
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 03 Apr 2026 03:45:39 GMT</lastBuildDate>
        <item>
            <title><![CDATA[China Express: Cloudflare partners to boost performance in China for corporate networks]]></title>
            <link>https://blog.cloudflare.com/china-express/</link>
            <pubDate>Fri, 13 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ China Express is a suite of connectivity and performance offerings designed to improve application performance for users in China. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3l66m1AWwUMi6FodtAFk4g/458ba9ec5b0fb9515645de51316e4928/image2-26.png" />
            
            </figure><p>Cloudflare has been helping global organizations offer their users a consistent experience all over the world. This includes mainland China, a market our global customers cannot ignore but that continues to be challenging for infrastructure teams trying to ensure performance, security and reliability for their applications and users both in and outside mainland China. We are excited to announce China Express — a new suite of capabilities and best practices in partnership with our partners China Mobile International (CMI) and CBC Tech — that help address some of these performance challenges and ensure a consistent experience for customers and employees everywhere.</p><p>Cloudflare has been providing <a href="https://www.cloudflare.com/application-services/">Application Services</a> to users in mainland China since 2015, improving performance and security using in-country data centers and caching. Today, we have a presence in 30 cities in mainland China thanks to our strategic partnership with <a href="/cloudflare-partners-with-jd-cloud/">JD Cloud</a>. While this delivers significant performance improvements, some requests still need to go back to the origin servers which may live outside mainland China. With limited international Internet gateways and restrictive cross-border regulations, international traffic has a very high latency and packet drop rate in and out of China. This results in inconsistent cached content within China and a poor experience for users trying to access dynamic content that requires frequent access to the origin.</p><p>Last month, we expanded our Cloudflare One, Zero Trust <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service</a> platform to users and organizations in China with additional connectivity options. This has received tremendous interest from customers, so we’re looking at what else we could do to further improve the user experience for customers with employees or offices in China.</p>
    <div>
      <h3>What is China Express?</h3>
      <a href="#what-is-china-express">
        
      </a>
    </div>
    <p>China Express is a suite of connectivity and performance offerings designed to simplify connectivity and improve performance for users in China. To understand these better, let’s take an example of Acme Corp, a global company with offices in Shanghai and Beijing — with origin data centers in London and Ashburn. And let’s see how we can help their infrastructure teams better serve employees and users in mainland China.</p>
    <div>
      <h3>China Express Premium DIA</h3>
      <a href="#china-express-premium-dia">
        
      </a>
    </div>
    <p>Premium Dedicated Internet Access, is an optimized, high-quality public Internet circuit for cross-border connectivity provided by our local partners CMI and CBC Tech. With this service, traffic from mainland China will arrive at our partner data center in Hong Kong, using a fixed NAT IP. Customers do not worry about compliance issues because their traffic still goes through the public Internet with all regulatory controls in place.</p><p>Acme Corp can use Premium DIA to improve origin performance for their Cloudflare service in mainland China. Requests to the origin data centers in Ashburn and London would traverse the Premium DIA connection, which offers more bandwidth and lower packet loss resulting in more than a 60% improvement in performance.</p><p>Acme employees in mainland China would also see an improvement while accessing SaaS applications such as Microsoft 365 over the Internet when these apps are delivered from outside China. They would also notice an improvement in Internet speed in general.</p>
    <div>
      <h3>China Express Private Link</h3>
      <a href="#china-express-private-link">
        
      </a>
    </div>
    <p>While Premium DIA offers Acme performance improvements over the public Internet, they may want to keep some mission-critical application traffic on a private network for security reasons. Private link offers a dedicated private tunnel between Acme’s locations in China and their data centers outside of China. Private Link can also be used to establish dedicated private connectivity to SaaS data centers like Salesforce.</p><p>Private Link is a highly regulated area in China and depending on your use case, there might be additional requirements from our partners to implement it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tNTZTDshIoX7mWpa1dbs9/269ae731a302957dffeedaeb17633069/image1-33.png" />
            
            </figure>
    <div>
      <h3>China Express Travel SIM</h3>
      <a href="#china-express-travel-sim">
        
