It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda Vulnerability Manager

Overview

  • Last updated on

Vulnerabilities, or security risks, are weaknesses in websites and web applications. An insecure web application can provide hackers access to confidential corporate systems and user data and other malicious activities. Barracuda Vulnerability Manager scans your web applications based on your custom configuration settings, allowing you to automate the process to uncover and resolve weaknesses in your websites and web applications.

Barracuda Vulnerability Manager is a web application vulnerability management solution to help businesses automatically identify, assess, and mitigate web application security risks including those categorized by the Open Web Application Security Project (OWASP) including SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and others. Once vulnerabilities are identified, you can modify and update code, or select to integrate your systems with a Barracuda Web Application Firewall to modify applicable security policy settings or configure to mitigate the reported vulnerabilities. Together with Barracuda Web Application Firewall (WAF), Barracuda Vulnerability Manager provides a comprehensive solution to identify and secure against web application vulnerabilities.

Barracuda Vulnerability Manager scans web applications, targeting the web servers to which it is pointed; it does not scan your network or infrastructure.

You can scan any web application that is publicly accessible, regardless of where it is hosted, including on premises, co-located, or on a public cloud server. Web applications can be scanned regardless of whether they are behind a firewall or load balancer.

Vulnerability Manager does not collect any personally identifiable information (PII) or records from your application’s database, regardless of whether this information is publicly accessible. It does not collect any data that could be compromised. It only alerts you to the problem. 


Where to Start

Key Features