
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026 19:46:09 GMT</lastBuildDate>
        <item>
            <title><![CDATA[The (hardware) key to making phishing defense seamless with Cloudflare Zero Trust and Yubico]]></title>
            <link>https://blog.cloudflare.com/making-phishing-defense-seamless-cloudflare-yubico/</link>
            <pubDate>Thu, 29 Sep 2022 13:01:00 GMT</pubDate>
            <description><![CDATA[ Announcing a new collaboration with Yubico, to remove any barriers for organizations of any size to deploying hardware security keys. ]]></description>
            <content:encoded><![CDATA[ <p></p>
    <div>
      <h4><i>UPDATE: This offer expired on January 3rd, 2023 at 8am PST.</i></h4>
      <a href="#update-this-offer-expired-on-january-3rd-2023-at-8am-pst">
        
      </a>
    </div>
    <p>Hardware keys provide the best authentication security and are phish-proof. But customers ask us how to implement them and which security keys they should buy. Today we’re introducing an exclusive program for Cloudflare customers that makes hardware keys more accessible and economical than ever. This program is made possible through a new collaboration with Yubico, the industry’s leading hardware security key vendor and provides Cloudflare customers with exclusive “Good for the Internet” pricing.</p><p>Yubico Security Keys are available today for any Cloudflare customer, and they easily integrate with Cloudflare’s Zero Trust service. That service is open to organizations of any size from a family protecting a home network to the largest employers on the planet. Any Cloudflare customer can sign in to the Cloudflare dashboard today and order hardware security keys for as low as $10 per key.</p><p>In July 2022, Cloudflare <a href="/2022-07-sms-phishing-attacks/">prevented a breach</a> by an SMS phishing attack that targeted more than 130 companies, due to the company’s use of Cloudflare Zero Trust paired with hardware security keys. Those keys were YubiKeys and this new collaboration with Yubico, the maker of YubiKeys, removes barriers for organizations of any size in deploying hardware keys.</p>
    <div>
      <h3>Why hardware security keys?</h3>
      <a href="#why-hardware-security-keys">
        
      </a>
    </div>
    <p>Organizations need to ensure that only the right users are connecting to their sensitive resources - whether those destinations are self-hosted web applications, SaaS tools, or services that rely on arbitrary TCP connections and UDP streams. Users traditionally proved their identity with a username and password but phishing attacks can deceive users to steal both of those pieces of information.</p><p>In response, teams began deploying <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">multifactor authentication (MFA)</a> tools to add an additional layer of security. Users needed to input their username, password, and some additional value. For example, a user might have an application running on their device which generates random numbers, or they might enroll their phone number to receive a code via text message. While these MFA options do improve security, they are still vulnerable to phishing attacks. Phishing websites evolved and prompted the user to input MFA codes or attackers stole a user’s phone number in a SIM swap attack.</p><p>Hardware security keys provide organizations with an MFA option that cannot be phished. These keys use the <a href="https://www.yubico.com/authentication-standards/webauthn/">WebAuthn standard</a> to present a certificate to the authentication service to validate the key in a cryptographically secured exchange, something a phishing website cannot obtain and later spoof.</p><p>Users enroll one or more keys with their identity provider and, in addition to presenting their username and password, the provider prompts for an MFA option that can include the hardware key. Every member of the team enjoys less friction by tapping on the key when they log in instead of fumbling for a code in an app. Meanwhile, security teams sleep better at night knowing their services are protected from phishing attacks.</p>
    <div>
      <h3>Extending hardware security keys with Cloudflare’s Zero Trust products</h3>
      <a href="#extending-hardware-security-keys-with-cloudflares-zero-trust-products">
        
