Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

9/27/2018
11:38 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cloudflare Launches Domain Registrar

Secure domain registration announced.

Cloudflare, the leading Internet performance and security company, today announced early access of Cloudflare Registrar, the first registrar built around trust, security, and fair, wholesale pricing. Cloudflare has chosen today, its eighth birthday, to announce Registrar as a gift to the Internet.

A domain cannot be secured without a registrar. Registrars protect domains from being compromised—and their owners from the resulting consequences. A compromised domain means completely losing security functionality, control over website content, and the potential of redirecting web traffic to another IP address, ultimately damaging a brand’s reputation.

The marketplace for domain registration has been stagnant and manipulative. Registrars lure customers in with low registration fees and end up charging them extremely high renewal fees. They also trick users into purchasing services they do not need or charge fees for critical services that are otherwise offered for free, like SSL. Cloudflare’s Registrar does away with the misleading pricing model, offering a fairly-priced solution with no markup from wholesale pricing—initially and at every renewal—to all of Cloudflare’s customers.

“When we looked at the marketplace for domain registration, we were shocked at the deceitful pricing around a service that is really just a commodity,” said Matthew Prince, co-founder and CEO of Cloudflare. “We realized that the one thing every Cloudflare customer needs is a domain, so they needed a registrar they could trust. With Cloudflare Registrar, we’re promising to offer our customers the best security practices at the best possible price. Our goal is simply to create the first domain registrar you can love.”

The benefits of Cloudflare Registrar include:

  • Fair Pricing: At-cost pricing eliminates any surprise charges associated with inflated renewal costs or hidden add-on fees with other registrars. Cloudflare simply charges the wholesale price of the registry, the lowest price available today.
  • Transparency: Notifies the entire authorized team should any changes be applied.
  • Security-First Practices: Built-in two-factor authentication, automatic domain lock, WHOIS privacy protection, and security best-practices like automatic DNSSEC—all at no extra cost.

registrar pricing

In addition to Cloudflare Registrar, the company has an enterprise-level domain registration service called Cloudflare Custom Domain Protection, which launched in February of 2016.

To learn more about Cloudflare Registrar, please check out the resources below. Existing Cloudflare customers can sign up for early access here.

About Cloudflare
Cloudflare, Inc. (www.cloudflare.com / @cloudflare) is on a mission to help build a better Internet. Today the company runs one of the world’s largest networks that powers more than 10 trillion requests per month, which is nearly 10 percent of all Internet requests. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with each new site added. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the world's 50 most innovative companies by Fast Company. Headquartered in San Francisco, CA, Cloudflare has offices in Austin, TX, Champaign, IL, New York, NY, Washington, DC, London, and Singapore.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30477
PUBLISHED: 2021-04-15
An issue was discovered in Zulip Server before 3.4. A bug in the implementation of replies to messages sent by outgoing webhooks to private streams meant that an outgoing webhook bot could be used to send messages to private streams that the user was not intended to be able to send messages to.
CVE-2021-30478
PUBLISHED: 2021-04-15
An issue was discovered in Zulip Server before 3.4. A bug in the implementation of the can_forge_sender permission (previously is_api_super_user) resulted in users with this permission being able to send messages appearing as if sent by a system bot, including to other organizations hosted by the sa...
CVE-2021-30479
PUBLISHED: 2021-04-15
An issue was discovered in Zulip Server before 3.4. A bug in the implementation of the all_public_streams API feature resulted in guest users being able to receive message traffic to public streams that should have been only accessible to members of the organization.
CVE-2021-30487
PUBLISHED: 2021-04-15
In the topic moving API in Zulip Server 3.x before 3.4, organization administrators were able to move messages to streams in other organizations hosted by the same Zulip installation.
CVE-2020-36288
PUBLISHED: 2021-04-15
The issue navigation and search view in Jira Server and Data Center before version 8.5.12, from version 8.6.0 before version 8.13.4, and from version 8.14.0 before version 8.15.1 allows remote attackers to inject arbitrary HTML or JavaScript via a DOM Cross-Site Scripting (XSS) vulnerability caused ...