Reliable incremental backups have simplified daily protection and rapid ransomware recovery
What is our primary use case?
Barracuda Application Protection is used primarily for end-to-end backup. The incremental backup is a day-to-day process, and it is easy to use for all the servers and the client machine. Barracuda Application Protection is used exclusively for backup purposes, which involves incremental backup in day-to-day operations and easy restoration using Barracuda backup solutions.
What is most valuable?
The best features Barracuda Application Protection offers include easy installation, incremental backup, and daily email reports.
Regarding the easy installation and daily email reports, it is easy to install, and the quick backup allows for a quick restoration for the machine and the servers, making it a fast process.
Barracuda Application Protection protects against ransomware, achieving a 67% protection rate because it is based on a Linux system, reducing the chances of encryption and providing strong ransomware protection.
Barracuda Application Protection has positively impacted my organization as it is used for multiple clients, and I am also backing up the Exchange servers, which frequently experience attacks in customer environments, allowing for quick restoration, even from yesterday or the day before yesterday.
What needs improvement?
There is nothing in Barracuda Application Protection that needs any updates, but improving ransomware protection from 67% to 100% would be beneficial.
Improving the operating system structure, firmware, and overall performance would enhance loading times for devices.
For how long have I used the solution?
Barracuda Application Protection has been used for the last three years.
What do I think about the stability of the solution?
Barracuda Application Protection is stable.
What do I think about the scalability of the solution?
The scalability of Barracuda Application Protection is good, with normal CPU, memory, and overall system utilization.
How are customer service and support?
Customer support for Barracuda Application Protection is good.
Which solution did I use previously and why did I switch?
Before Barracuda Application Protection, I had multiple solutions, and as a system integrator, I provided various options, preferring Barracuda Application Protection as it is easy to use and easy to restore, unlike some other solutions such as Synology.
What was our ROI?
A return on investment has been seen as it is not necessary to take a backup and check customer environments day-to-day. It is easy to use for simply taking a backup without needing more engineers or employees, and it is a one-time setup.
What's my experience with pricing, setup cost, and licensing?
The pricing, setup cost, and licensing for Barracuda Application Protection are not excessive. The licensing and cost are normal for the Barracuda backup appliance.
Which other solutions did I evaluate?
Other options were not evaluated before choosing Barracuda Application Protection.
What other advice do I have?
Quick restoration with Barracuda Application Protection has allowed restoration of backups multiple times, not just once. As a system integrator, I manage multiple customers' requirements for backups.
For others looking into using Barracuda Application Protection, it is easy to use. I rate Barracuda Application Protection an eight out of ten.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Centralized protection has improved visibility and security for web applications and APIs
What is our primary use case?
My main use case of Barracuda Application Protection has been around securing internet-facing web applications and APIs, especially from common web attacks, bot traffic, and API-based threats. In my role, I mainly worked on evaluating it from a solution perspective rather than full-scale deployment. We looked at how it can protect applications against the OWASP Top 10 vulnerabilities, handle bot mitigation, and provide visibility into API traffic, which is becoming a major attack surface now. During the evaluation, we focused on how it fits into a typical enterprise environment, for example, protecting customer-facing applications such as login portals, payment gateways, and APIs. We also checked how easy it is to deploy in different models like SaaS or virtual appliance and how it integrates with existing security tools. Another key area we looked at was policy tuning and false positive handling, because in real environments, business traffic should not be impacted. So we analyzed the logging, reporting, and how effectively it identifies malicious versus legitimate traffic. Overall, the use case was to understand how Barracuda Application Protection can act as a centralized web application and API protection layer, especially for organizations looking for a combined WAF plus API security plus bot protection solution.
How has it helped my organization?
During our evaluation, Barracuda Application Protection had a positive impact mainly in terms of improved visibility and better handling of automated attack traffic. One of the key improvements we noticed was identifying and controlling bot-driven traffic, especially on sensitive endpoints like login pages. It helped reduce repeated suspicious requests and gave better control over credential stuffing scenarios through rate-limiting and bot detection. Another positive impact was around centralized visibility. Barracuda Application Protection provided clear insights into incoming traffic, attack patterns, and policy actions, which made it easier to understand what kind of threats applications are exposed to. This is very useful for both security monitoring and decision-making.
We also saw improvement in application-layer security coverage, as it was able to effectively detect and block common OWASP attacks during testing, which increases the overall confidence in protecting public-facing applications. From an operational perspective, Barracuda Application Protection simplified management by combining WAF, API protection, and bot mitigation in one place, reducing the need to handle multiple tools separately. Overall, the main outcomes were better threat visibility, improved protection against automated attacks, and a more streamlined security approach for web applications and APIs.
