
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Thu, 09 Apr 2026 19:44:40 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Cloudflare’s tenant platform in action: Meter deploys DNS filtering at scale]]></title>
            <link>https://blog.cloudflare.com/gateway-managed-service-provider-meter/</link>
            <pubDate>Tue, 29 Aug 2023 13:00:30 GMT</pubDate>
            <description><![CDATA[ Today, we're excited to showcase Meter, a provider of Internet infrastructure, is leveraging the Tenant API integration for DNS filtering to help their clients enforce acceptable Internet use policies ]]></description>
            <content:encoded><![CDATA[ <p>In January 2023, we <a href="/gateway-managed-service-provider/">announced</a> support for Managed Service Providers (MSPs) and other businesses to create 'parent-child' and account-level policy configurations when deploying Cloudflare for <a href="https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/">DNS filtering</a>. Specifically, organizations leverage the integration between our <a href="https://developers.cloudflare.com/tenant/">Tenant API</a> and <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>, our Secure Web Gateway (SWG) to protect their remote or office end users with web filtering and inspection. Already, customers like the <a href="/gateway-managed-service-provider/">US federal government, MalwareBytes, and a large global ISP</a> take advantage of this integration to enable simpler, more flexible policy management across larger deployments across their end customers</p><p>Today, we're excited to showcase another similar story: <a href="https://www.meter.com/">Meter</a>, a provider of Internet infrastructure, is leveraging the Tenant API integration for DNS filtering to help their clients enforce acceptable Internet use policies.</p>
    <div>
      <h3>How Meter deploys Cloudflare to secure Internet browsing</h3>
      <a href="#how-meter-deploys-cloudflare-to-secure-internet-browsing">
        
      </a>
    </div>
    <p>Meter, headquartered in San Francisco and founded in 2015, provides Internet infrastructure that includes routing, switching, wireless, and applications. They help deliver faster, more efficient, more secure networking experiences for a diverse range of corporate spaces, including offices, warehouses, retail, manufacturing, biotech, and education institutions.</p><p>Meter integrates with the Cloudflare Tenant API to provide DNS filtering to their customers. With the Meter dashboard, Meter customers can set policies to block or allow Internet traffic to domains, categorized by security risks (phishing, malware, DGA, etc.) or content theme (adult, gambling, shopping, etc.)</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ZToFJklGmoULrPD0YjB3q/a5f4ce799068aa802142fb7ae0913248/image2-10.png" />
            
            </figure><p>Across this customer base, having parent-child relationships in security policies is often critical. For example, specific schools within an overall district may have different policies about what Internet browsing is or is not acceptable.</p><p>Cloudflare’s parent-child configurability means that Meter administrators are equipped to set differential, granular policies for specific offices, retail locations, or warehouses (‘child accounts’) within a larger business (‘parent account’). DNS queries are first filtered against parent account policies before filtering against more specific child account policies.</p><p>At a more technical level, each “child” customer account can have its own users and tokens to manage accounts. Customers of Meter can set up their DNS endpoints via Gateway locations and may be defined as IPv4, IPv6, DoH, and DoT endpoints. DNS policies can be defined for these Gateway locations. In addition to this, each customer of Meter can customize their block page and even upload their own certificates to serve their custom block page.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6rVlJUsx4rKoAoGWz8xevY/6dd4780f0125a6a91cc5e5f5d7f8271a/image1-15.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>MSPs and infrastructure companies like Meter play a vital role in bringing cybersecurity solutions to customers of all sizes and needs. Cloudflare will continue to invest in our tenant architecture to equip MSPs with the flexibility and simplicity they need to serve their end customers.</p><p>DNS filtering to protect users on the Internet is a valuable solution for MSPs to deliver with Cloudflare. But DNS filtering is just the first of several Zero Trust services that Cloudflare intends to support via our tenant platform, so stay tuned for more.</p><p>If you are an MSP or an Infrastructure company looking to deliver Cloudflare security for your end customers, <a href="https://www.cloudflare.com/partners/services">learn more here</a>.</p> ]]></content:encoded>
            <category><![CDATA[DNS Filtering]]></category>
            <category><![CDATA[Customers]]></category>
            <guid isPermaLink="false">6acGwTp5CBHQ3rr0OwP4ml</guid>
            <dc:creator>Mythili Prabhu</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Sean Rose (Guest Author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Integrate Cloudflare Zero Trust with Datadog Cloud SIEM]]></title>
            <link>https://blog.cloudflare.com/integrate-cloudflare-zero-trust-with-datadog-cloud-siem/</link>
            <pubDate>Thu, 03 Aug 2023 13:00:33 GMT</pubDate>
            <description><![CDATA[ Today, we are very excited to announce the general availability of Cloudflare Zero Trust Integration with Datadog ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SCp5IxwJUMOJ6irbWPYHf/4117714bfa2e10409c307dbf48d9e7d2/image5-1.png" />
            
            </figure><p>Cloudflare's Zero Trust platform helps organizations map and adopt a strong security posture. This ranges from Zero Trust Network Access, a Secure Web Gateway to help filter traffic, to Cloud Access Security Broker and Data Loss Prevention to protect data in transit and in the cloud. Customers use Cloudflare to verify, isolate, and inspect all devices managed by IT. Our composable, in-line solutions offer a simplified approach to security and a comprehensive set of logs.</p><p>We’ve heard from many of our customers that they aggregate these logs into Datadog’s Cloud SIEM product. Datadog Cloud SIEM provides threat detection, investigation, and automated response for dynamic, cloud-scale environments. Cloud SIEM analyzes operational and security logs in real time – regardless of volume – while utilizing out-of-the-box integrations and rules to detect threats and investigate them. It also automates response and remediation through out-of-the-box workflow blueprints. Developers, security, and operations teams can also leverage detailed <a href="https://www.cloudflare.com/learning/performance/what-is-observability/">observability</a> data and efficiently collaborate to <a href="https://www.cloudflare.com/learning/security/what-is-siem/">accelerate security investigations</a> in a single, unified platform. We previously had an out-of-the-box dashboard for Cloudflare CDN available on Datadog. These help our customers gain valuable insights into product usage and performance metrics for response times, HTTP status codes, cache hit rate. Customers can collect, visualize, and alert on key Cloudflare metrics.</p><p>Today, we are very excited to announce the general availability of Cloudflare Zero Trust Integration with Datadog. This deeper integration offers the Cloudflare Content Pack within Cloud SIEM which includes out-of-the-box dashboard and detection rules that will help our customers ingesting Zero Trust logs into Datadog, gaining greatly improved security insights over their <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust landscape</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1RYHT6tKmiMbXX3IbZ0jff/f507f8781513f3913b5bb73fd044f818/image4.png" />
            
