
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 06:18:34 GMT</lastBuildDate>
        <item>
            <title><![CDATA[One-click data security for your internal and SaaS applications]]></title>
            <link>https://blog.cloudflare.com/one-click-zerotrust-isolation/</link>
            <pubDate>Wed, 11 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Protect sensitive data on any Access app for any user on any device. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6nirO70ymZjx0rcbyHmdCZ/f3d0ccc97a06762128e8c0c6126fdba6/image3-17.png" />
            
            </figure><p>Most of the CIOs we talk to want to replace dozens of point solutions as they start their own Zero Trust journey. <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our comprehensive <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a> platform can help teams of any size rip out all the legacy appliances and services that tried to keep their data, devices, and applications safe without compromising speed.</p><p>We also built those products to work better together. Today, we’re bringing Cloudflare’s best-in-class <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">browser isolation</a> technology to our industry-leading Zero Trust <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access control</a> product. Your team can now control the data in any application, and what a user can do in the application, with a single click in the Cloudflare dashboard. We’re excited to help you replace your private networks, virtual desktops, and data control boxes with a <a href="https://www.cloudflare.com/zero-trust/solutions/">single, faster Zero Trust solution</a>.</p>
    <div>
      <h3>Zero Trust access control is just the first step</h3>
      <a href="#zero-trust-access-control-is-just-the-first-step">
        
      </a>
    </div>
    <p>Most organizations begin their <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">Zero Trust migration</a> by replacing a virtual private network (VPN). VPN deployments trust too many users by default. In most configurations, any user on a private network can reach any resource on that same network.</p><p>The consequences vary. On one end of the spectrum, employees in marketing can accidentally stumble upon payroll amounts for the entire organization. At the other end, attackers who compromise the credentials of a support agent can move through a network to reach trade secrets or customer production data.</p><p>Zero Trust access control replaces this model by inverting the security posture. A Zero Trust network trusts no one by default. Every user and each request or connection, must prove they can reach a specific resource. Administrators can build granular rules and monitor comprehensive logs to prevent incidental or malicious access incidents.</p><p><a href="/cloudflare-one-one-year-later/">Over 10,000 teams</a> have adopted Cloudflare One to replace their own private network with a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a>. We offer those teams rules that go beyond just identity. Security teams can <a href="/require-hard-key-auth-with-cloudflare-access/">enforce hard key authentication</a> for specific applications as a second factor. Sensitive production systems can require users to <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/require-purpose-justification/">provide the reason</a> they need <a href="/announcing-access-temporary-authentication/">temporary access</a> while they request permission from a senior manager. We integrate with just about <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/">every device posture provider</a>, or you can <a href="/6-new-ways-to-validate-device-posture/">build your own</a>, to ensure that only corporate devices connect to your systems.</p><p>The teams who deploy this solution improve the security of their enterprise overnight while also making their applications faster and more usable for employees in any region. However, once users pass all of those checks we still rely on the application to decide what they can and cannot do.</p><p>In some cases, that means Zero Trust access control is not sufficient. An employee planning to leave tomorrow could download customer contact info. A contractor connecting from an unmanaged device can screenshot schematics. As enterprises evolve on their SASE migration, they need to extend Zero Trust control to application usage and data.</p>
    <div>
      <h3>Isolate sessions without any client software</h3>
      <a href="#isolate-sessions-without-any-client-software">
        
      </a>
    </div>
    <p>Cloudflare’s browser isolation technology gives teams the ability to control usage and data without making the user experience miserable. Legacy approaches to <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a> relied on one of two methods to secure a user on the public Internet:</p><ul><li><p><b>Document Object Model (DOM) manipulation</b> - unpack the webpage, inspect it, hope you caught the vulnerability, attempt to repack the webpage, deliver it. This model leads to thousands of broken webpages and total misses on zero days and other threats.</p></li><li><p><b>Pixel pushing</b> - stream a browser running far away to the user, like a video. This model leads to user complaints due to performance and a long tail of input incompatibilities.</p></li></ul><p><a href="/cloudflare-and-remote-browser-isolation/">Cloudflare’s approach is different</a>. We run headless versions of Chromium, the open source project behind Google Chrome and Microsoft Edge and other browsers, in our data centers around the world. We send the final rendering of the webpage, the draw commands, to a user's local device.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Rub7G6NKrhsrrE7sI5DJZ/1ce7980c948d40b75d120867a96f3733/image2-18.png" />
            
            </figure><p>The user thinks it is just the Internet. Highlighting, right-clicking, videos - they all just work. Users do not need a special browser client. Cloudflare’s technology just works in any browser on mobile or desktop. For security teams, they can guarantee that code never executes on the devices in the field to stop Zero-Day attacks.</p><p>We added browser isolation to Cloudflare One to protect against attacks that leap out of a browser from the public Internet. However, controlling the browser also gives us the ability to pass that control along to security and IT departments, so they can focus on another type of risk - data misuse.</p><p>As part of this launch, when administrators <a href="https://www.cloudflare.com/application-services/solutions/">secure an application</a> with Cloudflare’s Zero Trust access control product, they can click an additional button that will force sessions into our isolated browser.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3lsdhsnQffyncOIP1jPfJJ/905858e945f787fea6e3a7d49c0e71fc/image1-28.png" />
            
            </figure><p>When the user authenticates, Cloudflare Access checks all the Zero Trust rules configured for a given application. When this isolation feature is enabled, Cloudflare will silently open the session in our isolated browser. The user does not need any special software or to be trained on any unique steps. They just navigate to the application and start doing their work. Behind the scenes, the session runs entirely in Cloudflare’s network.</p>
    <div>
      <h3>Control usage and data in sessions</h3>
      <a href="#control-usage-and-data-in-sessions">
        
      </a>
    </div>
    <p>By running the session in Cloudflare’s isolated browser, administrators can begin to build rules that replace some goals of legacy virtual desktop solutions. Some enterprises deploy virtual desktop instances (VDIs) to sandbox application usage. Those VDI platforms extended applications to employees and contractors without allowing the application to run on the physical device.</p><p>Employees and contractors tend to hate this method. The client software required is clunky and not available on every operating system. The speed slows them down. Administrators also need to invest time in maintaining the desktops and the virtualization software that power them.</p><p>We’re excited <a href="/decommissioning-virtual-desktop/">to help you replace that point solution</a>, too. Once an application is isolated in Cloudflare’s network, you can toggle additional rules that control how users interact with the resource. For example, you can disable potential data loss vectors like file downloads, printing, or copy-pasting. Add watermarks, both visible and invisible, to audit screenshot leaks.</p><p>You can extend this control beyond just data loss. Some teams have sensitive applications where you need users to connect without inputting any data, but they do not have the developer time to build a “Read Only” mode. With Cloudflare One, those teams can toggle “Disable keyboard” and allow users to reach the service while blocking any input.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7f3WOaiEPIsf8WaxShdurE/825bde4738e63ad27c2db5f06fab6f42/image5-9.png" />
            
            </figure><p>The isolated solution also integrates with <a href="/inline-dlp-ga/">Cloudflare One’s Data Loss Prevention</a> (DLP) suite. With a few additional settings, you can bring <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">comprehensive data control</a> to your applications without any additional engineering work or point solution deployment. If a user strays too far in an application and attempts to download something that contains personal information like social security or credit card numbers, Cloudflare’s network will stop that download while still allowing otherwise approved files.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bqHdkpi2r8Cb04Frl0geg/d1a4bf21fd0e4bd4913db9c106d84315/image4-15.png" />
            
            </figure>
    <div>
      <h3>Extend that control to SaaS applications</h3>
      <a href="#extend-that-control-to-saas-applications">
        
      </a>
    </div>
    <p>Most of the customers we hear from need to bring this level of data and usage control to their self-hosted applications. Many of the SaaS tools they rely on have more advanced role-based rules. However, that is not always the case and, even if the rules exist, they are not as comprehensive as needed and require an administrator to manage a dozen different application settings.</p><p>To avoid that hassle you can bring Cloudflare One’s one-click isolation feature to your SaaS applications, too. Cloudflare’s access control solution can be configured as an identity proxy that will force all logins to any SaaS application that supports SSO through Cloudflare’s network where additional rules, including isolation, can be applied.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Today’s announcement brings together two of our customers’ favorite solutions - our Cloudflare Access solution and our browser isolation technology. Both products are available to use today. You can start building rules that force isolation or control data usage by following the guides linked <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/isolation-policies/">here</a>.</p><p>Willing to wait for the easy button? Join the <a href="https://www.cloudflare.com/lp/application-isolation-beta/">beta</a> today for the one-click version that we are rolling out to customer accounts.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[VDI]]></category>
            <category><![CDATA[Data Loss Prevention]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">6ZzrmWoBfR99ZDBG4KYkAt</guid>
            <dc:creator>Tim Obezuk</dc:creator>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Click Here! (safely): Automagical Browser Isolation for potentially unsafe links in email]]></title>
            <link>https://blog.cloudflare.com/safe-email-links/</link>
            <pubDate>Thu, 29 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ There’s always a cat and mouse game between hackers and security companies. New attacks try to weaponize website links after emails have been delivered to mailboxes, and Email Link Isolation is here to revolutionize protection against those attacks. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We're often told not to click on 'odd' links in email, but what choice do we really have? With the volume of emails and the myriad of SaaS products that companies use, it's inevitable that employees find it almost impossible to distinguish a good link before clicking on it. And that's before attackers go about making links harder to inspect and hiding their URLs behind tempting "Confirm" and "Unsubscribe" buttons.</p><p>We need to let end users click on links and have a safety net for when they unwittingly click on something malicious — let’s be honest, it’s bound to happen even if you do it by mistake. That safety net is Cloudflare's Email Link Isolation.</p>
    <div>
      <h2>Email Link Isolation</h2>
      <a href="#email-link-isolation">
        
      </a>
    </div>
    <p>With Email Link Isolation, when a user clicks on a suspicious link — one that email security hasn’t identified as ‘bad’, but is still not 100% sure it’s ‘good’ — they won’t immediately be taken to that website. Instead, the user first sees an interstitial page recommending extra caution with the website they’ll visit, especially if asked for passwords or personal details.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/176fAKaEbWz4ESe4erOMOc/21dc4ffb698a1cbee7d6083be0ade544/image1-78.png" />
            
            </figure><p>From there, one may choose to not visit the webpage or to proceed and open it in a remote isolated browser that runs on Cloudflare’s global network and not on the user’s local machine. This helps protect the user and the company.</p><p>The user experience in our isolated browser is virtually indistinguishable from using one’s local browser (we’ll talk about why below), but untrusted and potentially malicious payloads will execute away from the user’s computer and your corporate network.</p><p>In summary, this solution:</p><ul><li><p>Keeps users alert to prevent credential theft and <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">account takeover</a></p></li><li><p>Automatically blocks dangerous downloads</p></li><li><p>Prevents malicious scripts from executing on the user’s device</p></li><li><p>Protects against zero-day exploits on the browser</p></li></ul>
    <div>
      <h2>How can I try it</h2>
      <a href="#how-can-i-try-it">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/products/zero-trust/email-security/">Area 1</a> is Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security solution</a>. It protects organizations from the full range of email attack types (URLs, payloads, BEC), vectors (email, web, network), and attack channels (external, internal, trusted partners) by enforcing multiple layers of protection before, during, and after the email hits the inbox. Today it adds Email Link Isolation to the protections it offers.</p><p>If you are a Cloudflare Area 1 customer you can <a href="https://www.cloudflare.com/zero-trust/lp/email-link-isolation/">request access to the Email Link Isolation beta</a> today. We have had Email Link Isolation deployed to all Cloudflare employees for the last four weeks and are ready to start onboarding customers.</p><p>During the beta it will be available for free on <a href="https://www.cloudflare.com/plans/">all plans</a>. After the beta it will still be included at no extra cost with our <a href="https://www.cloudflare.com/press-releases/2020/announcing-area-1-phishguard/">PhishGuard plan</a>.</p>
    <div>
      <h2>Under the hood</h2>
      <a href="#under-the-hood">
        
      </a>
    </div>
    <p>To create Email Link Isolation we used a few ingredients that are quite special to Cloudflare. It may seem complicated and, in a sense, the protection is complex, but we designed this so that the user experience is fast, safe, and with clear options on how to proceed.</p>
    <div>
      <h3>1. Find potentially unsafe domains</h3>
      <a href="#1-find-potentially-unsafe-domains">
        
      </a>
    </div>
    <p>First, we have created a constantly updating list of domains that the <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">Cloudflare’s DNS resolver</a> recently saw for the first time, or that are somehow potentially unsafe (leveraging classifiers from the <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> and other products). These are domains that would be too disruptive for the organization to block outright, but that should still be navigated with extra caution.</p><p>For example, people acquire domains and create new businesses every day. There’s nothing wrong with that - quite the opposite. However, attackers often set up or acquire websites serving legitimate content and, days or weeks later, send a link to intended targets. The emails flow through as benign and the attacker weaponizes the website when emails are already sitting on people’s inboxes. Blocking all emails with links to new websites would cause users to surely miss important communications, and delivering the emails while making links safe to click on is a much better suited approach.</p><p>There is also hosting infrastructure from large cloud providers, such as Microsoft or Google, that prevent crawling and scanning. These are used on our day-to-day business, but attackers may deploy malicious content there. You wouldn’t want to fully block emails with links to Microsoft SharePoint, for example, but it’s certainly safer to use Email Link Isolation on them if they link to outside your organization.</p><p>Attackers are constantly experimenting with new ways of looking legitimate to their targets, and that’s why relying on the early signals that Cloudflare sees makes such a big difference.</p>
    <div>
      <h3>2. Rewrite links in emails</h3>
      <a href="#2-rewrite-links-in-emails">
        
      </a>
    </div>
    <p>The second ingredient we want to highlight is that, as Cloudflare Area 1 processes and inspects emails for security concerns, it also checks the domain of every link against the suspicious list. If an email contains a link to a suspicious domain, Cloudflare Area 1 automatically changes it (<i>rewrites</i>) so that the interstitial page is shown, and the link opens with <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> by default.</p><p><i>Note: Rewriting email links is only possible when emails are processed inline, which is one of the options for deploying Area 1. One of the big disadvantages of any email security solution deployed as API-only is that closing this last mile gap through link rewriting isn’t a possibility.</i></p>
    <div>
      <h3>3. Opens remotely but feels local</h3>
      <a href="#3-opens-remotely-but-feels-local">
        
      </a>
    </div>
    <p>When a user clicks on one of these rewritten links, instead of directly accessing a potential threat, our systems will first check their current classification (benign, suspicious, malicious). Then, if it’s malicious, the user will be blocked from continuing to the website and see an interstitial page informing them why. No further action is required.</p><p>If the link is suspicious, the user is offered the option to open it in an isolated browser. What happens next? The link is opened with Cloudflare Browser Isolation in a nearby <a href="https://www.cloudflare.com/network/">Cloudflare data center</a> (globally within 50 milliseconds of 95% of the Internet-connect population). To ensure website compatibility and security, the target website is entirely executed in a sandboxed Chromium-based browser. Finally, the website is instantly streamed back to the user as vector instructions consumed by a lightweight HTML5-compatible remoting client in the user’s preferred web browser. These safety precautions happen with no perceivable latency to the end user.</p><p>Cloudflare Browser Isolation is an extremely secure remote browsing experience that feels just like local browsing. And delivering this is only possible by serving isolated browsers on a low latency, global network with our <a href="/cloudflare-and-remote-browser-isolation/">unique vector based streaming</a> technology. This architecture is different from legacy <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> solutions that rely on fragile and insecure DOM-scrubbing, or are bandwidth intensive and high latency pixel pushing techniques hosted in a few high latency data centers.</p>
    <div>
      <h3>4. Reassess (always learning)</h3>
      <a href="#4-reassess-always-learning">
        
      </a>
    </div>
    <p>Last but not least, another ingredient that makes Email Link Isolation particularly effective is that behind the scenes our services are constantly reevaluating domains and updating their reputation in Cloudflare’s systems.</p><p>When a domain on our suspicious list is confirmed to be benign, all links to it can automatically start opening with the user’s local browser instead of with Cloudflare Browser Isolation.</p><p>Similarly, if a domain on the suspicious list is identified as malign, all links to that domain can be immediately blocked from opening. So, our services are constantly learning and acting accordingly.</p>
    <div>
      <h2>Email Link Isolation at Cloudflare</h2>
      <a href="#email-link-isolation-at-cloudflare">
        
      </a>
    </div>
    <p>It’s been four weeks since we deployed Email Link Isolation to all our 3,000+ Cloudflare employees, here’s what we saw:</p><ul><li><p>100,000 link rewrites per week on Spam and Malicious emails. Such emails were already blocked server side by Area 1 and users never see them. It’s still safer to rewrite these as they may be released from quarantine on user request.</p></li><li><p>2,500 link rewrites per week on Bulk emails. Mostly <a href="https://en.wikipedia.org/wiki/Graymail_(email)">graymail</a>, which are commercial/bulk communications the user opted into. They may end up in the users’ spam folder.</p></li><li><p>1,000 link rewrites per week on emails that do not fit any of the categories above — these are the ones that normally reach the user’s inboxes. These are almost certainly benign, but there’s still enough doubt to warrant a link rewrite.</p></li><li><p><b>25 clicks on rewritten links per week</b> (up to six per day).</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1J3g2dQOVL9ZKOnxr0YEiv/96056ff6d84319ebf7dfdd407409fb50/image2-64.png" />
            
            </figure><p>As a testament to the efficacy of Cloudflare Area 1, 25 suspicious link clicks per week for a universe of over 3,000 employees is a very low number. Thanks to Email Link Isolation, users were protected against exploits.</p>
    <div>
      <h2>Better together with Cloudflare Zero Trust</h2>
      <a href="#better-together-with-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>In future iterations, administrators will be able to connect Cloudflare Area 1 to their Cloudflare Zero Trust account and apply isolation policies, <a href="/inline-dlp-ga/">DLP</a> (Data Loss Protection) controls and in-line <a href="/managing-clouds-cloudflare-casb/">CASB</a> (a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">cloud access security broker</a>) to email link isolated traffic.</p><p>We are starting our beta today. If you’re interested in trying Email Link Isolation and start to feel safer with your email experience, you should sign up <a href="https://www.cloudflare.com/zero-trust/lp/email-link-isolation/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">5YA2XnoQIqTkOoF2QWarvE</guid>
            <dc:creator>João Sousa Botto</dc:creator>
            <dc:creator>Tim Obezuk</dc:creator>
            <dc:creator>Phil Syme</dc:creator>
        </item>
        <item>
            <title><![CDATA[Isolate browser-borne threats on any network with WAN-as-a-Service]]></title>
            <link>https://blog.cloudflare.com/magic-gateway-browser-isolation/</link>
            <pubDate>Tue, 20 Sep 2022 13:15:00 GMT</pubDate>
            <description><![CDATA[ Defend any network from browser-borne threats with Cloudflare Browser Isolation by connecting legacy firewalls over IPsec / GRE ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Defending corporate networks from emerging threats is no easy task for security teams who manage complex stacks of firewalls, DNS and HTTP filters, and DLP and sandboxing appliances. Layering new defenses, such as Remote Browser Isolation to mitigate browser-borne threats that target vulnerabilities in unpatched browsers, can be complex for administrators who first have to plan how to integrate a new solution within their existing networks.</p><p>Today, we’re making it easier for administrators to integrate <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> into their existing network from any traffic source such as IPsec and GRE via our <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">WAN-as-a-service</a>, <a href="https://www.cloudflare.com/magic-wan/">Magic WAN</a>. This new capability enables administrators to connect on-premise networks to Cloudflare and protect Internet activity from browser-borne malware and zero day threats, without installing any endpoint software or nagging users to update their browsers.</p><p>Before diving into the technical details, let’s recap how Magic WAN and Browser Isolation fit into network perimeter architecture and a defense-in-depth security strategy.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eWvHjEtNKbRnfuzqzpPCO/4276bdeb036ce854ff8c7c2898af4d6c/Magic-Gateway---BISO_diagram.png" />
            
            </figure>
    <div>
      <h2>Securing networks at scale with Magic WAN</h2>
      <a href="#securing-networks-at-scale-with-magic-wan">
        
      </a>
    </div>
    <p>Companies have <a href="/magic-wan-firewall/">historically</a> secured their networks by building a perimeter out of on-premise routers, firewalls, dedicated connectivity and additional appliances for each layer of the security stack. Expanding the security perimeter pushes networks to their limits as centralized solutions become saturated, congested and add latency, and decentralizing adds complexity, operational overhead and cost.</p><p>These challenges are further compounded as security teams introduce more sophisticated security measures such as Browser Isolation. Cloudflare eliminates the complexity, fragility and performance limitations of legacy network perimeters by displacing on-premise firewalls with cloud firewalls hosted on our global network. This enables security teams to focus on delivering a layered security approach and successfully deploy Browser Isolation without the latency and scale constraints of legacy approaches.</p>
    <div>
      <h2>Securing web browsing activity with Browser Isolation</h2>
      <a href="#securing-web-browsing-activity-with-browser-isolation">
        
      </a>
    </div>
    <p>A far cry from their humble origins as document viewers, web browsers have evolved into extraordinarily complex pieces of software capable of running untrusted code from any connected server on the planet. In 2022 alone, Chromium, the engine that powers more than 70% of all web browsing activity and is used by everyone to access sensitive data in email and internal applications has seen six disclosed zero-day vulnerabilities.</p><p>In spite of this persistent and ongoing security risk, the patching of browsers is often left to the end-user who chooses when to <i>hit update</i> (while also restarting their browser and disrupting productivity). Patching browsers typically takes days and users remain exposed to malicious website code until it is complete.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39IcBO7YrxjuLNHIVcY0xC/7f950d1eae4649b410733b1ef0c549b0/image5-6.png" />
            
            </figure><p>To combat this risk Browser Isolation takes a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust approach</a> to web browsing and executes all website code in a remote browser. Should malicious code be executed, it occurs remotely from the user in an isolated container. The end-user and their connected network is insulated from the impact of the attack.</p>
    <div>
      <h2>Magic WAN + Browser Isolation</h2>
      <a href="#magic-wan-browser-isolation">
        
      </a>
    </div>
    <p>Customers who have networks protected by Magic WAN can now enable Browser Isolation through HTTP policies.</p>
    <div>
      <h3>Connect your network to Cloudflare and enable Secure Web Gateway</h3>
      <a href="#connect-your-network-to-cloudflare-and-enable-secure-web-gateway">
        
      </a>
    </div>
    <p>Magic WAN enables connecting any network to Cloudflare over IPsec, GRE, Private Network connectivity. The steps for this process may vary significantly depending on your vendor. See our <a href="https://developers.cloudflare.com/magic-wan/get-started/">developer documentation</a> for more information.</p>
    <div>
      <h3>Create an isolation policy</h3>
      <a href="#create-an-isolation-policy">
        
      </a>
    </div>
    <p>Isolation policies function the same with Magic WAN as they do for traffic sourced from devices with our Roaming Client (WARP) installed.</p><p>Navigate to the Cloudflare Zero Trust dashboard → Gateway → HTTP Policies and create a new HTTP policy with an isolate action.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/COOtMQFiiiCHjZHPyBcMt/194e71dd0c2b27ab2ae4d40965e53906/image3-11.png" />
            
            </figure><p>See our developer documentation to <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/#isolate-policies">learn more about isolation policies</a>.</p>
    <div>
      <h3>Enable non-identity on-ramp support</h3>
      <a href="#enable-non-identity-on-ramp-support">
        
      </a>
    </div>
    <p>Prior to this release, Magic WAN + Browser Isolation traffic presented a block page. Existing customers will continue to see this block page. To enable Browser Isolation traffic for Magic Gateway navigate to: Cloudflare Zero Trust → Settings → Browser Isolation → Non-identity on-ramp support and select Enable.</p>
    <div>
      <h3>Configuration complete</h3>
      <a href="#configuration-complete">
        
      </a>
    </div>
    <p>Once configured traffic that matches your isolation criteria is transparently intercepted and served through a remote browser. End-users are automatically connected to a remote browser at the closest Cloudflare data center. This keeps latency to a minimum, ensuring a positive end-user experience while mitigating security threats.</p>
    <div>
      <h2>Try Cloudflare Browser</h2>
      <a href="#try-cloudflare-browser">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/AkJyD6rdgQNs6ad3r5YP0/8149c49ecccfd559ef33dd1e077e81d6/image2-18.png" />
            
            </figure><p>Interested in testing our remote browsing experience? Visit <a href="http://cloudflare.com/products/zero-trust/browser-isolation/experience">this landing page</a> to request demo access to Browser Isolation. This service is hosted on our global network, and you’ll be connected to a real remote browser hosted in a nearby Cloudflare data center.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re excited to continue integrating new on-ramps to consistently protect users from web based threats on any device and any network. Stay tuned for updates on deploying Browser Isolation via Proxy PAC files and deploying in-line on top of self-hosted Access applications.</p>
    <div>
      <h2>Watch on Cloudflare TV</h2>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div> ]]></content:encoded>
            <category><![CDATA[GA Week]]></category>
            <category><![CDATA[General Availability]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">7I4LqkD6CNL9juxKQshxse</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare Security does Zero Trust]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-security-does-zero-trust/</link>
            <pubDate>Fri, 24 Jun 2022 14:15:31 GMT</pubDate>
            <description><![CDATA[ How Cloudflare’s security team implemented Zero Trust controls ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Throughout Cloudflare One week, we provided playbooks on how to replace your legacy appliances with Zero Trust services. Using our own products is part of our team’s culture, and we want to share our experiences when we <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implemented Zero Trust</a>.</p><p>Our journey was similar to many of our customers. Not only did we want better <a href="https://www.cloudflare.com/security/">security solutions</a>, but the tools we were using made our work more difficult than it needed to be. This started with just a search for an alternative to remotely connecting on a clunky VPN, but soon we were deploying <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust solutions</a> to protect our employees’ web browsing and email. Next, we are looking forward to upgrading our SaaS security with our new <a href="https://www.cloudflare.com/products/zero-trust/casb/">CASB</a> product.</p><p>We know that getting started with Zero Trust can seem daunting, so we hope that you can learn from our own journey and see how it benefited us.</p>
    <div>
      <h3>Replacing a VPN: launching Cloudflare Access</h3>
      <a href="#replacing-a-vpn-launching-cloudflare-access">
        
      </a>
    </div>
    <p>Back in 2015, all of Cloudflare’s internally-hosted applications were reached via a hardware-based VPN. On-call engineers would fire up a client on their laptop, connect to the VPN, and log on to Grafana. This process was frustrating and slow.</p><p>Many of the products we build are a direct result of the challenges our own team is facing, and Access is a perfect example. Launching as an internal project in 2015, Access enabled employees to access internal applications through our identity provider. We started with just one application behind Access with the goal of improving incident response times. Engineers who received a notification on their phones could tap a link and, after authenticating via their browser, would immediately have the access they needed. As soon as people started working with the new authentication flow, they wanted it everywhere. Eventually our security team mandated that we move our apps behind Access, but for a long time it was totally organic: teams were eager to use it.</p><p>With authentication occuring at our network edge, we were able to support a globally-distributed workforce without the latency of a VPN, and we were able to do so securely. Moreover, our team is committed to protecting our internal applications with the most secure and usable authentication mechanisms, and two-factor authentication is one of the most important security controls that can be implemented. With Cloudflare Access, we’re able to rely on the strong two-factor authentication mechanisms of our identity provider.</p><p>Not all second factors of authentication deliver the same level of security. Some methods are still vulnerable to man-in-the-middle (MITM) attacks. These attacks often feature bad actors stealing one-time passwords, commonly through phishing, to gain access to private resources. To eliminate that possibility, we implemented <a href="https://fidoalliance.org/specs/fido-v2.0-rd-20161004/fido-client-to-authenticator-protocol-v2.0-rd-20161004.html">FIDO2</a> supported security keys. FIDO2 is an authenticator protocol designed to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevent phishing</a>, and we saw it as an improvement to our reliance on soft tokens at the time.</p><p>While the implementation of FIDO2 can present compatibility challenges, we were enthusiastic to improve our security posture. Cloudflare Access enabled us to limit access to our systems to only FIDO2. Cloudflare employees are now required to use their hardware keys to reach our applications. The onboarding of Access was not only a huge win for ease of use, the enforcement of security keys was a massive improvement to our security posture.</p>
    <div>
      <h3>Mitigate threats &amp; prevent data exfiltration: Gateway and Remote Browser Isolation</h3>
      <a href="#mitigate-threats-prevent-data-exfiltration-gateway-and-remote-browser-isolation">
        
      </a>
    </div>
    
    <div>
      <h4>Deploying secure DNS in our offices</h4>
      <a href="#deploying-secure-dns-in-our-offices">
        
      </a>
    </div>
    <p>A few years later, in 2020, many customers’ security teams were struggling to extend the controls they had enabled in the office to their remote workers. In response, we launched Cloudflare Gateway, offering customers protection from malware, ransomware, phishing, command &amp; control, shadow IT, and other Internet risks over all ports and protocols. Gateway directs and filters traffic according to the policies implemented by the customer.</p><p>Our security team started with Gateway to implement DNS filtering in all of our offices. Since Gateway was built on top of the same network as 1.1.1.1, the world’s fastest DNS resolver, any current or future Cloudflare office will have DNS filtering without incurring additional latency. Each office connects to the nearest data center and is protected.</p>
    <div>
      <h4>Deploying secure DNS for our remote users</h4>
      <a href="#deploying-secure-dns-for-our-remote-users">
        
      </a>
    </div>
    <p>Cloudflare’s WARP client was also built on top of our 1.1.1.1 DNS resolver. It extends the <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">security and performance</a> offered in offices to remote corporate devices. With the WARP client deployed, corporate devices connect to the nearest Cloudflare data center and are routed to Cloudflare Gateway. By sitting between the corporate device and the Internet, the entire connection from the device is secure, while also offering improved speed and privacy.</p><p>We sought to extend secure DNS filtering to our remote workforce and deployed the Cloudflare WARP client to our fleet of endpoint devices. The deployment enabled our security teams to better preserve our privacy by encrypting DNS traffic over DNS over HTTPS (DoH). Meanwhile, Cloudflare Gateway categorizes domains based on <a href="https://radar.cloudflare.com/">Radar</a>, our own threat intelligence platform, enabling us to block high risk and suspicious domains for users everywhere around the world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5yfcgPWAmGAzf01s7NMBM0/fbe39dcf04d00f61570528c68fa907d1/pasted-image-0.png" />
            
            </figure>
    <div>
      <h4>Adding on HTTPS filtering and Browser Isolation</h4>
      <a href="#adding-on-https-filtering-and-browser-isolation">
        
      </a>
    </div>
    <p>DNS filtering is a valuable security tool, but it is limited to blocking entire domains. Our team wanted a more precise instrument to block only malicious URLs, not the full domain. Since Cloudflare One is an integrated platform, most of the deployment was already complete. All we needed was to add the Cloudflare Root CA to our endpoints and then enable HTTP filtering in the Zero Trust dashboard. With those few simple steps, we were able to implement more granular blocking controls.</p><p>In addition to precision blocking, HTTP filtering enables us to implement <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/tenant-control/">tenant control</a>. With tenant control, Gateway HTTP policies regulate access to corporate SaaS applications. Policies are implemented using custom HTTP headers. If the custom request header is present and the request is headed to an organizational account, access is granted. If the request header is present and the request goes to a non-organizational account, such as a personal account, the request can be blocked or opened in an isolated browser.</p><p>After protecting our users’ traffic at the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a> and HTTP layers, we implemented Browser Isolation. When Browser Isolation is implemented, all browser code executes in the cloud on Cloudflare’s network. This isolates our endpoints from malicious attacks and <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">common data exfiltration techniques</a>. Some <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> products introduce latency and frustrate users. Cloudflare’s Browser Isolation uses the power of our network to offer a seamless experience for our employees. It quickly improved our security posture without compromising user experience.</p>
    <div>
      <h3>Preventing phishing attacks: Onboarding Area 1 email security</h3>
      <a href="#preventing-phishing-attacks-onboarding-area-1-email-security">
        
      </a>
    </div>
    <p>Also in early 2020, we saw an uptick in employee-reported phishing attempts. Our cloud-based email provider had strong spam filtering, but they fell short at blocking malicious threats and other advanced attacks. As we experienced increasing phishing attack volume and frequency we felt it was time to explore more thorough email protection options.</p><p>The team looked for four main things in a vendor: the ability to scan email attachments, the ability to analyze suspected malicious links, business email compromise protection, and strong APIs into cloud-native email providers. After testing many vendors, Area 1 became the clear choice to protect our employees. We implemented Area 1’s solution in early 2020, and the results have been fantastic.</p><p>Given the overwhelmingly positive response to the product and the desire to build out our Zero Trust portfolio, <a href="/why-we-are-acquiring-area-1/">Cloudflare acquired Area 1 Email Security</a> in April 2022. We are excited to offer the same protections we use to our customers.</p>
    <div>
      <h3>What’s next: Getting started with Cloudflare’s CASB</h3>
      <a href="#whats-next-getting-started-with-cloudflares-casb">
        
      </a>
    </div>
    <p><a href="/cloudflare-acquires-vectrix-to-expand-zero-trust-saas-security/">Cloudflare acquired Vectrix</a> in February 2022. Vectrix’s CASB offers functionality we are excited to add to Cloudflare One. SaaS security is an increasing concern for many security teams. SaaS tools are storing more and more sensitive corporate data, so misconfigurations and external access can be a significant threat. However, securing these platforms can present a significant resource challenge. Manual reviews for misconfigurations or externally shared files are time-consuming, yet necessary processes for many customers. <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a> reduces the burden on teams by ensuring security standards by scanning SaaS instances and identifying vulnerabilities with just a few clicks.</p><p>We want to ensure we maintain the best practices for SaaS security, and like many of our customers, we have many SaaS applications to secure. We are always seeking opportunities to make our processes more efficient, so we are excited to onboard one of our newest Zero Trust products.</p>
    <div>
      <h3>Always striving for improvement</h3>
      <a href="#always-striving-for-improvement">
        
      </a>
    </div>
    <p>Cloudflare takes pride in deploying and testing our own products. Our security team works directly with Product to “dog food” our own products first. It’s our mission to help build a better Internet — and that means providing valuable feedback from our internal teams. As the number one consumer of Cloudflare’s products, the Security team is not only helping keep the company safer, but also contributing to build better products for our customers.</p><p>We hope you have enjoyed Cloudflare One week. We really enjoyed sharing our stories with you. To check out our recap of the week, please visit our <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3824611/?_gl=1%2a1gzme6u%2a_ga%2aMTkxODk3NTg2MC4xNjMyMTUzNjc4%2a_gid%2aNjI2NDA3OTcxLjE2NTQ1MzM5MjQ">Cloudflare TV segment</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Dogfooding]]></category>
            <guid isPermaLink="false">3se8QfBZjWolhVUDZFngeV</guid>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>Tim Obezuk</dc:creator>
            <dc:creator>Derek Pitts</dc:creator>
        </item>
        <item>
            <title><![CDATA[Decommissioning your VDI]]></title>
            <link>https://blog.cloudflare.com/decommissioning-virtual-desktop/</link>
            <pubDate>Fri, 24 Jun 2022 13:45:06 GMT</pubDate>
            <description><![CDATA[ This blog offers Cloudflare’s perspective on how remote browser isolation can help organizations offload internal web application use cases currently secured by virtual desktop infrastructure (VDI) ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/77iYwkTG9OSkNMxplpH1bn/746c0332dd8b033a75221fac1e75a1b6/Decommissioning-VDI-1.png" />
            
            </figure><p>This blog offers Cloudflare’s perspective on how <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> can help organizations offload internal web application use cases currently secured by virtual desktop infrastructure (VDI). VDI has historically been useful to <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">secure remote work</a>, particularly when users relied on desktop applications. However, as web-based apps have become more popular than desktop apps, the drawbacks of VDI – high costs, unresponsive user experience, and complexity – have become harder to ignore. In response, we offer practical recommendations and a phased approach to transition away from VDI, so that organizations can lower cost and unlock productivity by improving employee experiences and simplifying administrative overhead.</p>
    <div>
      <h2>Modern Virtual Desktop usage</h2>
      <a href="#modern-virtual-desktop-usage">
        
      </a>
    </div>
    
    <div>
      <h4>Background on Virtual Desktop Infrastructure (VDI)</h4>
      <a href="#background-on-virtual-desktop-infrastructure-vdi">
        
      </a>
    </div>
    <p>Virtual Desktop Infrastructure describes running desktop environments on virtual computers hosted in a data center. When users access resources within VDI, video streams from those virtual desktops are delivered securely to endpoint devices over a network. Today, <a href="https://www.gartner.com/en/information-technology/glossary/virtual-desktop-infrastructure-vdi#:~:text=Virtual%20desktop%20infrastructure%20(VDI)%20is,users%20to%20their%20desktop%20environments">VDI</a> is predominantly hosted on-premise in data centers and either managed directly by organizations themselves or by third-party <a href="https://www.gartner.com/en/information-technology/glossary/desktop-as-a-service-daas">Desktop-as-a-Service (DaaS)</a> providers. In spite of web application usage growing in favor of desktop applications, DaaS is growing, with Gartner® recently projecting DaaS spending to <a href="https://www.gartner.com/en/articles/3-cloud-technologies-to-support-hybrid-work-experiences">double by 2024</a>.</p><p>Both flavors of VDI promise benefits to support remote work. For security, VDI offers a way to centralize configuration for many dispersed users and to keep sensitive data far away from devices. Business executives are often attracted to VDI because of potential cost savings over purchasing and distributing devices to every user. The theory is that when processing is shifted to centralized servers, IT teams can save money shipping out fewer managed laptops and instead support bring-your-own-device (BYOD). When hardware is needed, they can purchase less expensive devices and even extend the lifespan of older devices.</p>
    <div>
      <h2>Challenges with VDI</h2>
      <a href="#challenges-with-vdi">
        
