What's New at Cloudflare

At Cloudflare we're dedicated to constantly improving our product. Read below to find out the latest updates.

FILTER BY:
  • feature2022 Q2

    Logpush Filters

    Mon, June 20, 2022 

    Filters are now available in Logpush for all Enterprise customers. Log filtering gives our customers more control over the scale of their logs which saves time and money when storing and analyzing them. With filters, customers can send logs to different destinations or at different sample rates based on criteria such as status code, path, firewall action, bot score and many more fields!

  • blog2022 Q2

    Private Access Tokens: Internet with greater privacy and fewer CAPTCHAs

    Wed, June 8, 2022 

    Cloudflare, in conjunction with tech leaders like Apple, has created a new open source standard that provides an invisible, privacy-first way for users to prove they are real using Apple devices – without CAPTCHAs or PII collection.

  • product2022 Q2

    Load Balancing Country Steering is now Generally Available

    Wed, June 1, 2022 

    We are excited to add support for Load Balancing customers to create a mapping between their origin pool and Cloudflare datacenters with country level granularity. Before this, customers could already map to specific geographies (using Geo Steering). This new fearure directly supports customers to fine tune how their traffic should be directed between their origin pools with a country-level granularity and get more control around how their traffic should behave.

  • feature2022 Q2

    Full packet captures with Magic Firewall

    Thu, April 28, 2022 

    Customers can now configure a Logpush bucket to receive full (non-sampled) packet captures on-demand from Cloudflare's edge, giving them full visibility into their network traffic for troubleshooting and blocking attacks. This is available to all customers with Advanced Magic Firewall.

  • feature2022 Q2

    WAF Analytics: Expanded query time window

    Tue, April 5, 2022 

    Enterprise customers can now query the full web application firewall (WAF) analytics data set, an increase from the previous 3 day query time window to the full 30 days. This will simplify troubleshooting and incident resolution and enable customers to do more from their Cloudflare dashboard.

  • blog2022 Q1

    Introducing Cloudflare API Gateway

    Fri, March 25, 2022 

    We are introducing Cloudflare API Gateway. With API Gateway, we will build on our current API Shield capabilities so businesses will be able to create, manage and secure APIs with robust API Gateway functionality: Create and manage APIs directly with Cloudflare Workers Automatically detect unmanaged APIs Address authentication and authorization Identify and stop API abuse (ready today with API Shield in GA) Transform, route, log, and measure API requests. Our security features in API Shield like API Discovery, Schema Validation, Abuse Detection, and mTLS are available now. Activate API Security and learn more about our plans to build it out into an API Gateway.

  • feature2022 Q1

    WAF machine learning detections

    Fri, March 25, 2022 

    We are introducing machine learning detections to complement our WAF managed rulesets. It is trained on massive Cloudflare datasets and attack patterns to stop sophisticated bypass attempts. The WAF dashboard will show all requests scored from 1-99 indicating likelihood of attack. With machine learning, we become even more effective at stopping attacks and bypass attempts, starting with SQLi and XSS, two of the most common application attacks.

  • feature2022 Q1

    Magic Firewall: SIP validation

    Fri, March 25, 2022 

    DDoS attacks can quickly overwhelm VoIP services resulting in performance degradation and service outages. Of late, we have seen a surge in attacks targeting SIP ports on the Internet. With this new Magic Firewall Advanced feature, customers can now enforce protocol validation checks to ensure that incoming packets are actually valid SIP frames. Using a simple match condition, customers can choose to block or skip unwanted packets and protect their VoIP services from network-layer DDoS attacks.

  • blog2022 Q1

    Zero Trust: Managing clouds with Cloudflare CASB and what’s next

    Fri, March 18, 2022 

    Cloudflare’s CASB beta is now available for sign-ups, with the first wave of beta invitations going out early next month. Our CASB looks at both data and users in SaaS apps to alert teams to issues ranging from unauthorized user access and file exposure to misconfigurations and shadow IT. Through the beta, you’ll be able to try out integrations with Google Workspace and GitHub shortly. We’ll soon follow with others like Zoom, Slack, Okta, Microsoft 365, and Salesforce throughout the year. More capabilities like SaaS asset management, remediation guides, and automated workflows are coming soon as well, plus integrations with Cloudflare Gateway to help wrangle in shadow IT. We’re eager to hear from you to help us shape what comes next.

  • blog2022 Q1

    Zero Trust: SSH command logging now in closed beta

    Fri, March 18, 2022 

    Secure Shell Protocol (SSH) command logging is now in closed beta, and we will be opening this feature up to users in the coming weeks. It provides a full replay of all commands run during an SSH session to help paint a clear picture in the event of an accident, suspected breach, or attack. As an extension of Cloudflare’s secure Web Gateway, it provides SSH visibility at a network layer. All commands are automatically captured without complex logging software installed on individual remote machines.

  • blog2022 Q1

    Zero Trust: Client-based sessions now generally available

    Fri, March 18, 2022 

    You can now build Zero Trust rules that require periodic authentication to control network access, including to TCP connections and UDP flows. To help mitigate risk with persistent sessions on scenarios like lost/laptops, shared workstations, and personal devices, client-based sessions require a user to reauthenticate with their identity provider before accessing specific resources. You can specify how often users need to reauthenticate depending on the resource and serve pop-ups to users without being overly intrusive.

  • blog2022 Q1

    New on-ramp available via Zero Trust device client and Magic IP-layer tunnels

    Fri, March 18, 2022 

    Now, traffic from devices with our Zero Trust client installed can route automatically to any network connected with an IP-layer on-ramp, e.g., Anycast GRE, IPsec, or CNI. This option increases the flexibility you have to connect existing network infrastructure and serves as another way to help you transition away from a traditional VPN architecture over time.

  • blog2022 Q1

    Cloudflare and CrowdStrike partner to give CISOs secure control across devices, applications, and corporate networks

    Thu, March 17, 2022 

    We’ve deepened the integration between Cloudflare’s Zero Trust suite and CrowdStrike’s Endpoint Detection and Response (EDR) offering. You can now use CrowdStike Falcon Zero Trust Assessment (ZTA), which provides continuous real-time device posture assessments, to verify device posture before granting access to internal or external applications via Cloudflare’s Zero Trust services. The CrowdStrike ZTA scores enable enforcement of conditional policies based on device health and compliance checks to mitigate risks. These policies are evaluated each time a connection request is made, making the conditional access adaptive to the evolving condition of the device. With this integration, you can build on top of existing Cloudflare Access and Gateway policies ensuring that a minimum ZTA score or version has been met before a user is granted access. Because these policies work across our entire Zero Trust platform, you can use these to build powerful rules invoking Browser Isolation, tenant control, antivirus or any part of your Cloudflare deployment.

  • feature2022 Q1

    Magic Transit: Protect all networks

    Thu, March 17, 2022 

    We are excited to extend the capabilities of Magic Transit to customers with any size network, from home networks to offices to large cloud properties, by offering Cloudflare-maintained and Magic Transit-protected IP space as a service. Customers can now use Cloudflare-assigned IP addresses for their Internet-facing services and receive industry-leading DDoS protection through Magic Transit, no matter the size of their IP address block. Previously Magic Transit required a /24 prefix at a minimum. Contact your account team to take advantage of this feature today.

  • blog2022 Q1

    Zero Trust: Clientless web isolation now generally available

    Thu, March 17, 2022 

    Cloudflare’s clientless web isolation is now generally available, which streamlines connections to remote browsers through a hyperlink (e.g., *https://.cloudflareaccess.com/browser*). Once users are authenticated, their browser establishes a low-latency connection to a remote browser hosted in a nearby Cloudflare data center without installing any software or requiring any certificates on the endpoint device. You can better secure browsing for third-party contractors, protect against suspicious hyperlinks and PDF documents, integrate with third-party secure web gateways, and empower users to securely access sensitive data on unmanaged device endpoints anywhere in the world.

  • feature2022 Q1

    Premium DNS Health Monitoring is now GA for Contract Customers

    Wed, February 9, 2022 

    We are excited to announce the addition of new health monitoring types. These newly added types directly support our customer's ability to load balance more DNS records than just A/AAAA and CNAME records. Now, customers can add MX, SRV, HTTPs, and TXT records. The new health monitoring types are ICMP Ping, SMTP, and UDP-ICMP (these are in addition to the previously existing HTTP, HTTPS, and TCP types). Cloudflare Enterprise plan customers can now point an MX, SRV, or HTTPs record address to a Load Balancer hostname and leverage the new health monitoring type(s) to inform intelligent traffic steering and failover support for unproxed (grey clouded) Load Balancers.

  • feature2022 Q1

    Magic Firewall: Early access for on-demand packet captures

    Tue, January 4, 2022 

    Magic Firewall customers now have early access to an API to collect packet captures from Cloudflare's edge, which can be used for debugging network issues and gaining greater visibility into malicious traffic patterns. This early access API allows customers to capture the first 160 bytes of packets, sampled at a default rate of 1/100. More functionality including full, encrypted packet captures and control in the Cloudflare dashboard is coming soon. Please contact your account team to get early access for this feature.

  • blog2021 Q4

    Zero Trust: New partnerships with Mobile Device Management (MDM) vendors

    Fri, December 10, 2021 

    New integrations with mobile device management vendors Microsoft Intune, Ivanti, JumpCloud, Kandji, and Hexnode make it even easier to deploy and install Cloudflare's device client on user devices. We are partnering with leading MDM organizations that organizations already rely on to ensure Cloudflare's software is compatible and has purpose-built documentation to protect users across all devices.

  • blog2021 Q4

    Zero Trust: New controls to route traffic with Cloudflare's device client (WARP)

    Fri, December 10, 2021 

    Cloudflare's enterprise device client (WARP) now support API and Terraform based controls. This provides even more options to roll out the client to your organization's workforce. See [API documentation](https://api.cloudflare.com/?cf_target_id=1581E801F854FDF99FD5E45F70F84DF7#devices-set-split-tunnel-include-list) and the [Terraform documentation](https://registry.terraform.io/providers/cloudflare/cloudflare/latest/docs/resources/split_tunnel). Also, Cloudflare's enterprise device client (WARP) now fully supports the major operating systems, including: Windows 8.1, Windows 10 and Windows 11; macOS Mojave, Catalina, Big Sur, Monterey; Including M1 support; ChromeBooks (Manufactured after 2019) (New); Linux CentOS 8, RHEL, Ubuntu, Debian (New); iOS; and Android.

  • blog2021 Q4

    Zero Trust: Extending Cloudflare’s Zero Trust platform to support UDP and Internal DNS

    Wed, December 8, 2021 

    Thousands of organizations have already started building a private network on top of Cloudflare’s network, and now we’re making it easier than ever. Coming soon, we’re eliminating the need to migrate thousands of private hostnames manually to override DNS rules. Now you can route traffic to a private DNS resolver from Cloudflare's network. To learn more, check out the recent announcement.

  • blog2021 Q4

    Zero Trust: Clientless web isolation (BETA)

    Wed, December 8, 2021 

    By isolating specific URLs, Cloudflare's web isolation can apply Zero Trust threat and data protection for contractor devices or devices managed by third parties without the overhead of deploying additional software to endpoints. Cloudflare’s clientless web isolation leverages our Browser Isolation solution, which runs all web code remotely on our global network far away from any user endpoint.

  • blog2021 Q4

    Zero Trust: Private networking rules add sessions and login intervals

    Wed, December 8, 2021 

    Granular, identity based policies help build a Zero Trust posture, and now you can enforce session rules to the resources made available in your private network model. Until now, you could build Zero Trust rules around who could reach certain IPs and destinations, however when a user authenticated once, they could keep connecting indefinitely unless fully revoked. Whether you need to force a login every 24 hours or set a timeout after one week, you can now configure specific session durations for your policies and require a user re-authenticates with multi-factor authentication.

  • blog2021 Q4

    Zero Trust: Control input on suspicious sites with Cloudflare Browser Isolation

    Tue, December 7, 2021 

    Earlier this year, Cloudflare Browser Isolation introduced data protection controls that take advantage of the remote browser’s ability to manage all input and outputs between a user and any website. We’re excited to extend that functionality to apply more controls such as prohibiting keyboard input and file uploads to avert phishing attacks and credential theft on high risk and unknown websites.

  • blog2021 Q4

    Zero Trust: New cloud-native firewall capabilities

    Mon, December 6, 2021 

    Cloudlare expands its Zero Trust firewall capabilities to help companies secure their entire corporate network across all of their branch offices, data centers, and clouds—no matter where their employees are working from. Cloudflare also launched the Oahu program today to help orgranizations migrate from hardware firewalls to Zero Trust. Eligible customers who deprecate hardware firewalls may qualify for discounts and be entered for a chance to win a trip to Oahu, Hawaii.

