What Integrates with Barracuda Cloud?

Find out what Barracuda Cloud integrations exist in 2024. Learn what software and services currently integrate with Barracuda Cloud, and sort them by reviews, cost, features, and more. Below is a list of products that Barracuda Cloud currently integrates with:

  • 1
    BackBox Reviews
    See Software
    Learn More
    Network engineers save time with the BackBox Automation Platform for Network Teams by quickly automating and auditing time consuming manual tasks. With a library of over 3,000 pre-built automations and a script-free way to build new ones BackBox makes it easy to get started on your automation journey. BackBox is a point-and-click automation solution for firewall and network device backups, OS updates and patching, configuration compliance audits and remediation, network vulnerability management, network configuration change management, and more.
  • 2
    Amazon Web Services (AWS) Reviews
    Top Pick
    See Software
    Learn More
    AWS offers a wide range of services, including database storage, compute power, content delivery, and other functionality. This allows you to build complex applications with greater flexibility, scalability, and reliability. Amazon Web Services (AWS), the world's largest and most widely used cloud platform, offers over 175 fully featured services from more than 150 data centers worldwide. AWS is used by millions of customers, including the fastest-growing startups, large enterprises, and top government agencies, to reduce costs, be more agile, and innovate faster. AWS offers more services and features than any other cloud provider, including infrastructure technologies such as storage and databases, and emerging technologies such as machine learning, artificial intelligence, data lakes, analytics, and the Internet of Things. It is now easier, cheaper, and faster to move your existing apps to the cloud.
  • 3
    Barracuda Cloud Archiving Service Reviews
    Barracuda Cloud Archiving Service offers secure cloud-based archive that allows organizations to comply with strict compliance requirements and respond to e-discovery requests quickly and efficiently. It can be used with services such Office 365 or G Suite and uses the Barracuda cloud to store data for as long a time as necessary without risk of amendments or deletions. Access to all messages sent and received from any device increases end user productivity. Barracuda Cloud Archiving Service is compatible with Office 365, Exchange and other email services. This allows for a complete cloud-based archive without the need for additional software or hardware from customers. End users can retrieve and restore any message sent or received from the mail server using a multi-functional add in for Outlook, Android and iOS mobile apps, as well as a dedicated web interface.
  • 4
    Barracuda CloudGen Firewall Reviews
    You can get comprehensive protection for both on-premises and multicloud deployments with the firewall built in or for the cloud. Advanced Threat Protection, which is cloud-hosted, detects and blocks advanced threats including zero-day attacks and ransomware attacks. With the help of a global threat network that is fed by millions data collection points, you can quickly protect yourself against the latest threats. Modern cyber threats like ransomware, advanced persistent threats, targeted attack, and zero-day threat require sophisticated defense techniques that combine accurate threat detection with quick response times. Barracuda CloudGen Firewall provides a comprehensive suite of next-generation firewall technologies that provide real-time protection against a wide range of network threats, vulnerabilities and exploits. This includes SQL injections and cross-site scripting, denial-of-service attacks, trojans and viruses, worms and spyware.
  • 5
    Microsoft Azure Reviews
    Top Pick
    Microsoft Azure is a cloud computing platform that allows you to quickly develop, test and manage applications. Azure. Invent with purpose. With more than 100 services, you can turn ideas into solutions. Microsoft continues to innovate to support your development today and your product visions tomorrow. Open source and support for all languages, frameworks and languages allow you to build what you want and deploy wherever you want. We can meet you at the edge, on-premises, or in the cloud. Services for hybrid cloud enable you to integrate and manage your environments. Secure your environment from the ground up with proactive compliance and support from experts. This is a trusted service for startups, governments, and enterprises. With the numbers to prove it, the cloud you can trust.
  • 6
    Barracuda Email Security Gateway Reviews
    The Barracuda email security gateway protects against spam, phishing and inbound malware. This ensures that your business productivity is not affected by attacks via the email system. Further enforcement of the requirements for inbound email messages can be done with powerful and customizable policies.
  • 7
    ScalePad Reviews