What is most valuable?
One of the best features of Barracuda Application Protection is its comprehensive security coverage across web applications and APIs in a single platform. Instead of just acting as a traditional WAF, it combines multiple layers of protection, which is very useful in modern environments. First, its WAF capabilities for OWASP Top 10 protection are very strong. It can effectively detect and block common attacks such as SQL injection, cross-site scripting, and other application-layer threats, which are critical for protecting public-facing applications. Another key feature is API security, which is becoming increasingly important. Barracuda Application Protection provides visibility into API traffic, helps identify abnormal behavior, shadow APIs, and misuse, which traditional WAFs struggle with.
Both the bot protection and rate-limiting capabilities are also very valuable, especially for protecting login portals and preventing automated attacks such as credential stuffing and scraping. It helps differentiate between legitimate users and malicious bots based on behavior analysis. Additionally, DDoS protection at the application layer is well-integrated, which helps in handling traffic spikes and ensuring application availability. From an operational perspective, logging, reporting, and visibility are strong points. Barracuda Application Protection provides clear insights into traffic patterns, attack types, and policy actions, which makes troubleshooting and tuning much easier. Lastly, the flexible deployment options such as SaaS, container-based, and virtual appliance make it adaptable to different enterprise environments, whether on-premises or cloud.
What needs improvement?
One area where Barracuda Application Protection can improve is in policy tuning and ease of configuration, especially for complex application and API-heavy environments. During evaluation, the initial setup was straightforward, but fine-tuning policies to avoid false positives required a deeper understanding and manual effort. Another area is advanced analytics and reporting. While Barracuda Application Protection provides good visibility, having a more intuitive dashboard, deeper insights, and easier correlation of events would help security teams in faster decision-making and threat analysis. There is also some scope for improvement in API security visibility, especially around detailed discovery and classification of APIs, as this is becoming a critical area for modern applications. Additionally, documentation and guided workflows could be enhanced to help new users quickly understand best practices for deployment and tuning, particularly for teams that are not very experienced with WAF solutions. Overall, Barracuda Application Protection is strong from a security standpoint, but improvement in usability, analytics, and API-level visibility would make it even more effective and easier to operate.
One additional area for improvement would be around integration with other security tools. While Barracuda Application Protection does support integrations, having more seamless and out-of-the-box integration with SIEM or SOAR platforms would make it easier for organizations to automate workflows and correlate security events across multiple tools. Also from a support and onboarding perspective, enhancing guided support, best practice recommendations, and faster troubleshooting assistance would further improve the overall user experience, especially for teams during the initial deployment and tuning phase. These improvements would make the solution not only strong from a security standpoint but also more effective to operate in complex enterprise environments.
For how long have I used the solution?
I have had a few months of exposure to Barracuda Application Protection, mainly during evaluation and comparison exercises as part of customer discussion and solution assessment.
How was the initial setup?
An important aspect we observed during the evaluation was around integration and tuning challenges, which are quite common with any WAF solution. From an integration perspective, connecting Barracuda Application Protection into an existing environment was relatively straightforward, especially when placing it in front of the application as a reverse proxy. However, the real effort came during the tuning phase. Since login portals and APIs are very sensitive, even small false positives can impact real users. For example, during initial testing, some legitimate login requests were flagged due to strict security policies, especially when there are unusual parameters or headers. So we had to carefully analyze the logs and fine-tune the rules to ensure balance between security and user experience. Another challenge was handling dynamic or API-based traffic where request patterns change frequently. In such cases, proper understanding of application behavior was required before enabling stricter protection.
On the positive side, Barracuda Application Protection provided good visibility through logs and reporting, which helped in identifying why traffic was blocked and made the tuning process easier. Overall, while security capabilities were strong, a key learning was that proper tuning and understanding of application traffic is critical to get the best results without impacting business operations.
What other advice do I have?
In our case, we evaluated Barracuda Application Protection primarily in a public cloud-oriented setup, as most of the applications we were assessing were internet-facing and hosted in cloud environments. However, one of the advantages we noticed is that Barracuda Application Protection supports flexible deployment models, including SaaS, virtual appliance, and container-based options. This makes it suitable not only for cloud but also for hybrid or on-premises environments, depending on the organization's architecture. From an evaluation perspective, the cloud-based deployment felt more straightforward and easier to integrate, especially for quick testing and scalability. At the same time, it is clear that the solution can adapt well to hybrid setups where some applications are still hosted on-premises.
For our evaluation, we used AWS as the cloud provider. Most of the applications we assessed were hosted in AWS, so it made sense to evaluate Barracuda Application Protection in that environment to see how well it integrates and performs in a typical cloud setup. For our evaluation, we primarily used a trial evaluation setup, so it was not a full purchase through the AWS Marketplace. The focus was more on testing the capabilities and integration within our AWS environment.