            </figure><blockquote><p>“<i>Our Datadog SIEM integration with Cloudflare delivers a holistic view of activity across Cloudflare Zero Trust integrations–helping security and dev teams quickly identify and respond to anomalous activity across app, device, and users within the Cloudflare Zero Trust ecosystem. The integration offers detection rules that automatically generate signals based on CASB (cloud access security broker) findings, and impossible travel scenarios, a revamped dashboard for easy spotting of anomalies, and accelerates response and remediation to quickly contain an attacker’s activity through an out-of-the-box workflow automation blueprints.</i>”- <b>Yash Kumar,</b> Senior Director of Product, Datadog</p></blockquote>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    
    <div>
      <h3>Set up Logpush jobs to your Datadog destination</h3>
      <a href="#set-up-logpush-jobs-to-your-datadog-destination">
        
      </a>
    </div>
    <p>Use the Cloudflare dashboard or API to <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/datadog/">create a Logpush job</a> with all fields enabled for each dataset you’d like to ingest on Datadog. We have eight account-scoped datasets available to use today (Access Requests, Audit logs, CASB findings, Gateway logs including DNS, Network, HTTP; Zero Trust Session Logs) that can be ingested into Datadog.</p>
    <div>
      <h3>Install the Cloudflare Tile in Datadog</h3>
      <a href="#install-the-cloudflare-tile-in-datadog">
        
      </a>
    </div>
    <p>In your Datadog dashboard, locate and install the Cloudflare Tile within the Datadog Integration catalog. At this stage, Datadog’s out-of-the-box log processing <a href="https://docs.datadoghq.com/logs/log_configuration/pipelines/?tab=source">pipeline</a> will automatically parse and normalize your Cloudflare Zero Trust logs.</p>
    <div>
      <h3>Analyze and correlate your Zero Trust logs with Datadog Cloud SIEM's out-of-the-box content</h3>
      <a href="#analyze-and-correlate-your-zero-trust-logs-with-datadog-cloud-siems-out-of-the-box-content">
        
      </a>
    </div>
    <p>Our new and improved integration with Datadog enables security teams to quickly and easily monitor their Zero Trust components with the Cloudflare Content Pack. This includes the out-of-the-box dashboard that now features a Zero Trust section highlighting various widgets about activity across the applications, devices, and users in your Cloudflare Zero Trust ecosystem. This section gives you a holistic view, helping you spot and respond to anomalies quickly.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ufPwaIiXySgUYcLsvXbiz/131481c545a01474ea1f26f50308ccf3/image1-2.png" />
            
            </figure>
    <div>
      <h3>Security detections built for CASB</h3>
      <a href="#security-detections-built-for-casb">
        
      </a>
    </div>
    <p>As Enterprises use more SaaS applications, it becomes more critical to have insights and control for data at-rest. Cloudflare CASB findings do just that by providing security risk insights for all integrated SaaS applications.</p><p>With this new integration, Datadog now offers an out-of-the-box detection rule that detects any CASB findings. The alert is triggered at different severity levels for any CASB security finding that could indicate suspicious activity within an integrated SaaS app, like Microsoft 365 and Google Workspace. In the example below, the CASB finding points to an asset whose Google Workspace Domain Record is missing.</p><p>This detection is helpful in identifying and remedying misconfigurations or any security issues saving time and reducing the possibility of security breaches.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NlUJLmZa43B1LqkTKmdMc/75e15e8a2d66ce46093e5198a6450d94/image2.png" />
            
            </figure>
    <div>
      <h3>Security detections for Impossible Travel</h3>
      <a href="#security-detections-for-impossible-travel">
        
      </a>
    </div>
    <p>One of the most common security issues can show up in surprisingly simple ways. For example, could be a user that seemingly logs in from one location only to login shortly after from a location physically too far away. Datadog’s new detection rule addresses exactly this scenario with their <a href="https://docs.datadoghq.com/security/default_rules/cloudflare-impossible-travel">Impossible Travel detection rule</a>. If Datadog Cloud SIEM determines that two consecutive loglines for a user indicate impossible travel of more than 500 km at over 1,000 km/h, the security alert is triggered. An admin can then determine if it is a security breach and take actions accordingly.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56UXWQZRCjTg0y0PThuDf9/b033359bf8872fc79a8eb0015fbb8416/image3.png" />
            