      </a>
    </div>
    
    <div>
      <h4>High costs</h4>
      <a href="#high-costs">
        
      </a>
    </div>
    <p>The reality of VDI is often quite different. In particular, it ends up being much more costly than organizations anticipate for both capital and operational expenditures. <a href="https://www.gartner.com/en/documents/4008018">Gartner</a>® projects that “by 2024, more than 90% of desktop virtualization projects deployed primarily to save cost will fail to meet their objectives.”</p><p>The reasons are multiple. On-premise VDI comes with significant upfront capital expenditures (CapEx) in servers. DaaS deployments require organizations to make opaque decisions about virtual machines (e.g. number, region, service levels, etc.) and their specifications (e.g. persistent vs. pooled, always-on vs. on-demand, etc.). In either scenario, the operational expenditures (OpEx) from maintenance and failing to rightsize capacity can lead to surprises and overruns. For both flavors, the more organizations commit to virtualization, the more they are locked into high ongoing compute expenses, particularly as workforces grow remotely.</p>
    <div>
      <h4>Poor user experience</h4>
      <a href="#poor-user-experience">
        
      </a>
    </div>
    <p>VDI also delivers a subpar user experience. Expectations for frictionless IT experiences have only increased during remote work, and users can still tell the difference between accessing apps directly versus from within a virtual desktop. VDI environments that are not rightsized can lead to clunky, latent, and unresponsive performance. Poor experiences can negatively impact productivity, security (as users seek workarounds outside of VDI), and employee retention (as users grow disaffected).</p>
    <div>
      <h4>Complexity</h4>
      <a href="#complexity">
        
      </a>
    </div>
    <p>Overall, VDI is notoriously complex. Initial setup is multi-faceted and labor-intensive, with steps including investing in servers and end user licenses, planning VM requirements and capacity, virtualizing apps, setting up network connectivity, and rolling out VDI thin clients. Establishing security policies is often the last step, and for this reason, can sometimes be overlooked, leading to security gaps.</p><p>Moving VDI into full production not only requires cross-functional coordination across typical teams like IT, security, and infrastructure &amp; operations, but also typically requires highly specialized talent, often known as virtual desktop administrators. These skills are hard to find and retain, which can be risky to rely on during this current high-turnover labor market.</p><p>Even still, administrators often need to build their own logging, auditing, inspection, and identity-based access policies on top of these virtualized environments. This means additional overhead of configuring separate services like secure web gateways.</p><p>Some organizations deploy VDI primarily to avoid the shipping costs, logistical hassles, and regulatory headaches of sending out managed laptops to their global workforce. But with VDI, what seemed like a fix for one problem can quickly create more overhead and frustration. Wrestling with VDI’s complexity is likely not worthwhile, particularly if users only need to access a select few internal web services.</p>
    <div>
      <h2>Offloading Virtual Desktop use cases with Remote Browser Isolation</h2>
      <a href="#offloading-virtual-desktop-use-cases-with-remote-browser-isolation">
        
      </a>
    </div>
    <p>To avoid these frictions, organizations are exploring ways to shift use cases away from VDI, particularly when on-prem. Most applications that workforces rely on today are accessible via the browser and are hosted in public or hybrid cloud or SaaS environments, and even occasionally in legacy data centers. As a result, modern services like remote browser isolation (RBI) increasingly make sense as alternatives to begin offloading VDI workloads and shift security to the cloud.</p><p>Like VDI, <a href="https://www.cloudflare.com/static/9946ae465a200fc87c0972abc3c3d065/Cloudflare_Browser_Isolation_-_Product_Brief__2022_Q2_.pdf">Cloudflare Browser Isolation</a> minimizes <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surface</a> by running all app and web code away from endpoints — in this case, on Cloudflare’s global network. In the process, Cloudflare can secure data-in-use within a browser from untrusted users and devices, plus insulate those endpoints from threats like ransomware, phishing and even zero-day attacks. Within an isolated browser, administrators can set <a href="/data-protection-browser/">policies to protect sensitive data</a> on any web-based or SaaS app, just as they would with VDI. Sample controls include restrictions on file uploads / downloads, copy and paste, keyboard inputs, and printing functionality.</p><p>This comparable security comes with more achievable business benefits, starting with helping employees be more productive:</p><ol><li><p><i>End users benefit from a faster and more transparent experience than with VDI.</i> Our browser isolation is designed to run across our 270+ locations, so that isolated sessions are served as close to end users as possible. Unlike with VDI, there is no backhauling user traffic to centralized data centers. Plus, Cloudflare’s <a href="/browser-isolation-for-teams-of-all-sizes/">Network Vector Rendering (NVR)</a> approach ensures that the in-app experience feels like a native, local browser – without bandwidth intensive pixel pushing techniques.</p></li><li><p><i>Administrators benefit because they can skip all the up-front planning, ongoing overhead, and scaling pains associated with VDI.</i> Instead, administrators turn on isolation policies from a single dashboard and let Cloudflare handle scaling to users and devices. Plus, native integrations with ZTNA, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">SWG</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, and other security services make it easy to begin modernizing VDI-adjacent use cases.</p></li></ol><p>On the cost side, expenses associated with browser isolation are overall lower, smoother, and more predictable than with VDI. In fact, <a href="https://www.cloudflare.com/lp/gartner-hype-cycle-for-network-security/">Gartner</a>® recently highlighted that “RBI is cheaper than using VDI for isolation if the only application being isolated is the browser.”</p><p>Unlike on-prem VDI, there are no capital expenditures on VM capacity, and unlike DaaS subscriptions, Cloudflare offers simple, seat-based pricing with no add-on fees for configurations. Organizations also can skip purchasing standalone point solutions because Cloudflare’s RBI comes natively integrated with other services in the <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare Zero Trust platform</a>. Most notably, we do not charge for cloud consumption, which is a common source of VDI surprise.</p>
    <div>
      <h4>Transitioning to Cloudflare Browser Isolation</h4>
      <a href="#transitioning-to-cloudflare-browser-isolation">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wxHxebhspJ8vu9R9kF0xz/eb3cfdb6b7fa8469432ae2e5714c5e5f/Decommissioning-VDI_Diagram.png" />
            
            </figure><p><i>Note: Above diagram includes this table below</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SHS0uvO0eHv2HguEw3l60/fec198954f312e1a1746a2df817a759d/Screen-Shot-2022-06-23-at-4.20.45-PM.png" />
            
            </figure>
    <div>
      <h3>Customer story: PensionBee</h3>
      <a href="#customer-story-pensionbee">
        
      </a>
    </div>
    <p><a href="https://www.pensionbee.com/">PensionBee</a>, a leading online pension provider in the UK, recognized this opportunity to offload virtual desktop use cases and switch to RBI. As a reaction to the pandemic, PensionBee initially onboarded a DaaS solution (Amazon WorkSpaces) to help employees access internal resources remotely. Specifically, CTO Jonathan Lister Parsons was most concerned about securing Salesforce, where PensionBee held its customers’ sensitive pension data.</p><p>The DaaS supported <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access controls</a> similar to PensionBee configured for employees when they previously were in the office (e.g. allowlisting the IPs of the virtual desktops). But shortly after rollout, Lister Parsons began developing concerns about the unresponsive user experience. In <a href="https://gateway.on24.com/wcc/gateway/eliteCloudflareInc/2153307/3490369?_gl=1*1a9y4bl*_ga*MTkxODk3NTg2MC4xNjMyMTUzNjc4*_gid*MzM3MDkyNzQ3LjE2NTQwMDkxNTg">this recent webinar</a>, he in fact guesstimated that “users are generally about 10% less productive when they’re using the DaaS to do their work.” This negative experience increased the support burden on PensionBee’s IT staff to the point where they had to build an automated tool to reboot an employee’s DaaS service whenever it was acting up.</p><p>“From a usability perspective, it’s clearly better if employees can have a native browsing experience that people are used to compared to a remote desktop. That’s sort of a no-brainer,” Lister Parsons said. “But typically, it’s been hard to deliver that while keeping security in place, costs low, and setup complexity down.”</p><p>When Lister Parsons encountered Cloudflare Browser Isolation, he was impressed with the service’s performance and lightweight user experience. Because PensionBee employees accessed the vast majority of their apps (including Salesforce) via a browser, RBI was a strong fit. Cloudflare’s controls over copy/paste and file downloads reduced the risk of customer pension details in Salesforce reaching local devices.</p><p>"We started using Cloudflare Zero Trust with Browser Isolation to help provide the best security for our customers' data and protect employees from malware,” he said. “It worked so well I forgot it was on."</p><p>PensionBee is just one of many organizations developing a roadmap for this transition from VDI. In the next section, we provide Cloudflare’s recommendations for planning and executing that journey.</p>
    <div>
      <h2>Practical recommendations</h2>
      <a href="#practical-recommendations">
        
      </a>
    </div>
    
    <div>
      <h4>Pre-implementation planning</h4>
      <a href="#pre-implementation-planning">
        
      </a>
    </div>
    <p>Understanding <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">where to start this transition</a> some forethought. Specifically, cross-functional teams – across groups like IT, security, and infrastructure &amp; operations (IO) – should develop a collective understanding of how VDI is used today, what use cases should be offloaded first, and what impact any changes will have across both end users and administrators.</p><p>In our own consultations, we start by asking about the needs and expectations of <b>end users</b> because their consistent adoption will dictate an initiative’s success. Based on that foundation, we then typically help organizations map out and prioritize the <b>applications</b> and <b>data</b> they need to secure. Last but not least, we strategize around the <i>‘how:’</i> what <b>administrators</b> and expertise will be needed not only for the initial configuration of new services, but also for the ongoing improvement. Below are select questions we ask customers to consider across those key dimensions to help them navigate their VDI transition.</p>
    <div>
      <h4>Questions to consider</h4>
      <a href="#questions-to-consider">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ybRTthEVyt55zvUuPhVIv/eda4df3b0dc2ea410751919a2bb555ba/Screen-Shot-2022-06-23-at-4.22.38-PM.png" />
            
            </figure>
    <div>
      <h2>Migration from VDI to RBI</h2>
      <a href="#migration-from-vdi-to-rbi">
        
      </a>
    </div>
    <p>Organizations can leverage Cloudflare Browser Isolation and other Zero Trust services to begin offloading VDI use cases and realize cost savings and productivity gains within days of rollout. Our recommended three-phase approach focuses on securing the most critical services with the least disruption to user experience, while also prioritizing quick time-to-value.</p>
    <div>
      <h4>Phase 1: Configure clientless web isolation for web-based applications</h4>
      <a href="#phase-1-configure-clientless-web-isolation-for-web-based-applications">
        
      </a>
    </div>
    <p>Using our <a href="/clientless-web-isolation-general-availability/">clientless web isolation approach</a>, administrators can send users to their private web application served in an isolated browser environment with just a hyperlink – without any software needed on endpoints. Then, administrators can build data protection rules preventing risky user actions within these isolated browser-based apps. Plus, because administrators avoid rolling out endpoint clients, scaling access to employees, contractors, or <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">third parties</a> even on unmanaged devices is as easy as sending a link.</p><p>These isolated links can exist in parallel with your existing VDI, enabling a graceful migration to this new approach longer term. Comparing the different experiences side by side can help your internal stakeholders evangelize the RBI-based approach over time. Cross-functional communication is critical throughout this phased rollout: for example, in prioritizing what web apps to isolate before configuration, and after configuration, articulating how those changes will affect end users.</p>
    <div>
      <h4>Phase 2: Shift SSH- and VNC-based apps from VDI to Cloudflare</h4>
      <a href="#phase-2-shift-ssh-and-vnc-based-apps-from-vdi-to-cloudflare">
        
      </a>
    </div>
    <p>Clientless isolation is a great fit to secure web apps. This next phase helps secure non-web apps within VDI environments, which are commonly accessed via an SSH or VNC connection. For example, privileged administrators often use <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH</a> to control remote desktops and fulfill service requests. Other less technical employees may need the VNC’s graphical user interface to work in legacy apps inaccessible via a modern operating system.</p><p>Cloudflare enables access to these SSH and VNC environments through a browser – again without requiring any software installed on endpoints. Both the <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/ssh/">SSH</a> and <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/vnc-client-in-browser/">VNC setups</a> are similar in that administrators create a secure outbound-only connection between a machine and Cloudflare’s network before a terminal is rendered in a browser. By sending traffic to our network, Cloudflare can authenticate access to apps based on identity check and other granular policies and can provide detailed audits of each user session. (You can read more about the <a href="/browser-ssh-terminal-with-auditing/">SSH</a> and <a href="/browser-vnc-with-zero-trust-rules/">VNC</a> experience in prior blog posts.)</p><p>We recommend first securing SSH apps to support privileged administrators, who can provide valuable feedback. Then, move to support the broader range of users who rely on VNC. Administrators will set up connections and policies using <a href="https://www.cloudflare.com/products/zero-trust/access/">our ZTNA service</a> from the same management panel used for RBI. Altogether, this browser-based experience should reduce latency and have users feeling more at home and productive than in their virtualized desktops.</p>
    <div>
      <h4>Phase 3: Progress towards Zero Trust security posture</h4>
      <a href="#phase-3-progress-towards-zero-trust-security-posture">
        
      </a>
    </div>
    <p><b>Step 3A: Set up identity verification policies per application</b>With phases 1 and 2, you have been using Cloudflare to progressively secure access to web and non-app apps for select VDI use cases**.** In phase 3, build on that foundation by adopting <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">ZTNA</a> for all your applications, not just ones accessed through VDI.</p><p>Administrators use the same Cloudflare policy builder to add more granular conditional access rules in line with <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> security best practices, including checking for an identity provider (IdP). Cloudflare integrates with multiple IdPs simultaneously and can federate multiple instances of the same IdP, enabling flexibility to support any variety of users. After setting up IdP verification, we see administrators often enhance security by requiring MFA. These types of identity checks can also be set up within VDI environments, which can build confidence in adopting Zero Trust before deprecating VDI entirely.</p><p><b>Step 3B: Rebuild confidence in user devices by layering in device posture checks</b>So far, the practical steps we’ve recommended do not require any Cloudflare software on endpoints – which optimizes for deployment speed in offloading VDI use cases. But longer term, there are security, visibility, and productivity benefits to deploying Cloudflare’s device client where it makes sense.</p><p>Cloudflare’s device client (aka <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/require-warp/">WARP</a>) works across all major operating systems and is optimized for flexible deployment. For managed devices, use any script-based method with popular <a href="https://www.cloudflare.com/partners/mdm/">mobile device management (MDM) software</a>, and self-enrollment is a useful option for third-party users. With WARP deployed, administrators can enhance application access policies by first checking for the presence of specific programs or files, disk encryption status, the right OS version, and other <a href="/6-new-ways-to-validate-device-posture/">additional attributes</a>. Plus, if your organization uses <a href="https://www.cloudflare.com/endpoint-partners/">endpoint protection (EPP) providers</a> like <a href="https://www.cloudflare.com/partners/technology-partners/crowdstrike/endpoint-partners/">Crowdstrike</a>, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/sentinel-one">SentinelOne</a>, and more, verify access by first checking for the presence of that software or examining device health.</p><p>Altogether, adding device posture signals both levels up security and enables more granular visibility for both managed and BYOD devices. As with identity verification, administrators can start by enabling device posture checks for users still using virtual desktops. Over time, as administrators build more confidence in user devices, they should begin routing users on managed devices to apps directly, as opposed to through the slower VDI experience.</p><p><b>Step 3C: Progressively shift security services away from virtualized environments to Zero Trust</b>Rethinking application access use cases in prior phases has reduced reliance on complex VDI. By now, Administrators should already be building comfort with Zero Trust policies, as enabled by Cloudflare. Our final recommendation in this article is to continue that journey away from virtualization and towards <a href="https://www.cloudflare.com/products/zero-trust/zero-trust-network-access/">Zero Trust Network Access</a>.</p><p>Instead of sending any users into virtualized apps in virtualized desktops, organizations can reduce their overhead entirely and embrace cloud-delivered ZTNA to protect one-to-one connections between all users and all apps in any cloud environment. The more apps secured with Cloudflare vs. VDI, the greater consistency of controls, visibility, and end user experience.</p><p>Virtualization has provided a powerful technology to bridge the gap between our hardware-centric legacy investments and IT’s cloud-first future. At this point, however, reliance on virtualization puts undue pressure on your administrators and risks diminishing end user productivity. As apps, users, and data accelerate their migration to the cloud, it only makes sense to shift security controls there too with cloud-native, not virtualized services.</p><p>As longer term steps, organizations can explore taking advantage of Cloudflare’s other natively-integrated services, such as our <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Secure Web Gateway (SWG)</a>, <a href="https://www.cloudflare.com/products/zero-trust/casb/">Cloud Access Security Broker (CASB)</a>, and <a href="https://www.cloudflare.com/products/zero-trust/email-security/">email security</a>. Other blogs this week outline how to transition to these Cloudflare services from other legacy technologies.</p>
    <div>
      <h3><b>Summary table</b></h3>
      <a href="#summary-table">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4KNcEBR0awcS9DGR9hSAvp/385ab8b7aa18b7ba8a59669a5f741243/Screen-Shot-2022-06-23-at-4.29.15-PM.png" />
            
            </figure>
    <div>
      <h3>Best practices and progress metrics</h3>
      <a href="#best-practices-and-progress-metrics">
        
      </a>
    </div>
    <p>Below are sample best practices we recommend achieving as smooth a transition as possible, followed by sample metrics to track progress on your initiative:</p><ul><li><p><b>Be attuned to end user experiences:</b> Whatever replaces VDI needs to perform better than what came before. When trying to change user habits and drive adoption, administrators must closely track what users like and dislike about the new services.</p></li><li><p><b>Prioritize cross-functional collaboration:</b> Sunsetting VDI will inevitably involve coordination across diverse teams across IT, security, infrastructure, and virtual desktop administrators. It is critical to establish shared ways of working and trust to overcome any road bumps.</p></li><li><p><b>Roll out incrementally and learn:</b> Test out each step with a subset of users and apps before rolling out more widely to figure out what works (and does not). Start by testing out clientless web isolation for select apps to gain buy-in from users and executives.</p></li></ul>
    <div>
      <h3><b>Sample progress metrics</b></h3>
      <a href="#sample-progress-metrics">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5mXifJi41c4K5EG7DVkYRi/2001754978bbb13adbd2eebaad512c8e/Screen-Shot-2022-06-23-at-4.24.39-PM.png" />
            
            </figure>
    <div>
      <h2>Explore your VDI transition</h2>
      <a href="#explore-your-vdi-transition">
        
