
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 07 Apr 2026 16:33:34 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Cloudflare partners with KnowBe4 to equip organizations with real-time security coaching to avoid phishing attacks]]></title>
            <link>https://blog.cloudflare.com/knowbe4-emailsecurity-integration/</link>
            <pubDate>Fri, 17 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Area 1 Solution works with Knowbe4 to provide customers with security and awareness training ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we are very excited to announce that Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">cloud email security solution</a>, Area 1, now integrates with KnowBe4, a leading security awareness training and simulated phishing platform. This integration allows mutual customers to offer real-time coaching to their employees when a phishing campaign is detected by Cloudflare’s email security solution.</p><p>We are all aware that phishing attacks often use email as a vector to deliver the <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">fraudulent message</a>. Cybercriminals use a range of tactics, such as posing as a trustworthy organization, using urgent or threatening language, or creating a sense of urgency to entice the recipient to click on a link or download an attachment.</p><p>Despite the increasing sophistication of these attacks and the solutions to stop them, human error remains the weakest link in this chain of events. This is because humans can be easily manipulated or deceived, especially when they are distracted or rushed. For example, an employee might accidentally click on a link in an email that looks legitimate but is actually a phishing attempt, or they might enter their password into a fake login page without realizing it. According to the 2021 Verizon Data Breach Investigations Report, phishing was the most common form of social engineering attack, accounting for 36% of all breaches. The report also noted that 85% of all breaches involved a human element, such as human error or social engineering.</p><p>Therefore, it is essential to educate and train individuals on how to recognize and avoid phishing attacks. This includes raising awareness of common phishing tactics and training individuals to scrutinize emails carefully before clicking on any links or downloading attachments.</p>
    <div>
      <h2>Area1 integrates with KnowBe4</h2>
      <a href="#area1-integrates-with-knowbe4">
        
      </a>
    </div>
    <p>Our integration allows for the seamless integration of Cloudflare’s advanced email security capabilities with KnowBe4's Security Awareness Training platform, KSMAT, and its real-time coaching product, SecurityCoach. This means that organizations using both products can now benefit from an added layer of security that detects and prevents email-based threats in real-time while also training employees to recognize and avoid such threats.</p><p>Organizations can offer real-time security coaching to their employees whenever our <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security solution</a> detects four types of events: <b>malicious attachments, malicious links, spoofed emails, and suspicious emails</b>. IT or security professionals can configure their real-time coaching campaigns to immediately deliver relevant training to their users related to a detected event.</p><blockquote><p>“KnowBe4 is proud to partner with Cloudflare to provide a seamless integration with our new SecurityCoach product, which aims to deliver real-time security coaching and advice to help end users enhance their cybersecurity knowledge and strengthen their role in contributing to a strong security culture. KnowBe4 is actively working with Cloudflare to provide an API-based integration to connect our platform with systems that IT/security professionals already utilize, making rolling out new products to their teams an easy and unified process.”- <b>Stu Sjouwerman</b>, CEO, KnowBe4</p></blockquote><p>By using the integration, organizations can ensure that their employees are not only protected by advanced security technology that detects and blocks malicious emails, but are also educated on how to identify and avoid these threats. This has been a commonly demanded feature from our customers and we have made it simple for them to implement it.</p>
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    
    <div>
      <h3>Create private key and public key in the Area 1 dashboard</h3>
      <a href="#create-private-key-and-public-key-in-the-area-1-dashboard">
        
      </a>
    </div>
    <p>Before you can set up this integration in your KnowBe4 (KMSAT) console, you will need to create a private key and public key with Cloudflare.</p><ul><li><p>Log in to your Cloudflare Area 1 email security console as an admin.</p></li><li><p>Click the gear icon in the top-right corner of the page, and then navigate to the Service Accounts tab.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ey4jNQI1pauKRiKZdISs3/a4b3eb87ba6a20cf3b23b49ac4f597f1/image6-9.png" />
            
            </figure><ul><li><p>Click + Add Service Account.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/467yKdAIBCimqDsTP8zKAl/4233d948c28b71f5dc2439f35e45dc9b/image8-1.png" />
            
            </figure><ul><li><p>In the NAME field, enter a name for your new service account.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4H0CPpuEfrWdymJ2FPFIc5/6e49f1c54cfb70a515e738e9eb1a5a20/image2-21.png" />
            
            </figure><ul><li><p>Click + Create Service Account.</p></li><li><p>In the pop-up window that opens, copy and save the private key somewhere that you can easily access. You will need this key to complete the setup process in the Set Up the Integration in your KnowBe4 (KMSAT) Console section below.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NaqxVtLLs9rKZQNliM7A4/7f8a4b304dde7dd1e87807ef59888398/image4-12.png" />
            
            </figure>
    <div>
      <h3>Set up the integration in your KnowBe4 (KMSAT) Console</h3>
      <a href="#set-up-the-integration-in-your-knowbe4-kmsat-console">
        
      </a>
    </div>
    <p>Once you have created a private key and public key in your Cloudflare Area 1 email security console, you can set up the integration in your KMSAT console. To register Cloudflare Area 1 email security with SecurityCoach in your KMSAT console, follow the steps below:</p><ul><li><p>Log in to your KMSAT console and navigate to SecurityCoach &gt; Setup &gt; Security Vendor Integrations.</p></li><li><p>Locate Cloudflare Area 1 Email Security and click Configure.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3D1GlwJNh9qoOcZJR6oi3h/cfd4141a8633f294f185625ad701de09/Screenshot-2023-03-17-at-10.41.52.png" />
            
            </figure><ul><li><p>Enter the Public Key and Private Key that you saved in the ‘Create your private Key and public key’ section above.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MvTlzLSse244i6zX7BEfR/bb4f252f7999163c709684d5b1144ec9/image1-39.png" />
            
            </figure><ul><li><p>Click authorize. Once you’ve successfully authorized this integration, you can manage detection rules for Cloudflare Area 1 on the ‘Detection rules subtab’ of SecurityCoach.</p></li></ul>
    <div>
      <h3>SecurityCoach in action</h3>
      <a href="#securitycoach-in-action">
        
      </a>
    </div>
    <p>Now that the SecurityCoach is set up, users within your organization will receive messages if Area 1 finds that a malicious email was sent to them. An example one can be seen below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4FZKUgGyVx5CfraGBSWhVM/656d9ebae8714fb95de60ae8c62db045/image9-4.png" />
            