  • feature2021 Q4

    Customers can now customize L3/4 DDoS attack protection settings

    Mon, December 6, 2021 

    After initially providing our customers control over the HTTP-layer DDoS protection settings earlier this year, we’re now excited to extend the control our customers have to the packet layer. Using these new controls, Cloudflare Enterprise customers using the Magic Transit and Spectrum services can now tune and tweak their L3/4 DDoS protection settings directly from the Cloudflare dashboard or via Cloudflare API. Network-layer DDoS Protection ruleset - This ruleset includes rules to detect and mitigate DDoS attacks on layer 3/4 of the OSI model such as UDP floods, SYN-ACK reflection attacks, SYN Floods, and DNS floods. This ruleset is available for customers using Cloudflare Spectrum and Magic Transit on the Enterprise plan. Advanced TCP Protection ruleset - This ruleset includes rules to detect and mitigate sophisticated out-of-state TCP attacks such as spoofed ACK Floods, Randomized SYN Floods, and distributed SYN-ACK Reflection attacks. This ruleset is available for Cloudflare Magic Transit customers only. In the past, customers had to contact Cloudflare Support to customize these rulesets. With this feature, customers can tailor and fine-tune the settings to further improve the accuracy of the protection for their specific network needs.

  • blog2021 Q4

    Build Full Stack applications with Pages

    Wed, November 17, 2021 

    Developers can turn static sites into a fully dynamic application by executing code at the edge with help from the powerful Cloudflare Workers platform. We are announcing this as an open beta and have some exciting things planned for the coming weeks and months.

  • blog2021 Q4

    Database Connectors and New Partners

    Mon, November 15, 2021 

    Cloudflare offers database connectors (early access), enabling developers to directly connect to classic relational databases like Postgres and MySQL. Customers can also leverage our partnerships with MongoDB, Prisma.

  • blog2021 Q4

    Durable Objects are now generally available

    Mon, November 15, 2021 

    Durable Objects are now generally available and production-ready. Customers can now implement complex applications, like collaborative whiteboarding, game servers, or global queues, in just a few lines of code.

  • blog2021 Q4

    Zero Trust: User interface to set up tunnel connections

    Mon, October 18, 2021 

    With the new UI in the Cloudflare for Teams Dashboard, users who deploy and manage Cloudflare Tunnel at scale now have easier visibility into their tunnels’ status, routes, uptime, connectors, cloudflared version, and much more. On the Teams Dashboard you will also find an interactive guide that walks you through setting up your first tunnel. Our new onboarding guide walks through each command required to create, route, and run your tunnel successfully while also highlighting relevant validation commands to serve as guardrails along the way. Once completed, you’ll be able to view and manage your newly established tunnels.

  • feature2021 Q4

    Zero Trust: Browser Isolation text input and file control

    Fri, October 15, 2021 

    Customers will be able to apply new rules that stop users from inputting text in Browser Isolation, as well prevent users from downloading or uploading inside of an isolated browser session.

  • feature2021 Q4

    Zero Trust: Access rule with temporary authentication

    Mon, October 4, 2021 

    With Cloudflare Access, you can require that users obtain approval before they can access a specific application. For any temporary authentication policy, a user will need to request access at the start of each session and every time their temporary session expires. This allows administrators to define which users should have persistent access and those that must request temporary access.

  • feature2021 Q4

    Magic Static Routes + GRE Tunnel Config UI is now live

    Fri, October 1, 2021 

    Magic Transit and Magic WAN customers can now view and update their static route and GRE tunnel configuration with a new section in the Cloudflare dashboard. This new UI allows customers to view and edit existing route and tunnel information, as well as validate changes, with updates propagated globally within minutes.

  • product2021 Q3

    Serverless Live Streaming with Cloudflare Stream

    Thu, September 30, 2021 

    We’re excited to introduce the open beta of Stream Live, an end-to-end scalable live-streaming platform that allows you to focus on growing your live video apps, not your codebase. With Stream Live, you can painlessly grow your streaming app to scale to millions of concurrent broadcasters and millions of concurrent users.

  • product2021 Q3

    Registrar for Everyone

    Tue, September 28, 2021 

    All Cloudflare customers now have full Registrar access, including the ability to register new domains. Starting today — and over the course of the next few weeks — we will be introducing over 40 new top-level domains (TLDs).

  • feature2021 Q3

    Magic GRE Tunnel Config API is now live

    Tue, September 28, 2021 

    Magic Transit and Magic WAN customers can now view and update their GRE tunnel configuration via API. This new API allows customers to view existing tunnel information and add/delete tunnels, as well as validate changes, with updates propagated globally within minutes.

  • feature2021 Q3

    Customize your HTTP DDoS protection settings

    Mon, September 20, 2021 

    We’re excited to announce the availability of the HTTP DDoS Managed Ruleset. This feature allows Cloudflare customers to independently tailor their HTTP DDoS protection settings. Customers on all plans, including the Free plan, can now tweak and optimize the settings directly from within the Cloudflare dashboard or via API.

  • product2021 Q3

    Cloudflare Images Now Available to Everyone

    Wed, September 15, 2021 

    Cloudflare Images provides a straightforward, end-to-end solution to cost-effectively build and maintain your image infrastructure. Store, resize, and optimize images at scale using one unified product.

  • feature2021 Q3

    Generate Signed Exchanges for Google Search (waitlist)

    Tue, September 14, 2021 

    Starting today, you will be able to generate Signed Exchanges (SXG) for Google Search with just one click. Automatic Signed Exchanges will be free for all Cloudflare Pro, Business and Enterprise customers as well as for customers using our Advanced Platform Optimization product. To sign up for the waitlist go to the Speed page on the Cloudflare dashboard and click on “Join Waitlist” on the Automatic Signed Exchanges (SXGs) card.

  • blog2021 Q3

    Zero Trust: Data protection controls within Cloudflare Browser Isolation

    Fri, August 20, 2021 

    Cloudflare Browser Isolation executes all website code (including HTML) in the remote browser. Since page content remains on the remote browser and draw instructions are only sent to the browser, Cloudflare Browser Isolation is in a powerful position to protect sensitive data on any website or SaaS application. Administrators can now control copy-paste, and printing functionality with per-rule granularity with one click in the Cloudflare for Teams Dashboard. For example, now administrators can build rules that prevent users from copying information from your CRM or that stop team members from printing data from your ERP—without blocking their attempts to print from external websites where printing does not present a data loss risk.

  • blog2021 Q3

    Zero Trust: Tenant control in Cloudflare's SWG solution

    Fri, August 20, 2021 

    Cloudflare for Teams offers IT administrators a way to ensure users have access to SaaS applications for corporate use, while at the same time blocking access to their personal accounts. This helps prevent the loss of sensitive or confidential data from a corporate network. You can create Gateway HTTP policies to control access to your corporate SaaS applications. When creating an HTTP policy with an Allow action, you will have the option to configure custom headers. The policy will use these headers to grant access to an application if a user’s request is headed to your organization’s account for the SaaS application, and to deny access if the request is headed to an account that does not match the information in the header.

  • blog2021 Q3

    Zero Trust: Capturing purpose justification for Zero Trust access policies

    Wed, August 18, 2021 

    Within Cloudflare's Zero Trust platform (Cloudflare for Teams), administrators can prompt users to enter a justification for accessing an application prior to login. Administrators can add this prompt to any existing or new Access application with just two clicks, giving them the ability to log and review employee justifications for accessing sensitive applications; add additional layers of security to applications they deem sensitive; and customize modal text to communicate data use & sharing principles.

  • blog2021 Q3

    Zero Trust: Guided integrations with AWS, Zendesk, and Salesforce to protect your SaaS apps

    Wed, August 18, 2021 

    Cloudflare's Zero Trust platform has guided integrations with the Amazon Web Services (AWS) management console, Zendesk, and Salesforce. In just a few minutes, your team can apply a Zero Trust layer over every resource you use and ensure your logs never miss a request. With Cloudflare in front of your SaaS applications, you can build Zero Trust rules that determine who can reach your SaaS applications in the same place where your rules for self-hosted applications and network access live.

  • blog2021 Q3

    Zero Trust: 6 new ways to validate device posture

    Tue, August 17, 2021 

    New device posture checks enabled for policy creation in Cloudflare's Zero Trust platform: (1) Application Check — Verify any program of your choice is running on the device; (2) File Check — Ensure a particular file is present on the device (such as an updated signature, OS patch, etc.); (3) Disk Encryption — Ensure all physical disks on the device are encrypted; (4) OS Version — Confirm users have upgraded to a specific operating system version; (5) Firewall — Check that a firewall is configured on the device; (6) Domain Joined — Verify that your Windows devices must be joined to the corporate directory

  • blog2021 Q3

    Zero Trust: Shadow IT discovery

    Mon, August 16, 2021 

    Shadow IT Discovery gives you visibility over which SaaS applications your end users are visiting. This information enables you to create the appropriate Zero Trust access or Secure Web Gateway policies in Cloudflare's Zero Trust Platform, so that you can have control over the security of your users and data. Within the Shadow IT Discovery user interface, you can gather information on the application status and application type of the applications visited by your users. You can also change an application's status according to your organization's preferences.

  • blog2021 Q2

    Zero Trust: Browser VNC with Zero Trust Rules

    Thu, June 24, 2021 

    Cloudflare can render a Virtual Network Computer (VNC) terminal in your browser without any client software or configuration required. Administrators can connect a VNC host to Cloudflare’s network. Using Cloudflare's ZNTA solution (Cloudflare Access), you can apply Zero Trust policies to determine who can access your VNC server. Cloudflare’s network will then enforce the Zero Trust policies and, when a user is allowed, render the client in the browser.

  • blog2021 Q2

    Zero Trust: Cloudflare's device client (WARP) available as local proxy

    Thu, June 17, 2021 

    When Cloudflare's device client (WARP) is configured as a local proxy, only the applications that you configure to use the proxy (HTTPS or SOCKS5) will have their traffic sent through WARP. This allows you to pick and choose which traffic is encrypted (for instance, your web browser or a specific app), and everything else will be left open over the Internet.

  • blog2021 Q2

    Zero Trust: Cloudflare's device client (WARP) available for Linux

    Thu, June 17, 2021 

    Cloudflare's device client (WARP) is available on Linux

  • feature2021 Q2

    Magic Transit Static Routes API is now live

    Thu, June 17, 2021 

    Magic Transit customers can now view and update the static routes used to direct traffic over their GRE tunnels with a REST API. This API allows customers to control the routes for each prefix/tunnel as well as some properties of each route including priority, region scope, and weight for ECMP balancing.

  • blog2021 Q2

    Zero Trust: Creating private networks on Cloudflare

    Thu, June 10, 2021 

    Administrators can build identity-aware, Zero Trust network policies using Cloudflare's Zero Trust platform. You can apply these rules to connections bound for the public Internet or for traffic inside a private network running on Cloudflare. Network-level policies will allow you to match traffic that arrives from (or is destined to) data centers, branch offices, and remote users based on the following traffic criteria: - Source IP address or CIDR in the header - Destination IP address or CIDR in the header - Source port or port range in the header - Destination port or port range in the header

  • blog2021 Q2

    Zero Trust: Network based policies with Cloudflare's Zero Trust platform

    Fri, June 4, 2021 

    Cloudlare's Zero Trust platform allows you can configure policies to control network-level traffic leaving your endpoints. Using network selectors like IP addresses and ports, your policies will control access to any network origin. Because Cloudflare integrates with your identity provider, it also gives you the ability to create identity-based network policies. This means you can now control access to non-HTTP resources on a per-user basis regardless of where they are or what device they’re accessing that resource from.

  • feature2021 Q2

    cf-request-id header slated for removal on July 1, 2021

    Thu, May 27, 2021 

    The cf-request-id header has been deprecated and is slated for removal on July 1, 2021. Cloudflare will be temporarily removing it on June 15th as a test-run. If you are dependent on cf-request-id for any reason, we suggest you use cf-ray instead. More info can be found at https://api.cloudflare.com/deprecations

  • feature2021 Q2

    Load Balancing Proximity Steering is now GA

    Wed, April 21, 2021 

    Load Balancing is used to keep our customers' infrastructures reliable, resilient, and available to their end-users day-in and day-out. Proximity steering allows customers to input longitude/latitude coordinates of their own data centers on a given pool to route requests from the CF PoP or external resolver the eyeball request arrived at to the closest geographical pool within the customers network.