      </a>
    </div>
    <p>While most identity providers now allow users to enroll hardware keys as an MFA option, administrators still do not have control to require that hardware keys be used. Individual users can fallback to a less secure option, like an app-based code, if they fail to present the security key itself.</p><p>We ran into this when <a href="/require-hard-key-auth-with-cloudflare-access/">we first deployed security keys</a> at Cloudflare. If users could fallback to a less secure and more easily phished option like an app-based code, then so could attackers. Along with more than 10,000 organizations, we use <a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare’s Zero Trust products</a> internally to, in part, secure how users connect to the resources and tools they need.</p><p>When any user needs to reach an internal application or service, Cloudflare’s network evaluates every request or connection for several signals like identity, <a href="/6-new-ways-to-validate-device-posture/">device posture</a>, and <a href="/two-clicks-to-enable-regional-zero-trust-compliance/">country</a>. Administrators can build granular rules that only apply to certain destinations, as well. An internal administrator tool with the ability to read customer data could require a healthy corporate device, connecting from a certain country, and belonging to a user in a particular identity provider group. Meanwhile, a new marketing splash page being shared for feedback could just require identity. If we could obtain the presence of a security key, as opposed to a different, less secure MFA option, from the user’s authentication then we could enforce that signal as well.</p><p>Several years ago, identity providers, hardware vendors, and security companies partnered to develop a new standard, the Authentication Method Reference (AMR), to share exactly that type of data. With AMR, identity providers can share several details about the login attempt, including the type of MFA option in use. Shortly after that announcement, we introduced the ability to build rules in Cloudflare’s Zero Trust platform to look for and enforce that signal. Now, teams of any size can build resource-based rules that can ensure that team members always use their hardware key.</p>
    <div>
      <h3>What are the obstacles to deploying hardware security keys?</h3>
      <a href="#what-are-the-obstacles-to-deploying-hardware-security-keys">
        
      </a>
    </div>
    <p>The security of requiring something that you physically control is also the same reason that deploying hardware keys adds a layer of complexity - you need to find a way to put that physical key in the hands of your users, at scale, and make it possible for every member of your team to enroll them.</p><p>In every case, that deployment starts with purchasing hardware security keys. Compared to app-based codes, which can be free, security keys have a real cost. For some organizations, that cost is a deterrent, and they stay less secure due to that hurdle, but it is important to note that not all MFA is created equal.</p><p>For other teams, especially the organizations that are now partially or fully remote, providing those keys to end users who will never step foot in a physical office can be a challenge for IT departments. When we first deployed hardware keys at Cloudflare, we did it at our company-wide retreat. Many organizations no longer have that opportunity to physically hand out keys in a single venue or even in global offices.</p>
    <div>
      <h3>Collaborating with Yubico</h3>
      <a href="#collaborating-with-yubico">
        
      </a>
    </div>
    <p>Birthday Week at Cloudflare has always been about removing the barriers and hurdles that keep users and teams from being more secure or faster on the Internet. As part of that goal, we’ve partnered with Yubico to continue to remove the friction in adopting a hardware key security model.</p><ul><li><p>The offer is open to any Cloudflare customer. Cloudflare customers can claim this offer for Yubico Security Keys directly in the Cloudflare dashboard.</p></li><li><p>Yubico is providing Security Keys at “Good for the Internet” pricing - as low as $10 per key.  Yubico will ship the keys to customers directly.</p></li><li><p>Both Cloudflare and Yubico developer docs and support organizations will guide customers in setting up keys and integrating them with their Identity Providers and with Cloudflare’s Zero Trust service.</p></li></ul>
    <div>
      <h3>How to get started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>You can request your own hardware keys by navigating to the dashboard, and following the <a href="https://dash.cloudflare.com/?to=/:account/yubico-promotion">banner notification flow</a>. Yubico will then email you directly using the administrator email that you have provided in your Cloudflare account. For larger organizations looking to deploy YubiKeys at scale, you can explore Yubico’s YubiEnterprise Subscription and receive a 50% discount off the first year of a 3+year subscription.</p><p>Already have hardware security keys? If you have physical hardware keys you can begin building rules in Cloudflare Access to enforce their usage by enrolling them into an identity provider that supports AMR, like Okta or Azure AD.</p><p>Finally, if you are interested in our own journey deploying Yubikeys alongside our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> product, check out this <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">blog post</a> from our Director of Security, Evan Johnson, that recaps Cloudflare’s experience and what we recommend from the lessons we learned.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">4aDR6dXMPbxaMJ7cJ9HDZ1</guid>
            <dc:creator>David Harnett</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing the Cloudflare One Partner Program]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-partner-program/</link>
            <pubDate>Thu, 23 Jun 2022 12:59:29 GMT</pubDate>
            <description><![CDATA[ Announcing the Cloudflare One Partner Program, a program built around our Zero Trust, Network as a Service and Cloud Email Security offerings. The program helps channel partners deliver on the promise of Zero Trust while monetizing this important architecture in tangible ways ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today marks the launch of the Cloudflare One Partner Program, a program built around our Zero Trust, Network as a Service and Cloud Email Security offerings. The program helps channel partners deliver on the promise of Zero Trust while monetizing this important architecture in tangible ways – with a comprehensive set of solutions, enablement and incentives. We are delighted to have such broad support for the program from IT Service companies, Distributors, Value Added Resellers, Managed Service Providers and other solution providers.</p><p>This represents both a new go-to-market channel for Cloudflare, and a new way for companies of all sizes to adopt <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust solutions</a> that have previously been difficult to procure, implement and support.</p>
    <div>
      <h3>The Cloudflare One Partner Program consists of the following elements:</h3>
      <a href="#the-cloudflare-one-partner-program-consists-of-the-following-elements">
        