      </a>
    </div>
    <p>Acme Corp might have employees visiting China on a regular basis and need access to their corporate apps on their mobile devices including phones and tablets. Their IT teams not only have to procure and provision mobile Internet connectivity for their users, but also enforce consistent <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> controls.</p><p>Cloudflare is pleased to announce that the Travel SIM provided by Cloudflare’s partner CMI automatically provides network connectivity and can be used together with the Cloudflare WARP Client on mobile devices to provide Cloudflare’s suite of Zero Trust security services. Using the same Zero Trust profiles assigned to the user, the WARP client will automatically use the available 4G LTE network and establish a WireGuard tunnel to the closest Cloudflare data center outside of China. The data connection can also be shared with other devices using the hotspot function on the mobile device.</p><p>With the Travel SIM, users can enjoy the same Cloudflare global service as the rest of the world when traveling to China. And IT and security teams no longer need to worry about purchasing or deploying additional Zero Trust seats and device clients to ensure the employees’ Internet connection and the security policy enforcement.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gQPs5y5YsCpGrrWnzytl8/4f28ba9f9a3a7c0318bcce4c9c77931c/image3-24.png" />
            
            </figure>
    <div>
      <h3>China Express — Extending Cloudflare One to China</h3>
      <a href="#china-express-extending-cloudflare-one-to-china">
        
      </a>
    </div>
    <p>As mentioned in a previous blog post, we are extending Cloudflare One, our zero trust network-as-a-service product, to <a href="/cloudflare-one-in-china/">mainland China</a> through our strategic partnerships. Acme Corp will now be able to ensure their employees both inside and outside China will be able to use consistent zero trust security policy using the Cloudflare WARP device client. In addition, they will be able to connect their physical offices in China to their global private WAN using Magic WAN with consistent security policies applied globally.</p>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>Cloudflare is excited to work with  our partners to help our customers solve connectivity and performance challenges in mainland China. All the above solutions are easy and fast to deploy and are available now. If you’d like to get started, contact us <a href="https://www.cloudflare.com/china-network/">here</a> or reach out to your account team.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[China Network]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">YF1uzQYYGovH8CLHGbeCC</guid>
            <dc:creator>Dafu Wang</dc:creator>
            <dc:creator>Ameet Naik</dc:creator>
        </item>
        <item>
            <title><![CDATA[MPLS to Zero Trust in 30 days]]></title>
            <link>https://blog.cloudflare.com/mpls-to-zerotrust/</link>
            <pubDate>Thu, 23 Jun 2022 13:11:37 GMT</pubDate>
            <description><![CDATA[ ‘My home network is faster than my corporate network’’ is a common complaint of the employees returning to work. Legacy MPLS based networks were not built to support the shift in the applications.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Employees returning to the office are experiencing that their corporate networks are much slower compared to what they’ve been using at home. It’s partly due to outdated line speeds, and also partly due to security requirements that force all traffic to get back hauled through centralized data centers. While 44% of the US currently has access to fiber-based broadband Internet with speeds reaching 1 Gbps, many MPLS sites are still on old 1.5 Mbps circuits. This is a reality check and a reminder that the current MPLS based networks are unable to support the shift from centralized applications in the datacenter to a distributed SaaS and hybrid multi-cloud world.</p><p>In this post, we are going to outline the steps required to take your network from MPLS to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>. But, before we do — a little about how we ended up in this situation.</p>
    <div>
      <h3>Enterprise networks today</h3>
      <a href="#enterprise-networks-today">
        
      </a>
    </div>
    <p>Over the past 10 years, most <a href="https://www.cloudflare.com/learning/network-layer/enterprise-networking/">enterprise networks</a> have evolved from perimeter hub and spoke networks into franken-networks as a means to solve connectivity and security issues. We have not had a chance to redesign them holistically for distributed application access. The band-aid and point solutions have only pushed the problems further down the road — to a future day for someone else to solve.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2g4qxCDY9uN6sCggULAK04/507ed83f4c5be7658a685313d408e95b/image6-13.png" />
            