  • feature2021 Q2

    Cloudflare Stream now supports NFTs

    Fri, April 16, 2021 

    Cloudflare Stream has been helping creators publish their videos online without having to think about video quality, device compatibility, storage buckets or digging through FFmpeg documentation. We believe creators should have the freedom to choose how they make money from their work instead of being restricted to three sided ad marketplaces and unfair algorithms. Today, we’re introducing a new API that takes a ERC-721 token ID and contact address and sets it on a video so every video on Stream can be represented with an NFT.

  • feature2021 Q2

    Node.js support in Cloudflare Workers

    Fri, April 16, 2021 

    Node.js made a breakthrough by enabling developers to build both the frontend and the backend with a single language. It took JavaScript beyond the browser and into the server by using Chrome V8. Building Node.js support into Workers almost sounds like a no-brainer: importing a library and watching everything work out-of-the-box would help developers move faster. Sharing our plans to support node.js - allowing developers to build bigger and more complex applications in Workers.

  • feature2021 Q2

    Announcing Cloudflare for SaaS for Everyone

    Thu, April 15, 2021 

    Before today, SSL for SaaS was only available to Enterprise customers. Today, we are excited to announce that our SaaS solution is available to everyone. And to reflect the evolution of the product since it was first released, we’re changing the name: Cloudflare for SaaS.

    Cloudflare for SaaS is a one-stop-shop for SaaS providers looking to provide fast load times, unparalleled redundancy, and the strongest security to their customers. It allows SaaS businesses to keep their teams focused on building out the solution, while we take care of the underlying infrastructure.

  • product2021 Q2

    Launching the auditable, browser-based, terminal

    Thu, April 15, 2021 

    Cloudflare for Teams gives organizations of any size the ability to add Zero Trust controls to resources and data while also improving performance with Cloudflare’s network. Starting today, your team can use that same platform to seamlessly connect to non-HTTP resources from inside of a browser with the same level of audit control available in web applications.

    Cloudflare’s browser-based terminal renders a fully functional console that a user can launch with a single click. Users authenticate with their organization’s SSO and Cloudflare’s edge checks that they meet the team’s Zero Trust rules for the resource being accessed. Once approved, users can run commands over SSH as if they were using their native command line without any client side configuration or agent. Cloudflare’s network will accelerate their connection, apply rules about what data transfers can take place, and record the session for administrators to audit as needed.

  • product2021 Q2

    Announcing Cloudflare Workers Unbound for General Availability

    Wed, April 14, 2021 

    Workers Unbound is intended for applications that need longer execution times. Today, we are extending our CPU limits up to 30s for HTTP Workers and offering a private beta for Cron Workers up to 15 minutes. HTTP Workers are triggered by HTTP requests as part of the Fetch API, whereas Cron Workers are scheduled jobs invoked by Cron Triggers. Our aim with this release is to allow customers to bring all of their intensive workloads to Workers and access the benefits of our edge network, without having to worry about computation limits.

    We heard your feedback on the cost of egress and know that these costs are top of mind for developers who need to do intensive storage and transfer operations. In response to that, we decided to cut our egress costs in half from 9c per GB to 4.5c per GB. Furthermore, we increased the usage that is included in our $5 a month cost, enumerated below. Now, as a part of the Workers Paid Plan, we will give you more usage for the same rate. Read more about our pricing in these docs.

  • feature2021 Q2

    Cloudflare Partners with NVIDIA to Bring AI to its Global Edge Network

    Tue, April 13, 2021 

    Cloudflare is now announcing a new partnership with NVIDIA to bring AI to the edge at scale. We're bringing developers powerful AI tools to build the applications that will power the future. The combination of NVIDIA’s GPU technology and Cloudflare’s edge network creates a massive platform on which developers can deploy applications that use pre-trained or custom machine learning models in seconds. By leveraging the TensorFlow platform developers can use familiar tools to build and test machine learning models, and then deploy them globally onto Cloudflare’s edge network.

  • product2021 Q2

    Pages General Availability

    Mon, April 12, 2021 

    Cloudflare Pages is now available for anyone and ready for your production needs. Cloudflare Pages radically simplifies the process of developing and deploying sites by taking care of all the tedious parts of web development. Now, developers can focus on the fun and creative parts instead. New and improved features include: web analytics, built in redirects, protected previews, live previews, and optimized images.

  • product2021 Q1

    New Cloudflare Web Application Firewall

    Mon, March 29, 2021 

    The new Web Application Firewall (WAF) brings better rule browsing and configuration, a new matching engine, updated rulesets, and global configuration. Starting today, 10% of newly created accounts on Cloudflare will be given access to the new WAF whenever a Pro plan zone or above is added. This percentage will increase to 100% of new accounts over the month of April, after which migration efforts will commence for existing customers. Enterprise customers may migrate early by contacting their account team.

  • feature2021 Q1

    Keyless SSL now supports FIPS 140-2 L3 hardware security module (HSM) offerings from all major cloud providers

    Sat, March 27, 2021 

    Private encryption keys stored in hardware security module offerings from all major cloud providers can now be used to secure HTTPS connections at Cloudflare’s global edge.

  • feature2021 Q1

    Announcing API Abuse Detection

    Fri, March 26, 2021 

    Today, we are announcing early access to API Abuse Detection. This technology will identify, secure, and protect API endpoints with unsupervised learning.

  • feature2021 Q1

    Introducing Super Bot Fight Mode

    Fri, March 26, 2021 

    Cloudflare user with a Pro or Business site can take new action against bots. Pro users can now do more to stop bots. Highlights include: challenge or block traffic from “definitely automated” sources, enable JavaScript Detections to identify headless browsers and other actors on the Internet, and include or exclude verified bots from protection. Business users can access a new version of Bot Analytics; where users can view traffic by type, adjust the time frame, and filter by different attributes like IP address or user agent. For those with more advanced security needs, Enterprise Bot Management remains the gold standard. And it’s only getting better.

  • feature2021 Q1

    Cloudflare Route Leak Detection

    Thu, March 25, 2021 

    Route Leak Detection is a new network alerting feature that tells you when a prefix you own that is onboarded to Cloudflare is being leaked, i.e., advertised by an unauthorized party. Route Leak Detection helps protect your routes on the Internet: it tells you when your traffic is going places it’s not supposed to go, which is an indicator of a possible attack, and reduces time to mitigate leaks by arming you with timely information. Cloudflare Magic Transit or BYOIP customers can configure route leak alerts in the dashboard today.

  • product2021 Q1

    Page Shield

    Thu, March 25, 2021 

    Cloudflare Page Shield helps you monitor your applications’ Javascript dependencies for suspicious activity and protect your visitors from Magecart style attacks. Page Shield monitors potential attack vectors from third party scripts and prevents user information from falling into the hands of hackers. Page Shield uses a feature named ‘Script Monitor’ to record your site’s JavaScript dependencies over time. New JavaScript dependencies trigger alerts so application owners can investigate whether or not they were expected changes.

  • feature2021 Q1

    API Shield with Schema Protection

    Wed, March 24, 2021 

    Schema Validation is now available for all Enterprise customers. We're launching four features to help reduce the impact of exfiltration attacks: a managed IP List allowing you to block traffic from Open Proxies, more control over the certificate lifecycle, and a Data Loss Prevention solution. You can now navigate to the ‘API Shield’ tab where you can deploy API security products directly from the UI.

  • product2021 Q1

    Browser Isolation now available in Cloudflare for Teams

    Wed, March 24, 2021 

    We are excited to announce that Cloudflare Browser Isolation is now available within the Cloudflare for Teams suite of zero trust security and secure web browsing services as an add-on. Teams of any size, from startups to large enterprises, can benefit from reliable and safe browsing without changing their preferred web browser or setting up complex network topologies. To get started, add Browser Isolation to a Teams Standard, Gateway, or Teams Enterprise plan as an add-on.

  • blog2021 Q1

    Zero Trust: Announcing Cloudflare's Data Loss Prevention platform

    Wed, March 24, 2021 

    Cloudflare's Zero Trust platform announces new controls over data in your enterprise.

  • blog2021 Q1

    Zero Trust: Antivirus scanning in Cloudflare

    Tue, March 23, 2021 

    Cloudflare's Secure Web Gateway solution (Gateway) protects users as they navigate the Internet. When users download or upload a file to an origin on the Internet, that file could potentially contain malicious code that may cause their device to perform undesired behavior. To prevent this, Cloudflare Gateway allows admins to enable Anti-Virus (AV) scanning of files that are uploaded or downloaded by users as the file passes through Gateway. AV scanning of files requires organizations to enable Proxy mode under Settings > Network > Layer 7 Firewall.

  • feature2021 Q1

    New device security integrations: Carbon Black, Sentinel One, Crowdstrike and Azure AD

    Tue, March 23, 2021 

    Cloudflare for Teams customers can configure policies that rely on device security signals provided by their endpoint security vendor to allow or deny connections to their applications. This includes signals and attributes like version of the operating system, date of the last patch, disk encryption status, inventory of installed applications, status of anti-malware or endpoint security provider, and date of the last malware scan. Cloudflare for Teams customers can now integrate device posture signals from Carbon Black, Sentinel One, Crowdstrike and Azure AD.

  • blog2021 Q1

    Zero Trust: New integrations with VMware Carbon Black, CrowdStrike, and SentinelOne

    Tue, March 23, 2021 

    Cloudflare's Zero Trust platform enables device posture checks with new integrations with Mware Carbon Black, CrowdStrike, and SentinelOne to pair with an existing Tanium integration.

  • product2021 Q1

    Introducing Magic WAN with Magic Firewall

    Mon, March 22, 2021 

    We are excited to announce Magic WAN with Magic Firewall - two of the most foundational aspects in our vision for the future of corporate networking and security with Cloudflare One. Magic WAN provides secure, performant connectivity and routing for your entire corporate network, reducing cost and operational complexity. Magic Firewall integrates smoothly with Magic WAN, enabling you to enforce network firewall policies at the edge, across traffic from any entity within your network.

  • feature2020 Q4

    Updates to the Network Analytics Dashboard

    Mon, December 14, 2020 

    We are excited to announce updates to the Network Analytics dashboard. First, a new Trends & Insights section has been added at the top of the dashboard and provides insights into DDoS attack analytics and their trends over time. Read more on our blog. Additionally, the time-range filter in the Network Analytics dashboard has been expanded to display trends for up to 3 months at a time, allowing customers to view an entire quarter together. The Network Analytics dashboard also includes a CSV export option that now allows customers to see up to 500 events in one file. Finally, the new Monitor action allows customers to review traffic flagged by Cloudflare’s mitigation systems, before being mitigated. It allows you to identify the traffic type and decide if this is traffic you'd like to receive or have it blocked at the edge.

  • feature2020 Q4

    Introducing Bot Analytics

    Thu, October 29, 2020 

    Bot Analytics helps you understand, analyze, and learn from automated traffic in the dashboard. It works seamlessly with Cloudflare's Bot Management solution. Customers can use Bot Analytics to view up to one week of traffic at a time, and even to filter on particular attributes like IP address or ASN. Enterprise customers who do not have Bot Management now have access to a Bot Report. This tool — available in the Firewall tab — provides an exciting new breakdown of your site traffic.

  • feature2020 Q4

    Cloudflare Gateway now includes L7 filtering and support for roaming devices

    Wed, October 14, 2020 

    Cloudflare Gateway now protects roaming users and remote devices via integration with the Cloudflare WARP desktop client. Gateway can apply L7 filtering to inspect traffic for threats that hide below the surface.

  • feature2020 Q4

    Cloudflare Access now protects SaaS applications

    Tue, October 13, 2020 

    Cloudflare Access now can be used to protect both internal and SaaS applications, allowing organizations to extend Zero Trust access capabilities to any application in use in their organization. With Cloudflare Access, every request to applications is evaluated for user identity and device context. Access allows customers to use multiple sources of identity to grant different groups of users access to the same application. This gives customers the flexibility to extend access to external users (3rd parties, contractors, vendors) without having to onboard them onto your centralized Identity Provider.

  • feature2020 Q4

    Announcing support for GRPC

    Thu, October 1, 2020 

    We're excited to announce native support for [gRPC](https://grpc.io/), a next-generation protocol that allows you to build APIs at scale. With gRPC on Cloudflare, you get access to the security, reliability, and performance features that you're used to having at your fingertips for traditional APIs. When you put your gRPC APIs on Cloudflare, you immediately gain the benefits that come with Cloudflare. Nervous about exposing your APIs to bad actors? Add security features such as WAF and Bot Management. Need more performance? Turn on Argo Smart Routing to decrease time to first byte (TTFB). You can also increase reliability by adding a Load Balancer. Support for gRPC is currently in beta mode. You can join the beta program from the Network tab on the Cloudflare dashboard.