    ScalePad

    ScalePad

    $19 per month
    2 Ratings
    ScalePad (formerly Warranty Master), Automated Asset Management Software, Hardware, and Warranty Services. Join over 8,000 Partners to automate your asset management and gain vital insights that will improve productivity and profitability. You want a simple way to get all of your hardware and/or software asset insights, such as revenue opportunities, side by side asset data, and an advanced sortable listing of all your inventory. ScalePad makes asset management simple! Watch our video! Automately collect all data from your integrations. You can manage software and hardware side by side and minimize downtime. For your clients and your team, easy-to-read reports. With compelling and transparent insights, you can build client relationships. Because of our extensive relationships with manufacturers, you will always have accurate, current and real-time data from companies such as Dell, HP and Lenovo.
  • 8
    iomart Reviews
    By doing the "service bit" well, we make business technology simple. You need a technology partner who shares in your success. You are now at iomart. We take care of all the complexity and headaches involved in technology transformation so that you can provide exceptional service to customers and beat your competitors. Protect your data from all threats. Your users can have the office experience wherever they are. Securely connect people, machines, and data. Hybrid working is possible if your business is ready. We have selected the best-in-class partners that will help us deliver services that make your business unstoppable. We are experts in our field and care deeply about your success. We have everything, so you only need one point of accountability. We build what you want, not what we want to make.
  • 9
    Barracuda Cloud-to-Cloud Backup Reviews
    With a new user interface, you can quickly find and retrieve the data you need. It is accessible from any location with an internet connection. Microsoft recommends third-party backups for Office 365 data. Barracuda Cloud to-Cloud Backup provides fast backups, highly-granular restore capabilities and unparalleled ease-of-use. Backup all your Teams, Exchange and SharePoint data. You can choose between full or granular restoration depending on your needs. Office 365 data is already stored in the cloud. This means that you can save secure encrypted backups in the same network for faster performance and greater scalability. Barracuda Cloud to-Cloud Backup allows you to restore Teams, Exchange and SharePoint data fully or with very fine detail. SharePoint full support allows you to backup and restore all SharePoint data including custom site templates, permissions, metadata, and custom lists.
  • 10
    Barracuda Cloud Security Guardian Reviews
    Barracuda Cloud Security Guardian provides a comprehensive platform for public cloud security and compliance orchestration. It continuously scans your infrastructure for misconfigurations and enforces security best practices. Barracuda Cloud Security Guardian monitors your compliance and security so that your developers can concentrate on what they do best: building great business applications.
  • 11
    Entrust TLS/SSL Certificates Reviews
    Entrust TLS/SSL Certificates offer validation of identity and encryption to protect your website, users, and data. Entrust TLS/SSL Certificates will secure your website so that your visitors can feel confident in knowing that your organization's identity has been verified. Also, encryption will protect their data and transactions. Entrust TLS/SSL Certificates ensure that your visitors don't see any browser alerts advising them that their website is "not secure" and that their connection is not private. Entrust is a founding member the CA Security Council, the CA/Browser Forum and actively contributes in the development of industry standards for TLS/SSL and S/MIME, code signing certificates and code management. Trust your digital security to a Certification Authority.
  • 12
    Teamstack Reviews

    Teamstack

    Teamstack

    $3 per user per month
    Do not compromise security for convenience. Automate identity management for legacy, mobile, and web apps to grow your team seamlessly. Integrate your day-to-day apps with our identity management platform to increase efficiency and allow employees, contractors, and customers to work seamlessly together. You can use pre-built integrations, Single-Sign-On and one click user provisioning to allow your team to sign in to any application passwordless using multi-factor authentication. Your workforce deserves easy access, regardless of whether your applications are cloud-based or custom-built. The Fortune 500s should not have high standards in identity management. They can access best-in-class accessibility and security features that will protect their business, increase efficiency, and save valuable time. Our access policies are now in place for employees who attempt to access cloud apps.
  • 13
    Elastic Observability Reviews

    Elastic Observability

    Elastic

    $16 per month
    The most widely used observability platform, built on the ELK Stack, is the best choice. It converges silos and delivers unified visibility and actionable insight. All your observability data must be in one stack to effectively monitor and gain insight across distributed systems. Unify all data from the application, infrastructure, user, and other sources to reduce silos and improve alerting and observability. Unified solution that combines unlimited telemetry data collection with search-powered problem resolution for optimal operational and business outcomes. Converge data silos with the ingesting of all your telemetry data from any source, in an open, extensible and scalable platform. Automated anomaly detection powered with machine learning and rich data analysis can speed up problem resolution.
  • 14
    Barracuda SSL VPN Reviews

    Barracuda SSL VPN

    Barracuda Networks

    Your remote workers and road warriors require a fast, flexible, reliable, and completely secure way of connecting to your internal enterprise applications, information, and network resources. They want to be able to access this information from anywhere in the world, from any device, at any time. The Barracuda SSL VPN provides connectivity and security to allow this access via any web browser or mobile device. Remote users can access files and applications with the Barracuda VPN. The Barracuda VPN is not like other VPN technologies. It does not require any additional client software. Logging in from the road or home requires only a web browser, and an Internet connection. After logging in, users will be presented with a portal that includes file shares and web applications. Java users can access more advanced applications such as Remote Desktop Services and Citrix XenApp.
  • 15
    Barracuda Backup Reviews

    Barracuda Backup

    Barracuda Networks

    $999 one-time payment
    Don't allow criminals to hold your data hostage. Barracuda makes it easy to recover your data. It's as simple as deleting malicious files and restoring a copy of your important data. Your systems can be quickly restored from virtual servers, physical appliances, offsite locations or the cloud. The IT environment of today includes physical servers, virtual servers, and public cloud data. All need protection. Mail servers may also contain important data, but they may have restricted retention policies. Barracuda can protect your data regardless of where it is located. A complete backup strategy is required to protect data no matter where it is located. Barracuda backup is easy to set up and manage for total peace-of-mind.
  • 16
    Barracuda Essentials Reviews
    Barracuda Essentials assists organizations to prepare, migrate, as well as operate more efficiently, in Office 365, Microsoft Exchange and G Suite. Barracuda Essentials offers critical multi-layer security, archiving and backup for Office 365. Barracuda Essentials provides email security and a tamperproof email archive to simplify litigation searches. Barracuda offers Office 365 full cloud-tocloud backup and recovery. Multi-layer email security is provided by the per-user licensing. This includes compliance archiving, discovery, and backup and restoration capabilities for Office 365 Exchange Online and OneDrive for Business.
  • 17
    Barracuda Message Archiver Reviews
    The Barracuda Message Archiver is a great tool for companies looking to reduce email storage and increase user productivity. It allows users to access any email sent or received via mobile or desktop access. The cloud-connected appliance uses Barracuda cloud to transfer information to the cloud as a secondary storage tier. The Barracuda Message Archiver is a powerful and simple platform for ediscovery, compliance, and other services. Your email server's storage capacity can be reduced, which can reduce costs and increase operational efficiency. Your regulatory status could be at risk if users do not export PST files or purge data within the storage limits. Our policy-based approach employs granular retention policies to ensure you retain all data securely for as long time as you need. This allows you to confidently show that you comply with regulatory and government requirements and have implemented defensible deletion policy.
  • 18
    Barracuda Secure SD-WAN Reviews
    Unlike SD-WAN solutions that only provide connectivity--requiring a separate security solution--Barracuda CloudGen Firewall combines a complete set of SD-WAN capabilities with advanced, multi-layered security technologies in a single unit.
  • 19
    AT&T Alien Labs Open Threat Exchange Reviews
    The largest open threat intelligence network in the world that facilitates collaborative defense using actionable, community-powered threats data. The security industry's threat sharing is still ad-hoc and informal. It is fraught with frustrations, blind spots, and pitfalls. Our vision is that companies and government agencies can quickly gather and share information about cyberattacks and threats, as well as current breaches, as accurate, timely, and complete information as quickly as possible. This will allow us to avoid major breaches and minimize the damage caused by an attack. This vision is realized by the Alien Labs Open Threat Exchange (OTX) - which provides an open, transparent threat intelligence community. OTX allows open access to a global network of security professionals and threat researchers. There are now more than 100,000 participants from 140 countries who contribute over 19,000,000 threat indicators each day. It provides community-generated threat information, facilitates collaborative research, and automates the updating of your security infrastructure.
  • 20
    Datto RMM Reviews
    Datto RMM, a cloud-based remote monitoring platform and management platform that provides MSPs with the ability to secure and reliably manage customers' IT infrastructures, is reliable, modern and reliable. It was designed to reduce complexity, costs, risks, and risk. It includes powerful automation tools and monitoring tools like ransomware detection, patch management and remote control takeover. This allows MSPs to prevent IT problems, respond quickly to incidents, and provide better service to customers. All-in-one, reliable cloud backup and disaster recovery that is image-based. Cloud-to-cloud backup, fast recovery of critical data in Microsoft 365 or G Suite applications. Support for Windows and Mac allows for fast file and folder backups and restores. Secure file sync and sharing with a centrally managed, secure collaboration system. Servers can be quickly and reliably restored using an image-based, all in one business continuity and disaster recovery solution.
  • 21
    AWS GovCloud Reviews

