SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
Building Resilient Applications Using
Cloudflare DNS
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
2
● Cloudflare overview
● Let’s talk about DNS
● Cloudflare Managed DNS
● Customer stories
● Demo
● Q&A
Agenda
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
3
Cloudflare Overview
The Internet is critical
for your business.
Confidential. Copyright © Cloudflare, Inc.
There are imperatives for business applications and employees
Confidential. Copyright © Cloudflare, Inc.
Provide the essential
infrastructure for business-critical
applications and networks.
Enable a secure and agile
workforce that is increasingly
working from remote locations.
Today’s Internet requires
PERFORMANCESECURITY RELIABILITY
● Mitigate DDoS attacks
● Prevent customer data breaches
● Stop malicious bot abuse
● Accelerate Internet applications
● Optimize content delivery
● Ensure application availability
● Improve DNS resolution time
Confidential. Copyright © Cloudflare, Inc.
“Band-Aid” network boxes were built for a world of
on-premise infrastructure
7
Challenges
● Expensive
● Hard to use
● Specialized hardware
● Inconsistent security policies
● Tremendous human cost to manage and maintain
Confidential. Copyright © Cloudflare, Inc.
The problem is: the rapid move to the cloud creates new challenges
Internet
Applications
On-Premise
Multi-Cloud
Hybrid Cloud
SaaS
75% of organizations
use at least one cloud
provider1
54% of organizations
have hybrid or multi-cloud
environment1
Confidential. Copyright © Cloudflare, Inc.1- Forrester Consulting on behalf of Cloudflare
A global cloud platform that delivers
security, performance, and reliability across
on-premise, public cloud, hybrid, and SaaS applications.
9
What's needed?
Confidential. Copyright © Cloudflare, Inc.
Cloudflare is an intelligent, integrated global cloud network
that delivers security, performance, and reliability for all your
Internet infrastructure, people and connected devices.
CLOUDFLARE’S MISSION:
Help build a better Internet
Confidential. Copyright © Cloudflare, Inc.
27M+
Internet properties
200+
Cities and 95 countries
45B
Cyber threats blocked each day in
Q1’20
99%
Of the Internet-connected population
in the developed world is located
within 100 milliseconds of our
network
Note: Data as of June 28, 2019.
Cloudflare’s network operates at massive scale
Confidential. Copyright © Cloudflare, Inc.
PERFORMANCE &
RELIABILITY
SECURITY
Domain Name
System (DNS)
Firewall
AnalyticsWorkers
IoT Security
Cache
Load Balancing
SSL/TLS
Secure Origin
Connection
Rate
Limiting
Bot Management
DDoS Protection
Intelligent
Routing
Image
Optimization
Access
CLOUDFLARE FOR INFRASTRUCTURE
CLOUDFLARE
FOR TEAMS
Magic Transit
Gateway
Workers KV
SERVERLESS
APPLICATION
PLATFORM
Stream
Integrated, Intelligent Global Cloud Network
How does Cloudflare work?
Accelerated Performance
Cloudflare’s Globally
Distributed Network
Attackers
Visitors /
Users
Crawlers,
Bots
Multi-Cloud
On-premise
Hybrid Cloud
SaaS
Confidential. Copyright © Cloudflare, Inc.
With a reverse proxy, setup is a DNS change
Without Cloudflare, an origin is
exposed to visitors and attackers.
Origin ServerVisit/User 1.2.3.4
With Cloudflare, all requests route to
the nearest data center via Anycast
and proxy to the origin.
Origin ServerVisit/User
104.x.x.x
Nearest
Cloudflare Data
center
1.2.3.4
Confidential. Copyright © Cloudflare, Inc.
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
15
Let’s talk DNS
Millions of dollars invested in building and
securing web properties can go to waste if your
DNS fails and your customers can’t find you.
SECURITY
Weak link in
security strategy
PERFORMANCE
Slows down your
user experience
RELIABILITY
Single point of
failure for online
availability
Confidential. Copyright © Cloudflare, Inc.
Impact of a weak DNS strategy
You’re only as fast and available as your DNS is.
Confidential. Copyright © Cloudflare, Inc.
Enterprise DNS strategy has evolved
● Maintain on-prem DNS
infrastructure
● Resides behind the
corporate firewall
● Slow query resolution for
distant traffic
● Leverage multiple DNS
providers to maximize
redundancy
● No single point of failure
Multi-DNS Setup
● Managed DNS provider acts
as Authoritative DNS —
maintaining DNS records and
resolving queries