            </figure>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Customers of Cloudflare and Datadog can now gain a more comprehensive view of their products and security posture with the enhanced dashboards and the new detection rules. We are excited to work on adding more value for our customers and develop unique detection rules.</p><p>If you are a Cloudflare customer using Datadog, explore the new integration starting <a href="https://docs.datadoghq.com/integrations/cloudflare/">today</a>.</p> ]]></content:encoded>
            <category><![CDATA[Logs]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Dashboard]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">45DTnvaKqyVXbmubrmQxLM</guid>
            <dc:creator>Mythili Prabhu</dc:creator>
            <dc:creator>Nimisha Saxena (Guest Author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Protecting data on Apple devices with Cloudflare and Jamf]]></title>
            <link>https://blog.cloudflare.com/protecting-data-on-apple-devices-with-cloudflare-and-jamf/</link>
            <pubDate>Thu, 20 Jul 2023 13:00:41 GMT</pubDate>
            <description><![CDATA[ Our unique partnership offering will enable Jamf customers to easily implement network Data Loss Prevention (DLP), Remote Browser Isolation (RBI), and SaaS Tenancy Controls from Cloudflare to prevent sensitive data loss from their Apple devices ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today we’re excited to announce Cloudflare’s partnership with Jamf to extend Cloudflare’s Zero Trust Solutions to Jamf customers. This unique offering will enable Jamf customers to easily implement network <a href="https://www.cloudflare.com/products/zero-trust/dlp/">Data Loss Prevention (DLP)</a>, <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Remote Browser Isolation (RBI)</a>, and <a href="/gateway-tenant-control/">SaaS Tenancy Controls</a> from Cloudflare to prevent sensitive data loss from their Apple devices.</p><p>Jamf is a leader in protecting Apple devices and ensures secure, consumer-simple technology for 71,000+ businesses, schools and hospitals. Today Jamf manages <a href="https://www.globenewswire.com/en/news-release/2023/01/10/2586305/0/en/Jamf-Ends-2022-Helping-Approximately-71-000-Customers-Succeed-with-Apple.html">~30 million</a> Apple devices with MDM, and our partnership extends powerful policy capabilities into the network.</p><blockquote><p><i>“One of the most unforgettable lines I’ve heard from an enterprise customer is their belief that ‘Modern devices are like walking USB sticks that leave through the business’s front door every day.’ It doesn’t have to be that way! We are on a mission at Jamf to help our customers achieve the security and compliance controls they need to confidently support Apple devices at scale in their complex environments. While we are doing everything we can to reach this future, we can’t do it alone. I’m thrilled to be partnering with Cloudflare to deliver a set of enterprise-grade compliance controls in a novel way that leverages our combined next-generation cloud-native infrastructures to deliver a fast, highly-available end user experience.”</i><i>- </i><b><i>Matt Vlasach</i></b><i>, VP Product, Jamf</i></p></blockquote>
    <div>
      <h2>Integrated access with Jamf Security Cloud</h2>
      <a href="#integrated-access-with-jamf-security-cloud">
        
      </a>
    </div>
    <p>Jamf’s Apple-first Zero Trust Network Access (ZTNA) agent, Jamf Trust, is designed to seamlessly deploy via Jamf Pro with rich identity, endpoint security, and networking integrations that span the Jamf platform. All of these components work together as part of Jamf Security Cloud to protect laptop and mobile endpoints from network and endpoint threats while enabling fast, least-privilege access to company resources in the cloud or behind the firewall.</p><p>Through this partnership, Jamf customers can now dynamically steer select traffic to Cloudflare’s network using Magic WAN. This enables customers to unlock rich <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">DLP</a> capabilities, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation</a>, and SaaS Tenancy Controls in a cloud-first, cloud-native architecture that works great on Apple devices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oCDoZu5fCZNbQzuQzjxuy/28e0c2ac95731b8f234704c7f28bd8b5/image2-12.png" />
            
            </figure>
    <div>
      <h2>Seamless integration to protect company data</h2>
      <a href="#seamless-integration-to-protect-company-data">
        
      </a>
    </div>
    <p>While content inspection policies can be created, they cannot be applied to HTTPS traffic since content payloads are encrypted. This is a problem for organizations as it is common for sensitive data to live within an encrypted payload and bypass IT content inspection policies. <a href="https://radar.cloudflare.com/adoption-and-usage?dateRange=52w">99.7% of all requests</a> use HTTPS today and the usage has been seeing a steady increase.</p><p>To address this visibility gap, organizations can decrypt packets using HTTPS inspection. With Cloudflare Gateway, <a href="https://www.cloudflare.com/learning/security/what-is-https-inspection/">SSL/TLS decryption</a> can be performed to inspect HTTPS traffic for security risks. When TLS decryption is enabled, Gateway will decrypt all traffic sent over HTTPS, apply your HTTP policies, and then re-encrypt the request with a <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/user-side-certificates/">user-side certificate</a>. Jamf is able to seamlessly enable this process on managed devices.</p>
    <div>
      <h3>Protect sensitive data with Data Loss Prevention</h3>
      <a href="#protect-sensitive-data-with-data-loss-prevention">
        
      </a>
    </div>
    <p>With the corporate network and employees being boundless, it is harder than ever to keep data secure. Sensitive data such as customer credit card information, social security numbers, API tokens, or confidential Microsoft Office documents are easily shared beyond your network boundary, intentionally or otherwise. This is made worse as attackers are increasingly tricking well-intentioned employees to inadvertently share sensitive data with hackers. Such data leaks are not uncommon and usually result in costly reputational and compliance damages.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2AZdzJmKbN3bWa3PIUyO3o/44119be2232b31ed8dbfd3c98d25b15a/image3-2.png" />
            