      </a>
    </div>
    <ul><li><p>New, fully cloud-native Cloudflare One product suites that help partners streamline and accelerate the design of holistic Zero Trust solutions that are easier to implement. The product suites include our Zero Trust products and Cloud Email Security products from our recent acquisition of Area 1 Security.</p></li><li><p>All program elements are fully operationalized through Cloudflare's Distributors to make it easier to evaluate, quote and deliver Cloudflare One solutions in a consistent and predictable way.</p></li><li><p>The launch of new Partner Accreditations to enable partners to assess, implement and support Zero Trust solutions for their customers. This includes a robust set of training to help partners deliver the margin-rich services their customers need to realize the full value of their Zero Trust investments.</p></li><li><p>One of the most robust partner incentive structures in the industry, rewarding partners for the value they add throughout the entire customer lifecycle.</p></li></ul><p>For more details visit our website here <a href="https://www.cloudflare.com/partners/cloudflare-one-partner-program/">Cloudflare One Partner Program</a>. For partners, we’ve added a dedicated Cloudflare One page in the <a href="https://portal.cloudflarepartners.com/English/">Partner Portal</a>.</p><p>"<i>TD Synnex has been working hand-in-hand with Cloudflare on the launch of their new Cloudflare One Partner Program for Zero Trust. This program takes Zero Trust from a term that's broadly and loosely used and cuts through the hype with the solution bundles, enablement resources, and incentives that help the channel deliver true business value</i>", said Tracy Holtz, Vice President, Security and Networking at TD Synnex. "<i>TD Synnex being the world's leading IT distributor and solutions aggregator is thrilled to be furthering our partnership with Cloudflare to build and enable this Program of partners as it is encompassing the solution that all organizations need today.</i>"</p>
    <div>
      <h3>Why is Cloudflare making this investment in the Cloudflare One Partner Program now?</h3>
      <a href="#why-is-cloudflare-making-this-investment-in-the-cloudflare-one-partner-program-now">
        
