Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Securing Internal Applications with Cloudflare Access - April 2018


Published on

Securing internal applications for remote employees and contractors is cumbersome to deploy and maintain, missing granular access controls, and slow for users on mobile devices. Cloudflare Access protects internal resources by securing, authenticating and monitoring access per-user and by application.

Join our experts to learn how with Cloudflare Access:

-Only authenticated users with the required permissions can access specific resources behind the Cloudflare edge
-Support for existing identity providers such as GSuite and Okta ensures the right users have easy and instant access regardless of physical location
-Latency is reduced for users by enforcing access rules at the edge

Published in: Internet
  • Be the first to comment

  • Be the first to like this

Securing Internal Applications with Cloudflare Access - April 2018

  1. 1. Cloudflare Access Webinar April 25th, 2018
  2. 2. Speakers Branded Branded Branded Venkat Viswanathan Product Manager @Cloudflare Tim Fong Product Marketing @Cloudflare
  3. 3. Why Cloudflare Access ?
  4. 4. Access Primary Use Cases Slow Mobile Sites and Apps Mobile clients introduce performance and content delivery constraints that hurt user experience Data Theft Attempt Compromise sensitive customer data
  5. 5. © 2017 Cloudflare Inc. All rights reserved. Internal Application User Access Customer Challenges Remote Workers Denied Access Outside of the firewall, users no longer have secure access to Internet-facing internal applications. They need encrypted connections to these applications to prevent snooping and data theft. Slow and Cumbersome VPN Access Traditional VPN solutions add latency for users. Especially for users on mobile devices with spottier connections, access through VPN is slow. Weak, Overly Broad Authentication Users who are given access through a shared password or even a VPN may have access to broader parts of the application than intended. Their access isn’t enforced by path or authenticated against their true identity. Users Branded Network Perimeter Internal Application Users Branded Network Perimeter Internal Application Users Branded VPN Latency Data Theft Slow Web and Mobile Access
  6. 6. Cloudflare Advantage Scale Bring content closer to users wherever they are in the world along fastest path to decrease load time Ease-of-use Users can easily and quickly make fine-grained changes to improve performance and security posture for complex applications Integrated Security / Performance Integrated defense against DDoS or abusive traffic to reduce application load while keeping users and their data safe. Leverage route optimization for fast connections
  7. 7. Cloudflare Access Secure Application Access Without A VPN Control User Access to Applications Enforce access to specific applications on a per-user basis with easy-to-create and manage rules. Deploy and Manage Access Control Quickly Leverage existing identity providers and authenticate on the Cloudflare global network to provide Single Sign On. Deliver Fast Applications to Devices Anywhere Users get easy, secure, and fast access to internal applications wherever they are, from whatever device. Monitor User Access and Change Logs View and search real-time access logs in the dashboard or integrate with a third party SIEM.
  8. 8. Demo
  9. 9. How Access works ?
  10. 10. Authentication and Login Flow
  11. 11. An Access control solution at the Edge
  12. 12. Questions ? ● Get Started at ● ● e-access/