● Offers better speed and
protection
● Improved redundancy
compared to traditional DNS
setups
Single Managed Provider
In-House DNS
Confidential. Copyright © Cloudflare, Inc.
Different DNS setups to
increase redundancy
Confidential. Copyright © Cloudflare, Inc.
19
● Improve speed
● Reduce TCO
● Minimize effort
● Attain superior security
posture
Confidential. Copyright © Cloudflare, Inc.
Managed
Authoritative DNS
Authoritative DNS Hidden Master Primary-Secondary Multi-Master
1
● Primary/Master DNS
(usually maintained by the
organization itself)
maintains and updates all
records
● Managed DNS provider
acts as Secondary — gets
a copy of the record and
faces the public internet
Confidential. Copyright © Cloudflare, Inc.
Authoritative DNS Hidden Master Primary-Secondary Multi-Master
2
Hidden Master
Secondary DNS
● Primary DNS maintains and
updates all records and
secondary DNS gets a copy of
the record
● Both primary and secondary
DNS resolve queries, with
recursive resolvers deciding
which one to use.
● Single or multiple secondary
DNS can be deployed
Confidential. Copyright © Cloudflare, Inc.
Authoritative DNS Hidden Master Primary-Secondary Multi-Master
3
Confidential. Copyright © Cloudflare, Inc.
Authoritative DNS Hidden Master Primary-Secondary Multi-Master
4
Primary DNS
Primary DNS
● Two DNS providers can be set
up as primary
● No zone information passes
from one to the other —
updates are made
independently on each system
● Both providers face the public
internet
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
24
Cloudflare Managed DNS
Cloudflare acts Secondary DNS,
maintaining a copy of the records
and receiving updates from the
Primary DNS.
Organizations can maintain their
own Primary DNS or get a
Managed DNS provider to act as
Primary.
Cloudflare protects and
accelerates any organization’s
DNS infrastructure.
Organizations maintain their own
DNS infrastructure — maintaining
and updating their DNS records.
Secondary DNS
Confidential. Copyright © Cloudflare, Inc.
Authoritative DNS DNS Firewall
Cloudflare acts as Authoritative
DNS, maintaining and updating all
DNS records.
Organizations onboard and
configure their DNS records to
Cloudflare.
Cloudflare DNS
Choosing the right setup is critical
Cloudflare Managed DNS
Enterprise-grade managed DNS service that offers the
fastest response time, unparalleled redundancy, and
advanced security.
Confidential. Copyright © Cloudflare, Inc.
Cloudflare DNS
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
27
The Cloudflare Difference
Cloudflare Load
Balancing comes with
built-in unlimited and
unmetered DDoS
mitigation
Confidential. Copyright © Cloudflare, Inc.
Our Global Anycast
Network allows DNS
resolution in each of our
data centers across 200+
cities.
Zero Downtime
A global network with high redundancy
Confidential. Copyright © Cloudflare, Inc.
Superior Performance
Cloudflare DNS is the fastest in the world
Cloudflare Load
Balancing comes with
built-in unlimited and
unmetered DDoS
mitigation
Cloudflare Load
Balancing comes with
built-in unlimited and
unmetered DDoS
mitigation
Confidential. Copyright © Cloudflare, Inc.
Built-in DNSSEC adds an
additional layer of security
at every level in the DNS
lookup process.
Integrated Security
One-click DNSSEC along with unmetered, unlimited DDoS mitigation
Cloudflare Load
Balancing comes with
built-in unlimited and
unmetered DDoS
mitigation
Confidential. Copyright © Cloudflare, Inc.
Migrate your DNS
records in bulk within
minutes using our
dashboard or API
Onboarding and configuration support
Migrate with zero downtime
Confidential. Copyright © Cloudflare, Inc.
Granular analytics
Leverage data to make the right decisions
Cloudflare Load
Balancing comes with
built-in unlimited and
unmetered DDoS
mitigation
Know the health of your
DNS traffic in real-time
Support unlimited
queries/records
Free, one-click DNSSEC Easy configuration
Premium support — migrate with
zero downtime
Role-based access controlsCustom nameservers
Unlimited and Unmetered
DDoS Mitigation
Key Features
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
34
Demo
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
35
Q&A
Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc.
36
Contact us:
Dina Kozlov (dkozlov@cloudflare.com)
Christopher Shelley (cshelley@cloudflare.com)