      </a>
    </div>
    <p>The Cloudflare One Partner Program is launching to address the explosive demand to <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implement Zero Trust architectures</a> that help organizations of all sizes safely and securely accelerate their digital transformations. In the face of ever-increasing cyber threats, <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> moves from a concept to an imperative. Cloudflare is in a unique position to make this happen to one of the richest Zero Trust product suites in the industry including a Secure Web Gateway, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">ZTNA Access Management</a>, CASB, Browser Isolation, DLP and <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloud Email Security</a>. These products are tightly integrated and easy-to-use enabling a holistic, implementable solution.</p><p>Additionally, our Zero Trust suite has a comprehensive tech partner ecosystem that makes it easy for our customers to integrate our solutions in their existing tech stack. We integrate and closely partner with industry leaders across all major categories — identity, endpoint detection and response, mobile device management, and email service providers — to make Cloudflare One flexible and robust for our diverse customer base. Our strategic partners include Microsoft, CrowdStrike, SentinelOne, Mandiant, and others.</p><p>“<i>Enterprises have come to terms with the notion of a disintegrating traditional perimeter. The distributed and dynamic perimeter of today requires a fundamentally new approach to security. In partnership with Cloudflare, our AI-powered cybersecurity platform offers modern organizations a robust Zero Trust security solution that spans devices, network, and mission-critical applications.</i>” said Chuck Fontana, Senior Vice President, Business Development, SentinelOne</p><p>But it takes more than just the products to realize the promise of Zero Trust. It requires the skills and expertise of the channel, as trusted advisors to their customers, to optimize the solutions to drive the specific required business outcomes, or time-to-value for the customer's investment.</p><p><i>“We’ve been humbled by how our existing partners have contributed to the explosive growth of our Zero Trust business, but increased customer demand is creating an opportunity for our partners to play a bigger role in how we go to market. More than ever before we are relying on our partners to help customers evaluate, implement and support Zero Trust solutions”</i>, said Matthew Price, CEO of Cloudflare.</p><p>"<i>By furthering our partnership with Cloudflare in the new Cloudflare One Partner Program, Rackspace Technology is able to deliver Cloudflare's leading Zero Trust solutions paired with Rackspace Elastic Engineering and professional services at their massive scale and with continued implementation support,</i>" said Gary Alterson, Vice President, Security Solutions at Rackspace Technology. "<i>Since partnering with Cloudflare to develop Zero Trust solutions, we've already seen strong engagement with clients and prospects such as the likes of one of the world's largest creative companies.</i>"</p><p>"<i>With the launch of this new Cloudflare One Partner Program including integrated zero trust focused solution bundles and partner enablement, we look forward to further expanding our go-to-market with Cloudflare and helping customers smoothly and quickly transform their network security by adopting a zero trust strategy for protecting their infrastructure, teams and applications,</i>" stated Deborah Jones, Senior Product Marketing Manager, Alliances, IBM Security Services.</p><p>"<i>Assurance Data's charter is to deliver integrated security solutions for next-generation cyber defense. We're thrilled to work with Cloudflare, adding their innovative, 100% cloud-native Zero Trust solutions to our technology portfolio and appreciate the significant investment they are making in the partner channel, with deep partner enablement and service delivery support along with rich incentives.  The new Cloudflare One Partner Program is truly a triple win: a win for us, for our Cloudflare partnership and for our customers,</i>" stated Randy Stephens, COO, Assurance Data.</p><p>"<i>Zero Trust is no-brainer, but many people still believe it's too complex,</i>" stated Scott McCrady, CEO, SolCyber. "Cloudflare has made it easy with the new Cloudflare One Partner Program. We love it because it helps our customers get integrated Zero Trust solutions in place fast, with all the enablement and incentives you would expect from a first-rate partner program."</p>
    <div>
      <h3>How is the Cloudflare One Partner program different from Cloudflare’s general Partner Program?</h3>
      <a href="#how-is-the-cloudflare-one-partner-program-different-from-cloudflares-general-partner-program">
        
      </a>
    </div>
    <p>This new program builds on top of the benefits of the existing partner program. So all the current benefits provided to partners are available, but there are a few valuable additions for Cloudflare One partners: Product suites are listed with Distribution partners and available for VARs and other partners to quote and fulfill; We’ve added Accreditations and new training packages, so that partners have rich resources and training on which to build and enhance their own service practices; Incentives for partners are enhanced with well-structured discounts off the list prices available to partners at our Distribution partners including extra incentives that follow a “reward for value” model.</p><p>"<i>As a member of AVANT's Security Council, Cloudflare has been a close innovation partner of AVANT's as we enable our network of Trusted Advisors to help their customers adopt the very latest in cloud technologies,</i>" stated Shane McNamara, EVP, Engineering and Operations, AVANT Communications. "<i>With this new Cloudflare One Partner Program for Zero Trust, Cloudflare has launched a first-of-kind set of integrated product suites and partner services packages that will give our Trusted Advisors a compelling set of solutions to take to market.</i>"</p><p>“<i>Cloudflare’s product suite has an important role to play in advanced threat detection and in Wipro’s Zero Trust offers to clients,</i>” said Tony Buffomante, SVP, Global CRS Leader of Wipro. “<i>The Cloudflare One Partner Program has provided a quick ramp to build our practice. We're already seeing significant market use cases from our partnership, with Wipro CyberSecurists providing application security, implementation services and ongoing managed services from Wipro’s 16 global cyber defense centers.</i>”</p><p>"<i>Cloudflare has made Zero Trust adoption easy, with these integrated product bundles and partner services speeding customers' journeys to comprehensive, Zero Trust-based security for teams, infrastructure and applications. We're excited to be one of Cloudflare's initial launch partners for these innovative solutions,</i>" stated Dave Trader, Field CISO, Presidio.</p><p>"<i>We are a services provider delivering cybersecurity and IT transformation solutions to private equity and mid-market organizations. The Cloudflare One Partner Program fits with our integrated services and support model, and we're already seeing strong customer interest in the Cloudflare One product suites. We're excited to be one of Cloudflare's initial partners for this strategic new channel program,</i>" stated Chris Hueneke, Chief Information Security Officer, RKON.</p><p>"<i>We're thrilled to announce that we officially provide managed services to support Cloudflare One solutions to help customers mitigate cyber security threats with a holistic Zero Trust approach to security,</i>" according to Joey Campione, Managing Director, Opticca Security.</p><p>"<i>Cloudflare is making it easy for us to design and deliver a Zero Trust solution, especially for our mid-market customers where the bundles ensure a complete, integrated solution,</i>" said Katie Hanahan, vCISO and Vice President, Cybersecurity Strategy at ITsavvy, a leading IT solution provider. "<i>And we love the investment in tools and training to help us build out our own professional services offerings to help drive the best possible outcomes for our clients.</i>"</p>
    <div>
      <h3>A program built around comprehensive Zero Trust product suites</h3>
      <a href="#a-program-built-around-comprehensive-zero-trust-product-suites">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EUWu44ZuGyEJnSjB1cZ58/f1353dfdd47342040f0e098c3ff332b7/image5-10.png" />
            
