR
WEB APPLICATIONS
The Barracuda CloudGen WAF:
Provides enterprise-grade security, authentication and
access control for cloud applications
Accelerates cloud deployments with automated
vulnerability scanning and remediation
Simplifies cloud deployments with cloud templates,
auto-scaling and integration with cloud services
Enables DevOps workflows with automated orchestration
and provisioning through comprehensive APIs
$18.2BN REVENUE
23,000 EMPLOYEES
GLOBAL REACH
Kraft’s challenges:
Hosted applications in local data centres, with
hosting providers
Involved multiple lines of business
Wanted to test the waters before moving entirely to the cloud
Worried about securing apps in the cloud
The outcomes
Moved Dell BoomiTM as its first app
Moved low-impact marketing websites next
Continued with a further 300 business applications
Used lift and shift or hybrid deployments across most projects
$3BN REVENUE
15,000 EMPLOYEES
EMEA AND APAC REACH
Agrifirms’ challenges:
Needed to deploy different services into Azure in different
zones, with different levels of risk
Needed users to have access to the corporate network
from inside and outside
Needed logging, visibility and centralised control
The outcomes
Deployed CloudGen Firewall F-Series to secure
communication from headquarters
Deployed CloudGen Firewall for Azure to separate zones
Created a DMZ in Microsoft Azure
Barracuda
CloudGen Firewall
C LICK HERE
TO DISCOVER
MORE ABOUT:
SD-WAN
Advanced secure remote access
Protection against zero-hour threats
Secure migration to public and hybrid cloud environments
Secure connectivity for IoT and ICS connected devices

More Related Content

What's hot

Application Centric DevOps
Application Centric DevOpsApplication Centric DevOps
Application Centric DevOps
Nati Shalom
 
Apalia/Amysta Cloud Usage Metering and Billing
Apalia/Amysta Cloud Usage Metering and BillingApalia/Amysta Cloud Usage Metering and Billing
Apalia/Amysta Cloud Usage Metering and Billing
buildacloud
 
UShareSoft Image Management for CloudStack
UShareSoft Image Management for CloudStackUShareSoft Image Management for CloudStack
UShareSoft Image Management for CloudStackbuildacloud
 
Cloud Computing Development Presentation
Cloud Computing Development PresentationCloud Computing Development Presentation
Cloud Computing Development PresentationAhmed El Refaey
 
Architecting for the New Age Enterprise - AWS Summit SG 2017
Architecting for the New Age Enterprise - AWS Summit SG 2017Architecting for the New Age Enterprise - AWS Summit SG 2017
Architecting for the New Age Enterprise - AWS Summit SG 2017
Amazon Web Services
 
Shapeblue BACD Amsterdam
Shapeblue BACD AmsterdamShapeblue BACD Amsterdam
Shapeblue BACD Amsterdam
buildacloud
 
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWSstackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
Gaurav "GP" Pal
 
What A No Compromises Hybrid Cloud Looks Like
What A No Compromises Hybrid Cloud Looks Like What A No Compromises Hybrid Cloud Looks Like
What A No Compromises Hybrid Cloud Looks Like
Nati Shalom
 
The PaaS Landscape
The PaaS LandscapeThe PaaS Landscape
The PaaS Landscape
Jim O'Neil
 
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
Amazon Web Services
 
When networks meets apps (open stack atlanta)
When networks meets apps (open stack atlanta)When networks meets apps (open stack atlanta)
When networks meets apps (open stack atlanta)
Nati Shalom
 
Federation - One Cloud
Federation - One CloudFederation - One Cloud
Federation - One Cloud
The Fiction Tribe ®
 
The Cloud Native Journey
The Cloud Native JourneyThe Cloud Native Journey
The Cloud Native Journey
VMware Tanzu
 
Case Studies for moving apps to the cloud - DLD 2013
Case Studies for moving apps to the cloud - DLD 2013Case Studies for moving apps to the cloud - DLD 2013
Case Studies for moving apps to the cloud - DLD 2013Nati Shalom
 
Unilever: Greenhouse - Norm Driskell
Unilever: Greenhouse - Norm DriskellUnilever: Greenhouse - Norm Driskell
Unilever: Greenhouse - Norm Driskell
Razorfish
 
PLM on the Cloud
PLM on the CloudPLM on the Cloud
PLM on the CloudAras
 
Unlocking the Cloud Operating Model: Deployment
Unlocking the Cloud Operating Model: DeploymentUnlocking the Cloud Operating Model: Deployment
Unlocking the Cloud Operating Model: Deployment
Mitchell Pronschinske
 
From the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWSFrom the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWS
Alert Logic
 
Autoscaling Server Arrays
Autoscaling Server ArraysAutoscaling Server Arrays
Autoscaling Server Arrays
RightScale
 

What's hot (20)

Application Centric DevOps
Application Centric DevOpsApplication Centric DevOps
Application Centric DevOps
 
