
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Thu, 09 Apr 2026 12:15:02 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Cloud CNI privately connects your clouds to Cloudflare]]></title>
            <link>https://blog.cloudflare.com/cloud-cni/</link>
            <pubDate>Fri, 13 Jan 2023 14:02:00 GMT</pubDate>
            <description><![CDATA[ Customers using Google Cloud Platform, Azure, Oracle Cloud, IBM Cloud, and Amazon Web Services can now open direct connections from their private cloud instances into Cloudflare ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3QdKiRzTrBGSbPvJJaZpiA/b94d9bcbaaad4b0bb2d1c45b4a356463/image3-23.png" />
            
            </figure><p>For CIOs, networking is a hard process that is often made harder. Corporate networks have so many things that need to be connected and each one of them needs to be connected differently: user devices need managed connectivity through a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a>, offices need to be connected using the public Internet or dedicated connectivity, data centers need to be managed with their own private or public connectivity, and then you have to <a href="https://www.cloudflare.com/cio/">manage cloud connectivity</a> on top of it all! It can be exasperating to manage connectivity for all these different scenarios and all their privacy and compliance requirements when all you want to do is enable your users to access their resources privately, securely, and in a non-intrusive manner.</p><p>Cloudflare helps simplify your connectivity story with Cloudflare One. Today, we’re excited to announce that we support direct cloud interconnection with our Cloudflare Network Interconnect, allowing Cloudflare to be your one-stop shop for all your interconnection needs.</p><p>Customers using IBM Cloud, Google Cloud, Azure, Oracle Cloud Infrastructure, and Amazon Web Services can now open direct connections from their private cloud instances into Cloudflare. In this blog, we’re going to talk about why direct cloud interconnection is important, how Cloudflare makes it easy, and how Cloudflare integrates direct cloud connection with our existing Cloudflare One products to bring new levels of <a href="https://www.cloudflare.com/learning/network-layer/network-security/">security</a> to your corporate networks built on top of Cloudflare.</p>
    <div>
      <h3>Privacy in a public cloud</h3>
      <a href="#privacy-in-a-public-cloud">
        
      </a>
    </div>
    <p>Public cloud compute providers are built on the idea that the compute power they provide can be used by anyone: your cloud VM and my cloud VM can run next to each other on the same machine and neither of us will know. The same is true for bits on the wire going in and out of these clouds: your bits and my bits may flow on the same wire, interleaved with each other, and neither of us will know that it’s happening.</p><p>The abstraction and relinquishment of ownership is comforting in one way but can be terrifying in another: neither of us need to run a physical machine and buy our own connectivity, but we have no guarantees about how or where our data and compute lives except that it lives in a datacenter with millions of other users.</p><p>For many enterprises, this isn’t acceptable: enterprises need compute that can only be accessed by them. Maybe the compute in the cloud is storing payment data that can’t be publicly accessible, and must be accessed through a private connection. Maybe the cloud customer has compliance requirements due to government restrictions that require the cloud not be accessible to the public Internet. Maybe the customer simply doesn’t trust public clouds or the public Internet and wants to limit exposure as much as possible. Customers want a private cloud that only they can access: a virtual private cloud, or a VPC.</p><p>To help solve this problem and ensure that only compute owners can access cloud compute that needs to stay private, clouds developed private cloud interconnects: direct cables from clouds to their customers. You may know them by their product names: AWS calls theirs DirectConnect, Azure calls theirs ExpressRoute, Google Cloud calls theirs Cloud Interconnect, OCI calls theirs FastConnect, and IBM calls theirs Direct Link. By providing private cloud connectivity to the customer datacenter, clouds satisfy the chief pain points for their customers: providing compute in a private manner. With these private links, VPCs are only accessible from the corporate networks that they’re plugged into, providing air-gapped security while allowing customers to turn over operations and maintenance of the datacenters to the clouds.</p>
    <div>
      <h3>Privacy on the public Internet</h3>
      <a href="#privacy-on-the-public-internet">
        
      </a>
    </div>
    <p>But while VPCs and direct cloud interconnection have solved the problem of infrastructure moving to the cloud, as corporate networks move out of on-premise deployments, the cloud brings a completely new challenge: how do I keep my private cloud connections if I’m getting rid of my corporate network that connects all my resources together?</p><p>Let’s take an example company that connects a data center, an office, and an Azure instance together. Today, this company may have remote users that connect to applications hosted in either the datacenter, the office, or the cloud instance. Users in the office may connect to applications in the cloud, and all of it today is managed by the company. To do this, they may employ VPNs that tunnel the remote users into the data center or office before accessing the necessary applications. The office and data center are often connected through <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS</a> lines that are leased from connectivity providers. And then there’s the private IBM instance that is connected via IBM Direct Link. That’s three different connectivity providers for CIOs to manage, and we haven’t even started talking about access policies for the internal applications, firewalls for the cross-building network, and implementing MPLS routing on top of the provider underlay.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6w6gFveBWCskbGmfcK6VW2/cb556f159fdeef78a1e478cb676d7829/pasted-image-0-1.png" />
            
            </figure><p>Cloudflare One helps simplify this by allowing companies to insert Cloudflare as the network for all the different connectivity options. Instead of having to run connections between buildings and clouds, all you need to do is manage your connections to Cloudflare.</p><p>WARP manages connectivity for remote users, Cloudflare Network Interconnect provides the private connectivity from data centers and offices to Cloudflare, and all of that can be managed with Access policies for policing applications and Magic WAN to provide the routing that gets your users where they need to go. When we released Cloudflare One, we were able to simplify the connectivity story to look like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sFiKaY8z9BJz379RSrARQ/6bc04bccec2fd0239768776cc892e726/pasted-image-0--1--1.png" />
            
            </figure><p>Before, users with private clouds had to either expose their cloud instances to the public Internet, or maintain suboptimal routing by keeping their private cloud instances connected to their data centers instead of directly connecting to Cloudflare. This means that these customers have to maintain their private connections directly to their data centers, which adds toil to a solution that is supposed to be easier:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Ct4W3INP8JoIrxcjHTG0A/15ac27eb67289b4102a7e32ac140c8c6/pasted-image-0--2--1.png" />
            
            </figure><p>Now that CNI supports cloud environments, this company can open a private cloud link directly into Cloudflare instead of into their data center. This allows the company to use Cloudflare as a true intermediary between all of their resources, and they can rely on Cloudflare to manage firewalls, access policies, and routing for all of their resources, trimming the number of vendors they need to manage for routing down to one: just Cloudflare!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YZG5m6lM51q3psWX3KdB1/20c77c740d894632d798fdd844876092/pasted-image-0--3--1.png" />
            
            </figure><p>Once everything is directly connected to Cloudflare, this company can manage their cross-resource routing and firewalls through Magic WAN, they can set their user policies directly in Access, and they can set egress policies out to the public Internet through any one of Cloudflare’s 250+ data centers through Gateway. All the offices and clouds talk to each other on a hermetically sealed network with no public access or publicly shared peering links, and most importantly, all of these security and privacy efforts are done completely transparently to the user.</p><p>So let’s talk about how we can get your cloud connected to us.</p>
    <div>
      <h3>Quick cloud connectivity</h3>
      <a href="#quick-cloud-connectivity">
        
      </a>
    </div>
    <p>The most important thing with cloud connectivity is how easy it should be: you shouldn’t have to spend lots of time waiting for cross-connects to come up, get LOAs, monitor light levels and do all the things that you would normally do when provisioning connectivity. Getting connected from your cloud provider should be cloud-native: you should just be able to provision cloud connectivity directly from your existing portals and follow the existing steps laid out for direct cloud connection.</p><p>That’s why our new cloud support makes it even easier to connect with Cloudflare. We now support direct cloud connectivity with IBM, AWS, Azure, Google Cloud, and OCI so that you can provision connections directly from your cloud provider into Cloudflare like you would to a datacenter. Moving private connections to Cloudflare means you don’t have to maintain your own infrastructure anymore, Cloudflare becomes your infrastructure, so you don’t have to worry about ordering cross-connects into your devices, getting LOAs, or checking light levels. To show you how easy this can be, let’s walk through an example of how easy this is using Google Cloud.</p><p>The first step to provisioning connectivity in any cloud is to request a connection. In Google Cloud, you can do this by selecting “Private Service Connect” in the VPC network details:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pQ5nP4ARIDvH3B5EFSNZL/087f8c749db2c1e6d8096fa6d859aef6/Untitled.png" />
            
            </figure><p>That will allow you to select a partner connection or a direct connection. In Cloudflare’s case, you should select a partner connection. Follow the instructions to select a connecting region and datacenter site, and you’ll get what’s called a connection ID, which is used by Google Cloud and Cloudflare to identify the private connection with your VPC:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1WtaGJnX060HuFTjxDWp4k/76d0f0d0c3581ae24826720ae52369bf/Untitled--1-.png" />
            
            </figure><p>You’ll notice in this screenshot that it says you need to configure the connection on the partner side. In this case, you can take that key and use it to automatically provision a virtual connection on top of an already existing link. The provisioning process consists of five steps:</p><ol><li><p>Assigning unique VLANs to your connection to ensure a private connection</p></li><li><p>Assigning unique IP addresses for a BGP point-to-point connection</p></li><li><p>Provisioning a BGP connection on the Cloudflare side</p></li><li><p>Passing this information back to Google Cloud and creating the connection</p></li><li><p>Accepting the connection and finishing BGP provisioning on your VPC</p></li></ol><p>All of these steps are performed automatically in seconds so that by the time you get your IP address and VLANs, Cloudflare has already provisioned our end of the connection. When you accept and configure the connection, everything will be ready to go, and it’s easy to start privately routing your traffic through Cloudflare.</p><p>Now that you’ve finished setting up your connection, let’s talk about how private connectivity to your cloud instances can integrate with all of your Cloudflare One products.</p>
    <div>
      <h3>Private routing with Magic WAN</h3>
      <a href="#private-routing-with-magic-wan">
        
      </a>
    </div>
    <p>Magic WAN integrates extremely well with Cloud CNI, allowing customers to connect their VPCs directly to the private network built with Magic WAN. Since the routing is private, you can even advertise your private address spaces reserved for internal routing, such as your 10.0.0.0/8 space.</p><p>Previously, your cloud VPC needed to be publicly addressable. But with Cloud CNI, we assign a point-to-point IP range, and you can advertise your internal spaces back to Cloudflare and Magic WAN will route traffic to your internal address spaces!</p>
    <div>
      <h3>Secure authentication with Access</h3>
      <a href="#secure-authentication-with-access">
        
      </a>
    </div>
    <p>Many customers love Cloudflare Tunnel in combination with Access for its secure paths to authentication servers hosted in cloud providers. But what if your authentication server didn’t need to be publicly accessible at all? With Access + Cloud CNI, you can connect your authentication services to Cloudflare and Access will route all your authentication traffic through the private path back to your service without needing the public Internet.</p>
    <div>
      <h3>Manage your cloud egress with Gateway</h3>
      <a href="#manage-your-cloud-egress-with-gateway">
        
      </a>
    </div>
    <p>While you may want to protect your cloud services from ever being accessed by anyone not on your network, sometimes your cloud services need to talk out to the public Internet. Luckily for you, Gateway has you covered and with Cloud CNI you can get a private path to Cloudflare which will manage all of your egress policies, ensuring that you can carefully watch your cloud service outbound traffic from the same place you monitor all other traffic leaving your network.</p>
    <div>
      <h3>Cloud CNI: safe, performant, easy</h3>
      <a href="#cloud-cni-safe-performant-easy">
        
      </a>
    </div>
    <p>Cloudflare is committed to making <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust</a> and <a href="https://www.cloudflare.com/network-security/">network security</a> easy and unobtrusive. Cloud CNI is another step towards ensuring that your network is as easy to manage as everything else so that you can stop focusing on how to build your network, and start focusing on what goes on top of it.</p><p>If you’re interested in Cloud CNI, <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">contact us</a> today to get connected to a seamless and easy Zero Trust world.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[NaaS]]></category>
            <category><![CDATA[Network Interconnect]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">1Z0kIJhiPA1nkfwU9IVwgg</guid>
            <dc:creator>David Tuber</dc:creator>
        </item>
        <item>
            <title><![CDATA[CIO Week 2023 recap]]></title>
            <link>https://blog.cloudflare.com/cio-week-2023-recap/</link>
            <pubDate>Fri, 13 Jan 2023 14:01:00 GMT</pubDate>
            <description><![CDATA[ Learn about all the new products, partnerships, and innovations Cloudflare announced during CIO Week to help organizations modernize their IT and security. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UE0B1mqbvC2In2FvI9zP3/8271edb763419010c0f8be743a5df82d/CIO-Week-2023-Recap.png" />
            
            </figure><p>In our <a href="/welcome-to-cio-week-2023/">Welcome to CIO Week 2023</a> post, we talked about wanting to start the year by celebrating the work Chief Information Officers do to keep their organizations safe and productive.</p><p>Over the past week, you learned about announcements addressing all facets of your technology stack – including new services, betas, strategic partnerships, third party integrations, and more. This recap blog summarizes each announcement and labels what capability is generally available (GA), in beta, or on our roadmap.</p><p>We delivered on critical capabilities requested by our customers – such as <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-announces-comprehensive-email-security-and-data-protection-tools/">even more comprehensive phishing protection</a> and <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-expands-relationship-with-microsoft-zero-trust/">deeper integrations with the Microsoft ecosystem</a>. Looking ahead, we also described our roadmap for emerging technology categories like <a href="https://www.cloudflare.com/press-releases/2023/digital-experience-monitoring-cios/">Digital Experience Monitoring</a> and our vision to make it exceedingly simple <a href="https://www.cloudflare.com/press-releases/2023/magic-wan-connector-corporate-network/">to route traffic from any source to any destination through Cloudflare’s network</a>.</p><p>Everything we launched is designed to <a href="https://www.cloudflare.com/cio/">help CIOs accelerate their pursuit of digital transformation</a>. In this blog, we organized our announcement summaries based on the three feelings we want CIOs to have when they consider partnering with Cloudflare:</p><ol><li><p><b>CIOs now have a simpler roadmap to Zero Trust and SASE:</b> We announced new capabilities and tighter integrations that make it easier for organizations to adopt <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> best practices and move towards aspirational architectures like <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a>.</p></li><li><p><b>CIOs have access to the right technology and channel partners:</b> We announced integrations and programming to help organizations access the right expertise to modernize IT and security at their own pace with the technologies they already use.</p></li><li><p><b>CIOs can streamline a multi-cloud strategy with ease:</b> We announced new ways to connect, secure, and accelerate traffic across diverse cloud environments.</p></li></ol><p>Thank you for following <a href="https://www.cloudflare.com/cio-week/">CIO Week</a>, Cloudflare’s first of many Innovation Weeks in 2023. It can be hard to keep up with our pace of innovation sometimes, but we hope that reading this blog and <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4063103/">registering for our recap webinar</a> will help!</p><p>If you want to speak with us about <a href="https://www.cloudflare.com/learning/network-layer/how-to-prepare-for-network-modernization-projects/">how to modernize your IT and security</a> and make life easier for your organization’s CIO, <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">fill out the form here.</a></p>
    <div>
      <h2>Simplifying your journey to Zero Trust and SASE</h2>
      <a href="#simplifying-your-journey-to-zero-trust-and-sase">
        
      </a>
    </div>
    <p><i><b>Securing access</b></i>These blog posts are focused on making it faster, easier, and safer to connect any user to any application with the granular controls and comprehensive visibility needed to achieve Zero Trust.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/introducing-digital-experience-monitoring/"><span>Introducing Digital Experience Monitoring</span></a></td>
    <td><span>Cloudflare Digital Experience Monitoring will be an all-in-one dashboard that helps CIOs understand how critical applications and Internet services are performing across their entire corporate network. </span><a href="https://cloudflare.com/lp/digital-experience-monitoring/"><span>Sign up for beta access. </span></a></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/warp-to-warp/"><span>Weave your own global, private, virtual Zero Trust network on Cloudflare with WARP-to-WARP</span></a></td>
    <td><span>With a single click, any device running Cloudflare’s device client, WARP, in your organization can reach any other device running WARP over a private network. </span><a href="https://www.cloudflare.com/lp/warp-peering/"><span>Sign up for beta access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/403-logs-cloudflare-access/"><span>New ways to troubleshoot Cloudflare Access 'blocked' messages</span></a></td>
    <td><span>Investigate ‘allow’ or ‘block’ decisions based on how a connection was made with the same level of ease that you can troubleshoot user identity within Cloudflare’s Zero Trust platform.</span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/one-click-zerotrust-isolation/"><span>One-click data security for your internal and SaaS applications</span></a></td>
    <td><span>Secure sensitive data by running application sessions in an isolated browser and control how users interact with sensitive data – now with just one click. </span><a href="https://www.cloudflare.com/lp/application-isolation-beta/"><span>Sign up for beta access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/access-and-gateway-with-scim/"><span>Announcing SCIM support for Cloudflare Access &amp; Gateway</span></a></td>
    <td><span>Cloudflare’s ZTNA (Access) and SWG (Gateway) services now support the System for Cross-domain Identity Management (SCIM) protocol, making it easier for administrators to manage identity records across systems.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/the-most-exciting-ping-release"><span>Cloudflare Zero Trust: The Most Exciting Ping Release Since 1983</span></a></td>
    <td><span>Cloudflare Zero Trust administrators can use familiar debugging tools that use the ICMP protocol (like Ping, Traceroute, and MTR) to test connectivity to private network destinations.</span></td>
  </tr>
</tbody>
</table><p><i><b>Threat defense</b></i>These blog posts are focused on helping organizations filter, inspect, and isolate traffic to protect users from phishing, ransomware, and other Internet threats.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/area1-eli-ga"><span>Email Link Isolation: your safety net for the latest phishing attacks</span></a></td>
    <td><span>Email Link Isolation is your safety net for the suspicious links that end up in inboxes and that users may click. This added protection turns </span><a href="https://www.cloudflare.com/products/zero-trust/email-security/"><span>Cloudflare Area 1</span></a><span> into the most comprehensive email security solution when it comes to protecting against phishing attacks.</span></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/bring-your-certificates-cloudflare-gateway/"><span>Bring your own certificates to Cloudflare Gateway</span></a></td>
    <td><span>Administrators can use their own custom certificates to apply HTTP, DNS, CASB, DLP, RBI and other filtering policies.</span></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/custom-dlp-profiles/"><span>Announcing Custom DLP profiles</span></a></td>
    <td><span>Cloudflare’s Data Loss Prevention (DLP) service now offers the ability to create custom detections, so that organizations can inspect traffic for their most sensitive data.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/gateway-managed-service-provider"><span>Cloudflare Zero Trust for Managed Service Providers</span></a></td>
    <td><span>Learn how the U.S. Federal Government and other large Managed Service Providers (MSPs) are using Cloudflare’s Tenant API to apply security policies like DNS filtering across the organizations they manage.</span></td>
  </tr>
</tbody>
</table><p><b><i>Secure SaaS environments</i></b>These blog posts are focused on maintaining consistent security and visibility across SaaS application environments, in particular to protect leaks of sensitive data.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/casb-dlp/"><span>How Cloudflare CASB and DLP work together to protect your data</span></a></td>
    <td><span>Cloudflare Zero Trust will introduce capabilities between our CASB and DLP services that will enable administrators to peer into the files stored in their SaaS applications and identify sensitive data inside them.</span></td>
  </tr>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/dlp-area1-to-protect-data-in-email/"><span>How Cloudflare Area 1 and DLP work together to protect data in email</span></a></td>
    <td><span>Cloudflare is combining capabilities from Area 1 Email Security and Data Loss Prevention (DLP) to provide complete data protection for corporate email. </span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/casb-adds-salesforce-and-box-integrations"><span>Cloudflare CASB: Scan Salesforce and Box for security issues</span></a></td>
    <td><span>Cloudflare CASB now integrates with Salesforce and Box, enabling IT and security teams to scan these SaaS environments for security risks.</span></td>
  </tr>
</tbody>
</table><p><i><b>Accelerating and securing connectivity</b></i>In addition to product capabilities, blog posts in this section highlight speed and other strategic benefits that organizations realize with Cloudflare.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/why-cios-select-cloudflare-one/"><span>Why do CIOs choose Cloudflare One?</span></a></td>
    <td><span>As part of CIO Week, we spoke with the leaders of some of our largest customers to better understand why they selected Cloudflare One. Learn six thematic reasons why.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/network-performance-update-cio-edition/"><span>Cloudflare is faster than Zscaler</span></a></td>
    <td><span>Cloudflare is 38-55% faster at delivering Zero Trust experiences than Zscaler, as validated by </span><a href="https://www.cloudflare.com/lp/miercom-report-cloudflare-vs-zscaler/?cf_target_id=1C6571CB318780CED4741A383010B000"><span>third party testing</span></a><span>.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/location-aware-warp/"><span>Network detection and settings profiles for the Cloudflare One agent</span></a></td>
    <td><span>Cloudflare's device client (WARP) can now securely detect pre-configured locations and route traffic based on the needs of the organization for that location.</span></td>
  </tr>
</tbody>
</table><p><b><i>Making Cloudflare easier to use</i></b>These blog posts highlight innovations across the Cloudflare portfolio, and outside the Zero Trust and SASE categories, to help organizations secure and accelerate traffic with ease.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/preview-today/"><span>Preview any Cloudflare product today</span></a></td>
    <td><span>Enterprise customers can now start previewing non-contracted services with a single click in the dashboard. </span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/improved-api-access-control/"><span>Improved access controls: API access can now be selectively disabled</span></a></td>
    <td><span>Cloudflare is making it easier for account owners to view and manage the access their users have on an account by allowing them to restrict API access to the account.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/zone-versioning-ga"><span>Zone Versioning is now generally available</span></a></td>
    <td><span>Zone Versioning allows customers to safely manage zone configuration by versioning changes and choosing how and when to deploy those changes to defined environments of traffic. </span></td>
  </tr>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/app-services-private-networks"><span>Cloudflare Application Services for private networks: do more with the tools you already love</span></a></td>
    <td><span>Cloudflare is unlocking operational efficiencies by working on integrations between our <a href="https://www.cloudflare.com/application-services/">Application Services</a> to protect Internet-facing websites and our Cloudflare One platform to protect corporate networks. </span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Collaborating with the right partners</h3>
      <a href="#collaborating-with-the-right-partners">
        
