SlideShare una empresa de Scribd logo
1 de 28
Webinar
Close your security gaps and get 100% of your traffic
protected with Cloudflare
Speakers
Stephane Nouvellon
Principal Solutions Engineer @ Cloudflare
Philip Bjorkman
Strategic Vertical Account Executive: Gaming &
Gambling @ Cloudflare
What we are talking about today
Security challenges faced by online gaming & gambling platforms
Strategies to secure on-prem networks (layer 3) and applications (layer 7)
About Cloudflare
Cloudflare is a leading security, performance, and reliability company.
We protect and accelerate any Internet application online without adding
hardware, installing software, or changing a line of code.
We have one of the world’s largest networks that powers more than 28
million Internet properties, with approximately 16% of the Fortune 1,000
companies using at least one Cloudflare product.
Trusted by:
PERFORMANCE &
RELIABILITY
SECURITY
Domain Name
System (DNS)
Firewall
AnalyticsWorkers
IoT Security
Cache
Load Balancing
SSL/TLS
Secure Origin
Connection
Rate
Limiting
Bot Management
DDoS Protection
Intelligent
Routing
Image
Optimization
Access
CLOUDFLARE FOR INFRASTRUCTURE
CLOUDFLARE
FOR TEAMS
Magic Transit
Gateway
Workers KV
SERVERLESS
APPLICATION
PLATFORM
Stream
Integrated, Intelligent Global Cloud Network
28M+
Internet properties
200+
Cities and 95 countries
45B
Cyber threats blocked each day in
Q1’20
+95%
Of the Internet-connected population
in the world is located within 100
milliseconds of our network
Note: Data as of June 28, 2019.
Cloudflare’s network operates at massive
scale
Confidential. Copyright © Cloudflare, Inc.
Application Layer7
Transport Layer
Session Layer5
Datalink Layer2
Physical Layer1
IP, GRE, any packet/protocol
● Magic Transit
Presentation Layer6
Network Layer
Transport Layer4
Network Layer3
Physical interconnects with
our customers, globally
HTTP, DNS
● Authoritative DNS
● CDN
● Argo
● Load Balancing
● WAF
● Bot Management
● Video Streaming
● Authentication
TCP/UDP
● Spectrum
● Argo
● Load Balancing
7
Cloudflare Security
Stack
Every service we offer runs on every server in every datacenter
around the world
8
#1 Scrapers & other automated source of
traffic
How bad bots affect your business
Take-over of user’s account from
automatically applying previously stolen
account credentials.
Scraping and stealing information from a
website
Adding malicious content to web
properties such as forums and
registration forms
Credential Stuffing
Content Scraping
Content Spam
Fraudulently purchase goods to deprive
legitimate customers or resell for a higher
price
Inventory Hoarding
Credit Card Stuffing
Attempts to validate stolen credit cards to then
make fraudulent purchases
Application DDoS
Slowing sites, wasting bandwidth and compute
resources
Evolution of Bots
● Simply collect info
● Limited number of static
IP addresses
● Repetitive attack pattern
● Easy to detect
Basic Bots
● Mimic human behavior or
hijack a real customer’s
browser and tokens
● Need threat intelligence,
behavioral analysis, machine
learning, fingerprinting
Sophisticated Bots
● Steal sensitive data, commit
fraud, and disrupt business
● Botnets, change source IP
addresses or to originate
from legitimate customers’
devices
● Challenge scripts, sending
misleading information to a
bot
Mature Bots
Impact due to bot attacks
Financial OperationalReputational
●Pipeline and
sales impact
●Customer
reimbursement
●Customer trust
and loyalty
●Brand reputation
●Service disruption
●Firefighting mode
with resource
reallocation
Traditional solutions aren’t enough anymore
● Filtering IPs, User-Agent, Cloud
provider ASns
● Rate Limiting
● WAF
● Authentication
● DDoS protection
The Cloudflare Bot Difference
Fast Intelligent Integrated
● Cutting-edge detection
engines
● Constantly learning
from billions of new
requests
● SDK-free
● Implement in under one
hour
● Onboard customers
under attack
● Effectively zero latency
● Retroactive analytics
for existing customers
● Built to work with
Cloudflare’s security
suite
● No scale concerns
How it works
Bot protection as a framework
Built for security needs of the modern business
Configuration
Flexibility
Threat Intelligence
At-Scale
Automatic Allowlist
Optional JS injection
Integrated Security
and Performance
Mobile App Endpoint and
API Protection
Complete without
Complexity
Bot Management
#2 What if HTTP isn’t your only public
facing perimeter?
Extending Cloudflare to networks
Layer 3 — IP Layer 4 — TCP
DDoS
mitigation
IP
firewall
L4
load
balancing
TLS &
protocols
CLOUDFLARE DATA CENTER
REVERSE PROXY
CUSTOMER
ORIGIN
NETWORK(S)
Layer 7 — HTTP
WAF
Content
caching
Filtering IP level traffic
Magic Transit: Our battle-tested network stack, available in
front of a customer’s data center for Layer 3 protection
Cloudflare Data Center
200 Cities in 100+ countries
51 Tbps DDoS mitigation capacity
Biggest attack mitigated ~942
gbps
DDoS protection
Near-instant TTM
Network firewall
Granular Allow/Deny rules
Customer Data Center
LAYER 3 - IP
(MAGIC TRANSIT)
20
Benefits
Get rid of network perimeter
hardware
DDoS protection, network
firewall, traffic acceleration,
and more delivered as a
service
Drive down your TCO
Pay exactly for only what
you use. Get operational
agility with VNFs
delivered and billed as a
service
Get security + performance for
your networks
Cloudflare has a physical
presence in over 200 cities across
100+ countries. Magic Transit
delivers DDoS protection with
integrated performance benefits
Connect:
Using BGP route
announcements customer
network traffic is ingested
by Cloudflare
Protect and Process:
All traffic inspected for
attacks automatically and
immediately
Accelerate:
Clean traffic is routed back
to the customer network
over Cloudflare. Anycast
GRE tunnels deliver traffic
to the customer network
How it works
PNI
Customers can
physically connect
using Private
Network
Interconnect (PNI) at
any of Cloudflare’s
physical Points of
Presence
How to connect to Cloudflare
Internet Exchanges
Customers who want to
use existing Internet
Exchanges can
interconnect with us at
any of the 235+ Internet
Exchanges that
Cloudflare participates
in
Virtual connections
Cloudflare has
partnered with five
cloud-exchange
providers to allow
customers to
connect using virtual
links at any of the
partner locations
Legit Client
Attacker
BGP announcements (from
dedicated scrubbing centers)
L3/ 4 attack traffic
L3 scrubbing centers
L7 attack traffic
Additional hop (latency) for
other L7 processing of
traffic
L7 services
Ingress to customer data center (over Anycast GRE/ PNI)
Customer data center
Egress (over the internet)
Other
implementation
s have dedicated
‘scrubbing
centers’ where
the traffic is
inspected for L3
threats before
being processed
for other L7
services—this
adds delay to
network traffic
Legit traffic
Legit Client
Attacker
BGP announcements
from every single
Cloudflare data center
L3/ 4 attack
traffic
Customer data center
Egress (over the internet)
All L3/ L4-7 services delivered from every Cloudflare
data center (no need for traffic diversion)
Smart routing over the
Cloudflare network
Ingress to customer data center
(over Anycast GRE/ PNI)
Legit traffic
Attacks are detected and mitigated at a Cloudflare
data center closest to the source of origin
Summary - Magic Transit Key Features
● DDoS mitigation capacity > 51+ Tbps
● Mitigate most attacks in < 3 seconds
● Sub-second threat detection
● BGP routing and GRE encapsulation
● 24 x 7 x 365 SOC
● Native integration with L7 services (CDN,
WAF, Bot Management, etc.)
● Support for all IP services (TCP, UDP,
IPSec, VoIP, custom protocols)
● Analytics dashboard
Wrap-up
Q&A