  • feature2020 Q3

    Introducing Monitor Previews

    Mon, September 28, 2020 

    Within Load Balancing, we have a feature called Health Monitors. As a refresher, a health monitor actively probes an origin within a pool to see if they are available and the results directly influence steering and failover decisions within the overall Load Balancer. When our customers make changes to their Health Monitors, sometimes mistakes are made. This presents the possibility for missing critical health notifications across potentially many pools and origins! These missed notifications can result in the larger infrastructure being affected and serving large amounts of errors to end-users, in turn, tarnishing the user experience. To solve this, we introduced Monitor Preview. With Preview, users can make changes to their monitor details and preview the results across all the pools the particular monitor is attached to, all before deploying the changes. This means as our customers continue to build more complex infrastructure on Cloudflare, they have the tools to drive confidence around any edits/changes they make to their monitor configurations ahead of deploying those changes. This not only ensures users configurations are correct across their varying pools, but protects them from any unwanted surprises and makes sure that application reliability is maximised.

  • feature2020 Q3

    Announcing support of Network Analytics for Spectrum applications

    Mon, September 14, 2020 

    Cloudflare Spectrum users can now view detailed traffic reports on DDoS attacks to their configured TCP/UDP applications that include: - The size of attacks - The attack vector deployed - Where the attacks are coming from - The allowed network traffic Cloudflare Spectrum is a reverse proxy product that offers DDoS protection and traffic acceleration for user-specified applications. Users can easily proxy their TCP/ UDP services behind Spectrum from the Cloudflare dashboard by specifying the hostname/ IP address and port number of the application. With support for Network Analytics, Spectrum users can now get detailed insights into DDoS attacks detected and mitigated at Cloudflare's edge on their Internet property. To learn more about Network Analytics, read the blog post below.

  • feature2020 Q3

    Dashboard Updates to Network Analytics

    Tue, September 1, 2020 

    We're introducing a series of features to the Network Analytics dashboard that allows our Magic Transit & BYOIP customers to investigate layer 3/4 DDoS attacks and analyze traffic more easily and effectively. Network Analytics provides near real-time visibility into network- and transport-layer traffic patterns and DDoS attacks for a customizable timeframe ranging from 30 minutes up to the last 60 days. The Network Analytics dashboard view is available to Enterprise customers that use Cloudflare Magic Transit or Bring-Your-Own-IP for Cloudflare Spectrum. First, the new increased range of Top Ns allows users to expand their view to lower-tier variables. Users can adjust the Top Ns using a drop-down menu to either top 5, 10, or 15. Second, the time series chart has an added tooltip to the “Allowed” legend, allowing users to include traffic triggered by Firewall Rules, flowtrackd, and L7 rules, which might not already be reflected in the Block or Rate Limited traffic for the time being. Third, users can now view the attack distribution in a stacked bar chart that allows for easier comparison of the various attack vectors on your network. We've also added a link to Network Analytics Knowledge Base (right next to the 'Packer summary' in the 'Packets' view) for users to learn more about the Network Analytics dashboard.

  • feature2020 Q3

    Introducing Cloudflare traceroute, a tool that helps customers debug network issues

    Mon, August 31, 2020 

    Debugging network issues can be difficult. Tools like ping can help you understand the health of a network path from one point to another, but it can be hard to diagnose problems in other parts of the network that you don't have a direct presence in. That's why we're excited to announce the availability of the Cloudflare traceroute API, allowing customers to run traceroutes from Cloudflare's edge data centers to any target and narrow in on root causes of network issues regarding latency and packet loss. The traceroute tool is generally available to all Cloudflare ENT customers and is available via our API at the link below.

  • feature2020 Q3

    BYOIP now available for Layer 7, Spectrum, and Magic Transit

    Thu, July 30, 2020 

    Under certain circumstances, Customers may want Cloudflare to announce their IP prefixes on their behalf, a feature known as Bring your own IP, or BYOIP. It may be that these IPs are already allow-listed in important places, or end users are already pointing to these IPs. Cloudflare can now announce an IP prefix on your behalf for use with our Layer 7 products (e.g. CDN/WAF/Rate Limiting/etc), as well as Spectrum and Magic Transit. It's worth noting that BYOIP is already a requirement for Magic Transit. Whether you use our ASN or your own (BYOASN), Cloudflare will announce your IPs as Anycast IPs from all of our 270 data centers, just as we would our own. Check out the blog on the release or take a peek at the developer docs, both linked below.

  • feature2020 Q3

    Introducing flowtrackd—Cloudflare’s DDoS protection with unidirectional TCP flow tracking

    Thu, July 30, 2020 

    We’re excited to launch flowtrackd — a software-defined DDoS protection system that significantly improves Cloudflare’s ability to automatically detect and mitigate even the most complex TCP-based DDoS attacks. Using only the ingress traffic that routes through Cloudflare, flowtrackd determines whether to forward or drop each received TCP packet based on the state of its related connection. The state machine that determines the state of the flows was developed in-house and complements Gatebot and dosd, our existing DDoS protection systems. Together Gatebot, dosd, and flowtrackd provide comprehensive multi-layer DDoS protection. Flowtrackd is now generally available to all customers using Magic Transit.

  • feature2020 Q3

    Group by and zoom charts now available for paid plans

    Tue, July 28, 2020 

    Cloudflare customers can now easily and quickly drill into their analytics to better understand the traffic patterns on their Internet property. With the introduction of the zoom and group-by features, customers can see in more detail any variations in their traffic patterns right from the dashboard. For example, a spike in traffic can be investigated by zooming into the relevant time range and then grouped by either a single IP address or the URL that may have caused the spike. These features are now generally available to all Cloudflare customers using Firewall, Cache, Load Balancing, or Network analytics on our paid plans.

  • feature2020 Q3

    Port-range support for Cloudflare Spectrum

    Wed, July 22, 2020 

    Cloudflare Spectrum is a reverse proxy product that offers DDoS protection and traffic acceleration for user-specified applications. Users can easily proxy their TCP/ UDP services behind Spectrum from the Cloudflare dashboard by specifying the hostname/ IP address and port number of the application. Many services, however, (such as FTP, WebRTC, VoIP) run on multiple TCP ports requiring users to configure a separate Spectrum application for each port. This can be cumbersome to configure and maintain. With the introduction of support for port ranges, users can now configure a single Spectrum application for a service that runs on multiple ports, making it significantly easier to configure and maintain.

  • feature2020 Q2

    Introducing Cache Analytics

    Tue, June 16, 2020 

    Customers can now get deeper insights into the caching of their websites. See what resources are and aren't cached, so you can optimize your cache settings for a higher cache-hit ratio. You can filter by hostnames and see a list of top URLs that aren't cached, or images that might have short cache TTLs—so you can tune your cache settings to improve the performance of your website and save more on bandwidth costs.

    Cache analytics is now generally available to all customers on the Pro, Business, and Enterprise plans, just navigate to the 'caching' tab in your dashboard.

  • feature2020 Q2

    Cache TTL by Status Page Rule and UI for Enterprise plans

    Thu, June 11, 2020 

    We're introducing a new page rule that allows customers to set cache TTL (time-to-live) based on the status codes received from their origin server. This functionality gives you more granular control over a cached response based on the resource availability determined from the origin server responses. This feature announcement is part of our continued effort to turn more "Workers required" functionality into first-class Cloudflare features that you can easily enable and set right from the dashboard.

  • feature2020 Q2

    Cloudflare Standalone Healthcheck Analytics is now generally available

    Thu, June 4, 2020 

    Cloudflare Standalone Healthcheck Analytics is now generally available to all Pro, Business, and Enterprise customers. With Standalone Healthcheck Analytics, you can now see the availability of your origins, latency metrics, and top offending origins or error types over time. You get detailed insight into errors that are taking place across origins, empowering you to take targeted action(s) to remedy the issue and ensure your uptime is maximized. You can find the new analytics in the Healthcheck Analytics Tab of the Traffic App in the Cloudflare dashboard.

  • feature2020 Q2

    Benefit from Cloudflare’s global network and get full control over your traffic

    Wed, June 3, 2020 

    Many customers want to maintain local control over their traffic while getting the security benefits that come with a global network. In the era of decentralized cloud services, this can be a massive challenge. With the launch of Regional Services, you can leverage the power of our global network to increase the security, speed, and reliability of Internet properties—and retain full control over exactly where their traffic is serviced.

  • feature2020 Q2

    Tanium’s on-device security is now integrated with Cloudflare Access

    Fri, May 29, 2020 

    Cloudflare Access now integrates with Tanium for Zero Trust access to internal apps. Today, Cloudflare and Tanium customers can ensure any connection to their corporate resources is protected with two layers of assurance: number one, the user’s corporate credentials, and number two, their managed device. In the [new Cloudflare for Teams UI](https://blog.cloudflare.com/a-single-dashboard-for-cloudflare-for-teams/), you can add Tanium as an authentication mechanism. The UI will prompt you to add your Tanium public certificate and the endpoint used to validate the connecting device. With that information, Cloudflare Access can query the device’s health when evaluating a connection without the risk that the device could be impersonated. All Cloudflare for Teams customers who have a Tanium deployment can begin integrating device posture into their Access policies today at no additional cost.

  • feature2020 Q2

    Secondary DNS onboarding UI for Enterprise customers

    Wed, May 13, 2020 

    We’re happy to announce that we're rolling out a new Secondary DNS onboarding UI for our Enterprise customers (who have the secondary DNS entitlement enabled). Until now, you could only onboard to our Secondary DNS via API. This meant multiple, manual API calls – resulting in a complicated onboarding experience, especially for those with multiple domains. With the new UI, you can onboard your zones end-to-end and manage your DNS masters and TSIGs entirely through the Cloudflare dashboard. If you're an enterprise customer who is interested in Cloudflare Secondary DNS, please ask your account team to enable it for you.

  • feature2020 Q2

    Hardware Keys For 2FA Now Supported

    Mon, April 20, 2020 

    The Cloudflare dashboard now supports security keys as a [two-factor authentication](https://www.cloudflare.com/learning/access-management/what-is-two-factor-authentication/) method for all users. Hardware security keys are the most secure method of two-factor authentication. They also prevent phishing by verifying that a website is legitimate. Cloudflare will support multiple hardware security keys, one TOTP seed, and one set of backup codes. We've also added a Management page for your two-factor authentication methods. This means that you can safely add, update, and remove methods while leaving 2FA enabled on your account. You can easily set up your security keys in the 2FA Management menu, found under "My Profile >> Authentication".

  • feature2020 Q1

    Protect Against HTTP Floods When Your Server Responds with Error Codes (5xx)

    Tue, March 31, 2020 

    Cloudflare's automatic DDoS detection and mitigation systems are now synchronized with your origin servers and leverage your origin’s error response codes as an additional detection signal. When your origin begins to respond to Cloudflare with an increasing rate of 5xx errors, Cloudflare's DDoS detection systems initiate automatically and will analyze traffic to identify floods faster than ever. Once a flood is detected, dynamically generated mitigation rules are propagated to Cloudflare’s edge data-center(s) to mitigate the flood. These events will be visible in your Firewall Analytics Dashboard as part of the existing “HTTP DDoS” events. This capability is now enabled by default to all Cloudflare customers at no additional charge.

  • feature2020 Q1

    Load Balancing Fallback Pool has been added to Cloudflare's UI

    Wed, March 18, 2020 

    We've added Cloudflare Fallback Pools to our UI, making it easier for our customers to designate a fallback pool or check if a fallback pool was set at all. The feature is generally available to all Load Balancing customers. Previously, customers could only designate a fallback pool in a given Load Balancer through an API. Now, customers can view, edit, and designate Fallback Pools directly in the Load Balancing UI. This lowers the barrier to utilize Fallback Pools and provides a better understanding of which pool is the fallback at any given time. Customers can access the new Fallback Pool UI in the Load Balancer creation or edit flow, or within Manage Pools Table.

  • feature2020 Q1

    Usage Based Billing Alerts now in beta

    Tue, March 17, 2020 

    We are thrilled to expand our alerting capabilities by launching Usage Based Billing Alerts. This new feature will give customers peace of mind about exceeding high bills by letting them know when their usage-based product – such as Cloudflare Argo or Cloudflare Access – exceeds the defined value set by the customer. This Usage Based Billing Alerts feature is now available as a beta and can be accessed via the Alert Notification Center in the Cloudflare Dashboard.