      </a>
    </div>
    <p>In addition to new programming for our channel partners, these blog posts describe deeper technical integrations that help organizations work more efficiently with the IT and security tools they already use.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/expanding-our-collaboration-with-microsoft-proactive-and-automated-zero-trust-security/"><span>Expanding our Microsoft collaboration: Proactive and automated Zero Trust security for customers</span></a></td>
    <td><span>Cloudflare announced four new integrations between Microsoft Azure Active Directory (Azure AD) and Cloudflare Zero Trust that reduce risk proactively. These integrated offerings increase automation, allowing security teams to focus on threats versus implementation and maintenance. </span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/api-based-email-scanning"><span>API-based email scanning</span></a></td>
    <td><span>Now, Microsoft Office 365 customers can deploy Area 1 cloud email security via Microsoft Graph API. This feature enables O365 customers to quickly deploy the Area 1 product via API, with onboarding through the Microsoft Marketplace coming in the near future.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/china-express"><span>China Express: Cloudflare partners to boost performance in China for corporate networks</span></a></td>
    <td><span>China Express is a suite of offerings designed to simplify connectivity and improve performance for users in China and developed in partnership with China Mobile International and China Broadband Communications.</span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/cloudflare-one-authorized-services-delivery-partner-track/"><span>Announcing the Authorized Partner Service Delivery Track for Cloudflare One</span></a></td>
    <td><span>Cloudflare announced the limited availability of a new specialization track for our channel and implementation partners, designed to help develop their expertise in delivering Cloudflare One services. </span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Streamlining your multi-cloud strategy</h3>
      <a href="#streamlining-your-multi-cloud-strategy">
        
      </a>
    </div>
    <p>These blog posts highlight innovations that make it easier for organizations to simply ‘plug into’ Cloudflare’s network and send traffic from any source to any destination.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Beta</span><span>: </span><a href="http://staging.blog.mrk.cfdata.org/magic-wan-connector/"><span>Announcing the Magic WAN Connector: the easiest on-ramp to your next generation network</span></a></td>
    <td><span>Cloudflare is making it even easier to get connected with the Magic WAN Connector: a lightweight software package you can install in any physical or cloud network to automatically connect, steer, and shape any IP traffic. </span><a href="https://www.cloudflare.com/lp/magic-wan-connector/"><span>Sign up for early access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA</span><span>: </span><a href="http://staging.blog.mrk.cfdata.org/cloud-cni"><span>Cloud CNI privately connects your clouds to Cloudflare</span></a></td>
    <td><span>Customers using Google Cloud Platform, Azure, Oracle Cloud, IBM Cloud, and Amazon Web Services can now open direct connections from their private cloud instances into Cloudflare.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/cardinal-directions-and-network-traffic/"><span>Cloudflare protection for all your cardinal directions</span></a></td>
    <td><span>This blog post recaps how definitions of corporate network traffic have shifted and how Cloudflare One provides protection for all traffic flows, regardless of source or destination.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[CASB]]></category>
            <guid isPermaLink="false">477jyoRer3hkZsismayuDK</guid>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Zero Trust for managed service providers]]></title>
            <link>https://blog.cloudflare.com/gateway-managed-service-provider/</link>
            <pubDate>Fri, 13 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Adding new features to Cloudflare Zero Trust for Managed Service Providers using Gateway DNS. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LupcKjKO1teV5gGz3OTTC/b5aaa97d1513793e8ff2eaef519e8ef7/image4-18.png" />
            
            </figure><p>As part of CIO week, we are announcing a new integration between our DNS Filtering solution and our Partner Tenant platform that supports parent-child policy requirements for our partner ecosystem and our direct customers. Our <a href="https://developers.cloudflare.com/tenant/">Tenant platform</a>, launched in <a href="/announcing-the-new-cloudflare-partner-platform/">2019</a>, has allowed Cloudflare partners to easily integrate Cloudflare solutions across millions of customer accounts. <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>, introduced in <a href="/protect-your-team-with-cloudflare-gateway/">2020</a>, has grown from protecting personal networks to <a href="https://www.cloudflare.com/case-studies/fortune-500-telecommunications-provider/">Fortune 500</a> enterprises in just a few short years. With the integration between these two solutions, we can now help Managed Service Providers (MSPs) support large, multi-tenant deployments with parent-child policy configurations and account-level policy overrides that seamlessly <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect global employees from threats online</a>.</p>
    <div>
      <h2>Why work with Managed Service Providers?</h2>
      <a href="#why-work-with-managed-service-providers">
        
      </a>
    </div>
    <p>Managed Service Providers (MSPs) are a critical part of the <a href="https://www.cloudflare.com/cio/">toolkit</a> of many CIOs. In the age of disruptive technology, hybrid work, and shifting business models, outsourcing IT and <a href="https://www.cloudflare.com/soc-as-a-service/">security operations</a> can be a fundamental decision that drives strategic goals and ensures business success across organizations of all sizes. An MSP is a third-party company that remotely manages a customer's information technology (IT) infrastructure and end-user systems. MSPs promise deep technical knowledge, threat insights, and tenured expertise across a variety of security solutions to protect from <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">ransomware</a>, malware, and other online threats. The decision to partner with an MSP can allow internal teams to focus on more strategic initiatives while providing access to easily deployable, competitively priced IT and security solutions. Cloudflare has been making it easier for our customers to work with MSPs to <a href="https://www.cloudflare.com/learning/insights-roadmap-zerotrust/">deploy and manage a complete Zero Trust transformation</a>.</p><p>One decision criteria for selecting an appropriate MSP is the provider’s ability to keep the partner’s best technology, security and cost interests in mind. An MSP should be leveraging innovative and lower cost security solutions whenever possible to drive the best value to your organization. Out of date technology can quickly incur higher implementation and maintenance costs compared to more modern and purpose-built solutions given the broader attack surface brought about by hybrid work. In a developing space like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, an effective MSP should be able to support vendors that can be deployed globally, managed at scale, and effectively enforce global corporate policy across business units. Cloudflare has worked with many MSPs, some of which we will highlight today, that <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implement and manage Zero Trust security policies</a> cost-effectively at scale.</p><p>The MSPs we are highlighting have started to deploy Cloudflare Gateway DNS Filtering to complement their portfolio as part of a Zero Trust <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access control strategy</a>. DNS filtering provides quick time-to-value for organizations seeking protection from ransomware, malware, phishing, and other Internet threats. DNS filtering is the process of using the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">Domain Name System</a> to block malicious websites and prevent users from reaching harmful or inappropriate content on the Internet. This ensures that company data remains secure and allows companies to have control over what their employees can access on company-managed networks and devices.</p><p>Filtering policies are often set by the Organization with consultation from the service provider. In some cases, these policies also need to be managed independently at the account or business unit level by either the MSP or the customer. This means it is very common for a parent-child relationship to be required to balance the deployment of corporate level rules from customization across devices, office locations, or business units. This structure is vital for MSPs that are deploying access policies across millions of devices and accounts.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7g8ziSiEwRjBARMwm1MBd0/b55638156897fa355ccc805035391df4/image2-29.png" />
            
            </figure>
    <div>
      <h2>Better together: Zero Trust ❤️ Tenant Platform</h2>
      <a href="#better-together-zero-trust-tenant-platform">
        
      </a>
    </div>
    <p>To make it easier for MSPs to manage millions of accounts with appropriate access controls and policy management, we integrated Cloudflare Gateway with our existing Tenant platform with a new feature that provides parent-child configurations. This allows MSP partners to create and manage accounts, set global corporate security policies, and allow appropriate management or overrides at the individual business unit or team level.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4xsI2eVC17cv93aRq4zwoO/3f1810292d6182496e7c557b2c56dc51/image1-39.png" />
            
            </figure><p>The Tenant platform allows MSPs ability to create millions of end customer accounts at their discretion to support their specific onboarding and configurations. This also ensures proper separation of ownership between customers and allows end customers to access the Cloudflare dashboard directly, if required.</p><p>Each account created is a separate container of subscribed resources (zero trust policies, zones, workers, etc.) for each of the MSPs end customers. Customer administrators can be invited to each account as necessary for self-service management, while the MSP retains control of the capabilities enabled for each account.</p><p>With MSPs now able to set up and manage accounts at scale, we’ll explore how the integration with Cloudflare Gateway lets them manage scaled DNS filtering policies for these accounts.</p>
    <div>
      <h2>Tiered Zero Trust accounts</h2>
      <a href="#tiered-zero-trust-accounts">
        
      </a>
    </div>
    <p>With individual accounts for each MSP end customer in place, MSPs can either fully manage the deployment or provide a self-service portal backed by Cloudflare configuration APIs. Supporting a configuration portal also means you would never want your end users to block access to this domain, so the MSP can add a hidden policy to all of its end customer accounts when they onboard which would be a simple one time API call. Although issues start to arise anytime they need to push an update to said policy, this now means they have to update the policy once for each and every MSP end customer and for some MSPs that can mean over 1 million API calls.</p><p>To help turn this into a single API call, we introduced the concept of a top level account aka parent account. This parent account allows MSPs to set global policies which are applied to all DNS queries before the subsequent MSP end customer policies aka child account policies. This structure helps ensure MSPs can set their own global policies for all of their child accounts while each child account can further filter their DNS queries to meet their needs without impacting any other child account.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GTw6mxoNZyAHbq7a5xlT6/dee6e9c8307254ed3de33df9dab562e2/image3-25.png" />
            
            </figure><p>This extends further than just policies as well, each child account can create their own custom block page, <a href="/bring-your-certificates-cloudflare-gateway/">upload their own certificates</a> to display these block pages, and set up their own DNS endpoints (IPv4, IPv6, DoH, and DoT) via Gateway locations. Also, because these are the exact same as non-MSP Gateway accounts, there aren’t any lower limits when it comes to the default limits on the number policies, locations, or lists per parent or child account.</p>
    <div>
      <h2>Managed Service Provider integrations</h2>
      <a href="#managed-service-provider-integrations">
        
      </a>
    </div>
    <p>To help bring this to life, below are real-world examples of how Cloudflare customers are using this new managed service provider feature to help protect their organizations.</p>
    <div>
      <h3>US federal government</h3>
      <a href="#us-federal-government">
        
      </a>
    </div>
    <p>The US federal government requires many of the same services to support a protective DNS service for their 100+ civilian agencies, and they often outsource many of their IT and security operations to service providers like Accenture Federal Services (AFS).</p><p><a href="/helping-keep-governments-safe-and-secure/">In 2022</a>, Cloudflare and AFS were selected by Cybersecurity and Infrastructure Security Agency (CISA) with the Department of Homeland Security (DHS) to develop a joint solution to help the federal government defend itself against cyberattacks. The solution consists of Cloudflare’s protective DNS resolver which will filter DNS queries from offices and locations of the federal government and stream events directly to Accenture’s platform to provide unified administration and log storage.</p><p>Accenture Federal Services is providing a central interface to each department that allows them to adjust their DNS filtering policies. This interface works with Cloudflare’s Tenant platform and Gateway client APIs to provide a seamless customer experience for government employees managing their security policies using our new parent-child configurations. CISA, as the parent account, can set their own global policies, while allowing agencies, child accounts, to bypass select global policies, and set their own default block pages.</p><p>In conjunction with our parent-child structure we provided a few improvements to our DNS location matching and filtering defaults. Currently, all Gateway accounts can purchase a dedicated IPv4 resolver IP address(es) and these are great for situations where a customer doesn’t have a static source IP address or wants their own IPv4 address to host the solution.</p><p>For CISA, they wanted not only a dedicated IPv4 address but to assign that same address from their parent account to their child accounts. This would allow them to have their own default IPv4 addresses for all agencies easing the burden of onboarding. Next they also want the ability to fail closed, which means if a DNS query did not match any location (which must have a source IPv4 address/network configured) it would be dropped. This allows CISA to ensure only configured IPv4 networks had access to their protective services. Lasty, we didn’t have to address this with IPv6, DoH, and DoT DNS endpoints as those are custom with each and every DNS location created.</p>
    <div>
      <h3>Malwarebytes</h3>
      <a href="#malwarebytes">
        
      </a>
    </div>
    <p><a href="https://www.malwarebytes.com/">Malwarebytes</a>, a global leader in real-time cyber protection, recently integrated with Cloudflare to provide a DNS filtering module within their Nebula platform. The Nebula platform is a cloud-hosted security operations solution that manages control of any malware or ransomware incident—from alert to fix. This new module allows Malwarebytes customers to filter on content categories and add policy rules for groups of devices. A key need was the ability to easily integrate with their current device client, provide individual account management, and provide room for future expansion across additional Zero Trust services like <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a>.</p><p>Cloudflare was able to provide a comprehensive solution that was easily integrated into the Malwarebytes platform. This included using <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-https/">DNS-over-HTTP (DoH)</a> to segment users across unique locations and adding a <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/dns/dns-over-https/#filter-doh-requests-by-user">unique token per device</a> to properly track the device ID and apply the correct DNS policies. And lastly, the integration was completed using the Cloudflare <a href="https://developers.cloudflare.com/tenant/">Tenant API</a> which allowed seamless integration with their current workflow and platform. This combination of our Zero Trust services and Tenant platform let Malwarebytes quickly go to market for new segments within their business.</p><p>“It’s challenging for organizations today to manage access to malicious sites and keep their end users safe and productive. Malwarebytes’ DNS Filtering module extends our cloud-based security platform to web protection. After evaluating other Zero Trust providers it was clear to us that Cloudflare could offer the comprehensive solution IT and security teams need while providing lightning fast performance at the same time. Now, IT and security teams can block whole categories of sites, take advantage of an extensive database of pre-defined scores on known, suspicious web domains, protect core web-based applications and manage specific site restrictions, removing the headache from overseeing site access.” - <a href="https://press.malwarebytes.com/2022/06/08/malwarebytes-continues-to-expand-endpoint-protection-platform-with-dns-filtering-module%EF%BF%BC/">Mark Strassman, Chief Product Officer, Malwarebytes</a></p>
    <div>
      <h3>Large global ISP</h3>
      <a href="#large-global-isp">
        
      </a>
    </div>
    <p>We’ve been working with a large global ISP recently to support DNS filtering which is a part of a larger security solution offered for families for over one million accounts in just the first year! The ISP leverages our Tenant and Gateway APIs to seamlessly integrate into their current platform and user experience with minimal engineering effort. We look forward to sharing more detail around this implementation in the coming months.</p>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>As the previous stories highlight, MSPs play a key role in securing today’s diverse ecosystem of organizations, of all sizes and maturities. Companies of all sizes find themselves squaring off against the same complex threat landscape and are challenged to <a href="https://www.cloudflare.com/cybersecurity-risk-management/">maintain a proper security posture and manage risk</a> with constrained resources and limited security tooling. MSPs provide the additional resources, expertise and advanced security tooling that can help reduce the risk profile for these companies. Cloudflare is committed to making it easier for MSPs to be effective in delivering <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust solutions</a> to their customers.</p><p>Given the importance of MSPs for our customers and the continued growth of our partner network, we plan to launch quite a few features in 2023 and beyond that better support our MSP partners. First, a key item on our roadmap is the development of a refreshed tenant management dashboard for improved account and user management. Second, we want to extend our multi-tenant configurations across our entire Zero Trust solution set to make it easier for MSPs to implement secure hybrid work solutions at scale.</p><p>Lastly, to better support hierarchical access, we plan to expand the user roles and access model currently available to MSP partners to allow their teams to more easily support and manage their various accounts. Cloudflare has always prided itself on its ease of use, and our goal is to make Cloudflare the Zero Trust platform of choice for service and security providers globally.</p><p>Throughout CIO week, we’ve touched on how our partners are helping modernize the security posture for their customers to align with a world transformed by hybrid work and hybrid multi-cloud infrastructures. Ultimately, the power of Cloudflare Zero Trust comes from its existence as a composable, unified platform that draws strength from its combination of products, features, and our partner network.</p><ul><li><p>If you’d like to learn more about becoming an MSP partner, you can read more here: <a href="https://www.cloudflare.com/partners/services">https://www.cloudflare.com/partners/services</a></p></li><li><p>If you’d like to learn more about improving your security with DNS Filtering and Zero Trust, or would like to get started today, test the platform yourself with 50 free seats by <a href="https://dash.cloudflare.com/sign-up/teams">signing up here</a>.</p></li></ul><p></p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">1ZjH3lDdN67ZykIJ2Poclf</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Dan Hollinger</dc:creator>
            <dc:creator>Teddy Solano</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Application Services for private networks: do more with the tools you already love]]></title>
            <link>https://blog.cloudflare.com/app-services-private-networks/</link>
            <pubDate>Fri, 13 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce new integrations that make it possible to unlock operational and cost efficiencies for IT teams by allowing them to do more with fewer tools, and enable new use cases that are impossible without Cloudflare’s  “every service everywhere” architecture. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19EYuMAVuO7G3gCRRRPhWg/2fe36298d6366dd5948372ab4bd08b06/image2-28.png" />
            
            </figure><p>Cloudflare’s <a href="https://www.cloudflare.com/application-services/">Application Services</a> have been hard at work keeping Internet-facing websites and applications secure, fast, and reliable for over a decade. <a href="https://www.cloudflare.com/cloudflare-one/#transformation">Cloudflare One</a> provides similar security, performance, and reliability benefits for your entire corporate network. And today, we’re excited to announce new integrations that make it possible to use these services together in new ways. These integrations unlock operational and cost efficiencies for IT teams by allowing them to do more with fewer tools, and enable new use cases that are impossible without Cloudflare’s  “every service everywhere” architecture.</p><blockquote><p><i>“Just as Canva simplifies graphic design, Cloudflare simplifies performance and security. Thanks to Cloudflare, we can focus on growing our product and expanding into new markets with confidence, knowing that our platform is fast, reliable, and secure.” - </i><b><i>Jim Tyrrell</i></b><i>, Head of Infrastructure, Canva</i></p></blockquote>
    <div>
      <h3>Every service everywhere, now for every network</h3>
      <a href="#every-service-everywhere-now-for-every-network">
        
      </a>
    </div>
    <p>One of Cloudflare’s fundamental architectural principles has always been to treat our network like one homogeneous supercomputer. Rather than deploying services in specific locations - for example, using some of our points of presence to enforce <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> policies, others for Zero Trust controls, and others for traffic optimization - every server runs a virtually identical stack of all of our software services. This way, a packet can land on any server and flow through a full set of security filters in a single pass, without having to incur the performance tax of hair pinning to multiple locations.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2feVltGTqj2dzzVvq7r0YQ/a3f5a8d3edd5bbfc86f4ab3e6af61a07/image1-38.png" />
            
            </figure><p>The software that runs on each of these servers is Linux-based and takes advantage of core concepts of the Linux kernel in order to create “wiring” between services. This <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">deep dive on our DDoS mitigation stack</a> explains just one example of how we use these tools to route packets through multiple layers of protection without sacrificing performance. This approach also enables us to easily add new paths for packets and requests, enabling deeper integrations and new possibilities for traffic routed to Cloudflare’s network from any source or to any destination. Let’s walk through some of these new use cases we’re developing for private networks.</p>
    <div>
      <h3>Web Application Firewall for private apps with any off-ramp</h3>
      <a href="#web-application-firewall-for-private-apps-with-any-off-ramp">
        
      </a>
    </div>
    <p>Today, millions of customers trust Cloudflare’s WAF to protect their applications that are exposed to the public Internet - either fully public apps or private apps connected via <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/">Cloudflare Tunnel</a> and surfaced with a public hostname. We’ve increasingly heard from customers that are excited about putting our WAF controls in front of any application with any traffic on or off-ramp, for a variety of reasons.</p><p>Some customers want to do this in order to enforce stronger <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust principles</a>: filtering all traffic, even requests sourced from within a “trusted” private network, as though it came from the open Internet. Other customers want to connect an entire datacenter or cloud property with a network-layer on-ramp like a GRE or IPsec tunnel or <a href="https://developers.cloudflare.com/network-interconnect/">CNI</a>. And yet others want to adopt the Cloudflare WAF for their private apps without specifying public hostnames.</p><p>By fully integrating Cloudflare’s WAF with the Cloudflare One dataplane, we’re excited to address all of these use cases: enabling customers to create WAF policies in-path for fully private traffic flows by building their private network on Cloudflare.</p>
    <div>
      <h3>API security for internal APIs</h3>
      <a href="#api-security-for-internal-apis">
        