Más contenido relacionado

La actualidad más candente

Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero TrustOkta-Inc
 
Azure DDoS Protection Standard
Azure DDoS Protection StandardAzure DDoS Protection Standard
Azure DDoS Protection Standardarnaudlh
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101Cloudflare
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Microsoft Azure Technical Overview
Microsoft Azure Technical OverviewMicrosoft Azure Technical Overview
Microsoft Azure Technical Overviewgjuljo
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 

La actualidad más candente (20)

Cloudflare Access
Cloudflare AccessCloudflare Access
Cloudflare Access
 
Azure WAF
Azure WAFAzure WAF
Azure WAF
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Azure DDoS Protection Standard
Azure DDoS Protection StandardAzure DDoS Protection Standard
Azure DDoS Protection Standard
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Microsoft Azure Technical Overview
Microsoft Azure Technical OverviewMicrosoft Azure Technical Overview
Microsoft Azure Technical Overview
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
What is SASE
What is SASEWhat is SASE
What is SASE
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 

Similar a Close your security gaps and get 100% of your traffic protected with Cloudflare

Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksCloudflare
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentJean Ryu
 
Authentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsAuthentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsCloudflare
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsCloudflare
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 
Confluent & GSI Webinars series - Session 3
Confluent & GSI Webinars series - Session 3Confluent & GSI Webinars series - Session 3
Confluent & GSI Webinars series - Session 3confluent
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsNetworkCollaborators
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini SummitKaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summitkimw001
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationAmazon Web Services
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
Contact Center Capabilities
Contact Center CapabilitiesContact Center Capabilities
Contact Center Capabilitiesservice007
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisationanupriti
 
Building what's next with google cloud's powerful infrastructure
Building what's next with google cloud's powerful infrastructureBuilding what's next with google cloud's powerful infrastructure
Building what's next with google cloud's powerful infrastructureMediaAgility
 

Similar a Close your security gaps and get 100% of your traffic protected with Cloudflare (20)

Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
Authentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsAuthentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of Things
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Confluent & GSI Webinars series - Session 3
Confluent & GSI Webinars series - Session 3Confluent & GSI Webinars series - Session 3
Confluent & GSI Webinars series - Session 3
 
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini SummitKaztranscom  - OpenStack Summit 2016/Red Hat NFV Mini Summit
Kaztranscom - OpenStack Summit 2016/Red Hat NFV Mini Summit
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital Transformation
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
Contact Center Capabilities
Contact Center CapabilitiesContact Center Capabilities
Contact Center Capabilities
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisation
 
Building what's next with google cloud's powerful infrastructure
Building what's next with google cloud's powerful infrastructureBuilding what's next with google cloud's powerful infrastructure
Building what's next with google cloud's powerful infrastructure
 

Más de Cloudflare

Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceCloudflare
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarCloudflare
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...Cloudflare
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Cloudflare
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataCloudflare
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondCloudflare
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cloudflare
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaCloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?Cloudflare
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cloudflare
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformationCloudflare
 
Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策Cloudflare
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaCloudflare
 
Webinar - Cyber Security basics in Japanese
Webinar - Cyber Security basics in JapaneseWebinar - Cyber Security basics in Japanese
Webinar - Cyber Security basics in JapaneseCloudflare
 
How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesCloudflare
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internetCloudflare
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyCloudflare
 
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerCloudflare
 

Más de Cloudflare (20)

Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
 
Webinar - Cyber Security basics in Japanese
Webinar - Cyber Security basics in JapaneseWebinar - Cyber Security basics in Japanese
Webinar - Cyber Security basics in Japanese
 
How to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer GamesHow to Plan for Performance and Scale for Multiplayer Games
How to Plan for Performance and Scale for Multiplayer Games
 
