Watch short instructional videos for a high-level overview of Cloudflare’s cloud infrastructure for security and performance.
- Overview
- The cloud: a remotely accessible network of servers
- The hybrid cloud: mixed public and private or on-premise infrastructure
- Caching: content delivery close to your users
- Bots: automated indexing and scraping
- Botnets: malware-infected network of devices
- WAF: monitor and block unwanted HTTP traffic
Overview
Cloudflare secures your website and ensures that it loads quickly, no matter where your end-users are.
The following instructional videos explain the foundational concepts of cloud environments, content caching, and security threat mitigation.
The cloud: a remotely accessible network of servers
The cloud is a network of servers and the software and databases that run on those servers. The cloud allows you to remotely access a shared pool of services or resources.
This video explains how the cloud works and how it allows remote access to files and applications.
Length: 0:47
The hybrid cloud: mixed public and private or on-premise infrastructure
A hybrid cloud is a cloud deployment model that combines a public cloud with a private cloud or on-premise IT infrastructure. This model allows for data and applications to move between cloud environments securely at scale.
This video explains how combining cloud environments can increase efficiency and functionality.
Length: 0:42
Caching: content delivery close to your users
Caching is the process of storing copies of files in a temporary location for quick and easy retrieval.
This video explains caching within the context of a content delivery network.
Length: 0:54
Bots: automated indexing and scraping
Bots are software applications programmed to automatically perform a wide range of useful or harmful tasks.
This video highlights some of those tasks, including indexing content for search engines and scraping content.
Length: 0:57
Botnets: malware-infected network of devices
A botnet is a malware-infected network of devices under control of an attacker. Each infected computer is called a bot and is used to engineer DDoS attacks, steal data, and send spam.
This video describes botnets and what methods of protection are most effective against them.
Length: 0:55
WAF: monitor and block unwanted HTTP traffic
A web application firewall (WAF) is a security system that defends web applications from cyber attacks by monitoring and filtering out unwanted HTTP traffic using a ruleset.
This video explains how WAFs work and highlights some attacks it protects against.
Length: 0:50