      </a>
    </div>
    <p>After web applications, one of the next <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surfaces</a> our customers turn to addressing is their public-facing <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">APIs</a>. Cloudflare offers <a href="https://www.cloudflare.com/application-services/solutions/api-security/">services</a> to protect public APIs from DDoS, abuse, sensitive data loss, and many other attack vectors. But security concerns don’t stop with public-facing APIs: as engineering organizations continue to embrace distributed architecture, multicloud and microsegmentation, <a href="https://www.cloudflare.com/cio/">CIOs</a> and teams that provide internal services are also interested in securing their private APIs.</p><p>With Cloudflare One, customers can connect and route their entire private network through our global fabric, enabling private API traffic to flow through the same stack of security controls we’ve previously made available for public APIs. Networking and security teams will be able to apply the principles of zero trust to their private API traffic flow to help improve their overall security posture.</p>
    <div>
      <h3>Global and local traffic management for private apps</h3>
      <a href="#global-and-local-traffic-management-for-private-apps">
        
      </a>
    </div>
    <p>So far, we’ve focused on the security controls customers have available to filter malicious traffic to their applications and APIs. But Cloudflare’s services don’t stop with security: we make anything connected to the Internet faster and more reliable. One of the key tools enabling this is our suite of load balancing services, which include application-layer controls for any origin server behind Cloudflare’s <a href="https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/">reverse proxy</a> and <a href="https://developers.cloudflare.com/magic-wan/about/traffic-steering/">network-layer controls</a> for any IP traffic.</p><p>Customers have asked for even more flexibility and new ways to use our traffic management tools: the ability to create application-layer load balancing policies for traffic connected with any off-ramp, such as Cloudflare Tunnel for applications, GRE or IPsec tunnels or CNI for IP networks. They also are excited about the potential to extend load balancing policies into their local networks, managing traffic across servers within a datacenter or cloud property in addition to across multiple “global” locations. These capabilities, which will improve resiliency for any application - both by enforcing more granular controls for private apps and managing local traffic for any app - are coming soon; stay tuned for more updates.</p>
    <div>
      <h3>Full-stack performance optimization for private apps</h3>
      <a href="#full-stack-performance-optimization-for-private-apps">
        
      </a>
    </div>
    <p>Cloudflare has always obsessed over the speed of every request routed through our network. We’re constantly developing new ways to deliver content closer to users, automatically optimize any kind of traffic, and route packets over the best possible paths, avoiding congestion and other issues on the Internet. <a href="https://www.cloudflare.com/products/argo-smart-routing/">Argo Smart Routing</a> speeds up any reverse proxied traffic with application-layer optimizations and IP packets with intelligent decisions at the network layer, using Cloudflare’s extensive interconnectivity and global private backbone to make sure that traffic is delivered as quickly and efficiently as possible.</p><p>As we more deeply integrate Cloudflare’s private networking dataplane and our application services to realize the security and reliability benefits described above, customers will automatically be able to see the benefits of Argo Smart Routing at all layers of the OSI stack for any traffic connected to Cloudflare.</p>
    <div>
      <h3>Private DNS for one-stop management of internal network resources</h3>
      <a href="#private-dns-for-one-stop-management-of-internal-network-resources">
        
      </a>
    </div>
    <p>Cloudflare’s industry-leading <a href="https://www.cloudflare.com/dns/">authoritative DNS</a> protects millions of public Internet domains. These can be queried by anyone on the public Internet, which is great for most organizations, but some want to be able to restrict this access. With our private DNS, customers will be able to resolve queries to private domains only when connected to the Zero Trust private network they define within Cloudflare. Because we’re building this using our robust authoritative DNS and Gateway filtering services, you can expect all the other goodness already possible with Cloudflare to also apply to private DNS: support for all common DNS record types, the ability to resolve to DNS queries to virtual networks with overlapping IPs, and all the other Zero Trust filtering control offered by Gateway DNS filtering. Consolidating management of external and internal DNS in one place, with the fastest response time, unparalleled redundancy, and advanced security already built in, will greatly simplify customers’ infrastructure and save time and operational overhead.</p>
    <div>
      <h3>And more new use cases every day</h3>
      <a href="#and-more-new-use-cases-every-day">
        
      </a>
    </div>
    <p>We love hearing about new ways you’re using Cloudflare to make any user, application, or network faster, more secure, and more reliable. <a href="https://www.cloudflare.com/lp/application-services-for-private-networks/">Get on the list</a> for beta access to the new integrations described today and reach out to us in the comments if you’ve got more ideas for new problems you’d like to solve using Cloudflare.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[NaaS]]></category>
            <guid isPermaLink="false">45eViIuDoxN53vCcJ5RO3m</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[China Express: Cloudflare partners to boost performance in China for corporate networks]]></title>
            <link>https://blog.cloudflare.com/china-express/</link>
            <pubDate>Fri, 13 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ China Express is a suite of connectivity and performance offerings designed to improve application performance for users in China. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3l66m1AWwUMi6FodtAFk4g/458ba9ec5b0fb9515645de51316e4928/image2-26.png" />
            
            </figure><p>Cloudflare has been helping global organizations offer their users a consistent experience all over the world. This includes mainland China, a market our global customers cannot ignore but that continues to be challenging for infrastructure teams trying to ensure performance, security and reliability for their applications and users both in and outside mainland China. We are excited to announce China Express — a new suite of capabilities and best practices in partnership with our partners China Mobile International (CMI) and CBC Tech — that help address some of these performance challenges and ensure a consistent experience for customers and employees everywhere.</p><p>Cloudflare has been providing <a href="https://www.cloudflare.com/application-services/">Application Services</a> to users in mainland China since 2015, improving performance and security using in-country data centers and caching. Today, we have a presence in 30 cities in mainland China thanks to our strategic partnership with <a href="/cloudflare-partners-with-jd-cloud/">JD Cloud</a>. While this delivers significant performance improvements, some requests still need to go back to the origin servers which may live outside mainland China. With limited international Internet gateways and restrictive cross-border regulations, international traffic has a very high latency and packet drop rate in and out of China. This results in inconsistent cached content within China and a poor experience for users trying to access dynamic content that requires frequent access to the origin.</p><p>Last month, we expanded our Cloudflare One, Zero Trust <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service</a> platform to users and organizations in China with additional connectivity options. This has received tremendous interest from customers, so we’re looking at what else we could do to further improve the user experience for customers with employees or offices in China.</p>
    <div>
      <h3>What is China Express?</h3>
      <a href="#what-is-china-express">
        
      </a>
    </div>
    <p>China Express is a suite of connectivity and performance offerings designed to simplify connectivity and improve performance for users in China. To understand these better, let’s take an example of Acme Corp, a global company with offices in Shanghai and Beijing — with origin data centers in London and Ashburn. And let’s see how we can help their infrastructure teams better serve employees and users in mainland China.</p>
    <div>
      <h3>China Express Premium DIA</h3>
      <a href="#china-express-premium-dia">
        
      </a>
    </div>
    <p>Premium Dedicated Internet Access, is an optimized, high-quality public Internet circuit for cross-border connectivity provided by our local partners CMI and CBC Tech. With this service, traffic from mainland China will arrive at our partner data center in Hong Kong, using a fixed NAT IP. Customers do not worry about compliance issues because their traffic still goes through the public Internet with all regulatory controls in place.</p><p>Acme Corp can use Premium DIA to improve origin performance for their Cloudflare service in mainland China. Requests to the origin data centers in Ashburn and London would traverse the Premium DIA connection, which offers more bandwidth and lower packet loss resulting in more than a 60% improvement in performance.</p><p>Acme employees in mainland China would also see an improvement while accessing SaaS applications such as Microsoft 365 over the Internet when these apps are delivered from outside China. They would also notice an improvement in Internet speed in general.</p>
    <div>
      <h3>China Express Private Link</h3>
      <a href="#china-express-private-link">
        
      </a>
    </div>
    <p>While Premium DIA offers Acme performance improvements over the public Internet, they may want to keep some mission-critical application traffic on a private network for security reasons. Private link offers a dedicated private tunnel between Acme’s locations in China and their data centers outside of China. Private Link can also be used to establish dedicated private connectivity to SaaS data centers like Salesforce.</p><p>Private Link is a highly regulated area in China and depending on your use case, there might be additional requirements from our partners to implement it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tNTZTDshIoX7mWpa1dbs9/269ae731a302957dffeedaeb17633069/image1-33.png" />
            
            </figure>
    <div>
      <h3>China Express Travel SIM</h3>
      <a href="#china-express-travel-sim">
        
      </a>
    </div>
    <p>Acme Corp might have employees visiting China on a regular basis and need access to their corporate apps on their mobile devices including phones and tablets. Their IT teams not only have to procure and provision mobile Internet connectivity for their users, but also enforce consistent <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> controls.</p><p>Cloudflare is pleased to announce that the Travel SIM provided by Cloudflare’s partner CMI automatically provides network connectivity and can be used together with the Cloudflare WARP Client on mobile devices to provide Cloudflare’s suite of Zero Trust security services. Using the same Zero Trust profiles assigned to the user, the WARP client will automatically use the available 4G LTE network and establish a WireGuard tunnel to the closest Cloudflare data center outside of China. The data connection can also be shared with other devices using the hotspot function on the mobile device.</p><p>With the Travel SIM, users can enjoy the same Cloudflare global service as the rest of the world when traveling to China. And IT and security teams no longer need to worry about purchasing or deploying additional Zero Trust seats and device clients to ensure the employees’ Internet connection and the security policy enforcement.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gQPs5y5YsCpGrrWnzytl8/4f28ba9f9a3a7c0318bcce4c9c77931c/image3-24.png" />
            
            </figure>
    <div>
      <h3>China Express — Extending Cloudflare One to China</h3>
      <a href="#china-express-extending-cloudflare-one-to-china">
        
      </a>
    </div>
    <p>As mentioned in a previous blog post, we are extending Cloudflare One, our zero trust network-as-a-service product, to <a href="/cloudflare-one-in-china/">mainland China</a> through our strategic partnerships. Acme Corp will now be able to ensure their employees both inside and outside China will be able to use consistent zero trust security policy using the Cloudflare WARP device client. In addition, they will be able to connect their physical offices in China to their global private WAN using Magic WAN with consistent security policies applied globally.</p>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>Cloudflare is excited to work with  our partners to help our customers solve connectivity and performance challenges in mainland China. All the above solutions are easy and fast to deploy and are available now. If you’d like to get started, contact us <a href="https://www.cloudflare.com/china-network/">here</a> or reach out to your account team.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[China Network]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">YF1uzQYYGovH8CLHGbeCC</guid>
            <dc:creator>Dafu Wang</dc:creator>
            <dc:creator>Ameet Naik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Give us a ping. (Cloudflare) One ping only.]]></title>
            <link>https://blog.cloudflare.com/the-most-exciting-ping-release/</link>
            <pubDate>Fri, 13 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Now Zero Trust administrators can use the familiar debugging tools that we all know and love like ping, traceroute, and MTR to test connectivity to private network destinations running behind their Tunnels ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nZa6ahqyj7z2sii9QERbV/2c9ee66f5628c47da9a20fab9c85516e/image1-35.png" />
            
            </figure><p>Ping was born in 1983 when the Internet needed a simple, effective way to measure reachability and distance. In short, ping (and subsequent utilities like traceroute and MTR)  provides users with a quick way to validate whether one machine can communicate with another. Fast-forward to today and these network utility tools have become ubiquitous. Not only are they now the de facto standard for troubleshooting connectivity and network performance issues, but they also improve our overall quality of life by acting as a common suite of tools almost all Internet users are comfortable employing in their day-to-day roles and responsibilities.</p><p>Making network utility tools work as expected is very important to us, especially now as more and more customers are building their private networks on Cloudflare. Over 10,000 teams now run a private network on Cloudflare. Some of these teams are among the world's largest enterprises, some are small crews, and yet others are hobbyists, but they all want to know - can I reach that?</p><p>That’s why today we’re excited to incorporate support for these utilities into our already expansive troubleshooting toolkit for Cloudflare Zero Trust. To get started, <a href="https://forms.gle/gpfGAJW2jsxykC6y9">sign up</a> to receive beta access and start using the familiar debugging tools that we all know and love like ping, traceroute, and MTR to test connectivity to private network destinations running behind Tunnel.</p>
    <div>
      <h2>Cloudflare Zero Trust</h2>
      <a href="#cloudflare-zero-trust">
        
      </a>
    </div>
    <p>With Cloudflare Zero Trust, we’ve made it <a href="/ridiculously-easy-to-use-tunnels/">ridiculously easy</a> to build your private network on Cloudflare. In fact, it takes just three steps to get started. First, download Cloudflare’s device client, WARP, to connect your users to Cloudflare. Then, create identity and device aware policies to determine who can reach what within your network. And finally, connect your network to Cloudflare with Tunnel directly from the Zero Trust dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Fn9l1D4DFiBYv2JSmpT1Z/c8566a62163b04b8dafb8752f1dd7104/Untitled-1.png" />
            
            </figure><p>We’ve designed Cloudflare Zero Trust to act as a single pane of glass for your organization. This means that after you’ve deployed <i>any</i> part of our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> solution, whether that be <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">ZTNA</a> or <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">SWG</a>, you are clicks, not months, away from deploying <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Browser Isolation</a>, <a href="https://www.cloudflare.com/products/zero-trust/dlp/">Data Loss Prevention</a>, <a href="https://www.cloudflare.com/products/zero-trust/casb/">Cloud Access Security Broker</a>, and <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Email Security</a>. This is a stark contrast from other solutions on the market which may require distinct implementations or have limited interoperability across their portfolio of services.</p><p>It’s that simple, but if you’re looking for more prescriptive guidance watch our <a href="https://www.cloudflare.com/products/zero-trust/interactive-demo/">demo</a> below to get started:</p><div></div>
<p></p><p>To get started, sign-up for early access to the closed beta. If you’re interested in learning more about how it works and what else we will be launching in the future, keep scrolling.</p>
    <div>
      <h2>So, how do these network utilities actually work?</h2>
      <a href="#so-how-do-these-network-utilities-actually-work">
        
      </a>
    </div>
    <p>Ping, traceroute and MTR are all powered by the same underlying <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-protocol/">protocol</a>, ICMP. Every <a href="https://www.cloudflare.com/learning/ddos/glossary/internet-control-message-protocol-icmp/">ICMP</a> message has 8-bit type and code fields, which define the purpose and semantics of the message. While ICMP has many types of messages, the network diagnostic tools mentioned above make specific use of the echo request and echo reply message types.</p><p>Every ICMP message has a type, code and checksum. As you may have guessed from the name, an echo reply is generated in response to the receipt of an echo request, and critically, the request and reply have matching identifiers and sequence numbers. Make a mental note of this fact as it will be useful context later in this blog post.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7D6dGG8IM5rnQXjS4easil/c691a4f6500fe4fd901e6fa33d0377a5/ICMP-header-format.png" />
            
            </figure>
    <div>
      <h2>A crash course in ping, traceroute, and MTR</h2>
      <a href="#a-crash-course-in-ping-traceroute-and-mtr">
        
      </a>
    </div>
    <p>As you may expect, each one of these utilities comes with its own unique nuances, but don’t worry. We’re going to provide a quick refresher on each before getting into the nitty-gritty details.</p>
    <div>
      <h3>Ping</h3>
      <a href="#ping">
        
      </a>
    </div>
    <p>Ping works by sending a sequence of echo request packets to the destination. Each router hop between the sender and destination decrements the TTL field of the IP packet containing the ICMP message and forwards the packet to the next hop. If a hop decrements the TTL to 0 before reaching the destination, or doesn’t have a next hop to forward to, it will return an ICMP error message – “TTL exceeded” or “Destination host unreachable” respectively – to the sender. A destination which speaks ICMP will receive these echo request packets and return matching echo replies to the sender. The same process of traversing routers and TTL decrementing takes place on the return trip. On the sender’s machine, ping reports the final TTL of these replies, as well as the roundtrip latency of sending and receiving the ICMP messages to the destination. From this information a user can determine the distance between themselves and the origin server, both in terms of number of network hops and time.</p>
    <div>
      <h3>Traceroute and MTR</h3>
      <a href="#traceroute-and-mtr">
        
      </a>
    </div>
    <p>As we’ve just outlined, while helpful, the output provided by ping is relatively simple. It does provide some useful information, but we will generally want to follow up this request with a traceroute to learn more about the specific path to a given destination. Similar to ping, traceroutes start by sending an ICMP echo request. However, it handles TTL a bit differently. You can <a href="https://www.cloudflare.com/learning/network-layer/what-is-mtr/">learn more</a> about why that is the case in our <a href="https://www.cloudflare.com/learning/">Learning Center</a>, but the important takeaway is that this is how traceroutes are able to map and capture the IP address of each unique hop on the network path. This output makes traceroute an incredibly powerful tool to understanding not only <i>if</i> a machine can connect to another, but also <i>how</i> it will get there! And finally, we’ll cover MTR. We’ve grouped traceroute and MTR together for now as they operate in an extremely similar fashion. In short, the output of an MTR will provide everything traceroute can, but with some additional, aggregate statistics for each unique hop. MTR will also run until explicitly stopped allowing users to receive a statistical average for each hop on the path.</p>
    <div>
      <h2>Checking connectivity to the origin</h2>
      <a href="#checking-connectivity-to-the-origin">
        
      </a>
    </div>
    <p>Now that we’ve had a quick refresher, let’s say I cannot connect to my private application server. With ICMP support enabled on my Zero Trust account, I could run a traceroute to see if the server is online.</p><p>Here is simple example from one of our lab environments:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7auWBc7axco0ez11m2sOSd/e4c1fa9c86f91efe2282dc7800887cbc/ICMP-support-for-Warp-to-Tunnel_d.png" />
            
            </figure><p>Then, if my server is online, traceroute should output something like the following:</p>
            <pre><code>traceroute -I 172.16.10.120
traceroute to 172.16.10.120 (172.16.10.120), 64 hops max, 72 byte packets
 1  172.68.101.57 (172.68.101.57)  20.782 ms  12.070 ms  15.888 ms
 2  172.16.10.100 (172.16.10.100)  31.508 ms  30.657 ms  29.478 ms
 3  172.16.10.120 (172.16.10.120)  40.158 ms  55.719 ms  27.603 ms</code></pre>
            <p>Let’s examine this a bit deeper. Here, the first hop is the Cloudflare data center where my Cloudflare WARP device is connected via our <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">Anycast</a> network. Keep in mind this IP may look different depending on your location. The second hop will be the server running cloudflared. And finally, the last hop is my application server.</p><p>Conversely, if I could not connect to my app server I would expect traceroute to output the following:</p>
            <pre><code>traceroute -I 172.16.10.120
traceroute to 172.16.10.120 (172.16.10.120), 64 hops max, 72 byte packets
 1  172.68.101.57 (172.68.101.57)  20.782 ms  12.070 ms  15.888 ms
 2  * * *
 3  * * *</code></pre>
            <p>In the example above, this means the ICMP echo requests are not reaching cloudflared. To troubleshoot, first I will make sure cloudflared is running by checking the status of the Tunnel in the <a href="https://dash.teams.cloudflare.com/">ZeroTrust dashboard</a>. Then I will check if the Tunnel has a route to the destination IP. This can be found in the Routes column of the Tunnels table in the dashboard. If it does not, I will add a route to my Tunnel to see if this changes the output of my traceroute.</p><p>Once I have confirmed that cloudflared is running and the Tunnel has a route to my app server, traceroute will show the following:</p>
            <pre><code>raceroute -I 172.16.10.120
traceroute to 172.16.10.120 (172.16.10.120), 64 hops max, 72 byte packets
 1  172.68.101.57 (172.68.101.57)  20.782 ms  12.070 ms  15.888 ms
 2  172.16.10.100 (172.16.10.100)  31.508 ms  30.657 ms  29.478 ms
 3  * * *</code></pre>
            <p>However, it looks like we still can’t quite reach the application server. This means the ICMP echo requests reached cloudflared, but my application server isn’t returning echo replies. Now, I can narrow down the problem to my application server, or communication between cloudflared and the app server. Perhaps the machine needs to be rebooted or there is a firewall rule in place, but either way we have what we need to start troubleshooting the last hop. With ICMP support, we now have many network tools at our disposal to troubleshoot connectivity end-to-end.</p><p>Note that the route cloudflared to origin is always shown as a single hop, even if there are one or more routers between the two. This is because cloudflared creates its own echo request to the origin, instead of forwarding the original packets. In the next section we will explain the technical reason behind it.</p>
    <div>
      <h2>What makes ICMP traffic unique?</h2>
      <a href="#what-makes-icmp-traffic-unique">
        