      </a>
    </div>
    <p>Cloudflare Zero Trust makes it easy to begin sunsetting your VDI, beginning with leveraging our clientless browser isolation to secure web apps.</p><p>To learn more about how to move towards Zero Trust and away from virtualized desktops, request a <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">Zero Trust consultation</a> today.Replacing your VDI is a great project to fit into your overall <a href="https://zerotrustroadmap.org/">Zero Trust roadmap</a>. For a full summary of Cloudflare One Week and what’s new, tune in to our <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3824611/the-evolution-of-cloudflare-one?partnerref=blog">recap webinar</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[VDI]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Deep Dive]]></category>
            <guid isPermaLink="false">74yr4pY539cPXER9Vje7RB</guid>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Connect to private network services with Browser Isolation]]></title>
            <link>https://blog.cloudflare.com/browser-isolation-private-network/</link>
            <pubDate>Fri, 24 Jun 2022 13:15:05 GMT</pubDate>
            <description><![CDATA[ Browser Isolation with private network connectivity enables your users to securely access private web services without installing any software or agents on an endpoint device or absorbing the management and cost overhead of serving virtual desktops ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Ue8yFX0j4bZgnXuJRdRrD/c0d4e4e4b17391afcbe08e73f43fd58d/image3-29.png" />
            
            </figure><p>If you’re working in an IT organization that has relied on virtual desktops but looking to get rid of them, we have some good news: starting today, you can connect your users to your private network via isolated remote browsers. This means you can deliver sensitive internal web applications — reducing costs without sacrificing security.</p><p><a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Browser Isolation</a> with private network connectivity enables your users to securely access private web services without installing any software or agents on an endpoint device or absorbing the management and cost overhead of serving virtual desktops. What’s even better: Browser Isolation is natively integrated into Cloudflare’s Zero Trust platform, making it easy to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">control and monitor</a> who can access what private services from a remote browser without sacrificing performance or security.</p>
    <div>
      <h2>Deprecating virtual desktops for web apps</h2>
      <a href="#deprecating-virtual-desktops-for-web-apps">
        
      </a>
    </div>
    <p>The presence of virtual desktops in the workplace tells an interesting story about the evolution of deploying and securing enterprise applications. Serving a full virtual desktop to end-users is an expensive decision, each user requiring a dedicated virtual machine with multiple CPU cores and gigabytes of memory to run a full operating system. This cost was offset by the benefits of streamlining desktop app distribution and the security benefits of isolating unmanaged devices from the aging application.</p><p>Then the launch of Chromium/V8 surprised everyone by demonstrating that desktop-grade applications could be built entirely in web-based technologies.  Today, a vast majority of applications — either SaaS or private — exist within a web browser. With most Virtual Desktop Infrastructure (VDI) users connecting to a remote desktop just to open a web browser, VDI’s utility for distributing applications is really no longer needed and has become a tremendously expensive way to securely host a web browser.</p><p>Browser Isolation with private network connectivity enables businesses to maintain the security benefits of VDI, without the costs of hosting and operating legacy virtual desktops.</p>
    <div>
      <h3>Transparent end-user experience</h3>
      <a href="#transparent-end-user-experience">
        
      </a>
    </div>
    <p>But it doesn’t just have a better ROI. Browser Isolation also offers a better experience for your end-users, too. Serving web applications via virtual desktops is a clunky experience. Users first need to connect to their virtual desktop (either through a desktop application or web portal), open an embedded web browser. This model requires users to context-switch between local and remote web applications which adds friction, impacting user productivity.</p><p>With Browser Isolation users simply navigate to the isolated private application in their preferred web browser and use the service as if they were directly browsing the remote web browser.</p>
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>Browser Isolation with private network connectivity works by unifying our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Zero Trust</a> products: Cloudflare Access and Cloudflare Tunnels.</p><p>Cloudflare Access authorizes your users via your <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/">preferred Identity Provider</a> and connects them to a remote browser without installing any software on their device. Cloudflare Tunnels securely connects your private network to remote browsers hosted on Cloudflare’s network without opening any inbound ports on your firewall.</p>
    <div>
      <h3>Monitor third-party users on private networks</h3>
      <a href="#monitor-third-party-users-on-private-networks">
        
      </a>
    </div>
    <p>Ever needed to give a <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">contractor or vendor access</a> to your network to remotely manage a web UI? Simply add the user to your Clientless Web Isolation policy, and they can connect to your internal service without installing any client software on their device. All requests to private IPs are filtered, inspected, and logged through Cloudflare Gateway.</p>
    <div>
      <h3>Apply data protection controls</h3>
      <a href="#apply-data-protection-controls">
        
      </a>
    </div>
    <p>All traffic from remote browsers into your network is inspected and filtered. Data protection controls such as disabling clipboard, printing and file upload/downloads can be granularly applied to high-risk user groups and sensitive applications.</p>
    <div>
      <h2>Get started</h2>
      <a href="#get-started">
        
      </a>
    </div>
    
    <div>
      <h3>Connect your network to Cloudflare Zero Trust</h3>
      <a href="#connect-your-network-to-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>It’s <a href="/ridiculously-easy-to-use-tunnels/">ridiculously easy to connect any network</a> with outbound Internet access.</p><p>Engineers needing a web environment to debug and test services inside a private network just need to run a single command to connect their network to Browser Isolation using Cloudflare Tunnels.</p>
    <div>
      <h3>Enable Clientless Web Isolation</h3>
      <a href="#enable-clientless-web-isolation">
        
      </a>
    </div>
    <p>Clientless Web Isolation allows users to connect to a remote browser without installing any software on the endpoint device. That means company-wide deployment is seamless and transparent to end users. Follow <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/clientless-browser-isolation/">these steps</a> to enable Clientless Web Isolation and define what users are allowed to connect to a remote browser.</p>
    <div>
      <h3>Browse private IP resources</h3>
      <a href="#browse-private-ip-resources">
        
      </a>
    </div>
    <p>Now that you have your network connected to Cloudflare, and your users connected to remote browsers it’s easy for a user to connect to any RFC 1918 address in a remote browser. Simply navigate to your isolation endpoint, and you’ll be connected to your private network.</p><p>For example, if you want a user to manage a router hosted at <code>http://192.0.2.1</code>, prefix this URL with your isolation endpoint such as</p><p><code>https://&lt;authdomain&gt;.cloudflareaccess.com/browser/http://192.0.2.1</code></p><p>That’s it! Users are automatically served a remote browser in a nearby Cloudflare data center.</p><div></div>
<small>Remote browser connected to a private web service with data loss prevention policies enabled</small>

    <div>
      <h3>Define policies</h3>
      <a href="#define-policies">
        
      </a>
    </div>
    <p>At this point, your users can connect to any private resource inside your network. You may want to further control what endpoints your users can reach. To do this, navigate to Gateway → Policies → HTTP and allow / block or apply data protection controls for any private resource based on identity or destination IP address. See our <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/">developer documentation</a> for more information.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KyAXA4PIstf7lIuWtNxxE/3aba916caaf5159f3f8cbd7ed7f9c105/hVXFsRY7krJgCNMz5cc121Z1WQyGp-ywBSjvaS5xbAij8f3RepQxicMViym0BUJ2XMJcF6Feb_vgzZazp-Bw60f3uxzVsU37wahuc3Ory6rvtVPlm8VVF3MU_8ll.png" />
            
            </figure><p>Additionally, isolation policies can be defined to control <i>how</i> users can interact with the remote browser to disable the clipboard, printing or file upload / downloads. See our <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/#isolate-policies">developer documentation</a> for more information.</p>
    <div>
      <h3>Logging and visibility</h3>
      <a href="#logging-and-visibility">
        
      </a>
    </div>
    <p>Finally, all remote browser traffic is logged by the <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a>. Navigate to Logs → Gateway → HTTP and filter by identity or destination IP address.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4v6DQw6XLbPuYBGTGcrYYN/f91b588881a8a9177eb0102fb3becefb/image1-46.png" />
            
            </figure>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re excited to learn how people use Browser Isolation to enable remote access to private networks and protect sensitive apps. Like always, we’re just getting started so stay tuned for improvements on configuring remote browsers and deeper connectivity with Access applications. Click <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">here to get started</a> with Browser Isolation.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Private Network]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[VDI]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">2aw4CGc70Xd1iZqEKdPLEv</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[CVE-2022-1096: How Cloudflare Zero Trust provides protection from zero day browser vulnerabilities]]></title>
            <link>https://blog.cloudflare.com/cve-2022-1096-zero-trust-protection-from-zero-day-browser-vulnerabilities/</link>
            <pubDate>Tue, 29 Mar 2022 15:51:37 GMT</pubDate>
            <description><![CDATA[ CVE-2022-1096 is yet another zero day vulnerability affecting web browsers. Cloudflare zero trust mitigates the risk of zero day attacks in the browser and has been patched ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On Friday, March 25, 2022, Google published an <a href="https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_25.html">emergency security update</a> for all Chromium-based web browsers to patch a high severity vulnerability (CVE-2022-1096). At the time of writing, the specifics of the vulnerability are restricted until the majority of users have patched their local browsers.</p><p>It is important everyone takes a moment to update their local web browser. It’s one quick and easy action everyone can contribute to the <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a> posture of their team.</p><p>Even if everyone updated their browser straight away, this remains a reactive measure to a threat that existed before the update was available. Let’s explore how Cloudflare takes a proactive approach by mitigating the impact of zero day browser threats with our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> services. Cloudflare’s remote browser isolation service is built from the ground up to protect against zero day threats, and all remote browsers on our global network have already been patched.</p>
    <div>
      <h3>How Cloudflare Zero Trust protects against browser zero day threats</h3>
      <a href="#how-cloudflare-zero-trust-protects-against-browser-zero-day-threats">
        
      </a>
    </div>
    <p>Cloudflare Zero Trust applies a layered defense strategy to protect users from zero day threats while browsing the Internet:</p><ol><li><p>Cloudflare’s roaming client steers Internet traffic over an encrypted tunnel to a nearby Cloudflare data center for inspection and filtration.</p></li><li><p>Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway</a> inspects and filters traffic based on our network intelligence, antivirus scanning and threat feeds. Requests to known malicious services are blocked and high risk or unknown traffic is automatically served by a remote browser.</p></li><li><p>Cloudflare’s browser isolation service executes all website code in a remote browser to protect unpatched devices from threats inside the unknown website.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Azer5s8j5dpIU1WFGdxY4/d4e56aa9f99e2d0e2d55bdcd7f14d6ed/image1-109.png" />
            
            </figure>
    <div>
      <h3>Protection from the unknown</h3>
      <a href="#protection-from-the-unknown">
        
      </a>
    </div>
    <p>Zero day threats are often exploited and exist undetected in the real world and actively target users through <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">risky links in emails</a> or other external communication points such as customer support tickets. This risk cannot be eliminated, but it can be reduced by using remote browser isolation to minimize the attack surface. Cloudflare’s browser isolation service is built from the ground up to protect against zero day threats:</p><ul><li><p>Prevent compromised web pages from affecting the endpoint device by executing all web code in a remote browser that is physically isolated from the endpoint device. The endpoint device only receives a thin HTML5 remoting shell from our network and <a href="/cloudflare-and-remote-browser-isolation/">vector draw commands</a> from the remote browser.</p></li><li><p>Mitigate the impact of compromise by automatically destroying and reconstructing remote browsers back to a known clean state at the end of their browser session.</p></li><li><p>Protect adjacent remote browsers by encrypting all remote browser egress traffic, segmenting remote browsers with virtualization technologies and distributing browsers across physical hardware in our global network.</p></li><li><p>Aiding Security Incident Response (SIRT) teams by logging all remote egress traffic in the integrated secure web gateway logs.</p></li></ul>
    <div>
      <h3>Patching remote browsers around the world</h3>
      <a href="#patching-remote-browsers-around-the-world">
        
      </a>
    </div>
    <p>Even with all these security controls in place, patching browsers remains critical to eliminate the risk of compromise. The process of patching local and remote browsers tells two different stories that can be the difference between compromise, and avoiding a zero day vulnerability.</p><p>Patching your workforces local browsers requires politely asking users to interrupt their work to update their browser, or apply mobile device management techniques to disrupt their work by forcing an update. Neither of these options create happy users, or deliver rapid mitigation.</p><p>Patching remote browsers is a fundamentally different process. Since the remote browser itself is running on our network, Users and Administrators do not need to intervene as security patches are automatically deployed to remote browsers on Cloudflare’s network. Then without a user restarting their local browser, any traffic to an isolated website is automatically served from a patched remote browser.</p><p>Finally, browser based vulnerabilities such as CVE-2022-1096 are not uncommon. With over 300 in 2021 and over 40 already in 2022 (according to <a href="https://www.cvedetails.com/product/15031/Google-Chrome.html?vendor_id=1224">cvedetails.com</a>) it is critical for administrators to have a plan to rapidly mitigate and patch browsers in their organization.</p>
    <div>
      <h3>Get started with Cloudflare Browser Isolation</h3>
      <a href="#get-started-with-cloudflare-browser-isolation">
        
      </a>
    </div>
    <p>Cloudflare Browser Isolation is available to both self serve and enterprise customers. Whether you’re a small startup or a massive enterprise, our network is ready to serve fast and secure remote browsing for your team, no matter where they are based.</p><p>To get started, <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">visit our website</a> and, if you’re interested in evaluating Browser Isolation, ask our team for a <a href="https://www.cloudflare.com/products/zero-trust/interactive-demo/">demo</a> with our <a href="/clientless-web-isolation-general-availability/">Clientless Web Isolation</a>.</p> ]]></content:encoded>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[CVE]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">PvGPusZFJAtjsz3BzTyM3</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Clientless Web Isolation is now generally available]]></title>
            <link>https://blog.cloudflare.com/clientless-web-isolation-general-availability/</link>
            <pubDate>Thu, 17 Mar 2022 12:59:16 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce that Clientless Web Isolation is generally available ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we’re excited to announce that Clientless Web Isolation is generally available. A new on-ramp for Browser Isolation that natively integrates <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access (ZTNA)</a> with the zero-day, phishing and data-loss protection benefits of <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browsing</a> for users on any device browsing any website, internal app or SaaS application. All without needing to install any software or configure any certificates on the endpoint device.</p><p>Cloudflare’s clientless web isolation simplifies connections to remote browsers through a hyperlink (e.g.: <code><i>https://&lt;your-auth-domain&gt;.cloudflareaccess.com/browser</i></code>). We explored use cases in detail in our <a href="/introducing-clientless-web-isolation-beta/">beta announcement post</a>, but here’s a quick refresher on the use cases that clientless isolated browsing enables:</p>
    <div>
      <h3>Share secure browsing across the entire team on any device</h3>
      <a href="#share-secure-browsing-across-the-entire-team-on-any-device">
        
      </a>
    </div>
    <p>Simply navigating to Clientless Web Isolation will land your user such as an analyst, or researcher in a remote browser, ready to securely conduct their research or investigation without exposing their public IP or device to potentially malicious code on the target website.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sJbqtKReRhveJAvlYVOm4/675f9e44c799baf28d69c2325758e50c/image1-66.png" />
            
            </figure>
    <div>
      <h3>Deep link into isolated browsing</h3>
      <a href="#deep-link-into-isolated-browsing">
        
      </a>
    </div>
    <p>Suspicious hyperlinks and PDF documents from sensitive applications can be opened in a remote browser by rewriting the link with the clientless endpoint. For example:</p><p><code>https://&lt;authdomain&gt;.cloudflareaccess.com/browser/https://www.example.com/suspiciouslink</code></p><p>This is powerful when integrated into a security incident monitoring tool, help desk or any tool where users are clicking unknown or untrusted hyperlinks.</p>
    <div>
      <h3>Integrate Browser Isolation with a third-party secure web gateway</h3>
      <a href="#integrate-browser-isolation-with-a-third-party-secure-web-gateway">
        
      </a>
    </div>
    <p>Browser Isolation can be integrated with a legacy <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway</a> through the use of a redirecting custom block page. Integrating Browser Isolation with your existing secure web gateway enables safe browsing without the support burden of micromanaging block lists.</p><p>See our <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/clientless-browser-isolation">developer documentation</a> for example block pages.</p>
    <div>
      <h3>Securely access sensitive data on BYOD devices endpoints</h3>
      <a href="#securely-access-sensitive-data-on-byod-devices-endpoints">
        
      </a>
    </div>
    <p>In an ideal world, users would always access sensitive data from corporate devices. Unfortunately it’s not possible or feasible: contractors, by definition, rely on non-corporate devices. Employees may not be able to take their device home, it is unavailable due to a disaster or travel to high risk areas without their managed machine.</p><p>Historically IT departments have worked around this by adopting legacy Virtual Desktop Infrastructure (VDI). This made sense a decade ago when most business applications were desktop applications. Today this architecture makes little sense when most business applications live in the browser. VDI is a tremendously expensive method to deliver BYOD support and still requires complex network administration to connect with DNS filtering and Secure Web Gateways.</p><p>All traffic from Browser Isolation to the Internet or an Access protected application is secured and inspected by the Secure Web Gateway out of the box. It only takes a few clicks to <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/require-swg/">require Gateway</a> device posture checks for users connecting over Clientless Web Isolation.</p>
    <div>
      <h3>Get started</h3>
      <a href="#get-started">
        
      </a>
    </div>
    <p>Clientless web isolation is available as a capability for all Cloudflare Zero Trust subscribers who have added Browser Isolation to their plan. If you are interested in learning more about use cases see the <a href="/introducing-clientless-web-isolation-beta/">beta announcement post</a> and our <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/clientless-browser-isolation/">developer documentation</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Clientless Web Isolation]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">267VYT5VXwJYqwLC47qgJe</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Clientless Web Isolation]]></title>
            <link>https://blog.cloudflare.com/introducing-clientless-web-isolation-beta/</link>
            <pubDate>Wed, 08 Dec 2021 13:59:18 GMT</pubDate>
            <description><![CDATA[ Safely browse risky and sensitive websites on any device without installing any software ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we're excited to announce the beta for Cloudflare’s clientless web isolation. A new on-ramp for Browser Isolation that natively integrates <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access (ZTNA)</a> with the zero-day, phishing and data-loss protection benefits of remote browsing for users on any device browsing any website, internal app or SaaS application. All without needing to install any software or configure any certificates on the endpoint device.</p>
    <div>
      <h3>Secure access for managed and unmanaged devices</h3>
      <a href="#secure-access-for-managed-and-unmanaged-devices">
        
