Chicanes and tunnels: The race to securely connect remote users
Performant and reliable access across the globe


Complex and fragmented IT environments require secure user access to servers and networks, and current solutions such as VPNs pose efficiency and security challenges.
Admin By Request, a global endpoint security platform, has built its remote access product around Cloudflare’s tunneling software, protecting clients’ web properties and users from attacks through our global network.
In this trackside chat, Zero Trust Product Manager, Abe Carryl and COO of Admin By Request, Jacob Buus, will zoom into the journey with Cloudflare, the implementation, and the results so far for their clients.
Plus, a special guest will be joining us live, Formula One driver Kevin Magnussen - expect a thrilling Q&A.
Watch now
Provided by Cloudflare
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
‘Insiders don’t need to break in’: A developer crippled company networks with malicious code and a ‘kill switch’ after being sacked – and experts warn it shows the huge danger of insider threats
News Security experts have warned ITPro over the risks of insider threats from disgruntled workers after a software developer deployed a 'kill switch' to sabotage his former employer’s networks.
By Ross Kelly Published
-
Developer security best practices in a fast growing tech company
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
-
Zero to hero: A blueprint for establishing a security champions program
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
-
DevSecOps is dead...or is it?:
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
-
Password management startup Passbolt secures $8 million to shake up credential security
News Password management startup Passbolt has secured $8 million in funding as part of a Series A investment round.
By Ross Kelly Published
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott Published
-
The state of cybersecurity in Europe
Cyber professionals across Europe reveal which industries have been worst hit by an increasingly hostile threat landscape and what they are doing to stay protected
By ITPro Published
-
The state of cybersecurity in the Middle East
Cloudflare’s annual deep dive into the forces shaping the cyber landscape in the Middle East reveals the sectors and vectors that threat actors are focusing on
By ITPro Published