            </figure><p>This message not only alerts the user to be more scrutinous about emails they are receiving, since they now know they are being actively targeted, but also provides them with followup steps that they can take to ensure their account is as safe as possible. The image and text that shows up in the email can be configured from the KnowBe4 console giving customers full flexibility on what to communicate with their employees.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/srYnIoutzlBVaeY9Hs0gr/71c69507db0906c18b1c49c15a7d6fb7/image5-4.png" />
            
            </figure>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’ll be expanding this integration with KnowBe4 to our other <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust products</a> in the coming months. If you have any questions or feedback on this integration, please contact your account team at Cloudflare. We’re excited to continue closely working with technology partners to expand existing and create new integrations that help customers on their <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> journey.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <guid isPermaLink="false">1v0nId9KOX5TFKER9wsKnM</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Deeksha Lamba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust security with Ping Identity and Cloudflare Access]]></title>
            <link>https://blog.cloudflare.com/cloudflare-ping/</link>
            <pubDate>Tue, 14 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Access and Ping Identity offer a powerful solution for organizations looking to implement Zero Trust security controls to protect their applications and data. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In today's digital landscape, traditional perimeter based security models are no longer enough to protect sensitive data and applications. As cyber threats become increasingly sophisticated, it's essential to adopt a security approach that assumes that all access is unauthorized, rather than relying on <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">network perimeter-based security</a>.</p><p><a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> is a security model that requires all users and devices to be authenticated and authorized before being granted access to applications and data. This approach offers a <a href="https://www.cloudflare.com/application-services/solutions/">comprehensive security solution</a> that is particularly effective in today's distributed and cloud-based environments. In this context, Cloudflare Access and Ping Identity offer a powerful solution for organizations looking to <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implement Zero Trust security controls</a> to <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect their applications and data</a>.</p>
    <div>
      <h3>Enforcing strong authentication and access controls</h3>
      <a href="#enforcing-strong-authentication-and-access-controls">
        
      </a>
    </div>
    <p>Web applications provide businesses with enhanced scalability, flexibility, and cost savings, but they can also create vulnerabilities that malicious actors can exploit. Ping Identity and Cloudflare Access can be used together to secure applications by enforcing strong authentication and access controls.</p><p>One of the key features of Ping Identity is its ability to provide single sign-on (SSO) capabilities, allowing users to log in once and be granted access to all applications they are authorized to use. This feature streamlines the authentication process, reducing the risk of password fatigue and making it easier for organizations to manage access to multiple applications.</p><p>Cloudflare Access, on the other hand, provides Zero Trust access to applications, ensuring that only authorized users can access sensitive information. With Cloudflare Access, policies can be easily created and managed in one place, making it easier to ensure clear and consistent policy enforcement across all applications. Policies can include specific <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/mfa-requirements/">types of MFA</a>, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/">device posture</a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/external-evaluation/">even custom logic</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3lHZq8Le2pjp6fSePPNfbs/0f05ae20b0b8301e66dd2b005ca323b7/image2-12.png" />
            
            </figure>
    <div>
      <h3>Securing custom applications with Access and Ping</h3>
      <a href="#securing-custom-applications-with-access-and-ping">
        
      </a>
    </div>
    <p>Legacy applications pose a significant security risk to organizations as they may contain vulnerabilities that are no longer patched or updated. However, businesses can use Cloudflare and Ping Identity to help secure legacy applications and reduce the risk of cyberattacks.</p><p>Legacy applications may not support modern authentication methods, such as SAML or OIDC, which makes security controls like MFA easier to enforce, making them vulnerable to unauthorized access. By integrating Ping Identity with Cloudflare Access, businesses can enforce MFA and SSO for users accessing legacy applications. This can help ensure that only authorized users have access to sensitive data and reduce the risk of credential theft and account takeover.</p><p>For example, many organizations have legacy applications that lack modern security features like MFA or SSO. This is because direct code modifications were previously required to implement modern security features. Code modifications of legacy applications can be risky, difficult or even impossible in some situations. By integrating these applications with Ping Identity and Cloudflare Access, organizations can enforce stronger security controls, making it harder for unauthorized users to gain access to sensitive information. All while not requiring underlying changes to the application itself.</p>
    <div>
      <h3>Full integration support for PingOne and PingFederate customers</h3>
      <a href="#full-integration-support-for-pingone-and-pingfederate-customers">
        
      </a>
    </div>
    <p>We are excited to announce that Cloudflare is now offering <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/pingone-oidc/">full integration support for PingOne</a> customers. This means that Ping Identity customers can now easily integrate their identity management solutions with Cloudflare Access to provide a comprehensive security solution for their applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fqdiY66KbQ10s35cF8g6J/b79b38033c033dd434589f5c22521d96/image1-21.png" />
            
            </figure>
    <div>
      <h3>User and group synchronization via SCIM</h3>
      <a href="#user-and-group-synchronization-via-scim">
        
      </a>
    </div>
    <p>In addition to this announcement, we are also excited to share our plans to add user and group synchronization via SCIM in the near future. This will allow organizations to easily synchronize user and group data between Ping Identity and Cloudflare Access, streamlining access management and improving the overall user experience.</p><blockquote><p><i>“A cloud-native Zero Trust security model has become an absolute necessity as enterprises continue to adopt a cloud-first strategy. Cloudflare and Ping Identity have robust product integrations in place to help security and IT leaders prevent attacks proactively and increase alignment with zero trust best practices.”</i><i>– </i><b><i>Loren Russon</i></b><i>, SVP of Product &amp; Technology, Ping Identity</i></p></blockquote>
    <div>
      <h3>A powerful solution for Zero Trust security controls</h3>
      <a href="#a-powerful-solution-for-zero-trust-security-controls">
        