Weitere ähnliche Inhalte

Was ist angesagt?

Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
Bibek Subedi
 

Was ist angesagt? (20)

Cloud security
Cloud securityCloud security
Cloud security
 
Unify Internet Of Things with Clayster
Unify Internet Of Things with ClaysterUnify Internet Of Things with Clayster
Unify Internet Of Things with Clayster
 
Advanced DNS Traffic Management using Amazon Route 53 - AWS Online Teck Talks
Advanced DNS Traffic Management using Amazon Route 53 - AWS Online Teck TalksAdvanced DNS Traffic Management using Amazon Route 53 - AWS Online Teck Talks
Advanced DNS Traffic Management using Amazon Route 53 - AWS Online Teck Talks
 
AWS ELEMENTAL MEDIA SERVICES UPDATE
AWS ELEMENTAL MEDIA SERVICES UPDATEAWS ELEMENTAL MEDIA SERVICES UPDATE
AWS ELEMENTAL MEDIA SERVICES UPDATE
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
Intro to AWS Developer Tools, featuring AWS CodeStar
Intro to AWS Developer Tools, featuring AWS CodeStarIntro to AWS Developer Tools, featuring AWS CodeStar
Intro to AWS Developer Tools, featuring AWS CodeStar
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
 
V.P.N And Proxy server
V.P.N And Proxy serverV.P.N And Proxy server
V.P.N And Proxy server
 
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
 
Dns security
Dns securityDns security
Dns security
 
[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...
[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...
[REPEAT 1] Elastic Load Balancing: Deep Dive and Best Practices (NET404-R1) -...
 
ClearPass Policy Manager 6.3 User Guide
ClearPass Policy Manager 6.3 User GuideClearPass Policy Manager 6.3 User Guide
ClearPass Policy Manager 6.3 User Guide
 
Best Practices for Active Directory with AWS Workloads
Best Practices for Active Directory with AWS WorkloadsBest Practices for Active Directory with AWS Workloads
Best Practices for Active Directory with AWS Workloads
 
Active directory domain services
Active directory domain servicesActive directory domain services
Active directory domain services
 
Aws kms in 10 minutes
Aws kms in 10 minutesAws kms in 10 minutes
Aws kms in 10 minutes
 
Introduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerIntroduction to AWS Secrets Manager
Introduction to AWS Secrets Manager
 
AWS Storage Gateway
AWS Storage GatewayAWS Storage Gateway
AWS Storage Gateway
 
DevOps at Amazon: A Look at Our Tools and Processes
DevOps at Amazon: A Look at Our Tools and ProcessesDevOps at Amazon: A Look at Our Tools and Processes
DevOps at Amazon: A Look at Our Tools and Processes
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 

Ähnlich wie Building Resilient Applications with Cloudflare DNS

The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
Peter Silva
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
F5 Networks
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital Transformation
Amazon Web Services
 
Ultra Dns Overview Presentation
Ultra Dns Overview PresentationUltra Dns Overview Presentation
Ultra Dns Overview Presentation
gueste95639
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PROIDEA
 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data Center
Jason Basye
 

Ähnlich wie Building Resilient Applications with Cloudflare DNS (20)

The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
The Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital TransformationThe Network Fabric for Your Digital Transformation
The Network Fabric for Your Digital Transformation
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Intelligent DNS Scale
Intelligent DNS ScaleIntelligent DNS Scale
Intelligent DNS Scale
 
DNS Made Easy Sales Brochure
DNS Made Easy Sales BrochureDNS Made Easy Sales Brochure
DNS Made Easy Sales Brochure
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS Scale
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
Ultra Dns Overview Presentation
Ultra Dns Overview PresentationUltra Dns Overview Presentation
Ultra Dns Overview Presentation
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
D zone-anycast-dns-datasheet
D zone-anycast-dns-datasheetD zone-anycast-dns-datasheet
D zone-anycast-dns-datasheet
 
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS ProtectionPLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
PLNOG 13: Adam Obszyński: Case Study – Infoblox Advanced DNS Protection
 
Disaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuest
Disaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuestDisaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuest
Disaster Recovery Best Practices and Customer Use Cases: CGS and HealthQuest
 
Hope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, NeustarHope Is Not A Strategy - Ivor Sequiera, Neustar
Hope Is Not A Strategy - Ivor Sequiera, Neustar
 
Traffic Management in the Cloud - Web2.0
Traffic Management in the Cloud - Web2.0Traffic Management in the Cloud - Web2.0
Traffic Management in the Cloud - Web2.0
 
SSL for SaaS Providers
SSL for SaaS ProvidersSSL for SaaS Providers
SSL for SaaS Providers
 
10 Things to Look for in a Data Center
10 Things to Look for in a Data Center10 Things to Look for in a Data Center
10 Things to Look for in a Data Center
 
Webinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Webinar: NAS Refresh? – 5 Reasons to Consider the CloudWebinar: NAS Refresh? – 5 Reasons to Consider the Cloud
Webinar: NAS Refresh? – 5 Reasons to Consider the Cloud
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 

Mehr von DevOps.com

Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
DevOps.com
 

Mehr von DevOps.com (20)

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Building Resilient Applications with Cloudflare DNS

  • 1. Building Resilient Applications Using Cloudflare DNS
  • 2. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 2 ● Cloudflare overview ● Let’s talk about DNS ● Cloudflare Managed DNS ● Customer stories ● Demo ● Q&A Agenda
  • 3. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 3 Cloudflare Overview
  • 4. The Internet is critical for your business. Confidential. Copyright © Cloudflare, Inc.
  • 5. There are imperatives for business applications and employees Confidential. Copyright © Cloudflare, Inc. Provide the essential infrastructure for business-critical applications and networks. Enable a secure and agile workforce that is increasingly working from remote locations.
  • 6. Today’s Internet requires PERFORMANCESECURITY RELIABILITY ● Mitigate DDoS attacks ● Prevent customer data breaches ● Stop malicious bot abuse ● Accelerate Internet applications ● Optimize content delivery ● Ensure application availability ● Improve DNS resolution time Confidential. Copyright © Cloudflare, Inc.
  • 7. “Band-Aid” network boxes were built for a world of on-premise infrastructure 7 Challenges ● Expensive ● Hard to use ● Specialized hardware ● Inconsistent security policies ● Tremendous human cost to manage and maintain Confidential. Copyright © Cloudflare, Inc.
  • 8. The problem is: the rapid move to the cloud creates new challenges Internet Applications On-Premise Multi-Cloud Hybrid Cloud SaaS 75% of organizations use at least one cloud provider1 54% of organizations have hybrid or multi-cloud environment1 Confidential. Copyright © Cloudflare, Inc.1- Forrester Consulting on behalf of Cloudflare
  • 9. A global cloud platform that delivers security, performance, and reliability across on-premise, public cloud, hybrid, and SaaS applications. 9 What's needed? Confidential. Copyright © Cloudflare, Inc.
  • 10. Cloudflare is an intelligent, integrated global cloud network that delivers security, performance, and reliability for all your Internet infrastructure, people and connected devices. CLOUDFLARE’S MISSION: Help build a better Internet Confidential. Copyright © Cloudflare, Inc.
  • 11. 27M+ Internet properties 200+ Cities and 95 countries 45B Cyber threats blocked each day in Q1’20 99% Of the Internet-connected population in the developed world is located within 100 milliseconds of our network Note: Data as of June 28, 2019. Cloudflare’s network operates at massive scale Confidential. Copyright © Cloudflare, Inc.
  • 12. PERFORMANCE & RELIABILITY SECURITY Domain Name System (DNS) Firewall AnalyticsWorkers IoT Security Cache Load Balancing SSL/TLS Secure Origin Connection Rate Limiting Bot Management DDoS Protection Intelligent Routing Image Optimization Access CLOUDFLARE FOR INFRASTRUCTURE CLOUDFLARE FOR TEAMS Magic Transit Gateway Workers KV SERVERLESS APPLICATION PLATFORM Stream Integrated, Intelligent Global Cloud Network
  • 13. How does Cloudflare work? Accelerated Performance Cloudflare’s Globally Distributed Network Attackers Visitors / Users Crawlers, Bots Multi-Cloud On-premise Hybrid Cloud SaaS Confidential. Copyright © Cloudflare, Inc.
  • 14. With a reverse proxy, setup is a DNS change Without Cloudflare, an origin is exposed to visitors and attackers. Origin ServerVisit/User 1.2.3.4 With Cloudflare, all requests route to the nearest data center via Anycast and proxy to the origin. Origin ServerVisit/User 104.x.x.x Nearest Cloudflare Data center 1.2.3.4 Confidential. Copyright © Cloudflare, Inc.
  • 15. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 15 Let’s talk DNS
  • 16. Millions of dollars invested in building and securing web properties can go to waste if your DNS fails and your customers can’t find you.
  • 17. SECURITY Weak link in security strategy PERFORMANCE Slows down your user experience RELIABILITY Single point of failure for online availability Confidential. Copyright © Cloudflare, Inc. Impact of a weak DNS strategy You’re only as fast and available as your DNS is.
  • 18. Confidential. Copyright © Cloudflare, Inc. Enterprise DNS strategy has evolved ● Maintain on-prem DNS infrastructure ● Resides behind the corporate firewall ● Slow query resolution for distant traffic ● Leverage multiple DNS providers to maximize redundancy ● No single point of failure Multi-DNS Setup ● Managed DNS provider acts as Authoritative DNS — maintaining DNS records and resolving queries ● Offers better speed and protection ● Improved redundancy compared to traditional DNS setups Single Managed Provider In-House DNS
  • 19. Confidential. Copyright © Cloudflare, Inc. Different DNS setups to increase redundancy Confidential. Copyright © Cloudflare, Inc. 19
  • 20. ● Improve speed ● Reduce TCO ● Minimize effort ● Attain superior security posture Confidential. Copyright © Cloudflare, Inc. Managed Authoritative DNS Authoritative DNS Hidden Master Primary-Secondary Multi-Master 1
  • 21. ● Primary/Master DNS (usually maintained by the organization itself) maintains and updates all records ● Managed DNS provider acts as Secondary — gets a copy of the record and faces the public internet Confidential. Copyright © Cloudflare, Inc. Authoritative DNS Hidden Master Primary-Secondary Multi-Master 2 Hidden Master Secondary DNS
  • 22. ● Primary DNS maintains and updates all records and secondary DNS gets a copy of the record ● Both primary and secondary DNS resolve queries, with recursive resolvers deciding which one to use. ● Single or multiple secondary DNS can be deployed Confidential. Copyright © Cloudflare, Inc. Authoritative DNS Hidden Master Primary-Secondary Multi-Master 3
  • 23. Confidential. Copyright © Cloudflare, Inc. Authoritative DNS Hidden Master Primary-Secondary Multi-Master 4 Primary DNS Primary DNS ● Two DNS providers can be set up as primary ● No zone information passes from one to the other — updates are made independently on each system ● Both providers face the public internet
  • 24. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 24 Cloudflare Managed DNS
  • 25. Cloudflare acts Secondary DNS, maintaining a copy of the records and receiving updates from the Primary DNS. Organizations can maintain their own Primary DNS or get a Managed DNS provider to act as Primary. Cloudflare protects and accelerates any organization’s DNS infrastructure. Organizations maintain their own DNS infrastructure — maintaining and updating their DNS records. Secondary DNS Confidential. Copyright © Cloudflare, Inc. Authoritative DNS DNS Firewall Cloudflare acts as Authoritative DNS, maintaining and updating all DNS records. Organizations onboard and configure their DNS records to Cloudflare. Cloudflare DNS Choosing the right setup is critical Cloudflare Managed DNS
  • 26. Enterprise-grade managed DNS service that offers the fastest response time, unparalleled redundancy, and advanced security. Confidential. Copyright © Cloudflare, Inc. Cloudflare DNS
  • 27. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 27 The Cloudflare Difference
  • 28. Cloudflare Load Balancing comes with built-in unlimited and unmetered DDoS mitigation Confidential. Copyright © Cloudflare, Inc. Our Global Anycast Network allows DNS resolution in each of our data centers across 200+ cities. Zero Downtime A global network with high redundancy
  • 29. Confidential. Copyright © Cloudflare, Inc. Superior Performance Cloudflare DNS is the fastest in the world Cloudflare Load Balancing comes with built-in unlimited and unmetered DDoS mitigation
  • 30. Cloudflare Load Balancing comes with built-in unlimited and unmetered DDoS mitigation Confidential. Copyright © Cloudflare, Inc. Built-in DNSSEC adds an additional layer of security at every level in the DNS lookup process. Integrated Security One-click DNSSEC along with unmetered, unlimited DDoS mitigation
  • 31. Cloudflare Load Balancing comes with built-in unlimited and unmetered DDoS mitigation Confidential. Copyright © Cloudflare, Inc. Migrate your DNS records in bulk within minutes using our dashboard or API Onboarding and configuration support Migrate with zero downtime
  • 32. Confidential. Copyright © Cloudflare, Inc. Granular analytics Leverage data to make the right decisions Cloudflare Load Balancing comes with built-in unlimited and unmetered DDoS mitigation Know the health of your DNS traffic in real-time
  • 33. Support unlimited queries/records Free, one-click DNSSEC Easy configuration Premium support — migrate with zero downtime Role-based access controlsCustom nameservers Unlimited and Unmetered DDoS Mitigation Key Features
  • 34. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 34 Demo
  • 35. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 35 Q&A
  • 36. Confidential. Copyright © Cloudflare, Inc.Confidential. Copyright © Cloudflare, Inc. 36 Contact us: Dina Kozlov (dkozlov@cloudflare.com) Christopher Shelley (cshelley@cloudflare.com)