Fight bad bot on the internet
Fight bad bot on the internetFight bad bot on the internet
Fight bad bot on the internet
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
 
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
 

Último

Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 

Último (20)

Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 

Close your security gaps and get 100% of your traffic protected with Cloudflare

  • 1. Webinar Close your security gaps and get 100% of your traffic protected with Cloudflare
  • 2. Speakers Stephane Nouvellon Principal Solutions Engineer @ Cloudflare Philip Bjorkman Strategic Vertical Account Executive: Gaming & Gambling @ Cloudflare
  • 3. What we are talking about today Security challenges faced by online gaming & gambling platforms Strategies to secure on-prem networks (layer 3) and applications (layer 7)
  • 4. About Cloudflare Cloudflare is a leading security, performance, and reliability company. We protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code. We have one of the world’s largest networks that powers more than 28 million Internet properties, with approximately 16% of the Fortune 1,000 companies using at least one Cloudflare product. Trusted by:
  • 5. PERFORMANCE & RELIABILITY SECURITY Domain Name System (DNS) Firewall AnalyticsWorkers IoT Security Cache Load Balancing SSL/TLS Secure Origin Connection Rate Limiting Bot Management DDoS Protection Intelligent Routing Image Optimization Access CLOUDFLARE FOR INFRASTRUCTURE CLOUDFLARE FOR TEAMS Magic Transit Gateway Workers KV SERVERLESS APPLICATION PLATFORM Stream Integrated, Intelligent Global Cloud Network
  • 6. 28M+ Internet properties 200+ Cities and 95 countries 45B Cyber threats blocked each day in Q1’20 +95% Of the Internet-connected population in the world is located within 100 milliseconds of our network Note: Data as of June 28, 2019. Cloudflare’s network operates at massive scale Confidential. Copyright © Cloudflare, Inc.
  • 7. Application Layer7 Transport Layer Session Layer5 Datalink Layer2 Physical Layer1 IP, GRE, any packet/protocol ● Magic Transit Presentation Layer6 Network Layer Transport Layer4 Network Layer3 Physical interconnects with our customers, globally HTTP, DNS ● Authoritative DNS ● CDN ● Argo ● Load Balancing ● WAF ● Bot Management ● Video Streaming ● Authentication TCP/UDP ● Spectrum ● Argo ● Load Balancing 7 Cloudflare Security Stack
  • 8. Every service we offer runs on every server in every datacenter around the world 8
  • 9. #1 Scrapers & other automated source of traffic
  • 10. How bad bots affect your business Take-over of user’s account from automatically applying previously stolen account credentials. Scraping and stealing information from a website Adding malicious content to web properties such as forums and registration forms Credential Stuffing Content Scraping Content Spam Fraudulently purchase goods to deprive legitimate customers or resell for a higher price Inventory Hoarding Credit Card Stuffing Attempts to validate stolen credit cards to then make fraudulent purchases Application DDoS Slowing sites, wasting bandwidth and compute resources
  • 11. Evolution of Bots ● Simply collect info ● Limited number of static IP addresses ● Repetitive attack pattern ● Easy to detect Basic Bots ● Mimic human behavior or hijack a real customer’s browser and tokens ● Need threat intelligence, behavioral analysis, machine learning, fingerprinting Sophisticated Bots ● Steal sensitive data, commit fraud, and disrupt business ● Botnets, change source IP addresses or to originate from legitimate customers’ devices ● Challenge scripts, sending misleading information to a bot Mature Bots
  • 12. Impact due to bot attacks Financial OperationalReputational ●Pipeline and sales impact ●Customer reimbursement ●Customer trust and loyalty ●Brand reputation ●Service disruption ●Firefighting mode with resource reallocation
  • 13. Traditional solutions aren’t enough anymore ● Filtering IPs, User-Agent, Cloud provider ASns ● Rate Limiting ● WAF ● Authentication ● DDoS protection
