The rapid evolution of Internet services in the past few years has pushed Content Delivery Networks (CDNs) to evolve beyond simply serving out content (e.g., files, video) by adding application services. Cloudflare hosts tens of thousands of applications that span a multitude of market segments on its global CDN infrastructure. That global reach of applications has also made Cloudflare, like other CDN vendor hosting apps, a target for a wide range of automated attacks.
Different types of automated bot attacks are impacting digital transactions sites. A recent automated attack on ticketmaster.com (Taylor Swift concert ticket sales fiasco) has seriously impacted Ticketmaster’s reputation and led to the U.S. Congress interrogating Ticketmaster executives. No organization wants its executives to be confronted by government officials and having to answer tough questions.
Organizations are now able to better protect their applications within the Cloudflare CDN infrastructure from automated bot attacks with the new, easy-to-deploy F5 Distributed Cloud connector to the Cloudflare CDN. This connector enables organizations to use F5 Distributed Cloud (XC) Bot Defense to protect applications on the Cloudflare CDN from a wide range of attacks, such as credential stuffing, account takeover (ATO), inventory hoarding, scraping, and gift card cracking.
Distributed Cloud Bot Defense was named best in class recently by industry analyst group Aite-Novarica. What makes Distributed Cloud Bot Defense unique is its approach to guarding against bots with detection capabilities for a wide range of attacks without relying on user friction-generating tools such as CAPTCHA. Distributed Cloud Bot Defense was also commended for its recognition and handling of good bots as well. Distributed Cloud Bot Defense ensures near zero false positives by combining machine learning with human domain experience to drive strong efficacy.
To find out more about how Distributed Cloud Bot Defense can protect your business operations on Cloudflare from sophisticated bot attacks, follow these links:
- Solution Details: F5 and Cloudflare CDN
- From Bots to Boardroom: How Bad Bots Negatively Impact Your Balance Sheet
- Attacker Economics: Understanding the Economics Behind Cyberattacks
- Solution Guide: Protect Your Cloudflare CDN Deployment with F5 Distributed Cloud Bot Defense
- Solution Overview: F5 Distributed Cloud Bot Defense
- How to Quickly Protect Your Cloudflare CDN with F5 Distributed Cloud Bot Defense
Contact us today to get the Cloudflare connector and start your PoC!
About the Author
Related Blog Posts

Accelerate Kubernetes and AI workloads with F5 BIG-IP and AWS EKS
The F5 BIG-IP Next for Kubernetes software will soon be available in AWS Marketplace to accelerate managed Kubernetes performance on AWS EKS.

The everywhere attack surface: EDR in the network is no longer optional
All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.
F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.
F5 Silverline Mitigates Record-Breaking DDoS Attacks
Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.
Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.