  • product2020 Q1

    Cloudflare Gateway now available to all customers

    Thu, March 12, 2020 

    Cloudflare Gateway is now in general availability to all Cloudflare customers. Gateway is a secure web gateway that protects and accelerates outbound Internet traffic. Gateway protects offices, homes and guest wi-fi networks with secure DNS filtering. With 100+ content and security filters, you can use it to protect protects users from malicious and inappropriate content on the Internet, and stop malware, phishing and ransomware attacks before they impact users.

  • feature2020 Q1

    Standalone Healthchecks Advanced Configurations (API) is Generally Available

    Tue, March 3, 2020 

    Cloudflare's Advanced Configuration options for Standalone Healthchecks are now generally available to all Pro, Business, and Enterprise customers. With Advanced Configurations, you can preview your Healthcheck(s) prior to deployment, ensuring no unforeseen breakages take place across your origins. You can also take advantage of threshold-based checks to better target your health reporting, and also choose to be notified for fail, pass, or all health event types. We've also added TCP as a supported protocol for Healthchecks and added more detail for code mismatch errors, along with supporting PATCH and a new Search API. Customers can take advantage of this new functionality through our updated API's found [here](https://api.cloudflare.com/#health-checks-properties).

  • feature2020 Q1

    Secondary DNS Analytics now generally available

    Fri, February 21, 2020 

    Secondary DNS Analytics are now available to all our secondary DNS customers. This feature provides in-depth insights and visibility into DNS queries. Customers can explore DNS queries based on response code, record type, as well as records that return NXDOMAIN response. Customers can also view DNS query distribution across Cloudflare's data centers. This feature is accessible in the Analytics Tab of the Cloudflare Dashboard or through the DNS Analytics API.

  • feature2020 Q1

    Network Analytics for enhanced visibility, analytics and reporting

    Thu, January 16, 2020 

    We are announcing Network Analytics for Magic Transit and Bring Your Own IP (BYOIP) enterprise customers. Security professionals are always exploring avenues for better visibility, analytics and reporting. Network Analytics provides actionable insights into the network-layer and transport-layer traffic and attacks. The analytical data enables customers to explore attack events including source, destination, rate, size and duration, in real-time to assess and mitigate DDoS attacks. Security professionals regularly create customized reports to share with peers, managers and executives. This feature empowers customers with an easy way of creating customized reports for L3/4 DoS attack events. Reports can be created based on select parameters, for example, top events by source or destination and more.

  • feature2020 Q1

    Announcing General Availability of BYOIP Dynamic Advertisement APIs

    Wed, January 8, 2020 

    You can now initiate or withdraw BGP advertisements of your Bring Your Own IP (BYOIP) prefixes using Cloudflare’s RESTful APIs. With Dynamic Advertisements, customers can onboard with Cloudflare in an "on-demand” deployment model, where Cloudflare is not typically in a customer’s flow of traffic but can be inserted when the customer network is under attack. Dynamic Advertisement works with Magic Transit (L3), Spectrum (L4), or the HTTP CDN. It is important to note that BYOIP prefixes must be explicitly configured for dynamic advertisement support. Existing BYOIP deployments on Cloudflare must go through a migration process before they can use this new functionality.

  • feature2019 Q4

    Account Analytics now available in open beta for all users.

    Thu, December 12, 2019 

    A new account-focused analytics dashboard is now available in open beta for all Cloudflare users. This dashboard helps you understand what's happening across all of your domains at a glance by providing information on metrics such as requests, bandwidth, cache rate, and error rate. You can also see your traffic broken down by country, view trends over the course of the year, and easily compare each period to the preceding one.

  • feature2019 Q4

    Zero-Downtime Origin Failover improves reliability for all Cloudflare customers

    Thu, December 12, 2019 

    Zero-Downtime Origin Failover is a new capability of our network that improves reliability for all Cloudflare customers. It reduces the number of 52x errors Cloudflare serves to end-users by 20%.

    A 52x error occurs when Cloudflare has trouble reaching a customer's origin. Currently, our Load Balancer uses data from our global network to pick the best origin server that we think will be online. However, if Cloudflare ultimately encounters an error, we just return the error to end-users. Zero-Downtime Failover builds on this capability by allowing us to try a new server in real-time before we return an error to the end-user.

    Customers who enable Cloudflare Load Balancing and/or add multiple 'A' records for a given domain in their DNS settings will see the most benefit from our Zero-Downtime Origin Failover.

  • feature2019 Q4

    Introducing the GraphQL Analytics API

    Thu, December 12, 2019 

    The GraphQL Analytics API, a powerful and flexible new way to explore your Cloudflare metrics and logs, is now generally available for all users. This API offers access to data regarding your HTTP requests, Firewall events, Load Balancing requests, and much more, all from one endpoint. You can select exactly what you need, whether it's one metric for one domain or multiple metrics aggregated for all of your domains. This functionality makes the API ideal for both data exploration and building your own analytics dashboards – it's the same technology we use for the Cloudflare dashboard.

  • feature2019 Q4

    Cloudflare now supports Proxy Protocol v2 for TCP and UDP applications

    Wed, December 11, 2019 

    We now support Proxy Protocol v2 for Spectrum customers. When a client connects to your service through Spectrum, your origin sees that connection coming in from one of the Cloudflare IPs – this is how reverse proxies work. But some of our customers would like to see the IP address of the original client.

    In HTTP land, we passed that information along using the X-Forwarded-For header.For TCP or UDP applications, however, Cloudflare has used PROXY Protocol (for TCP applications) and Simple Proxy Protocol (for UDP applications) to pass that information along. Both these protocols have certain limitations:

    • PROXY Protocol v1 is quite verbose and outdated, and not all software supports it.
    • Simple Proxy Protocol is effective, but being a custom solution offered by Cloudflare, there is no out-of-the-box software that supports it.

    PROXY Protocol v2 solves both of these problems by offering a binary format that is compatible with both UDP and TCP. Cloudflare will now support Proxy Protocol v2 for both TCP and UDP applications on our network.

    For related API deprecations, see the API docs.

  • feature2019 Q4

    Cloudflare Load Balancing Analytics is now generally available

    Tue, December 10, 2019 

    Cloudflare Load Balancing Analytics is now generally available to all Load Balancing customers. With LB Analytics, you get a granular view of traffic — identify which origins and pools are being selected for your traffic and why, so you can gather insights to optimize your infrastructure.

    LB Analytics lets you graphically view traffic demands on load balancers, pools, and origins over variable time ranges. You can also see all of your current health check information on a new map, letting you see which pools and origins are either down or have higher latency than you would like. You can find Load Balancing Analytics in the Traffic tab of the Cloudflare Dashboard.

  • feature2019 Q4

    Firewall Analytics: Now available to all paid plans (with several new features!)

    Mon, December 9, 2019 

    We’re making Firewall Analytics available to all paid plans so that more customers can easily understand how their attack mitigation is working.

    Previously, Enterprise customers could view 14 days of Firewall Analytics for their domains. Today we’re increasing that retention to 30 days. Business and Professional plan zones will get 30 and 3 days of retention, respectively.

    In addition, we’re adding several new enhancements to improve your workflow and productivity. These include:

    • Adaptive sampling: This guarantees that Firewall Analytics results are displayed in the Cloudflare Dashboard quickly and reliably, even when you are under a massive attack or otherwise receiving a large volume of requests.
    • Event-based logging: You can now filter by a specific rule (or any other criteria) and see a row for each event generated by that rule. This change also makes it easier to review all requests that would have been blocked by a rule by only creating it in Log mode.
    • Reduce false-positives: To help you determine what percent of CAPTCHA challenges shown to users may have been unnecessary, i.e., false positives, we are now showing the Challenge Solve Rate (CSR) for each rule.

    Read this blog post for more information.

  • feature2019 Q4

    Apex proxying is now available for 'SSL for SaaS'

    Mon, December 2, 2019 

    'SSL for SaaS' customers now have the option to enable their domain Apex to be proxied to Cloudflare. This is an improvement to our previous offering that required a subdomain.

    To illustrate: Previously, to enable 'SSL for SaaS' you had to use a subdomain as your vanity domain, e.g. subdomain.example.com. Now you can use your domain apex (aka root domain), e.g. example.com.

    For more on how 'SSL for SaaS' works, please see the blog post.

  • feature2019 Q4

    New Bypass Action in Firewall Rules

    Fri, November 22, 2019 

    We've added a new action to Firewall Rules called Bypass. The new feature allows you to write a Firewall Rule expression, and select any of the 7 supported features to bypass:

    • Browser Integrity Check
    • Hotlink Protection
    • Rate Limiting
    • Security Level
    • User-Agent Blocking
    • WAF Managed Rules
    • Zone Lockdown

    With this new capability, you can write complex expressions to bypass, based on any of the supported Request headers. Use cases include capability to bypass Rate Limiting based on trusted cookies, or being able to bypass specific features like WAF Managed Rules for penetration testing.

    This new capability is available to all Cloudflare customers and is available within the Rule Builder and Editor, as well as via our API.

  • feature2019 Q4

    Cloudflare now defaults to RFC-compliant cache behavior

    Fri, November 22, 2019 

    'Origin cache-control' is the cache-control header sent from the origin server that tells Cloudflare what assets to cache. Previously, a page-rule was made available for customers to enable advanced cache control directives from the origin server.

    We are now making this the default behavior of the cache to be compliant with RFC7234.

    Note that Cloudflare always respects origin-server cache-control headers, unless explicitly overridden. This change should not result in additional content getting cached. You must still set a "Cache Everything" rule for Cloudflare to treat all types of files as cacheable.

  • feature2019 Q4

    Enterprise customers can download filtered reports of Firewall Analytics

    Fri, November 1, 2019 

    Enterprise customers now have the ability to print or download a PDF snapshot of their Firewall Analytics based on the filters that they have applied. This has been extremely helpful for customers to include analytical insights into reports that can be shared with executive management, engineering teams and other cross-functional stakeholders, or used as a snapshot as part of compliance/security reviews.

  • feature2019 Q4

    New API Deprecation Page

    Wed, October 23, 2019 

    Any Cloudflare customer can now see all upcoming API changes in one place. Cloudflare's API exposes the entire Cloudflare infrastructure via a standardized programmatic interface. Using Cloudflare's API, you can do just about anything you can do on cloudflare.com in the customer dashboard. With the new API Deprecation Page, you will be able to see all changes to your APIs, which will simplify the workflow for your teams.

  • feature2019 Q3

    Logpush to Azure is now generally available

    Mon, September 30, 2019 

    Cloudflare Enterprise customers can now use Logpush to have their HTTP request logs automatically uploaded to Microsoft Azure Blob Storage. Logpush makes it easy to get comprehensive metadata on the requests served by Cloudflare's network, in order to investigate and debug errors and security mitigations or build customized analytics. Simply select a cloud destination–Amazon S3, Google Cloud Storage, Sumo Logic, and now, Microsoft Azure–provide secure access to Logpush's service, and then receive logs every five minutes.

    You can set up Logpush under the Analytics tab in the dashboard for any of your domains. A Logpush API is also available.

  • feature2019 Q3

    Customers can now monitor WAF Managed Ruleset updates online and via RSS

    Mon, September 30, 2019 

    Cloudflare's WAF team regularly updates our Managed Rulesets to introduce new protections, update rules to decrease false positives, or to deprecate older rules which have been superseded by other, more effective rules or solutions. To help customers stay up to speed with the changes we are providing a public changelog with an RSS feed, which will provide key details regarding:

    • New changes to Cloudflare's Managed Rulesets
    • Timelines for the testing and deployment phases of the new changes
    • The intention of the rules being introduced or updated
    • The deployment state of the rules (Block or Simulate)

  • feature2019 Q3

    New SSL/TLS tab design

    Thu, September 26, 2019 

    The Cloudflare SSL/TLS tab has a new look! The tab is now organized into sections for overview, edge certificates, origin certificates, and SSL for SaaS. Driven by customer feedback, these features present you with all the relevant information and controls you need to configure SSL/TLS with confidence. This tab is available to all customers in the dashboard.

    Cloudflare provides a number of solutions for SSL/TLS including Universal SSL, Dedicated Certificates, User uploaded custom certificates, and SSL for SaaS.

  • feature2019 Q3

    Cloudflare, along with Mozilla and Chrome are leading the charge to a faster, more secure Internet by providing support for HTTP/3

    Thu, September 26, 2019 

    HTTP/3 is the next generation of the protocol that powers the web. Instead of using TCP as the transport layer, HTTP/3 uses QUIC, a new Internet transport protocol which is encrypted by default and helps accelerate traffic.