  • 14. The Cloudflare Bot Difference Fast Intelligent Integrated ● Cutting-edge detection engines ● Constantly learning from billions of new requests ● SDK-free ● Implement in under one hour ● Onboard customers under attack ● Effectively zero latency ● Retroactive analytics for existing customers ● Built to work with Cloudflare’s security suite ● No scale concerns
  • 16. Bot protection as a framework
  • 17. Built for security needs of the modern business Configuration Flexibility Threat Intelligence At-Scale Automatic Allowlist Optional JS injection Integrated Security and Performance Mobile App Endpoint and API Protection Complete without Complexity Bot Management
  • 18. #2 What if HTTP isn’t your only public facing perimeter?
  • 19. Extending Cloudflare to networks Layer 3 — IP Layer 4 — TCP DDoS mitigation IP firewall L4 load balancing TLS & protocols CLOUDFLARE DATA CENTER REVERSE PROXY CUSTOMER ORIGIN NETWORK(S) Layer 7 — HTTP WAF Content caching Filtering IP level traffic
  • 20. Magic Transit: Our battle-tested network stack, available in front of a customer’s data center for Layer 3 protection Cloudflare Data Center 200 Cities in 100+ countries 51 Tbps DDoS mitigation capacity Biggest attack mitigated ~942 gbps DDoS protection Near-instant TTM Network firewall Granular Allow/Deny rules Customer Data Center LAYER 3 - IP (MAGIC TRANSIT) 20
  • 21. Benefits Get rid of network perimeter hardware DDoS protection, network firewall, traffic acceleration, and more delivered as a service Drive down your TCO Pay exactly for only what you use. Get operational agility with VNFs delivered and billed as a service Get security + performance for your networks Cloudflare has a physical presence in over 200 cities across 100+ countries. Magic Transit delivers DDoS protection with integrated performance benefits
  • 22. Connect: Using BGP route announcements customer network traffic is ingested by Cloudflare Protect and Process: All traffic inspected for attacks automatically and immediately Accelerate: Clean traffic is routed back to the customer network over Cloudflare. Anycast GRE tunnels deliver traffic to the customer network How it works
  • 23. PNI Customers can physically connect using Private Network Interconnect (PNI) at any of Cloudflare’s physical Points of Presence How to connect to Cloudflare Internet Exchanges Customers who want to use existing Internet Exchanges can interconnect with us at any of the 235+ Internet Exchanges that Cloudflare participates in Virtual connections Cloudflare has partnered with five cloud-exchange providers to allow customers to connect using virtual links at any of the partner locations
  • 24. Legit Client Attacker BGP announcements (from dedicated scrubbing centers) L3/ 4 attack traffic L3 scrubbing centers L7 attack traffic Additional hop (latency) for other L7 processing of traffic L7 services Ingress to customer data center (over Anycast GRE/ PNI) Customer data center Egress (over the internet) Other implementation s have dedicated ‘scrubbing centers’ where the traffic is inspected for L3 threats before being processed for other L7 services—this adds delay to network traffic Legit traffic
  • 25. Legit Client Attacker BGP announcements from every single Cloudflare data center L3/ 4 attack traffic Customer data center Egress (over the internet) All L3/ L4-7 services delivered from every Cloudflare data center (no need for traffic diversion) Smart routing over the Cloudflare network Ingress to customer data center (over Anycast GRE/ PNI) Legit traffic Attacks are detected and mitigated at a Cloudflare data center closest to the source of origin
  • 26. Summary - Magic Transit Key Features ● DDoS mitigation capacity > 51+ Tbps ● Mitigate most attacks in < 3 seconds ● Sub-second threat detection ● BGP routing and GRE encapsulation ● 24 x 7 x 365 SOC ● Native integration with L7 services (CDN, WAF, Bot Management, etc.) ● Support for all IP services (TCP, UDP, IPSec, VoIP, custom protocols) ● Analytics dashboard
  • 28. Q&A

