SECURE YOUR WEBSITES, APPLICATIONS, AND APIS
Everything you need to protect against today’s advanced threats.
ADVANCED
Comprehensive Web Application and API Protection for your applications everywhere.
PREMIUM
Includes everything from Advanced.
Add machine learning capabilities, automated API discovery, complex bot threat mitigation, and client-side protection. This plan also provides containerized deployment, zero trust security, and more.
Get a customized price quote.
Learn more about the capabilities of Barracuda Application Protection.
Capabilities | Advanced | Premium |
---|---|---|
WEB APPLICATION PROTECTION
|
||
OWASP Top 10 Protection
|
||
Smart Signatures
|
||
Zero Day Attack Protection
|
||
IP Threat Intelligence
|
||
Geo-IP Intelligence
|
||
Data Leak Prevention
|
||
Website Supply Chain Protection
|
||
Anti-Virus for File Uploads
|
||
Risk-based Attack Detection
|
||
FULL SPECTRUM DDOS PROTECTION
|
||
Unlimited Volumetric DDoS Attack Prevention
|
||
Unlimited Application DDoS Attack Prevention
|
||
Rate Limiting
|
||
DNS Security
|
||
API SECURITY
|
||
Protect JSON and GraphQL APIs
|
||
Schema-based API Discovery
|
||
ML-powered JSON API Discovery
|
||
ML-powered Shadow API Discovery
|
||
Unlimited API Rate Limiting Rules (Tarpit)
|
||
ADVANCED BOT PROTECTION
|
||
Web Scraping
|
||
Bot Spam Detection
|
||
Bot Signature Database
|
||
CAPTCHA Insertion and Challenges
|
||
Brute Force Prevention
|
||
Credential Stuffing Protection
|
||
Cloud-backed Active Threat Intelligence
|
||
Privileged Account Protection
|
||
ML-powered Bot Detection
|
||
Client Identification and Control
|
||
SECURE APPLICATION DELIVERY
|
||
Content Delivery Network
|
||
Authentication, Authorization, and Access Control
|
||
Shared IP
|
||
Zero Trust Network Access
|
||
Load Balancing with Server Health Monitoring
|
||
Content Routing
|
||
Containerized Deployment
|
||
Per-App IP
|
||
REPORTING, ANALYTICS, AND SERVICES
|
||
Log Export to SIEM
|
One export server
|
Multiple export servers
|
Auto Configuration Engine
|
||
Virtual Patching and Scanner Integration
|
||
Log Storage Duration
|
30 days
|
60 days
|
Configuration API Access
|
||
Configuration Snapshots
|
||
Advanced Reporting and Visualization
|
Need something more customized?
Our security experts can help you find the best solution for your organization.