    Customers with HTTP/3 enabled on their dashboard for their zones will now be able to deliver their websites and APIs over HTTP/3 to visitors who use Google Chrome or Mozilla Firefox browsers.

  • feature2019 Q3

    1.1.1.1. WARP and WARP Plus now in GA

    Wed, September 25, 2019 

    WARP is a new feature for the 1.1.1.1 mobile app that uses encryption to protect all of your data while it’s in transit over the Internet. This feature was designed to improve your mobile Internet security without draining your battery life or slowing you down. In fact, when network performance is poor, 1.1.1.1. with WARP has been shown to improve Internet speeds on your mobile device.

    1.1.1.1. with WARP is free to download and use from Google Play and the iOS app store; you do NOT need to be a Cloudflare customer to use it. For those who want a faster experience, WARP Plus is a subscription-based add-on that uses ARGO routing to send your requests along the fastest path. See the blog post for more details.

  • product2019 Q3

    Introducing Browser Insights: a new way to monitor the performance of your sites

    Tue, September 24, 2019 

    By injecting a javascript snippet into the webpage, Browser Insights helps you monitor your website’s performance right from your visitors’ browsers. Measure performance metrics such as TCP connection time, DNS response time, Time to First Byte (TTFB), page load time, and more.

    Browser Insights is currently only available in Early Access. Customers can request access to this feature by clicking on the Speed Page in the Dashboard.

  • feature2019 Q3

    Announcing faster DDoS Mitigation

    Mon, September 23, 2019 

    We have successfully completed the rollout of DDoS mitigation enhancements to all of our data centers worldwide. These new improvements enable each data center to make localized decisions that will result in the automatic detection and mitigation of UDP and TCP-based DDoS attacks in under 10 seconds.

    This faster mitigation has been automatically enabled for all Cloudflare customers.

  • feature2019 Q3

    Announcing Bot Fight Mode

    Mon, September 23, 2019 

    Bot Fight Mode is now available for all customers in the Firewall settings of the Dashboard. With Bot Fight Mode enabled, requests from traffic that matches malicious bot patterns will be challenged and/or blocked. The goal is to make it more computationally demanding and therefore more expensive to proliferate malicious bot traffic, disincentivizing attackers.

    Since making bots consume more CPU resources may have the side effect of increasing carbon emissions, Cloudflare will be planting trees at a much greater rate than would be needed to offset this increase. See the blog post for more details.

  • feature2019 Q3

    Cloudflare API tokens are now generally available

    Wed, September 11, 2019 

    Cloudflare API tokens are now available to all Cloudflare customers. API tokens allow you to authorize access to specific Cloudflare apps, accounts, and zones with limited permissions by API.

    With API Tokens, you can minimize your security risk by leveraging the practice of least privilege - only granting that token access to exactly what it needs. You can access API Tokens in the ‘My Profile’ section of your Cloudflare account. For more details on how it works, review our blog post and support guide.

  • feature2019 Q3

    Spectrum event logs now available through Logpush

    Fri, August 30, 2019 

    Spectrum connection logs are now accessible to Spectrum users through Logpush. You can create Logpush jobs to push event logs to your cloud service using the Logpush API or the Cloudflare Dashboard.

    Connection logs help you to debug, generate reports and monitor service usage. Logs help shape a complete picture of the lifecycle of a connection, giving insight into:

    • where the connection was opened
    • the settings used to open the connection
    • the amount of data transferred on the connection
    • the errors leading to a disconnect

    Logpush for Spectrum supports Amazon S3, Google Cloud Storage, Sumo Logic and Microsoft Azure Blob Storage.

  • product2019 Q3

    Cloudflare AMP Real URL is now generally available

    Mon, August 26, 2019 

    Cloudflare AMP Real URL is now in general availability to all Cloudflare customers. It uses signed exchanges to guarantee the authenticity of your AMP pages when they are served from a supporting AMP cache. Web visitors will not only experience fast mobile page loads, but the website URL will now be shown natively when served from AMP cache.

  • feature2019 Q3

    Supercharging Firewall Events for Free, Pro, and Business customers

    Thu, August 22, 2019 

    Cloudflare's new Firewall Event Log for Free, Pro, and Business customers provides a new smoother user experience and advanced functionality giving you more granularity when you search and filter your Firewall Events. With these extra capabilities, Firewall Events allows you to more accurately identify new or repeated threat attempts against your application. Cloudflare customers are now able to:

    • Search for any field of an Event, including fuzzy matches
    • Use a date/time picker, so you no longer need to sift through results to find something for a particular date or time.
    • See Events for all Firewall features (previously, some features were missing from the events view).
    • Have a much smoother user experience when trying to understand more about why a request was blocked

  • feature2019 Q3

    Supercharging Firewall Events for Self-Serve Customers

    Thu, August 22, 2019 

    Cloudflare's new Firewall Event Log for Self-Serve provides a new smoother user experience and advanced functionality giving you more granularity when you search and filter your Firewall Events. With these extra capabilities, Firewall Events allows you to more accurately identify new or repeated threat attempts against your application. Cloudflare customers are now able to:

    • Search for any field of an Event, including fuzzy matches
    • Use a date/time picker, so you no longer need to sift through results to find something for a particular date or time.
    • See Events for all Firewall features (previously, some features were missing from the events view).
    • Have a much smoother user experience when trying to understand more about why a request was blocked

  • feature2019 Q3

    Sparklines for Firewall and Rate Limiting rules

    Thu, August 22, 2019 

    The next time you load up the Firewall rules or Rate Limiting rules tab in the dashboard, you will see a new sparkline for each rule showing activity over the last 24 hours. This can be a very useful indicator of whether or not your rules are working as expected. You can also click on any sparkline to see a filtered view of your Analytics or Event Log (for self-serve) for that specific rule. This feature is available for all customers.

  • product2019 Q3

    Announcing Cloudflare Magic Transit

    Tue, August 13, 2019 

    Cloudflare Magic Transit is now available for Enterprise customers. Magic Transit provides secure, performant, and reliable IP connectivity to the Internet. Out-of-the-box, Magic Transit deployed in front of your on-premises network protects it from DDoS attack and enables provisioning of a full suite of virtual network functions, including advanced packet filtering, load balancing, and traffic management tools.

    Enterprises are often forced to pick between performance and security when deploying IP network services. Magic Transit is designed from the ground up to minimize these trade-offs: performance and security are better together. Magic Transit deploys IP security services across our entire global network. This means no more diverting traffic to small numbers of distant “scrubbing centers” or relying on on-premise hardware to mitigate attacks on your infrastructure. Visit the product page to learn more.

  • feature2019 Q3

    Certificate Transparency Monitoring Now in Beta

    Thu, August 8, 2019 

    CT Monitoring is now in beta for all customers. This is an opt-in service that crawls the public logs of certificate authorities and sends you an email whenever a certificate is issued for one of your domains. This information is important because a suspicious certificate issued to your domain could mean that a certificate authority made an error or that someone is perpetrating an attack on your service. With CT monitoring, you can spot bad certificates as they arise and quickly alert the certificate authority to minimize any harm.

  • feature2019 Q3

    Certificate Transparency Monitoring now in beta

    Thu, August 8, 2019 

    CT Monitoring is now in beta for all customers. This is an opt-in service that crawls the public logs of certificate authorities and sends you an email whenever a certificate is issued for one of your domains. This information is important because a suspicious certificate issued to your domain could mean that a certificate authority made an error or that someone is perpetrating an attack on your service. With CT monitoring, you can spot bad certificates as they arise and quickly alert the certificate authority to minimize any harm.

  • feature2019 Q3

    Announcing Subdomain Support for Enterprise Customers

    Thu, August 1, 2019 

    Enterprise customers now have Subdomain Support enabled by default. Cloudflare Subdomain Support simplifies management of Cloudflare performance and security for subdomains and provides several additional benefits.

    Subdomain Support allows designated teams within your organization to control Cloudflare settings for a specific subdomain, while your central IT team maintains control of your root or parent domain. For example, Cloudflare settings for support.example.com can be managed completely separately from example.com. For more information and instructions, see the support document.

  • feature2019 Q3

    Announcing IP Firewall whitelisting and IPv4/IPv6 filtering for Spectrum

    Tue, July 2, 2019 

    The IP Firewall for Spectrum apps now supports whitelisting. Previously, you could only use the IP Firewall to block a specific set of IPs (blacklisting). Starting today, you also have the option to effectively block everyone on the Internet outside of a list of approved IPs (whitelisting).

    Additionally, we’ve added filtering for IPv4 and IPv6 on Spectrum apps. Several customers have indicated that they only want to enable IPv4 or IPv6 on their apps, so now you can indicate whether you want your app to use IPv4, IPv6, or both.

  • feature2019 Q2

    Updates to maximum cache file sizes

    Thu, June 27, 2019 

    Thanks to some recent engineering and operational improvements, we have updated our default size limits for cached files. The new limits are as follows:

    • Enterprise customers can cache files up to 5GB by default
    • Enterprise customers can cache files up to 30GB by enabling origin range requests
    • Free, Business, and Pro customers can cache files up to 512MB

  • product2019 Q2

    AMP Real URL Entering Open Beta

    Wed, June 26, 2019 

    We have rolled out the beta of AMP Real URL to all users. Accelerated Mobile Pages (AMP) is a Google feature that allows you to serve your mobile site from Google’s cache. Not only does this speed up the delivery of your site, but it is also viewed favorably by Google’s search algorithm. One side effect of using AMP is that users will see a path that starts with ‘google.com/amp' in the URL bar. This can confuse your users and hurt your brand.

    Cloudflare’s AMP Real URL lets you retain your URL attribution on AMP pages by digitally signing content submitted to Google’s web crawler, proving that the content belongs to you. You can access AMP Real URL in the ‘speed’ tab of your dashboard; for more details on how it works please see the blog post.

  • feature2019 Q2

    Firewall Events can now be seen in Cloudflare Logs

    Tue, June 18, 2019 

    Firewall events can now be seen in Cloudflare Logs, which is available for all Enterprise customers. Previously, customers using Cloudflare Logs had to decode our pathingStatus and pathingOps to understand what was happening during a request; the only way to get more details was by manually checking Firewall Events. But now you can see a breakdown of every service and rule that touched a request directly from Cloudflare Logs, providing you with better and clearer insights.

  • feature2019 Q2

    Cloudflare is now certified SOC 2 Type 2 compliant

    Fri, June 14, 2019 

    We now have our report on SOC 2 Type 2 compliance. We previously received our SOC 2 Type 1 compliance, indicating that we designed and implemented strong controls around security, confidentiality, and availability. The new Type 2 compliance confirms that those controls have been tested over a period of time to demonstrate that they are operating effectively. These reports give our customers higher assurance that our internal controls are meeting security best practices/industry standards. Contact your customer representative to see the full report.

  • feature2019 Q2

    Read-only roles now available for Enterprise

    Thu, June 13, 2019 

    A new read-only role is now available for all Enterprise accounts. This will enable you to grant read-only access to users in your organization. This role will have all-access read privileges, but a persistent icon in the top-bar will confirm that a user is in read-only mode. This feature is already live; when you add a new user you can now select “Administrator Read Only” as their role.

  • feature2019 Q2

    BYOIP with Spectrum

    Thu, June 6, 2019 

    Bring Your Own IP (BYOIP) with Spectrum is now in beta for Enterprise customers. When creating a Spectrum application, Cloudflare normally assigns an arbitrary IP from Cloudflare’s IP pool to your application. This may not always be what you want: you may want to be explicit in your network setup or use your own IP addresses. BYOIP with Spectrum allows you to do just that.

    If you own an IP prefix, you can migrate it to Cloudflare. Once the migration is complete, Cloudflare will start broadcasting your IP prefix and traffic will get routed to the global Cloudflare network. Without configuration, however, Cloudflare will not know how to handle this traffic. You’ll need to add Spectrum applications for all applications that you wish to protect, making sure to use the IP addresses you want associated with each application. See the docs or contact your customer representative to learn more.