      </a>
    </div>
    <p>A few quarters ago, Cloudflare Zero Trust <a href="/extending-cloudflares-zero-trust-platform-to-support-udp-and-internal-dns/">extended support for UDP</a> end-to-end as well. Since UDP and ICMP are both datagram-based protocols, within the Cloudflare network we can reuse the same infrastructure to proxy both UDP and ICMP traffic. To do this, we send the individual datagrams for either protocol over a QUIC connection using <a href="https://datatracker.ietf.org/doc/html/rfc9221">QUIC datagrams</a> between Cloudflare and the cloudflared instances within your network.</p><p>With UDP, we establish and maintain a <i>session</i> per client/destination pair, such that we are able to send <b>only</b> the UDP payload and a session identifier in datagrams. In this way, we don’t need to send the IP and port to which the UDP payload should be forwarded with every single packet.</p><p>However, with ICMP we decided that establishing a session like this is far too much overhead, given that typically only a handful of ICMP packets are exchanged between endpoints. Instead, we send the entire IP packet (with the ICMP payload inside) as a single datagram.</p><p>What this means is that cloudflared can read the destination of the ICMP packet from the IP header it receives. While this conveys the eventual destination of the packet to cloudflared, there is still work to be done to actually send the packet. Cloudflared cannot simply send out the IP packet it receives without modification, because the source IP in the packet is still the <i>original</i> client IP, and not a source that is routable to the cloudflared instance itself.</p><p>To receive ICMP echo replies in response to the ICMP packets it forwards, cloudflared must apply a source NAT to the packet. This means that when cloudflared receives an IP packet, it must complete the following:</p><ul><li><p>Read the destination IP address of the packet</p></li><li><p>Strip off the IP header to get the ICMP payload</p></li><li><p>Send the ICMP payload to the destination, meaning the source address of the ICMP packet will be the IP of a network interface to which cloudflared can bind</p></li><li><p>When cloudflared receives replies on this address, it must rewrite the destination address of the received packet (destination because the direction of the packet is reversed) to the original client source address</p></li></ul><p>Network Address Translation like this is done all the time for <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">TCP</a> and UDP, but is much easier in those cases because ports can be used to disambiguate cases where the source and destination IPs are the same. Since ICMP packets do not have ports associated with them, we needed to find a way to map packets received from the upstream back to the original source which sent cloudflared those packets.</p><p>For example, imagine that two clients 192.0.2.1 and 192.0.2.2 both send an ICMP echo request to a destination 10.0.0.8. As we previously outlined, cloudflared must rewrite the source IPs of these packets to a source address to which it can bind. In this scenario, when the echo replies come back, the IP headers will be identical: source=10.0.0.8 destination=&lt;cloudflared’s IP&gt;. So, how can cloudflared determine which packet needs to have its destination rewritten to 192.0.2.1 and which to 192.0.2.2?</p><p>To solve this problem, we use fields of the ICMP packet to track packet flows, in the same way that ports are used in TCP/UDP NAT. The field we’ll use for this purpose is the Echo ID. When an echo request is received, conformant ICMP endpoints will return an echo reply with the same identifier as was received in the request. This means we can send the packet from 192.0.2.1 with ID 23 and the one from 192.0.2.2 with ID 45, and when we receive replies with IDs 23 and 45, we know which one corresponds to each original source.</p><p>Of course this strategy only works for ICMP echo requests, which make up a relatively small percentage of the available ICMP message types. For security reasons, however, and owing to the fact that these message types are sufficient to implement the ubiquitous ping and traceroute functionality that we’re after, these are the only message types we currently support. We’ll talk through the security reasons for this choice in the next section.</p>
    <div>
      <h2>How to proxy ICMP without elevated permissions</h2>
      <a href="#how-to-proxy-icmp-without-elevated-permissions">
        
      </a>
    </div>
    <p>Generally, applications need to send ICMP packets through raw sockets. Applications have control of the IP header using this socket, so it requires elevated privileges to open. Whereas the IP header for TCP and UDP packets are added on send and removed on receive by the operating system. To adhere to security best-practices, we don’t really want to run cloudflared with additional privileges. We needed a better solution. To solve this, we found inspiration in the ping utility, which you’ll note can be run by <i>any</i> user, <i>without</i> elevated permissions. So then, how does ping send ICMP echo requests and listen for echo replies as a normal user program? Well, the answer is less satisfying: it depends (on the platform). And as cloudflared supports all the following platforms, we needed to answer this question for each.</p>
    <div>
      <h3>Linux</h3>
      <a href="#linux">
        
      </a>
    </div>
    <p>On linux, ping opens a datagram socket for the ICMP protocol with the syscall <b><i>socket(PF_INET, SOCK_DGRAM, PROT_ICMP).</i></b> This type of socket can only be opened if the group ID of the user running the program is in <b><i>/proc/sys/net/ipv4/ping_group_range</i></b>, but critically, the user does not need to be root. This socket is “special” in that it can only send ICMP echo requests and receive echo replies. Great! It also has a conceptual “port” associated with it, despite the fact that ICMP does not use ports. In this case, the identifier field of echo requests sent through this socket are rewritten to the “port” assigned to the socket. Reciprocally, echo replies received by the kernel which have the same identifier are sent to the socket which sent the request.</p><p>Therefore, on linux cloudflared is able to perform source NAT for ICMP packets simply by opening a unique socket per source IP address. This rewrites the identifier field and source address of the request. Replies are delivered to this same socket meaning that cloudflared can easily rewrite the destination IP address (destination because the packets are flowing <i>to</i> the client) and echo identifier back to the original values received from the client.</p>
    <div>
      <h3>Darwin</h3>
      <a href="#darwin">
        
      </a>
    </div>
    <p>On Darwin (the UNIX-based core set of components which make up macOS), things are similar, in that we can open an unprivileged ICMP socket with the same syscall <i><b>socket(PF_INET, SOCK_DGRAM, PROT_ICMP)</b></i>. However, there is an important difference. With Darwin the kernel does not allocate a conceptual “port” for this socket, and thus, when sending ICMP echo requests the kernel does not rewrite the echo ID as it does on linux. Further, and more importantly for our purposes, the kernel does not demultiplex ICMP echo replies to the socket which sent the corresponding request using the echo identifier. This means that on macOS, we effectively need to perform the echo ID rewriting manually. In practice, this means that when cloudflared receives an echo request on macOS, it must choose an echo ID which is unique for the destination. Cloudflared then adds a key of (chosen echo ID, destination IP) to a mapping it then maintains, with a value of (original echo ID, original source IP). Cloudflared rewrites the echo ID in the echo request packet to the one it chose and forwards it to the destination. When it receives a reply, it is able to use the source IP address and echo ID to look up the client address and original echo ID and rewrite the echo ID and destination address in the reply packet before forwarding it back to the client.</p>
    <div>
      <h3>Windows</h3>
      <a href="#windows">
        
      </a>
    </div>
    <p>Finally, we arrived at Windows which conveniently provides a Win32 API IcmpSendEcho that sends echo requests and returns echo reply, timeout or error. For ICMPv6 we just had to use Icmp6SendEcho. The APIs are in C, but cloudflared can call them through CGO without a problem. If you also need to call these APIs in a Go program, <a href="https://github.com/cloudflare/cloudflared/blob/master/ingress/icmp_windows.go">checkout our wrapper</a> for inspiration.</p><p>And there you have it! That’s how we built the most exciting ping release since 1983. Overall, we’re thrilled to announce this new feature and can’t wait to get your feedback on ways we can continue improving our implementation moving forward.</p>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Support for these ICMP-based utilities is just the beginning of how we’re thinking about improving our Zero Trust administrator experience. Our goal is to continue providing tools which make it easy to identify issues within the network that impact connectivity and performance.</p><p>Looking forward, we plan to add more dials and knobs for <a href="https://www.cloudflare.com/learning/performance/what-is-observability/">observability</a> with announcements like <a href="/introducing-digital-experience-monitoring/">Digital Experience Monitoring</a> across our Zero Trust platform to help users <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">proactively monitor</a> and stay alert to changing network conditions. In the meantime, try applying Zero Trust controls to your private network for free by <a href="https://dash.cloudflare.com/sign-up">signing up</a> today.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Private Network]]></category>
            <category><![CDATA[Cloudflare Tunnel]]></category>
            <guid isPermaLink="false">6GPeSDV02jXldOr3L43yxx</guid>
            <dc:creator>Abe Carryl</dc:creator>
            <dc:creator>Chung-Ting Huang</dc:creator>
            <dc:creator>John Norwood</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing SCIM support for Cloudflare Access & Gateway]]></title>
            <link>https://blog.cloudflare.com/access-and-gateway-with-scim/</link>
            <pubDate>Thu, 12 Jan 2023 14:02:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Access & Gateway now support the System for Cross-domain Identity Management (SCIM) protocol. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Y4UCjZkqF4azsX8qbM3tY/e879ee99b9444f02f87b1b9ba0af5995/image5-11.png" />
            
            </figure><p>Today, we're excited to announce that Cloudflare Access and Gateway now support the System for Cross-domain Identity Management (SCIM) protocol. Before we dive into what this means, let's take a step back and review what SCIM, Access, and Gateway are.</p><p><a href="https://www.rfc-editor.org/rfc/rfc7642.txt">SCIM</a> is a protocol that enables organizations to manage user identities and access to resources across multiple systems and domains. It is often used to automate the process of creating, updating, and deleting user accounts and permissions, and to keep these accounts and permissions in sync across different systems.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5lfFQAyAoj4oKdZhkqtyct/37735dd182557095960ce8aaaf57b307/Access-SCIM-integration.png" />
            
            </figure><p>For example, most organizations have an identity provider, such as Okta or Azure Active Directory, that stores information about its employees, such as names, addresses, and job titles. The organization also likely uses cloud-based applications for collaboration. In order to access the cloud-based application, employees need to create an account and log in with a username and password. Instead of manually creating and managing these accounts, the organization can use SCIM to automate the process. Both the on-premise system and the cloud-based application are configured to support SCIM.</p><p>When a new employee is added to, or removed from, the identity provider, SCIM automatically creates an account for that employee in the cloud-based application, using the information from the on-premises system. If an employee's information is updated in the identity provider, such as a change in job title, SCIM automatically updates the corresponding information in the cloud-based application. If an employee leaves the organization, their account can be deleted from both systems using SCIM.</p><p>SCIM helps organizations efficiently manage user identities and access across multiple systems, reducing the need for manual intervention and ensuring that user information is accurate and up to date.</p><p>Cloudflare Access provides secure access to your internal applications and resources. It integrates with your existing identity provider to enforce strong authentication for users and ensure that only authorized users have access to your organization's resources. After a user successfully authenticates via the identity provider, Access initiates a session for that user. Once the session has expired, Access will redirect the user back to the identity provider.</p><p>Similarly, Cloudflare Gateway is a comprehensive <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a> which leverages the same identity provider configurations as Access to allow administrators to build DNS, Network, and HTTP inspection policies based on identity. Once a user logs in using WARP client via the identity provider, their identity is logged and evaluated against any policies created by their organization's administrator.</p>
    <div>
      <h3>Challenges before SCIM</h3>
      <a href="#challenges-before-scim">
        
      </a>
    </div>
    <p>Before SCIM, if a user needed to be deprovisioned (e.g. leaving the business, a security breach or other factors) an administrator needed to remove access for the user in both the identity provider and Access. This was because a user’s Cloudflare Zero Trust session would stay active until they attempted to log in via the identity provider again. This was time-consuming and error-prone, and it leaves room for security vulnerabilities if a user's access is not removed in a timely manner.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6gPO5LyeJTlK6wBCGaPvKe/51ad34a222b30ddc27ea0511819bbdd6/1_2x.png" />
            
            </figure><p>Another challenge with Cloudflare Access and Gateway was that identity provider groups had to be manually entered. This meant that if an identity provider group changed, an administrator had to manually update the value within the Cloudflare Zero trust dashboard to reflect those changes. This was tedious and time-consuming, and led to inconsistencies if the updates were not made promptly. Additionally, it required additional resources and expertise to manage this process effectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/43e51HTYQXmgvlrnMXXECn/1790f7100e8a1f33319c55570ffbd3c5/pasted-image-0.png" />
            
            </figure>
    <div>
      <h3>SCIM for Access &amp; Gateway</h3>
      <a href="#scim-for-access-gateway">
        
      </a>
    </div>
    <p>Now, with the integration of SCIM, Access and Gateway can automatically deprovision users after they are deactivated in an identity provider and synchronize identity provider groups. This ensures that only active users, in the right group, have access to your organization's resources, improving the security of your network.</p><p>User deprovisioning via SCIM listens for any user deactivation events in the identity provider and then revokes all active sessions for that user. This immediately cuts off their access to any application protected by Access and their session via WARP for Gateway.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1THRxHewCusYYYlA9ctsDj/3f05354ac1ee932106dd2ca8fe58b9d0/pasted-image-0--1-.png" />
            
            </figure><p>Additionally, the integration of SCIM allows for the synchronization of identity provider group information in Access and Gateway policies. This means that all identity provider groups will automatically be available in both the Access and Gateway policy builders. There is also an option to automatically force a user to reauthenticate if their group membership changes.</p><p>For example, if you wanted to create an Access policy that only applied to users with emails associated with example.com and apart from the risky user group, you would be able to build a policy as show below by simply selecting the risky user group from a drop-down:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7d6q2DKIWv6psiD9iES762/dc03b70383e935e0198a9c3d70a2fd1b/pasted-image-0--2-.png" />
            
            </figure><p>Similarly, if you wanted to create a Gateway policy to block example.com and all of its subdomains for these same users you could create the policy below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/28Kn8u1iqObCiaRzjs52Ii/53a43ddf65f96a894b83bc1e88524b74/pasted-image-0--3-.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Today, SCIM support is available for Azure Active Directory and Okta for Self-Hosted Access applications. In the future, we plan to extend support for more Identity Providers and to Access for SaaS.</p>
    <div>
      <h3>Try it now </h3>
      <a href="#try-it-now">
        
      </a>
    </div>
    <p>SCIM is available for all Zero Trust customers today and can be used to improve operations and overall security. Try out <a href="https://one.dash.cloudflare.com/">SCIM for Access and Gateway</a> yourself today.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2BUD3Ek49Fs0kBopENTn1y</guid>
            <dc:creator>Kenny Johnson</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare's CASB integration with Salesforce and Box]]></title>
            <link>https://blog.cloudflare.com/casb-adds-salesforce-and-box-integrations/</link>
            <pubDate>Thu, 12 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB adds two new SaaS integrations for Salesforce and Box. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/51lE809bNl9pljZYRATeg5/d88e19cd9eb2943142e80a4a1431fbb0/image2-23.png" />
            
            </figure><p>Today, we’re sharing the release of two new SaaS integrations for Cloudflare CASB - Salesforce and Box - in order to help <a href="https://www.cloudflare.com/cio/">CIOs</a>, IT leaders, and security admins swiftly identify looming security issues present across the exact type of tools housing this business-critical data.</p>
    <div>
      <h3>Recap: What is Cloudflare CASB?</h3>
      <a href="#recap-what-is-cloudflare-casb">
        
      </a>
    </div>
    <p><a href="/casb-ga/">Released in September</a>, Cloudflare’s API CASB has already proven to organizations from around the world that security risks - like insecure settings and inappropriate file sharing - can often exist across the friendly SaaS apps we all know and love, and indeed pose a threat. By giving operators a comprehensive view of the issues plaguing their SaaS environments, Cloudflare CASB has allowed them to effortlessly <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">remediate problems</a> in a timely manner before they can be leveraged against them.</p><p>But as both we and other forward-thinking administrators have come to realize, it’s not always Microsoft 365, Google Workspace, and business chat tools like Slack that contain an organization’s most sensitive information.</p>
    <div>
      <h3>Scan Salesforce with Cloudflare CASB</h3>
      <a href="#scan-salesforce-with-cloudflare-casb">
        
      </a>
    </div>
    <p>The first Software-as-a-Service. Salesforce, the sprawling, intricate, hard-to-contain Customer Relationship Management (CRM) platform, gives workforces a flexible hub from which they can do just as the software describes: manage customer relationships. Whether it be tracking deals and selling opportunities, managing customer conversations, or storing contractual agreements, Salesforce has truly become the ubiquitous solution for organizations looking for a way to manage every customer-facing interaction they have.</p><p>This reliance, however, also makes Salesforce a business data goldmine for bad actors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vgTUpghNJ4h0XJkjIUT1e/75b84bd59e6e64b1c5bd08a34f443c29/CASB_Salesforce_Findings.jpg" />
            
            </figure><p>With CASB’s new integration for Salesforce, IT and security operators will be able to quickly connect their environments and scan them for the kind of issues putting their sensitive business data at risk. Spot uploaded files that have been shared publicly with anyone who has the link. Identify default permissions that give employees access to records that should be need-to-know only. You can even see employees who are sending out emails as other Salesforce users!</p><p>Using this new integration, we’re excited to help close the security visibility gap for yet another SaaS app serving as the lifeblood for teams out in the field making business happen.</p>
    <div>
      <h3>Scan Box with Cloudflare CASB</h3>
      <a href="#scan-box-with-cloudflare-casb">
        
      </a>
    </div>
    <p>Box is the leading Content Cloud that enables organizations to accelerate business processes, power workplace collaboration, and protect their most valuable information, all while working with a best-of-breed enterprise IT stack like Cloudflare.</p><p>A platform used to store everything - from contracts and financials to product roadmaps and employee records - Box has given collaborative organizations a single place to convene and share information that, in a growing remote-first world, has no better place to be stored.</p><p>So where are disgruntled employees and people with malicious intent going to look when they want to unveil private business files?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/CACCaqOTfhtpJvlYrA4S7/fad020b308d04bcdd7f36db93ab01e13/CASB_Box_Findings.jpg" />
            
            </figure><p>With Cloudflare CASB’s new integration for Box, security and IT teams alike can now link their admin accounts and scan them for under-the-radar security issues leaving them prone to compromise and data exfiltration. In addition to Box’s built-in content and collaboration security, Cloudflare CASB gives you another added layer of protection where you can catch files and folders shared publicly or with users outside your organization. By providing security admins with a single view to see employees who aren’t following security policies, we make it harder for bad actors to get inside and do damage.</p><p>With Cloudflare’s status as an official <a href="https://www.box.com/integrations/boxtrustpartnerprogram">Box Technology Partner</a>, we’re looking forward to offering both Cloudflare and Box users a robust, yet easy-to-use toolset that can help stop pressing, real-world data security incidents right in their tracks.</p><blockquote><p><i>“Organizations today need products that are inherently secure to support employees working from anywhere,”</i> said <b>Areg Alimian</b>, Head of Security Products at Box. <i>“At Box, we continuously strive to improve our integrations with third-party apps so that it’s easier than ever for customers to use Box alongside best-in-class solutions. With today’s integration with Cloudflare CASB, we enable our joint customers to have a single pane of glass view allowing them to consistently enforce security policies and protect leakage of sensitive information across all their apps.”</i></p></blockquote>
    <div>
      <h3>Taking action on your business data security</h3>
      <a href="#taking-action-on-your-business-data-security">
        
      </a>
    </div>
    <p>Salesforce and Box are certainly not the only SaaS applications managing this type of sensitive organizational data. At Cloudflare, we strive to make our products as widely compatible as possible so that organizations can continue to place their trust and confidence in us to help keep them secure.</p><p>Today, Cloudflare CASB supports integrations with Google Workspace, Microsoft 365, Slack, GitHub, Salesforce, and Box, with a growing list of other critical applications on their way, so if there’s one in particular you’d like to see soon, <a href="https://docs.google.com/forms/d/e/1FAIpQLSfRlXT3ux2yDaFcCQO4orj1uQZjZyGqLr7vWH2odwUZtwPcpg/viewform">let us know</a>!</p><p>For those not already using Cloudflare Zero Trust, don’t hesitate to get started today - see the platform yourself with 50 free seats by signing up <a href="https://dash.cloudflare.com/sign-up/teams">here</a>, then get in touch with our team <a href="https://www.cloudflare.com/products/zero-trust/">here</a> to learn more about how Cloudflare CASB can help your organization lock down its SaaS apps.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">r0pkkKPl4CdJgLGGQAMHr</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[API-based email scanning]]></title>
            <link>https://blog.cloudflare.com/api-based-email-scanning/</link>
            <pubDate>Thu, 12 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Customers can now onboard O365 domains to Area 1, adding more flexibility on deployment methods. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3fRadJRFI9bBWzFvq9Q7q0/6df53ce80bc35f5b42c186298b5f9190/image1-32.png" />
            
            </figure><p>The landscape of <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> is constantly changing. One aspect that remains consistent is the reliance of email as the beginning for the majority of threat campaigns. Attackers often start with a phishing campaign to gather employee credentials which, if successful, are used to exfiltrate data, siphon money, or perform other malicious activities. This threat remains ever present even as companies transition to moving their email to the cloud using providers like Microsoft 365 or Google Workspace.</p><p>In our pursuit to help build a better Internet and tackle online threats, Cloudflare offers email security via our Area 1 product to protect all types of email inboxes - from cloud to on premise. The Area 1 product analyzes every email an organization receives and uses our threat models to assess if the message poses risk to the customer. For messages that are deemed malicious, the Area 1 platform will even prevent the email from landing in the recipient's inbox, ensuring that there is no chance for the attempted attack to be successful.</p><p>We try to provide customers with the flexibility to deploy our <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">solution</a> in whatever way they find easiest. Continuing in this pursuit to make our solution as turnkey as possible, we are excited to announce our open beta for Microsoft 365 domain onboarding via the Microsoft Graph API. We know that domains onboarded via <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">API</a> offer quicker deployment times and more flexibility. This onboarding method is one of many, so customers can now deploy domains how they see fit without losing Area 1 protection.</p>
    <div>
      <h3>Onboarding Microsoft 365 Domains via API</h3>
      <a href="#onboarding-microsoft-365-domains-via-api">
        
      </a>
    </div>
    <p>Cloudflare Area 1 provides customers with many <a href="https://developers.cloudflare.com/email-security/deployment/">deployment options</a>. Whether it is Journaling + BCC (where customers send a copy of each email to Area 1), Inline/MX records (where another hop is added via MX records), or Secure Email Gateway Connectors (where Area 1 directly interacts with a SEG), Area 1 provides customers with flexibility with how they want to deploy our solution. However, we have always recommended customers to deploy using MX records.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27WhZHBE17nRxuXOdNVFYD/883e3726e201af66e452f11c53f3fe2b/image2-21.png" />
            