            </figure><p>The advent of cloud adoption put additional pressure on the already ailing legacy WAN. Increased Internet use for business, mining data for actionable insights, advanced security monitoring multiplied bandwidth demand at customer branches. This puts additional pressure on companies seeking to manage their WAN cost. Below is a graphical representation of business loss due to growing bandwidth needs on.</p>
    <div>
      <h3>Business loss = (X) cost of project delay  + (Y) loss of productivity due to outages</h3>
      <a href="#business-loss-x-cost-of-project-delay-y-loss-of-productivity-due-to-outages">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/50jWFTo8tiwY6abJO3Aa8v/c2f8efd777aa480a7c7e1a686f8df8e8/image5-11.png" />
            
            </figure>
    <div>
      <h3>Excitement about SD-WAN</h3>
      <a href="#excitement-about-sd-wan">
        
      </a>
    </div>
    <p>Organizations have been looking to<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/"> Software-Defined WAN (SD-WAN) </a>to solve some of these challenges. It allows organizations to shift from MPLS private lines to broadband Internet and significantly reduce their cost per Mbps. SD-WAN offers other valuable features like application-aware intelligent routing based on path quality. Orchestrator and analytics help to provide much-needed deployment speed and network visibility, respectively.</p><p>Despite the incremental improvement that SD-WAN offers over traditional network architectures, some fundamental challenges remain. SD-WAN is a hardware-dependent edge routing technology that does not always account for the middle mile. While broadband Internet is reasonably fast and available everywhere, it doesn't offer the end-to-end security and reliability that mission-critical applications require. Further, managing security policies and Internet breakouts across hundreds of edge devices is complex, and many organizations are still choosing to backhaul traffic to centralized data centers. We require a new architecture — with security, speed, and reliability built-in.</p>
    <div>
      <h3>Cloudflare Magic WAN</h3>
      <a href="#cloudflare-magic-wan">
        
      </a>
    </div>
    <p>Cloudflare Magic WAN simplifies legacy WAN architectures by enabling customers to use the Cloudflare global network to interconnect their branch offices, data centers, and public cloud services. It includes Zero Trust security services that can be enabled as needed, improve performance, and can be managed through a single dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6p3czpYwUDvwvZKYlIeGJG/a74b18e59e1193c35c2b0f13cf7beae8/image3-24.png" />
            
            </figure><p>Magic WAN has many advantages over traditional WAN architectures. It eliminates the need to manage a mesh of tunnels. A single <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">Anycast</a> IPSec or GRE tunnel from a site provides connectivity to all other sites and applications, with the Cloudflare network acting as the network hub, simplifying operational overhead. It removes the requirement for all traffic to be backhauled to a centralized data center to enforce security policies. Cloud-native <a href="https://www.cloudflare.com/magic-firewall/">firewall-as-a-service</a> (FWaaS) for inbound and site-to-site traffic and <a href="https://www.cloudflare.com/products/zero-trust/gateway/">security web gateway</a> (SWG) for outbound traffic is available at the same data centers where WAN traffic enters the Cloudflare network. Organizations can deploy consistent security policies globally which get enforced at the Cloudflare data center closest to the user at any of our 270+ cities. SaaS and consumer application traffic can be routed directly to the Internet from the edge of the network. With Cloudflare serving millions of websites, the destination might be available on the same server, resulting in better performance for users.</p><p>Furthermore, with no appliances to manage or scale, Magic WAN gives you an elastic WAN with zero capital investment that you can quickly scale up or down depending on business needs.</p>
    <div>
      <h3>Bridge to Zero Trust</h3>
      <a href="#bridge-to-zero-trust">
        
      </a>
    </div>
    <p>The ultimate goal for many organizations is to move their network and security architecture from a castle &amp; moat model to a Zero Trust model where there’s no longer a hard boundary between “private” and “public” networks. Instead, security is enforced at the user and the application level, using identity, endpoint health and location as key attributes. So an employee on a managed laptop in their home country may have access to all corporate applications, but if they log in from a personal laptop, they might have limited access to only certain applications. Or if the network detects malware on their managed laptop, their access can be quickly revoked, <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">preventing the spread of ransomware</a>, for example, through their organization.</p><p>This requires a WAN that is intelligent enough to understand user identities and endpoint health and make intelligent enforcement decisions based on these attributes. This also requires enforcement points that can apply consistent security policies regardless of whether the users are coming from a corporate branch office or from a home office over the Internet.</p><p>Cloudflare Magic WAN, part of the Cloudflare One product suite, enables this transition to a true Zero Trust architecture by building in security natively into the network.</p>
    <div>
      <h3>Prep work for successful transformation from MPLS to Zero Trust</h3>
      <a href="#prep-work-for-successful-transformation-from-mpls-to-zero-trust">
        