      </a>
    </div>
    <p>We believe that these integrations will provide a powerful solution for organizations looking to implement Zero Trust security controls to protect their applications and data. By combining Ping Identity's identity management capabilities with Cloudflare Access's Zero Trust access controls and MFA capabilities, organizations can ensure that only authorized users are granted access to sensitive information. This approach provides a comprehensive security solution that is particularly effective in today's distributed and cloud-based environments.</p><p>We look forward to continuing to improve our integration capabilities with Ping Identity and other <a href="https://www.cloudflare.com/learning/access-management/what-is-identity-and-access-management/">identity management solutions</a>, to provide organizations with the best possible security solution for their applications and data.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Guest Post]]></category>
            <guid isPermaLink="false">2xH5c704HEL0jq6TT2Kqvw</guid>
            <dc:creator>Deeksha Lamba</dc:creator>
            <dc:creator>Kenny Johnson</dc:creator>
            <dc:creator>Peter Holko (Guest Author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Bring your own license and threat feeds to use with Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/bring-your-own-threat-feeds-with-cloudflare-one/</link>
            <pubDate>Mon, 20 Jun 2022 13:57:23 GMT</pubDate>
            <description><![CDATA[ Today, we are announcing new integrations that enable our customers to integrate third-party threat intel data with the rich threat intelligence from Cloudflare One products — all within the Cloudflare dashboard ]]></description>
            <content:encoded><![CDATA[ <p></p><p>At Cloudflare, we strive to make our customers’ lives simpler by building products that solve their problems, are extremely easy to use, and integrate well with their existing tech stack. Another element of ensuring that we fit well with existing deployments is integrating seamlessly with additional solutions that customers subscribe to, and making sure those solutions work collaboratively together to solve a pain point.</p><p>Today, we are announcing new integrations that enable our customers to integrate third-party threat intel data with the rich threat intelligence from <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> products — all within the Cloudflare dashboard. We are releasing this feature in partnership with Mandiant, Recorded Future, and VirusTotal, and will be adding new partners in the coming months.</p><p>Customers of these threat intel partners can upload their API keys to the Cloudflare Security Center to enable the use of additional threat data to create rules within Cloudflare One products such as Gateway and Magic Firewall, and infrastructure security products including the Web Application Firewall and API Gateway. Additionally, search results from Security Center’s threat investigations portal will also be automatically enriched with licensed data.</p>
    <div>
      <h3>Entering your API keys</h3>
      <a href="#entering-your-api-keys">
        
      </a>
    </div>
    <p>Customers will be able to enter their keys by navigating to Security Center → Reference Data, and clicking on the ellipsis next to desired rows and selecting “Edit API key”. Once a valid key has been added, the status listed on the row should change from “No key provided” to “Active key”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7olsgmCCo4KsMyoIsyRY8M/e26259c724d6cf3e3a051471205162d8/image3-17.png" />
            
            </figure>
    <div>
      <h3>Mandiant</h3>
      <a href="#mandiant">
        
      </a>
    </div>
    <p>Mandiant Advantage customers with a Threat Intelligence subscription can enter their API keys and leverage  Mandiant’s most popular feeds of FQDN and IP address indicators of security threats and their related context throughout Cloudflare One products.</p><p>These include lists organized by threat category and aggregations of most active malicious infrastructure. By curating the most recent data and data relevant to your infrastructure on the Cloudflare network, Cloudflare will make it easy to take advantage of active and relevant indicators of malicious activity from Mandiant’s extensive threat intelligence data. Cloudflare takes care of importing the data and refreshing it regularly to help protect you from the latest threats Mandiant sees on the frontlines. Cloudflare products such as Gateway, Magic Firewall, and Web Application Firewall (WAF) will have access to the threat intelligence data and make it easy to operationalize using the same rule builder you use today.</p><blockquote><p>“As cyber threats continue to rapidly evolve, organizations require up-to-date and relevant intelligence integrated with their preferred technology solutions to comprehensively protect their environments. Together, Mandiant and Cloudflare are enabling our mutual customers to better protect themselves from malicious actors that are active on the front lines right now”.- Robert Wallace, Senior Director, Strategy,  Mandiant</p></blockquote>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sti3ubfVuuTUinM3pEBed/3ed079d7423fb15cc998471e7a1776ee/image1-16.png" />
            
            </figure>
    <div>
      <h3>Recorded Future</h3>
      <a href="#recorded-future">
        
      </a>
    </div>
    <p>Recorded Future customers can upload their API key to unlock use of Security Control Feeds. Once you have set up your API key, Recorded Future intelligence will also be available in the rule builder of Cloudflare Gateway and Magic Firewall. Cloudflare will present the intelligence that is relevant to and actionable by the product being configured. Intelligence will be regularly updated for you, freeing you to focus on the security policies and actions that are relevant for your organization.</p><p>For example, customers will be able to create a rule that blocks connections where the source or destination IP is in the Security Control feed “​​Command and Control - IP Addresses [Prevent]”. This list will be automatically updated daily for each customer who has a valid API key.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NJzP1xP9jelwjASBg1l33/b7265ffc5d55676991b906b91c5056b2/image2-21.png" />
            
            </figure><blockquote><p>As threats accelerate and converge in the world around us, Recorded Future and Cloudflare are working together to empower customers with the right intelligence at the right time, to keep our people and infrastructure safe.- Craig Adams, Chief Product &amp; Engineering officer, Recorded Future</p></blockquote>
    <div>
      <h3>VirusTotal</h3>
      <a href="#virustotal">
        
      </a>
    </div>
    <p>Virus Total Premium customers can upload their API key to augment and enrich Security Center search results for IPs, domains, and URLs. In the future we plan to add additional object types such as binary files.</p><p>Results will be automatically populated within a new card in the ‘Investigate’ tab. When searching an IP address, you will see a summary of the IP address information from VirusTotal including the overall results of the last analysis (e.g., harmless, suspicious, malicious, etc.), reputation score, tags, community votes, and the top files (if any) associated with that IP address by communications.</p><blockquote><p>“Cybersecurity teams face a challenging environment as attackers become more sophisticated. They need complete visibility and real-time threat intelligence from multiple sources to combat malicious threats. We are partnering with Cloudflare to help our mutual customers outsmart adversaries.”- Emiliano Martinez Contreras, Head of Product for VirusTotal — Google</p></blockquote>
    <div>
      <h3>Want to get started?</h3>
      <a href="#want-to-get-started">
        
      </a>
    </div>
    <p>If you are interested in gaining access during our beta testing phase, please complete this <a href="https://forms.gle/fJLNCuYueAzUHgy49">form</a>. And if there are additional data vendors you would like to see us integrate with, including your own sources, click <a href="https://forms.gle/fJLNCuYueAzUHgy49">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">5S4ZSavngXmsFSpNQmonE4</guid>
            <dc:creator>Patrick R. Donahue</dc:creator>
            <dc:creator>Deeksha Lamba</dc:creator>
            <dc:creator>Jesse Kipp</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare and CrowdStrike partner to give CISOs secure control across devices, applications, and corporate networks]]></title>
            <link>https://blog.cloudflare.com/cloudflare-crowdstrike-partnership/</link>
            <pubDate>Thu, 17 Mar 2022 09:59:08 GMT</pubDate>
            <description><![CDATA[ We're very excited to announce multiple new integrations with CrowdStrike. These integrations combine the power of Cloudflare’s expansive network and Zero Trust suite, with CrowdStrike’s Endpoint Detection and Response (EDR) and incident remediation offerings ]]></description>
            <content:encoded><![CDATA[ <p>Today, we are very excited to announce multiple new integrations with CrowdStrike. These integrations combine the power of Cloudflare’s expansive network and Zero Trust suite, with CrowdStrike’s Endpoint Detection and Response (EDR) and incident remediation offerings.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EQn2t3p7cIUbbrrpQNDvd/10dee97ffae460a6264ddb4cc8c37711/Crowdstrike-Partnership.png" />
            