Notas del editor

  1. Cloudflare is a company which provides security, performance, and reliability to any web-facing property. Traiditionally this meant web-sites, or web-facing applications for example mobile banking, and we did this by operating as a reverse proxy for HTTP traffic. We’ve actually expanded that capability such that we are now ability to proxy any TCP and UDP traffic, will talk about that in a bit, but this allows you now to put your game server behind Cloudflare as well We have more than 20 million such internet properties behind us, and you can see a few recognizable names like Discord and Hypixel there, who are utilizing various Cloudflare features
  2. Cloudflare delivers a platform of deeply integrated products that serve as a unified control plane for our customers. Our comprehensive Platform includes purpose built products for security, performance, reliability in one unified solution. The platform also makes it easy to build serverless application using edge computing, developing Cloudflare applications while providing meaningful insights and analytics on web activities. Modern architecture with integrated design Single UI to manage security and performance All underlying data in centralized location allows faster insights into performance and security Ensures uptime during DDoS attacks while delivering accelerated performance for the applications
  3. Cloudflare’s network has the breadth and scale that organizations need to run their Internet applications. Organizations benefit from our unique architecture has all products and services running on every server, in every data center, improving our network for our customers with every new colo. Our network offers scale, the performance that helps organizations deliver superior application experience while keeping their environments secure.
  4. I always like to start speaking about Cloudflare by representing the portfolio aligned with the OSI Model since it provides a great visual overview or where Cloudflare’s solution is actually operating on your applications and infrastructures: Layer 7 or application. This is where Cloudflare started 10 years ago with Performance and Security at the HTTP level. Bot Management is a relatively recent addition that we’re going to see in more detail later on in the presentation Down to the layer 4. Because HTTP is probably not the only protocol you’re using and you might want to accelerate and protect. Cloudflare provide security, acceleration and load balancing for your TCP/UDP applications The network layer is also an important piece of our stack, where Cloudflare can provide performance and security at the IP level with Magic transit that we’re going to see in more detail in the presentation And finally down to the physical layer where Cloudflare can directly interconnect either physically or virtually with your infrastructure so cloudflare ends up being virtually on top of your rack with no borders left facing the internet without protection.
  5. And an important point to note is that Cloudflare provides its service in a fully integrated way, which means that every single line of code representing service we offer runs on every server, in every datacenter and this all around the world where Cloudflare has a point of presence.
  6. The first challenge we observed on the Gaming and Gambling industry is regarding scrapers and in general any kind of unwanted source of automated traffic targeting your applications
  7. Here is a non comprehensive list of use-cases these bots are having when it comes to operate botnets towards your Origins Credential Stuffing: This is how attackers are validating lists of credential stolen on the internet with the intent of either access these accounts on your services or just validate the accuracy of this listing for future coordinated attacks or selling of the validated information Inventory hoarding: This targets especially ecommerce with the intent of programmatically buying all items and preventing real users from doing so Content scraping: This one is particularly observed in the gambling industry where scrapers are industrially monitoring odds of the competition to place theirs in a better spot Credit card stuffing: This one intents to validate stolen source of credit card information towards your application for fraudulent buying or validating credentials to sell them at a higher price Content Spam: This one target any location of your website accepting information to be posted to either inject malicious payload or simply flood your workflows. This could be forums, account creation or reset a password interfaces Application DDoS: Maybe not the most intuitive one but given these attacks are targeting dynamic portion of websites since they need to somehow interact with it it, it could end up having the application itself being non responsive and leave the real users with a bad experience
