Archive

Category Archives for "Networking"

Evolving Machine Learning to stop mobile bots

Evolving Machine Learning to stop mobile bots
Evolving Machine Learning to stop mobile bots

When we launched Bot Management three years ago, we started with the first version of our ML detection model. We used common bot user agents to train our model to identify bad bots. This model, ML1, was able to detect whether a request is a bot or a human request purely by using the request’s attributes. After this, we introduced a set of heuristics that we could use to quickly and confidently filter out the lowest hanging fruit of unwanted traffic. We have multiple heuristic types and hundreds of specific rules based on certain attributes of the request, many of which are very hard to spoof. But machine learning is a very important part of our bot management toolset.

Evolving Machine Learning to stop mobile bots

We started with a static model because we were starting from scratch, and we were able to experiment quickly with aggregated HTTP analytics metadata. After we launched the model, we quickly gathered feedback from early bot management customers to identify where we performed well but also how we could improve. We saw attackers getting smart, and so we generated a new set of model features. Our heuristics were able to accurately identify various types of bad bots giving us much better Continue reading

AWS commits to two year, £1.8B data centre investment in the UK

Amazon Web Services (AWS) has committed to invest £1.8 billion (US$2.4 billion) in the UK over the next two years as it looks to expand its presence in the region.The investment hinges on a commitment to spend “more than £1.8 billion in the next two years building and operating data centres in the UK in order to meet the growing needs of our customers and to help strengthen the UK’s digital infrastructure,” the cloud vendor announced.AWS has had a presence in the UK since it launched a London region in December 2016, which now extends to three availability zones and various edge locations.To read this article in full, please click here

New Return-To-Office Policies

The following post originally appeared in Human Infrastructure, a weekly newsletter from the Packet Pushers. You can sign up and see every back issue here. Earlier this year, Google spent a billion dollars on office space in London. As the company orders employees back to its campuses, it’s also restarting amenities “such as cafes, restaurants, […]

The post New Return-To-Office Policies appeared first on Packet Pushers.

Congratulations Cloudflare 2021 Partner Award Winners

Congratulations Cloudflare 2021 Partner Award Winners

We’re thrilled to announce the winners of our annual Channel and Alliance Partner Awards for 2021. Throughout a year of continued global disruptions, Cloudflare’s partners kept innovating, expanding their solutions and services capabilities, and accelerated their growth with us and our platform. It is important that we recognize and award the partners of ours who stood out in staying laser-focused on delivering outstanding business outcomes for customers.

Congratulations Cloudflare 2021 Partner Award Winners

With the ongoing shift in 2021 to remote, flexible work forces and the evolving cyber threat landscape, more than ever organizations across every industry and the public sector were looking to Cloudflare, and to work hand in hand with partners who can deliver a modern, Zero Trust approach to security. Seeing this consistent need, we are continuing to build and support new levels of partner-led growth in the year ahead such as with a new partner services program for SASE and Zero Trust which we launched at the start of 2022.

Please join us in congratulating the impressive achievements of our partner award winners over this past year! They enable the further delivery of Internet security, performance, and reliability for organizations of all sizes and types — and we are thrilled to be Continue reading

Protect all network traffic with Cloudflare

Protect all network traffic with Cloudflare
Protect all network traffic with Cloudflare

Magic Transit protects customers' entire networks—any port/protocol—from DDoS attacks and provides built-in performance and reliability. Today, we’re excited to extend the capabilities of Magic Transit to customers with any size network, from home networks to offices to large cloud properties, by offering Cloudflare-maintained and Magic Transit-protected IP space as a service.

What is Magic Transit?

Magic Transit extends the power of Cloudflare’s global network to customers, absorbing all traffic destined for your network at the location closest to its source. Once traffic lands at the closest Cloudflare location, it flows through a stack of security protections including industry-leading DDoS mitigation and cloud firewall. Detailed Network Analytics, alerts, and reporting give you deep visibility into all your traffic and attack patterns. Clean traffic is forwarded to your network using Anycast GRE or IPsec tunnels or Cloudflare Network Interconnect. Magic Transit includes load balancing and automatic failover across tunnels to steer traffic across the healthiest path possible, from everywhere in the world.

Protect all network traffic with Cloudflare
Magic Transit architecture: Internet BGP advertisement attracts traffic to Cloudflare’s network, where attack mitigation and security policies are applied before clean traffic is forwarded back to customer networks with an Anycast GRE tunnel or Cloudflare Network Interconnect.

The “Magic” Continue reading

Clientless Web Isolation is now generally available

Clientless Web Isolation is now generally available
Clientless Web Isolation is now generally available

Today, we’re excited to announce that Clientless Web Isolation is generally available. A new on-ramp for Browser Isolation that natively integrates Zero Trust Network Access (ZTNA) with the zero-day, phishing and data-loss protection benefits of remote browsing for users on any device browsing any website, internal app or SaaS application. All without needing to install any software or configure any certificates on the endpoint device.

Cloudflare’s clientless web isolation simplifies connections to remote browsers through a hyperlink (e.g.: https://<your-auth-domain>.cloudflareaccess.com/browser). We explored use cases in detail in our beta announcement post, but here’s a quick refresher on the use cases that clientless isolated browsing enables:

Share secure browsing across the entire team on any device

Simply navigating to Clientless Web Isolation will land your user such as an analyst, or researcher in a remote browser, ready to securely conduct their research or investigation without exposing their public IP or device to potentially malicious code on the target website.

Clientless Web Isolation is now generally available

Suspicious hyperlinks and PDF documents from sensitive applications can be opened in a remote browser by rewriting the link with the clientless endpoint. For example:

https://<authdomain>.cloudflareaccess.com/browser/https://www.example.com/suspiciouslink

This is Continue reading

Packet captures at the edge

Packet captures at the edge
Packet captures at the edge

Packet captures are a critical tool used by network and security engineers every day. As more network functions migrate from legacy on-prem hardware to cloud-native services, teams risk losing the visibility they used to get by capturing 100% of traffic funneled through a single device in a datacenter rack. We know having easy access to packet captures across all your network traffic is important for troubleshooting problems and deeply understanding traffic patterns, so today, we’re excited to announce the general availability of on-demand packet captures from Cloudflare’s global network.

What are packet captures and how are they used?

A packet capture is a file that contains all packets that were seen by a particular network box, usually a firewall or router, during a specific time frame. Packet captures are a powerful and commonly used tool for debugging network issues or getting better visibility into attack traffic to tighten security (e.g. by adding firewall rules to block a specific attack pattern).

A network engineer might use a pcap file in combination with other tools, like mtr, to troubleshoot problems with reachability to their network. For example, if an end user reports intermittent connectivity to a specific application, an engineer Continue reading

Cloudflare and Aruba partner to deliver a seamless global secure network from the branch to the cloud

Cloudflare and Aruba partner to deliver a seamless global secure network from the branch to the cloud
Cloudflare and Aruba partner to deliver a seamless global secure network from the branch to the cloud

Today we are excited to announce that Cloudflare and Aruba are working together to develop a solution that will enable Aruba customers to connect EdgeConnect SD-WAN’s with Cloudflare's global network to further secure their corporate traffic with Cloudflare One. Whether organizations need to secure Internet-bound traffic from branch offices using Cloudflare's Secure Web Gateway & Magic Firewall, or enforce firewall policies for east/west traffic between offices via Magic Firewall, we have them covered. This gives customers peace of mind that they have consistent global security from Cloudflare while retaining granular control of their inter-branch and Internet-bound traffic policies from their Aruba EdgeConnect appliances.

SD-WAN solution

A software-defined WAN (SD-WAN) is an evolution of a WAN (wide area network) that simplifies the underlying architecture. Unlike traditional WAN architecture models where expensive leased, and MPLS links are used, SD-WAN can efficiently use a combination of private lines and the public Internet. It brings together the best of both worlds to provide an integrated solution to network administrators in managing and scaling their network and resources with ease.

Aruba’s EdgeConnect SD-WAN solution

We are proud to announce our first enhanced SD-WAN integration. Aruba’s EdgeConnect solution is an industry leader for WAN edge Continue reading

What is a digital twin and why it’s important to IoT

Digital twin technology has moved beyond manufacturing and into the merging worlds of  Internet of Things, artificial intelligence and data analytics.As more complex “things” become connected, with the ability to produce data, having a digital equivalent gives data scientists and other IT professionals the ability to optimize deployments for peak efficiency and create other what-if scenarios.What is a digital twin? A digital twin is a digital representation of a physical object or system. The technology behind digital twins has expanded to include buildings, factories and even cities, and some have argued that even people and processes can have digital twins, expanding the concept even further.To read this article in full, please click here

Cloudflare and CrowdStrike partner to give CISOs secure control across devices, applications, and corporate networks

Cloudflare and CrowdStrike partner to give CISOs secure control across devices, applications, and corporate networks

Today, we are very excited to announce multiple new integrations with CrowdStrike. These integrations combine the power of Cloudflare’s expansive network and Zero Trust suite, with CrowdStrike’s Endpoint Detection and Response (EDR) and incident remediation offerings.

Cloudflare and CrowdStrike partner to give CISOs secure control across devices, applications, and corporate networks

At Cloudflare, we believe in making our solutions easily integrate with the existing technology stack of our customers. Through our partnerships and integrations, we make it easier for our customers to use Cloudflare solutions jointly with that of partners, to further strengthen their security posture and unlock more value. Our partnership with CrowdStrike is an apt example of such efforts.

Together, Cloudflare and CrowdStrike are working to simplify the adoption of Zero Trust for IT and security teams. With this expanded partnership, joint customers can identify, investigate, and remediate threats faster through multiple integrations:

First, by integrating Cloudflare’s Zero Trust services with CrowdStrike Falcon Zero Trust Assessment (ZTA), which provides continuous real-time device posture assessments, our customers can verify users’ device posture before granting them access to internal or external applications.