  • feature2019 Q2

    New Improvements to Firewall Analytics, Rules, and Managed Rulesets

    Thu, June 6, 2019 

    We’ve made some great new additions to Firewall Analytics, Rules, and Managed Rulesets. These updates are all live and available to use today. The complete list is as follows:

    Analytics:

    • A new data picker in Firewall Analytics lets you select a specific date and time
    • A search update lets you use “contains,” “starts with,” and “ends with” for string fields (e.g. user-agent)
    • The Managed Rules topN now displays the Managed Rule ID, making it easier to identify
    • topNs can now be extended to 10 or 15 items using a dropdown

    Firewall Rules and Managed Rulesets:

    • Descriptions within Managed Rules have been updated in a structured format, and contain more useful info
    • MaxMind's subdivision 1 and 2 data can be utilized within Firewall Rules using the Expression Editor, which allows you to block or whitelist regions, continents, and the EU

  • feature2019 Q2

    Updates to Cloudflare Workers

    Sat, June 1, 2019 

    We have some major announcements for Workers customers and Workers developers. Workers now has an open-source CLI (command-line interface) called Wrangler, which will enable devs to build Workers in a way that is more native to their workflow. In addition, we are introducing a free tier for Workers as well as the ability to deploy to workers.dev. This means you can try Workers for free, and you won’t need to deploy to a domain. We are also enabling multi-scripting for Free, Pro, and Business plans so you can enjoy the benefit of having multiple scripts per zone. Previously, this feature was only available for Enterprise customers.

    On top of all that, we have created a new UI, new documentation, and a new landing page for Workers (workers.cloudflare.com). Our goal is to eliminate barriers and make it easier to get started and build things with Workers. See the new docs for more details.

  • feature2019 Q2

    Updates to Audit Logs API

    Thu, May 23, 2019 

    We are constantly working on improvements to our API so that all Cloudflare customers can have easy access to their data. Previously, Audit Logs API only supported querying by "day". It now supports down to the minute resolution for the since and before fields. The Audit Logs API will also be modified to return records with a maximum age of 18 months. Previously, queries were unbounded and this had a detrimental performance impact.

    In addition, ALL Cloudflare APIs now include a standard response envelope, which includes an errors field. Previously, Audit Logs would return null for errors, instead of an empty array, which is the standard.

  • product2019 Q2

    Workers KV is Now in General Availability

    Fri, May 17, 2019 

    Workers KV is now out of beta and in GA for all Cloudflare customers. Workers KV is a highly distributed, eventually consistent, key-value store that spans Cloudflare's global edge. It allows you to store billions of key-value pairs and read them with ultra-low latency anywhere in the world so you can build entire applications with the performance of a CDN static cache.

    Workers KV enables you to store persistent data on the edge and quickly access that data with an API call. Some examples of functionality you can build with Workers KV include mass redirects and user authentication for apps. You can try Workers KV today by accessing it in the Workers tab in your dashboard.

  • feature2019 Q2

    Introducing Functions in Firewall Rules

    Wed, May 1, 2019 

    A new feature in Firewall Rules called “Functions” is now available to customers on all plans. Functions will allow a customer to have better control and flexibility to evaluate attributes. Our first two transformations are an "upper" and "lower" function.

    One of the biggest challenges with Wordpress and other applications, is that they automatically sanitize URLs to improve user-experience. The negative impact of this is it makes security more challenging. These functions will disable case sensitivity for that field, and you can now evaluate in either UPPER case or lower case. This does not change the actual request, it purely changes the case during the evaluation of the attribute. For examples and documentation please see the developer docs.

  • feature2019 Q2

    Cloudflare is officially ISO 27001:2013 compliant

    Fri, April 26, 2019 

    ISO 27001 is a security certification that is used as an international standard for managing risks to information security. It is published by the International Organization for Standardization (ISO). Receiving this certification means that an organization has met a set of strict requirements in the implementation of their Information Security Risk Management System (ISMS).

    To maintain this certification, an organization must be regularly audited by a certifying body who will ensure that the proper standards are being met. This means that Cloudflare customers can have peace of mind knowing that we are preserving the confidentiality, integrity, and availability of your information. You can see the full list of our security certifications on our Compliance page.

  • feature2019 Q2

    HTTP flood analytics and UDP protection

    Tue, April 16, 2019 

    We’ve exposed HTTP flood analytics in the Firewall Analytics dashboard. Now you can leverage the filters, toggle time periods, and view topN insights for HTTP floods.

    We’ve also upgraded our UDP protection. In addition to the existing UDP protocol violation protection, we’ve added more protection against UDP floods. This fortification is intended to support Spectrum UDP applications, BYOIP, NTP/NTS and QUIC (by Q3). TCP/UDP analytics is planned for later this year as well.

  • feature2019 Q2

    Faster cache hits for CNAME origins

    Tue, April 9, 2019 

    We’ve launched a major performance enhancement for all Cloudflare customers who use CNAME DNS records to point to their origin. For example, customers may configure "origin.customer.com" to reach their origin instead of an A record like 198.41.214.162.

    Before this change, every single request to our edge would trigger a DNS lookup for an origin IP. This behavior is particularly problematic if a CNAME is configured as the origin. In this case, we could add 100s of milliseconds in latency, since we may need multiple Internet requests to fetch the origin IP. Now, we only look up the origin IP when we need it. This cuts the total number of DNS requests in half and reduces the total time we spent looking up DNS records by about 1/3rd globally.

  • feature2019 Q1

    Announcing Concurrent Streaming Acceleration

    Tue, March 26, 2019 

    We have improved the way we deliver large file downloads for all of our customers. Concurrent Streaming Acceleration is a new way of delivering large, uncached files to multiple clients simultaneously. Previously, when several users requested an uncached file, the first user to ask for the file would have to finish downloading for the file to be cached and delivered to the other users. With Concurrent Streaming Acceleration, several users can simultaneously download the file while it is being added to the Cloudflare CDN cache.

    This change is live across all of Cloudflare, and will be particularly helpful for streaming live video to multiple users via Cloudflare Stream. Several users have noticed a drop in “cache lock wait time,” i.e. how long a request must wait for other requests – since we rolled out this change.

  • feature2019 Q1

    Cloudflare is now certified SOC 2 Type 1 compliant

    Thu, March 14, 2019 

    This week we received our SOC 2 Type 1 compliance report. This report evaluates Cloudflare on three trust service principles of SOC 2: Security, Availability, and Confidentiality. SOC 2 is a compliance certification that focuses on internal controls of an organization related to five trust principles: Security, Confidentiality, Processing Integrity, Availability, and Privacy.

    To maintain this certification, an organization must be regularly audited by a certifying body who will ensure that the proper standards are being met. This certification means Cloudflare customers can rest assured that their data is being kept private and protected. Enterprise customers can get in touch if they want to see a copy of the report.

  • feature2019 Q1

    Announcing L4 DoS analytics for Enterprise

    Wed, March 6, 2019 

    This week we release Layer 4 DoS analytics in the dashboard for Enterprise customers. Enterprise users will now be able to see both Layer 7 analytics in the form of dropped HTTP requests per second as well as Layer 4 analytics in the form of dropped TCP packets per second.

    Layer 4 (transport layer) attacks exploit a vulnerability in the TCP handshake in an attempt to max out the maximum number of TCP connections. Meanwhile layer 7 (application layer) attacks attempt to overwhelm a service with HTTP requests. Seeing analytics for both can help you understand what kind of attacks you are facing and what type of protection you need.

  • feature2019 Q1

    Source IP preservation for Spectrum UDP packets

    Mon, March 4, 2019 

    Some services you run may require knowledge of the true client IP. However, since Cloudflare intercepts packets before forwarding them to your server, you may see Cloudflare’s IP rather than the true client IP. In these cases, you can use a proxy protocol for Cloudflare to pass on the client IP to your service.

    Previously, we enabled Proxy Protocol support for Spectrum TCP packets. Since Proxy Protocol doesn’t support UDP, we have now created our own Simple Proxy Protocol to allow IP preservation for Spectrum UDP packets; this feature is available for all customers. To enable, simply flip the switch in the Spectrum dashboard. See the docs for more details.

  • feature2019 Q1

    Firewall Analytics

    Fri, March 1, 2019 

    Insights into security events are critical for monitoring the health of web applications. Today, Cloudflare announced new Firewall Analytics which will help our Enterprise customers get detailed insights into firewall events, helping them to tailor their security configurations more effectively.

  • product2019 Q1

    Cloudflare Logs - Granular Insights Into Your Traffic

    Mon, February 25, 2019 

    Improve your application’s performance and security by tuning your Cloudflare configuration. Investigate and debug errors and security mitigations reported by your end users. Build customized analytics in the tools you already use.

  • feature2019 Q1

    Access service tokens

    Thu, February 7, 2019 

    Access improves the security of service-to-service connections by adding service token authentication to the protections offered by Cloudflare. With service tokens, customers can now extend access control to automated tools, scripts, and bots.

  • feature2019 Q1

    Workers Cache API

    Fri, January 25, 2019 

    Cache API now works with Workers to give customers greater, more fine grained control over Cloudflare's caching behavior. This API will now allow customers to cache objects that were traditionally uncacheable, for example caching POST requests.

  • feature2019 Q1

    Increased load balanced origins support

    Fri, January 18, 2019 

    Customers on Free, Pro and Business plans can now purchase load balancing support for up to 20 origins. This increased support allows customers to build a more resilient global infrastructure that ensures their customers are served content from locations closest to them, with the lowest latency.

  • feature2018 Q4

    Access Service to Service

    Fri, December 21, 2018 

    Access improves the security of service-to-service connections by adding service token authentication to the protections offered by Cloudflare.

  • feature2018 Q4

    Access TLS Client Authentication

    Fri, December 7, 2018 

    Access now supports mutual TLS (mTLS) authentication. Mutual TLS authentication ensures that the traffic is secure and trusted in both directions between a client and server. This type of authentication can be used for allowing requests such as Internet of Things devices, that do not login with an identity provider, to demonstrate that they have permissions to reach a given resource. Organizations will be able to use mutual TLS authentication as a second layer of authentication for users or as the primary method of authentication for connected devices.

  • feature2018 Q4

    Access - SSH Support

    Fri, November 16, 2018 

    Access can authenticate users who want to use SSH (Secure Shell). This removes the need for a VPN by developers, IT, and support to use this service while providing secure authentication and integration with major identity providers.

  • blog2018 Q4

    Access enables a Zero Trust Command Line Interface (CLI) authentication to APIs

    Fri, October 5, 2018 

    Increase performance for users using APIs over CLI by authenticating near them, not in a far away VPN server. Simplify and reduce costs for deployment, configuration, and maintenance. Tightly control authorization through granular policies based on attributes such as users, IP ranges, and application URLs.

  • feature2018 Q4

    Cloudflare Dashboard: Single Sign-On support

    Wed, October 3, 2018 

    The Cloudflare dashboard now supports Single Sign On (SSO) for ease of centralized identity and access management. Reduce user provisioning times and avoid password sprawl, with a seamless SSO experience that supports your existing identity providers.

  • feature2018 Q4

    Access Single Sign On (SSO) for On Premise Confluence or JIRA

    Tue, October 2, 2018 

    Customers have secure SSO access to Confluence or JIRA. Instead of entering credentials twice, users authenticate only once through Access.

  • feature2018 Q4

    Cloudflare Workers: WebAssembly Support

    Mon, October 1, 2018 

    Cloudflare Workers now support the inclusion of WebAssembly modules. WebAssembly support allows developers to run code inside of Cloudflare Workers written in almost any language including: Rust, Go, C, C++, and others.

  • product2018 Q3

    Cloudflare Workers KV: Beta

    Fri, September 28, 2018 

    Cloudflare Workers KV provides access to a secure low latency key-value store at all 154 Cloudflare data centers. Developers can use Cloudflare Workers and Workers KV to augment existing applications or to build entirely new applications on top of Cloudflare's global cloud network. Workers KV scales seamlessly to support applications serving dozens or millions of users.

  • product2018 Q3

    Cloudflare Registrar: Early Access Program

    Thu, September 27, 2018 

    Cloudflare Registrar lets you securely register and manage your domain names with transparent, no-markup pricing that eliminates surprise renewal fees and hidden add-on charges. Be one of the first to transfer your domains to Cloudflare. Sign up today for the Cloudflare Registrar Early Access.

  • feature2018 Q3

    Encrypted Server Name Indication (SNI)

    Mon, September 24, 2018 

    Server Name Indication (SNI) does not conceal the requested hostname in the ClientHello message during TLS negotiation. This allows intermediaries to have visibility into the hostnames of websites visited by users. Exposing the hostname means that the privacy of users can be compromised, content can be censored, or traffic can be served with discriminatory quality-of-service. Encrypted SNI keeps the hostname private when a user is visiting an ESNI-enabled site on Cloudflare by concealing the browser’s requested hostname from anyone listening on the Internet. All domains on Cloudflare using our authoritative name servers get Encrypted SNI enabled as default.

  • feature2018 Q3

    Roughtime protocol support

    Fri, September 21, 2018 

    Cloudflare improves the accuracy of time for TLS handshakes through a rough, authenticated time-synchronization based on Google’s Roughtime protocol. By running a Roughtime service, we enable clients to securely keep approximately correct time, which reduces erroneous authentication from 'clock skew' and increases security through wider adoption of short-lived HTTPS certificates.