One additional improvement I noticed during the trial is around the initial onboarding and learning curve. While Barracuda Application Protection is feature-rich, new users may take some time to fully understand policy structure and best practices. More guided onboarding, templates, or pre-configured policies based on common use cases would help accelerate adoption. Another area is real-time alerting and notification. While Barracuda Application Protection provides good visibility through logs and dashboards, having more customizable and proactive alerting mechanisms would help security teams respond faster to critical events without constantly monitoring the dashboard. These are relatively small enhancements, but they would improve overall usability to make the solution more efficient for day-to-day operations.
My advice would be to clearly understand your application architecture and traffic patterns before implementing Barracuda Application Protection. This helps in getting the most value from the solution, especially when it comes to policy tuning and avoiding false positives. I would also recommend starting with a phased approach, initially deploying in monitoring mode, analyzing the traffic, and then gradually moving to blocking policies. This ensures that security is enforced without impacting legitimate users. Another important point is to focus on bot protection and API security as these are key risk areas today, especially for login portals and public-facing applications. Lastly, make sure to plan for integration with your existing security ecosystem such as SIEM or monitoring tools so that you get better visibility and centralized management. Overall, Barracuda Application Protection is a strong solution, but getting the best results depends on proper planning, tuning, and understanding your environment. I would rate this solution an overall eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Advanced threat protection has reduced zero-day risks but usability and response time still need work
What is our primary use case?
My main use case for Barracuda Application Protection encompasses most of their capabilities. I have used it for APIs, protecting applications, and securing applications for these types of instances.
What is most valuable?
Barracuda Application Protection's best features are protecting APIs and defending against zero-day vulnerabilities.
Barracuda Application Protection has been effective at handling zero-day vulnerabilities for me, and it has caught specific threats. There were several times when Barracuda Application Protection triggered alerts, and I ensured that those threats were addressed before any vulnerability occurred.
Barracuda Application Protection has positively impacted my organization by reducing security impact and threat impact. It has helped me as an architect understand what the threat is, what the analysis shows, and it resolves immediately. That is a best use case scenario, and I would recommend this for everyone.
What needs improvement?
I believe Barracuda Application Protection could be significantly improved with better usability and integration with other tools.
Barracuda Application Protection's WAF serves as a primary defense, but I believe it can be improved. The response time is slow, and the WAF is something that adds more value to that aspect. I would also recommend improving API integration with the API layers and CDN networks, along with the response time of the application, as these need considerable improvement.
For how long have I used the solution?
I have been using Barracuda Application Protection for more than a year and a half.
What do I think about the stability of the solution?
Barracuda Application Protection is stable in my organization.
What do I think about the scalability of the solution?
I was not implementing a complete solution and was only deploying it on a few services. Because of that limited implementation, I did not implement a fully scalable application, which is why it was performing stable.
Which solution did I use previously and why did I switch?
I previously tested between Qualys, Qualys scan, Aqua scan, and Barracuda. Each has its own pros and cons, but I feel that Qualys, Aqua Securities, and Barracuda are at the same level, and I think Barracuda is the winner.
Before choosing Barracuda Application Protection, I evaluated between Aqua scan and Barracuda, and Barracuda proved to be the winner.
What was our ROI?
I have not noticed a return on investment. I was testing this out, and I am not sure how much this constituted a return on investment.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is that I feel it is a bit costlier, but the features that it provides are good. However, I am not the one making decisions on costing and limiting, as that is at the organizational level. I am satisfied, and even management shares the same concerns. We have other applications or open-source tools that are not as good as Barracuda, but we could manage with those, so I feel the pricing is too high.
What other advice do I have?
I can share a specific outcome where Barracuda Application Protection was helpful. There was a use case where an e-commerce platform was under a credential attack where attackers were hammering endpoints with millions of requests using leaked credentials. Barracuda Application Protection triggered an alert for abnormal activity using machine learning and implemented rate-limiting and IP blocking based on reputation. It also prevented account takeovers by rate-limiting the number of user requests. That was an instance where I could see how helpful Barracuda Application Protection was.
The main advice I would give to others considering Barracuda Application Protection is that it stands out with its zero-day vulnerability protection, which is excellent. It performs very well with threat detection and finding anomalies, and it is effective at preventing DDoS attacks, which are common in the data centers of any organization. My only concerns are that it is not very user-friendly and the response time is slow. I would rate this product a seven out of ten.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Secure gateway has strengthened mobile access and consistently reduced web security incidents
What is our primary use case?
