CDW Cloudflare Network as a Service (NaaS)
Cloudflare Magic products deliver networking and firewall services to help organisations connect, secure, and accelerate their corporate networks without the cost and complexity of managing legacy network hardware. With Anycast network traffic is processed at the data centre closest to its source, with no backhauling/performance tradeoffs. Built-in streamlined security.
Features
- Magic WAN provides global connectivity, cloud-based security, performance, single-console control.
- Magic Firewall-as-a-Service (FWaaS) cloud-native network firewall for your enterprise WAN
- Magic Transit L3 DDoS protection, traffic acceleration and more
- Argo Smart Routing detects real-time congestion and re-routes web traffic
- Network Interconnect connects your network infrastructure directly to Cloudflare's network
- Spectrum extends Cloudflare benefits to all TCP/UDP applications
- Real time traffic acceleration, IP Firewall, DDoS mitigation, real-time analytics
- Data Localisation Suite complying with regional data privacy requirement
- Privacy and data protection
Benefits
- Reduce costly legacy WAN architectures with Cloudflare’s global Anycast network
- Replace MPLS between branch offices & data centres
- Secure remote employee access to private networks without VPNs
- Rapid adoption with existing network infrastructure. No rip-and-replace required
- Enforce consistent network security policies across from a common dashboard
- No multiple firewall appliances to manage or appliance upgrade downtime
- Protects entire IP subnets from DDoS attacks. Ultra-low Time-to-Mitigate (TTM)
- Route web traffic across the fastest most reliable network paths
- Network Interconnect provides faster performance, better security at lower costs
Pricing
£56.56 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 9 9 9 1 1 0 1 6 5 9 1 7 3 5
Contact
CDW Limited
Andy Wood
Telephone: 0161 837 7744
Email: tenders@uk.cdw.com
Service scope
- Service constraints
- N/A
- System requirements
-
- Our solution is a cloud-based SaaS service
- Supported OS/systems: Linux (amd64 / x86-64, x86 (32-bit),ARMv6, ARM64)
- Supported OS/systems: macOS, Windows (32-bit, 64-bit), Docke
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Phone, chat, and email support with median response time of 15 minutes. For critical business issues, Enterprise customers have access to our 24/7/365 emergency phone support hotline
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Cloudflare provides the delivery of the content ensuring speed, reliability, and security. The WCAG 2.0 standards would not apply as the proposed solution is not providing the content but delivering and securing it.
- Web chat accessibility testing
- N/A
- Onsite support
- No
- Support levels
- Enterprise customers can choose between Enterprise support and Premium Support. Premium Enterprise support includes increased SLA response times and prioritised ticket handling. Enterprise is included as a part of the standard Enterprise contract. Premium Support pricing is bespoke. Premium customers receive a dedicated Customer Success Manager and Customer Solutions Engineer.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Cloudflare assists enterprise customers start using our service in a consultative manner using various methods, including remote and on-site and written documentation.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- The Cloudflare User Interface includes data aggregation logs, which include audit logs (log of every action taken within the interface and change to an account setting), as well as HTTP request logs. Data can be extracted via API in aggregate, or individual requests can be downloaded from the UI directly. Upon ending a contract, Cloudflare will advise customers on capturing all these data prior to account termination.
- End-of-contract process
- Cloudflare supports customers through the end of their contract and does not charge for reasonable off-boarding services. If a customer requires an extension of service during the off-boarding process, this may be subject to the same terms as the original contract, but will be determined through joint agreement between Cloudflare and the customer.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Users can manage all aspects of onboarding and configuration of their internet properties via the Cloudflare dashboard.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Our web interface is visually accessible in all areas. Our text to background contrast ratios are high and we don't rely exclusively on colour to relay information anywhere. As our web app is almost 10 years old we have varying states of keyboard and screenreader accessibility across different sections. As of late all new components in our shared pattern library are built to be fully keyboard accessible. We have high coverage on using semantically appropriate markup in forms and utilising buttons instead of text links for interactable elements.
- Web interface accessibility testing
- We do conduct external and internal user-testing sessions where some portion of our test subjects opt to use assistive technologies, largely keyboard based users. We test in house as a part of our component development QA process for keyboard accessibility to ensure any job to be done defined in our product specs can be accomplished without the aid of a mouse.
- API
- Yes
- What users can and can't do using the API
- The Cloudflare API exposes the entire Cloudflare functionality via a programmatic interface. You can manage your account settings, configure products, and develop applications using the Cloudflare API.