      </a>
    </div>
    <p>In early 2021, Cloudflare announced the general availability of Browser Isolation, a fast and secure remote browser that natively integrates with Cloudflare’s Zero Trust platform. This platform — also known as <a href="https://www.cloudflare.com/teams/">Cloudflare for Teams</a> — combines secure Internet access with our Secure Web Gateway solution (<a href="https://www.cloudflare.com/teams/gateway/">Gateway</a>) and secure application access with a ZTNA solution (<a href="https://www.cloudflare.com/teams/access/">Access</a>).</p><p>Typically, admins deploy Browser Isolation by rolling out Cloudflare’s device client on endpoints, so that Cloudflare can serve as a secure DNS and HTTPS Internet proxy. This model protects users and sensitive applications when the administrator manages their team's devices. And for end users, the experience feels frictionless like a local browser: they are hardly aware that they are actually browsing on a secure machine running in a Cloudflare data center near them.</p><p>The end-to-end integration of Browser Isolation with secure Internet access makes it easy for administrators to deploy Browser Isolation across their teams without users being aware they're actually browsing on a secure machine in a nearby Cloudflare data center. However, managing endpoint clients can add configuration overhead for users on unmanaged devices, or contractors on devices managed by third-party organizations.</p><p>Cloudflare’s clientless web isolation streamlines connections to remote browsers through a hyperlink (e.g.: <code><i>https://&lt;your-auth-domain&gt;.cloudflareaccess.com/browser</i></code>). Once users are authenticated through any of Cloudflare Access's supported <a href="https://developers.cloudflare.com/cloudflare-one/identity">identity providers</a>, the user's browser uses HTML5 to establish a low-latency connection to a remote browser hosted in a nearby Cloudflare data center without installing any software. There are no servers to manage and scale, or regions to configure.</p>
    <div>
      <h3>Safely browse high risk links</h3>
      <a href="#safely-browse-high-risk-links">
        
      </a>
    </div>
    <p>The simple act of clicking a link in an email, or website causes your browser to download and execute payloads of active web content which can exploit unknown zero-day threats and compromise an endpoint.</p><p>Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">clientless web isolation</a> can be initiated through a prefixed URL (e.g., <code><i>https://&lt;your-auth-domain&gt;.cloudflareaccess.com/browser/https://www.example.com</i></code>). Simply configuring your custom block page, email gateway, or ticketing tool to prefix high-risk links with Browser Isolation will automatically send high risk clicks to a remote browser, protecting the endpoint from any malicious code that may be present on the target link.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EB4k1iu2GaTd1KG67rBS8/48620be5cda9df5cdaa4726391825b84/image2-21.png" />
            
            </figure><p>Here at Cloudflare, we use Cloudflare's products to protect Cloudflare, and in fact, use this clientless web isolation approach for our own security investigation activities. By prefixing high risk links with our auth domain, our security team is able to safely investigate potentially malicious websites and phishing sites.</p><p>No risky code ever reaches an employee device, and at the end of their investigation, the remote browser is terminated and reset to a known clean state for their next investigation.</p>
    <div>
      <h3>Integrated Zero Trust access and remote browsing</h3>
      <a href="#integrated-zero-trust-access-and-remote-browsing">
        
      </a>
    </div>
    <p>The time when corporate data was only accessed from managed devices, inside controlled networks has long since passed. Enterprises relying on strict device posture controls to verify that application access only occurs from managed devices have had few tools to support contractor or BYOD workforces. Historically, administrators have worked around the issue by deploying costly, resource intensive Virtual Desktop Infrastructure (VDI) environments.</p><p>Moreover, when it comes to securing application access, Cloudflare Access excels in applying least-privilege, default-deny policies to web-based applications, without needing to install any client software on user devices.</p><p>Cloudflare’s clientless web isolation augments ZTNA use cases, allowing applications protected by <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/require-swg#build-a-gateway-rule-in-access">Access and Gateway</a> to leverage Browser Isolation's <a href="https://docs.google.com/document/d/1YzcoC5WVxCYtVSriZW0ETeTzX9HEVxjKXdAEGeND3l8/edit#">data protection controls</a> such as local printing control, clipboard and file upload / download restrictions to prevent sensitive data from transferring onto unmanaged devices.</p><p>Isolated links can easily be added to the Access <a href="https://developers.cloudflare.com/cloudflare-one/applications/app-launcher">app launcher</a> as <a href="https://developers.cloudflare.com/cloudflare-one/applications/bookmarks">bookmarks</a> allowing your team and contractors to easily access any site with one click.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/375gS2PdEA2EOdu6iWgmub/45da00d54c415f12f3c63a7dbf9896f6/image3-13.png" />
            
            </figure><p>Finally, just because a remote browser reduces the impact of a compromise, doesn’t mean it should have unmanaged access to the Internet. All traffic from the remote browser to the target website is secured, inspected and logged by Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">SWG</a> solution (Gateway) ensuring that known threats are filtered through HTTP policies and <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/antivirus-scanning">anti-virus scanning</a>.</p>
    <div>
      <h3>Join the clientless web isolation beta</h3>
      <a href="#join-the-clientless-web-isolation-beta">
        
      </a>
    </div>
    <p>Clientless web isolation will be available as a capability to Cloudflare for Teams subscribers who have added Browser Isolation to their plan. We’ll be opening Cloudflare’s clientless web isolation for beta access soon. If you’re interested in participating, <a href="https://www.cloudflare.com/zero-trust/lp/clientless-web-isolation-beta/">sign up here</a> to be the first to hear from us.</p><p>We're excited about the secure browsing and application access use cases for our clientless web isolation model. Now, teams of any size, can deliver seamless <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> connectivity to unmanaged devices anywhere in the world.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Clientless Web Isolation]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">0RUyEnhZq4bBGF7HfSkyr</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Control input on suspicious sites with Cloudflare Browser Isolation]]></title>
            <link>https://blog.cloudflare.com/phishing-protection-browser/</link>
            <pubDate>Tue, 07 Dec 2021 13:59:20 GMT</pubDate>
            <description><![CDATA[ Protect your team from phishing attacks by controlling user input on suspicious and sensitive websites with Cloudflare Browser Isolation. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CcsR6mnWLmEnOGUpVHaCw/f59d366202efd422d2d450399c06be56/unnamed--1--3.png" />
            
            </figure><p>Your team can now use Cloudflare’s <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a> service to protect against phishing attacks and credential theft inside the web browser. Users can browse more of the Internet without taking on the risk. Administrators can define <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> policies to prohibit keyboard input and transmitting files during high risk browsing activity.</p><p>Earlier this year, Cloudflare Browser Isolation introduced <a href="/data-protection-browser/">data protection controls</a> that take advantage of the remote browser’s ability to manage all input and outputs between a user and any website. We’re excited to extend that functionality to apply more controls such as prohibiting keyboard input and file uploads to avert phishing attacks and credential theft on high risk and unknown websites.</p>
    <div>
      <h3>Challenges defending against unknown threats</h3>
      <a href="#challenges-defending-against-unknown-threats">
        
      </a>
    </div>
    <p>Administrators protecting their teams from threats on the open Internet typically implement a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway (SWG)</a> to filter Internet traffic based on threat intelligence feeds. This is effective at mitigating known threats. In reality, not all websites fit neatly into malicious or non-malicious categories.</p><p>For example, a parked domain with typo differences to an established web property could be legitimately registered for an unrelated product or become weaponized as a phishing attack. False-positives are tolerated by risk-averse administrators but come at the cost of employee productivity. Finding the balance between these needs is a fine art, and when applied too aggressively it leads to user frustration and the increased support burden of micromanaging exceptions for blocked traffic.</p><p>Legacy secure web gateways are blunt instruments that provide security teams limited options to protect their teams from threats on the Internet. Simply allowing or blocking websites is not enough, and modern security teams need more sophisticated tools to fully protect their teams without compromising on productivity.</p>
    <div>
      <h3>Intelligent filtering with Cloudflare Gateway</h3>
      <a href="#intelligent-filtering-with-cloudflare-gateway">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/teams/gateway/">Cloudflare Gateway</a> provides a secure web gateway to customers wherever their users work. Administrators can build rules that include blocking security risks, scanning for viruses, or restricting browsing based on SSO group identity among other options. User traffic leaves their device and arrives at a Cloudflare data center close to them, providing security and logging without slowing them down.</p><p>Unlike the blunt instruments of the past, Cloudflare Gateway applies security policies based on the unique magnitude of data Cloudflare’s network processes. For example, Cloudflare sees just over one trillion <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS queries</a> every day. We use that data to build a comprehensive model of what “good” DNS queries look like — and which DNS queries are anomalous and could represent DNS tunneling for data exfiltration, for example. We use our network to build more intelligent filtering and reduce false positives. You can review that research as well with <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>.</p><p>However, we know some customers want to allow users to navigate to destinations in a sort of “neutral” zone. Domains that are newly registered, or newly seen by DNS resolvers, can be the home of a great new service for your team or a surprise attack to steal credentials. Cloudflare works to categorize these as soon as possible, but in those initial minutes users have to request exceptions if your team blocks these categories outright.</p>
    <div>
      <h3>Safely browsing the unknown</h3>
      <a href="#safely-browsing-the-unknown">
        
      </a>
    </div>
    <p>Cloudflare Browser Isolation shifts the risk of executing untrusted or malicious website code from the user’s endpoint to a <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser</a> hosted in a low-latency data center. Rather than aggressively blocking unknown websites, and potentially impacting employee productivity, Cloudflare Browser Isolation provides administrators control over <i>how</i> users can interact with risky websites.</p><p>Cloudflare’s network intelligence tracks higher risk Internet properties such as <a href="https://www.cloudflare.com/learning/dns/what-is-cybersquatting/">Typosquatting</a> and New Domains. Websites in these categories could be benign websites, or phishing attacks waiting to be weaponized. Risk-averse administrators can protect their teams without introducing false-positives by isolating these websites and serving the website in a read-only mode by disabling file uploads, downloads and keyboard input.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ngYzQe2toHQLM9JhgH3Fv/6de4df86f7175575d4e8e816459858be/image1-25.png" />
            
            </figure><p>Users are able to safely browse the unknown website without risk of leaking credentials, transmitting files and falling victim to a phishing attack. Should the user have a legitimate reason to interact with an unknown website they are advised to contact their administrator to obtain elevated permissions while browsing the website.</p><p><a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation">See our developer documentation to learn more about remote browser policies.</a></p>
    <div>
      <h3>Getting started</h3>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>Cloudflare Browser Isolation is integrated natively into Cloudflare’s Secure Web Gateway and Zero Trust Network Access services, and unlike legacy remote browser isolation solutions does not require IT teams to piece together multiple disparate solutions or force users to change their preferred web browser.</p><p>The Zero Trust threat and data protection that Browser Isolation provides make it a natural extension for any company trusting a secure web gateway to protect their business. We’re currently including it with our Cloudflare for Teams Enterprise Plan at no additional charge.<sup>1</sup> <a href="https://www.cloudflare.com/teams/browser-isolation/">Get started at our Zero Trust web page</a>.</p><hr /><p><sup>1. </sup>For the first 2,000 seats until 31 Dec 2021</p><p></p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4OfCcuRpi5gNh5GMCjAb2D</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Zero Trust platform built for speed]]></title>
            <link>https://blog.cloudflare.com/the-zero-trust-platform-built-for-speed/</link>
            <pubDate>Thu, 16 Sep 2021 12:59:53 GMT</pubDate>
            <description><![CDATA[ Cloudflare for Teams secures your company’s users, devices, and data — without slowing you down. Your team should not need to sacrifice performance in order to be secure.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PQw9JsyO7Qe4g30wXsS2g/c847b0ee71c05dc22a345c4c7134aa85/image5-11.png" />
            
            </figure><p>Cloudflare for Teams secures your company’s users, devices, and data — without slowing you down. Your team should not need to sacrifice performance in order to be secure. Unlike other vendors in the market, Cloudflare’s products not only avoid back hauling traffic and adding latency — they make your team faster.</p><p>We’ve accomplished this by building Cloudflare for Teams on Cloudflare. All the products in the Zero Trust platform build on the improvements and features we’re highlighting as part of <a href="/tag/speed-week/">Speed Week</a>:</p><ol><li><p>Cloudflare for Teams replaces legacy private networks with Cloudflare’s network, a faster way to connect users to applications.</p></li><li><p>Cloudflare’s Zero Trust decisions are enforced in Cloudflare Workers, the performant serverless platform that runs in every Cloudflare data center.</p></li><li><p>The DNS filtering features in Cloudflare Gateway run on the same technology that powers 1.1.1.1, the world’s fastest recursive DNS resolver.</p></li><li><p>Cloudflare’s Secure Web Gateway accelerates connections to the applications your team uses.</p></li><li><p>The technology that powers Cloudflare Browser Isolation is fundamentally different compared to other approaches and the speed advantages demonstrate that.</p></li></ol><p>We’re excited to share how each of these components work together to deliver a comprehensive Zero Trust platform that makes your team faster. All the tools we talk about below are available today, they’re easy to use (and get started with) — and they’re free for your first 50 users. If you want to sign up now, head over to the <a href="https://dash.teams.cloudflare.com/">Teams Dashboard</a>!</p>
    <div>
      <h2>Shifting From an Old Model to a New, Much Faster One</h2>
      <a href="#shifting-from-an-old-model-to-a-new-much-faster-one">
        
      </a>
    </div>
    
    <div>
      <h3>Legacy access control slowed down teams</h3>
      <a href="#legacy-access-control-slowed-down-teams">
        
      </a>
    </div>
    <p>Most of our customers start their Zero Trust journey by replacing their legacy private network. Private networks, by default, trust users inside those networks. If a user is on the network, they are considered trusted and can reach other services unless explicitly blocked. Security teams hate that model. It creates a broad attack surface for internal and external bad actors. All they need to do is get network access.</p><p><a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust solutions</a> provide a more secure alternative where every request or connection is considered untrusted. Instead, users need to prove they should be able to reach the specific applications or services based on signals like identity, <a href="/6-new-ways-to-validate-device-posture/">device posture</a>, <a href="/two-clicks-to-enable-regional-zero-trust-compliance/">location</a> and even <a href="/require-hard-key-auth-with-cloudflare-access/">multifactor method</a>.</p><p>Cloudflare Access gives your team the ability to apply these rules, while also logging every event, as a full <a href="https://www.cloudflare.com/products/zero-trust/vpn-replacement/">VPN replacement</a>. Now instead of sneaking onto the network, a malicious user would need valid user credentials, a hard-key and company laptop to even get started.</p><p>It also makes your applications much, much faster by avoiding the legacy VPN backhaul requirement.</p><p>Private networks attempt to mirror a physical location. Deployments start inside the walls of an office building, for example. If a user was in the building, they could connect. When they left the building, they needed a Virtual Private Network (VPN) client. The VPN client punched a hole back into the private network and allowed the user to reach the same set of resources. If those resources also sat outside the office, the VPN became a slow backhaul requirement.</p><p>Some businesses address this by creating different VPN instances for their major hubs across the country or globe. However, they still need to ensure a fast and secure connection between major hubs and applications. This is typically done with dedicated <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS connections</a> to improve application performance. MPLS lines are both expensive and take IT resources to maintain.</p><p>When teams replace their VPN with a Zero Trust solution, they can and often do reduce the latency added by backhauling traffic through a VPN appliance. However, we think that “slightly faster” is not good enough. Cloudflare Access delivers your applications and services to end users on Cloudflare’s network while verifying every request to ensure the user is properly authenticated.</p>
    <div>
      <h3>Cloudflare’s Zero Trust approach speeds teams up</h3>
      <a href="#cloudflares-zero-trust-approach-speeds-teams-up">
        
      </a>
    </div>
    <p>Organizations start by connecting their resources to Cloudflare’s network using Cloudflare Tunnel, a service that runs in your environment and creates outbound-only connections to Cloudflare’s edge. That service is powered by our <a href="https://www.cloudflare.com/products/argo-smart-routing-x/">Argo Smart Routing</a> technology, which improves performance of web assets by 30% on average (Argo Smart Routing became even faster <a href="/argo-v2/">earlier this week</a>).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1UqhSj5ghJlKiTSjAP7bZE/f9fb432ed1fbc1e7d1d425632c12da6a/image3-18.png" />
            
            </figure><p>On the other side, users connect to Cloudflare’s network by reaching a data center near them in over <a href="/250-cities-is-just-the-start/">250 cities around the world</a>. 95% of the entire Internet-connected world is now within 50 ms of a Cloudflare presence, and 80% of the entire Internet-connected world is within 20ms (for reference, it takes 300-400 ms for a human to blink).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/45Iv6T2f1n96wesJn587yS/ed06ba249db7c097ca5ec2823931b089/image2-20.png" />
            
            </figure><p>Finally, Cloudflare’s network finds the best route to get your users to your applications — regardless of where they are located, using Cloudflare’s global backbone. Our backbone consists of dedicated fiber optic lines and reserved portions of wavelength that connect Cloudflare data centers together. This is split approximately 55/45 between “metro” capacity, which redundantly connects data centers in which we have a presence, and “long-haul” capacity, which connects Cloudflare data centers in different cities. There are no individual VPN instances or MPLS lines, all a user needs to do is access their desired application and Cloudflare handles the logic to efficiently route their request.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/l26SBOAOnbyZsBR3WeCMK/f3f8ed3103918b4709999b5cd03b28b8/image6-5.png" />
            
            </figure><p>When teams replace their private networks with Cloudflare, they accelerate the performance of the applications their employees need. However, the Zero Trust model also includes new security layers. Those safeguards should not slow you down, either — and on Cloudflare, they won’t.</p>
    <div>
      <h2>Instant Zero Trust decisions built on the Internet’s most performant serverless platform, Workers</h2>
      <a href="#instant-zero-trust-decisions-built-on-the-internets-most-performant-serverless-platform-workers">
        
      </a>
    </div>
    <p>Cloudflare Access checks every request and connection against the rules that your administrators configure on a resource-by-resource basis. If users have not proved they should be able to reach a given resource, we begin evaluating their signals by taking steps like prompting them to authenticate with their identity/Sign-Sign On provider or checking their device for posture. If users meet all the criteria, we allow them to proceed.</p><p>Despite evaluating dozens of signals, we think this step should be near instantaneous to the user. To solve that problem, we built Cloudflare Access’ authentication layer entirely on Cloudflare Workers. Every application’s Access policies are stored and evaluated at every one of Cloudflare’s 250+ data centers. Instead of a user’s traffic having to be backhauled to an office and then to the application, traffic is routed from the closest data center to the user directly to their desired application.</p><p>As Rita Kozlov <a href="/cloudflare-workers-the-fast-serverless-platform/">wrote earlier this week</a>, Cloudflare Workers is the Internet’s fast serverless platform. Workers runs in every data center in Cloudflare’s network — meaning the authentication decision does not add more backhaul or get in the way of the network acceleration discussed above. In comparison to other serverless platforms, Cloudflare Workers is “210% faster than Lambda@Edge and 298% faster than Lambda.”</p><p>By building on Cloudflare Workers, we can authenticate user sessions to a given resource in less than three milliseconds on average. This also makes Access resilient — unlike a VPN that can go down and block user access, even if any Cloudflare data center goes offline, user requests are redirected to a nearby data center.</p>
    <div>
      <h2>Filtering built on the same platform as the world’s fastest public DNS resolver</h2>
      <a href="#filtering-built-on-the-same-platform-as-the-worlds-fastest-public-dns-resolver">
        