            </figure><p>At Cloudflare, we believe in making our solutions easily integrate with the existing technology stack of our customers. Through our partnerships and integrations, we make it easier for our customers to use Cloudflare solutions jointly with that of partners, to further strengthen their security posture and unlock more value. Our partnership with CrowdStrike is an apt example of such efforts.</p><p>Together, Cloudflare and CrowdStrike are working to simplify the adoption of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> for IT and security teams. With this expanded partnership, joint customers can identify, investigate, and remediate threats faster through multiple integrations:</p><p><b>First,</b> by integrating <a href="https://www.cloudflare.com/zero-trust/solutions/">Cloudflare’s Zero Trust services</a> with CrowdStrike Falcon Zero Trust Assessment (ZTA), which provides continuous real-time device posture assessments, our customers can verify users’ device posture before granting them access to internal or external applications.</p><p><b>Second,</b> we joined the <a href="https://www.crowdstrike.com/press-releases/crowdstrike-adds-new-strategic-partners-to-groundbreaking-crowdxdr-alliance/#:~:text=Cloudflare%2C%20Armis%20and%20ThreatWarrior%20are,%2C%20Mimecast%2C%20Claroty%20and%20Corelight.">CrowdXDR Alliance</a> in December 2021 and are partnering with CrowdStrike to share security telemetry and other insights to make it easier for customers to identify and mitigate threats. Cloudflare’s global network spans more than 250 cities in over 100 countries, blocking an average of 76 billion cyber threats each day. This provides customers with unparalleled insights, helping security teams better protect their organization. By joining the CrowdXDR Alliance, we will be able to use security signals from Cloudflare’s global network with CrowdStrike’s leading endpoint protection to help mutual customers stop cyber attacks anywhere in their network.</p><p><b>Third,</b> CrowdStrike is one of Cloudflare’s incident response partners, providing rapid and effective support. CrowdStrike’s incident response team deals with active under attack situations day in, day out — helping customers mitigate the attack and get their web property and network back online. Our partnership with CrowdStrike enables rapid remediation of under attack scenarios to safeguard organizations from adversaries.</p><blockquote><p><i>“The speed in which a company is able to identify, investigate and remediate a threat heavily determines how it will fare in the end. Our partnership with Cloudflare provides companies the ability to take action rapidly and contain exposure at the time of an attack, enabling them to get back on their feet and return to business as usual as quickly as possible.”</i>- <b>Thomas Etheridge</b>, Senior Vice President, CrowdStrike Services</p></blockquote><p>CrowdStrike’s endpoint security meets Cloudflare’s Zero Trust Services</p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2uD91HZrTzA9yoIVsNgOAk/a11987d539f1b9c7f97bc3d618ec97a0/pasted-image-0--1--1.png" />
            
            </figure><p>Before we get deep into how the integration works, let’s first recap Cloudflare’s Zero Trust Services.</p>
    <div>
      <h3>Cloudflare Access and Gateway</h3>
      <a href="#cloudflare-access-and-gateway">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a> determines if a user should be allowed access to an application or not. It uses our global network to check every request or connection for identity, device posture, location, multifactor method, and many more attributes to do so. Access also logs every request and connection — providing administrators with high-visibility. The upshot of all of this: it enables customers to deprecate their legacy VPNs.</p><p><a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> protects users as they connect to the rest of the Internet. Instead of back hauling traffic to a centralized location, users connect to a nearby Cloudflare data center where we apply one or more layers of security, filtering, and logging, before accelerating their traffic to its final destination.</p>
    <div>
      <h3>Zero Trust Integration with CrowdStrike</h3>
      <a href="#zero-trust-integration-with-crowdstrike">
        
      </a>
    </div>
    <p>Cloudflare’s customers can now build Access and Gateway policies based on the presence of a CrowdStrike agent at the endpoint. In conjunction with our Zero Trust client, we are able to leverage the enhanced telemetry that CrowdStrike provides surrounding a user’s device.</p><p>CrowdStrike’s Zero Trust Assessment (ZTA) delivers continuous real-time security posture assessments across all endpoints in an organization regardless of the location, network or user. The ZTA scores enable enforcement of conditional policies based on device health and compliance checks to mitigate risks. These policies are evaluated each time a connection request is made, making the conditional access adaptive to the evolving condition of the device.</p><p>With this integration, organizations can build on top of their existing Cloudflare Access and Gateway policies ensuring that a minimum ZTA score or version has been met before a user is granted access. Because these policies work across our entire Zero Trust platform, organizations can use these to build powerful rules invoking Browser Isolation, <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/tenant-control/">tenant control</a>, antivirus or any part of their Cloudflare deployment.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7EB1HVVJRq3hHI01r3hXK9/1f76feee182a8ca2ee9fc2076851628a/pasted-image-0--2--1.png" />
            
            </figure><blockquote><p>_"The CrowdStrike Falcon platform secures customers through verified access controls, helping customers reduce their attack surface and simplify, empower and accelerate their Zero Trust journey. By expanding our partnership with Cloudflare, we are making it easier for joint customers to strengthen their Zero Trust security posture across all endpoints and their entire corporate network."_- <b>Michael Sentonas</b>, Chief Technology Officer, CrowdStrike</p></blockquote>
    <div>
      <h3>How the integration works</h3>
      <a href="#how-the-integration-works">
        
      </a>
    </div>
    <p>Customers using our Zero Trust suite can add CrowdStrike as a device posture provider in the Cloudflare Zero Trust dashboard under Settings → Devices → Device Posture Providers. The details required from the CrowdStrike dashboard include: ClientID, Client Secret, REST API URL, and Customer ID.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ODgmsQQuKOvgiJOeSL1Vt/7d9f7e168f3f0b51e46a8c2cc2b3d61d/pasted-image-0--3--1.png" />
            
            </figure><p>After creating the CrowdStrike Posture Provider, customers can create specific device posture checks requiring users’ devices to meet a certain threshold of <a href="https://falcon.us-2.crowdstrike.com/documentation/156/zero-trust-assessment-apis">ZTA scores</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Akw1cK9qyCYbKIz34l4It/c6920245f80941c52e21eb271c07e1e7/Screen-Shot-2022-03-16-at-4.48.42-PM.png" />
            