            </figure><p>Cloudflare One offers comprehensive Zero Trust solutions that raise visibility, eliminate complexity, and reduce risks as remote and office users connect to applications and the Internet. In a single-pass architecture, traffic is verified, filtered, inspected, and isolated from threats. There is no performance trade-off: users connect through data centers nearby in 270+ cities in over 100 countries.</p><p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image6-12.png" /><strong>Cloudflare Access</strong> augments or replaces corporate VPN clients by <a href="https://www.cloudflare.com/application-services/solutions/">securing SaaS and internal applications</a>. Access works with your identity providers and endpoint protection platforms to enforce default-deny, Zero Trust rules limiting access to corporate applications, private IP spaces, and hostnames.</p>
<p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image1-34.png" /><b>Cloudflare Gateway</b> is our threat and data protection solution. It keeps data safe from malware, ransomware, phishing, command and control, Shadow IT, and other Internet risks over all ports and protocols.</p>
<p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image8-8.png" /><b>Cloudflare Area 1 Email Security</b> crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks at the earliest stage of the attack cycle, and enhances built-in security from cloud email providers.</p>
<p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image7-6.png" /><b>Cloudflare Browser Isolation</b> makes web browsing safer and faster, running in the cloud away from your network and endpoints, insulating devices from attacks.</p>
<p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image3-23.png" /><b>Cloudflare CASB</b> (Cloud Access Security Broker) gives customers comprehensive visibility and control over SaaS apps to easily <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">prevent data leaks</a>, block insider threats, and avoid compliance violations.</p>
<p><img src="http://staging.blog.mrk.cfdata.org/content/images/2022/06/image4-21.png" /><b>Cloudflare Data Loss Prevention</b> enables customers to detect and prevent data exfiltration or data destruction. Analyze network traffic and internal "endpoint" devices to identify leakage or loss of confidential information, and stay compliant with industry and data privacy regulations.</p><p>For more information on the program and Zero Trust product suites go <a href="https://www.cloudflare.com/partners/cloudflare-one-partner-program/">here</a>.</p>
    <div>
      <h3>What’s Next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Today’s launch of the Cloudflare One Partner Program represents just one step in a multi-step journey to invest in our partners and help customers implement and support Zero Trust solutions. Over the coming months we will be expanding the program internationally and continuing to add training resources around Cloudflare Zero Trust accreditations. We are also hosting a series of partner webinars on this new program. Please check the <a href="http://portal.cloudflarepartners.com">Partner Portal</a> for details and future partner events.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">5zESeaQSWqXVjvlcu1kZxp</guid>
            <dc:creator>Matthew Harrell</dc:creator>
            <dc:creator>Steve Pataky</dc:creator>
            <dc:creator>David Harnett</dc:creator>
        </item>
        <item>
            <title><![CDATA[Setting up Cloudflare for Teams as a Start-Up Business]]></title>
            <link>https://blog.cloudflare.com/setting-up-cloudflare-for-teams-as-a-start-up-business/</link>
            <pubDate>Tue, 05 May 2020 11:00:00 GMT</pubDate>
            <description><![CDATA[ S2 Systems, recently acquired by Cloudflare, provides a start-up’s perspective of setting up Cloudflare for Teams and how it solved some problems that we struggled with for way too long. ]]></description>
            <content:encoded><![CDATA[ <p>Earlier this year, Cloudflare acquired S2 Systems. We were a start-up in Kirkland, Washington and now we are home to Cloudflare’s Seattle-area office.</p><p>Our team developed a <a href="/cloudflare-and-remote-browser-isolation/">new approach</a> to remote browser isolation (RBI), a technology that runs your web browser in a cloud data center, stopping threats on the Internet from executing any code on your machine. The closer we can bring that data center to the user, the faster we can make that experience. Since the acquisition, we have been focused on running our RBI platform in every one of Cloudflare’s data centers in 200 cities around the world.</p><p>The RBI solution will join a product suite that we call <a href="https://teams.cloudflare.com/">Cloudflare for Teams</a>, which consists of two products: Access and Gateway.</p><p>Those two products solve a number of problems that companies have with securing users, devices, and data. As a start-up, we struggled with a few of these challenges in really painful ways:</p><ul><li><p>How do we let prospects securely trial our RBI platform?</p></li><li><p>How do we keep our small office secure without an IT staff?</p></li><li><p>How can we connect to the powerful, but physically clunky and heavy development machines, when we are not in that office?</p></li></ul><p>Dogfooding our own products has <a href="/dogfooding-from-home/">long been part</a> of Cloudflare’s identity, and our team has had a chance to do the same from a new perspective.</p>
    <div>
      <h2>Managing access to our RBI service for early adopter customers and partners</h2>
      <a href="#managing-access-to-our-rbi-service-for-early-adopter-customers-and-partners">
        