    AWS GovCloud

    Amazon

    $0.02 per GB
    Amazon's Regions are designed to host sensitive data and regulated workloads and meet the strictest U.S. government security requirements. AWS GovCloud (US), gives government customers and partners the flexibility to design secure cloud solutions that meet the FedRAMP High baseline, the U.S. International Traffic in Arms Regulations and Export Administration Regulations (EAR), Department of Defense (DoD), Cloud Computing Security Requirements guide (SRG) for Impact Levels 2, 4, and 5, FIPS 140-2, IRS-1075, and other compliance requirements. AWS GovCloud (US East) and (US West) Regions are managed by U.S. citizens who live on U.S. soil. AWS GovCloud (US), is only available to U.S. entities or root account holders who have passed a screening process. AWS GovCloud (US), Regions can assist customers with compliance at all stages of their cloud journey.
  • 22
    AuthPoint Reviews
    Our multi-factor authentication (MFA), solution helps reduce the risk of network disruptions and data breach arising from lost and stolen credentials. We also deliver this important capability entirely via the Cloud for easy setup and management. AuthPoint is more than traditional 2-Factor Authentication (2FA). It uses innovative methods to positively identify users. Our large ecosystem of integrations allows you to use MFA to protect access. WatchGuard AuthPoint is the perfect solution for businesses that need MFA to protect against attacks. AuthPoint uses a push notification, QR code or one-time password (OTP), to prove your identity. Our mobile device DNA matches the authorized user’s phone when granting access systems and applications. Any attacker who attempts to clone a user's device to gain access to a protected system will be blocked.
  • 23
    LOGIQ Reviews
    LogIQ.AI's LogFlow allows you to centrally manage your observability data pipes. Data streams are automatically organized and optimized as they arrive for your business teams or knowledge workers. XOps teams can centralize the management of data flows, increase data quality, and relevance. LogFlow's InstaStore, which can be built on any object store allows for infinite data retention and data replay to any target observation platform of your choosing. Analyze operational metrics across applications, infrastructure and gain actionable insight that will help you scale with confidence and maintain high availability. By analyzing and collecting behavioral data from business systems, you can help your business make better business decisions and provide better user experiences. Don't let new attack techniques catch you off guard. Automate threat prevention and remediation by automating the detection and analysis of threat patterns from multiple sources.
  • 24
    Cybraics Reviews
    The world's most advanced XDR platform revolutionizes threat detection, log management and response. Our silo-breaking, industry-leading XDR platform is an enterprise-class platform that simplifies security operations and covers compliance. Cybraics™ is more than a security tool. It was born out of AI and machine-learning research with the U.S. Department of Defense. It's the catalyst for unlocking actionable intelligence from scattered and siloed logs, alerts and data across multiple security tools in the network. Cybraics is a powerful threat detection tool that doesn't have to be expensive. Powered by Persistent Behavior Tracing and Adaptive Analytic Detection. Maximize security team efficiency with 96% automated case creation and a 95% decrease in false positives. Reduce response time and detection time from months to minutes.
  • 25
    Network Critical Reviews
    Network Critical's scalable, persistent visibility layer optimizes network infrastructure without compromising security or operations. Our systems and solutions are used in all sectors. Network Critical's visibility layers tools and systems data provide the necessary tools and data to monitor and control your network. Network Critical's persistent, scalable visibility layer provides tools and systems that provide critical network data to optimize, monitor and control changing network infrastructures without compromising security or operations. Network TAPs provide the base layer for smart network access and can monitor events on a local network. This ensures that all network security and monitoring platforms have complete visibility. It provides excellent performance and flexibility that is required to manage tools that protect network infrastructure, secure information, and keep up to date with the ever-changing attack environments.
  • 26
    Datto Workplace Reviews
    Datto Workplace offers enterprise-grade file sync and shared to managed service providers without compromising security or efficiency. Datto Workplace is a business-oriented collaboration platform that allows clients to share files from any device. One, simple, and scalable solution that can be used for all roles, from sales technicians to executives. You can customize settings to meet your business's needs and simplify implementation. MSPs can schedule reports on system activity, monitor usage, and perform auditing on-demand. By leveraging integrations with core business tools like Microsoft, G Suite and Active Directory, workplace users can securely collaborate from any device. Clients can work securely with Datto Workplace, which boasts a 99.99% uptime and HIPAA, GDPR and SOC 2 compliance. Datto Workplace offers the security, mobility and control that businesses require.
  • 27
    Securonix Security Operations and Analytics Reviews
