SlideShare a Scribd company logo
Building Resilient Applications Using
Cloudflare DNS
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
2
● Cloudflare overview
● Let’s talk about DNS
● Cloudflare Managed DNS
● Customer stories
● Demo
● Q&A
Agenda
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
3
Cloudflare Overview
The Internet is critical
for your business.
Confidential. Copyright © Cloudflare, Inc.
There are imperatives for business applications and employees
Confidential. Copyright © Cloudflare, Inc.
Provide the essential
infrastructure for business-critical
applications and networks.
Enable a secure and agile
workforce that is increasingly
working from remote locations.
Today’s Internet requires
PERFORMANCESECURITY RELIABILITY
● Mitigate DDoS attacks
● Prevent customer data breaches
● Stop malicious bot abuse
● Accelerate Internet applications
● Optimize content delivery
● Ensure application availability
● Improve DNS resolution time
Confidential. Copyright © Cloudflare, Inc.
“Band-Aid” network boxes were built for a world of
on-premise infrastructure
7
Challenges
● Expensive
● Hard to use
● Specialized hardware
● Inconsistent security policies
● Tremendous human cost to manage and maintain
Confidential. Copyright © Cloudflare, Inc.
The problem is: the rapid move to the cloud creates new challenges
Internet
Applications
On-Premise
Multi-Cloud
Hybrid Cloud
SaaS
75% of organizations
use at least one cloud
provider1
54% of organizations
have hybrid or multi-cloud
environment1
Confidential. Copyright © Cloudflare, Inc.1- Forrester Consulting on behalf of Cloudflare
A global cloud platform that delivers
security, performance, and reliability across
on-premise, public cloud, hybrid, and SaaS applications.
9
What's needed?
Confidential. Copyright © Cloudflare, Inc.
Cloudflare is an intelligent, integrated global cloud network
that delivers security, performance, and reliability for all your
Internet infrastructure, people and connected devices.
CLOUDFLARE’S MISSION:
Help build a better Internet
Confidential. Copyright © Cloudflare, Inc.
27M+
Internet properties
200+
Cities and 95 countries
45B
Cyber threats blocked each day in
Q1’20
99%
Of the Internet-connected population
in the developed world is located
within 100 milliseconds of our
network
Note: Data as of June 28, 2019.
Cloudflare’s network operates at massive scale
Confidential. Copyright © Cloudflare, Inc.
PERFORMANCE &
RELIABILITY
SECURITY
Domain Name
System (DNS)
Firewall
AnalyticsWorkers
IoT Security
Cache
Load Balancing
SSL/TLS
Secure Origin
Connection
Rate
Limiting
Bot Management
DDoS Protection
Intelligent
Routing
Image
Optimization
Access
CLOUDFLARE FOR INFRASTRUCTURE
CLOUDFLARE
FOR TEAMS
Magic Transit
Gateway
Workers KV
SERVERLESS
APPLICATION
PLATFORM
Stream
Integrated, Intelligent Global Cloud Network
How does Cloudflare work?
Accelerated Performance
Cloudflare’s Globally
Distributed Network
Attackers
Visitors /
Users
Crawlers,
Bots
Multi-Cloud
On-premise
Hybrid Cloud
SaaS
Confidential. Copyright © Cloudflare, Inc.
With a reverse proxy, setup is a DNS change
Without Cloudflare, an origin is
exposed to visitors and attackers.
Origin ServerVisit/User 1.2.3.4
With Cloudflare, all requests route to
the nearest data center via Anycast
and proxy to the origin.
Origin ServerVisit/User
104.x.x.x
Nearest
Cloudflare Data
center
1.2.3.4
Confidential. Copyright © Cloudflare, Inc.
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
15
Let’s talk DNS
Millions of dollars invested in building and
securing web properties can go to waste if your
DNS fails and your customers can’t find you.
SECURITY
Weak link in
security strategy
PERFORMANCE
Slows down your
user experience
RELIABILITY
Single point of
failure for online
availability
Confidential. Copyright © Cloudflare, Inc.
Impact of a weak DNS strategy
You’re only as fast and available as your DNS is.
Confidential. Copyright © Cloudflare, Inc.
Enterprise DNS strategy has evolved
● Maintain on-prem DNS
infrastructure
● Resides behind the
corporate firewall
● Slow query resolution for
distant traffic
● Leverage multiple DNS
providers to maximize
redundancy
● No single point of failure
Multi-DNS Setup
● Managed DNS provider acts
as Authoritative DNS —
maintaining DNS records and
resolving queries
● Offers better speed and
protection
● Improved redundancy
compared to traditional DNS
setups
Single Managed Provider
In-House DNS
Confidential. Copyright © Cloudflare, Inc.
Different DNS setups to
increase redundancy
Confidential. Copyright © Cloudflare, Inc.
19
● Improve speed
● Reduce TCO
● Minimize effort
● Attain superior security
posture
Confidential. Copyright © Cloudflare, Inc.
Managed
Authoritative DNS
Authoritative DNS Hidden Master Primary-Secondary Multi-Master
1
● Primary/Master DNS
(usually maintained by the
organization itself)
maintains and updates all
records
● Managed DNS provider
acts as Secondary — gets
a copy of the record and
faces the public internet
Confidential. Copyright © Cloudflare, Inc.
Authoritative DNS Hidden Master Primary-Secondary Multi-Master
2
Hidden Master
Secondary DNS
● Primary DNS maintains and
updates all records and
secondary DNS gets a copy of
the record
● Both primary and secondary
DNS resolve queries, with
recursive resolvers deciding
which one to use.
● Single or multiple secondary
DNS can be deployed
Confidential. Copyright © Cloudflare, Inc.
Authoritative DNS Hidden Master Primary-Secondary Multi-Master
3
Confidential. Copyright © Cloudflare, Inc.
Authoritative DNS Hidden Master Primary-Secondary Multi-Master
4
Primary DNS
Primary DNS
● Two DNS providers can be set
up as primary
● No zone information passes
from one to the other —
updates are made
independently on each system
● Both providers face the public
internet
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
24
Cloudflare Managed DNS
Cloudflare acts Secondary DNS,
maintaining a copy of the records
and receiving updates from the
Primary DNS.
Organizations can maintain their
own Primary DNS or get a
Managed DNS provider to act as
Primary.
Cloudflare protects and
accelerates any organization’s
DNS infrastructure.
Organizations maintain their own
DNS infrastructure — maintaining
and updating their DNS records.
Secondary DNS
Confidential. Copyright © Cloudflare, Inc.
Authoritative DNS DNS Firewall
Cloudflare acts as Authoritative
DNS, maintaining and updating all
DNS records.
Organizations onboard and
configure their DNS records to
Cloudflare.
Cloudflare DNS
Choosing the right setup is critical
Cloudflare Managed DNS
Enterprise-grade managed DNS service that offers the
fastest response time, unparalleled redundancy, and
advanced security.
Confidential. Copyright © Cloudflare, Inc.
Cloudflare DNS
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
27
The Cloudflare Difference
Cloudflare Load
Balancing comes with
built-in unlimited and
unmetered DDoS
mitigation
Confidential. Copyright © Cloudflare, Inc.
Our Global Anycast
Network allows DNS
resolution in each of our
data centers across 200+
cities.
Zero Downtime
A global network with high redundancy
Confidential. Copyright © Cloudflare, Inc.
Superior Performance
Cloudflare DNS is the fastest in the world
Cloudflare Load
Balancing comes with
built-in unlimited and
unmetered DDoS
mitigation
Cloudflare Load
Balancing comes with
built-in unlimited and
unmetered DDoS
mitigation
Confidential. Copyright © Cloudflare, Inc.
Built-in DNSSEC adds an
additional layer of security
at every level in the DNS
lookup process.
Integrated Security
One-click DNSSEC along with unmetered, unlimited DDoS mitigation
Cloudflare Load
Balancing comes with
built-in unlimited and
unmetered DDoS
mitigation
Confidential. Copyright © Cloudflare, Inc.
Migrate your DNS
records in bulk within
minutes using our
dashboard or API
Onboarding and configuration support
Migrate with zero downtime
Confidential. Copyright © Cloudflare, Inc.
Granular analytics
Leverage data to make the right decisions
Cloudflare Load
Balancing comes with
built-in unlimited and
unmetered DDoS
mitigation
Know the health of your
DNS traffic in real-time
Support unlimited
queries/records
Free, one-click DNSSEC Easy configuration
Premium support — migrate with
zero downtime
Role-based access controlsCustom nameservers
Unlimited and Unmetered
DDoS Mitigation
Key Features
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
34
Demo
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
35
Q&A
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
36
Contact us:
Dina Kozlov (dkozlov@cloudflare.com)
Christopher Shelley (cshelley@cloudflare.com)