            </figure><p><a href="https://www.cloudflare.com/products/zero-trust/dlp/">Cloudflare’s Data Loss Prevention (DLP)</a> allows for policies to be built in with ease to keep highly sensitive data secure. Cloudflare also provides <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/">predefined profiles</a> for detecting financial information such as credit card numbers and national identifiers such as social security numbers or tax file numbers in addition to credentials and secrets such as GCP keys, AWS keys, Azure API keys, and SSH keys. On top of that, Cloudflare DLP allows for the creation of expanded regex profiles to detect custom keywords and phrases.</p><p><b>Steps to implement Cloudflare DLP with Jamf:</b></p><ol><li><p>In Jamf’s Security Cloud portal, <a href="https://learn.jamf.com/bundle/jamf-security-documentation/page/Connecting_to_Cloud_Infrastructure_for_Cloudflare.html">configure a Magic WAN interconnect</a> to your Cloudflare account.</p></li><li><p>Create an <a href="https://learn.jamf.com/bundle/jamf-security-documentation/page/Access_Policies.html">access policy</a> to route traffic for DLP inspection via your Cloudflare Magic WAN interconnect</p><ul><li><p>Traffic may be matched by hostname, domain, or IP address/CIDR block</p></li><li><p>To route all traffic for inspection, define <code>*</code> for hostnames and <code>0.0.0.0/0</code> for IPs in the access policy. Note: this will be treated as the “gateway of last resort”, with other access policies matching first.</p></li><li><p>Optionally, enable “Restrict access when Jamf Trust is disabled” under the Security tab of the policy to prevent bypassing of DLP inspection for these resources.</p></li></ul></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-policies/">Configure a DLP policy</a> in your Cloudflare One portal.</p></li><li><p>In Jamf Pro, create a new Configuration Profile with the <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#download-the-cloudflare-root-certificate">Cloudflare Gateway Root Certificate Authority</a> and scope it to your target Apple devices.</p></li></ol><p>Using Activation Profiles in Jamf Security Cloud, deploy Jamf Trust and supporting mobile configuration profiles to your end users to enable access to organization resources while enforcing DLP policies.</p>
    <div>
      <h3>Isolate browser threats to thwart known and zero-day exploits</h3>
      <a href="#isolate-browser-threats-to-thwart-known-and-zero-day-exploits">
        
      </a>
    </div>
    <p>Firewalls, VPNs, network access controls help protect against attacks directed at internal networks. However, many attackers focus on exploiting web browsers due to their ubiquity and frequent use. Remote Browser Isolation aims to reduce an organization’s risk exposure by allowing access to any destination on the Internet, but protecting endpoints by using an isolated cloud environment to load content.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/52x068hd2EHPTZAh4kBYxQ/7ff1cd21e341301e375076939c57f200/image4-3.png" />
            
            </figure><p>This works by actually loading web pages – and all of their potentially dangerous scripts and code – in a headless Chromium browser in Cloudflare’s global network. The visual and interactive elements that are loaded remotely are sent back to the user’s device via “draw” commands, essentially rendering visual objects in the browser as the user would expect. If a known or zero-day exploit is loaded, the user’s device is completely protected.</p><p>Another benefit of Remote Browser Isolation is granular, browser-specific Data Loss Prevention controls. This includes restricting download, upload, copy-paste, keyboard input, and printing functions on all or specific websites.</p><p><b>Steps to implement Remote Browser Isolation:</b></p><ol><li><p>In Jamf’s Security Cloud portal, <a href="https://learn.jamf.com/bundle/jamf-security-documentation/page/Connecting_to_Cloud_Infrastructure_for_Cloudflare.html">configure a Magic WAN interconnect</a> to your Cloudflare account.</p></li><li><p><a href="https://learn.jamf.com/bundle/jamf-security-documentation/page/Configuring_Access_Policy.html">Configure an Access policy</a> and specify the domains or hostnames to be rendered via remote browser isolation in the Cloudflare network</p><ul><li><p>Be sure to include *.browser.run as a hostname in your Jamf access policy.</p></li><li><p>Configure the access policy to route traffic via the Cloudflare MagicWAN interconnect you configured above.</p></li><li><p>If you would like to subject all traffic that doesn't match another Jamf Access Policy, define * as the hostname to route all remaining traffic to RBI.</p></li><li><p>Optionally, enable “Restrict access when Jamf Trust is disabled” under the Security tab of the policy to prevent bypassing of RBI routing for the defined destinations.</p></li></ul></li><li><p>In your Cloudflare One console, <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/setup/non-identity/">enable Non-identity on-ramps</a> in your Cloudflare One portal.</p></li><li><p>Configure a <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/isolation-policies/">Remote Browser Isolation policy</a> in your Cloudflare One portal.</p></li><li><p>In Jamf Pro, create a new Configuration Profile with the <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#download-the-cloudflare-root-certificate">Cloudflare Gateway Root Certificate Authority</a> and scope it to your target Apple devices.</p></li></ol><p>Using Activation Profiles in Jamf Security Cloud, deploy Jamf Trust and supporting mobile configuration profiles to your end users to enable access to organization resources while enforcing remote browser isolation routing.</p>
    <div>
      <h3>Safeguarding data with SaaS Tenancy Control for cloud services</h3>
      <a href="#safeguarding-data-with-saas-tenancy-control-for-cloud-services">
        