      </a>
    </div>
    <p>Planning leads to awareness, while preparation leads to readiness.</p><p>MPLS to Zero Trust transformation is a team effort. Traditionally, network managers are responsible for the WAN; security managers for the security perimeter &amp; policies; infrastructure team for the cloud; application teams for application development. Future transformed state has built-in security for seamless on-demand, secured and reliable distributed application access.</p><p>1. Network, security, infrastructure, and application project management teams should collectively discuss and document the current/future state.  Sample document below:</p><table><tr><td><p></p></td><td><p></p></td><td><p><b>Current state</b></p></td><td><p><b>Future state</b></p></td></tr><tr><td><p>Applications</p></td><td><p>List</p></td><td><p>Example: 1600 apps</p></td><td><p>Example: 2400 apps</p></td></tr><tr><td><p></p></td><td><p>Location</p></td><td><p>Local: 300, DC: 600, Public cloud: 400, Private cloud:100, SaaS: 200</p></td><td><p>TBD</p></td></tr><tr><td><p></p></td><td><p>Regional application needs</p></td><td><p>Local File servers</p></td><td><p>Cloud</p></td></tr><tr><td><p>Location/branch</p></td><td><p># of branch locations</p></td><td><p>80</p></td><td><p>85</p></td></tr><tr><td><p></p></td><td><p>Availability</p></td><td><p>Example: Platinum 99%, Gold 95%, Silver: 90%, bronze: best effort</p></td><td><p>Platinum 100%, Gold 99%, Silver: 95%, bronze: best effort</p></td></tr><tr><td><p></p></td><td><p>Current set up</p></td><td><p>Platinum: Dual MPLS, Gold: MPLS + Internet etc</p></td><td><p>Platinum: 2 x 1G DIA, Gold: 2 x 1G DIA etc</p></td></tr><tr><td><p></p></td><td><p>Bandwidth</p></td><td><p>Platinum: 100M, Gold 50M etc</p></td><td><p>Platinum 1G, Gold 500M etc</p></td></tr><tr><td><p>CSP with location</p></td><td><p>Azure/GCP/AWS</p></td><td><p>1G ExpressRoute 1G Direct Connect</p></td><td><p>10G 10G</p></td></tr><tr><td><p>Internet breakout</p></td><td><p>Capacity</p></td><td><p>500M</p></td><td><p>On demand</p></td></tr><tr><td><p></p></td><td><p></p></td><td><p>DC: XXX Firewall HA</p></td><td><p>Cloud based local break out</p></td></tr><tr><td><p></p></td><td><p>Features</p></td><td><p>Limited security control</p></td><td><p>Identity based granular ZT based policies</p></td></tr><tr><td><p>Remote Access</p></td><td><p>Quantity</p></td><td><p>1000 seats</p></td><td><p>2000 seats</p></td></tr><tr><td><p></p></td><td><p>Technology</p></td><td><p>SSL VPN</p></td><td><p>Zero Trust Network Access</p></td></tr><tr><td><p>Cloud security</p></td><td><p></p></td><td><p>None</p></td><td><p>CASB, RBI</p></td></tr><tr><td><p>Device posture</p></td><td><p></p></td><td><p>None</p></td><td><p>Yes</p></td></tr></table><p>2. Conduct transformation workshop to:</p><ul><li><p>Map all combinations of future traffic flows: Device Type - User profile - Application - Enforcement technology - Zero Trust rules</p></li><li><p>Traffic flows help to determine future architecture baseline</p></li></ul><ol><li><p>Invite vendors, partners, and providers for discussion to validate the design and identify technology readiness to support traffic flows and architecture.</p></li><li><p>Carry out budgeting exercises and a business plan to map current pain points with solutions and pricing. Involve specialized experts to develop business plans if needed.</p></li><li><p>Form a special project team that includes project managers, engineering point of contact from all technical groups, local site contacts, escalation team, stakeholder representatives, business owners.</p></li></ol>
    <div>
      <h3>Transition plan</h3>
      <a href="#transition-plan">
        
