Magazine Button
Cloudflare Bot Management now on IBM Cloud Internet Services to address threat landscape for enterprises

Cloudflare Bot Management now on IBM Cloud Internet Services to address threat landscape for enterprises

CloudCybersecurityEnterprise SecurityTop Stories

Cloudflare – a security, performance and reliability company helping to build a better Internet – has announced that IBM Cloud Internet Services (CIS), powered by Cloudflare, has expanded its offering to include Cloudflare Bot Management, now available to help enterprises on the Enterprise Premier Plan address and combat the growing threat of malicious bot traffic.

Cloudflare and IBM Cloud have been working together since 2018, integrating Cloudflare application security and performance natively into IBM Cloud through IBM CIS, powered by Cloudflare. CIS positions customers to configure their web and Internet applications to be protected against cyberthreats including DDoS attacks and data theft, while enhancing performance and reliability with load balancing, optimised routing, caching and data exchange, as part of the CIS suite of capabilities.

Furthering the delivery of Cloudflare Bot Management comes as bad bots continue to consume resources and overwhelm organisations, accounting for at least a quarter of all Internet traffic, according to Forrester Research, a leading global research and advisory firm.

“Cloudflare and IBM Cloud Internet Services have been helping power the vast increase of Internet-facing business applications, and we’re seeing more and more bot activity across the landscape,” said Matt Harrell, Global Head of Channels and Alliances at Cloudflare. “Malicious bots are part of this equation, posing significant risks and causing inefficiencies in business, from fraudulent transactions to fake attempts to make purchases. These malicious activities can deprive legitimate customers from making purchases and affect a business’ bottom line, not to mention potential larger risks of data loss. This is a further effort to protect operations at this critical level.”

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive