CDW Cloudflare Zero Trust Network Access (ZTNA)
"
Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.
Features
- ZTNA with integrated DNS Filtering and Browser Isolation options
- Ability to integrate with any identity provider
- Ability to work with a client or client less
- Augment or replace your traditional VPN
- Zero Trust platform is 100% integrated with other Cloudflare services
- Fastest Internet access with global Anycast network. 100% uptime SLA
- Cloud delivered and independently certified solution (FIPS/ISO etc)
- EU/UK localised data storage with GDPR compliance
- Supports any end point and connectors for any application
- Certified to PCI, SOC, ISO Ofcom complaint standards
Benefits
- Connect any user to any application without exposing your network
- Browser isolation to isolate end users from the web
- Gateway based agentless option for any user or any application
- Block phishing and malware before they strike
- Compliant with NIST Zero Trust principles of least privilege
- Protect any application and enforce device aware policies
- Replaces a user’s VPN providing a much better user experience
- Stop phishing, Business Email Compromise (BEC), email supply chain attacks
- Fastest performance, all services <50ms from 95% of Internet users
- Anycast network across 250+ locations with 100% SLA uptime
Pricing
£28.17 a user a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 1 3 3 4 2 2 1 1 3 8 8 1 0 7
Contact
CDW Limited
Andy Wood
Telephone: 0161 837 7744
Email: tenders@uk.cdw.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- The service provides secure access to any on premise or cloud hosted customer application
- Cloud deployment model
- Private cloud
- Service constraints
- N/A
- System requirements
- Fully cloud based solution requires Internet connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Phone, chat, and email support with median response time of 15 minutes. For critical business issues, Enterprise customers have access to our 24/7/365 emergency phone support hotline
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Cloudflare provides the delivery of the content ensuring speed, reliability, and security. The WCAG 2.0 standards would not apply as the proposed solution is not providing the content but delivering and securing it.
- Web chat accessibility testing
- N/A
- Onsite support
- No
- Support levels
- Cloudflare provides the delivery of the content ensuring speed, reliability, and security. The WCAG 2.0 standards would not apply as the proposed solution is not providing the content but delivering and securing it.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Cloudflare assists enterprise customers start using our service in a consultative manner using various methods, including remote and on-site and written documentation.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- The Cloudflare User Interface includes data aggregation logs, which include audit logs (log of every action taken within the interface and change to an account setting), as well as HTTP request logs. Data can be extracted via API in aggregate, or individual requests can be downloaded from the UI directly. Upon ending a contract, Cloudflare will advise customers on capturing all these data prior to account termination.
- End-of-contract process
- Cloudflare supports customers through the end of their contract and does not charge for reasonable off-boarding services. If a customer requires an extension of service during the off-boarding process, this may be subject to the same terms as the original contract, but will be determined through joint agreement between Cloudflare and the customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- API integration into the customer's email system, administered via the web based management console
- Accessibility standards
- None or don’t know
- Description of accessibility
- N/A
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- The Cloudflare API exposes the entire Cloudflare functionality via a programmatic interface. You can manage your account settings, configure products, and develop applications using the Cloudflare API.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The solution is designed to replace VPNs and shield applications from attack therefore the customisation options are very deep and range around setting policies for secure access to systems.
Scaling
- Independence of resources
-
Cloud Email Security is provided by Cloudflare's Anycast architecture and software-based security implementation to ensure high reliability and scalability across our 270+ data centres, facilitating up to a 142 TB/sec throughput.
All of our services run on all of our servers, in every data centre, paired with a 100% Anycast architecture. Anycast network routing is able to route incoming connection requests across multiple data centres
Analytics
- Service usage metrics
- Yes
- Metrics types
- Service data is provided through a Status page (public and available within the portal and through API) as well as visibility into the delivery queues (via portal).
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Cloudflare
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via reports or SIEM investigations
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- Other
- Other data import formats
- Not applicable as service monitors emails being sent
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 100% uptime guarantee
- Approach to resilience
-
Cloudflare's network is based on Anycast routing, any one of thousands of servers in 270+ locations around the world is able to provide all of our service functionality on a given IP address. The network is the most interconnected network in the world - present in more Internet Exchanges globally than any other. The network is designed to cope with many nodes on the network map becoming unavailable and still providing service.