            </figure><p>These rules can now be used to create conditional <a href="https://developers.cloudflare.com/cloudflare-one/policies/zero-trust/">Access</a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/">Gateway</a> policies to allow or deny access to applications, networks, or sites. Administrators can choose to block or isolate users or user groups with malicious or insecure devices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gwoBIcA58pmUqjhgvgxxr/28a1903ece64e5bbf60fbf33bdb7625b/pasted-image-0--5-.png" />
            
            </figure>
    <div>
      <h2>What comes next?</h2>
      <a href="#what-comes-next">
        
      </a>
    </div>
    <p>In the coming months, we will be further strengthening our integrations with CrowdStrike by allowing customers to correlate their Cloudflare logs with Falcon telemetry, for timely detection and mitigation of sophisticated threats.If you’re using Cloudflare Zero Trust products today and are interested in using this integration with CrowdStrike, please visit our <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/crowdstrike/">documentation</a> to learn about how you can enable it. If you want to learn more or have additional questions, please fill out the <a href="https://www.cloudflare.com/partners/technology-partners/crowdstrike/">form</a> or get in touch with your Cloudflare CSM or AE, and we'll be happy to help you.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">4TrcHN6XAjvNLiDb1M8DZF</guid>
            <dc:creator>Deeksha Lamba</dc:creator>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare announces partnerships with leading cyber insurers and incident response providers]]></title>
            <link>https://blog.cloudflare.com/cyber-risk-partnerships/</link>
            <pubDate>Thu, 09 Dec 2021 13:59:59 GMT</pubDate>
            <description><![CDATA[ Cloudflare partners with leading cyber insurers and incident response providers to help customers reduce their insurance premiums and improve cyber risk. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7FlMx5GqFnrqOnr4FBqTaO/43d397b4b4e96675937fd3e9c2aac459/Cyber-Insurence.png" />
            
            </figure><p>We are excited to announce our cyber risk partnership program with leading cyber insurance carriers and incident response providers to help our customers reduce their cyber risk. Cloudflare customers can qualify for discounts on premiums or enhanced coverage with our partners. Additionally, our incident response partners are partnering with us for <a href="https://www.cloudflare.com/ddos/under-attack/">mitigating under attack scenarios</a> in an accelerated manner.  </p>
    <div>
      <h2>What is a business’ cyber risk?</h2>
      <a href="#what-is-a-business-cyber-risk">
        
      </a>
    </div>
    <p>Let's start with security and insurance —  e.g., being a homeowner is an adventure and a responsibility. You personalize your home, maintain it, and make it secure against the slightest possibility of intrusion — fence it up, lock the doors, install a state of the art security system, and so on. These measures definitely reduce the probability of an intrusion, but you still buy insurance. Why? To cover for the rare possibility that something might go wrong — human errors, like leaving the garage door open, or unlikely events, like a fire, hurricane etc. And when something does go wrong, you call the experts (aka police) to investigate and respond to the situation.</p><p>Running a business that has any sort of online presence is evolving along the same lines. Getting the right security posture in place is absolutely necessary to protect your business, customers, and employees from nefarious cyber attacks. But as a responsible business owner/CFO/<a href="https://www.cloudflare.com/ciso/">CISO</a>, nevertheless you buy cyber insurance to protect your business from long-tail events that could allow malicious attackers into your environment, causing material damage to your business. And if such an event does take place, you engage with incident response companies for active investigation and mitigation.</p><p>In short, you do everything in your control to reduce your business’ cyber risk by having the right security, insurance, and active response measures in place.</p>
    <div>
      <h2>The cyber insurance industry and the rise of ransomware attacks</h2>
      <a href="#the-cyber-insurance-industry-and-the-rise-of-ransomware-attacks">
        
      </a>
    </div>
    <p>Over the last two years, the rise of ransomware attacks has wreaked havoc on businesses and the cyber insurance industry. As per a Treasury Department report, nearly 600 million dollars in banking transactions were linked to possible ransomware payments in Suspicious Activity Reports (SARs) filed by financial services firms to the U.S. Government for the first six months of 2021, a jump of more than 40% over the total for all of 2020. Additionally, the Treasury Department investigators identified about 5.2 billion dollars in bitcoin transactions as potential ransomware payments, indicating that the actual amount of ransomware payments was much higher<sup>1</sup>.</p><p>The rise of these attacks has and should make businesses more cautious, making them more inclined to have the right cybersecurity posture in place  and to buy cyber insurance coverage.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3I5TYiefbxVeM5DF61LpfE/be04ed80e2b0ae51b549beaf93569dca/Cyber-insurance-body.png" />
            
            </figure><p>Further, the rising frequency and severity of attacks, especially ransomware attacks, has led to increasing insurance claims and loss ratios (loss ratios refers to insurance claims i.e., how much insurance companies pay out in claims costs divided by total earned premiums i.e., how much customers pay them for insurance) for the cyber insurers. As per a recent research report, the most frequent types of losses covered by cyber insurers were ransomware (41%), funds transfer loss (27%), and business email compromise incidents (19%). These trends are pushing legacy insurance carriers to reevaluate how much coverage they can afford to offer and how much they have to charge clients to do so; thereby, triggering a structural change that can impact the ability of companies, especially the small and medium businesses, to minimize their cyber risk.</p><p>The end result has been a drastic increase in the premiums and denial rates over the last 12 months amongst some carriers, which has pushed customers to seek new coverage. The premiums have increased upwards of 50%, according to infosec experts and vendors, with some quotes jumping closer to 100%.<sup>2</sup> Also, the lack of accessible cyber insurance and proper coverage disproportionately impacts the small and medium enterprises that find themselves as the common target for these cyber attacks. According to a recent research report, 70% of ransomware attacks are aimed at organizations with less than 1,000 employees.<sup>3</sup> The increased automation of cyber attacks coupled with the use of insecure remote access tools during the pandemic has left these organizations exposed all while being faced with increased cyber insurance premiums or no access to coverage.</p><p>While some carriers are excluding ransomware payments from customers’ policies or are denying coverage to customers who don't have the right security measures in place, there is a new breed of insurance carriers that are incentivizing customers in the form of broader coverage or lower prices for proactively implementing cybersecurity controls.</p>
    <div>
      <h2>Cloudflare’s cyber risk partnerships</h2>
      <a href="#cloudflares-cyber-risk-partnerships">
        
      </a>
    </div>
    <p>At Cloudflare, we have always believed in making the Internet a better place. We have been helping our customers focus on their core business while we take care of their <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cyber security</a>. We are now going a step further, helping our customers reduce their cyber risk by partnering with leading cyber insurance underwriters and incident response providers.</p><p>Our objective is to help our customers reduce their cyber risk. We are doing so in partnership with several leading companies highlighted below. Our customers can qualify for enhanced coverage and discounted premiums for their cyber insurance policies by leveraging their security posture with Cloudflare.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3018NphILpuDpEPaciB8AS/f6b33490160a045963e822e2df1f3ac3/pasted-image-0-5.png" />
            