      </a>
    </div>
    <p>After securing internal resources, the next phase in a Zero Trust journey for many customers is to secure their users, devices, and data from external threats. <a href="https://www.cloudflare.com/teams/gateway/">Cloudflare Gateway</a> helps organizations start by filtering DNS queries leaving devices and office networks.</p><p>When users navigate to a website or connect to a service, their device begins by making a DNS query to their DNS resolver. Most DNS resolvers respond with the IP of the hostname being requested. If the DNS resolver is aware of what hostnames on the Internet are dangerous, the resolver can instead keep the user safe by blocking the query.</p><p>Historically, organizations deployed DNS filtering solutions using appliances that sat inside their physical office. Similar to the private network challenges, users outside the office had to use a VPN to backhaul their traffic to the appliances in the office that provided DNS filtering and other security solutions.</p><p>That model has shifted to cloud-based solutions. However, those solutions are only as good as the speed of their DNS resolution and distribution of the data centers. Again, this is better for performance — but not yet good enough.</p><p>We wanted to bring DNS filtering closer to each user. When DNS queries are made from a device running Cloudflare Gateway, all requests are initially sent to a nearby Cloudflare data center. These DNS queries are then checked against a comprehensive list of known threats.</p><p>We’re able to do this faster than a traditional DNS filter because Cloudflare operates the world’s fastest public DNS resolver, 1.1.1.1. Cloudflare processes hundreds of billions of DNS queries per day and the users who choose 1.1.1.1 enjoy the fastest DNS resolution on the Internet and <a href="/announcing-1111/">audited privacy guarantees</a>.</p><p>Customers who secure their teams with Cloudflare Gateway benefit from the same improvements and optimizations that have kept 1.1.1.1 the fastest resolver on the Internet. When organizations begin filtering DNS with Cloudflare Gateway, they immediately improve the Internet experience for their employees compared to any other DNS resolver.</p>
    <div>
      <h2>A Secure Web Gateway without performance penalties</h2>
      <a href="#a-secure-web-gateway-without-performance-penalties">
        
      </a>
    </div>
    <p>In the kick-off post for Speed Week, we described how delivering a waitless Internet isn’t just about having ample bandwidth. The speed of light and round trips incurred by DNS, TLS and HTTP protocols can easily manifest into a degraded browsing experience.</p><p>To protect their teams from threats and data loss on the Internet, security teams inspect and filter traffic on a Virtual Private Network (VPN) and <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway (SWG)</a>. On an unfiltered Internet connection, your <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>, TLS and HTTP requests take a short trip from your browser to your local ISP which then sends the request to the target destination. With a filtered Internet connection, this traffic is instead sent from your local ISP to a centralized SWG hosted either on-premise or in a zero trust network — before eventually being dispatched to the end destination.</p><p>This centralization of Internet traffic introduces the <i>tromboning effect</i>, artificially degrading performance by forcing traffic to take longer paths to destinations even when the end destination is closer than the filtering service. This effect can be eliminated by performing filtering on a network that is interconnected directly with your ISP.</p><p>To quantify this point we again leveraged Catchpoint to measure zero trust network round trip time from a range of international cities. Based on public documentation we also measured publicly available endpoints for Cisco Umbrella, ZScaler, McAfee and Menlo Security.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4j5fv0kRKCUAHATvBMwRs1/db7f4610591762e6f3d0b2d98523e2d4/image8-1.png" />
            
            </figure><p>There is a wide variance in results. Cloudflare, on average, responds in 10.63ms, followed by Cisco Umbrella (26.39ms), ZScaler (35.60ms), Menlo Security (37.64ms) and McAfee (59.72ms).</p><p>Cloudflare for Teams is built on the same network that powers the world’s fastest DNS resolver and WARP to deliver consumer-grade privacy and performance. Since our network is highly interconnected and located in over 250 cities around the world our network, we’re able to eliminate the tromboning effect by inspecting and filtering traffic in the same Internet exchange points that your Internet Service Provider uses to connect you to the Internet.</p><p>These tests are simple network latency tests and do not encapsulate latency’s impact end-to-end on DNS, TLS and HTTPS connections or the benefits of our global content delivery network serving cached content for the millions of websites accelerated by our network. Unlike <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">content delivery networks</a> which are publicly measured, zero trust networks are hidden behind enterprise contracts which hinder industry-wide transparency.</p>
    <div>
      <h2>Latency sensitivity and Browser Isolation</h2>
      <a href="#latency-sensitivity-and-browser-isolation">
        
      </a>
    </div>
    <p>The web browser has evolved into workplace’s most ubiquitous application, and with it created one of the most common attack vectors for phishing, malware and data loss. This risk has led many security teams to incorporate a <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> solution into their security stack.</p><p>Users browsing remotely are especially sensitive to latency. Remote web pages will typically load fast due to the remote browser’s low latency, high bandwidth connection to the website, but user interactions such as scrolling, typing and mouse input stutter and buffer leading to significant user frustration. A high latency connection on a local browser is the opposite with latency manifesting as slow page load times.</p><p>Segmenting these results per continent, we can see highly inconsistent latency on centralized zero trust networks and far more consistent results for Cloudflare’s decentralized zero trust network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1CkrzP1Utba0HgjBCfzb5p/89721213543ecd6f1dc609692fb3e827/image4-14.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XlGCHJVV3yUwgGsvUqMpg/999364be20d6986a31301c7f3b113428/image7-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ycqj6yxk3nMLDUv0s4At5/eee5dbdcd78c1523d17979591eb37705/image1-15.png" />
            
            </figure><p>The thin green line shows Cloudflare consistently responding in under 11ms globally, with other vendors delivering unstable and inconsistent results. If you’ve had a bad experience with other Remote Browser Isolation tools in the past, it was likely because it wasn’t built on a network designed to support it.</p>
    <div>
      <h2>Give it a try!</h2>
      <a href="#give-it-a-try">
        
      </a>
    </div>
    <p>We believe that security shouldn’t result in sacrificing performance — and we’ve architected our Zero Trust platform to make it so. We also believe that Zero Trust security shouldn’t just be the domain of the big players with lots of resources — it should be available to everyone as part of our mission to help make the Internet a better place. We’ve made all the tools covered above free for your first 50 users. Get started today in the <a href="https://dash.teams.cloudflare.com/">Teams Dashboard</a>!</p>
    <div>
      <h2>Watch on Cloudflare TV</h2>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div> ]]></content:encoded>
            <category><![CDATA[Speed Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">3EjdgnDIDZv7CiqPnCK0pj</guid>
            <dc:creator>Kenny Johnson</dc:creator>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Data protection controls with Cloudflare Browser Isolation]]></title>
            <link>https://blog.cloudflare.com/data-protection-browser/</link>
            <pubDate>Fri, 20 Aug 2021 13:34:47 GMT</pubDate>
            <description><![CDATA[ Starting today, your team can use Cloudflare’s Browser Isolation service to protect sensitive data inside the web browser. Administrators can define Zero Trust policies to control who can copy, paste, and print data in any web based application. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3pfCjaLKWhg07vPGyAP50X/476b19e51dd2c0c017bc78a3edd3bfc1/image3-21.png" />
            
            </figure><p>Starting today, your team can use Cloudflare’s Browser Isolation service to protect sensitive data inside the web browser. Administrators can define <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust policies</a> to control who can copy, paste, and print data in any web based application.</p><p>In March 2021, for <a href="/welcome-to-security-week-2021/">Security Week</a>, we announced the <a href="/browser-isolation-for-teams-of-all-sizes/">general availability</a> of Cloudflare Browser Isolation as an add-on within the Cloudflare for Teams suite of Zero Trust application access and browsing services. <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Browser Isolation</a> protects users from browser-borne malware and zero-day threats by shifting the risk of executing untrusted website code from their local browser to a secure browser hosted on our edge.</p><p>And currently, we’re democratizing browser isolation for any business by including it with our Teams Enterprise Plan at no additional charge.<sup>1</sup></p>
    <div>
      <h3>A different approach to zero trust browsing</h3>
      <a href="#a-different-approach-to-zero-trust-browsing">
        
      </a>
    </div>
    <p>Web browsers, the same tool that connects users to critical business applications, is one of the most common attack vectors and hardest to control.</p><p>Browsers started as simple tools intended to share academic documents over the Internet and over time have become sophisticated platforms that replaced virtually every desktop application in the workplace. The dominance of web-based applications in the workplace has created a challenge for security teams who race to stay patch zero-day vulnerabilities and protect sensitive data stored in self-hosted and SaaS based applications.</p><p>In an attempt to <a href="https://www.cloudflare.com/application-services/solutions/">protect users and applications from web based attacks</a>, administrators have historically relied on DNS or HTTP inspection to prevent threats from reaching the browser. These tools, while useful for protecting against <i>known threats,</i> are difficult to tune without false-positives (negatively impacting user productivity and increasing IT support burden) and ineffective against zero day vulnerabilities.</p><p>Browser isolation technologies mitigate risk by shifting the risk of executing foreign code from the endpoint to a secure environment. Historically administrators have had to make a compromise between <b>performance</b> and <b>security</b> when adopting such a solution. They could either:</p><ul><li><p><b>Prioritize</b> <b>security</b> by choosing a solution that relies on pixel pushing techniques to serve a visual representation to users. This comes at the cost of performance by introducing latency, graphical artifacts and heavy bandwidth usage.</p></li></ul><p><b><i>OR</i></b></p><ul><li><p><b>Prioritize performance</b> by choosing a solution that relies on code scrubbing techniques to unpack, inspect and repack the webpage. This model is fragile (often failing to repack leading to a broken webpage) and insecure by allowing undetected threats to compromise users.</p></li></ul><p>At Cloudflare, we know that security products do not need to come at the expense of performance. We developed a third option that delivers a remote browsing experience without needing to compromise on performance and security for users.</p><ul><li><p><b>Prioritize security</b> by never sending foreign code to the endpoint and executing it in a secure remote environment.</p></li><li><p><b>Prioritize</b> <b>performance</b> sending light-weight vector instructions (rather than pixels) over the wire and minimize remote latency on our global edge network.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/41ebdDVZfNPcZDrzSErdei/64d92c0dfee8d66ac8ec820710c5aab4/image4-14.png" />
            
            </figure><p>This unique approach delivers an isolated browser without the security or performance challenges faced by legacy solutions.</p>
    <div>
      <h3>Data control through the browser</h3>
      <a href="#data-control-through-the-browser">
        
      </a>
    </div>
    <p>Malware and zero-day threats are not the only security challenges administrators face with web browsers. The mass adoption of SaaS products has made the web browser the primary tool used to access data. Lack of control over both the application and the browser has left administrators little control over their data once it is delivered to an endpoint.</p><p>Data loss prevention tools typically rely on pattern recognition to partially or completely redact the transmission of sensitive data values. This model is useful for protecting against an unexpected breach of PII and <a href="https://www.cloudflare.com/learning/privacy/what-is-pci-dss-compliance/">PCI</a> data, such as locations and financial information but comes at the loss of visibility.</p><p>The redaction model falls short when sensitive data does not fit into easily recognizable patterns, and the end-users require visibility to do their job. In industries such as health care, redacting sensitive data is not feasible as medical professions require visibility of patient notes and appointment data.</p><p>Once data lands in the web browser it is trivial for a user to copy-paste and print sensitive data into another website, application, or physical location. These seemingly innocent actions can lead to data being misplaced by naive users leading to a data breach. Administrators have had limited options to protect data in the browser, some even going so far as to deploy virtual desktop services to <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">control access</a> to a SaaS based customer relationship management (CRM) tool. This increased operating costs, and frustrated users who had to learn how to use computer-in-a-computer just to use a website.</p>
    <div>
      <h3>One-click to isolate data in the browser</h3>
      <a href="#one-click-to-isolate-data-in-the-browser">
        
      </a>
    </div>
    <p>Cloudflare Browser Isolation executes all website code (including HTML) in the remote browser. Since page content remains on the remote browser and draw instructions are only sent to the browser, Cloudflare Browser Isolation is in a powerful position to protect sensitive data on any website or SaaS application.</p><p>Administrators can now control copy-paste, and printing functionality with per-rule granularity with one click in the Cloudflare for Teams Dashboard. For example, now administrators can build rules that prevent users from copying information from your CRM or that stop team members from printing data from your ERP—without blocking their attempts to print from external websites where printing does not present a data loss risk.</p><p>From the user’s perspective websites look and behave normally until the user performs a restricted action.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/117OYpWOP2A2nfrdIyvKy1/78601296763701820f40fe61f69b2c89/image2-5.gif" />
            
            </figure><p>Copy-paste and printing control can be configured for both new and existing HTTP policies in the Teams Dashboard.</p><ol><li><p>Navigate to the Cloudflare for Teams dashboard.</p></li><li><p>Navigate to Gateway → Policies → HTTP.</p></li><li><p>Create/update an HTTP policy with an <b>Isolate</b> action (<a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/#isolate">docs</a>).</p></li><li><p>Configure policy settings.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/hA5ZS9T1CskQuCcYmU0z5/041c95876666a465e1db6570119f26df/image1-34.png" />
            
            </figure><p>Administrators have flexibility with data protection controls and can enable/disable browser behaviours based on application, hostname, user identity and security risk.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re just getting started with zero trust browsing controls. We’re hard at work building controls to protect against phishing attacks, further protect data by controlling file uploading and downloading without needing to craft complex network policies as well as support for a fully clientless browser isolation experience.</p>
    <div>
      <h3>Democratizing browser isolation for any business</h3>
      <a href="#democratizing-browser-isolation-for-any-business">
        
      </a>
    </div>
    <p>Historically, only large enterprises had justified the cost to add on remote browser isolation to their existing security deployments. And the resulting loosely-integrated solution fell short of achieving Zero Trust due to poor end-user experiences. Cloudflare has already solved these challenges, so businesses achieve full Zero Trust security including browser-based data protection controls without performance tradeoffs.</p><p>Yet it’s not always enough to democratize Zero Trust browser isolation for any business, so we’re currently including it with our Teams Enterprise Plan at no additional charge.<sup>1</sup> <a href="https://www.cloudflare.com/teams/browser-isolation/">Get started here</a>.</p><p>.......</p><p><sup>1</sup> For up to 2000 seats until 31 Dec 2021</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Road to Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5TAae1DDChg8vSupwwaUQZ</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Browser Isolation for teams of all sizes]]></title>
            <link>https://blog.cloudflare.com/browser-isolation-for-teams-of-all-sizes/</link>
            <pubDate>Tue, 23 Mar 2021 13:01:00 GMT</pubDate>
            <description><![CDATA[ Protecting endpoints from browser-born zero-day attacks and malware with remote browser isolation is now easy for teams of any size. ]]></description>
            <content:encoded><![CDATA[ <p>Every Internet-connected organization relies on web browsers to operate: accepting transactions, engaging with customers, or working with sensitive data. The very act of clicking a link triggers your web browser to download and execute a large bundle of unknown code on your local device.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14XtPSLyUvlfQFjTYYDoTT/a4273c6a6b94fec1567a0eb420ad57f4/Browser-Isolation-OG-body-3.png" />
            
            </figure><p>IT organizations have always been on the back foot while defending themselves from security threats. It is not a question of ‘if’, but ‘when’ the next zero-day vulnerability will compromise a web browser. How can IT organizations protect their users and data from unknown threats without over-blocking every potential risk? The solution is to shift the burden of executing untrusted code from the user’s device to a remote isolated browser.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Kwv4UgTOIsQ2H80GztC6d/524c2dc3bdf81bec78e1475242fbfd7b/image4-27.png" />
            
            </figure>
    <div>
      <h3>Bringing Remote Browser Isolation to teams of any size</h3>
      <a href="#bringing-remote-browser-isolation-to-teams-of-any-size">
        
      </a>
    </div>
    <p>Today we are excited to announce that Cloudflare Browser Isolation is now available within Cloudflare for Teams suite of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust security</a> and secure web browsing services as an add-on. Teams of any size from startups to large enterprises can benefit from reliable and safe browsing without changing their preferred web browser or setting up complex network topologies.</p>
    <div>
      <h3>Remote Browsers must be reliable</h3>
      <a href="#remote-browsers-must-be-reliable">
        
      </a>
    </div>
    <p>Running sensitive workloads in secure environments is nothing new, and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI) technologies</a> have existed for many years. This begs the question, why are remote browsers not a common technology used by everyone?</p><p>The answer is — historically flawed execution. Everyone relies on web browsers for the majority of their work and any impact to user experience or performance can at best mean productivity losses and at worst outright rejection of the solution.</p><p>Unreliable rendering and poor performance in legacy browser isolation solutions has led IT organizations to reserve the enhanced security posture only for highly targeted users or activities. Much like trusting networks through the castle-and-moat model, assuming some users or websites are not phishing or malware vectors leaves an open door to attack.</p><p>Cloudflare Browser Isolation is built on top of Chromium (the same engine that powers other popular web browsers such as Google Chrome, Microsoft Edge and Brave Browser). This, combined with our novel <a href="/cloudflare-and-remote-browser-isolation/">Network Vector Rendering</a> technique, ensures that web pages are safely and consistently rendered even as web technologies evolve and become more complex.</p>
    <div>
      <h3>Remote Browsers Must Be Fast</h3>
      <a href="#remote-browsers-must-be-fast">
        
      </a>
    </div>
    <p>Legacy browser isolation solutions are hamstrung by their fundamental technology or the network they operate on. These old solutions rely on high-latency and bandwidth-heavy pixel pushing, or fragile content-disarm and reconstruction techniques that degrade performance, break websites, and might miss a malicious payload in the process.</p><p>Network Vector Rendering allows us to deliver a safe view of a remote webpage without high bandwidth usage or degraded image quality, but it is one part of the solution. By leveraging our global network we position remote browsers close to everyone connected to the Internet. This allows us to deliver a responsive, low latency stream of the webpage regardless of where you are physically located.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14hVfWbzFCUuQBFVWj4obN/800fc77266678170d7746dfe8f17d75f/image1-35.png" />
            
            </figure><p>Running a web browser on powerful servers connected to the backbone of the Internet introduces a powerful performance benefit. By sending minimal draw commands over the last mile wire, users with low bandwidth Internet connections enjoy a faster more responsive Internet.</p><p>Combine a massive, smart, distributed network with our patented super fast, lightweight Network Vector Rendering technology, and the result is remote browsing technology liberated from legacy constraints — providing crisp isolated pages to any user, on any device, anywhere in the world.</p><p>One of the advantages of using Browser Isolation is it reduces the local web browser’s burden downloading modern web pages. According to the FCC nearly 30 million Americans do not have access to broadband Internet (<a href="https://www.fcc.gov/about-fcc/fcc-initiatives/bridging-digital-divide-all-americans">source</a>). Modern websites are not optimised for low bandwidth connections typically requiring the download of hundreds of objects. Cloudflare’s remote browsers are connected to the backbone of the Internet and able to consistently download websites at broadband speeds, leveling the field for users on low-bandwidth Internet connections.</p><p>Here’s an example of a web page loading on a slow Internet connection compared with and without Browser Isolation. We are excited to see Browser Isolation bridging the digital divide and making the Internet faster for under-served Internet users.</p><div></div>
<p><i>Note: Timing is measured from the start of web page download until the webpage has triggered it’s on-load signal.</i></p>
    <div>
      <h3>Remote Browsers Must Be Easy to Use</h3>
      <a href="#remote-browsers-must-be-easy-to-use">
        