  • feature2018 Q3

    Layer 4 Load Balancing and Health Checks

    Thu, September 20, 2018 

    Cloudflare now supports load balancing for non-HTTP/S traffic across multiple origins for increased availability and performance when deployed with Spectrum.

  • feature2018 Q3

    The Cloudflare Onion Service

    Thu, September 20, 2018 

    Cloudflare will run an Onion Service on its network. Tor users visiting sites that have enabled this feature will be scored for reputation differently from general Tor traffic. This will result in fewer CAPTCHAs for human Tor users while protecting the site from malicious actors and reducing exit node tampering.

  • feature2018 Q3

    RPKI support for all domains

    Wed, September 19, 2018 

    Cloudflare supports the RPKI-framework for two important parts of Internet transit: signing BGP routes it announces for all Cloudflare domains, and validating announced IP addresses when routing traffic through its global network. Authenticating BGP routes with public key signing helps prevents visitors or origins on RPKI compliant ISP's from being hijacked.

  • feature2018 Q3

    Automatically Provision and Maintain DNSSEC

    Tue, September 18, 2018 

    Provision and manage DNSSEC from within the Cloudflare dashboard instead of logging into the supported registrar.

  • product2018 Q3

    Distributed Web Gateway

    Mon, September 17, 2018 

    Simplify, speed up, and secure read-only access to files stored on the InterPlanetary File System (IPFS), a peer-to-peer protocol for storing content.

  • feature2018 Q3

    Cloudflare Workers Terraform Provider Support

    Thu, September 13, 2018 

    The Cloudflare Provider for Terraform now supports deployment and configuration of Cloudflare Workers. Users of Terraform can now include Cloudflare Workers as another part of their configuration as code approach to infrastructure.

  • feature2018 Q3

    Serverless Framework Integration

    Tue, September 11, 2018 

    Deploy projects to Cloudflare Workers quickly and consistently using the Serverless Framework.

  • feature2018 Q3

    Spectrum supports multiple ports for TCP applications

    Thu, August 23, 2018 

    Spectrum allows TCP applications to support proxying multiple ports on the same hostname. A single application with multiple ports, (e.g. SMTP, which uses ports 25, 465, and 587) can be proxied through Cloudflare using the same hostname to protect it from DDoS attacks.

  • product2018 Q3

    Cloudflare Stream is now generally available

    Tue, August 7, 2018 

    Cloudflare Stream makes streaming high quality video at a global scale easy and affordable. Eliminate the effort of delivering high quality video with a massive, globally distributed video delivery network. Use a single, integrated workflow through a robust API or drag and drop UI that includes video encoding, global delivery, and customizable player.

  • product2018 Q3

    Cloudflare Access is now generally available

    Tue, July 24, 2018 

    No VPN required. Cloudflare Access enables easy, secure, and fast access to internal applications wherever they are, from whatever device. Leverage a Zero Trust security framework with existing identity providers like Google™, Facebook™, Okta™, Github™, and more. Get your first 5 users per month for free.

  • feature2018 Q3

    Access supports reusable nested groups and bypass policies

    Tue, July 24, 2018 

    Cloudflare Access now provides more granular control by supporting reusable nested user groups and bypass policies that include IP address whitelisting. Access policies based on user groups automatically apply rules to all users in the defined group, simplifying the creation and management of policies. Access rules can also enable traffic to bypass authentication. You can whitelist specific IP addresses, address ranges, or open up specified endpoints to the public internet.

  • feature2018 Q3

    Dynamic Steering

    Tue, July 10, 2018 

    Dynamic steering is a load balancing feature that automates traffic steering across origins in multiple geographic regions. Round-trip time (RTT) for health checks is calculated across multiple pools of load balanced servers and origins to determine the fastest server pools. This RTT data enables the load balancers to identify the fastest pools, and to direct user requests to the most responsive origins.

  • feature2018 Q3

    Support for New DNS Record Types

    Thu, July 5, 2018 

    Cloudflare's DNS now supports the following record types: CERT, DNSKEY, DS, NAPTR, SMIMEA, SSHFP, TLSA, and URI via the web and API.

  • feature2018 Q2

    FQDN Resolution of Load Balanced Origins at the Edge

    Thu, June 28, 2018 

    Cloudflare now resolves fully qualified domain name (FQDN) origins at the edge rather than centrally. This allows load balancers to better support origins that utilize geo-DNS or other dynamic responses.

  • feature2018 Q2

    Developer Portal Q2 Update

    Mon, June 11, 2018 

    The Developer Portal has been updated in Q2 to include improved search, documentation for new products, and listings of upcoming Cloudflare community events.

  • feature2018 Q2

    Rocket Loader Upgrade

    Fri, June 1, 2018 

    Rocket Loader has been updated to deliver faster performance for website paint & load times by prioritising website content over JavaScript. Majority of mobile devices are now supported. Increased compliance with strict content security policies.

  • product2018 Q2

    Stream Delivery

    Thu, May 31, 2018 

    Cloudflare’s Stream Delivery solution offers fast caching and delivery of video content across our network of 150+ global data centers.

  • feature2018 Q2

    Deprecating TLS 1.0 and 1.1 on api.cloudflare.com

    Tue, May 29, 2018 

    On June 4, Cloudflare will be dropping support for TLS 1.0 and 1.1 on api.cloudflare.com. Additionally, the dashboard will be moved from www.cloudflare.com/a to dash.cloudflare.com and will require a browser that supports TLS 1.2 or higher.

  • feature2018 Q2

    Rate Limiting has new Actions and Triggers

    Mon, May 21, 2018 

    Rate Limiting has two new features: challenges (CAPTCHA and JS Challenge) as an Action; and matching Header attributes in the response (from either origin or the cache) as the Trigger. These features give more control over how Cloudflare Rate Limiting responds to threshold violations, giving customers granularity over the types of requests to "count" to fit their different applications. To learn more, go to the blog post.

  • feature2018 Q2

    Support purge-by-tag for large tag sizes

    Thu, May 10, 2018 

    The Cache-Tag header now supports up to 1000 tags and a total header length of 16kb. This update simplifies file purges for customers who deploy websites with Drupal.

  • feature2018 Q2

    Multi-User Access on dash.cloudflare.com

    Wed, May 2, 2018 

    Starting May 2 2018, users can go to the new home of Cloudflare’s Dashboard at dash.cloudflare.com and share account access. This has been supported at our Enterprise level of service, but is now being extended to all customers.

  • product2018 Q2

    Cloudflare Spectrum

    Thu, April 12, 2018 

    Spectrum protects TCP applications and ports from volumetric DDoS attacks and data theft by proxying non-web traffic through Cloudflare’s Anycast network.

  • feature2018 Q2

    Support full SSL (Strict) mode validation for CNAME domains

    Thu, April 12, 2018 

    Cloudflare is now able to validate origin certificates that use a hostname's CNAME target in Full SSL (Strict) mode. Previously, Cloudflare would not validate any certificate without a direct match of the HTTP hostname and the certificate's Common Name or SAN. This update allows SSL for SaaS customers to more easily enable end-to-end security.

  • feature2018 Q2

    Workers Can Control Cache TTL by Response Code

    Wed, April 11, 2018 

    Cloudflare workers can now control cache TTL by response code. This provides greater control over cached assets with Cloudflare Workers.

  • product2018 Q2

    Argo Tunnel

    Thu, April 5, 2018 

    Argo Tunnel ensures that no visitor or attacker can reach your web server unless they first pass through Cloudflare. Using a lightweight agent installed on origin infrastructure, including containers or virtual machines, Cloudflare creates an encrypted tunnel between its nearest data center and an application’s origin server without opening a public inbound port.

  • product2018 Q1

    Cloudflare Nimbus

    Fri, March 23, 2018 

    Cloudflare is strengthening the Certificate Transparency (CT) ecosystem with our introduction of Nimbus, a free and open CT log. Certificate Transparency improves security online by bringing accountability to the system that protects HTTPs. Additionally, we have published Merkle Town, a dashboard for exploring and monitoring the certificate transparency ecosystem.

  • feature2018 Q1

    Load Balancing Configurable Weighting

    Thu, March 8, 2018 

    Configurable weighting allows for user defined weighting for how much traffic an origin server receives.

  • feature2018 Q1

    Secondary DNS

    Fri, March 2, 2018 

    Cloudflare can easily be setup as a secondary DNS provider. When records are edited with the primary DNS provider, the corresponding records at Cloudflare are automatically updated.

  • feature2018 Q1

    Zone Lockdown

    Wed, February 28, 2018 

    Zone Lockdown allows for the whitelisting of specific IP addresses and IP ranges, whereby all other IPs are effectively blacklisted. This supports specific sub-domains and URLs and is useful to protect an administrative area from non-specified IP addresses.

  • feature2018 Q1

    User Agent Blocking Rules

    Wed, February 28, 2018 

    Create a rule to block or challenge a specific User Agent from accessing your domain. This works similarly to Zone Lockdown, except the block examines incoming User-Agent strings rather than IPs. User Agent blocking applies to an entire zone, and sub-domains cannot not be specified.

  • product2018 Q1

    Cloudflare Workers Beta is Now Open

    Thu, February 1, 2018 

    Cloudflare Workers lets you run JavaScript on Cloudflare’s edge, deploying globally to over 120+ data centers around the world in less than 30 seconds. Your code can intercept and modify any request made to your website, make outbound requests to any URL on the Internet, and replace much of what you might need to configure your CDN to do today.

  • feature2018 Q1

    Cache Deception Armor

    Fri, January 19, 2018 

    In light of cache deception attacks, we have released a tool called Cache Deception Armor to help our customers make sure only assets that should be cached are being cached.

  • product2018 Q1

    Cloudflare Access

    Wed, January 17, 2018 

    Cloudflare Access offers secure application access without a VPN. Users can secure, authenticate, and monitor user access to any domain, application, or path on Cloudflare.

  • feature2018 Q1

    Load Balancing Event Logs

    Tue, January 16, 2018 

    Load Balancing event logs allow for the review and filtering of status changes of your Load Balancing Origins and Pools.

  • feature2017 Q4

    Support for Cache-Control Header Extensions

    Thu, December 14, 2017 

    Cloudflare now supports additional HTTP cache-control directives. These headers allow more control over content caching behavior and enable our cache to handle more complex instructions for handling online assets.  

  • feature2017 Q4

    CAA Record Support

    Tue, December 5, 2017 

    Cloudflare now supports Certification Authority Authorization (CAA). CAA records allow domain owners to specify which CAs are authorized to issue certificates for their domain (or subdomain, as CAAs can be defined at any level of the hierarchy).

  • feature2017 Q4

    Cloudflare's New Server Response Header

    Mon, November 27, 2017 

    Cloudflare's Nginx response header will change from 'cloudflare-nginx' to 'cloudflare'. This migration will begin on 11/29 and will take 1-2 months for all customers.

  • feature2017 Q4

    Audit Logs

    Fri, November 17, 2017 

    Cloudflare's newly released Audit Logs offer the ability to view and download the most recent changes made to domains or account settings. It is provided in both the dashboard and via API.

  • feature2017 Q4

    Cloudflare Supports Privacy Pass

    Thu, November 9, 2017 

    When people use anonymity services or shared IPs, it makes it more difficult for website protection services like Cloudflare to identify their requests as coming from legitimate users and not bots. The Privacy Pass browser extension reduces the number of challenge pages presented by Cloudflare by letting users prove their identity across multiple sites anonymously. The Privacy Pass extension is available for both Chrome and Firefox.

  • feature2017 Q4

    Load Balancing Session Affinity

    Thu, October 5, 2017 

    Cloudflare Load Balancing now supports session affinity, using automatically generated cookies. If session affinity is enabled, the same target receives the request and can use the automated cookie to recover an existing session with the origin server.

  • feature2017 Q4

    Argo Analytics

    Tue, October 3, 2017 

    Customers with Argo Smart Routing enabled can now get an in-depth look at dynamic content performance statistics across both requests and geographies.

  • feature2017 Q3

    Geo Key Manager

    Tue, September 26, 2017 

    Geo Key Manager provides the ability to choose which Cloudflare data centers have access to private keys in order to establish HTTPS connections. Cloudflare has preconfigured options to select from either US or EU data centers as well as the highest security data centers in the Cloudflare network. Data centers without access to private keys can still terminate TLS, but they will experience a slight initial delay when contacting the nearest Cloudflare data center storing the private key.