      </a>
    </div>
    <p>Companies often rely on platforms like Google Workspace or Microsoft 365 for business collaboration and productivity, while individuals use these services for their personal use.</p><p>Allowing users to access these cloud services with both business and personal credentials from the same corporate endpoint poses a significant risk for unauthorized data access and loss. Imagine a scenario where an employee can log in into the corporate account of a SaaS application, download sensitive files, and then login into their personal account on the same company device to upload the stolen files to their personal SaaS application account.</p><p>Cloudflare's Gateway HTTP policies provide <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/tenant-control/#tenant-control">SaaS Tenancy Control</a> to ensure that users can only log in to admin-defined SaaS provider tenants with their enterprise credentials, effectively blocking login ability to personal accounts or other business tenants within the defined SaaS provider.</p><p>Jamf's Access Policies serve as the initial assessment, determining if the users are authorized for the targeted cloud application and if they are requesting access from a company-sanctioned device.</p><p>Cloudflare's Gateway HTTP policy then processes the requests forwarded from Jamf to define the domains that are permitted to log in to that SaaS provider.</p><p><b>Steps to implement SaaS Tenancy Control:</b></p><ol><li><p>In Jamf’s Security Cloud portal, <a href="https://learn.jamf.com/bundle/jamf-security-documentation/page/Connecting_to_Cloud_Infrastructure_for_Cloudflare.html">configure a Magic WAN interconnect</a> to your Cloudflare account.</p></li><li><p><a href="https://learn.jamf.com/bundle/jamf-security-documentation/page/Configuring_Access_Policy.html">Configure one or more Access policies</a> that define the SaaS providers for which you would like to enable tenant controls. Use the below pre-defined SaaS app access policy templates for the respective SaaS provider:</p><ul><li><p>“Microsoft Authentication” for Microsoft 365</p></li><li><p>“Google Apps” for Google Workspace</p></li><li><p>“Dropbox” for Dropbox and Dropbox for Business</p></li><li><p>“Slack” for Slack</p></li></ul></li><li><p>To ensure these policies are enforced on any network, enable “Restrict access when Jamf Trust is disabled” under the Security tab of the policy to prevent bypassing of these tenancy controls.</p></li><li><p>Configure <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/tenant-control/">SaaS Tenant Control</a> in your Cloudflare One portal.</p></li><li><p>In Jamf Pro, create a new Configuration Profile with the <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/user-side-certificates/install-cloudflare-cert/#download-the-cloudflare-root-certificate">Cloudflare Gateway Root Certificate Authority</a> and scope it to your target Apple devices.</p></li><li><p>Using Activation Profiles in Jamf Security Cloud, deploy Jamf Trust and supporting mobile configuration profiles to your end users to enable access to organization resources while enforcing remote browser isolation routing.</p></li></ol>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>If you are a Cloudflare customer and are interested in using this integration, please reach out to your account team with your questions and feedback.</p><p>If you are new to Cloudflare or Jamf and interested in using this integration with the Cloudflare Zero Trust product suite, please fill up this <a href="https://www.cloudflare.com/partners/technology-partners/jamf/">form</a> and someone from our team will contact you.</p> ]]></content:encoded>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">1QCAGYsmXSnoG50TToZXTk</guid>
            <dc:creator>Mythili Prabhu</dc:creator>
            <dc:creator>Matt Vlasach (Guest Author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Expanding our Microsoft collaboration: proactive and automated Zero Trust security for customers]]></title>
            <link>https://blog.cloudflare.com/expanding-our-collaboration-with-microsoft-proactive-and-automated-zero-trust-security/</link>
            <pubDate>Thu, 12 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ As CIOs navigate the complexities of stitching together multiple solutions, we are extending our collaboration with Microsoft to create one of the best Zero Trust solutions available. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Ru2fdT46ERm7sRSdZAsEQ/924a95d917b4b62a13a55a992bf29caf/image2-66.png" />
            
            </figure><p>As CIOs <a href="https://www.cloudflare.com/cio/">navigate the complexities</a> of stitching together multiple solutions, we are extending our partnership with Microsoft to create one of <a href="https://www.cloudflare.com/zero-trust/solutions/">the best Zero Trust solutions</a> available. Today, we are announcing four new integrations between Azure AD and Cloudflare Zero Trust that reduce risk proactively. These integrated offerings increase automation allowing security teams to focus on threats versus <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementation</a> and maintenance.</p>
    <div>
      <h3>What is Zero Trust and why is it important?</h3>
      <a href="#what-is-zero-trust-and-why-is-it-important">
        
      </a>
    </div>
    <p>Zero Trust is an overused term in the industry and creates a lot of confusion. So, let's break it down. Zero Trust architecture emphasizes the “never trust, always verify” approach. One way to think about it is that in the <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">traditional security perimeter</a> or “castle and moat” model, you have access to all the rooms inside the building (e.g., apps) simply by having access to the main door (e.g., typically a VPN).  In the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a> you would need to obtain access to each locked room (or app) individually rather than only relying on access through the main door. Some key components of the Zero Trust model are identity e.g., Azure AD (who), apps e.g., a SAP instance or a custom app on Azure (applications), policies e.g. Cloudflare Access rules (who can access what application), devices e.g. a laptop managed by Microsoft Intune (the security of the endpoint requesting the access) and other contextual signals.</p><p>Zero Trust is even more important today since companies of all sizes are faced with an accelerating digital transformation and an increasingly distributed workforce. Moving away from the castle and moat model, to the Internet becoming your corporate network, requires security checks for every user accessing every resource. As a result, all companies, especially those whose use of Microsoft’s broad cloud portfolio is increasing, are adopting a Zero Trust architecture as an essential part of their cloud journey.</p><p>Cloudflare’s Zero Trust platform provides a modern approach to authentication for internal and SaaS applications. Most companies likely have a mix of corporate applications - some that are SaaS and some that are hosted on-premise or on Azure. Cloudflare’s Zero Trust Network Access (ZTNA) product as part of our Zero Trust platform makes these applications feel like SaaS applications, allowing employees to access them with a simple and consistent flow. Cloudflare Access acts as a unified reverse proxy to enforce <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access control</a> by making sure every request is authenticated, authorized, and encrypted.</p>
    <div>
      <h3>Cloudflare Zero Trust and Microsoft Azure Active Directory</h3>
      <a href="#cloudflare-zero-trust-and-microsoft-azure-active-directory">
        
      </a>
    </div>
    <p>We have thousands of customers using Azure AD and Cloudflare Access as part of their Zero Trust architecture. Our <a href="/cloudflare-partners-with-microsoft-to-protect-joint-customers-with-global-zero-trust-network/">partnership with Microsoft</a>  announced last year strengthened security without compromising performance for our joint customers. Cloudflare’s Zero Trust platform integrates with Azure AD, providing a seamless application access experience for your organization's hybrid workforce.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2v5Iehf1svBNs9FvFTEcOG/25863db421decc020149ec9b2e87e858/1.png" />
            