            </figure><p>Adding this extra hop and having domains be pointed to Area 1 allows the service to provide protection with sinkholing, making sure that malicious emails don't reach the destination email inbox. However, we recognized that configuring Area 1 as the first hop (i.e. changing the MX records) may require sign-offs from other teams inside organizations and can lead to additional cycles. Organizations are also caught in waiting for this inline change to reflect in DNS (known as DNS propagation time). We know our customers want to be protected ASAP while they make these necessary adjustments.</p><p>With Microsoft 365 onboarding, the process of adding protection requires less configuration steps and waiting time. We now use the Microsoft Graph API to evaluate all messages associated with a domain. This allows for greater flexibility for operation teams to deploy Area 1.</p><p>For example, a customer of Area 1 who is heavily involved in M&amp;A transactions due to the nature of their industry benefit from being able to deploy Area 1 quickly using the Microsoft API. Before API onboarding, IT teams spent time juggling the handover of various acquisition assets. Assigning new access rights, handing over ownership, and other tasks took time to execute leaving mailboxes unsecured. However, now when the customer acquires a new entity, they can use the API onboarding to quickly add protection for the domains they just acquired. This allows them to have protection on the email addresses associated with the new domain while they work on completing the other tasks on hand. How our API onboarding process works can be seen below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aDQVkfjyA7XhTEREVsQdl/d5fbd0ce4fd4a37eeb632e4a3a9ae890/image4-16.png" />
            
            </figure><p>Once we are authorized to read incoming messages from Microsoft 365, we will start processing emails and firing detections on suspected emails. This new onboarding process is significantly faster and only requires a few clicks to get started.</p><p>To start the process, choose which domain you would like to onboard via API. Then within the UI, you can navigate to “Domains &amp; Routing” within the settings. After adding a new domain and choosing API scan, you can follow our setup wizard to authorize Area 1 to start reading messages.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hQK1E7Ixpq6aFUyVYxNCQ/44e3767916583a12294dc8f6751cc507/image5-12.png" />
            
            </figure><p>API scan</p><p>Within a few minutes of authorization, your organization will now be protected by Area 1.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2yOicmQz0n4vvNTy58MIPD/103938baee0a9c0948aff6a4421337d7/image3-20.png" />
            
            </figure><p>Ready to scan ‌‌</p>
    <div>
      <h3>Looking Ahead</h3>
      <a href="#looking-ahead">
        
      </a>
    </div>
    <p>This onboarding process is part of our continual efforts to provide customers with best of class email protection. With our API onboarding we provide customers with increased flexibility to deploy our solution. As we look forward, our Microsoft 365 API onboarding opens the door for other capabilities.</p><p>Our team is now looking to add the ability to retroactively scan emails that were sent before Area 1 was installed. This provides the opportunity for new customers to clean up any old emails that could still pose a risk for the organization. We are also looking to provide more levers for organizations who want to have more control on which mailboxes are scanned with Area 1. Soon customers will be able to designate within the UI which mailboxes will have their incoming email scanned by Area 1.</p><p>We also currently limit the deployment type of each domain to one type (i.e. a domain can either be onboarded using MX records or API). However, we are now looking at providing customers with the ability to do hybrid deployments, using both API + MX records. This combinatorial approach not only provides the greatest flexibility but also provides the maximum coverage.</p><p>There are many things in the pipeline that the Area 1 team is looking to bring to customers in 2023 and this open beta lets us build these new capabilities.</p><p>All customers can join the open beta so if you are interested in onboarding a new domain using this method, follow the steps above and get Area 1 protection on your Microsoft 365 Domains.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">53YarcYx9mwYRZbY8eUbSX</guid>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[Expanding our Microsoft collaboration: proactive and automated Zero Trust security for customers]]></title>
            <link>https://blog.cloudflare.com/expanding-our-collaboration-with-microsoft-proactive-and-automated-zero-trust-security/</link>
            <pubDate>Thu, 12 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ As CIOs navigate the complexities of stitching together multiple solutions, we are extending our collaboration with Microsoft to create one of the best Zero Trust solutions available. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Ru2fdT46ERm7sRSdZAsEQ/924a95d917b4b62a13a55a992bf29caf/image2-66.png" />
            
            </figure><p>As CIOs <a href="https://www.cloudflare.com/cio/">navigate the complexities</a> of stitching together multiple solutions, we are extending our partnership with Microsoft to create one of <a href="https://www.cloudflare.com/zero-trust/solutions/">the best Zero Trust solutions</a> available. Today, we are announcing four new integrations between Azure AD and Cloudflare Zero Trust that reduce risk proactively. These integrated offerings increase automation allowing security teams to focus on threats versus <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementation</a> and maintenance.</p>
    <div>
      <h3>What is Zero Trust and why is it important?</h3>
      <a href="#what-is-zero-trust-and-why-is-it-important">
        
      </a>
    </div>
    <p>Zero Trust is an overused term in the industry and creates a lot of confusion. So, let's break it down. Zero Trust architecture emphasizes the “never trust, always verify” approach. One way to think about it is that in the <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">traditional security perimeter</a> or “castle and moat” model, you have access to all the rooms inside the building (e.g., apps) simply by having access to the main door (e.g., typically a VPN).  In the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a> you would need to obtain access to each locked room (or app) individually rather than only relying on access through the main door. Some key components of the Zero Trust model are identity e.g., Azure AD (who), apps e.g., a SAP instance or a custom app on Azure (applications), policies e.g. Cloudflare Access rules (who can access what application), devices e.g. a laptop managed by Microsoft Intune (the security of the endpoint requesting the access) and other contextual signals.</p><p>Zero Trust is even more important today since companies of all sizes are faced with an accelerating digital transformation and an increasingly distributed workforce. Moving away from the castle and moat model, to the Internet becoming your corporate network, requires security checks for every user accessing every resource. As a result, all companies, especially those whose use of Microsoft’s broad cloud portfolio is increasing, are adopting a Zero Trust architecture as an essential part of their cloud journey.</p><p>Cloudflare’s Zero Trust platform provides a modern approach to authentication for internal and SaaS applications. Most companies likely have a mix of corporate applications - some that are SaaS and some that are hosted on-premise or on Azure. Cloudflare’s Zero Trust Network Access (ZTNA) product as part of our Zero Trust platform makes these applications feel like SaaS applications, allowing employees to access them with a simple and consistent flow. Cloudflare Access acts as a unified reverse proxy to enforce <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access control</a> by making sure every request is authenticated, authorized, and encrypted.</p>
    <div>
      <h3>Cloudflare Zero Trust and Microsoft Azure Active Directory</h3>
      <a href="#cloudflare-zero-trust-and-microsoft-azure-active-directory">
        
      </a>
    </div>
    <p>We have thousands of customers using Azure AD and Cloudflare Access as part of their Zero Trust architecture. Our <a href="/cloudflare-partners-with-microsoft-to-protect-joint-customers-with-global-zero-trust-network/">partnership with Microsoft</a>  announced last year strengthened security without compromising performance for our joint customers. Cloudflare’s Zero Trust platform integrates with Azure AD, providing a seamless application access experience for your organization's hybrid workforce.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2v5Iehf1svBNs9FvFTEcOG/25863db421decc020149ec9b2e87e858/1.png" />
            
            </figure><p>As a recap, the integrations we launched solved <a href="/cloudflare-partners-with-microsoft-to-protect-joint-customers-with-global-zero-trust-network/">two key problems</a>:</p><ol><li><p><i>For on-premise legacy applications</i>, Cloudflare’s participation as Azure AD <a href="https://azure.microsoft.com/en-us/services/active-directory/sso/secure-hybrid-access/#overview">secure hybrid access</a> partner enabled customers to centrally manage access to their legacy on-premise applications using SSO authentication without incremental development. Joint <a href="https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/cloudflare-azure-ad-integration">customers now easily use</a> Cloudflare Access as an additional layer of security with built-in performance in front of their legacy applications.</p></li><li><p><i>For apps that run on Microsoft Azure</i>, joint customers can integrate Azure AD <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/azuread/">with Cloudflare Zero Trust</a> and build rules based on user identity, group membership and Azure AD Conditional Access policies. Users will authenticate with their Azure AD credentials and connect to <a href="https://www.cloudflare.com/zero-trust/products/access/">Cloudflare Access</a> with just a few simple steps using Cloudflare’s app connector, <a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/cloudflare.cloudflare_tunnel_vm?tab=Overview">Cloudflare Tunnel</a>, that can expose applications running on <a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/">Azure</a>. See guide to <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/tunnel-guide/">install and configure Cloudflare Tunnel</a>.</p></li></ol><p>Recognizing Cloudflare's innovative approach to Zero Trust and Security solutions, Microsoft awarded us the <a href="https://www.microsoft.com/security/blog/2022/06/06/announcing-2022-microsoft-security-excellence-awards-winners/#:~:text=Security%20Software%20Innovator">Security Software Innovator</a> award at the 2022 Microsoft Security Excellence Awards, a prestigious classification in the Microsoft partner community.</p><p><i>But we aren’t done innovating</i>. We listened to our customers’ feedback and to address their pain points are announcing several new integrations.</p>
    <div>
      <h3>Microsoft integrations we are announcing today</h3>
      <a href="#microsoft-integrations-we-are-announcing-today">
        
      </a>
    </div>
    <p>The four new integrations we are announcing today are:</p><p><b>1. Per-application conditional access:</b> Azure AD customers <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/azuread-conditional-access/">can use their existing Conditional Access policies</a> in Cloudflare Zero Trust.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3DrhzGns2IQDHUVSY105rq/c6e4b012206be1f3ecf95ecc40889980/2.png" />
            
            </figure><p>Azure AD allows administrators to create and enforce policies on both applications and users using Conditional Access. It provides a wide range of parameters that can be used to control user access to applications (e.g. user risk level, sign-in risk level, device platform, location, client apps, etc.). Cloudflare Access now supports Azure AD Conditional Access policies per application. This allows security teams to define their security conditions in Azure AD and enforce them in Cloudflare Access.</p><p>For example, customers might have tighter levels of control for an internal payroll application and hence will have specific conditional access policies on Azure AD. However, for a general info type application such as an internal wiki, customers might enforce not as stringent rules on Azure AD conditional access policies. In this case both app groups and relevant Azure AD conditional access policies can be directly plugged into Cloudflare Zero Trust seamlessly without any code changes.</p><p>**2. **<a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/azuread/#synchronize-users-and-groups"><b>SCIM</b></a>****: Autonomously synchronize Azure AD groups between Cloudflare Zero Trust and Azure AD, saving hundreds of hours in the CIO org.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1bU3bURsLCASnT6AqrV6nU/494a9809a32a4f908b13e74011f8a687/3.png" />
            
            </figure><p>Cloudflare Access policies can use Azure AD to verify a user's identity and provide information about that user (e.g., first/last name, email, group membership, etc.). These user attributes are not always constant, and can change over time. When a user still retains access to certain sensitive resources when they shouldn’t, it can have serious consequences.</p><p>Often when user attributes change, an administrator needs to review and update all access policies that may include the user in question. This makes for a tedious process and an error-prone outcome.</p><p>The SCIM (System for Cross-domain Identity Management) specification ensures that user identities across entities using it are always up-to-date. We are excited to announce that joint customers of Azure AD and Cloudflare Access can now enable SCIM user and group provisioning and deprovisioning. It will accomplish the following:</p><ul><li><p>The IdP policy group selectors are now pre-populated with Azure AD groups and will remain in sync. Any changes made to the policy group will instantly reflect in Access without any overhead for administrators.</p></li><li><p>When a user is deprovisioned on Azure AD, all the user's access is revoked across Cloudflare Access and Gateway. This ensures that change is made in near real time thereby reducing security risks.</p></li></ul><p>**3. **<a href="https://developers.cloudflare.com/cloudflare-one/tutorials/azuread-risky-users/"><b>Risky user isolation</b></a>****: Helps joint customers add an extra layer of security by isolating high risk users (based on AD signals) such as contractors to browser isolated sessions via Cloudflare’s RBI product.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6jsV2YQ0MD6yy7lLEuZJY2/d783d7c556d72a6b2fa436a3790462a1/4.png" />
            
            </figure><p>Azure AD classifies users into low, medium and high risk users based on many data points it analyzes. Users may move from one risk group to another based on their activities. Users can be deemed risky based on many factors such as the nature of their employment i.e. contractors, risky sign-in behavior, credential leaks, etc. While these users are high-risk, there is a low-risk way to provide access to resources/apps while the user is assessed further.</p><p>We now support integrating <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/azuread-risky-users/">Azure AD groups with Cloudflare Browser Isolation</a>. When a user is classified as high-risk on Azure AD, we use this signal to automatically isolate their traffic with our Azure AD integration. This means a high-risk user can access resources through a secure and isolated browser. If the user were to move from high-risk to low-risk, the user would no longer be subjected to the isolation policy applied to high-risk users.</p><p><b>4. Secure joint Government Cloud customers</b>: Helps Government Cloud customers achieve better security with centralized identity &amp; access management via Azure AD, and an additional layer of security by connecting them to the Cloudflare global network, not having to open them up to the whole Internet.</p><p>Via <a href="https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/secure-hybrid-access-integrations">Secure Hybrid Access</a> (SHA) program, Government Cloud (‘GCC’) customers will soon be able to integrate Azure AD <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/azuread/">with Cloudflare Zero Trust</a> and build rules based on user identity, group membership and Azure AD conditional access policies. Users will authenticate with their Azure AD credentials and connect to Cloudflare Access with just a few simple steps using <a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/cloudflare.cloudflare_tunnel_vm?tab=Overview">Cloudflare Tunnel</a> that can expose applications running on <a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/">Microsoft Azure</a>.</p><blockquote><p><i>“Digital transformation has created a new security paradigm resulting in organizations accelerating their adoption of Zero Trust. The </i><b><i>Cloudflare Zero Trust</i></b><i> and </i><b><i>Azure Active Directory</i></b><i> joint solution has been a growth enabler for Swiss Re by easing Zero Trust deployments across our workforce allowing us to focus on our core business. Together, the joint solution enables us to go beyond SSO to empower our adaptive workforce with frictionless, secure access to applications from anywhere. The joint solution also delivers us a holistic Zero Trust solution that encompasses people, devices, and networks.”</i><b>– Botond Szakács, Director, Swiss Re</b></p></blockquote><blockquote><p><i>“A cloud-native Zero Trust security model has become an absolute necessity as enterprises continue to adopt a cloud-first strategy. Cloudflare has developed robust product integrations with Microsoft to help security and IT leaders prevent attacks proactively, dynamically control policy and risk, and increase automation in alignment with zero trust best practices.”</i><b>– Joy Chik, President, Identity &amp; Network Access, Microsoft</b></p></blockquote>
    <div>
      <h3>Try it now</h3>
      <a href="#try-it-now">
        
      </a>
    </div>
    <p>Interested in learning more about how our Zero Trust products integrate with Azure Active Directory? Take a look at this <a href="https://assets.ctfassets.net/slt3lc6tev37/5h3XO6w3UdOxmBNZswJjDV/84aa56dd5ade5c05f01436d19f8dc4f8/Cloudflare_Microsoft_Azure_AD_Reference_Archtecture_v2__BDES-4130.pdf">extensive reference architecture</a> that can help you get started on your Zero Trust journey and then add the specific use cases above as required. Also, check out this joint <a href="https://www.google.com/url?q=https://gateway.on24.com/wcc/eh/2153307/lp/3939569/achieving-zero-trust-application-access-with-cloudflare-and-azure-ad&amp;sa=D&amp;source=docs&amp;ust=1673477613350582&amp;usg=AOvVaw0hstOTz5JVlwWEGp8_Ifu_">webinar</a> with Microsoft that highlights our joint Zero Trust solution and how you can get started.</p>
    <div>
      <h3>What next</h3>
      <a href="#what-next">
        
      </a>
    </div>
    <p><i>We are just getting started</i>. We want to continue innovating and make the Cloudflare Zero Trust and Microsoft Security joint solution to solve your problems. Please give us <a href="https://www.cloudflare.com/partners/technology-partners/microsoft/">feedback</a> on what else you would like us to build as you continue using this joint solution.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Microsoft]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4pqoxyMztGcYC13k3EKdI3</guid>
            <dc:creator>Abhi Das</dc:creator>
            <dc:creator>Mythili Prabhu</dc:creator>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zone Versioning is now generally available]]></title>
            <link>https://blog.cloudflare.com/zone-versioning-ga/</link>
            <pubDate>Thu, 12 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Safely configure and deploy updates to zone configuration with Zone Versioning now Generally Available for Enterprise customers ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1lgNVy6zV5VsmAkYjvZM57/0a5bcbfb683be5623e2d740da6b60f6c/image3-21.png" />
            
            </figure><p>Today we are announcing the general availability of Zone Versioning for enterprise customers. Zone Versioning allows you to safely manage zone configuration by versioning changes and choosing how and when to deploy those changes to defined environments of traffic. Previously announced as <a href="/version-and-stage-configuration-changes-with-http-applications/">HTTP Applications</a>, we have redesigned the experience based on testing and feedback to provide a seamless experience for customers looking to safely rollout configuration changes.</p>
    <div>
      <h3>Problems with making configuration changes</h3>
      <a href="#problems-with-making-configuration-changes">
        
      </a>
    </div>
    <p>There are two problems we have heard from customers that Zone Versioning aims to solve:</p><ol><li><p>How do I test changes to my zone safely?</p></li><li><p>If I do end up making a change that impacts my traffic negatively, how can I quickly revert that change?</p></li></ol><p>Customers have worked out various ways of solving these problems. For problem #1, customers will create staging zones that live on a different hostname, often taking the form <i>staging.example.com</i>, that they make changes on first to ensure that those changes will work when deployed to their production zone. When making more than one change this can become troublesome as they now need to keep track of all the changes made to make the exact same set of changes on the production zone. Also, it is possible that something tested in staging never makes it to production, but yet is not rolled back, so now the two environments differ in configuration.</p><p>For problem #2, customers often keep track of what changes were made and when they were deployed in a ticketing system like JIRA, such that in case of an incident an on-call engineer can more easily find the changes they may need to roll back by manually modifying the configuration of the zone. This requires the on-call to be able to easily get to the list of what changes were made.</p><p>Altogether, this means customers are more reluctant to make changes to configuration or turn on new features that may benefit them because they do not feel confident in the ability to validate the changes safely.</p>
    <div>
      <h3>How Zone Versioning solves those problems</h3>
      <a href="#how-zone-versioning-solves-those-problems">
        
      </a>
    </div>
    <p>Zone Versioning provides two new fundamental aspects to managing configuration that allow a customer to safely test, deploy and rollback configuration changes: Versions and Environments.</p><p>Versions are independent sets of zone configuration. They can be created anytime from a previous version or the initial configuration of the zone and changes to one version will not affect another version. Initially, a version affects none of a zone’s traffic, so any changes made are safe by definition. When first enabling zone versioning, we create Version 1 that is based on the current configuration of the zone (referred to as the baseline configuration).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/01RMiRjNi47AeFK64CZoy3/7ba82f9681a67178659a2c26f8c77a29/Screenshot-2022-12-22-at-10.25.13-AM.png" />
            
            </figure><p>From there any changes that you make to Version 1 will be safely stored and propagated to our global network, but will not affect any traffic. Making changes to a version is no different from before, just select the version to edit and modify the configuration of that feature as normal. Once you have made the set of changes desired for a given version, to deploy that version on live traffic in your zone, you will need to deploy the version to an Environment.</p><p>Environments are a way of mapping segments of your zone’s traffic to versions of configuration. Powered by our <a href="https://developers.cloudflare.com/ruleset-engine/">Ruleset Engine</a>, that powers the likes of <a href="https://developers.cloudflare.com/waf/custom-rules/create-dashboard/">Custom WAF Rules</a> and <a href="https://developers.cloudflare.com/cache/about/cache-rules/">Cache Rules</a>, Environments give you the ability to create filters based on a wide range of parameters such as hostname, client IP, location, or cookie. When a version is applied to an Environment, any traffic matching the filter will use that version’s configuration.</p><div></div>
<p></p><p>By default, we create three environments to get started with:</p><ul><li><p>Development - Applies to traffic sent with a specific cookie for development</p></li><li><p>Staging - Applies to traffic sent to Cloudflare’s staging IPs</p></li><li><p>Production - Applies to all traffic on the zone</p></li></ul><p>You can create additional environments or modify the pre-defined environments except for Production. Any newly created environment will begin in an unassigned state meaning traffic will fall back to the baseline configuration of the zone. In the above image, we have deployed Version 2 to both the Development and Staging environments. Once we have tested Version 2 in staging, then we can ‘Promote’ Version 2 to Production which means all traffic on the zone will receive the configuration in Version 2 except for Development and Staging traffic. If something goes wrong after deploying to Production, then we can use the ‘Rollback’ action to revert to the configuration of Version 1.</p>
    <div>
      <h3>How promotion and rollbacks work</h3>
      <a href="#how-promotion-and-rollbacks-work">
        
