Chicanes and tunnels
The race to securely connect remote users


Complex and fragmented IT environments require secure user access to servers and networks, and current solutions such as VPNs pose efficiency and security challenges.
Admin By Request, a global endpoint security platform, has built its remote access product around Cloudflare’s tunneling software, protecting clients’ web properties and users from attacks through our global network.
In this trackside chat, Zero Trust Product Manager, Abe Carryl and COO of Admin By Request, Jacob Buus, will zoom into the journey with Cloudflare, the implementation, and the results so far for their clients.
Plus, a special guest will be joining us live, Formula One driver Kevin Magnussen - expect a thrilling Q&A.
Watch now
Provided by Cloudflare
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Security experts issue warning over the rise of 'gray bot' AI web scrapers
News While not malicious, the bots can overwhelm web applications in a way similar to bad actors
By Jane McCallion Published
-
Does speech recognition have a future in business tech?
Once a simple tool for dictation, speech recognition is being revolutionized by AI to improve customer experiences and drive inclusivity in the workforce
By Jonathan Weinberg Published
-
Developer security best practices in a fast growing tech company
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
-
Zero to hero: A blueprint for establishing a security champions program
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
-
DevSecOps is dead...or is it?:
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
-
Password management startup Passbolt secures $8 million to shake up credential security
News Password management startup Passbolt has secured $8 million in funding as part of a Series A investment round.
By Ross Kelly Published
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott Published
-
The state of cybersecurity in Europe
Cyber professionals across Europe reveal which industries have been worst hit by an increasingly hostile threat landscape and what they are doing to stay protected
By ITPro Published
-
The state of cybersecurity in the Middle East
Cloudflare’s annual deep dive into the forces shaping the cyber landscape in the Middle East reveals the sectors and vectors that threat actors are focusing on
By ITPro Published
-
The Gorilla Guide to... How HPE ProLiant Gen11 servers deliver trusted security
Whitepaper How systems, software, and connections are protected
By ITPro Published