More Related Content

What's hot

Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
 
Zero Trust
Zero TrustZero Trust
Zero Trust
Boaz Shunami
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
Tripwire
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
aungyekhant1
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
Simplex
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
Yash
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
Cisco Canada
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
ClubHack
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
Zscaler
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
Michael Torres
 
Sensu Monitoring
Sensu MonitoringSensu Monitoring
Sensu Monitoring
Mohanasundaram Ponnusamy
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Elasticsearch
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
Haris Chughtai
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
Aymen Mami
 

What's hot (20)

Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
CyberArk
CyberArkCyberArk
CyberArk
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Sensu Monitoring
Sensu MonitoringSensu Monitoring
Sensu Monitoring
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
Demystifying Prisma Access
Demystifying Prisma AccessDemystifying Prisma Access
Demystifying Prisma Access
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
 

Similar to Building Resilient Applications with Cloudflare DNS

The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsPeter Silva
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
F5 Networks
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationAmazon Web Services
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
Cloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
Cloudflare
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
Peter Silva
 
DNS Made Easy Sales Brochure
DNS Made Easy Sales BrochureDNS Made Easy Sales Brochure
DNS Made Easy Sales Brochure
DNS Made Easy
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
F5 Networks
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS Scale
F5 Networks
 
Ultra Dns Overview Presentation
Ultra Dns Overview PresentationUltra Dns Overview Presentation
Ultra Dns Overview Presentationgueste95639
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
Jean Ryu
 
D zone-anycast-dns-datasheet
D zone-anycast-dns-datasheetD zone-anycast-dns-datasheet
D zone-anycast-dns-datasheet
Lindsay Carreau
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PROIDEA
 
Disaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuest
Disaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuestDisaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuest
Disaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuest
Amazon Web Services
 
Hope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, NeustarHope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, Neustar
ResellerClub
 
Traffic Management in the Cloud - Web2.0
Traffic Management in the Cloud - Web2.0Traffic Management in the Cloud - Web2.0
Traffic Management in the Cloud - Web2.0
jamwill1972
 
SSL for SaaS Providers
SSL for SaaS ProvidersSSL for SaaS Providers
SSL for SaaS Providers
Cloudflare
 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data CenterJason Basye
 
Webinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Webinar: NAS Refresh? – 5 Reasons to Consider the CloudWebinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Webinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Storage Switzerland
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
Zscaler
 

Similar to Building Resilient Applications with Cloudflare DNS (20)

The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital Transformation
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
DNS Made Easy Sales Brochure
DNS Made Easy Sales BrochureDNS Made Easy Sales Brochure
DNS Made Easy Sales Brochure
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS Scale
 
Ultra Dns Overview Presentation
Ultra Dns Overview PresentationUltra Dns Overview Presentation
Ultra Dns Overview Presentation
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
D zone-anycast-dns-datasheet
D zone-anycast-dns-datasheetD zone-anycast-dns-datasheet
D zone-anycast-dns-datasheet
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
Disaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuest
Disaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuestDisaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuest
Disaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuest
 
Hope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, NeustarHope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, Neustar
 
Traffic Management in the Cloud - Web2.0
Traffic Management in the Cloud - Web2.0Traffic Management in the Cloud - Web2.0
Traffic Management in the Cloud - Web2.0
 
SSL for SaaS Providers
SSL for SaaS ProvidersSSL for SaaS Providers
SSL for SaaS Providers
 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data Center
 
Webinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Webinar: NAS Refresh? – 5 Reasons to Consider the CloudWebinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Webinar: NAS Refresh? – 5 Reasons to Consider the Cloud
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 

More from DevOps.com

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
DevOps.com
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
DevOps.com
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
DevOps.com
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
DevOps.com
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
DevOps.com
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
DevOps.com
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
DevOps.com
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
DevOps.com
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
DevOps.com
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
DevOps.com
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
DevOps.com
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
DevOps.com
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
DevOps.com
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
DevOps.com
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
DevOps.com
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
DevOps.com
 

More from DevOps.com (20)

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Building Resilient Applications with Cloudflare DNS