      </a>
    </div>
    <p>A transition plan is a critical step toward a successful transformation. A good transition and project plan will ensure minimal downtime, while a bad plan will result in outages, business disruption, increased transition time, and cost. The plan should include detailed steps and milestones.</p><p>Sample transition plan below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19yCemA4UrDIklPMCsZ8e9/95bb6568990ecf89ab11d4d3a95956b8/image4-22.png" />
            
            </figure><ol><li><p><b>Identify bridging point</b></p><ul><li><p>Bridging point will act as a bridge between transitioned and non-transitioned branch locations.</p></li><li><p>Ideally, regional and global data centers are preferred bridging points between existing MPLS and the new Cloudflare based WAN.</p></li></ul></li><li><p><b>Create user acceptance test (UAT)</b></p><ul><li><p>Collaborate with internal teams and site contacts to create a UAT.</p></li><li><p>Perform UAT before and after cutover for each site to ensure users can access their applications as expected performance after transition.</p></li></ul></li><li><p><b>Migration schedule</b></p><ul><li><p>Develop a migration schedule to ensure minimal business impact.</p></li></ul></li><li><p><b>Prep for Magic WAN</b></p><ul><li><p>Connect applications: Leverage Cloudflare onramp options to connect your various applications to Cloudflare platform.</p></li><li><p>Connect branch: Configure your WAN Edge device (router, SD-WAN device, firewall etc) and connect to Cloudflare platform</p></li><li><p>Please refer <a href="https://developers.cloudflare.com/magic-wan/">https://developers.cloudflare.com/magic-wan/</a> for detailed step-by-step instructions to configure Magic WAN</p></li></ul></li></ol><p>Note: <i>Above step will NOT impact existing traffic flows via the existing MPLS path. Take precautions to ensure no production impact. Please follow your change control guidelines and request a maintenance window if applicable.</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6gRUYKe4nUXMEEeI2Y34lM/86448ce7a61b87c90cd5f956afde82e1/image2-36.png" />
            
            </figure><ol><li><p><b>Ready for cutover</b></p><ul><li><p>We are ready for cutover after steps 4 &amp; 5, i.e., ready to migrate and transition branches to Cloudflare based network.</p></li></ul></li><li><p><b>Cutover window</b></p><ul><li><p>During the cutover window, production traffic will stop traversing the existing MPLS path and transition to the new Cloudflare based network..</p></li><li><p>Perform UAT before and after cutover.</p></li></ul></li><li><p><b>Disconnect MPLS</b></p><ul><li><p>MPLS circuits can be disconnected, as sites are migrated.</p></li></ul></li></ol><p><b>Additional:</b></p><ul><li><p>Retire legacy VPN</p><ul><li><p>Customers can leverage Cloudflare’s Zero Trust Network Access to access their applications and retire legacy VPN based access.</p></li></ul></li><li><p>Assumption</p><ul><li><p>Customer is responsible for Internet circuit procurement and installation to replace MPLS circuits.</p></li></ul></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fpero8ipUPnWWgaT79a9R/1e56757b97f79c8c55c3b5d8dd42e5f2/image1-35.png" />
            
            </figure><p>We’re proud of how we’ve been able to help some of Cloudflare customers reinvent their corporate networks. It makes sense to close with their own words</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/42Cl7WQXBLxGEVKQOav3Ze/a4ec545ac52f130345c92d5913a7e639/image8-9.png" />
            