Apalia/Amysta Cloud Usage Metering and Billing
Apalia/Amysta Cloud Usage Metering and BillingApalia/Amysta Cloud Usage Metering and Billing
Apalia/Amysta Cloud Usage Metering and Billing
 
UShareSoft Image Management for CloudStack
UShareSoft Image Management for CloudStackUShareSoft Image Management for CloudStack
UShareSoft Image Management for CloudStack
 
Cloud Computing Development Presentation
Cloud Computing Development PresentationCloud Computing Development Presentation
Cloud Computing Development Presentation
 
Architecting for the New Age Enterprise - AWS Summit SG 2017
Architecting for the New Age Enterprise - AWS Summit SG 2017Architecting for the New Age Enterprise - AWS Summit SG 2017
Architecting for the New Age Enterprise - AWS Summit SG 2017
 
Shapeblue BACD Amsterdam
Shapeblue BACD AmsterdamShapeblue BACD Amsterdam
Shapeblue BACD Amsterdam
 
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWSstackArmor Security MicroSummit - Next Generation Firewalls for AWS
stackArmor Security MicroSummit - Next Generation Firewalls for AWS
 
What A No Compromises Hybrid Cloud Looks Like
What A No Compromises Hybrid Cloud Looks Like What A No Compromises Hybrid Cloud Looks Like
What A No Compromises Hybrid Cloud Looks Like
 
The PaaS Landscape
The PaaS LandscapeThe PaaS Landscape
The PaaS Landscape
 
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
 
When networks meets apps (open stack atlanta)
When networks meets apps (open stack atlanta)When networks meets apps (open stack atlanta)
When networks meets apps (open stack atlanta)
 
Cloudify 10m
Cloudify 10mCloudify 10m
Cloudify 10m
 
Federation - One Cloud
Federation - One CloudFederation - One Cloud
Federation - One Cloud
 
The Cloud Native Journey
The Cloud Native JourneyThe Cloud Native Journey
The Cloud Native Journey
 
Case Studies for moving apps to the cloud - DLD 2013
Case Studies for moving apps to the cloud - DLD 2013Case Studies for moving apps to the cloud - DLD 2013
Case Studies for moving apps to the cloud - DLD 2013
 
Unilever: Greenhouse - Norm Driskell
Unilever: Greenhouse - Norm DriskellUnilever: Greenhouse - Norm Driskell
Unilever: Greenhouse - Norm Driskell
 
PLM on the Cloud
PLM on the CloudPLM on the Cloud
PLM on the Cloud
 
Unlocking the Cloud Operating Model: Deployment
Unlocking the Cloud Operating Model: DeploymentUnlocking the Cloud Operating Model: Deployment
Unlocking the Cloud Operating Model: Deployment
 
From the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWSFrom the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWS
 
Autoscaling Server Arrays
Autoscaling Server ArraysAutoscaling Server Arrays
Autoscaling Server Arrays
 

Similar to Secure your journey to the public cloud

Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Chindala Murali
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
MUFIX Community
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
MuhammadSajidAbdulga
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
Nitish Sinha
 
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Amazon Web Services
 
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Private Cloud
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
suraj bhandari
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptshibamughal
 
Cloudcomputingupload
CloudcomputinguploadCloudcomputingupload
CloudcomputinguploadIbrahim Khan
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Vaibhav Yadav
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
Ashnikbiz
 
We are Net3 Technology
We are Net3 TechnologyWe are Net3 Technology
We are Net3 Technology
Kate Bissinger
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
Tanmoy Barman
 
Hashicorp Vault - OPEN Public Sector
Hashicorp Vault - OPEN Public SectorHashicorp Vault - OPEN Public Sector
Hashicorp Vault - OPEN Public Sector
Kangaroot
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
Amazon Web Services
 
Application Architecture for Cloud Computing
Application Architecture for Cloud Computing Application Architecture for Cloud Computing
Application Architecture for Cloud Computing white paper
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
Avi Networks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Snehal Hedau
 
Taking the Mystery Out of Public Cloud Migration - ScienceLogic
Taking the Mystery Out of Public Cloud Migration - ScienceLogicTaking the Mystery Out of Public Cloud Migration - ScienceLogic
Taking the Mystery Out of Public Cloud Migration - ScienceLogic
ScienceLogic
 
(NET208) Enable & Secure Your Business Apps via the Hybrid Cloud on AWS
(NET208) Enable & Secure Your Business Apps via the Hybrid Cloud on AWS(NET208) Enable & Secure Your Business Apps via the Hybrid Cloud on AWS
(NET208) Enable & Secure Your Business Apps via the Hybrid Cloud on AWS
Amazon Web Services
 

Similar to Secure your journey to the public cloud (20)

Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
 
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloudcomputingupload
CloudcomputinguploadCloudcomputingupload
Cloudcomputingupload
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
 
We are Net3 Technology
We are Net3 TechnologyWe are Net3 Technology
We are Net3 Technology
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
 