            </figure><p><b>Insurance companies:</b> Powered by Cloudflare’s security suite, our customers have comprehensive protection against the most common and severe threat vectors. In most of the cases, when attackers see that a business is using Cloudflare they realize they will not be able to execute a denial of service (DoS) attack or infiltrate the customer’s network. Knowing the power of Cloudflare, the attackers prefer to spend their time on more vulnerable targets. This implies that our customers face a lower frequency and severity of attacks — an ideal customer set that could imply a lower loss ratio for underwriters. Our partners understand the security benefits of using Cloudflare’s security suite and are letting our customers qualify for lower premium rates and enhanced coverage.</p><p>Cloudflare customers can qualify for discounts/credits on premiums and enhanced coverage with our partners <a href="https://www.at-bay.com/cloudflare?utm_campaign=Cloudflare%20Partnership&amp;utm_source=Cloudflare&amp;utm_medium=website&amp;utm_term=AtBayCloudflarePartnership">At-Bay</a>, <a href="https://info.coalitioninc.com/partnership-cloudflare.html">Coalition</a>, and <a href="https://cowbell.insure/cloudflare/">Cowbell Cyber</a>.</p><blockquote><p><i>“An insurance policy is an effective tool to articulate the impact of security choices on the financial risk of a company. By offering better pricing to companies who implement stronger controls, like Cloudflare’s Comprehensive DDoS Protection, we help customers understand how best to reduce risk. Incentivizing our customers to adopt innovative security solutions like Cloudflare, combined with At-Bay’s free active risk monitoring, has helped reduce ransomware in At-Bay’s portfolio 7x below the market average.”- </i><b><i>Rotem Iram</i></b><i>,</i> Co-founder and CEO, At-Bay</p></blockquote><blockquote><p><i>“It’s incredible what Cloudflare has done to create a safer Internet. When Cloudflare’s technology is paired with insurance, we are able to protect businesses in an entirely new way. We are excited to offer Cloudflare customers enhanced cyber insurance coverage alongside Coalition’s active security monitoring platform to help businesses build true cyber resilience with an always-on insurance policy.”</i>- <b><i>Joshua Motta</i></b><i>, Co-founder &amp; CEO, Coalition</i></p></blockquote><blockquote><p><i>“We are excited to work with Cloudflare to address our customers’ cybersecurity needs and help reduce their cyber risk. Collaborating with cybersecurity companies like Cloudflare will definitely enable a more data-driven underwriting approach that the industry needs”</i>- <b><i>Nate Walsh</i></b><i>,</i> Head of Strategic Partnerships, Corvus Insurance</p></blockquote><blockquote><p><i>“The complexity and frequency of cyber attacks continue to rise, and small and medium enterprises are increasingly becoming the center of these attacks. Through partners like Cloudflare, we want to encourage these businesses to adopt the best security standards and proactively address vulnerabilities, so they can benefit from savings on their cyber insurance policy premiums.”- </i><b><i>Jack Kudale</i></b><i>, Founder and CEO, Cowbell Cyber</i></p></blockquote><p><b>Incident Response companies:</b> Our incident response partners deal with active under attack situations day in, day out — helping customers mitigate the attack, and getting their web property and network back online. Many times, precious time is wasted in trying to figure out which security vendor to reach out to and how to get hold of the right team. We are announcing new relationships with prominent incident response providers CrowdStrike, Mandiant, and Secureworks to enable rapid referral of organizations under attack. As a refresher — my colleague, James Espinosa, wrote a <a href="/targeted-ransomware-attack/">great blog post</a> on how Cloudflare helps customers against ransomware DDoS attacks.</p><blockquote><p><i>“The speed in which a company is able to identify, investigate and remediate a threat heavily determines how it will fare in the end. Our partnership with Cloudflare provides companies the ability to take action rapidly and contain exposure at the time of an attack, enabling them to get back on their feet and return to business as usual as quickly as possible.”</i>- <b><i>Thomas Etheridge</i></b><i>,</i> Senior Vice President, CrowdStrike Services</p></blockquote><blockquote><p><i>“As cyber threats continue to rapidly evolve, the need for organizations to put response plans in place increases. Together, Mandiant and Cloudflare are enabling our mutual customers to mitigate the risk breaches pose to their business operations. We hope to see more of these much-needed technology collaborations that help organizations address the growing threat of ransomware and DDoS attacks in a timely manner.”- </i><b><i>Marshall Heilman</i></b><i>, EVP &amp; Chief Technology Officer, Mandiant</i></p></blockquote><blockquote><p><i>“Secureworks’ proactive incident response and adversarial testing expertise combined with Cloudflare’s intelligent global platform enables our mutual customers to better mitigate the threats of sophisticated cyberattacks. This partnership is a much needed approach to addressing advanced cyber threats with speed and automation.”- </i><b><i>Chris Bell</i></b><i>,</i> Vice President - Strategic Alliances, Secureworks</p></blockquote>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>In summary, Cloudflare and its partners are coming together to ensure that our customers can run their business while getting adequate cybersecurity and risk coverage. However, we will not stop here. In the coming months, we’ll be working on creating programmatic ways to share threat intelligence with our cyber risk partners. Through our <a href="/security-center/">Security Center</a>, we want to enable our customers, if they so choose, to safely share their security posture information with our partners for easier, transparent underwriting. Given the scale of our network and the magnitude and heterogeneity of attacks that we witness, we are in a strong position to provide our partners with insights around long-tail risks.</p><p>If you are interested in learning more, please refer to the partner links (<a href="https://www.at-bay.com/cloudflare?utm_campaign=Cloudflare%20Partnership&amp;utm_source=Cloudflare&amp;utm_medium=website&amp;utm_term=AtBayCloudflarePartnership">At-Bay</a>, <a href="https://info.coalitioninc.com/partnership-cloudflare.html">Coalition</a>, and <a href="https://cowbell.insure/cloudflare/">Cowbell Cyber</a>) or visit our <a href="https://www.cloudflare.com/partners/cyber-risk/">cyber risk partnership page</a>. If you’re interested in becoming a partner, please fill up <a href="https://www.cloudflare.com/partners/technology-partners/">this form</a>.</p><p>....</p><p>Sources:</p><p><sup>1</sup><a href="https://www.wsj.com/articles/suspected-ransomware-payments-for-first-half-of-2021-total-590-million-11634308503">https://www.wsj.com/articles/suspected-ransomware-payments-for-first-half-of-2021-total-590-million-11634308503</a></p><p>Gallagher, Cyber Insurance Market Update, Mid-year 2021</p><p><sup>2</sup><a href="https://www.ajg.com/us/news-and-insights/2021/aug/global-cyber-market-update/">https://www.ajg.com/us/news-and-insights/2021/aug/global-cyber-market-update/</a></p><p><sup>3</sup><a href="https://searchsecurity.techtarget.com/news/252507932/Cyber-insurance-premiums-costs-skyrocket-as-attacks-surge">https://searchsecurity.techtarget.com/news/252507932/Cyber-insurance-premiums-costs-skyrocket-as-attacks-surge</a></p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5isEUjgvXris9n9eUmgywR</guid>
            <dc:creator>Deeksha Lamba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare’s Technology Partner Program]]></title>
            <link>https://blog.cloudflare.com/technology-partner-program/</link>
            <pubDate>Fri, 15 Oct 2021 15:30:00 GMT</pubDate>
            <description><![CDATA[ We aim to continue expanding our ecosystem of programs and partners to make it seamless for our customers to use Cloudflare. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The Internet is built on a series of shared protocols, all working in harmony to deliver the collective experience that has changed the way we live and work. These open standards have created a platform such that a myriad of companies can build unique services and products that work together seamlessly. As a steward and supporter of an open Internet, we aspire to provide an interoperable platform that works with all the complementary technologies that our customers use across their technology stack. This has been the guiding principle for the multiple partnerships we have launched over the last few years.  </p><p>One example is our <a href="https://www.cloudflare.com/bandwidth-alliance/">Bandwidth Alliance</a> — launched in 2018, this alliance with 18 cloud and storage providers aims to reduce <a href="https://www.cloudflare.com/learning/cloud/what-are-data-egress-fees/">egress fees</a>, also known as data transfer fees, for our customers. The Bandwidth Alliance has broken the norms of the cloud industry so that customers can move data more freely. Since then, we have launched <a href="https://www.cloudflare.com/partners/technology-partners/">several technology partner programs</a> with over 40+ partners, including:</p><ul><li><p><a href="https://www.cloudflare.com/partners/analytics/"><b>Analytics</b></a> — Visualize Cloudflare logs and metrics easily, and help customers better understand events and trends from websites and applications on the Cloudflare network.</p></li><li><p><a href="https://www.cloudflare.com/network-interconnect-partnerships/"><b>Network Interconnect</b></a> — Partnerships with best-in-class Interconnection platforms offer private, secure, software-defined links with near instant-turn-up of ports.</p></li><li><p><a href="https://www.cloudflare.com/endpoint-partners/"><b>Endpoint Protection Partnerships</b></a> — With these integrations, every connection to our customer’s corporate application gets an additional layer of identity assurance without the need to connect to VPN.</p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/identity"><b>Identity Providers</b></a> — Easily integrate your organization's single sign-on provider and benefit from the ease-of-use and functionality of Cloudflare Access.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PTRvs7ECj4IQlmJ90plAI/75879214cc9fa9da46c67bd5f419fc62/Screen-Shot-2021-10-14-at-12.59.29-PM.png" />
            