  8. At Cloudflare we observed a quite representative transition in how these bots are operated for the last 5 years. They came from a basic to mature footprint which implies a limited number of IPs being used, limited support for Javascript computation to a more sophisticated form. This last one is very special since is in general very targeted where perpetrators are studying with detail the perimeter of the application to target, how does the real user experience looks like in terms of requests so they can emulate these without leaving obvious footprints. They also implement advanced stacks that are able to mimic real browser behaviours, they can solve challenges and they can leverage a large range of IP, both being originating from Datacenter or even residential ISPs. This is the type of bot we’re going to focus here with Bot Management.
  9. These are potentially impacting your operations via three potential ways. The first one is financial where you can end up being in a situation that you cannot sell to your customers since all your stock is being taken off from them. Second is reputation and this has to do with the experience provided to your customers, this can either be coming from the fact your application is slow or unavailable because the automated traffic is disrupting it. And finally operational because it costs already a lot to operate your service and even more with at the same time coping with the level of traffic these automated source of traffic are targeting your website.
  10. Traditional Cloudflare’s offering was great at mitigating basic and mature bots but with the sophistication of these sources of automated traffic, they were not enough anymore.
  11. Now, Cloudflare Bot Management difference in three key propositions It is fast, because directly embedded in Cloudflare’s Security and Performance stack and provide a quick onboarding experience. No latency is added when adding Bot Management into the mix It is intelligent, and this is the advantage of having such a breath of traffic with about 20M request/second in average received on the platform. This allows Cloudflare to learn even quicker and react to Bot transition and new trends It is fully integrated, Bot Management is a product that can interact with other security products with no compromise on performance
  12. In terms of operations, Bot Management is an addition to what Cloudflare does already on your traffic for performance and security Purposes. Bot Management analyses the traffic and establish a score coming from a various list of specific features like Machine learning, Behavioral analysis, Heuristics, JS fingerprinting and finally curating a list of verified bots to make sure none of your wanted automated traffic is being blocked. All this platform integrates with the rest of Cloudflare’s stacks and provide you another signal to take accurate action on your traffic, with no latency added. On top of that, when it comes to operating the solution, Cloudflare offers rich analytics and raw logs so your teams can monitor your applications at all time.
  13. Bot Management as explained is provided as a platform that could be used in coordination with the other product which in turns allows customers to implement the solution via many ways. The score could be used in the Firewall Engine provided by Cloudflare, be pushed to your backend for analysis or even be leveraged inside our Serverless computing platform for advanced mitigation. This last scenario is quite popular since it allows for instance to mitigate bot by confusing them. Instead of blocking or challenging the traffic which would give indication to the bot that he was detected, why not sending a confusing payload with randomized information? This is what the integration with workers allows.
  14. Finally, Cloudflare Bot Management in a nutshell, this is: Complete without Complexity: Protects against a full range of bot attacks with instant deployment Threat Intelligence At-Scale: Leverages diverse data from more than 27 million Internet properties. Applies machine learning, behavioral analysis, and fingerprinting to accurately identify bots. Integrated Security and Performance: Bot Management Integrates seamlessly with Cloudflare's DDoS, WAF, and CDN, enhancing - security, user experience and performance. Automatic allowlist: Allows good bots, such as those belonging to search engines, to keep reaching site while preventing malicious traffic. API and Mobile App Protection: Protects APIs that are generated in an automated fashion, accessed via web browsers. The solution also protects mobile applications from impersonation and emulation attacks. Configuration Flexibility: Granular rules, user-defined mitigations and integration with Cloudflare’s Workers platform allows for unique actions beyond the industry standard.
  15. The second challenge is around the scope of the properties being protected, sometimes HTTP or even TCP/UDP aren’t the only types of application or resources you’ve got public facing and by extension you need to protect. We’re going to see how to close these gaps with Magic Transit.
  16. When we started 10 years ago, we were providing Layer 7 Security and Performance but it didn’t mean that Cloudflare wasn’t operating DDoS mitigation for lower level of the OSI stack. With Magic transit, we’re making available to customer the product we’ve built all these years to protect our infrastructure so we can protect yours, too. IP Level protection is directly operated by Cloudflare and sent back to customer Origin infrastructure when mitigated.
