{"id":6167,"date":"2025-08-11T09:00:00","date_gmt":"2025-08-11T07:00:00","guid":{"rendered":"https:\/\/www.infinigate.com\/be\/?post_type=news&#038;p=6167"},"modified":"2025-08-29T14:12:50","modified_gmt":"2025-08-29T12:12:50","slug":"cloudflare-solving-the-perimeter-problem","status":"publish","type":"news","link":"https:\/\/www.infinigate.com\/be\/news\/cloudflare-solving-the-perimeter-problem\/","title":{"rendered":"Cloudflare &#8211; Solving the perimeter problem"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized is-style-no-rounded-corners-no-drop-shadow\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"149\" src=\"https:\/\/www.infinigate.com\/be\/wp-content\/uploads\/sites\/22\/2025\/08\/CF_logo_horizontal_blktype-1024x149.png\" alt=\"Cloudflare offers solutions built on Zero Trust, a security model that assumes no implicit trust, and SASE (Secure Access Service Edge), a cloud-based security architecture that converges networking and security functions. Cloudflare's SASE platform, Cloudflare One, integrates Zero Trust principles to provide identity-based security controls and network services to users and applications regardless of their location.\" class=\"wp-image-6168\" style=\"width:389px;height:auto\" srcset=\"https:\/\/www.infinigate.com\/be\/wp-content\/uploads\/sites\/22\/2025\/08\/CF_logo_horizontal_blktype-1024x149.png 1024w, https:\/\/www.infinigate.com\/be\/wp-content\/uploads\/sites\/22\/2025\/08\/CF_logo_horizontal_blktype-300x44.png 300w, https:\/\/www.infinigate.com\/be\/wp-content\/uploads\/sites\/22\/2025\/08\/CF_logo_horizontal_blktype-768x112.png 768w, https:\/\/www.infinigate.com\/be\/wp-content\/uploads\/sites\/22\/2025\/08\/CF_logo_horizontal_blktype-1536x224.png 1536w, https:\/\/www.infinigate.com\/be\/wp-content\/uploads\/sites\/22\/2025\/08\/CF_logo_horizontal_blktype.png 1955w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Replacing legacy technologies is never as simple as buying new solutions. Whether your goal is to modernize applications, improve cyber resilience, or implement Zero Trust security, you need a comprehensive strategy. This strategy should cover everything from technical integration to change management.<\/p>\n\n\n\n<p>Most technology leaders recognize that Zero Trust security offers the best alternative to the legacy approach of protecting an enterprise. The identity-centric, continuous verification of Zero Trust security enables organizations to protect resources regardless of user location or device. By transitioning to a Zero Trust model, organizations can address the essential limitations of perimeter security.<\/p>\n\n\n\n<p>It was interesting to see, and confirmed by Gartner&#8217;s Technology Adoption Roadmap for Midsize Enterprises (MSEs), that SASE (Secure Access Service Edge) and Zero Trust are now on the roadmap. These are recommended technology investments to enhance security, agility, and resilience in the face of evolving IT landscapes.<\/p>\n\n\n\n<p>The roadmap assists MSE CIOs and their teams by offering insights into deployment plans, adoption timelines, and the value and risks associated with various technologies, including SASE components that align with Zero Trust principles.<\/p>\n\n\n\n<p>In other words, SASE is no longer just for enterprise adoption but is also being adopted by midsize organizations (MSEs) in the Benelux region.<\/p>\n\n\n\n<p>Cloudflare offers solutions built on Zero Trust, a security model that assumes no implicit trust, and SASE (Secure Access Service Edge), a cloud-based security architecture that converges networking and security functions. Cloudflare&#8217;s SASE platform, Cloudflare One, integrates Zero Trust principles to provide identity-based security controls and network services to users and applications regardless of their location.<\/p>\n\n\n\n<p>Together with their partner ecosystem, Cloudflare helps Enterprises and MSEs make informed technology investment decisions by providing insights into operational impact, cost, security, and resilience. They help identify appropriate use cases, analyze constraints, and determine trigger points for Proof of Concepts, ensuring a successful Zero Trust journey.<\/p>\n\n\n    <section class=\"links wp-block animate alignwide\">\r\n        <div class=\"links__inner\">\r\n                                <h2 class=\"links__heading has--heading-border\"><p>Want to know more?<\/p>\n<\/h2>\r\n            \r\n            \r\n            <div class=\"links__items\">\r\n                                                            <div class=\"links__item\">\r\n                                <a rel=\"noopener\" href=\"https:\/\/www.cloudflare.com\/the-net\/security-signals\/zero-trust-perimeter\/?utm_medium=organic-social&#038;utm_source=linkedin&#038;utm_campaign=2025-q2-bnd-gbl-umbrella-ge-ge-general-linewsletter\" target=\"_blank\">\r\n                Check out the full article            <\/a>\r\n                        <\/div>\r\n                                                                                <div class=\"links__item\">\r\n                                <a rel=\"noopener\" href=\"https:\/\/cf-assets.www.cloudflare.com\/slt3lc6tev37\/5ZpKYUIZJnZezJgWVdevwi\/ca995883d72fa871f8588e5b53aacb88\/White-Paper-Zero-Trust-Roadmap-v2.pdf\" target=\"_blank\">\r\n                Check out the whitepaper            <\/a>\r\n                        <\/div>\r\n                                                <\/div>\r\n        <\/div>\r\n    <\/section>\r\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloudflare offers solutions built on Zero Trust, a security model that assumes no implicit trust, and SASE (Secure Access Service Edge), a cloud-based security architecture that converges networking and security functions. Cloudflare&#8217;s SASE platform, Cloudflare One, integrates Zero Trust principles to provide identity-based security controls and network services to users and applications regardless of their location.<\/p>\n","protected":false},"author":57,"featured_media":6223,"template":"","meta":{"_acf_changed":false,"footnotes":""},"technologies":[35],"news-type":[19],"class_list":["post-6167","news","type-news","status-publish","has-post-thumbnail","hentry","technologies-secure-networks","news-type-vendor-news"],"acf":[],"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Infinigate | Belgium","distributor_original_site_url":"https:\/\/www.infinigate.com\/be","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/news\/6167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/users\/57"}],"version-history":[{"count":0,"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/news\/6167\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/media\/6223"}],"wp:attachment":[{"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/media?parent=6167"}],"wp:term":[{"taxonomy":"technologies","embeddable":true,"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/technologies?post=6167"},{"taxonomy":"news-type","embeddable":true,"href":"https:\/\/www.infinigate.com\/be\/wp-json\/wp\/v2\/news-type?post=6167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}