            </figure>
    <div>
      <h3>Summary</h3>
      <a href="#summary">
        
      </a>
    </div>
    <p>Replacing MPLS, modernizing network and network security to provide business agility is a must for the digital future. Move to Zero Trust is inevitable for most organizations. Temporary band-aids and point solutions have resulted in business losses, poor employee experience and increased security risk. Moving from MPLS to Zero Trust sounds like a daunting task but teamwork, proper planning, preparation, and right <a href="https://www.cloudflare.com/network-security/">solution</a> will make transformation easily achievable and more manageable.</p><p>If you’d like to get started, <a href="https://www.cloudflare.com/magic-wan/">contact us</a> today and get started on your journey.</p><p>Replacing MPLS lines is a great project to fit into your overall <a href="https://zerotrustroadmap.org/">Zero Trust roadmap</a>. For a full summary of Cloudflare One Week and what’s new, tune in to our <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3824611/the-evolution-of-cloudflare-one?partnerref=blog">recap webinar</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">6Tfy6rhIoVtAGPTGmamJFY</guid>
            <dc:creator>Adi Mukadam</dc:creator>
            <dc:creator>Ameet Naik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare partners with Kentik to enhance on-demand DDoS protection]]></title>
            <link>https://blog.cloudflare.com/kentik-and-magic-transit/</link>
            <pubDate>Wed, 13 Apr 2022 12:58:32 GMT</pubDate>
            <description><![CDATA[ We are excited to announce that as of today, network security teams can procure and use Magic Transit, Cloudflare’s industry-leading DDoS mitigation solution, and Kentik’s network observability as an integrated solution ]]></description>
            <content:encoded><![CDATA[ <p>We are excited to announce that as of today, network security teams can procure and use Magic Transit, Cloudflare’s industry-leading DDoS mitigation solution, and <a href="http://www.kentik.com">Kentik’s</a> network observability as an integrated solution. We are excited to help our customers not just with technical simplicity, but business process simplicity as well.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1yeMttJZ1A8m8GOwwhSXBr/e1c834de6887033c65b13d84071922c5/image1-11.png" />
            
            </figure>
    <div>
      <h3>Why monitoring and mitigation?</h3>
      <a href="#why-monitoring-and-mitigation">
        
      </a>
    </div>
    <p>Distributed Denial of Service (DDoS) attacks are highly disruptive to businesses everywhere. According to the <a href="/ddos-attack-trends-for-2022-q1/">Cloudflare DDoS Attack Trends report</a>, in the first half of 2021 the world witnessed massive ransomware and ransom DDoS attack campaigns that interrupted critical infrastructure, including oil pipelines, healthcare, and financial services. In the second half, we saw a growing swarm of attacks, including one of the most powerful botnets deployed (<a href="/meris-botnet/">Meris</a>), with record-breaking <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">network-layer attacks</a> observed on the Cloudflare network.</p><p>Along with an increase in severity, there is a proliferation of automated toolkits that make it simple and cheap for anyone to launch these attacks. Detecting and stopping these attacks manually is not effective, and network security engineers are increasingly turning to automated tools to help ensure network and application availability.</p><p><a href="https://www.cloudflare.com/ddos/">DDoS protection</a> has evolved over the years from appliances to hybrid models to fully Internet-native solutions, like Cloudflare’s <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a>. Cloudflare has been protecting millions of Internet properties against DDoS attacks, ensuring they are available at all times. Magic Transit extends Cloudflare’s industry-leading DDoS protection to shield entire IP subnets from DDoS attacks, while also accelerating network traffic, ensuring your data centers, cloud services and corporate networks are always reachable from the Internet. Our <a href="https://www.cloudflare.com/network/">powerful global network</a> spanning 250+ cities and 121 Tbps of capacity ensures that customers can have always-on DDoS protection without impacting network latency and application performance. Magic Transit also supports on-demand mode, which allows customers to activate DDoS protection when they need it most.</p><p>Network observability becomes critical to understand what normal looks like for your environment so that DDoS attacks are readily detected. Flow-based monitoring helps you understand not only how much traffic is flowing over your network, but also where it came from, where it’s going, and what applications are consuming bandwidth.</p>
    <div>
      <h3>Magic Transit protection for every network configuration</h3>
      <a href="#magic-transit-protection-for-every-network-configuration">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> is one of the most powerful DDoS mitigation platforms available today. We have worked hard to ensure Magic Transit is flexible enough for the most demanding network architectures. We need to fit into your world, not the other way around. And that involves partnering with leading network observability vendors to give you multiple options for how you choose to protect your network.</p><p>With this new partnership, customers can now consume Cloudflare’s Magic Transit service in one of three modes:</p><ul><li><p><b>Always On</b> — Customers looking for fast mitigation and traffic acceleration can deploy Magic Transit in Always On mode.</p></li><li><p><b>On Demand</b> — Customers can choose to turn on Magic Transit response to a DDoS attack via Cloudflare’s UI or <a href="https://api.cloudflare.com/#magic-transit-static-routes-properties">Cloudflare's Magic Transit API</a>.</p></li><li><p><b>On Demand + Flow-based Monitoring</b> — Customers can now purchase and deploy an integrated network observability and DDoS protection solution consisting of Cloudflare Magic Transit On Demand and Kentik Protect from a single vendor.</p></li></ul><p>In each configuration, Magic Transit is seamlessly paired with <a href="https://www.cloudflare.com/magic-firewall/">Magic Firewall</a> — our cloud-native <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">firewall-as-a-service</a>.</p><div></div>
<p></p>
    <div>
      <h3>Why Kentik’s flow-based monitoring?</h3>
      <a href="#why-kentiks-flow-based-monitoring">
        