  • 1. Building Resilient Applications Using Cloudflare DNS
  • 2. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 2 ● Cloudflare overview ● Let’s talk about DNS ● Cloudflare Managed DNS ● Customer stories ● Demo ● Q&A Agenda
  • 3. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 3 Cloudflare Overview
  • 4. The Internet is critical for your business. Confidential. Copyright © Cloudflare, Inc.
  • 5. There are imperatives for business applications and employees Confidential. Copyright © Cloudflare, Inc. Provide the essential infrastructure for business-critical applications and networks. Enable a secure and agile workforce that is increasingly working from remote locations.
  • 6. Today’s Internet requires PERFORMANCESECURITY RELIABILITY ● Mitigate DDoS attacks ● Prevent customer data breaches ● Stop malicious bot abuse ● Accelerate Internet applications ● Optimize content delivery ● Ensure application availability ● Improve DNS resolution time Confidential. Copyright © Cloudflare, Inc.
  • 7. “Band-Aid” network boxes were built for a world of on-premise infrastructure 7 Challenges ● Expensive ● Hard to use ● Specialized hardware ● Inconsistent security policies ● Tremendous human cost to manage and maintain Confidential. Copyright © Cloudflare, Inc.
  • 8. The problem is: the rapid move to the cloud creates new challenges Internet Applications On-Premise Multi-Cloud Hybrid Cloud SaaS 75% of organizations use at least one cloud provider1 54% of organizations have hybrid or multi-cloud environment1 Confidential. Copyright © Cloudflare, Inc.1- Forrester Consulting on behalf of Cloudflare
  • 9. A global cloud platform that delivers security, performance, and reliability across on-premise, public cloud, hybrid, and SaaS applications. 9 What's needed? Confidential. Copyright © Cloudflare, Inc.
  • 10. Cloudflare is an intelligent, integrated global cloud network that delivers security, performance, and reliability for all your Internet infrastructure, people and connected devices. CLOUDFLARE’S MISSION: Help build a better Internet Confidential. Copyright © Cloudflare, Inc.
  • 11. 27M+ Internet properties 200+ Cities and 95 countries 45B Cyber threats blocked each day in Q1’20 99% Of the Internet-connected population in the developed world is located within 100 milliseconds of our network Note: Data as of June 28, 2019. Cloudflare’s network operates at massive scale Confidential. Copyright © Cloudflare, Inc.
  • 12. PERFORMANCE & RELIABILITY SECURITY Domain Name System (DNS) Firewall AnalyticsWorkers IoT Security Cache Load Balancing SSL/TLS Secure Origin Connection Rate Limiting Bot Management DDoS Protection Intelligent Routing Image Optimization Access CLOUDFLARE FOR INFRASTRUCTURE CLOUDFLARE FOR TEAMS Magic Transit Gateway Workers KV SERVERLESS APPLICATION PLATFORM Stream Integrated, Intelligent Global Cloud Network
  • 13. How does Cloudflare work? Accelerated Performance Cloudflare’s Globally Distributed Network Attackers Visitors / Users Crawlers, Bots Multi-Cloud On-premise Hybrid Cloud SaaS Confidential. Copyright © Cloudflare, Inc.
  • 14. With a reverse proxy, setup is a DNS change Without Cloudflare, an origin is exposed to visitors and attackers. Origin ServerVisit/User 1.2.3.4 With Cloudflare, all requests route to the nearest data center via Anycast and proxy to the origin. Origin ServerVisit/User 104.x.x.x Nearest Cloudflare Data center 1.2.3.4 Confidential. Copyright © Cloudflare, Inc.
  • 15. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 15 Let’s talk DNS
  • 16. Millions of dollars invested in building and securing web properties can go to waste if your DNS fails and your customers can’t find you.
  • 17. SECURITY Weak link in security strategy PERFORMANCE Slows down your user experience RELIABILITY Single point of failure for online availability Confidential. Copyright © Cloudflare, Inc. Impact of a weak DNS strategy You’re only as fast and available as your DNS is.
  • 18. Confidential. Copyright © Cloudflare, Inc. Enterprise DNS strategy has evolved ● Maintain on-prem DNS infrastructure ● Resides behind the corporate firewall ● Slow query resolution for distant traffic ● Leverage multiple DNS providers to maximize redundancy ● No single point of failure Multi-DNS Setup ● Managed DNS provider acts as Authoritative DNS — maintaining DNS records and resolving queries ● Offers better speed and protection ● Improved redundancy compared to traditional DNS setups Single Managed Provider In-House DNS