- API automation tools
- Terraform
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- Cloudflare offers CLI via a Cloudflare Open Source GO repository named "flarectl" (https://github.com/cloudflare/cloudflare-go/tree/master/cmd/flarectl) services can be provisioned, modified and deleted by using this as per the examples within the ReadMe. Cloudflare also offers a Terraform integration that can be found here: https://www.terraform.io/docs/providers/cloudflare/index.html
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Cloudflare's Anycast architecture and software-based security implementation ensure high reliability and scalability across our 270+ data centres, facilitating up to a 142 TB/sec throughput. All of our services run on all of our servers, in every data centre, paired with a 100% Anycast architecture. Anycast network routing is able to route incoming connection requests across multiple data centres
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- HTTP request and response status
- Network
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Cloudflare
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Hardware containing data is completely destroyed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- Cloudflare conducts daily backups to maintain its service to customers
- Backup controls
- N/A - Cloudflare conducts backups to ensure restoration of customer accounts in the event of a complete data loss or disaster scenario within its primary data center. Cloudflare only has limited customer data and does not host its customers' websites, therefore customers do not control what is backed up or recovered.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 100% uptime guarantee
- Approach to resilience
- Cloudflare's network is based on Anycast routing, any one of thousands of servers in 270+ locations around the world is able to provide all of our service functionality on a given IP address. The network is the most interconnected network in the world - present in more Internet Exchanges globally than any other. The network is designed to cope with many nodes on the network map becoming unavailable and still providing service. Data centres are regularly taken offline for among other reasons maintenance without any service degradation. Should a certain location become unavailable due to high load from an attack, we will proactively re-route our prioritised Enterprise service level customers to ensure the minimal impact is seen for your application users in that region. Within each data centre, no single server/node is responsible for any service. These are also distributed across all metals such that server failures, hardware or networking issues won't impact the service/performance of our customers.
- Outage reporting
- Public dashboard, email alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Cloudflare provides customer support through Zendesk, to which only the Cloudflare Support Team has access. Access to production is limited by role to the Systems Reliability Engineering team.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
-
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Schellman & Company, LLC
- ISO/IEC 27001 accreditation date
- 16/03/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- PSC (Part of the NCC Group)
- PCI DSS accreditation date
- March 18, 2024
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 27701:2019
- ISO 27018
- SOC 2 Type 11
- PCI DSS 4.0
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Cloudflare has the following certifications/external accredited audits for compliance with these standards: ISO 27001:2013 ISO 27701:2019 ISO 27018 SOC 2 Type II PCI DSS 4.0 More information on individual policies or processes can be made available upon request.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Changes to server configurations are tracked via Cloudflare's ticketing system. These changes are peer reviewed and receive additional review by a member of the Site Reliability Engineering team. Major changes require rollback procedures and are vetted for potential impact to products and services. Major releases undergo Security Architecture reviews.Cloudflare conducts static code scans of its code base. Cloudflare also scans its dependencies for vulnerabilities. Enterprise risk assessments are conducted annually, and targeted risk assessments are conducted throughout the year. Risks also include vulnerabilities and deficiencies that are observed by other teams.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Cloudflare's Vulnerability Management Policy is aligned with PCI-DSS, ISO27001, and SOC 2. Cloudflare subscribes to intelligence feeds and leverages open source vulnerability databases such as the NVD. Cloudflare has a Bug Bounty program in place which leverages a community of security researchers to uncover vulnerabilities that may have been missed by our penetration test.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- A 24/7 Detection and Response team monitors logs/alerts for malicious activity on both servers and endpoints.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Users can report incidents via the Cloudflare dashboard or Enterprise phone line. Cloudflare also monitors other channels, such as social media, to ensure that we are aware of any potential issue in the provision of service. Pre-defined processes exist for incident management, including common events. Incidents are subject to Cloudflare's Security Incident Response Policy, which includes requirements for root cause analysis and full reporting.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Cloudflare has a main principle of adhering to the laws of any land within which it operates. It is no surprise that she expects the same exact approach from all vendors/suppliers.
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Transparency is one of Cloudflare's core values. It's how we work to build trust with our customers in everything we do, and that includes our sustainability efforts. Our goal is simple: help build a better, greener Internet with no carbon emissions that is powered by renewable energy.
To help us get there, Cloudflare is making two announcements. The first is that we're committed to powering our network with 100% renewable energy. This builds on work we started back in 2018, and we think is clearly the right thing to do. We also believe it will ultimately lead to more efficient, more sustainable, and potentially cheaper products for our customers.
The second is that by 2025 Cloudflare aims to remove all greenhouse gases emitted as the result of powering our network since our launch in 2010. As we continue to improve the way we track and mitigate our carbon footprint, we want to help the Internet begin with a fresh start.
As part of our effort to track and mitigate our emissions, we publish an annual carbon emissions inventory report. The report provides detail on exactly how we calculate our carbon emissions as well as our renewable energy purchases. Cloudflare has also committed to setting near-term companywide emissions reduction targets in line with climate science with the SBTi.
Pricing
- Price
- £56.56 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Yes, Entities who are evaluating Cloudflare's Enterprise service may conduct a Proof of Concept supported by Cloudflare, or sign up for a Free Account to trial our service.
- Link to free trial
- https://www.cloudflare.com/plans/