Additional information

Source: Supplier's web site

The project has been delivered on schedule

The budget has not been exceeded

Functionality complies with task

Description

Challenges:
  • Existing solutions were outdated, with complex user interfaces
  • Limited IT resources
  • Lengthy delays in mail delivery
  • Increasing costs of previous spam filtering solution
  • Performance Issues
  • Spam accuracy
UIA’s IT team found that solution is easy to use, with significant improvements compared to their predecessors. The Barracuda Email Security Gateway has far superior performance and stays up to date thanks to regular firmware updates. Whereas the old web filter only functioned as a forwarding proxy, the new Barracuda solution also scans the content of webpages. This means that if an employee visits an undesired website, they are redirected to a warning page that lets them know that the site is not permitted. Another big difference from the previous web filter is the user interface. 
“The user interface of the Barracuda Web Security Gateway is so straight-forward that it feels like I’m managing a Facebook page. Users don’t need much technical knowledge to use the product.”
Another feature that UIA utilizes on the Barracuda Email Security Gateway is email encryption, a simple, yet secure email service offered by Barracuda at no additional charge. This allows their employees to send out sensitive information and ensure secure communication. A cloud-based approach to encryption ensures that keys are stored centrally, eliminating the need for end-user key management. Results:
  • Ease of use; simple and straightforward user experience
  • Better spam accuracy
  • No delays in delivery
  • User-friendly configuration and setup

Details

Business tasks

Reduce Costs

Ensure Security and Business Continuity

Manage Risks

Problems

Risk or Leaks of confidential information

Malware infection via Internet, email, storage devices

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

Non-compliant with IT security requirements

Similar deployments

prev
next