      </a>
    </div>
    <p>It is worth going into a bit more detail about how configuration changes, promotions, and rollbacks are realized in our global network. Whenever a configuration change is made to a version, we store that change in our system of record for the service and push that change to our global network so that it is available to be used at any time.</p><p>Importantly and unlike how changes to zones automatically take effect, that change will not be used until the version is deployed to an environment that is receiving traffic. The same is true for when a version is promoted or rolled back between environments. Because all the configuration we need for a given version is already available in our global network, we only need to push a single, atomic change to tell our network that traffic matching the filter for a given environment should now use the newly defined configuration version.</p><p>This means that promotions and more importantly rollbacks occur as quickly as you are used to with any configuration change in Cloudflare. No need to wait five or ten minutes for us to roll back a bad deployment, if something goes wrong you can return to a last known good configuration in seconds. Slow rollbacks can make ongoing incidents drag on leading to extended customer impact, so the ability to quickly execute a rollback was a critical capability.</p>
    <div>
      <h3>Get started with Zone Versioning today</h3>
      <a href="#get-started-with-zone-versioning-today">
        
      </a>
    </div>
    <p>Enterprise Customers can get started with Zone Versioning today for their zones on the Cloudflare dashboard. Customers will need to be using the <a href="https://support.cloudflare.com/hc/en-us/articles/5995821690637-Migrating-from-WAF-managed-rules-to-WAF-Managed-Rulesets">new Managed WAF rules</a> in order to enable Zone Versioning. You can find more information about <a href="https://developers.cloudflare.com/version-management">Zone Versioning in our Developer Docs</a>.</p><p>Happy versioning!</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zone Versioning]]></category>
            <guid isPermaLink="false">7q9tPSKP9VU4n56zwDT1n2</guid>
            <dc:creator>Garrett Galow</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Link Isolation: your safety net for the latest phishing attacks]]></title>
            <link>https://blog.cloudflare.com/area1-eli-ga/</link>
            <pubDate>Wed, 11 Jan 2023 13:01:00 GMT</pubDate>
            <description><![CDATA[ Email Link Isolation is your safety net for the odd links that end up in people’s inboxes, and they may click. This added protection turns Cloudflare Area 1 into the most comprehensive email security solution when it comes to protecting against phishing attacks. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ebDbzAoZi18H8cP1ypwtC/7e6c377e1ad9672bda44b7c866f59243/image3-13.png" />
            
            </figure><p>Email is one of the most ubiquitous and also most exploited tools that businesses use every single day. Baiting users into clicking malicious links within an email has been a particularly long-standing tactic for the vast majority of bad actors, from the most sophisticated criminal organizations to the least experienced attackers.</p><p>Even though this is a commonly known approach to gain account access or <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">commit fraud</a>, users are still being tricked into clicking malicious links that, in many cases, lead to exploitation. The reason is simple: even the best trained users (and security solutions) cannot always distinguish a good link from a bad link.</p><p>On top of that, securing employees' mailboxes often results in multiple vendors, complex deployments, and a huge drain of resources.</p><p>Email Link Isolation turns <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Cloudflare Area 1</a> into the most comprehensive <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a> when it comes to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">protecting against phishing attacks</a>. It rewrites links that could be exploited, keeps users vigilant by alerting them of the uncertainty around the website they’re about to visit, and protects against malware and vulnerabilities through the user-friendly <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation service</a>. Also, in true Cloudflare fashion,  it’s a one-click deployment.</p>
    <div>
      <h3>Protecting against deceptive links</h3>
      <a href="#protecting-against-deceptive-links">
        
      </a>
    </div>
    <p>With more than a couple dozen customers in beta and over one million links protected (so far), we can now clearly see the significant value and potential that this solution can deliver. To extend these benefits to more customers and continue to expand on the multitude of ways we can apply this technology, <b>we’re making Email Link Isolation generally available (GA) starting today</b>.</p><p>Email Link Isolation is included with Cloudflare Area 1 enterprise plan at no extra cost, and can be enabled with three clicks:</p><p>1. Log in to the Area 1 portal.</p><p>2. Go to Settings (the gear icon).</p><p>3. On Email Configuration, go to Email Policies &gt; Link Actions.</p><p>4. Scroll to Email Link Isolation and enable it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6w3slBSqFADNmJi4LbnRUt/b2d8da9f9a91daffe7f8857f538ea517/image5-6.png" />
            
            </figure>
    <div>
      <h3>Defense in layers</h3>
      <a href="#defense-in-layers">
        
      </a>
    </div>
    <p>Applying multiple layers of defense becomes ever more critical as threat actors continuously look for ways to navigate around each security measure and develop more complex attacks. One of the best examples that demonstrates these evolving techniques is a deferred phishing attack, where an embedded URL is benign when the email reaches your email security stack and eventually your users’ inbox, but is later weaponized post-delivery.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3x69sIoIeC3ld5laLWAgEt/e8e4687cfb460e0749d1e4c367c03c24/image4-10.png" />
            
            </figure><p>To combat evolving email-borne threats, such as malicious links, Area 1 continually updates its <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning (ML) models</a> to account for all potential attack vectors, and leverages post-delivery scans and retractions as additional layers of defense. And now, customers on the <a href="https://www.cloudflare.com/plans/enterprise/">Enterprise plan</a> also have access to Email Link Isolation as one last defense - a safety net.</p><p>The key to successfully adding layers of security is to use <a href="https://zerotrustroadmap.org/">a strong Zero Trust suite</a>, not a disjointed set of products from multiple vendors. Users need to be kept safe without disrupting their productivity - otherwise they’ll start seeing important emails being quarantined or run into a poor experience when accessing websites, and soon enough they’ll be the ones looking for ways around the company’s security measures.</p>
    <div>
      <h3>Built to avoid productivity impacts</h3>
      <a href="#built-to-avoid-productivity-impacts">
        
      </a>
    </div>
    <p>Email Link Isolation provides an additional layer of security with virtually no disruption to the user experience. It’s smart enough to decide which links are safe, which are malicious, and which are still dubious. Those dubious links are then changed (rewritten to be precise) and Email Link Isolation keeps evaluating them until it reaches a verdict with a high degree of confidence. When a user clicks on one of those rewritten links, Email Link Isolation checks for a verdict (benign or malign) and takes the corresponding action - benign links open in the local browser as if they hadn’t been changed, while malign links are prevented from opening altogether.</p><p>Most importantly, when Email Link Isolation is unable to confidently determine a verdict based on all available intelligence, an interstitial page is presented to ask the user to be extra vigilant. The interstitial page calls out that the website is suspicious, and that the user should refrain from entering any personal information and passwords unless they know and fully trust the website. Over the last few months of beta, we’ve seen that over two thirds of users don’t proceed to the website after seeing this interstitial - that’s a good thing!</p><p>For the users that still want to navigate to the website after seeing the interstitial page, Email Link Isolation uses Cloudflare Browser Isolation to automatically open the link in an isolated browser running in Cloudflare’s closest data center to the user. This delivers an experience virtually indistinguishable from using the local browser, thanks to our Network Vector Rendering (NVR) technology and Cloudflare’s expansive, low-latency network. By opening the suspicious link in an isolated browser, the user is protected against potential browser attacks (including malware, zero days, and other types of malicious code execution).</p><p><b>In a nutshell, the interstitial page is displayed when Email Link Isolation is uncertain about the website, and provides another layer of awareness and protection against phishing attacks. Then, Cloudflare Browser Isolation is used to protect against malicious code execution when a user decides to still proceed to such a website.</b></p>
    <div>
      <h3>What we’ve seen in the beta</h3>
      <a href="#what-weve-seen-in-the-beta">
        
      </a>
    </div>
    <p>As expected, the percentage of rewritten links that users actually click is quite small (single digit percentage). That’s because the majority of such links are not delivered in messages the users are expecting, and aren’t coming from trusted colleagues or partners of theirs. So, even when a user clicks on such a link, they will often see the interstitial page and decide not to proceed any further. We see that less than half of all clicks lead to the user actually visiting the website (in Browser Isolation, to protect against malicious code that could otherwise be executing behind the scenes).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/472qL0UBYcnHd1n1oFTegD/67264b3613f47281febb5a50b63e8ca5/image1-24.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7iB2Pyy7fHHerMwX7GCbrJ/8991046688880e6eef97ae7ec130dd3d/image2-16.png" />
            
            </figure><p>You may be wondering why we’re not seeing a larger amount of clicks on these rewritten links. The answer is quite simply that link Email Link Isolation is indeed that last layer of protection against attack vectors that may have evaded other lines of defense. Virtually all the well crafted phishing attacks that try and trick users into clicking malicious links are already being stopped by the Area 1 email security, and such messages don’t reach users’ inboxes.</p><p>The balance is very positive. From all the customers using Email Link Isolation beta in production, some Fortune 500, we received no negative feedback on the user experience. <b>That means that we’re meeting one of the most challenging goals - to provide additional security without negatively affecting users and without adding the burden of tuning/administration to the SOC and IT teams.</b></p><p>One interesting thing we uncover is how valuable our customers are finding our click-time inspection of link shorteners. The fact that a shortened URL (e.g. bit.ly) can be modified at any time to point to a different website has been making some of our customers anxious. Email Link Isolation inspects the link at time-of-click, evaluates the actual website that it’s going to open, and proceeds to open locally, block or present the interstitial page as adequate. We’re now working on full link shortener coverage through Email Link Isolation.</p>
    <div>
      <h3>All built on Cloudflare</h3>
      <a href="#all-built-on-cloudflare">
        
      </a>
    </div>
    <p>Cloudflare’s intelligence is driving the decisions of what gets rewritten. We have earlier signals than others.</p><p>Email Link Isolation has been built on Cloudflare’s unique capabilities in many areas.</p><p>First, because Cloudflare sees enough Internet traffic for us to confidently identify new/low confidence and potentially dangerous domains earlier than anyone else - leveraging the Cloudflare intelligence for this early signal is key to the user experience, to not add speed bumps to legitimate websites that are part of our users’ daily routines. Next, we’re using <a href="https://workers.cloudflare.com/">Cloudflare Workers</a> to process this data and serve the interstitial without introducing frustrating delays to the user. And finally, only <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> can protect against malicious code with a low-latency experience that is invisible to end users and feels like a local browser.</p><p>If you’re not yet a Cloudflare Area 1 customer, start your free trial and phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">5s7YqaliwrZdTs3OtmUwUQ</guid>
            <dc:creator>João Sousa Botto</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare CASB and DLP work together to protect your data]]></title>
            <link>https://blog.cloudflare.com/casb-dlp/</link>
            <pubDate>Wed, 11 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB and DLP will work together to protect sensitive data at rest. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Wqq52bJYYraL6kGegsWIc/d2b89355122ed7b0055bf5de4cc4847b/image4-12.png" />
            
            </figure><p>Cloudflare’s Cloud Access Security Broker (CASB) <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">scans SaaS applications</a> for misconfigurations, unauthorized user activity, shadow IT, and other data security issues. Discovered security threats are called out to IT and security administrators for timely remediation, removing the burden of endless manual checks on a long list of applications.</p><p>But Cloudflare customers revealed they want more information available to assess the risk associated with a misconfiguration. A publicly exposed intramural kickball schedule is not nearly as critical as a publicly exposed customer list, so customers want them treated differently. They asked us to identify where sensitive data is exposed, reducing their assessment and remediation time in the case of leakages and incidents. With that feedback, we recognized another opportunity to do what Cloudflare does best: combine the best parts of our products to solve customer problems.</p><p>What’s underway now is an exciting effort to provide <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> users a way to get the same DLP coverage for more than just sensitive data going over the network: SaaS DLP for data stored in popular SaaS apps used by millions of organizations.</p><p>With these upcoming capabilities, customers will be able to connect their SaaS applications in just a few clicks and scan them for sensitive data - such as PII, PCI, and even custom regex - stored in documents, spreadsheets, PDFs, and other uploaded files. This gives customers the signals to quickly assess and remediate major security risks.</p>
    <div>
      <h3>Understanding CASB</h3>
      <a href="#understanding-casb">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5vES53c15VUuvf2jGa0tGh/7ac679bf0220f2b6ee3076ddf34fc4a5/image2.jpg" />
            
            </figure><p>Released in September, Cloudflare’s API CASB has already enabled organizations to quickly and painlessly deep-dive into the security of their SaaS applications, whether it be Google Workspace, Microsoft 365, or any of the other SaaS apps we support (including Salesforce and Box released today). With CASB, operators have been able to understand what SaaS security issues could be putting their organization and employees at risk, like insecure settings and misconfigurations, files shared inappropriately, user access risks and best practices not being followed.</p><p>“But what about the sensitive data stored <i>inside</i> the files we’re collaborating on? How can we identify that?”</p>
    <div>
      <h3>Understanding DLP</h3>
      <a href="#understanding-dlp">
        
      </a>
    </div>
    <p>Also released in September, Cloudflare DLP for data in-transit has provided users of Gateway, Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway (SWG)</a>, a way to manage and outright block the movement of sensitive information into and out of the corporate network, preventing it from landing in the wrong hands. In this case, DLP can spot sensitive strings, like credit card and social security numbers, as employees attempt to communicate them in one form or another, like uploading them in a document to Google Drive or sent in a message on Slack. Cloudflare DLP blocks the HTTP request before it reaches the intended application.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Tioay2oFOuQnRla7yv3Ty/94d810dcd8faa75059ca4a73f445bcc9/image3-14.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1qDIi5N0R3koBNDcpbQQBg/f7e21759ba2778d1d9b2a87fbd125978/image1-25.png" />
            
            </figure><p>But once again we received the same questions and feedback as before.</p><p>“What about data in our SaaS apps? The information stored there won’t be visible over the network.”</p>
    <div>
      <h3>CASB + DLP, Better Together</h3>
      <a href="#casb-dlp-better-together">
        
      </a>
    </div>
    <p>Coming in early 2023, Cloudflare Zero Trust will introduce a new product synergy that allows customers to peer into the files stored in their SaaS applications and identify any particularly sensitive data inside them.</p><p>Credit card numbers in a Google Doc? No problem. Social security numbers in an Excel spreadsheet? CASB will let you know.</p><p>With this product collaboration, Cloudflare will provide IT and security administrators one more critical area of security coverage, rounding out our data loss prevention story. Between DLP for data in-transit, CASB for file sharing monitoring, and even <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI)</a> and Area 1 for data in-use DLP and email DLP, respectively, organizations can take comfort in knowing that their bases are covered when it comes to <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">data exfiltration</a> and misuse.</p><p>While development continues, we’d love to hear how this kind of functionality could be used at an organization like yours. Interested in learning more about either of these products or what’s coming next? Reach out to your account manager or <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">click here to get in touch</a> if you’re not already using Cloudflare.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[DLP]]></category>
            <guid isPermaLink="false">6uJb9raFodA5Si2waedXl8</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Improved access controls: API access can now be selectively disabled]]></title>
            <link>https://blog.cloudflare.com/improved-api-access-control/</link>
            <pubDate>Wed, 11 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Making it easier for account owners to view and manage the access their users have on an account by allowing them to restrict API access to the account. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Starting today, it is possible to selectively scope API access to your account to specific users.</p><p>We are making it easier for account owners to view and manage the access their users have on an account by allowing them to restrict API access to the account. Ensuring users have the least amount of access they need, and maximizing visibility of the access is critical, and our move today is another step in this direction.</p><p>When Cloudflare was first introduced, a single user had access to a single account. As we have been adopted by larger enterprises, the need to maximize access granularity and retain control of an account has become progressively more important. Nowadays, enterprises using Cloudflare could have tens or hundreds of users on an account, some of which need to do account configuration, and some that do not. In addition, to centralize the configuration of the account, some enterprises have a need for service accounts, or those shared between several members of an organization.</p><p>While account owners have always been able to restrict access to an account by their users, they haven’t been able to view the keys and tokens created by their users. Restricting use of the <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">API</a> is the first step in a direction that will allow account owners a single control plane experience to manage their users' access.</p>
    <div>
      <h3>Steps to secure an account</h3>
      <a href="#steps-to-secure-an-account">
        
      </a>
    </div>
    <p>The safest thing to do to reduce risk is to scope every user to the minimal amount of access required, and the second is to monitor what they do with their access.</p><p>While a dashboard login has some degree of non-repudiation, especially when being protected by multiple factors and an SSO configuration, an API key or token can be leaked, and no further authentication factors will block the use of this credential. Therefore, in order to <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">reduce the attack surface</a>, we can limit what the token can do.</p><p>A Cloudflare account owner can now access their members page, and turn API access on or off for specific users, as well as account wide.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ocmwt8Dalaxezxp7Lmk1T/42ac4546eebe9c5e17dd581113b62653/image2-20.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VhkUCtGgA98bAAygeN46t/1aa222e3f3cf46819cf9110345f2061b/image1-30.png" />
            
            </figure><p>This feature is available for our enterprise users starting today.</p>
    <div>
      <h3>Moving forward</h3>
      <a href="#moving-forward">
        
      </a>
    </div>
    <p>On our journey to making the account management experience safer, and more granular, we will continue to increase the level of control account owners have over their accounts. Building these API restrictions is a first step on the way to allowing account-owned API tokens (which will limit the need to have personal tokens), as well as increasing general visibility of tokens among account members.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">7huqx5ceoek1GoQsqsbb7q</guid>
            <dc:creator>Joseph So</dc:creator>
            <dc:creator>Mike Escalante</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare Area 1 and DLP work together to protect data in email]]></title>
            <link>https://blog.cloudflare.com/dlp-area1-to-protect-data-in-email/</link>
            <pubDate>Wed, 11 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Customers can leverage the power of Email Security and Cloudflare One to prevent data loss in their corporate network. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8ppqP7NHeQkrw9i8XBKHC/1fdda896628f727afdd52d474b503fed/image6-3.png" />
            
            </figure><p>Threat prevention is not limited to keeping external actors out, but also keeping sensitive data in. Most organizations do not realize how much confidential information resides within their email inboxes. Employees handle vast amounts of sensitive data on a daily basis, such as intellectual property, internal documentation, PII, or payment information and often share this information internally via email making email one of the largest locations confidential information is stored within a company. It comes as no shock that organizations worry about protecting the accidental or malicious egress of sensitive data and often address these concerns by instituting strong Data Loss Prevention policies. Cloudflare makes it easy for customers to manage the data in their email inboxes with <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Area 1</a> Email Security and <a href="https://www.cloudflare.com/cloudflare-one">Cloudflare One</a>.</p><p>Cloudflare One, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform that delivers <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service (NaaS)</a> with <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> natively built-in, connects users to enterprise resources, and offers a wide variety of opportunities to secure corporate traffic, including the inspection of data transferred to your corporate email. Area 1 email security, as part of our composable Cloudflare One platform, delivers the most complete data protection for your inbox and offers a cohesive solution when including additional services, such as Data Loss Prevention (DLP). With the ability to easily adopt and <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implement Zero Trust services</a> as needed, customers have the flexibility to layer on defenses based on their most critical use cases. In the case of Area 1 + DLP, the combination can collectively and preemptively address the most pressing use cases that represent high-risk areas of exposure for organizations. Combining these products provides the in-depth defense of your corporate data.</p>
    <div>
      <h3>Preventing egress of cloud email data via HTTPs</h3>
      <a href="#preventing-egress-of-cloud-email-data-via-https">
        
      </a>
    </div>
    <p>Email provides a readily available outlet for corporate data, so why let sensitive data reach email in the first place? An employee can accidentally attach an internal file rather than a public white paper in a customer email, or worse, attach a document with the wrong customers’ information to an email.</p><p>With Cloudflare Data Loss Prevention (DLP) you can prevent the upload of sensitive information, such as PII or intellectual property, to your corporate email. DLP is offered as part of Cloudflare One, which runs traffic from data centers, offices, and remote users through the Cloudflare network.  As traffic traverses Cloudflare, we offer protections including validating identity and device posture and filtering corporate traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SaBAFDdzHwvmrs84LkvKJ/1a0e5a81ba41b791921b2a7df8f5b9d0/image5-7.png" />
            
            </figure><p>Cloudflare One offers HTTP(s) filtering, enabling you to inspect and route the traffic to your corporate applications. Cloudflare Data Loss Prevention (DLP) leverages the HTTP filtering abilities of Cloudflare One. You can apply rules to your corporate traffic and route traffic based on information in an HTTP request. There are a wide variety of <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/data-loss-prevention/">options for filtering</a>, such as domain, URL, application, HTTP method, and many more. You can use these options to segment the traffic you wish to DLP scan. All of this is done with the performance of our global network and managed with one control plane.</p><p>You can apply DLP policies to corporate email applications, such as Google Suite or O365.  As an employee attempts to upload an attachment to an email, the upload is inspected for sensitive data, and then allowed or blocked according to your policy.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/704ZpjYQXtyZ2D00VTgOV9/2aed47f2472eccaa3de611a40ee7d105/image2-17.png" />
            
            </figure><p>Inside your corporate email extend more core data protection principles with Area 1 in the following ways:</p>
    <div>
      <h3>Enforcing data security between partners</h3>
      <a href="#enforcing-data-security-between-partners">
        
      </a>
    </div>
    <p>With Cloudflare’s Area 1, you can also enforce strong TLS standards. Having TLS configured adds an extra layer of security as it ensures that emails are encrypted, preventing any attackers from reading sensitive information and changing the message if they intercept the email in transit (<a href="https://www.cloudflare.com/learning/security/threats/on-path-attack/">on-path-attack</a>). This is especially useful for G Suite customers whose internal emails still go out to the whole Internet in front of prying eyes or for customers who have contractual obligations to communicate with partners with SSL/TLS.</p><p>Area 1 makes it easy to enforce SSL/TLS inspections. From the Area 1 portal, you can configure Partner Domain(s) TLS by navigating <i>“Partner Domains TLS”</i> within “<i>Domains &amp; Routing”</i> and adding a partner domain with which you want to enforce TLS. If TLS is required then all emails from that domain with no TLS will be automatically dropped. Our TLS ensures strong TLS rather than the best effort in order to make sure that all traffic is encrypted with strong ciphers preventing a malicious attacker from being able to decrypt any intercepted emails.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6oDQjBZINI9yeEBL2opdf8/f9f16241839d78d283125bfb1fb93d7b/image4-13.png" />
            
