Intelligent CIO Middle East Issue 83 | Page 84

t cht lk

t cht lk

Mohit Bijlani , Head of UK / IRE , Cloudflare . based vendors who are essentially replicating the same functionality but , in a software-defined and SAS consumable mode , still points solution vendors .
Cloudflare ’ s approach is different in two ways , one being that we have one of the largest networks in the world to deliver security , with the content and resources being accessed by the users . This network spans 275 cities in over 100 countries , putting us within 50 milliseconds of 95 % of the world ’ s Internetconnected population . So , for context , the blink of an eye is 300 – 400 milliseconds , it is quite fast and wide , enabling us to serve millions of customers and mitigate over 124 billion cyberthreats a day .
We have more insight into attack vectors but due to our network ’ s sheer volume and wide reach , we learn from these attack vectors using our artificial engines and Machine Learning engines to make real-time updates to our services . This puts us in a much better position than our peers to protect our customers versus zeroday vulnerabilities . Following that , our vast network reach ensures no latency in terms of security solutions .
Many have used VPN to log into services and we haven ’ t spoken to a single customer that enjoyed using VPN and the same applies to our software-defined security peers as they don ’ t have the wide network reach that Cloudflare has . When you ’ re trying to access applications with limited networks , you still have tremendous latency , which can translate into numerous business problems impacting revenue-generating activities .
Cloudflare has deliberately taken an approach to build out our Zero Trust solution as a single control plane . This helps reduce risk and complexity , reducing the total cost of ownership for our customers . In addition , this helps them get on board with our services quickly and realise faster time to value , further reducing the risk of having inconsistent security postures across multiple control planes . That ’ s a key advantage for our customers , especially because Zero Trust network access is the first step towards a broader transformation of the security and network edge perimeter , which can include other security controls .
What are the biggest risks it helps mitigate ?
Data breaches are by far the most prominent risk . Numerous independent studies out there assess the annual likelihood of a data breach for a large organisation to be in the 26 – 28 % range , with the cost per data breach being three to five million dollars . We also know according to Deloitte that 91 % of all attacks still begin with a phishing email . The price and risk
84 INTELLIGENTCIO MIDDLE EAST www . intelligentcio . com