My main use case for
Barracuda Application Protection is for our mobile apps and for the remote users we have, as I use this as the secure gateway to protect the application integrity as well as the data going from our organization to our users remotely as well as the ones in-house.
What is most valuable?
Barracuda Application Protection specifically helps with securing our mobile apps and remote users by providing full-spectrum security DOD-level protection, which is a big help for us for the security of our data. Implementing Barracuda Application Protection has had a measurable and strategic impact on our overall business objectives. Within the first six to seven months of deployment, I saw a 60% reduction in security incidents, incidents affecting the web application which directly translated into fewer service interruptions and less time spent on incident response.
Overall, Barracuda Application Protection has made it so easy to manage all our applications.
The best features Barracuda Application Protection offers include ease of setup on a firewall for security for VPN users, and configuration is easy to do and use for our security team with its features and pictures of instruction. Additionally, ease of deployment, less costly, easy to manage application, scalability is good, and security features are strong. It contains a lot of granularity, especially with URL profiles, protection, and JSON security.
Granular controls and JSON security have helped our team by providing a secure gateway to protect application integrity as well as the data going from our organization to the users remotely, as well as the ones in the offices.
I would also add that it has been good in lessening threats from the outside, and being able to set as many rules as needed is a big plus for us.
What needs improvement?
I do not have much to say about the improvement, but a more innovative solution for sniffing more on the network would be great, and having the advanced ability to close off ports when they could be getting tested from hackers for intrusion would be helpful.
I would also add that the user interface should be improved to be more user-friendly and customizable.
For how long have I used the solution?
I have been using Barracuda Application Protection for five years.
What do I think about the stability of the solution?
Barracuda Application Protection is fast and reliable, so it is very stable.
What do I think about the scalability of the solution?
Barracuda Application Protection's scalability is very good; it handles my organization's growth perfectly.
How are customer service and support?
The customer support is quick to respond and very solution-oriented.
Which solution did I use previously and why did I switch?
Previously, I was using Cloudflare.
I decided to switch from Cloudflare to Barracuda Application Protection because it is very easy to use, the cost is very cost-effective, it has simplicity to configure and deploy in my current environment, and it has automated standard policies, which is easy to maintain.
What was our ROI?
I have seen a return on investment; it lessens threats from the outside. Ease of use for our security team to be able to use templates and configure to our specs, combined with its high-level security protection features such as DOD-level protection, shows its readiness to secure our data and network lines, which is brilliant.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is that it is a very cost-effective tool.
Which other solutions did I evaluate?
Before choosing Barracuda Application Protection, I evaluated other options including
AWS WAF.
What other advice do I have?
My advice to others looking into using Barracuda Application Protection is that it is simple, very simple, cost-effective, easy to set up and use, and easy to configure and deploy in any environment. It lessens threats from outside or from within.
I have additional thoughts about Barracuda Application Protection; it is a good tool for providing threat protection, especially for our email that comes in from the outside. Capturing potential spam and malware from emails from outside our network has been good, keeping us alert for anything coming in from the outside that could compromise our network.
I rate this product a 9 out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Best Web application firewall service from Barracuda
What do you like best about the product?
Easy integration and deployment, Able to work well as a layer 7 network protection device, Custom filtering rules are supported which brings WAf to advance level.
What do you dislike about the product?
Doesn't support SSL offloading, Reporting and dashboard can be improved further, Support services SLA should be improved. Device capabilities can be improved further.
What problems is the product solving and how is that benefiting you?
It is helping us in protecting our web application with OWASP top 3.2 top rules, we able to detect and prevent most of external attack using Barracuda WAF. This improved our business application performance as well as revenue.
Great way to protect web applications via an as-a-service platform
What do you like best about the product?
Barracuda WAF-as-a-Service offers a complete package as you would expect from a WAF, but everything is SaaS-based. The WAF-as-a-Service offers very detailed configuration possibilities.
What do you dislike about the product?
Sometimes it is difficult to configure the WAF to be fully proof. It takes some time before all the false positives are gone. But this is the case with every WAF.
What problems is the product solving and how is that benefiting you?
We use the WAF-as-a-Service to protect all our public facing web applications. In the past we had to install a WAF on premise but now everything is updated and maintained in the cloud
It good but there are better options available
What do you like best about the product?
It's ML algo is really great it's able to detect existing bugs in the bot...it's just like a human debugging the code...upside is the package that they offer irresistible...
What do you dislike about the product?
Thhe updates which the barracuda people provide are really slow...they do not release updates that frequently....bots in today's time are evolving fast so should the bot error detection tools
What problems is the product solving and how is that benefiting you?
It helped me get over the mundane task of debugging....i didn't had to allocate my resource to just debug the basic code as well...company is benefitted from this...