  17. Magic transit isn’t different from the other products in the stack, this is totally integrated. It means Magic transit is operated in any server of any datacenter and this all around the world with providing a total of 51 tbps of mitigation capacity. As of now and just to give you a perspective of the scale we provide with the platform, the biggest attack our network has mitigated was generating 942 gbps of traffic. From a packets perspective, the biggest attack we mitigated was generating 754 Million packet per second.
  18. Now on to the benefits of Magic Transit: One — it helps business make their transformation to the cloud and get rid of some portion of their on-premise boxes, Magic transit operates on all your traffic for DDoS purposes Two — it provides security without compromise on performance. And using a network like Cloudflare’s helps with that + the fact that the solution is fully integrated with the others features and products the scanning of traffic is done only once and for all before reaching your infrastructure Third — costs. More and more companies we talk to are looking for ways to reduce their Capex. Magic Transit helps you dramatically reduce your Capex and delivers operational agility with virtual network functions delivered and billed as a service.
  19. OK, so how does it work? We use BGP to announce routes to the customer’s network. Note that this is fundamentally a different product than anything Cloudflare has ever offered. This is not a simple DNS redirect. It’s a more involved process where we tell the Internet that we are the customer’s network and ingest all traffic destined to their networks using BGP. We can announce any customer network that is larger than a /24 prefix. Once ingested by a Cloudflare data center closest to the source, the traffic is inspected for any threats. Of course, any L7 traffic that would benefit from content caching or WAF inspection is “upgraded” to our L7 pipeline without incurring additional network hops. All clean network traffic is then encapsulated using GRE and tunneled over from the Cloudflare data center to the customer network. GRE tunnels are initiated from Cloudflare’s anycast endpoints to the customer’s network. Anycast GRE tunnels ensure they are highly available and resilient to network failures that would bring traditional GRE tunnels down. Finally, any egress traffic from the customer’s network is sent directly to the requestor/ client using Direct Server Return.
  20. Now, the next important question is the following: How do I connect with Cloudflare? Multiple solutions, the default being establishing a GRE tunnel over the internet but some other scenarios are also supported such as: PNI: Setting up a cable between your infrastructure and Cloudflare where a location is compatible Internet exchanges: Setting up a BGP peering directly within an IX Virtual Connections: Setting up a connection via cloud-exchange providers we support (Zayo, Equinix, Megaport, ConsoleConnect, PacketFabric)
  21. Important point to mention is the life of the packets and requests, when it comes to implement such a scrubbing mechanisms. This schema shows you how in general this kind of security solution is being implemented. You can see here in the schema that two locations are being used to clean the traffic at layer 3 and then at Layer 4 and 7. Where this isn’t specifically a problem for bad traffic since we do not really care about the performance of this mitigation anyway, it can induce latency for legitimate traffic when crossing multiple hops potentially sitting in different regions. The blue line shows here that for legitimate traffic, 2 hops are going to be needed before reaching to the backend infrastructure.
  22. With Cloudflare, the traffic goes through only on location and is inspected only once from Layer 3 up to layer 7 before being sent to your infrastructure if legitimate. Cloudflare also implement a smart routing of the traffic to leverage even more the backbone so the traffic goes back to the infrastructure in the most efficient way.
  23. Now a summary of the solution and what it provides
  24. What requirement do you ask customers when using Magic Transit? (/24 subnet minimum and being able to sign a letter of authorization. Optional including ASN 13335 in the RPKI implementation) Does Magic transit require customers to have a private interconnection with Cloudflare? (No, a GRE tunnel over the internet could be established too) Is any modification needed at the client or application-side to use Bot Management? (No, Bot Management works directly on proxied request and challenge mitigation is inserted by Cloudflare directly without any change required) How Bot Management is different from manually creating Firewall rules to mitigate traffic? (Bot Management provides the intelligence of the network and does it automatically for you with no operation overhead) How is it possible that Cloudflare can support the execution of the security at different layer of the OSI model?