      </a>
    </div>
    <p>Browser Isolation products are typically <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implemented</a> either as add-on network appliances (such as a virtual machine or firewall box) or by changing the user’s preferred browser. As an add-on network appliance, IT teams need to piece together multiple disparate solutions (even when offered by the same vendor). This leads to unnecessary complexity within the network and disparate interfaces for controlling policy configurations and monitoring threats.</p><p>Cloudflare Browser Isolation integrates natively into Cloudflare for Teams, delivering a consolidated view of all network and isolated traffic. Just like how you can use Gateway to allow / block traffic based on content categories, or security threats you can also define Isolation policies to dynamically isolate websites based on identity, security threats or content.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/40YG6LOKdW7W9xsVZoTr5o/ff92964ea1f5e15f88fb6487cc1afc95/image2-29.png" />
            
            </figure>
    <div>
      <h3>The Future of Internet Browsing is Remote Browsing</h3>
      <a href="#the-future-of-internet-browsing-is-remote-browsing">
        
      </a>
    </div>
    <p>Local webpage execution poses a huge threat to businesses and organizations around the world. The solution is simple: shift the burden of executing untrusted code from the user’s device to a remote isolated browser.</p><p>Secure, fast, simple Remote Browser Isolation is now possible. Today we’re excited to announce that Cloudflare Browser Isolation is available as an add-on for Cloudflare for Teams. You can now protect your business from browser-based security threats without changing your web browsers or networks. To get started, <a href="https://www.cloudflare.com/teams/browser-isolation/">sign up for a Cloudflare for Teams account</a>, and add on Browser Isolation to the Teams Gateway or Teams standard plans. Contract customers can have Browser Isolation added to their Cloudflare for Teams plan by <a href="http://cloudflare.com/teams/plans/enterprise">requesting access at this form</a>.</p><p>From the day Cloudflare started, our mission has been to help build a better Internet and democratise the technologies that were only previously accessible to the large companies with sophisticated networks, dedicated IT teams and the budgets to support them.</p><p>Like a not-too-distant past when HTTPS encryption was reserved for “sensitive” login pages and <a href="https://www.cloudflare.com/ecommerce/">eCommerce</a> checkouts, we believe that trusting arbitrary website code will seem just as archaic creating the new paradigm of Zero Trust web browsing. The time for reliable and responsive Remote Browser Isolation technology is NOW.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <guid isPermaLink="false">49yiFglS3Ah2UXGFbVOV23</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare Browser Isolation beta]]></title>
            <link>https://blog.cloudflare.com/browser-beta/</link>
            <pubDate>Thu, 15 Oct 2020 15:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to open up a beta of a third approach to keeping web browsing safe with Cloudflare Browser Isolation. ]]></description>
            <content:encoded><![CDATA[ <p></p>
    <div>
      <h3>Reimagining the Browser</h3>
      <a href="#reimagining-the-browser">
        
      </a>
    </div>
    <p>A web browser, the same application that connects users to the entire Internet, also connects you to all of the potentially harmful parts of the Internet. It’s an open door to nearly every connected system on the planet, which is powerful and terrifying.</p><p>We also rely on browsers more than ever. Most applications that we use live in a browser and that will continue to increase. For more and more organizations, a corporate laptop is just a managed web browser machine.</p><p>To keep those devices safe, and the data they hold or access, enterprises have started to deploy “<a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a>” services where the browser itself doesn’t run on the machine. Instead, the browser runs on a virtual machine in a cloud provider somewhere. By running away from the device, threats from the browser stay on that virtual machine somewhere in the cloud.</p><p>However, most isolation solutions take one of two approaches that both ruin the convenience and flexibility of a web browser:</p><ul><li><p>Record the isolated browser and send a live stream of it to the user, which is slow and makes it difficult to do basic things like input text to a form.</p></li><li><p>Unpack the webpage, inspect it, repack it and send it to the user - sometimes missing threats or more often failing to repack the webpage in a way that it still works.</p></li></ul><p>Today, we’re excited to open up a beta of a third approach to keeping web browsing safe with Cloudflare Browser Isolation. Browser sessions run in sandboxed environments in Cloudflare data centers in 200 cities around the world, bringing the remote browser milliseconds away from the user so it feels like local web browsing.</p><p>Instead of streaming pixels to the user, Cloudflare Browser Isolation sends the final output of a browser’s web page rendering. The approach means that the only thing ever sent to the device is a package of draw commands to render the webpage, which also makes Cloudflare Browser Isolation compatible with any HTML5 compliant browser.</p><p>The result is a browser that just feels like a browser, while keeping threats far away from the device.</p><div></div>
<p></p><p>We’re inviting users to sign up for the beta today as part of Zero Trust week at Cloudflare. If you’re interested in signing up now, visit the bottom of this post. If you’d like to find out how this works, keep reading.</p>
    <div>
      <h3>The unexpected universal productivity application</h3>
      <a href="#the-unexpected-universal-productivity-application">
        
      </a>
    </div>
    <p>While it never quite became the replacement operating system Marc Andreessen <a href="https://www.wired.com/2012/04/ff-andreessen/">predicted in 1995</a>, the web browser is perhaps the most important application today on end-user devices. In the workplace, many people spend the majority of their at-work computer time entirely within a web browser connected to internal apps and external SaaS applications and services. As this has occurred, browsers have needed to become increasingly complex — to address the expanding richness of the web and the demands of modern web applications such as Office 365 and Google Workspace.</p><p>However, despite the pivotal and ubiquitous role of web browsers, they are the least controlled application in the enterprise. Businesses struggle to control how users interact with web browsers. It’s all too easy for a user to inadvertently download an infected file, install a malicious extension, upload sensitive company data or click a malicious zero-day link in an <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">email</a> or on a webpage.</p><p>Making the problem worse is the growing prevalence of BYOD. It makes it difficult to enforce which browsers are used or if they are properly patched. Mobile device management (MDM) is a step in the right direction, but just like the slow patching cycles of on-premise firewalls, MDM can often be too slow to protect against zero day threats. I’ve been the recipient of many mass emails from CISO’s reminding everyone to patch their browser and to do it right now because this time it’s “<b><i>really important</i></b>” (CVE-2019-5786).</p>
    <div>
      <h3>Reimagining the browser</h3>
      <a href="#reimagining-the-browser">
        
      </a>
    </div>
    <p>Earlier this week we announced Cloudflare One, which is our vision for the future of the corporate network. The fundamental approach we’ve taken is a blank sheet: to zero out all the assumptions of the old model (like castle-and-moat) and usher in a new model based on the complex nature of today’s corporate networking and the shift to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, cloud-based <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">networking-as-a-service</a>.</p><p>It would be impossible to do this without thinking about the browser. Remote computing technologies have offered the promise of fixing the problems of the browser for some time — a future where anyone can benefit from the security and scale of cloud computing on their personal device. The reality has been that getting a generally performant solution is much more difficult than it sounds. It requires sending a user’s input over the Internet, computing that input, retrieving resources off the web, and then streaming them back to the user. And it all must occur in milliseconds, to create an illusion of using a local piece of software.</p><p>The general experience has been terrible, and many <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementations</a> have created nothing but angry emails and help-desk tickets for IT folks.</p><p>It is a tough problem, and it’s something we’ve been hard at work at solving. By delivering a vector-based stream that scales across any display size without requiring high bandwidth connections we’re able to reproduce the native browser experience remotely. Users experience the website as it was intended, without all the compatibility issues introduced by scrubbing HTML, CSS and JavaScript. And performance issues are aided tremendously by the fact that the managed browser is hosted only milliseconds away on our network.</p>
    <div>
      <h3>How secure remote browsing fits in with Cloudflare for Teams</h3>
      <a href="#how-secure-remote-browsing-fits-in-with-cloudflare-for-teams">
        
      </a>
    </div>
    <p>Before Cloudflare Browser Isolation, Cloudflare for Teams consisted of two core services:</p><p><a href="http://cloudflare.com/teams/access"><b>Cloudflare Access</b></a> creates a Zero Trust network <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter</a> that allows users to access corporate applications without needing to poke holes in their internal network with a legacy VPN appliance.</p><p><a href="http://cloudflare.com/teams/gateway"><b>Cloudflare Gateway</b></a> creates a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> that protects users from threats on any website.</p><p>These tools are excellent for protecting private Internet properties from unauthorized access and web browsing activity from known malicious websites. But what about unknown and unforeseeable threats?</p><p><a href="http://cloudflare.com/teams/browser-isolation"><b>Cloudflare Browser Isolation</b></a> answers this question by sandboxing a web browser in a remote container that is easily disposed of at the end of the user’s browsing session or when compromised.</p><p>Should an unknown threat such as a zero day vulnerability or malicious website exploit any of the hundreds of Web APIs, the attack is limited to a browser running in a supervised cloud environment leaving the end-user’s device unaffected.</p>
    <div>
      <h3>The Network is the Computer®</h3>
      <a href="#the-network-is-the-computer-r">
        
      </a>
    </div>
    <p>Web browsers are the foundation that the shift to the cloud has been built on. It’s just that they’ve always run in the wrong place.</p><p>In the same way that it made no sense for a developer to run and maintain the hardware that their application runs on, the same exact case can be made for the other side of the cloud’s equation: the browser. Funnily enough, the solution is exactly the same: like the developer’s application, the browser needed to move to the cloud. However, as with all disruptions, it takes time and investment for the performance of the new technology to catch up to the old one. When AWS was first launched in 2006, the inherent limitations meant that for most developers, it made sense to continue to run on-premise solutions.</p><p>At some point though, the technology improves to the point where the disruption can start taking over from the previous paradigm.</p><p>The limiting factor until today for a cloud-based browser has often been the experience of using it. A user’s experience is limited by the speed of light; it limits the time it takes a user’s input to travel to the remote data center and be returned to their display. In a perfect world, this needs to occur within milliseconds to deliver a real time experience.</p><p>Cloudflare has one very big advantage in solving that problem.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5sENUbqoMLc6sU8SHkz5Ol/96345f7f149c25cb909762c4fdf5e045/image2-17.png" />
            
            </figure><p>To deliver real-time remote computing experiences, each of our 200+ data centers are capable of serving remote browsing sessions within the blink of an eye of nearly everyone connected to the Internet. This allows us to deliver a low latency, responsive stream of a webpage regardless of where you’re physically located.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>But that’s enough talking about it. We’d love for you to try it! Please complete the form <a href="http://cloudflare.com/teams/lp/browser-isolation">here</a> to sign up to be one of the first users of this new technology in our network. We’ll be in touch as we expand the beta to more users.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Zero Trust Week]]></category>
            <category><![CDATA[Zero Day Threats]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <guid isPermaLink="false">2SkxJrMgredeCB5VQ29Rrg</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Backblaze B2 and the S3 Compatible API on Cloudflare]]></title>
            <link>https://blog.cloudflare.com/backblaze-b2-and-the-s3-compatible-api-on-cloudflare/</link>
            <pubDate>Wed, 13 May 2020 11:00:00 GMT</pubDate>
            <description><![CDATA[ In May 2020, Backblaze, a founding Bandwidth Alliance partner announced S3 compatible APIs for their B2 Cloud Storage service. We are excited to see Backblaze introduce a new level of compatibility in their Cloud Storage service. ]]></description>
            <content:encoded><![CDATA[ <p>In May 2020, Backblaze, a founding Bandwidth Alliance partner announced <a href="https://www.backblaze.com/blog/backblaze-b2-s3-compatible-api/">S3 compatible APIs</a> for their B2 Cloud Storage service. As a refresher, the <a href="/bandwidth-alliance/">Bandwidth Alliance</a> is a group of forward-thinking cloud and networking companies that are committed to discounting or waiving data transfer fees for shared customers. Backblaze has been a proud partner since 2018. We are excited to see Backblaze introduce a new level of compatibility in their Cloud Storage service.</p>
    <div>
      <h3>History of the S3 API</h3>
      <a href="#history-of-the-s3-api">
        
      </a>
    </div>
    <p>First let’s dive into the history of the S3 API and why it’s important for Cloudflare users.</p><p>Prior to 2006, before the mass migration to the Cloud, if you wanted to store content for your company you needed to build your own expensive and highly available storage platform that was large enough to store all your existing content with enough growth headroom for your business. AWS launched to help eliminate this model by renting their physical computing and storage infrastructure.</p><p>Amazon Simple Storage Service (S3) led the market by offering a scalable and resilient tool for storing unlimited amounts of data without building it yourself. It could be integrated into any application but there was one catch: you couldn’t use any existing standard such as WebDAV, FTP or SMB: your application needed to interface with Amazon’s bespoke S3 API.</p><p>Fast forward to 2020 and the storage provider landscape has become highly competitive with many providers capable of providing petabyte (and exabyte) scale content storage at extremely low cost-per-gigabyte. However, Amazon S3 has remained a dominant player despite heavy competition and not being the most cost-effective player.</p><p>The broad adoption of the S3 API by developers in their codebases and internal systems has transformed the S3 API into what WebDAV promised us to be: de facto standard HTTP File Storage API.</p>
    <div>
      <h3>Engineering costs of changing storage providers</h3>
      <a href="#engineering-costs-of-changing-storage-providers">
        
      </a>
    </div>
    <p>With many code bases and legacy applications being entrenched in the S3 API, the process to switch to a more cost-effective storage provider is not so easy. Companies need to consider the cost of engineer time programming a new storage API while also physically moving their data.</p><p>This engineering overhead has led many storage providers to natively support the S3 API, leveling the playing field and allowing companies to focus on picking the most cost-effective provider.</p>
    <div>
      <h3>First-mile bandwidth costs and the Bandwidth Alliance</h3>
      <a href="#first-mile-bandwidth-costs-and-the-bandwidth-alliance">
        
      </a>
    </div>
    <p>Cloudflare caches content in Points of Presence located in more than 200 cities around the world. This cached content is then handed to your Internet service provider (ISP) over low cost and often free Internet exchange connections in the same facility using mutual fibre optic cables. This cost saving is fairly well understood as the benefit of content delivery networks and has become highly commoditized.</p><p>What is less well understood is the <i>first-mile</i> cost of moving data from a storage provider to the content delivery network. Typically storage providers expect traffic to route via the Internet and will charge the consumer per-gigabyte of data transmitted. This is not the case for Cloudflare as we also share facilities and mutual fibre optic cables with many storage providers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4m3CbQcc8F3gAAtDhYD1ef/1a75e62d6a8ded64c148a2c68387c899/image2-3.png" />
            
            </figure><p>These shared interconnects created an opportunity to waive the cost of first-mile bandwidth between Cloudflare and many providers and is what prompted us to create the Bandwidth Alliance.</p><p>Media and entertainment companies serving user-generated content have a continuous supply of new content being moved over the first-mile from the storage provider to the content delivery network. The first-mile bandwidth cost adds up and using a Bandwidth Alliance partner such Backblaze can entirely eliminate it.</p>
    <div>
      <h3>Using the S3 API in Cloudflare Workers</h3>
      <a href="#using-the-s3-api-in-cloudflare-workers">
        
      </a>
    </div>
    <p>The Solutions Engineering team at Cloudflare is tasked with providing strategic technical guidance for our enterprise customers.</p><p>It’s not uncommon for developers to connect Cloudflare’s global network directly to their storage provider and directly serve content such as live and on-demand video without an intermediate web server.</p><p>For security purposes engineers typically use Cloudflare Workers to sign each uncached request using the S3 API. Cloudflare Workers allows anyone to deploy code to our global network of over 200+ Points of Presence in seconds and is built on top of Service Workers.</p><p>We’ve tested Backblaze B2’s S3 Compatible API in Cloudflare Workers using the same code tested for Amazon S3 buckets and it works perfectly by changing the target endpoint.</p>
    <div>
      <h3>Creating a S3 Compatible Worker script</h3>
      <a href="#creating-a-s3-compatible-worker-script">
        
      </a>
    </div>
    <p>Here’s how it is done using Cloudflare Worker’s CLI tool <a href="https://developers.cloudflare.com/workers/quickstart#installing-the-cli">Wrangler</a>:</p><p>Generate a new project in Wrangler using a template intended for use with Amazon S3:</p>
            <pre><code>wrangler generate &lt;projectname&gt; https://github.com/obezuk/worker-signed-s3-template</code></pre>
            <p>This template uses <a href="https://github.com/mhart/aws4fetch">aws4fetch</a>. A fast, lightweight implementation of an S3 Compatible signing library that is commonly used in Service Worker environments like Cloudflare Workers.</p><p>The template creates an index.js file with a standard request signing implementation:</p>
            <pre><code>import { AwsClient } from 'aws4fetch'

const aws = new AwsClient({
    "accessKeyId": AWS_ACCESS_KEY_ID,
    "secretAccessKey": AWS_SECRET_ACCESS_KEY,
    "region": AWS_DEFAULT_REGION
});

addEventListener('fetch', function(event) {
    event.respondWith(handleRequest(event.request))
});

async function handleRequest(request) {
    var url = new URL(request.url);
    url.hostname = AWS_S3_BUCKET;
    var signedRequest = await aws.sign(url);
    return await fetch(signedRequest, { "cf": { "cacheEverything": true } });
}</code></pre>
            
    <div>
      <h3>Environment Variables</h3>
      <a href="#environment-variables">
        
      </a>
    </div>
    <p>Modify your wrangler.toml file to use your Backblaze B2 API Key ID and Secret:</p>
            <pre><code>[env.dev]
vars = { AWS_ACCESS_KEY_ID = "&lt;BACKBLAZE B2 keyId&gt;", 
AWS_SECRET_ACCESS_KEY = "&lt;BACKBLAZE B2 secret&gt;", 
AWS_DEFAULT_REGION = "", 
AWS_S3_BUCKET = "&lt;BACKBLAZE B2 bucketName&gt;.&lt;BACKBLAZE B2 S3 Endpoint&gt;"}</code></pre>
            <p><code>AWS_S3_BUCKET</code> environment variable will be the combination of your bucket name, period and S3 Endpoint. For a Backblaze B2 Bucket named <code>example-bucket</code> and S3 Endpoint <code>s3.us-west-002.backblazeb2.com</code> use <code>example-bucket.s3.us-west-002.backblazeb2.com</code></p><p><code>AWS_DEFAULT_REGION</code> environment variable is interpreted from your S3 Endpoint. I use <code>us-west-002</code>.</p><p>We recommend using <a href="https://developers.cloudflare.com/workers/tooling/wrangler/secrets/">Secret Environment</a> variables to store your <code>AWS_SECRET_ACCESS_KEY</code> content when using this script in production.</p>
    <div>
      <h3>Preview your Cloudflare Worker</h3>
      <a href="#preview-your-cloudflare-worker">
        