            </figure><p>As a recap, the integrations we launched solved <a href="/cloudflare-partners-with-microsoft-to-protect-joint-customers-with-global-zero-trust-network/">two key problems</a>:</p><ol><li><p><i>For on-premise legacy applications</i>, Cloudflare’s participation as Azure AD <a href="https://azure.microsoft.com/en-us/services/active-directory/sso/secure-hybrid-access/#overview">secure hybrid access</a> partner enabled customers to centrally manage access to their legacy on-premise applications using SSO authentication without incremental development. Joint <a href="https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/cloudflare-azure-ad-integration">customers now easily use</a> Cloudflare Access as an additional layer of security with built-in performance in front of their legacy applications.</p></li><li><p><i>For apps that run on Microsoft Azure</i>, joint customers can integrate Azure AD <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/azuread/">with Cloudflare Zero Trust</a> and build rules based on user identity, group membership and Azure AD Conditional Access policies. Users will authenticate with their Azure AD credentials and connect to <a href="https://www.cloudflare.com/zero-trust/products/access/">Cloudflare Access</a> with just a few simple steps using Cloudflare’s app connector, <a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/cloudflare.cloudflare_tunnel_vm?tab=Overview">Cloudflare Tunnel</a>, that can expose applications running on <a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/">Azure</a>. See guide to <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/tunnel-guide/">install and configure Cloudflare Tunnel</a>.</p></li></ol><p>Recognizing Cloudflare's innovative approach to Zero Trust and Security solutions, Microsoft awarded us the <a href="https://www.microsoft.com/security/blog/2022/06/06/announcing-2022-microsoft-security-excellence-awards-winners/#:~:text=Security%20Software%20Innovator">Security Software Innovator</a> award at the 2022 Microsoft Security Excellence Awards, a prestigious classification in the Microsoft partner community.</p><p><i>But we aren’t done innovating</i>. We listened to our customers’ feedback and to address their pain points are announcing several new integrations.</p>
    <div>
      <h3>Microsoft integrations we are announcing today</h3>
      <a href="#microsoft-integrations-we-are-announcing-today">
        
      </a>
    </div>
    <p>The four new integrations we are announcing today are:</p><p><b>1. Per-application conditional access:</b> Azure AD customers <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/azuread-conditional-access/">can use their existing Conditional Access policies</a> in Cloudflare Zero Trust.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3DrhzGns2IQDHUVSY105rq/c6e4b012206be1f3ecf95ecc40889980/2.png" />
            
            </figure><p>Azure AD allows administrators to create and enforce policies on both applications and users using Conditional Access. It provides a wide range of parameters that can be used to control user access to applications (e.g. user risk level, sign-in risk level, device platform, location, client apps, etc.). Cloudflare Access now supports Azure AD Conditional Access policies per application. This allows security teams to define their security conditions in Azure AD and enforce them in Cloudflare Access.</p><p>For example, customers might have tighter levels of control for an internal payroll application and hence will have specific conditional access policies on Azure AD. However, for a general info type application such as an internal wiki, customers might enforce not as stringent rules on Azure AD conditional access policies. In this case both app groups and relevant Azure AD conditional access policies can be directly plugged into Cloudflare Zero Trust seamlessly without any code changes.</p><p>**2. **<a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/azuread/#synchronize-users-and-groups"><b>SCIM</b></a>****: Autonomously synchronize Azure AD groups between Cloudflare Zero Trust and Azure AD, saving hundreds of hours in the CIO org.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1bU3bURsLCASnT6AqrV6nU/494a9809a32a4f908b13e74011f8a687/3.png" />
            
            </figure><p>Cloudflare Access policies can use Azure AD to verify a user's identity and provide information about that user (e.g., first/last name, email, group membership, etc.). These user attributes are not always constant, and can change over time. When a user still retains access to certain sensitive resources when they shouldn’t, it can have serious consequences.</p><p>Often when user attributes change, an administrator needs to review and update all access policies that may include the user in question. This makes for a tedious process and an error-prone outcome.</p><p>The SCIM (System for Cross-domain Identity Management) specification ensures that user identities across entities using it are always up-to-date. We are excited to announce that joint customers of Azure AD and Cloudflare Access can now enable SCIM user and group provisioning and deprovisioning. It will accomplish the following:</p><ul><li><p>The IdP policy group selectors are now pre-populated with Azure AD groups and will remain in sync. Any changes made to the policy group will instantly reflect in Access without any overhead for administrators.</p></li><li><p>When a user is deprovisioned on Azure AD, all the user's access is revoked across Cloudflare Access and Gateway. This ensures that change is made in near real time thereby reducing security risks.</p></li></ul><p>**3. **<a href="https://developers.cloudflare.com/cloudflare-one/tutorials/azuread-risky-users/"><b>Risky user isolation</b></a>****: Helps joint customers add an extra layer of security by isolating high risk users (based on AD signals) such as contractors to browser isolated sessions via Cloudflare’s RBI product.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6jsV2YQ0MD6yy7lLEuZJY2/d783d7c556d72a6b2fa436a3790462a1/4.png" />
            