            </figure><p>These partner programs have helped us serve our customers better alongside our partners with our complementary solutions. The integrations we have driven have made it easy for <i>thousands of customers</i> to use Cloudflare with other parts of their stack.</p><p>We aim to continue expanding the <a href="https://www.cloudflare.com/partners/">Cloudflare Partner Network</a> to make it seamless for our customers to use Cloudflare. To support our growing ecosystem of partners, we are excited to launch our Technology Partner Program.</p>
    <div>
      <h3>Announcing Cloudflare’s Technology Partner Program</h3>
      <a href="#announcing-cloudflares-technology-partner-program">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/partners/technology-partners/">Technology Partner Program</a> facilitates innovative integrations that create value for our customers, our technology partners, and Cloudflare. Our partners not only benefit from technical integrations with us, but also have the opportunity to drive sales and marketing efforts to better serve mutual customers and prospects.</p><p>This program offers a guiding structure so that our partners can benefit across three key areas:</p><ul><li><p><b>Build with Cloudflare:</b> Sandbox access to <a href="https://www.cloudflare.com/plans/enterprise/">Cloudflare enterprise features</a> and APIs to build and test integrations. Opportunity to collaborate with Cloudflare’s product teams to build innovative solutions.</p></li><li><p><b>Market with Cloudflare:</b> Develop joint solution brief and host joint events to drive awareness and adoption of integrations. Leverage a range of our partners tools and resources to bring our joint solutions to market.</p></li><li><p><b>Sell with Cloudflare:</b> Align with our sales teams to jointly target relevant customer segments across geographies.</p></li></ul>
    <div>
      <h3>Technology Partner Tiers</h3>
      <a href="#technology-partner-tiers">
        
      </a>
    </div>
    <p>Depending on the maturity of the integration and fit with Cloudflare’s product portfolio, we have two types of partners:</p><ul><li><p><b>Strategic partners:</b> Strategic partners have mature integrations across the Cloudflare product suite. They are leaders in their industries and have a significant overlap with our customer base. These partners are strategically aligned with our sales and marketing efforts, and they collaborate with our product teams to bring innovative solutions to market.</p></li><li><p><b>Integration partners:</b> Integration partners are early participants in Cloudflare’s partnership ecosystem. They already have or are on a path to build validated, functional integrations with Cloudflare. These partners have programmatic access to resources that will help them experiment with and build integrations with Cloudflare.</p></li></ul>
    <div>
      <h3>Work with Us</h3>
      <a href="#work-with-us">
        
      </a>
    </div>
    <p>If you are interested in working with our Technology Partnerships team to develop and bring to market a joint solution, we’d love to hear from you!  Partners can complete the application on our <a href="https://www.cloudflare.com/partners/technology-partners/">Technology Partner Program website</a> and we will reach out quickly to discuss how we can help build solutions for our customers together.</p> ]]></content:encoded>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Bandwidth Alliance]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <guid isPermaLink="false">3NG8dDAu6663un1Lsesqal</guid>
            <dc:creator>Matt Lewis</dc:creator>
            <dc:creator>Deeksha Lamba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare customers can now use Microsoft Azure Data Transfer Routing Preference to enjoy lower data transfer costs]]></title>
            <link>https://blog.cloudflare.com/discounted-egress-for-cloudflare-customers-from-microsoft-azure-is-now-available/</link>
            <pubDate>Tue, 06 Jul 2021 12:59:03 GMT</pubDate>
            <description><![CDATA[ Cloudflare customers can now choose to reduce data transfer cost via the Microsoft Azure Routing Preference Program with just a few clicks. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1i3qj7pOnOdTPlAYE65tfG/96d66b7387b6f044f9615ecc117c6aa0/image5-1.png" />
            