      </a>
    </div>
    <p>Next run <code>wrangler preview --env dev</code> to enter a preview window of your Worker script. My bucket contained a static website containing adaptive streaming video content stored in a Backblaze B2 bucket.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5IjZRYdJMjcMjaYuxWlSiG/d5271e0124db9c0bdb859306c8f68bc8/image1-3.png" />
            
            </figure><p><i>Note: We permit caching of third party video content only for enterprise domains. Free/Pro/Biz users wanting to serve video content via Cloudflare may use</i> <a href="https://www.cloudflare.com/products/cloudflare-stream/"><i>Stream</i></a> <i>which delivers an end-to-end video delivery service.</i></p><p>Backblaze B2’s compatibility for the S3 API is an exciting update that has made their storage platform highly compatible with existing code bases and legacy systems. And, as a special offer to Cloudflare blog readers, Backblaze will pay the migration costs for transferring your data from S3 to Backblaze B2 (<a href="https://hub.backblaze.com/bandwidth-alliance-summerswitch2020">click here for more detail</a>). With the cost of migration covered and compatibility for your existing workflows, it is now easier than ever to switch to a Bandwidth Alliance partner and save on first-mile costs. By doing so, you can slash your cloud bills, gain flexibility, and make no compromises to your performance.</p><p>To learn more, <a href="https://www.brighttalk.com/webcast/14807/405472">join us on May 14th</a> for a webinar focused on getting you ultra fast worldwide content delivery.</p> ]]></content:encoded>
            <category><![CDATA[Bandwidth Alliance]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[API]]></category>
            <guid isPermaLink="false">2sAmHUJFDDHwakL7WXKGqg</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unit Testing Workers, in Cloudflare Workers]]></title>
            <link>https://blog.cloudflare.com/unit-testing-workers-in-cloudflare-workers/</link>
            <pubDate>Thu, 02 May 2019 13:00:00 GMT</pubDate>
            <description><![CDATA[ We recently wrote about unit testing Cloudflare Workers within a mock environment using CloudWorker (a Node.js based mock Cloudflare Worker environment created by Dollar Shave Club's engineering team). See Unit Testing Worker Functions. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We recently wrote about unit testing Cloudflare Workers within a mock environment using CloudWorker (a Node.js based mock Cloudflare Worker environment created by Dollar Shave Club's engineering team). <a href="/unit-testing-worker-functions/">See Unit Testing Worker Functions.</a></p><p>Even though Cloudflare Workers deploy globally within seconds, software developers often choose to use local mock environments to have the fastest possible feedback loop while developing on their local machines. CloudWorker is perfect for this use case but as it is still a mock environment it does not guarantee an identical runtime or environment with all Cloudflare Worker APIs and features. This gap can make developers uneasy as they do not have 100% certainty that their tests will succeed in the production environment.</p><p>In this post, we're going to demonstrate how to generate a Cloudflare Worker compatible test harness which can execute mocha unit tests directly in the production Cloudflare environment.</p>
    <div>
      <h2>Directory Setup</h2>
      <a href="#directory-setup">
        
      </a>
    </div>
    <p>Create a new folder for your project, change it to your working directory and run <code>npm init</code> to initialise the <code>package.json</code> file.</p><p>Run <code>mkdir -p src &amp;&amp; mkdir -p test/lib &amp;&amp; mkdir dist</code> to create folders used by the next steps. Your folder should look like this:</p>
            <pre><code>.
./dist
./src/worker.js
./test
./test/lib
./package.json</code></pre>
            <p><code>npm install --save-dev mocha exports-loader webpack webpack-cli</code></p><p>This will install Mocha (the unit testing framework), Webpack (a tool used to package the code into a single Worker script) and Exports Loader (a tool used by Webpack to import the Worker script into the Worker based Mocha environment.</p><p><code>npm install --save-dev git+https://github.com/obezuk/mocha-loader.git</code></p><p>This will install a modified version of Webpack's mocha loader. It has been modified to support the Web Worker environment type. We are excited to see Web Worker support merged into Mocha Loader so please vote for our pull request here: <a href="https://github.com/webpack-contrib/mocha-loader/pull/77">https://github.com/webpack-contrib/mocha-loader/pull/77</a></p>
    <div>
      <h3><b>Example Script</b></h3>
      <a href="#example-script">
        
      </a>
    </div>
    <p>Create your Worker script in <code>./src/worker.js</code>:</p>
            <pre><code>addEventListener('fetch', event =&gt; {
 event.respondWith(handleRequest(event.request))
})

async function addition(a, b) {
  return a + b
}

async function handleRequest(request) {
  const added = await addition(1,3)
  return new Response(`The Sum is ${added}!`)
}</code></pre>
            
    <div>
      <h3>Add Tests</h3>
      <a href="#add-tests">
        
      </a>
    </div>
    <p>Create your unit tests in <code>./test/test.test.js</code>:</p>
            <pre><code>const assert = require('assert')

describe('Worker Test', function() {

    it('returns a body that says The Sum is 4', async function () {
        let url = new URL('https://worker.example.com')
        let req = new Request(url)
        let res = await handleRequest(req)
        let body = await res.text()
        assert.equal(body, 'The Sum is 4!')
    })

    it('does addition properly', async function() {
        let res = await addition(1, 1)
        assert.equal(res, 2)
    })

})</code></pre>
            
    <div>
      <h2>Mocha in Worker Test Harness</h2>
      <a href="#mocha-in-worker-test-harness">
        
      </a>
    </div>
    <p>In order to execute mocha and unit tests within Cloudflare Workers we are going to build a Test Harness. The Test Harness script looks a lot like a normal Worker script but integrates your <code>./src/worker.js</code> and <code>./test/test.test.js</code> into a script which is capable of executing the Mocha unit tests within the Cloudflare Worker runtime.</p><p>Create the below script in <code>./test/lib/serviceworker-mocha-harness.js</code>.</p>
            <pre><code>import 'mocha';

import 'mocha-loader!../test.test.js';

var testResults;

async function mochaRun() {
    return new Promise(function (accept, reject) {
        var runner = mocha.run(function () {
            testResults = runner.testResults;
            accept();
        });
    });
}

addEventListener('fetch', event =&gt; {
    event.respondWith(handleMochaRequest(event.request))
});

async function handleMochaRequest(request) {

    if (!testResults) {
        await mochaRun();
    }

    var headers = new Headers({
        "content-type": "application/json"
    })

    var statusCode = 200;

    if (testResults.failures != 0) {
        statusCode = 500;
    }

    return new Response(JSON.stringify(testResults), {
        "status": statusCode,
        "headers": headers
    });

}

Object.assign(global, require('exports-loader?handleRequest,addition!../../src/worker.js'));
</code></pre>
            
    <div>
      <h3>Mocha Webpack Configuration</h3>
      <a href="#mocha-webpack-configuration">
        
      </a>
    </div>
    <p>Create a new file in the project root directory called: <code>./webpack.mocha.config.js</code>. This file is used by Webpack to bundle the test harness, worker script and unit tests into a single script that can be deployed to Cloudflare.</p>
            <pre><code>module.exports = {
  target: 'webworker',
  entry: "./test/lib/serviceworker-mocha-harness.js",
  mode: "development",
  optimization: {
    minimize: false
  },
  performance: {
    hints: false
  },
  node: {
    fs: 'empty'
  },
  module: {
    exprContextCritical: false
  },
  output: {
    path: __dirname + "/dist",
    publicPath: "dist",
    filename: "worker-mocha-harness.js"
  }
};
</code></pre>
            <p>Your file structure should look like (excluding node_modules):</p>
            <pre><code>.
./dist
./src/worker.js
./test/test.test.js
./test/lib/serviceworker-mocha-harness.js
./package.json
./package-lock.json
./webpack.mocha.config.js</code></pre>
            
    <div>
      <h3><b>Customising the test harness.</b></h3>
      <a href="#customising-the-test-harness">
        
      </a>
    </div>
    <p>If you wish to extend the test harness to support your own test files you will need to add additional test imports to the top of the script:</p>
            <pre><code>import 'mocha-loader!/* TEST FILE NAME HERE */'</code></pre>
            <p>If you wish to import additional functions from your Worker script into the test harness environment you will need to add them comma separated into the last line:</p>
            <pre><code>Object.assign(global, require('exports-loader?/* COMMA SEPARATED FUNCTION NAMES HERE */!../../src/worker.js'));</code></pre>
            
    <div>
      <h2>Running the test harness</h2>
      <a href="#running-the-test-harness">
        
      </a>
    </div>
    <p>Deploying and running the test harness is identical to deploying any other Worker script with Webpack.</p><p>Modify the scripts section of package.json to include the build-harness command.</p>
            <pre><code>"scripts": {
  "build-harness": "webpack --config webpack.mocha.config.js -p --progress --colors"
}</code></pre>
            <p>In the project root directory run the command <code>npm run build-harness</code> to generate and bundle your Worker script, Mocha and your unit tests into <code>./dist/worker-mocha-harness.js</code>.</p><p>Upload this script to a test Cloudflare workers route and run <code>curl --fail https://test.example.org</code>. If the unit tests are successful it will return a <code>200</code> response, and if the unit tests fail a <code>500</code> response.</p>
    <div>
      <h2>Integrating into an existing CI/CD pipeline</h2>
      <a href="#integrating-into-an-existing-ci-cd-pipeline">
        
      </a>
    </div>
    <p>You can integrate Cloudflare Workers and the test harness into your existing <a href="https://www.cloudflare.com/learning/serverless/glossary/what-is-ci-cd/">CI/CD pipeline</a> by using our API: <a href="https://developers.cloudflare.com/workers/api/">https://developers.cloudflare.com/workers/api/</a>.</p><p>The test harness returns detailed test reports in JSON format:</p><p><b>Example Success Response</b></p>
            <pre><code>{
  "stats": {
    "suites": 1,
    "tests": 2,
    "passes": 2,
    "pending": 0,
    "failures": 0,
    "start": "2019-04-23T06:24:33.492Z",
    "end": "2019-04-23T06:24:33.590Z",
    "duration": 98
  },
  "tests": [
    {
      "title": "returns a body that says The Sum is 4",
      "fullTitle": "Worker Test returns a body that says The Sum is 4",
      "duration": 0,
      "currentRetry": 0,
      "err": {}
    },
    {
      "title": "does addition properly",
      "fullTitle": "Worker Test does addition properly",
      "duration": 0,
      "currentRetry": 0,
      "err": {}
    }
  ],
  "pending": [],
  "failures": [],
  "passes": [
    {
      "title": "returns a body that says The Sum is 4",
      "fullTitle": "Worker Test returns a body that says The Sum is 4",
      "duration": 0,
      "currentRetry": 0,
      "err": {}
    },
    {
      "title": "does addition properly",
      "fullTitle": "Worker Test does addition properly",
      "duration": 0,
      "currentRetry": 0,
      "err": {}
    }
  ]
}
</code></pre>
            <p><b>Example Failure Response</b></p>
            <pre><code>{
  "stats": {
    "suites": 1,
    "tests": 2,
    "passes": 0,
    "pending": 0,
    "failures": 2,
    "start": "2019-04-23T06:25:52.100Z",
    "end": "2019-04-23T06:25:52.170Z",
    "duration": 70
  },
  "tests": [
    {
      "title": "returns a body that says The Sum is 4",
      "fullTitle": "Worker Test returns a body that says The Sum is 4",
      "duration": 0,
      "currentRetry": 0,
      "err": {
        "name": "AssertionError",
        "actual": "The Sum is 5!",
        "expected": "The Sum is 4!",
        "operator": "==",
        "message": "'The Sum is 5!' == 'The Sum is 4!'",
        "generatedMessage": true,
        "stack": "AssertionError: 'The Sum is 5!' == 'The Sum is 4!'\n    at Context.&lt;anonymous&gt; (worker.js:19152:16)"
      }
    },
    {
      "title": "does addition properly",
      "fullTitle": "Worker Test does addition properly",
      "duration": 0,
      "currentRetry": 0,
      "err": {
        "name": "AssertionError",
        "actual": "3",
        "expected": "2",
        "operator": "==",
        "message": "3 == 2",
        "generatedMessage": true,
        "stack": "AssertionError: 3 == 2\n    at Context.&lt;anonymous&gt; (worker.js:19157:16)"
      }
    }
  ],
  "pending": [],
  "failures": [
    {
      "title": "returns a body that says The Sum is 4",
      "fullTitle": "Worker Test returns a body that says The Sum is 4",
      "duration": 0,
      "currentRetry": 0,
      "err": {
        "name": "AssertionError",
        "actual": "The Sum is 5!",
        "expected": "The Sum is 4!",
        "operator": "==",
        "message": "'The Sum is 5!' == 'The Sum is 4!'",
        "generatedMessage": true,
        "stack": "AssertionError: 'The Sum is 5!' == 'The Sum is 4!'\n    at Context.&lt;anonymous&gt; (worker.js:19152:16)"
      }
    },
    {
      "title": "does addition properly",
      "fullTitle": "Worker Test does addition properly",
      "duration": 0,
      "currentRetry": 0,
      "err": {
        "name": "AssertionError",
        "actual": "3",
        "expected": "2",
        "operator": "==",
        "message": "3 == 2",
        "generatedMessage": true,
        "stack": "AssertionError: 3 == 2\n    at Context.&lt;anonymous&gt; (worker.js:19157:16)"
      }
    }
  ],
  "passes": []
}
</code></pre>
            <p>This is really powerful and can allow you to execute your unit tests directly in the Cloudflare runtime, giving you more confidence before releasing your code into production. We hope this was useful and welcome any feedback.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Serverless]]></category>
            <category><![CDATA[JavaScript]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <guid isPermaLink="false">4GyP7beBrpQnvlAr5h8OWn</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unit Testing Worker Functions]]></title>
            <link>https://blog.cloudflare.com/unit-testing-worker-functions/</link>
            <pubDate>Fri, 15 Mar 2019 14:17:11 GMT</pubDate>
            <description><![CDATA[ If you were not aware, Cloudflare Workers lets you run Javascript in all 165+ of our Data Centers. We’re delighted to see some of the creative applications of Workers. As the use cases grow in complexity, the need to smoke test your code also grows.  ]]></description>
            <content:encoded><![CDATA[ <p>If you were not aware, Cloudflare Workers lets you run Javascript in all 165+ of our Data Centers. We’re delighted to see some of the creative applications of Workers. As the use cases grow in complexity, the need to smoke test your code also grows.  </p><p>More specifically, if your Worker includes a number of functions, it’s important to ensure each function does what it’s intended to do in addition to ensuring the output of the entire Worker returns as expected.</p><p>In this post, we’re going to demonstrate how to unit test Cloudflare Workers, and their individual functions, with <a href="https://github.com/dollarshaveclub/cloudworker">Cloudworker</a>, created by the Dollar Shave Club engineering team.</p><p>Dollar Shave Club is a Cloudflare customer, and they created Cloudworker, a mock for the Workers runtime, for testing purposes. We’re really grateful to them for this. They were kind enough to <a href="/cloudworker-a-local-cloudflare-worker-runner/">post on our blog</a> about it.</p><p>This post will demonstrate how to abstract away Cloudworker, and test Workers with the same syntax you write them in.</p>
    <div>
      <h3>Example Script</h3>
      <a href="#example-script">
        
      </a>
    </div>
    <p>Before we get into configuring Cloudworker, let’s introduce the simple script we are going to test against in our example. As you can see this script contains two functions, both of which contribute to the response to the client.</p>
            <pre><code>addEventListener('fetch', event =&gt; {
 event.respondWith(handleRequest(event.request))
})

async function addition(a, b) {
  return a + b
}

async function handleRequest(request) {
  const added = await addition(1,3)
  return new Response(`The Sum is ${added}!`)
}</code></pre>
            <p>This script will be active for the route <code>worker.example.com</code>.</p>
    <div>
      <h3>Directory Set Up</h3>
      <a href="#directory-set-up">
        
      </a>
    </div>
    <p>After I’ve created a new npm ( <code>npm init</code> ) project in a new directory, I placed my <code>worker.js</code> file inside, containing the above, and created the folder <code>test</code> which contains <code>worker-test.js</code>. The structure is laid out below.</p>
            <pre><code>.
----- worker.js
----- test
      . worker-test.js
----- node_modules
----- package.json
----- package-lock.json.</code></pre>
            <p>Next I need to install Cloudworker ( <code>npm install @dollarshaveclub/cloudworker --save-dev</code> ) and the Mocha testing framework ( <code>npm install mocha --save-dev</code> ) if you do not have it installed globally. Make sure that <code>package.json</code> reflects a value of <code>mocha</code> for <code>tests</code>, like:</p>
            <pre><code>"scripts": {
    "test": "mocha"
  }</code></pre>
            <p>Now we can finally write some tests! Luckily, <code>mocha</code> has <code>async/await</code> support which is going to make this very simple.  The idea is straightforward: Cloudworker allows you to place a Worker in development in front of an HTTP request and inspect the response.</p>
    <div>
      <h3>Writing Tests!</h3>
      <a href="#writing-tests">
        
      </a>
    </div>
    <p>Before any test logic, we’ll place two lines at the top of the test file ( <code>worker-test.js</code> ). The first line assigns all property values from Cloudworker and our Worker script to the global context before every <code>async function()</code> is run in mocha. The second line requires <code>assert</code>, which is commonly used to compare an expected output to a mocked output.</p>
            <pre><code>before(async function () {
   Object.assign(global, new (require('@dollarshaveclub/cloudworker'))(require('fs').readFileSync('worker.js', ‘utf8’)).context);
});

// You will replace worker.js with the relative path to your worker

const assert = require('assert')</code></pre>
            <p>Now, testing looks a lot more like a Worker itself as we access to all the underlying functions used by Cloudworker AND the Worker script.</p>
            <pre><code>describe('Worker Test', function() {

    it('returns a body that says The Sum is 4', async function () {
        let url = new URL('https://worker.example.com')
        let req = new Request(url)
        let res = await handleRequest(req)
        let body = await res.text()
        assert.equal(body, 'The Sum is 4!')
    })

    it('does addition properly', async function() {
        let res = await addition(1, 1)
        assert.equal(res, 2)
    })

})</code></pre>
            <p>We can test individual functions with our Worker this way, as shown above with the <code>addition()</code> function call. This is really powerful and allows for more confidence when deploying complex workers as you can test each component that makes up the script. We hope this was useful and welcome any feedback.</p> ]]></content:encoded>
            <category><![CDATA[Serverless]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[JavaScript]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <category><![CDATA[Developers]]></category>
            <guid isPermaLink="false">6syqbsFbfzN9D5f7SEG6kU</guid>
            <dc:creator>Tom Brightbill</dc:creator>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
    </channel>
</rss>