      </a>
    </div>
    <p>As we built the first version of our product, we worked closely with early adopters to test the product and gather feedback. However, we were not ready to share the product with the entire world yet, so we needed a way to lock down who could reach the prototype and beta versions.</p><p>It took us the best part of six months to build, test and modify (multiple times) the system for managing access to the product.</p><p>We chose a complicated solution that took almost as much time to build as did features within the product. We deployed a load balancer that also served as a reverse proxy in front of the RBI host and acted as a bouncer for unauthenticated requests. That sat behind an ASP.NET core server. Furthest to the right sat the most difficult component: identity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/77co7h4i4KJ24XBDjAfdzx/0a4e7db69abf7732ca2674753eefeea6/image-1.png" />
            
            </figure><p>We had to manually add identity providers every time a new customer wanted to test out the service. Our CTO frequently burned hours each day adding customers manually, configuring groups, and trying to balance policies that kept different tenants secure.</p>
    <div>
      <h3>From six months to 30 minutes</h3>
      <a href="#from-six-months-to-30-minutes">
        
      </a>
    </div>
    <p>As we learned more about Cloudflare during the due diligence period, we started to hear more about Cloudflare Access. Like the RBI solution, Access applied Cloudflare’s network to a new type of problem: how do teams keep their users and resources secure without also slowing them down?</p><p>When members of the Cloudflare team visited our office in Kirkland, none of them needed a VPN to connect. Their self-managed applications just worked, like any other SaaS app.</p><p>We then had a chance to try Access ourselves. After the deal closed, we collaborated with the Cloudflare team on an announcement. This started just hours after the acquisition completed, so we did not have a chance to onboard to Cloudflare’s corporate SSO yet. Instead, the team secured new marketing pages and forms behind Cloudflare Access which prompted us to login with our S2 emails. Again, it just worked.</p><p>We immediately began rethinking every hour we had spent building our own authentication platform. The next day, we set up a Cloudflare Access account. We secured our trial platform by building a couple of rules in the Access UI to decide who should be able to reach it.</p><p>We sent a note out to the team to try it out. They logged in with our SSO credentials and Cloudflare connected them to the application. No client needed on their side, no multi-level authentication platform on ours.</p><p>We shut down all of our demo authentication servers. Now, when we have customers who want to trial the RBI technology, we can add their account to the rules in a couple of minutes. They visit a single hostname, login, and can start connecting to a faster, safer browser.</p>
    <div>
      <h2>Protecting our people and devices from Internet threats</h2>
      <a href="#protecting-our-people-and-devices-from-internet-threats">
        