Hashicorp Vault - OPEN Public Sector
Hashicorp Vault - OPEN Public SectorHashicorp Vault - OPEN Public Sector
Hashicorp Vault - OPEN Public Sector
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
Application Architecture for Cloud Computing
Application Architecture for Cloud Computing Application Architecture for Cloud Computing
Application Architecture for Cloud Computing
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Taking the Mystery Out of Public Cloud Migration - ScienceLogic
Taking the Mystery Out of Public Cloud Migration - ScienceLogicTaking the Mystery Out of Public Cloud Migration - ScienceLogic
Taking the Mystery Out of Public Cloud Migration - ScienceLogic
 
(NET208) Enable & Secure Your Business Apps via the Hybrid Cloud on AWS
(NET208) Enable & Secure Your Business Apps via the Hybrid Cloud on AWS(NET208) Enable & Secure Your Business Apps via the Hybrid Cloud on AWS
(NET208) Enable & Secure Your Business Apps via the Hybrid Cloud on AWS
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Secure your journey to the public cloud

  • 1. PROTECT YOUR USERS, YOUR NETWORK AND YOUR DEVICES Cloud Generation Firewalls for GCP, Azure and AWS WHEREVER THEY ARE
  • 2. WHAT DOES YOUR CLOUD JOURNEY LOOK LIKE? Are you entirely on-premises? Completely in the cloud? Or a combination of both? SOME SaaS ON PREMISE DATA CENTER APP APP APP HQ PUBLIC CLOUD AND SaaS HYBRID APP HQ PUBLIC CLOUD AND SaaS PUBLIC CLOUD “ALL IN” HQ
  • 3. BUT CARRYING OVER YOUR ON-PREMISES SECURITY TO THE CLOUD ERA CAN BE A COSTLY MISTAKE
  • 4. NEXTGEN FIREWALLS VS. CLOUDGEN FIREWALLS On-premise firewalls aren’t cut out for the cloud. You need firewalls built for the cloud era. NEXTGEN CLOUDGEN Vertical scaling Backhauled networks Aggregated policy Monolithic architecture “Feature” heavy Not orchestrated Expensive Horizontal scaling Distributed policy Central management Secure connectivity No-MPLS Traffic regulation Zero-touch deployment Visibility Security at source Elastic scaling Dispersed workloads Orchestration API Support cloud use cases Cloud integration Flexible licensing HQ HQ
  • 5. ACHIEVE YOUR CLOUD ASPIRATIONS WITH BARRACUDA CLOUD GENERATION FIREWALLS Enables secure, improved connectivity Designed for distributed workloads Supports cloud use cases and deployment best practices Managed in a single, central place Includes flexible licensing options (BYOL, PAYG, metered) Integrates with public cloud platforms
  • 6. WE UNDERSTAND SECURITY IN THE CLOUD Barracuda CloudGen Firewall
  • 7. TRUST IN YOUR SECURITY PROVIDER “Barracuda should be considered by enterprises that have a cloud infrastructure and want to secure it.” “Barracuda provides a cloud-native solution with the required baseline level of integration with AWS. Barracuda supported additional features and functionality that are above and beyond this baseline of support, based on their target market and use cases.”
  • 8. IMPROVED, SECURE CONNECTIVITY FOR NETWORKS, DATA AND DEVICES Barracuda CloudGen Firewall The Barracuda CloudGen Firewall: Enables branch-to-cloud connectivity with SD-WAN Accelerates public cloud adoption Secures IoT deployment Protects your network, users, devices and workloads Connects your remote workers securely
  • 9. C OMPREHENSIVE, INTEGRATED, AUTOMATED SECURITY FOR WEB APPLICATIONS The Barracuda CloudGen WAF: Provides enterprise-grade security, authentication and access control for cloud applications Accelerates cloud deployments with automated vulnerability scanning and remediation Simplifies cloud deployments with cloud templates, auto-scaling and integration with cloud services Enables DevOps workflows with automated orchestration and provisioning through comprehensive APIs
  • 10. $18.2BN REVENUE 23,000 EMPLOYEES GLOBAL REACH Kraft’s challenges: Hosted applications in local data centres, with hosting providers Involved multiple lines of business Wanted to test the waters before moving entirely to the cloud Worried about securing apps in the cloud The outcomes Moved Dell BoomiTM as its first app Moved low-impact marketing websites next Continued with a further 300 business applications Used lift and shift or hybrid deployments across most projects
  • 11. $3BN REVENUE 15,000 EMPLOYEES EMEA AND APAC REACH Agrifirms’ challenges: Needed to deploy different services into Azure in different zones, with different levels of risk Needed users to have access to the corporate network from inside and outside Needed logging, visibility and centralised control The outcomes Deployed CloudGen Firewall F-Series to secure communication from headquarters Deployed CloudGen Firewall for Azure to separate zones Created a DMZ in Microsoft Azure Barracuda CloudGen Firewall
  • 12. C LICK HERE TO DISCOVER MORE ABOUT: SD-WAN Advanced secure remote access Protection against zero-hour threats Secure migration to public and hybrid cloud environments Secure connectivity for IoT and ICS connected devices