Second, we joined the CrowdXDR Alliance in December 2021 and are partnering with CrowdStrike to share security telemetry and other insights to make it easier for customers to identify and mitigate threats. Continue reading

So-Called Modern VPNs: Marketing and Reality

Someone left a “killer” comment1 after reading the Should We Use LISP blog post. It start with…

I must sadly say that your view on what VPN is all about is pretty rusty and archaic :( Sorry! Modern VPNs are all pub-sub based and are already turning into NaaS.

Nothing new there. I’ve been called old-school guru from an ivory tower when claiming TRILL is the wrong direction and we should use good old layer-3-based design2, but let’s unpack the “pub-sub” bit.

So-Called Modern VPNs: Marketing and Reality

Someone left a “killer” comment1 after reading the Should We Use LISP blog post. It start with…

I must sadly say that your view on what VPN is all about is pretty rusty and archaic :( Sorry! Modern VPNs are all pub-sub based and are already turning into NaaS.

Nothing new there. I’ve been called old-school guru from an ivory tower when claiming TRILL is the wrong direction and we should use good old layer-3-based design2, but let’s unpack the “pub-sub” bit.

How 5G speeds compare across the globe—and why they differ

5G cellular networks are one of the most-hyped broadband technologies in the last decade. They’re designed to make cellular networks more efficient and reallocate more of the spectrum to data than to voice capabilities, increasing throughput. And 5G add-ons like mmWave promise superfast performance when you are very close to a cellular tower.But do they really make a difference on user devices that businesses use both for their own staff’s work purposes and for the services they sell to consumers? The answer, a new report from telecom consultancy Opensignal, says yes.To read this article in full, please click here

Cisco and NetApp upgrade their converged-infrastructure for hybrid cloud

Cisco and NetApp have upgraded their converged-infrastructure platform, FlexPod, to handle hybrid-cloud services.FlexPod--which Cisco and NetApp have been building since 2010 and has some 10,000 customers the vendors say--includes integrated Cisco UCS servers and networking gear and NetApp ONTAP storage components sold as an on-premises or edge converged-infrastructure package.How to build a hybrid-cloud strategy Customers are now in the midst of a major shift to modernize and unify their infrastructure and operations, Siva Sivakumar senior director for Computing System Platforms Group at Cisco said in a blog about the enhancements. “Customers are evaluating every tool available to augment their in-house resources and skillsets including automation, observability, and a variety of hybrid-cloud and SaaS services," he wrote. "The goal is simple: Use whatever is available to supercharge IT productivity and agility to drive better operational results while lowering operational costs.”To read this article in full, please click here

Cisco and NetApp upgrade their converged-infrastructure platform for hybrid cloud

Cisco and NetApp have upgraded their converged-infrastructure platform, FlexPod, to handle hybrid-cloud services.FlexPod--which Cisco and NetApp have been building since 2010 and has some 10,000 customers the vendors say--includes integrated Cisco UCS servers and networking gear and NetApp ONTAP storage components sold as an on-premises or edge converged-infrastructure package.How to build a hybrid-cloud strategy Customers are now in the midst of a major shift to modernize and unify their infrastructure and operations, Siva Sivakumar senior director for Computing System Platforms Group at Cisco said in a blog about the enhancements. “Customers are evaluating every tool available to augment their in-house resources and skillsets including automation, observability, and a variety of hybrid-cloud and SaaS services," he wrote. "The goal is simple: Use whatever is available to supercharge IT productivity and agility to drive better operational results while lowering operational costs.”To read this article in full, please click here

Learning to script on Linux using bash

Scripting in Linux--putting commands into a file so you can run them as a group—is a lot easier than running them from the command line because you don't have to figure out the process over and over again. Aliases can also be used to repeat commands easily, but are really only used for individual commands that are complex or difficult to remember.As you will see in the examples below, the bash shell provides plenty of commands for testing, looping, creating functions, and annotating your scripts. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Learning to script on Linux using bash

Scripting in Linux--putting commands into a file so you can run them as a group—is a lot easier than running them from the command line because you don't have to figure out the process over and over again. Aliases can also be used to repeat commands easily, but are really only used for individual commands that are complex or difficult to remember.As you will see in the examples below, the bash shell provides plenty of commands for testing, looping, creating functions, and annotating your scripts. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Pluribus extends cloud fabric to Nvidia smartNICs

Pluribus Networks has extended its switch-fabric software to server-based data processing units (DPU)—aka smartNICs—that can lighten the workload for server CPUs.Pluribus has ported its Unified Cloud Fabric (previously Adaptive Cloud Fabric) software to the Nvidia BlueField-2 DPU, which offloads software-defined storage, networking, security, and management workloads from traditional servers.To read this article in full, please click here