            </figure><p>Azure AD classifies users into low, medium and high risk users based on many data points it analyzes. Users may move from one risk group to another based on their activities. Users can be deemed risky based on many factors such as the nature of their employment i.e. contractors, risky sign-in behavior, credential leaks, etc. While these users are high-risk, there is a low-risk way to provide access to resources/apps while the user is assessed further.</p><p>We now support integrating <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/azuread-risky-users/">Azure AD groups with Cloudflare Browser Isolation</a>. When a user is classified as high-risk on Azure AD, we use this signal to automatically isolate their traffic with our Azure AD integration. This means a high-risk user can access resources through a secure and isolated browser. If the user were to move from high-risk to low-risk, the user would no longer be subjected to the isolation policy applied to high-risk users.</p><p><b>4. Secure joint Government Cloud customers</b>: Helps Government Cloud customers achieve better security with centralized identity &amp; access management via Azure AD, and an additional layer of security by connecting them to the Cloudflare global network, not having to open them up to the whole Internet.</p><p>Via <a href="https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/secure-hybrid-access-integrations">Secure Hybrid Access</a> (SHA) program, Government Cloud (‘GCC’) customers will soon be able to integrate Azure AD <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/azuread/">with Cloudflare Zero Trust</a> and build rules based on user identity, group membership and Azure AD conditional access policies. Users will authenticate with their Azure AD credentials and connect to Cloudflare Access with just a few simple steps using <a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/cloudflare.cloudflare_tunnel_vm?tab=Overview">Cloudflare Tunnel</a> that can expose applications running on <a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/">Microsoft Azure</a>.</p><blockquote><p><i>“Digital transformation has created a new security paradigm resulting in organizations accelerating their adoption of Zero Trust. The </i><b><i>Cloudflare Zero Trust</i></b><i> and </i><b><i>Azure Active Directory</i></b><i> joint solution has been a growth enabler for Swiss Re by easing Zero Trust deployments across our workforce allowing us to focus on our core business. Together, the joint solution enables us to go beyond SSO to empower our adaptive workforce with frictionless, secure access to applications from anywhere. The joint solution also delivers us a holistic Zero Trust solution that encompasses people, devices, and networks.”</i><b>– Botond Szakács, Director, Swiss Re</b></p></blockquote><blockquote><p><i>“A cloud-native Zero Trust security model has become an absolute necessity as enterprises continue to adopt a cloud-first strategy. Cloudflare has developed robust product integrations with Microsoft to help security and IT leaders prevent attacks proactively, dynamically control policy and risk, and increase automation in alignment with zero trust best practices.”</i><b>– Joy Chik, President, Identity &amp; Network Access, Microsoft</b></p></blockquote>
    <div>
      <h3>Try it now</h3>
      <a href="#try-it-now">
        
      </a>
    </div>
    <p>Interested in learning more about how our Zero Trust products integrate with Azure Active Directory? Take a look at this <a href="https://assets.ctfassets.net/slt3lc6tev37/5h3XO6w3UdOxmBNZswJjDV/84aa56dd5ade5c05f01436d19f8dc4f8/Cloudflare_Microsoft_Azure_AD_Reference_Archtecture_v2__BDES-4130.pdf">extensive reference architecture</a> that can help you get started on your Zero Trust journey and then add the specific use cases above as required. Also, check out this joint <a href="https://www.google.com/url?q=https://gateway.on24.com/wcc/eh/2153307/lp/3939569/achieving-zero-trust-application-access-with-cloudflare-and-azure-ad&amp;sa=D&amp;source=docs&amp;ust=1673477613350582&amp;usg=AOvVaw0hstOTz5JVlwWEGp8_Ifu_">webinar</a> with Microsoft that highlights our joint Zero Trust solution and how you can get started.</p>
    <div>
      <h3>What next</h3>
      <a href="#what-next">
        
      </a>
    </div>
    <p><i>We are just getting started</i>. We want to continue innovating and make the Cloudflare Zero Trust and Microsoft Security joint solution to solve your problems. Please give us <a href="https://www.cloudflare.com/partners/technology-partners/microsoft/">feedback</a> on what else you would like us to build as you continue using this joint solution.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Microsoft]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4pqoxyMztGcYC13k3EKdI3</guid>
            <dc:creator>Abhi Das</dc:creator>
            <dc:creator>Mythili Prabhu</dc:creator>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare and Aruba partner to deliver a seamless global secure network from the branch to the cloud]]></title>
            <link>https://blog.cloudflare.com/cloudflare-aruba-partnership/</link>
            <pubDate>Thu, 17 Mar 2022 12:59:08 GMT</pubDate>
            <description><![CDATA[ Today we are excited to announce that Cloudflare and Aruba are working together to develop a solution that will enable Aruba customers to connect EdgeConnect SD-WAN’s with Cloudflare's global network to further secure their corporate traffic with Cloudflare One ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today we are excited to announce that Cloudflare and Aruba are working together to develop a solution that will enable Aruba customers to connect EdgeConnect SD-WAN’s with Cloudflare's global network to further secure their corporate traffic with <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>. Whether organizations need to secure Internet-bound traffic from branch offices using Cloudflare's <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Secure Web Gateway</a> &amp; <a href="https://www.cloudflare.com/magic-firewall/">Magic Firewall</a>, or enforce firewall policies for east/west traffic between offices via Magic Firewall, we have them covered. This gives customers peace of mind that they have consistent global security from Cloudflare while retaining granular control of their inter-branch and Internet-bound traffic policies from their Aruba EdgeConnect appliances.</p>
    <div>
      <h3>SD-WAN solution</h3>
      <a href="#sd-wan-solution">
        
      </a>
    </div>
    <p>A <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">software-defined WAN (SD-WAN)</a> is an evolution of a WAN (wide area network) that simplifies the underlying architecture. Unlike traditional WAN architecture models where expensive leased, and MPLS links are used, SD-WAN can efficiently use a combination of private lines and the public Internet. It brings together the best of both worlds to provide an integrated solution to network administrators in managing and scaling their network and resources with ease.</p>
    <div>
      <h3>Aruba’s EdgeConnect SD-WAN solution</h3>
      <a href="#arubas-edgeconnect-sd-wan-solution">
        
      </a>
    </div>
    <p>We are proud to announce our first enhanced SD-WAN integration. Aruba’s EdgeConnect solution is an industry leader for <a href="https://www.arubanetworks.com/analyst-reports/sd-wan-edge-gartner-magic-quadrant-2021">WAN edge infrastructure</a>. Aruba’s solution offers both physical and virtual appliances to create logical network overlays across the wide area network, enabling network administrators to create multiple distinct traffic profiles that govern how enterprise application traffic is forwarded between office branches and the Internet. In the Aruba EdgeConnect solution, the Aruba Orchestrator is used to configure and manage the entire SD-WAN including EdgeConnect appliances located in branch offices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1a1tFjFuhgw0p7dEsiuxZI/5a5b5cc896d29554ec5be336b966b3eb/image2-55.png" />
            