            </figure><p>Today, we are excited to announce that Cloudflare customers can choose Microsoft Azure with a lower cost data transfer solution via the Microsoft <a href="https://docs.microsoft.com/en-us/azure/virtual-network/routing-preference-overview"><b>Routing Preference</b></a> service. Mutual customers can benefit from lower cost and predictable performance across our interconnected networks. Microsoft Azure has developed a seamless process to allow customers to choose this cost optimized routing solution.  We have customers using this new integration today and are excited to make this generally available to all our customers and prospects.</p>
    <div>
      <h3>The power of interconnected networks</h3>
      <a href="#the-power-of-interconnected-networks">
        
      </a>
    </div>
    <p>So how are we able to enable this great solution for our customers? The answer lies in our globally interconnected network.</p><p>Cloudflare is one of the most interconnected networks in the world, peering with over 9,500 networks globally, including major ISPs, cloud providers, and enterprises. We currently interconnect with Azure through private or public peering across all major regions — including private interconnections at key locations (see below).</p><p>Private Network Interconnects typically occur within the same facility through a fiber optic cable between routers for the two networks; peered connections occur at Internet exchanges offering high performance and availability. We are actively working on expanding on this interconnectivity between Azure and Cloudflare for our customers.</p><p>In addition to the private interconnections, we also have <b>five Internet exchanges with private peering, and over 108 public peering links with Azure</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Oy7Sz83gx7Yk2YPIEjPe7/207e74571721c887c171caa825db89bb/image2.png" />
            
            </figure><p>Wondering what this really means? Let’s look at an example. Say an Internet visitor is in Sydney and requests content from an origin that's hosted in an Azure location in Chicago. When the visitor makes a request, Cloudflare automatically carries it to the Cloudflare data center in Sydney. The traffic is then routed over Cloudflare’s network all the way to Chicago where the origin is hosted on Azure. The request is then handed over to an Azure data center <b>over our private interconnections.</b></p><p>On the way back (egress path), the request is handed over from Azure network to Cloudflare at the origin in Chicago via our private interconnection (without involving any ISP). Then it’s carried entirely over the Cloudflare network to Sydney and back to the visitor.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3UAKwOR1Nf5Iql6fuxlIzy/fe1431e1482125175f334647f76820bd/image4.png" />
            
            </figure>
    <div>
      <h3>Why does the Internet need this?</h3>
      <a href="#why-does-the-internet-need-this">
        
      </a>
    </div>
    <p>Customer choice. That’s an important ingredient to help build a better Internet for our customers — free of vendor lock-in, and with open Internet standards. We’ve worked with the Azure team to enable this interconnectivity, giving the customers the flexibility to choose multiple best-of-breed products without having to worry about high data transfer costs.</p><p>What is even more exciting is working with Microsoft, a company that shares our philosophy of promoting customer flexibility and helping customers resist vendor lock-in:</p><blockquote><p><i>“Microsoft Azure is committed to offering services that make it easy to use offerings from industry leaders like Cloudflare - enabling choice to address customer’s business need."</i>- <i>Jeff Cohen, Partner Group Program Manager for Azure Networking.</i></p></blockquote>
    <div>
      <h3>Easy for customers to get started</h3>
      <a href="#easy-for-customers-to-get-started">
        
      </a>
    </div>
    <p>Cloudflare customers now have the option to leverage Azure routing preference and as a result use both platforms for their respective features and services offering the most secure and performant solution.</p><p>Most importantly customers can avail of this <a href="https://azure.microsoft.com/en-us/pricing/details/bandwidth/#:~:text=Internet%20Egress%20(Routed%20via%20Routing%20preference%20transit%20ISP%20network)">lower cost</a> solution with just three simple steps.</p><p>Step 1: Choose Internet routing on your Azure dashboard for origin in Azure storage:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EGe7dubWEVv7qmoKvBfe0/be8c0748da992e088ec8f21c27c1c5a2/image3.png" />
            
            </figure><p>Step 2: Enable Internet routing on your Firewall and virtual network tab:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6GgMOZngzIyS7hd6wFgvhJ/e08e3a3bae361ceaedc0664316cc4ee6/image6-1.png" />
            
            </figure><p>Step 3: Enter your updated endpoint urls from Azure into your Cloudflare dashboard:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16tz2GrZH3vqp0HpoqOcO3/1936323139e2de751a57a4e240e04e4d/image1-3.png" />
            
            </figure><p>Once enabled, the discounting is automatic and ongoing from the next monthly bill. Further details on the discounted rates can be found in <a href="https://azure.microsoft.com/en-us/pricing/details/bandwidth/">Azure’s Bandwidth pricing</a>.</p><p>A number of customers are already enjoying these benefits:</p><blockquote><p><i>“Enabling cost-optimized egress by Cloudflare and Azure via Routing Preference from the Azure dashboard has been very smooth for us with minimal effort. Cloudflare was proactive in reaching out with its customer-centric approach."</i>- <i>Joakim Jamte, Engineering Manager, Bannerflow</i></p></blockquote><blockquote><p><i>"Before taking advantage of the Routing Preference by Azure via Cloudflare, Egress fees were one of the key reasons that restricted us from having more multi-cloud solutions since it can be high and unpredictable at times as the traffic scales. Enabling Routing Preference on the Azure dashboard was quick and easy. It was a one-and-done effort and we get discounted Egress rates on every Azure bill.”</i>- <i>Darin MacRae, Chief Architect / Cloud Computing, MyRadar.com</i></p></blockquote><blockquote><p><i>"Along with Cloudflare's excellent security features and high performing CDN, the data transfer rates from Azure's Routing Preference enabled by Cloudflare make the offer very compelling. Enabling and receiving the discount was very easy and helped us optimize our investment without any effort.”</i>- <i>Arthur Roodenburg, CIO, Act-3D B.V.</i></p></blockquote><p>We’re pleased today to offer this benefit to all Cloudflare customers. If you are interested in taking advantage of Routing Preference please <a href="https://www.cloudflare.com/integrations/microsoft-azure/#cdn-interconnect-program">reach out</a>.</p> ]]></content:encoded>
            <category><![CDATA[Egress]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">6zT2nh8KIA8v2QZXrvEati</guid>
            <dc:creator>Deeksha Lamba</dc:creator>
            <dc:creator>Abhi Das</dc:creator>
        </item>
    </channel>
</rss>