Data centres are regularly taken offline for among other reasons maintenance without any service degradation. Should a certain location become unavailable due to high load from an attack, we will proactively re-route our prioritised Enterprise service level customers to ensure the minimal impact is seen for your application users in that region.
Within each datacenter, no single server/node is responsible for any service. These are also distributed across all metals such that server failures, hardware or networking issues won't impact the service/performance of our customers. - Outage reporting
- Public dashboard, email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- User name and password with 2-factor authentication/Single Sign On via standards based strong authentication methods i.e. using a customer's choice of federated identity if available
- Access restrictions in management interfaces and support channels
-
Cloudflare provisions access based on the principles of least privilege and need to know. Additional access must be requested via our internal ticketing system and it requires both a legitimate business reason and manager approval. Logging and Monitoring Policy requires logging of activities in critical systems. We perform quarterly access reviews for privileged access
Cloudflare's 24/7 Detection and Response team monitors logs/alerts for malicious activity on both servers and endpoints. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
- User name and password with 2-factor authentication/Single Sign On. A Customer's administrator must log in using username, password and two factor authentication code.
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Schellman & Company, LLC
- ISO/IEC 27001 accreditation date
- 16/03/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- PSC (Part of the NCC Group)
- PCI DSS accreditation date
- March 18, 2024
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 27701:2019
- ISO 27018
- SOC 2 Type II
- PCI DSS 3.2.1
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Cloudflare has the following certifications/external accredited audits for compliance with these standards:
ISO 27001:2013
ISO 27701:2019
ISO 27018
SOC 2 Type II
PCI DSS 3.2.1
Cloudflare has a security team made up of approx.70 individuals. Our security team is headed by the Chief Security Officer and contains: Governance Risk and Compliance, Program Management Organisation, Product Security (App Sec), Engineering (Edge), Incident Response/Threat Intel, and Physical Security. Each of those directs has team members that report directly to them.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Changes to server configurations are tracked via Cloudflare's ticketing system. These changes are peer reviewed and receive additional review by a member of the Site Reliability Engineering team. Major changes require rollback procedures and are vetted for potential impact to products and services.
Major releases undergo Security Architecture reviews.Cloudflare conducts static code scans of its code base. Cloudflare also scans its dependencies for vulnerabilities.
Enterprise risk assessments are conducted annually, and targeted risk assessments are conducted throughout the year. Risks also include vulnerabilities and deficiencies that are observed by other teams. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Cloudflare's Vulnerability Management Policy is aligned with PCI-DSS, ISO27001, and SOC 2. Cloudflare subscribes to intelligence feeds and leverages open source vulnerability databases such as the NVD. Cloudflare has a Bug Bounty program in place which leverages a community of security researchers to uncover vulnerabilities that may have been missed by our penetration test.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- A 24/7 Detection and Response team monitors logs/alerts for malicious activity on both servers and endpoints.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Users can report incidents via the Cloudflare dashboard or Enterprise phone line. Cloudflare also monitors other channels, such as social media, to ensure that we are aware of any potential issue in the provision of service. Pre-defined processes exist for incident management, including common events. Incidents are subject to Cloudflare's Security Incident Response Policy, which includes requirements for root cause analysis and full reporting.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Transparency is one of Cloudflare's core values. It's how we work to build trust with our customers in everything we do, and that includes our sustainability efforts. Our goal is simple: help build a better, greener Internet with no carbon emissions that is powered by renewable energy.
To help us get there, Cloudflare is making two announcements. The first is that we're committed to powering our network with 100% renewable energy. This builds on work we started back in 2018, and we think is clearly the right thing to do. We also believe it will ultimately lead to more efficient, more sustainable, and potentially cheaper products for our customers.
The second is that by 2025 Cloudflare aims to remove all greenhouse gases emitted as the result of powering our network since our launch in 2010. As we continue to improve the way we track and mitigate our carbon footprint, we want to help the Internet begin with a fresh start.
As part of our effort to track and mitigate our emissions, we publish an annual carbon emissions inventory report. The report provides detail on exactly how we calculate our carbon emissions as well as our renewable energy purchases. Cloudflare has also committed to setting near-term companywide emissions reduction targets in line with climate science with the SBTi.
Pricing
- Price
- £28.17 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Entities who are evaluating Cloudflare's Enterprise service may conduct a Proof of Concept supported by Cloudflare. Sign up for a proof of value by contacting Cloudflare.