    The Securonix Security Operations and Analytics Platform combines log monitoring, user and entity behavior analytics, next-generation security information and management (SIEM), network detection and response, (NDR), and security orchestration automation and response. It is a complete, end to end security operations platform. Securonix's platform is able to scale up to unlimited levels, thanks to advanced analytics, behavior detection and threat modeling, as well as machine learning. It improves security by increasing visibility, actionability, security posture, and management burden. The Securonix platform supports thousands of third-party vendors, technology solutions, making security operations, events and escalations much easier. It scales easily from startups to large enterprises, while offering the same security ROI and transparent and predictable cost.
  • 28
    Censornet MFA Reviews
    An adaptive, cloud-based multifactor authentication solution that is flexible and cloud-based can secure access to many systems, services, and applications. Protect user accounts with more that a password. Reduce the risk of password reuse in the event of a large-scale data breach. Cloud-based backend is 100% secure and easy to use for all organizations. Intelligent multi-factor authentication provides a frictionless user experience and intelligently challenges users when there is high risk. Support is available for all major VPN vendors and cloud services. Passwords alone are not sufficient. Multi-Factor authentication adds an extra layer of security to user accounts and privileged accounts. It eliminates account compromises and identity-related threats. Some OTPs sent using legacy solutions are vulnerable to interception and susceptible to phishing or MITM attacks.
  • 29
    AuthControl Sentry Reviews
    AuthControl Sentry®, which has been deployed in more than 54 countries and is used by enterprises across finance, government, education, manufacturing, and healthcare, provides true multi-factor authentication (MFA) for organisations. It provides an intelligent solution to prevent unauthorised data and applications access. AuthControl Sentry®, which supports a variety of architectural requirements, has the flexibility to be used in a variety of ways and can ensure maximum adoption due to its many authentication factors. Patented PINsafe®, technology for maximum security. Supports both cloud and on-premise for a flexible architecture. Optimized customization is possible with a single tenancy and a single-tiered cloud service. Single sign-on and risk-based authentication are standard. Integrates seamlessly with hundreds if not thousands of applications. With a wide range of authenticators, you can ensure maximum adoption.
  • 30
    Avira Cloud Sandbox Reviews
    The Avira Cloud Sandbox, an automated, unlimited-scale malware analysis service, is an award-winning and highly regarded product. It combines multiple advanced analysis technologies to produce a complete threat intelligence report using an uploaded file. The Cloud Sandbox API provides a detailed, file-specific threat intelligence report. It provides valuable, actionable intelligence. The report includes a detailed classification of each file, information about the techniques, tactics, and procedures (IoCs), and a description of why and how the submitted file was deemed clean, malicious, or suspicious. Cloud Sandbox by Avira leverages technologies from the Avira Protection Cloud. This cloud security system underpins Avira's anti-malware, threat intelligence solutions. We protect nearly a billion people worldwide through OEM technology partnerships.
  • 31
    Cysiv Reviews
    Cysiv's next generation, co-managed SIEM addresses all the problems and limitations associated with traditional SIEMs as well as other products used in a SOC. Our cloud-native platform automates key processes and improves effectiveness in threat detection, hunting and investigation, as well as response. Cysiv Command combines the essential technologies needed for a modern SOC into a unified cloud-native platform. It is the foundation of SOC-as a-Service. Most telemetry can either be pulled from APIs, or sent securely over the internet to Cysiv Command. Cysiv Connector is an encrypted conduit that allows you to send all required telemetry from your environment, such as logs, over Syslog UDP. Cysiv's threat engine uses a combination of signatures, threat intelligence and user behavior to automatically detect potential threats. Analysts can focus on the most important detections.
  • 32
    New Era Reviews

    New Era

    New Era Technology

    Modern workplaces can be made more productive by unified communication services and world-class collaboration. New Era offers communication solutions that integrate a wide range of collaboration and UC technologies. This includes audio visual technology, telephony and web conferencing. Video conferencing, audio conferencing and video conferencing are all part of New Era's offering. We provide a managed service that covers all aspects of your unified collaboration environment. We empower organizations to support their users regardless of where they are located or how they use them. This helps drive productivity and improves business outcomes. We can integrate and manage multiple vendors and collaboration technology because we are vendor-agnostic. Let's create a customized service that meets your company's communication requirements.
  • 33
    Safenet MobilePASS Reviews
    Your authentication infrastructure can be upgraded to include an One Time Password (OTP), as well as advanced security apps. A Mobile Pass allows a user to use a single set of login credentials to access multiple apps. Automated processes, as well as over-the-air activation and installation of software tokens, provide extensive support for end users. They also have lower Helpdesk costs. Our Authentication Suite includes everything you need to manage your business' security, from Two-Factor authentication (2FA) to Single-Sign-On (SSO), and many other features. Your organization's success depends on your ability give authorized customers, partners, and employees access from anywhere to online applications, corporate networks, business portals, and other services.
  • Previous
  • You're on page 1
  • Next