      </a>
    </div>
    <p>At Cloudflare, we continuously take feedback from our customers on both our product and on what other tools they use. Customer feedback helps us build our products and how we grow <a href="https://www.cloudflare.com/partners/technology-partners/">Cloudflare’s Technology Partner Program</a>.</p><p>For our Magic Transit customers, we found that many of our customers who chose Magic Transit On Demand have adopted solutions from Kentik, <a href="https://www.kentik.com/why-kentik-network-observability-and-monitoring/">the network observability company</a> with one of the leading flow-based monitoring tools in the ecosystem. Kentik empowers network professionals to plan, run, and fix any network with observability into all their traffic.</p>
    <div>
      <h3>Simplifying network security</h3>
      <a href="#simplifying-network-security">
        
      </a>
    </div>
    <p>Cloudflare strives to simplify how customers can shield their network from <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a> threats like DDoS attacks. Magic Transit gives network security professionals the confidence that their network resources are immune from DDoS-related outages. We have now extended that same simplicity to this joint solution, making it simple for our customers to procure, provision, and integrate Magic Transit and Kentik. Our end goal is always creating the best experience possible for our customers, with Cloudflare’s services fitting seamlessly into their existing technology stack.</p><p>Kentik’s powerful network observability cloud collects flow logs from your network components and continuously learns network behavior, detecting anomalies such as DDoS attacks. Using our native API integration, the Kentik platform can trigger Magic Transit to start attracting network traffic when there’s an attack underway. Magic Transit’s <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">autonomous DDoS mitigation</a> automatically analyzes incoming traffic and filters out DDoS traffic across the entire Cloudflare network, protecting your network from unwanted traffic and avoiding service availability issues and outages.</p><p>Together, Kentik and Cloudflare have created a well-supported integration and a more streamlined procurement process to combine Kentik’s best-of-breed network observability and Cloudflare's industry-leading DDoS protection in Magic Transit. Customers can now receive the best DDoS protection and network observability in a completely SaaS-based offering.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3mDv8R5HqEhoyVRI1IbikE/8b1bfc2b452763f29ede3bb46facea23/image2-10.png" />
            
            </figure><p>“We are excited to partner with Cloudflare to make it easier for our mutual customers to integrate our leading technology solutions and deploy industry-leading DDoS protection in a fully SaaS-based environment”, said Mike Mooney, CRO at Kentik.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Now, customers seeking to combine purpose-built, best-of-breed network observability and visualization from Kentik with Cloudflare's Magic Transit On Demand can do so through a single vendor agreement and an integrated solution.</p><p>If you'd like to learn more DDoS attack trends and how Kentik plus Cloudflare combine to provide the leading SaaS-based DDoS protection solution with over 121 Tbps of capacity, review our <a href="https://developers.cloudflare.com/magic-transit/partners/kentik/">developer documentation</a> and <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3735104/?_gl=1%2a1bicjuo%2a_ga%2aMTIzODQzODMxMy4xNjM4MjE5NDQy%2a_gid%2aNTU1NjcyODUzLjE2NDkxOTk1OTM">join our upcoming webinar on April 28 to learn more.</a></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1U1T93cG9xIJPYn97cMbcN</guid>
            <dc:creator>Matt Lewis</dc:creator>
            <dc:creator>Ameet Naik</dc:creator>
        </item>
    </channel>
</rss>