            </figure>
    <div>
      <h3>Stopping passive email data loss</h3>
      <a href="#stopping-passive-email-data-loss">
        
      </a>
    </div>
    <p>Organizations often forget that exfiltration also can be done without ever sending any email. Attackers who are able to compromise a company account are able to passively sit by, monitoring all communications and picking out information manually.</p><p>Once an attacker has reached this stage, it is incredibly difficult to know an account is compromised and what information is being tracked. Indicators like email volume, IP address changes, and others do not work since the attacker is not taking any actions that would cause suspicion. At Cloudflare, we have a strong thesis on <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">preventing these account takeovers</a> before they take place, so no attacker is able to fly under the radar.</p><p>In order to stop account takeovers before they happen, we place great emphasis on filtering emails that pose a risk for stealing employee credentials. The most common attack vector used by malicious actors are phishing emails. Given its ability to have a high impact in accessing confidential data when successful, it’s no shock that this is the go-to tool in the attackers tool kit. Phishing emails pose little threat to an email inbox protected by Cloudflare’s Area 1 product. Area 1’s models are able to assess if a message is a suspected phishing email by analyzing different metadata. Anomalies detected by the models like domain proximity (how close a domain is to the legitimate one), sentiment of email, or others can quickly determine if an email is legitimate or not. If Area 1 determines an email to be a phishing attempt, we automatically retract the email and prevent the recipient from receiving the email in their inbox ensuring that the employee’s account remains uncompromised and unable to be used to exfiltrate data.</p>
    <div>
      <h3>Protecting Against Malicious Links</h3>
      <a href="#protecting-against-malicious-links">
        
      </a>
    </div>
    <p>Attackers who are looking to <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate data</a> from an organization also often rely on employees clicking on links sent to them via email. These links can point to online forms which on the surface look innocuous but serve to gather sensitive information. Attackers can use these websites to initiate scripts which gather information about the visitor without any interaction from the employee. This presents a strong concern since an errant click by an employee can lead to the exfiltration of sensitive information. Other malicious links can contain exact copies of websites which the user is accustomed to accessing. However, these links are a form of phishing where the credentials entered by the employee are sent to the attacker rather than logging them into the website.</p><p>Area 1 covers this risk by providing <a href="/safe-email-links/">Email Link Isolation</a> as part of our <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> offering. With email link isolation, Area 1 looks at every link sent and accesses its domain authority. For anything that's on the margin (a link we cannot confidently say is safe), Area 1 will launch a headless Chromium browser and open the link there with no interruption. This way, any malicious scripts that execute will run on an isolated instance far from the company’s infrastructure, stopping the attacker from getting company information. This is all accomplished instantaneously and reliably.</p>
    <div>
      <h3>Stopping Ransomware</h3>
      <a href="#stopping-ransomware">
        
      </a>
    </div>
    <p>Attackers have many tools in their arsenal to try to compromise employee accounts. As we mentioned above, phishing is a common threat vector, but it's far from the only one. At Area 1, we are also vigilant in <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">preventing the propagation of ransomware</a>.</p><p>A common mechanism that attackers use to disseminate ransomware is to disguise attachments by renaming them. A ransomware payload could be renamed from petya.7z to Invoice.pdf in order to try to trick an employee into downloading the file. Depending on how urgent the email made this invoice seem, the employee could blindly try to open the attachment on their computer causing the organization to suffer a ransomware attack. Area 1’s models detect these mismatches and stop malicious ones from arriving into their target’s email inbox.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WQIj1D7PNCJsOdX8hKchw/d36a976b9170195ee05c2eec49d654e3/image1-26.png" />
            
            </figure><p>A successful ransomware campaign can not only stunt the daily operations of any company, but can also lead to the loss of local data if the encryption is unable to be reversed. Cloudflare’s Area 1 product has dedicated payload models which analyze not only the attachment extensions but also the hashed value of the attachment to compare it to known ransomware campaigns. Once Area 1 finds an attachment deemed to be ransomware, we prohibit the email from going any further.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6p9osqhPcNKYz8wBsCoHsW/17f23b7b5aae575f6d1a26138769d567/image3-15.png" />
            
            </figure>
    <div>
      <h3>Cloudflare’s DLP vision</h3>
      <a href="#cloudflares-dlp-vision">
        
      </a>
    </div>
    <p>We aim for Cloudflare products to give you the layered security you need to protect your organization, whether its malicious attempts to get in or sensitive data getting out. As email continues to be the largest surface of corporate data, it is crucial for companies to have strong DLP policies in place to prevent the loss of data. With Area 1 and Cloudflare One working together, we at Cloudflare are able to provide organizations with more confidence about their DLP policies.</p><p>If you are interested in these email security or DLP services, <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">contact us for a conversation</a> about your security and data protection needs.</p><p>Or if you currently subscribe to Cloudflare services, consider reaching out to your Cloudflare customer success manager to discuss adding additional email security or DLP protection.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">6orNvCFKmOebk6b3WheUiR</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[One-click data security for your internal and SaaS applications]]></title>
            <link>https://blog.cloudflare.com/one-click-zerotrust-isolation/</link>
            <pubDate>Wed, 11 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Protect sensitive data on any Access app for any user on any device. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6nirO70ymZjx0rcbyHmdCZ/f3d0ccc97a06762128e8c0c6126fdba6/image3-17.png" />
            
            </figure><p>Most of the CIOs we talk to want to replace dozens of point solutions as they start their own Zero Trust journey. <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our comprehensive <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a> platform can help teams of any size rip out all the legacy appliances and services that tried to keep their data, devices, and applications safe without compromising speed.</p><p>We also built those products to work better together. Today, we’re bringing Cloudflare’s best-in-class <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">browser isolation</a> technology to our industry-leading Zero Trust <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access control</a> product. Your team can now control the data in any application, and what a user can do in the application, with a single click in the Cloudflare dashboard. We’re excited to help you replace your private networks, virtual desktops, and data control boxes with a <a href="https://www.cloudflare.com/zero-trust/solutions/">single, faster Zero Trust solution</a>.</p>
    <div>
      <h3>Zero Trust access control is just the first step</h3>
      <a href="#zero-trust-access-control-is-just-the-first-step">
        
      </a>
    </div>
    <p>Most organizations begin their <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">Zero Trust migration</a> by replacing a virtual private network (VPN). VPN deployments trust too many users by default. In most configurations, any user on a private network can reach any resource on that same network.</p><p>The consequences vary. On one end of the spectrum, employees in marketing can accidentally stumble upon payroll amounts for the entire organization. At the other end, attackers who compromise the credentials of a support agent can move through a network to reach trade secrets or customer production data.</p><p>Zero Trust access control replaces this model by inverting the security posture. A Zero Trust network trusts no one by default. Every user and each request or connection, must prove they can reach a specific resource. Administrators can build granular rules and monitor comprehensive logs to prevent incidental or malicious access incidents.</p><p><a href="/cloudflare-one-one-year-later/">Over 10,000 teams</a> have adopted Cloudflare One to replace their own private network with a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a>. We offer those teams rules that go beyond just identity. Security teams can <a href="/require-hard-key-auth-with-cloudflare-access/">enforce hard key authentication</a> for specific applications as a second factor. Sensitive production systems can require users to <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/require-purpose-justification/">provide the reason</a> they need <a href="/announcing-access-temporary-authentication/">temporary access</a> while they request permission from a senior manager. We integrate with just about <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/">every device posture provider</a>, or you can <a href="/6-new-ways-to-validate-device-posture/">build your own</a>, to ensure that only corporate devices connect to your systems.</p><p>The teams who deploy this solution improve the security of their enterprise overnight while also making their applications faster and more usable for employees in any region. However, once users pass all of those checks we still rely on the application to decide what they can and cannot do.</p><p>In some cases, that means Zero Trust access control is not sufficient. An employee planning to leave tomorrow could download customer contact info. A contractor connecting from an unmanaged device can screenshot schematics. As enterprises evolve on their SASE migration, they need to extend Zero Trust control to application usage and data.</p>
    <div>
      <h3>Isolate sessions without any client software</h3>
      <a href="#isolate-sessions-without-any-client-software">
        
      </a>
    </div>
    <p>Cloudflare’s browser isolation technology gives teams the ability to control usage and data without making the user experience miserable. Legacy approaches to <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a> relied on one of two methods to secure a user on the public Internet:</p><ul><li><p><b>Document Object Model (DOM) manipulation</b> - unpack the webpage, inspect it, hope you caught the vulnerability, attempt to repack the webpage, deliver it. This model leads to thousands of broken webpages and total misses on zero days and other threats.</p></li><li><p><b>Pixel pushing</b> - stream a browser running far away to the user, like a video. This model leads to user complaints due to performance and a long tail of input incompatibilities.</p></li></ul><p><a href="/cloudflare-and-remote-browser-isolation/">Cloudflare’s approach is different</a>. We run headless versions of Chromium, the open source project behind Google Chrome and Microsoft Edge and other browsers, in our data centers around the world. We send the final rendering of the webpage, the draw commands, to a user's local device.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Rub7G6NKrhsrrE7sI5DJZ/1ce7980c948d40b75d120867a96f3733/image2-18.png" />
            
            </figure><p>The user thinks it is just the Internet. Highlighting, right-clicking, videos - they all just work. Users do not need a special browser client. Cloudflare’s technology just works in any browser on mobile or desktop. For security teams, they can guarantee that code never executes on the devices in the field to stop Zero-Day attacks.</p><p>We added browser isolation to Cloudflare One to protect against attacks that leap out of a browser from the public Internet. However, controlling the browser also gives us the ability to pass that control along to security and IT departments, so they can focus on another type of risk - data misuse.</p><p>As part of this launch, when administrators <a href="https://www.cloudflare.com/application-services/solutions/">secure an application</a> with Cloudflare’s Zero Trust access control product, they can click an additional button that will force sessions into our isolated browser.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3lsdhsnQffyncOIP1jPfJJ/905858e945f787fea6e3a7d49c0e71fc/image1-28.png" />
            
            </figure><p>When the user authenticates, Cloudflare Access checks all the Zero Trust rules configured for a given application. When this isolation feature is enabled, Cloudflare will silently open the session in our isolated browser. The user does not need any special software or to be trained on any unique steps. They just navigate to the application and start doing their work. Behind the scenes, the session runs entirely in Cloudflare’s network.</p>
    <div>
      <h3>Control usage and data in sessions</h3>
      <a href="#control-usage-and-data-in-sessions">
        
      </a>
    </div>
    <p>By running the session in Cloudflare’s isolated browser, administrators can begin to build rules that replace some goals of legacy virtual desktop solutions. Some enterprises deploy virtual desktop instances (VDIs) to sandbox application usage. Those VDI platforms extended applications to employees and contractors without allowing the application to run on the physical device.</p><p>Employees and contractors tend to hate this method. The client software required is clunky and not available on every operating system. The speed slows them down. Administrators also need to invest time in maintaining the desktops and the virtualization software that power them.</p><p>We’re excited <a href="/decommissioning-virtual-desktop/">to help you replace that point solution</a>, too. Once an application is isolated in Cloudflare’s network, you can toggle additional rules that control how users interact with the resource. For example, you can disable potential data loss vectors like file downloads, printing, or copy-pasting. Add watermarks, both visible and invisible, to audit screenshot leaks.</p><p>You can extend this control beyond just data loss. Some teams have sensitive applications where you need users to connect without inputting any data, but they do not have the developer time to build a “Read Only” mode. With Cloudflare One, those teams can toggle “Disable keyboard” and allow users to reach the service while blocking any input.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7f3WOaiEPIsf8WaxShdurE/825bde4738e63ad27c2db5f06fab6f42/image5-9.png" />
            
            </figure><p>The isolated solution also integrates with <a href="/inline-dlp-ga/">Cloudflare One’s Data Loss Prevention</a> (DLP) suite. With a few additional settings, you can bring <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">comprehensive data control</a> to your applications without any additional engineering work or point solution deployment. If a user strays too far in an application and attempts to download something that contains personal information like social security or credit card numbers, Cloudflare’s network will stop that download while still allowing otherwise approved files.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bqHdkpi2r8Cb04Frl0geg/d1a4bf21fd0e4bd4913db9c106d84315/image4-15.png" />
            
            </figure>
    <div>
      <h3>Extend that control to SaaS applications</h3>
      <a href="#extend-that-control-to-saas-applications">
        
      </a>
    </div>
    <p>Most of the customers we hear from need to bring this level of data and usage control to their self-hosted applications. Many of the SaaS tools they rely on have more advanced role-based rules. However, that is not always the case and, even if the rules exist, they are not as comprehensive as needed and require an administrator to manage a dozen different application settings.</p><p>To avoid that hassle you can bring Cloudflare One’s one-click isolation feature to your SaaS applications, too. Cloudflare’s access control solution can be configured as an identity proxy that will force all logins to any SaaS application that supports SSO through Cloudflare’s network where additional rules, including isolation, can be applied.</p>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Today’s announcement brings together two of our customers’ favorite solutions - our Cloudflare Access solution and our browser isolation technology. Both products are available to use today. You can start building rules that force isolation or control data usage by following the guides linked <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/isolation-policies/">here</a>.</p><p>Willing to wait for the easy button? Join the <a href="https://www.cloudflare.com/lp/application-isolation-beta/">beta</a> today for the one-click version that we are rolling out to customer accounts.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[VDI]]></category>
            <category><![CDATA[Data Loss Prevention]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">6ZzrmWoBfR99ZDBG4KYkAt</guid>
            <dc:creator>Tim Obezuk</dc:creator>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing the Authorized Partner Service Delivery Track for Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-authorized-services-delivery-partner-track/</link>
            <pubDate>Tue, 10 Jan 2023 14:01:00 GMT</pubDate>
            <description><![CDATA[ This week we’re announcing the Authorized Services Delivery Partner (ASDP) Track designed to validate partners that want to deliver services around Cloudflare One ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WjCFeq96IprfdXmILovkF/08a5822492b306118f48b60297d053d6/image1-12.png" />
            
            </figure><p>In this Sunday’s <a href="/welcome-to-cio-week-2023/">Welcome to CIO Week</a> blog, we talked about the value for CIOs in finding partners for <a href="https://www.cloudflare.com/cio/">long term digital transformation initiatives</a>. As the adage goes, “If you want to go fast, go alone, if you want to go far, go together.”</p><p>As Cloudflare has expanded into new customer segments and emerging market categories like <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, we too have increasingly focused on expanding our relationship with go-to-market partners (e.g. service providers, implementation / consulting firms, system integrators, and more). Because security and network transformation can feel inherently daunting, customers often need strategic advice and practical support when implementing <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> – our SASE platform of Zero Trust security and networking services. These partners play a pivotal role in easing customer adoption by helping them assess, implement, and manage our services.</p><p>This blog is primarily intended for prospective and current Cloudflare go-to-market channel partners and highlights how we have grown our partnership program over the past year and will continue to, going forward.</p>
    <div>
      <h3>Cloudflare One: fastest growing portfolio among Cloudflare partners</h3>
      <a href="#cloudflare-one-fastest-growing-portfolio-among-cloudflare-partners">
        
      </a>
    </div>
    <p>Over the past year, adoption of Cloudflare One services has been the fastest area of growth among our customer base. Investments we have made to our channel ecosystem have helped us capitalize on increased customer demand for SASE platforms, including Zero Trust security and cloud-delivered networking.</p><p>In the last year alone, we’ve seen a 3x increase in Cloudflare One partner bookings. At the same time, the number of transacting partners has increased 70% YoY.</p><p>Partners repeatedly cite the simplicity of our platform to deploy and manage, our pace of innovation to give them confidence in our roadmap, and our global network to ensure scale, speed, and resilience as key differentiators that are fueling strong customer demand for Cloudflare One services.</p><p>Migrating from legacy, on-premise appliance to a cloud-delivered SASE architecture is a journey. For most customers, partners help break that journey into two categories, broadly defined: network layer transformation and Zero Trust security modernization.</p>
    <div>
      <h3>Transforming the network layer</h3>
      <a href="#transforming-the-network-layer">
        
      </a>
    </div>
    <p>Multi-cloud and hybrid cloud architecture are increasingly the norm. As enterprises embrace this approach, their networking infrastructure will likewise need to adapt to be able to easily connect to a variety of cloud environments.</p><p>Organizations that have traditionally relied on <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a> and <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS</a> based technologies will turn to cloud-based <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service (NaaS)</a> offerings like Cloudflare’s <a href="https://www.cloudflare.com/magic-wan/">Magic WAN</a> (part of our Cloudflare One platform) to increase flexibility and reduce costs. This will also drive revenue opportunities for a new generation of <a href="https://www.cloudflare.com/learning/cloud/what-is-cloud-networking/">cloud networking</a> experts and advisors who have the skills to help organizations migrate from traditional on-premise hardware to a NaaS architecture.</p><p>For some organizations, transforming the network may in fact be a more attractive, initial entry point than beginning a Zero Trust security migration, as NaaS allows organizations to maintain their existing security tools while still providing a strategic path towards a full perimeter-less architecture with cloud-delivered protection in the future.</p>
    <div>
      <h3>Implementing a Zero Trust architecture</h3>
      <a href="#implementing-a-zero-trust-architecture">
        
      </a>
    </div>
    <p>For many organizations today, modernizing security for employees, devices, data, and offices with Zero Trust best practices is an equally critical priority. Trends towards hybrid and remote working have put additional pressure on IT and security teams to re-imagine how they <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">secure access to corporate resources</a> and move away from <a href="https://www.cloudflare.com/learning/access-management/castle-and-moat-network-security/">traditional ‘castle-and-moat’ architectures</a>. Zero Trust promises enhanced visibility, more granular controls, and identity-aware protection across all traffic, regardless of origin or destination.</p><p>While the benefits of moving to a Zero Trust architecture are undeniable, <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">implementing a full Zero Trust architecture</a> is a journey that often requires the help of third parties. According to a recent report by iVanti, while 73% of companies plan to move to a cloud based architecture over the next 18 months, 46% of these companies IT security teams lack the confidence in their ability to apply a Zero Trust model on their own which is why 34% reportedly are relying on third party security providers to help them implement Zero Trust.<sup>1</sup> This is where partners can help.</p>
    <div>
      <h3>Announcing the Authorized Services Delivery Partner Track for Cloudflare One</h3>
      <a href="#announcing-the-authorized-services-delivery-partner-track-for-cloudflare-one">
        
      </a>
    </div>
    <p>Cloudflare is hyper focused on building the most compelling and easy-to-use SASE platform on the market to help accelerate how organizations can transform their network and security architectures. The scale and resiliency of our global network – which spans across 275+ cities in 100+ countries and has 172+ Tbps of network capacity – ensures that we can deliver our protections reliably and with high speed, regardless of where customers are around the world.</p><p>Just as our physical network of data centers continues to expand, so too does our strategic network of channel partners, who we rely on to deliver professional and managed services that customers may require as part of their Cloudflare One deployment. Cloudflare is actively working with partners worldwide to build advisory, migration, and managed services with the goal of wrapping partner services expertise around Cloudflare One engagements to ensure 100% customer adoption and satisfaction.</p><p>To help partners develop their Cloudflare One services expertise and distinguish themselves in the marketplace, today we are excited to announce the limited availability of a new specialization track for Authorized Services Delivery Partners (ASDP). This track is designed to authorize partners that meet Cloudflare’s high standards for professional services delivery around Cloudflare One.</p><p>To become an Authorized Partner, partners will need to go through a rigorous technical validation process and will be assessed on the merits of the security, performance, and reliability of their services delivery capabilities. Partners that achieve the Authorized Service Partner designation will receive a variety of benefits, such as:</p><ul><li><p>Engagement in Cloudflare One sourced opportunities requiring services</p></li><li><p>Access to named Cloudflare One partner service delivery managers who can assist partners in the building of their services practices</p></li><li><p>Access to special partner incentive funds designed to ensure that authorized partner services are actively used in Cloudflare One customer engagements.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7LffR3bsmxnG4OcvSsOLgH/96589f7ab25f171b76e5d8f7978d48ef/image2-7.png" />
            
            </figure><p>To support this new partner track, we are also announcing advanced enablement and training paths that will be available in both instructor-led training and online formats via our partner portal, as well as advanced lab environments designed to help partners learn how to implement and support Cloudflare One deployments. Partners that successfully complete the ASDP requirements will also be given opportunities to shadow customer deployments to further their capabilities and expertise.</p><p>For current and prospective Cloudflare partners interested in this track, we are launching a new <a href="https://www.cloudflare.com/static/16d21a3680c5673df2c243d3741c5f9e/Authorized_Service_Delivery_Partner_Track_for_CF1.pdf">Cloudflare Authorized Service Delivery Partner Validation checklist</a>, which includes details on the application process.</p><p>If you are an existing Cloudflare partner, you can also reach out to your named Channel Account Manager for additional information.</p><p>....
<sup>1</sup><a href="https://rs.ivanti.com/reports/ivi-2621-2021-zero-trust-progress-report.pdf">iVanti 2021 Zero Trust Progress Report</a></p><p></p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Magic WAN]]></category>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">4JJhsfWlZ7c6LsIcIcXRKN</guid>
            <dc:creator>Matthew Harrell</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing the Magic WAN Connector: the easiest on-ramp to your next generation network]]></title>
            <link>https://blog.cloudflare.com/magic-wan-connector/</link>
            <pubDate>Tue, 10 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is making it even easier to get connected with the Magic WAN Connector: a lightweight software package you can install in any physical or cloud network to automatically connect, steer, and shape any IP traffic. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5x4P53d0PbmTYOlBqLqC04/3ae5cf230c0e205875d29528db19ae05/image4-4.png" />
            