      </a>
    </div>
    <p>When we signed a sublease for our first office location, we found the business card of the building’s Comcast representative taped to the door. We called them and after a week the Comcast Business technicians had a simple network running for us.</p><p>We wanted to implement a real <a href="https://www.cloudflare.com/network-security/">network security model</a> for our small office. We tried deploying multiple firewalls, with access controls, and added some tools to secure outbound traffic.</p><p>We spent way too much time on it. Every configuration change involved the staff trying to troubleshoot problems. The system wound up blocking things that should not be blocked, and missing things that should be blocked. It reached the point where we just turned off most of it.</p><p>Another product in the Cloudflare for Teams platform, <a href="https://teams.cloudflare.com/gateway/index.html">Cloudflare Gateway</a>, solved this challenge for us. Rather than 30 minutes, this upgrade took about 10.</p><p>Cloudflare Gateway secures users from threats on the Internet by stopping traffic from devices or office networks from reaching malicious destinations. The first feature in the product, DNS-based security, adds threat-blocking into the world’s fastest DNS resolver, Cloudflare’s 1.1.1.1 product.</p><p>We created a policy to block security threats, changed our router’s DNS settings, and never had to worry about it again. As needed, we could log back into the UI and review reports that told us about the malicious traffic that Gateway caught.</p><p>As I’m writing this post, none of us are working in that office. We’re staying home, but we still can use Gateway’s security model. Gateway <a href="/how-to-use-1-1-1-1-w-warp-app-and-cloudflare-gateway-to-protect-your-phone-from-security-threats/">now integrates</a> with the 1.1.1.1 app for mobile devices; in a couple of clicks, we can protect iOS and Android phones and tablets with the same level of security. Soon, we’ll be <a href="/announcing-the-beta-for-warp-for-macos-and-windows/">releasing desktop versions</a> to make that easy on every device.</p>
    <div>
      <h2>Connecting to dev machines while working from home</h2>
      <a href="#connecting-to-dev-machines-while-working-from-home">
        
      </a>
    </div>
    <p>Back at the office, we still have a small fleet of high-powered Linux machines. These desktops run 16 cores, 32 threads, and 32GB of DDR memory. We use these to build and test Chromium, but dragging these boxes to each developer’s house would have been a huge hassle.</p><p>We still had a physical VPN appliance that we had purchased during our start-up days. We had hired vendors to install it onsite and configure some elaborate syncing with our identity providers. The only thing more difficult than setting it up was using it. With everyone suddenly working from home, I don’t think we would have been able to make it work.</p><p>So we returned to Cloudflare Access instead. Working with guidance from Cloudflare’s IT and Security teams, we added a new hostname in the Cloudflare account for the Seattle area office. We then installed the Cloudflare daemon, <code>cloudflared</code>, on the machines in the offices. Those daemons created outbound-only tunnels from the machines to the Cloudflare network, available at a dedicated subdomain for each developer.</p><p>On the other side of that connection, each engineer on our team installed <code>cloudflared</code> on their machines at home. They need to make one change to their SSH config file, adding two lines that include a ProxyCommand. The setup requires no other modifications, no special SSH clients or commands. Even the developers who rely on tools like Visual Studio Code’s Remote SSH extension could keep their workflow exactly the same.</p><p>The only difference is that, instead of a VPN, when developers start a new SSH session, Access prompts them to login with Cloudflare’s SSO. They do so and are connected to their machine through Cloudflare’s network and smart routing technology.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>As a start-up, every hour we spent trying to cobble together tools was an hour we lost building our product but we needed to provide secure access to our product so we made the time investment. The only other option would have been to purchase products that were way outside of the price range for a small start-up where the only office perk was bulk Costco trail mix.</p><p>Cloudflare for Teams immediately solved the challenges we had, in a fairly comprehensive way. We now can seamlessly grant prospects permissions to try the product, our office network is safer, and our developers can stay productive at home.</p><p>It could be easy to think “I wish we had done this sooner,” and to some extent, I do. However, seeing the before-and-after of our systems has made us more excited about what we’re doing as we bring the remote browser technology into Cloudflare’s network.</p><p>The RBI platform is going to benefit from the same advantages of that network that make features in Access and Gateway feel like magic. We’re going to apply everything that Cloudflare has learned securing and improving connections and use it to solve a new customer problem.</p><p>Interested in skipping the hard parts about our story and getting started with Cloudflare for Teams? You can use all of the features covered in this blog post today, <a href="https://teams.cloudflare.com/">at no cost through September</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">Sju4smOb0O8W8tu1u6bV5</guid>
            <dc:creator>David Harnett</dc:creator>
        </item>
    </channel>
</rss>