            </figure><p><i>EdgeConnect UI showing overlays directing traffic to Cloudflare or to local breakout.</i></p>
    <div>
      <h3>Cloudflare One on-ramps</h3>
      <a href="#cloudflare-one-on-ramps">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> unifies cloud-native security and access services to meet today's demanding and evolving architecture needs. Our <a href="https://www.cloudflare.com/products/zero-trust/">Zero Trust</a> and <a href="https://www.cloudflare.com/network-services/">Magic network services</a> products securely connect remote users, branch offices, and data centers to the application and Internet resources they need with smart routing and traffic acceleration — all with a single control plane to apply network and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security policies</a> to application access and Internet browsing.</p><p>So what's new? We previously announced <a href="/network-onramp-partnerships/">many ways to on-ramp</a> customer traffic to Cloudflare One. Our goal with this integration is simple: help our mutual &amp; prospective customers leverage their existing SD-WAN investments, allowing them to connect their devices to Cloudflare for additional organizational security and control across all of their business entities. This gives our customers both the security and control they require without employing a rip and replace solution.</p>
    <div>
      <h3>An integrated solution</h3>
      <a href="#an-integrated-solution">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BgshEOaqhCEV1y1jaMGB2/e63d263a9fe1df590512018c7661f3c6/image3-26.png" />
            
            </figure><p>At a high level, tunnels are established (Anycast GRE or IPSec) between the EdgeConnect appliances in each branch office or public cloud and Cloudflare’s edge. This means the appliances are now connected to the nearest Cloudflare data center anywhere on earth. The Network Administrator then uses Aruba Orchestrator’s <a href="https://www.silver-peak.com/sites/default/files/UserDocuments/WAN-OP-HTML/content/business_intent_overlays_bio.htm">Business Intent Overlays</a> to create intuitive policies which automatically identify and steer application traffic to Cloudflare. For example, a customer can choose to match and send certain Internet-bound traffic over the established tunnels to Cloudflare, while ensuring other traffic types can be sent out through other EdgeConnect interfaces. This could be directly to other EdgeConnect devices in other offices, other service providers, or broken out locally to the Internet depending on the overlays that match the other traffic profiles. A typical use case is business applications go through established tunnels while video streaming may go directly to the Internet.</p><p>Complete integration details can be found in our <a href="https://developers.cloudflare.com/magic-wan/partners/aruba-edgeconnect/">guide</a>. In the future we expect to tighten this integration so EdgeConnect devices only need authorization credentials and can automatically configure themselves using the Magic WAN management API.</p>
    <div>
      <h3>Customer benefits</h3>
      <a href="#customer-benefits">
        
      </a>
    </div>
    <p><b><i>Simplicity:</i></b> The primary benefit of our partnership is the ability and simplicity of connecting to Cloudflare’s global edge using SD-WAN appliances that customers already own and are familiar with. They may already have a comprehensive SD-WAN deployment, sending traffic to and from a variety of destinations, services, and clouds. Cloudflare and the benefits of Magic WAN and Cloudflare’s Zero Trust offering can now be easily incorporated into this type of network topology.</p><p><b><i>Security and Control:</i></b> For traffic sent to Cloudflare, Gateway and Access policies make security more robust, targeted, and seamless. Cloudflare’s dashboard represents a single pane of glass that offers policy management, logging and analytics, providing a wide range of security granularity while remaining easy to use. Gateway policy types include DNS, Network, and HTTP(s). Remote browser isolation is also available to help protect end user devices from Internet threats such as malware and crucially, Zero-Day vulnerabilities. Access Applications continue to allow customers to create conditional zero-trust policies for applications regardless of whether they are hosted publicly, internally or are SaaS based. Magic WAN and Magic Firewall can further provide advanced cloud-based network firewalling capabilities for Internet-bound or inter-branch traffic.</p>
    <div>
      <h3>Speed and Performance</h3>
      <a href="#speed-and-performance">
        
      </a>
    </div>
    <p>Stitching together corporate networks with complicated and expensive leased lines or MPLS is now a headache of the past. With our new SD-WAN integration, it’s never been easier to simultaneously connect branch offices to one another and to the cloud. With a simple GRE or IPSec tunnel between EdgeConnect appliances and Cloudflare, each branch location now leverages Cloudflare’s highly performant and secure global anycast network as its WAN backbone - a connection that spans 250+ cities in 100+ countries operating within 95% of the Internet-connected population globally.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Our joint solution expands existing Aruba EdgeConnect SD-WAN capabilities by plugging into our cloud-native, zero-trust WAN architecture on the world's largest and fastest global edge network to keep organizations secure.</p><p>If your organization currently leverages EdgeConnect SD-WAN appliances (or any SD-WAN appliance) and wants to take the next step into your network transformation, we would love to speak with you. Reach out to us at <a href="https://www.cloudflare.com/partners/technology-partners/aruba/">https://www.cloudflare.com/partners/technology-partners/aruba/</a>.</p><blockquote><p><i>“</i><b><i>Aruba, a Hewlett Packard Enterprise company, is pleased to collaborate with Cloudflare to develop solutions that will enable our customers to easily deploy the Aruba EdgeConnect SD-WAN platform, as the enterprise connectivity onramp to the Cloudflare Magic WAN and Magic Firewall. This new solution builds on the Aruba EdgeConnect platform’s best-in-class integration with leading cloud connectivity and security services, and will enable customers to utilize Cloudfare’s Global Edge Network to protect and accelerate cloud workloads</i></b><i>.”</i>– Fraser Street, Head of WAN technical alliances for Aruba</p></blockquote><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Serverless]]></category>
            <guid isPermaLink="false">2kbuoMR8QBd1fE5iAyI8BE</guid>
            <dc:creator>Mythili Prabhu</dc:creator>
            <dc:creator>Matthew Inderbitzen</dc:creator>
        </item>
    </channel>
</rss>