            </figure><p>Cloudflare One enables organizations to <a href="https://www.cloudflare.com/learning/network-layer/how-to-prepare-for-network-modernization-projects/">modernize their corporate networks</a> by connecting any traffic source or destination and layering <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> security policies on top, saving cost and complexity for IT teams and delivering a better experience for users. Today, we’re excited to make it even easier for you to get connected with the Magic WAN Connector: a lightweight software package you can install in any physical or cloud network to automatically connect, steer, and shape any IP traffic.</p><p>You can install the Magic WAN Connector on physical or virtual hardware you already have, or purchase it pre-installed on a Cloudflare-certified device. It ensures the best possible connectivity to the closest Cloudflare network location, where we’ll apply security controls and send traffic on an optimized route to its destination. Embracing <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> has never been simpler.</p>
    <div>
      <h3>Solving today’s problems and setting up for tomorrow</h3>
      <a href="#solving-todays-problems-and-setting-up-for-tomorrow">
        
      </a>
    </div>
    <p>Over the past few years, we’ve had the opportunity to learn from IT teams about how their corporate networks have evolved and the challenges they’re facing today. Most organizations describe a starting point of private connectivity and “castle and moat” security controls: a corporate <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">WAN</a> composed of point-to-point and <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS</a> circuits and hardware appliances at the <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter of physical networks</a>. This architecture model worked well in a pre-cloud world, but as applications have shifted outside of the walls of the corporate data center and users can increasingly work from anywhere, the concept of the perimeter has crumbled.</p><p>In response to these shifts, traditional networking and security vendors have developed a wide array of point solutions to fill specific gaps: a virtual appliance to filter web traffic, a physical one to optimize bandwidth use across multiple circuits, a cloud-based tool to prevent data loss, and so on. IT teams now need to manage a broader-than-ever set of tools and contend with gaps in security, visibility, and control as a result.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qve46P1BhXgMXPq3Vl99p/6ad6959ea94207ae8578f6a74f4f1923/image3-7.png" />
            
            </figure><p><i>Today’s fragmented corporate network</i></p><p>We view this current state, with IT teams contending with a patchwork of tools and a never-ending ticket queue, as a transitional period to a world where the Internet forms the foundation of the corporate network. Cloudflare One is enabling organizations of all sizes to make the transition to SASE: connecting any traffic source and destination to a secure, fast, reliable global network where all security functions are enforced and traffic is optimized on the way to its destination, whether that’s within a private network or on the public Internet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qsXt9CqefEYzvzH18z8Ml/7e4294ece12db47f651af64838d0eeba/image1-18.png" />
            
            </figure><p><i>Secure Access Service Edge architecture</i></p>
    <div>
      <h3>Magic WAN Connector: the easiest way to connect your network to Cloudflare</h3>
      <a href="#magic-wan-connector-the-easiest-way-to-connect-your-network-to-cloudflare">
        
      </a>
    </div>
    <p>The first step to adopting SASE is getting connected – establishing a secure path from your existing network to the closest location where Zero Trust security policies can be applied. Cloudflare offers a broad set of “on-ramps” to enable this connectivity, including client-based and clientless access options for roaming users, application-layer tunnels established by deploying a lightweight software daemon, network-layer connectivity with standard GRE or IPsec tunnels, and physical or virtual interconnection.</p><p>Today, to make this first step to SASE even easier, we’re introducing a new member to this family of on-ramps. The Magic WAN Connector can be deployed in any physical or cloud network to provide automatic connectivity to the closest Cloudflare network location, leveraging your existing last mile Internet connectivity and removing the requirement for IT teams to manually configure network gear to get connected.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Xs3oFe75DtE5m9uqsirPz/6468cd151f0ac9c824e1a12ec8026269/image2-10.png" />
            
            </figure><p><i>Magic WAN Connector provides easy connectivity to Cloudflare’s network</i></p>
    <div>
      <h3>End-to-end traffic management</h3>
      <a href="#end-to-end-traffic-management">
        
      </a>
    </div>
    <p>Hundreds of customer conversations over the past few years have helped us define a slim set of functionality that customers need within their on-premise and cloud networks. They’ve described this as “light branch, heavy cloud” architecture – minimizing the footprint at corporate network locations and shifting the majority of functions that used to be deployed in on-premise hardware to a globally distributed network.</p><p>The Magic WAN Connector includes a critical feature set to make the best possible use of available last mile connectivity. This includes traffic routing, load balancing, and failover; application-aware traffic steering and shaping; and automatic configuration and orchestration. These capabilities connect you automatically to the closest Cloudflare location, where traffic is optimized and routed to its destination. This approach allows you to use Cloudflare’s network – presence in 275 cities and 100 countries across the globe, 11,000+ interconnects and a growing fiber backbone – as an extension of your own.</p><table>
<thead>
  <tr>
    <th>Network function</th>
    <th>Magic WAN Connector</th>
    <th>Cloudflare Network</th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>Branch routing (traffic shaping, failover, QoS)</td>
    <td>Application-aware routing and traffic steering between multiple last mile Internet circuits</td>
    <td>Application-aware routing and traffic steering across the middle mile to get traffic to its destination</td>
  </tr>
  <tr>
    <td>Centralized device management</td>
    <td>Connector config controlled from unified Cloudflare dashboard</td>
    <td>Cloudflare unified dashboard portal, observability, Zero Trust services</td>
  </tr>
  <tr>
    <td>Zero-touch configuration</td>
    <td>Automagic config; boots with smart defaults and sets up tunnels + routes</td>
    <td>Automagic config; Magic WAN Connector pulls down updates from central control plane</td>
  </tr>
  <tr>
    <td>VPN + Firewall</td>
    <td>VPN termination + basic network segmentation included</td>
    <td>Full-featured SASE platform including ZTNA, FWaaS, DDoS, WAAP, and Email Security</td>
  </tr>
  <tr>
    <td>Application-aware path selection</td>
    <td>Application-aware traffic shaping for last mile</td>
    <td>Application-aware Enhanced Internet for middle mile</td>
  </tr>
  <tr>
    <td>Application auto discovery</td>
    <td>Works with Cloudflare network to perform application discovery and classification in real time</td>
    <td>1+1=3: Cloudflare Zero Trust application classification tools reused in this context</td>
  </tr>
  <tr>
    <td><a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">Application performance visibility</a></td>
    <td>Acts as telemetry source for Cloudflare observability tools</td>
    <td>Cloudflare One Analytics platform &amp; Digital Experience Monitoring</td>
  </tr>
  <tr>
    <td>Software can be deployed in the cloud</td>
    <td>Software can be deployed as a public cloud VM</td>
    <td>All configuration controlled via unified Cloudflare dashboard</td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Fully integrated security from day 0</h3>
      <a href="#fully-integrated-security-from-day-0">
        
      </a>
    </div>
    <p>The Magic WAN Connector, like all of Cloudflare’s products, was developed from the ground up to natively integrate with the rest of the Cloudflare One portfolio. Connecting your network to Cloudflare’s with the Magic WAN Connector means automatic access to a full suite of SASE security capabilities, including our <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">Firewall-as-a-Service</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a>, Data Loss Prevention, Browser Isolation, Cloud Access Security Broker, Email Security, and more.</p>
    <div>
      <h3>Optionally pre-packaged to make deployment easy</h3>
      <a href="#optionally-pre-packaged-to-make-deployment-easy">
        
      </a>
    </div>
    <p>Cloudflare’s goal is to make it as easy as possible to on-ramp to our network, so there are flexible deployment options available for the Magic WAN Connector. You can install the software on physical or virtual Linux appliances that you manage, or purchase it pre-installed and configured on a hardware appliance for the lowest-friction path to SASE connectivity. Plug the device into your existing network and you’ll be automatically connected to and secured by the Cloudflare network within minutes.</p>
    <div>
      <h3>And open source to make it even easier</h3>
      <a href="#and-open-source-to-make-it-even-easier">
        
      </a>
    </div>
    <p>We’re excited to make access to these capabilities available to all kinds of organizations, including those who want to DIY more aspects of their network deployments. To do this, we’ll be open sourcing the Magic WAN Connector software, so customers can even more easily connect to Cloudflare’s network from existing hardware.</p>
    <div>
      <h3>Part of a growing family of on-ramps</h3>
      <a href="#part-of-a-growing-family-of-on-ramps">
        
      </a>
    </div>
    <p>In addition to introducing the Magic WAN Connector today, we’re continuing to grow the options for how customers can connect to us using existing hardware. We are excited to expand our <a href="https://www.cloudflare.com/network-onramp-partners/">Network On-Ramp partnerships</a> to include leading networking companies Cisco,  and SonicWall, joining previous partners Aruba, VMWare, and Arista, to help you onboard traffic to Cloudflare smoothly.</p><p>Customers can connect to us from appliances offered by these vendors using either Anycast GRE or IPSec tunnels. Our partners have validated their solutions and tested that their networking hardware can connect to Cloudflare using these standards. To make setup easier for our mutual customers, detailed configuration instructions will be available soon at both the Cloudflare Developer Docs and partner websites.</p><p>If you are a networking solutions provider and are interested in <a href="https://www.cloudflare.com/partners/technology-partners/">becoming a Network On-Ramp partner</a>, please reach out to us.</p>
    <div>
      <h3>Ready to start building the future of your corporate network?</h3>
      <a href="#ready-to-start-building-the-future-of-your-corporate-network">
        
      </a>
    </div>
    <p>We’re beyond excited to get the Magic WAN Connector into customer hands and help you jumpstart your transition to SASE. Learn more and sign up for early access <a href="https://www.cloudflare.com/lp/magic-wan-connector">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[NaaS]]></category>
            <category><![CDATA[Magic WAN Connector]]></category>
            <guid isPermaLink="false">6m4spUyKCFDb8ABD1SGkBd</guid>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Preview any Cloudflare product today]]></title>
            <link>https://blog.cloudflare.com/preview-today/</link>
            <pubDate>Tue, 10 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Enterprise customers can now start previewing non-contracted services ]]></description>
            <content:encoded><![CDATA[ <p></p><p>With Cloudflare’s pace of innovation, customers want to be able to see how our products work and sooner to address their needs without having to contact someone. Now they can, without any commitments or limits on monetary value and usage caps.</p>
    <div>
      <h3>Ready to get started? Here’s how it works.</h3>
      <a href="#ready-to-get-started-heres-how-it-works">
        
      </a>
    </div>
    <p>For any product* that is currently not part of an enterprise contract, users with administrative access will have the ability to enable the product on the Cloudflare dashboard. With a single click of a button, they can start configuring any required features within seconds.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1MQje4OMLQUGJSsLXTAM1K/013c26fc2edfc38c4f5aac9173dec9e3/image1-19.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FTiQCqFPRRmYVzglMDX5v/5b28d981cbbf80a3cdf586521141333e/image3-8.png" />
            
            </figure><p>You have access to resources that can help you get started as well as the ongoing support of your sales team. You will be otherwise left to enjoy the product and our team members will be in contact after about 2 weeks. We always look to collect feedback and can also discuss how to have it added to your contract. If more time is needed in the evaluation phase, no problem. If it is decided that it is not a right product fit, we will offboard the product without any penalties.</p><p>We are working on offering more and more self-service capabilities that traditionally have not been offered to our enterprise customers. We’ll also be enhancing this overall experience over the next few months to increase visibility and improve the self-guided journey.</p><p>Log into the dashboard to start exploring any products today!</p><p>*There are some products that will never be fully self-service, but we will look for opportunities to streamline the onboarding as much as possible. Examples include access to our China Network and <a href="https://www.cloudflare.com/products/registrar/">Registrar</a>. Support for the following products is still on the roadmap: R2, Cache Reserve, Image Resizing, CASB, DLP and BYOIP.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">4AHXGmCgrhsk3WR12MqWcB</guid>
            <dc:creator>Angie Kim</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network detection and settings profiles for the Cloudflare One agent]]></title>
            <link>https://blog.cloudflare.com/location-aware-warp/</link>
            <pubDate>Tue, 10 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare WARP can now securely detect pre-configured locations and route traffic based on the needs of the organization for that location. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Teams can connect users, devices, and entire networks to Cloudflare One through several flexible on-ramps. Those on-ramps include traditional connectivity options like GRE or IPsec tunnels, our <a href="https://www.cloudflare.com/products/tunnel/">Cloudflare Tunnel</a> technology, and our Cloudflare One device agent.</p><p>Each of these on-ramps send nearly all traffic to Cloudflare’s network where we can filter security threats with products like our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">Data Loss Prevention</a> service. In other cases, the destination is an internal resource deployed in Cloudflare’s <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust private network</a>.</p><p>However, sometimes users want traffic to stay local. If a user is sitting within a few meters of their printer, they might prefer to connect through their local network instead of adding a hop through Cloudflare. They could configure Cloudflare to always ignore traffic bound for the printer, keeping it local, but when they leave the office they still need to use Cloudflare’s network to reach that printer remotely.</p><p>Solving this use case and others like it previously required manual changes from an administrator every time a user moved. An administrator would need to tell Cloudflare’s agent to include traffic sometimes and, in other situations, ignore it. This does not scale.</p><p>Starting today, any team using Cloudflare One has the flexibility to decide what traffic is sent to Cloudflare and what traffic stays local depending on the network of the user. End users do not need to change any settings when they enter or exit a managed network. Cloudflare One’s device agent will automatically detect and make the change for them.</p>
    <div>
      <h2>Not everyone needs the same controls</h2>
      <a href="#not-everyone-needs-the-same-controls">
        
      </a>
    </div>
    <p>Not every user in your enterprise needs the same network configuration. Sometimes you need to make exceptions for teams, certain members of staff, or speciality hardware/software based on business needs. Those exceptions can become a manual mess when you compound how locations and networks might also require different settings.</p><p>We’ve heard several examples from customers who run into that type of headache. Each case below describes a common theme: rigid network configuration breaks when it means real world usage.</p><p>In some cases, a user will work physically close to a server or another device that their device needs to reach. We talk to customers in manufacturing or lab environments who prefer to send all Internet-bound traffic to Cloudflare but want to continue to operate a private network inside their facility.</p><p>Today’s announcement allows teams to adapt to this type of model. When users operate inside the physical location in the trusted network, they can connect directly. When they leave, they can use Cloudflare’s network to reach back into the trusted network after they meet the conditions of the Zero Trust rules configured by an administrator.</p><p>In other situations, customers are in the process of phasing out legacy appliances in favor of Cloudflare One. However, the migration to a Zero Trust model sometimes needs to be stepwise and deliberate. In these cases, customers maintain some existing on-premise infrastructure while they deploy Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> solution.</p><p>As part of this release, teams can configure Cloudflare’s device agent to detect that a user sits inside a known location where those appliances still operate. The agent will automatically stop directing traffic to Cloudflare and instead send it to your existing appliances while you deprecate them over time.</p>
    <div>
      <h2>Configuration Profiles and Managed Networks</h2>
      <a href="#configuration-profiles-and-managed-networks">
        
      </a>
    </div>
    <p>Today’s release introduces the ability to <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/">create a profile</a>, a defined set of configuration options. You can create rules that decide when and where profiles apply, changing settings without manual intervention.</p><p>For our network-aware work, administrators can define a profile that decides what traffic is sent to Cloudflare and what stays local. Next, that profile can apply when users are in specific networks and not when they are in other locations.</p><p>Beyond network detection, profiles can apply based on user group membership. Not every user in your workforce needs the same on-ramp configuration. Some developers might need certain traffic excluded due to local development work. As part of this launch, you can configure profiles to apply based on who the user is in addition to where the user sits.</p>
    <div>
      <h2>Defining a secure way to detect a network you manage</h2>
      <a href="#defining-a-secure-way-to-detect-a-network-you-manage">
        
      </a>
    </div>
    <p>Cloudflare needs to be able to decide what network a device is using in a way that can’t easily be spoofed by someone looking to skirt policy. To solve that challenge, today’s release introduces the ability to define a known TLS endpoint which Cloudflare’s agent can reach. In just a few minutes, an administrator can create a certificate-validated check to indicate a device is operating within a <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/managed-networks/">managed network</a>.</p><p>First, an administrator can create a <a href="https://www.cloudflare.com/application-services/products/ssl/">TLS certificate</a> that Cloudflare will use and match based on the SHA-256 hash of the certificate. You can leverage existing infrastructure or create a new TLS endpoint via the following example:</p><p>1. Create a local certificate you can use</p>
            <pre><code>openssl req -x509 -newkey rsa:4096 -sha256 -days 3650 -nodes -keyout example.key -out example.pem -subj "/CN=example.com" -addext "subjectAltName=DNS:example.com"</code></pre>
            <p>2. Extract the sha256 thumbprint of that certificate</p>
            <pre><code>openssl x509 -noout -fingerprint -sha256 -inform pem -in example.pem | tr -d :</code></pre>
            <p>Which will output something like this:</p>
            <pre><code>SHA256 Fingerprint=DD4F4806C57A5BBAF1AA5B080F0541DA75DB468D0A1FE731310149500CCD8662</code></pre>
            <p>Next, the Cloudflare agent running on the device needs to be able to reach that certificate to validate that it is connected to a network you manage. We recommend running a simple HTTP server inside your network which the device can reach to validate the certificate.</p><p>3. Create a python3 script and save as <code>myserver.py</code> as part of setting up a simple <a href="https://gist.github.com/dergachev/7028596">HTTP server</a>.</p>
            <pre><code>import ssl, http.server

class BasicHandler(http.server.BaseHTTPRequestHandler):
    def do_GET(self):
        self.send_response(200)
        self.send_header('Content-type', 'text/html')
        self.end_headers()
        self.wfile.write(b'OK')
        return

server = http.server.HTTPServer(('0.0.0.0', 4443), BasicHandler)
sslcontext = ssl.create_default_context(ssl.Purpose.CLIENT_AUTH)
sslcontext.load_cert_chain(certfile='./example.pem', keyfile='./example.key')
server.socket = sslcontext.wrap_socket(server.socket, server_side=True)
server.serve_forever()</code></pre>
            <p>Run the server</p>
            <pre><code>python3 myserver.py</code></pre>
            
    <div>
      <h3>Configure the network location in Zero Trust dashboard</h3>
      <a href="#configure-the-network-location-in-zero-trust-dashboard">
        
      </a>
    </div>
    <p>Once you’ve created the example TLS endpoint above, provide the fingerprint to Cloudflare to define a managed network.</p><ol><li><p>Login to your Zero Trust Dashboard and navigate to Settings → WARP Client</p></li><li><p>Scroll down to Network Locations and click <code>Add new</code> and complete the form. Use the Fingerprint generated in the previous step as the TLS Cert SHA-256 and the IP address of the device running the python script</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Mwd8xWdnqPjlaiqgWF7Lt/3a8ea0f884c6e0dcd8630f3b6a3e9fef/image2-14.png" />
            
            </figure>
    <div>
      <h3>Configure a Device Profile</h3>
      <a href="#configure-a-device-profile">
        
      </a>
    </div>
    <p>Once the network is defined, you can <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/configure-warp/device-profiles/">create profiles</a> that apply based on whether the agent is operating in this network. To do so, follow the steps below.</p><ol><li><p>Login to your Zero Trust Dashboard and navigate to Settings → WARP Client</p></li><li><p>Scroll down to <code>Device Settings</code> and create a new profile that includes Your newly created managed network as a location</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8GMjayplYNW1fxpM8f3VE/a5cf5bf8964cd10b190740430309d3eb/image3-10.png" />
            
            </figure>
    <div>
      <h3>Reconnect your Agent</h3>
      <a href="#reconnect-your-agent">
        
      </a>
    </div>
    <p>Each time the device agent detects a network change event from the operating systems (ex. waking up the device, changing Wi-Fi networks, etc.) the agent will also attempt to reach that endpoint inside your network to prove that it is operating within a network you manage.</p><p>If an endpoint that matches the SHA-256 fingerprint you’ve defined is detected, the device will get the settings profile as configured above. You can quickly validate that the device agent received the required settings by using warp-cli settings or warp-cli get-alternate-network from your command line / terminal.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Managed network detection and settings profiles are both new and available for you to use today. While settings profiles will work with any modern version of the agent from this last year, network detection requires at least version 2022.12.</p><p>The WARP device client currently runs on <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/download-warp/">all major operating systems</a> and is easy to deploy with the <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/">device management</a> tools your organization already uses. You can find the download links to all versions of our agent by visiting Settings →Downloads</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YQhXAsEd1SwYqefvewGK1/67fb9bca5a15461fd11b2fc804f4a0f3/image1-21.png" />
            
            </figure><p>Starting a Zero Trust journey can be daunting. We’re spending this week, CIO Week, to share features like this to make it less of a hassle to begin. If you want to talk to us to learn more about how to take that first step, please <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">reach out</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[WARP]]></category>
            <guid isPermaLink="false">1Cch33DIW8NEqcSFzG9Gjj</guid>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
    </channel>
</rss>