  • 19. Confidential. Copyright © Cloudflare, Inc. Different DNS setups to increase redundancy Confidential. Copyright © Cloudflare, Inc. 19
  • 20. ● Improve speed ● Reduce TCO ● Minimize effort ● Attain superior security posture Confidential. Copyright © Cloudflare, Inc. Managed Authoritative DNS Authoritative DNS Hidden Master Primary-Secondary Multi-Master 1
  • 21. ● Primary/Master DNS (usually maintained by the organization itself) maintains and updates all records ● Managed DNS provider acts as Secondary — gets a copy of the record and faces the public internet Confidential. Copyright © Cloudflare, Inc. Authoritative DNS Hidden Master Primary-Secondary Multi-Master 2 Hidden Master Secondary DNS
  • 22. ● Primary DNS maintains and updates all records and secondary DNS gets a copy of the record ● Both primary and secondary DNS resolve queries, with recursive resolvers deciding which one to use. ● Single or multiple secondary DNS can be deployed Confidential. Copyright © Cloudflare, Inc. Authoritative DNS Hidden Master Primary-Secondary Multi-Master 3
  • 23. Confidential. Copyright © Cloudflare, Inc. Authoritative DNS Hidden Master Primary-Secondary Multi-Master 4 Primary DNS Primary DNS ● Two DNS providers can be set up as primary ● No zone information passes from one to the other — updates are made independently on each system ● Both providers face the public internet
  • 24. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 24 Cloudflare Managed DNS
  • 25. Cloudflare acts Secondary DNS, maintaining a copy of the records and receiving updates from the Primary DNS. Organizations can maintain their own Primary DNS or get a Managed DNS provider to act as Primary. Cloudflare protects and accelerates any organization’s DNS infrastructure. Organizations maintain their own DNS infrastructure — maintaining and updating their DNS records. Secondary DNS Confidential. Copyright © Cloudflare, Inc. Authoritative DNS DNS Firewall Cloudflare acts as Authoritative DNS, maintaining and updating all DNS records. Organizations onboard and configure their DNS records to Cloudflare. Cloudflare DNS Choosing the right setup is critical Cloudflare Managed DNS
  • 26. Enterprise-grade managed DNS service that offers the fastest response time, unparalleled redundancy, and advanced security. Confidential. Copyright © Cloudflare, Inc. Cloudflare DNS
  • 27. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 27 The Cloudflare Difference
  • 28. Cloudflare Load Balancing comes with built-in unlimited and unmetered DDoS mitigation Confidential. Copyright © Cloudflare, Inc. Our Global Anycast Network allows DNS resolution in each of our data centers across 200+ cities. Zero Downtime A global network with high redundancy
  • 29. Confidential. Copyright © Cloudflare, Inc. Superior Performance Cloudflare DNS is the fastest in the world Cloudflare Load Balancing comes with built-in unlimited and unmetered DDoS mitigation
  • 30. Cloudflare Load Balancing comes with built-in unlimited and unmetered DDoS mitigation Confidential. Copyright © Cloudflare, Inc. Built-in DNSSEC adds an additional layer of security at every level in the DNS lookup process. Integrated Security One-click DNSSEC along with unmetered, unlimited DDoS mitigation
  • 31. Cloudflare Load Balancing comes with built-in unlimited and unmetered DDoS mitigation Confidential. Copyright © Cloudflare, Inc. Migrate your DNS records in bulk within minutes using our dashboard or API Onboarding and configuration support Migrate with zero downtime
  • 32. Confidential. Copyright © Cloudflare, Inc. Granular analytics Leverage data to make the right decisions Cloudflare Load Balancing comes with built-in unlimited and unmetered DDoS mitigation Know the health of your DNS traffic in real-time
  • 33. Support unlimited queries/records Free, one-click DNSSEC Easy configuration Premium support — migrate with zero downtime Role-based access controlsCustom nameservers Unlimited and Unmetered DDoS Mitigation Key Features
  • 34. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 34 Demo
  • 35. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 35 Q&A
  • 36. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 36 Contact us: Dina Kozlov (dkozlov@cloudflare.com) Christopher Shelley (cshelley@cloudflare.com)