Barracuda Networks Uses Lastline Technology to Fight APTs

Barracuda Networks Uses Lastline Technology to Fight APTs

Lastline has recently been working with Barracuda Networks to create solutions Barracuda customers can use to fight advanced persistent threats and evasive malware.

Here are three ways our technologies now work together.

Opportunity Protection Level 
Option 1 Interoperate Object
Option 2 Co-sell Object and Network
Option 3 Co-sell Object and Network

Screen_Shot_2014-04-28_at_4.20.31_PM

Option 1: Interoperate

  1. Barracuda Next-Generation Firewall products extract suspicious objects (ex. PDF or Word attachments) from the network. Barracuda cloud scans for known threats.
  2. Unknown threats are sent the Lastline platform (Manager and Engine components) to be analyzed for APTs, zero-day threats, and advanced malware.
  3. The Lastline platform uses a cluster of Lastline’s next-generation sandboxes (in Barracuda’s security operations center) to analyze the gathered objects.
  4. Objects identified to contain APTs or other forms of advanced malware are reported back to Barracuda in a matter of minutes.

Option 2 (Co-Sell Opportunity):

Screen_Shot_2014-04-28_at_4.40.38_PM
  1. Lastline’s platform (Manager, Engine, and Sensor components) is installed on-premise at the customer’s site.
  2. Lastline’s Threat Intelligence updates the Lastline platform every 5 minutes.
  3. The Lastline platform inspects objects using full-system emulation to identify unknown advance malware such as zero-day exploits, APTs, and evasive malware.
  4. Security personnel can use this information to modify security policies on Barracuda products for in-line blocking of inbound threats and outbound leaks.

Option 3 (Co-Sell Opportunity):

Screen_Shot_2014-04-28_at_4.45.28_PM

  1. Lastline’s platform is installed on-premise at the customer’s site.
  2. Lastline’s Threat Intelligence updates the lastline platform every 5 minutes.
  3. Next-Generation Firewall Vx software and Lastline sensor instances are downloaded onto the eon platform to monitor object and network traffic.
  4. Suspicious objects are sent to the Lastline platform to identify unknown advance malware such as zero-day exploits, APTs, and evasive malware.
  5. Security personnel can use this information to modify security policies on Barracuda products for in-line blocking of inbound threats and outbound leaks.

Brian Laing

Brian Laing

For more than 20 years, Brian Laing has shared his strategic business vision and technical leadership with a range of start-ups and established companies in various executive level roles. The author of “APT for Dummies,” he was previously vice president of AhnLab, where he directed the US operations of the internationally known security and software leader. Brian previously founded Hive Media where he served as CEO. He co-founded RedSeal Systems, where he conceived the overall design and features of the product and was granted two patents related to network security. He was also founder and CEO of self-funded Blade Software, who released the industry’s first commercial IPS/FW testing tool.
Brian Laing