Cloudflare is already a Terret customer

The infrastructure layer
powering Terret Nexus
at enterprise scale

Terret ingests 300K+ calls, runs continuous LLM inference, deploys agentic playbooks to 500+ reps in real time, and syncs state back to Salesforce — all while processing some of the most sensitive commercial intelligence your customers own. That's a serious infrastructure problem. This brief maps each layer of Terret's platform to the Cloudflare product that solves it.

312K+ Calls analyzed per quarter
500+ Reps receiving real-time briefs
30 min Pre-call brief delivery SLA
6,210+ Active deals in the graph

What Terret Nexus actually runs

Before mapping solutions, it's worth naming the infrastructure demands Terret's architecture creates. The Nexus platform isn't a simple SaaS app — it's a real-time data pipeline with continuous LLM inference and agentic execution at the edge of enterprise networks.

01

Continuous LLM Inference

Nexus runs LLM inference continuously — analyzing call transcripts, building playbooks, generating per-rep briefs, and answering natural language revenue questions against live deal data. At 312K+ calls per quarter with multiple inference passes per call, this is high-volume, latency-sensitive AI workload.

Multi-model routing Cost-per-token at scale Fallback on degradation Cache for repeated queries
02

Real-Time Agentic Execution

Terret doesn't just analyze — it deploys. Playbooks push to 542 reps across 3,140 active deals simultaneously. Briefs deliver via Slack 30 minutes before each call. CRM records update automatically. Sequence emails queue. This requires durable, stateful execution that can fan out to thousands of per-deal workflows without a dropped message.

Durable workflow execution Fan-out to 3,000+ deals Guaranteed message delivery Stateful per-deal agents
03

Enterprise-Grade Data Ingestion & Storage

The Revenue Graph ingests structured CRM data (Salesforce, HubSpot), unstructured call recordings, email threads, and product usage signals. Raw audio and transcripts from 312K+ calls represent significant object storage — with $0 egress being critical when those assets feed back into the LLM pipeline repeatedly.

Zero-egress object storage S3-compatible API Multi-terabyte call archive Serverless SQL queries
04

Security, Compliance & Zero Trust Access

Terret processes confidential sales intelligence — unreleased deal terms, competitive positioning, customer financials, rep performance data. Enterprise customers like Carta and Grafana Labs passed Terret through rigorous infosec reviews. The infrastructure needs to match: Zero Trust access to internal tooling, WAF protection for the API surface, and DDoS resilience for the real-time delivery layer.

Zero Trust internal access WAF + Bot Management DDoS protection API security
05

Application Security + Global Delivery

Terret has two distinct surface areas: an externally-facing SaaS app that processes enterprise deal intelligence (attack target) and a 30-minute brief delivery SLA to 500+ reps globally (performance requirement). These need separate but complementary infrastructure answers — WAF/Bot Management for the attack surface, CDN + Argo for the delivery SLA.

WAF + Bot Management API Shield 330+ city CDN Argo smart routing Unmetered DDoS Brief delivery <30ms

Terret requirement → Cloudflare product

Every infrastructure demand Terret's platform creates, mapped to the Cloudflare product that addresses it — with the specific mechanism of value for each.

Agentic Execution

Workers + Durable Objects + Workflows

docs ↗
High Priority

When Nexus deploys a playbook to 542 reps across 3,140 active deals, that's a fan-out of thousands of per-deal state machines that need to run reliably, update CRM records, queue Slack messages, and fire pre-call briefs on a precise schedule. This is exactly what Workers + Durable Objects were built for.

  • Durable Objects — one per active deal. Holds the current state of that deal's Nexus playbook, which rep actions are outstanding, and the next brief delivery time. Strongly consistent, co-located with the edge, zero external database calls for hot-path state.
  • Cloudflare Workflows — durable, retryable execution for the multi-step pipeline: ingest call → transcribe → analyze with LLM → extract patterns → update playbook → queue brief. If any step fails, Workflows retries from that step — no dropped calls, no lost analysis.
  • Workers — the edge compute that powers the Nexus API, handles CRM webhook ingestion from Salesforce/HubSpot, and serves real-time brief requests with sub-50ms response times.
Terret fit: The "answer-to-action" guarantee depends on reliable execution, not just good analysis. Workers + Durable Objects ensure that when Nexus flags "$2.1M at risk today," the downstream actions (CRM updates, Slack briefs, sequence queuing) actually complete — even under load, even if a downstream API is slow.

Data & Storage

R2 Object Storage + D1 Serverless SQL

docs ↗
High Priority

Terret's Revenue Graph is built on data — call recordings, transcripts, CRM snapshots, voice-of-customer quotes, and playbook artifacts. At 312K+ calls per quarter, the raw audio and transcript storage alone is multi-terabyte. Every time that data feeds back into an LLM pipeline, S3 egress charges compound.

  • R2 — $0 egress for call recordings, transcripts, and generated PDF assets (playbooks, briefs). When the LLM pipeline reads a call transcript to analyze it, that read is free. S3 at this volume generates meaningful egress bills that disappear entirely on R2.
  • D1 — serverless SQLite for the structured revenue graph: deals, rep performance metrics, pattern indexes, playbook state. Globally replicated, query directly from Workers with zero connection overhead — no RDS to manage, no VPC to configure.
Terret fit: The "self-learning loop" — every data point becoming new signal — only compounds value if re-reading that data doesn't compound cost. R2 makes the Revenue Graph as cheap to query repeatedly as it is to store initially.

Security

Zero Trust Access + Tunnel

docs ↗
High Priority

Terret's CTO (Amit) published research on Role-Based Access Control policy analysis and anomaly detection — he has a deep personal background in security. The platform holds confidential deal intelligence for Carta, Grafana Labs, and Cloudflare itself. The CRO at Carta explicitly called out infosec in his testimonial: "we put Terret through the paces on the infosec front, and they passed with flying colors."

  • Cloudflare Access — Zero Trust access to Terret's internal tooling, staging environments, and admin interfaces. No VPN required for the engineering team; every access request is authenticated and logged. Device posture checks ensure only managed machines can reach sensitive internal services.
  • Cloudflare Tunnel — secure outbound-only connections from Terret's infrastructure to Cloudflare's network. No inbound firewall rules to manage, no exposed public IPs on database or internal service hosts.
  • WAF + Bot Management — protection for app.boostup.ai's API surface against scraping, credential stuffing, and application-layer attacks. Especially relevant for the Nexus Q&A interface which is publicly reachable and processes revenue queries that could be probed.
Terret fit: Passing enterprise infosec reviews is part of Terret's sales motion — it's called out in customer testimonials. A Zero Trust posture powered by Cloudflare One gives the security team a credible, well-documented answer to "how do you control internal access to customer data."

Inference at Edge

Workers AI

docs ↗
Consider

For lower-stakes inference tasks — call transcript classification, entity extraction (extracting competitor names, objection categories, deal stage signals from transcripts), and embedding generation for semantic search across the Revenue Graph — Workers AI offers serverless GPU inference with pay-per-token pricing and no cold starts.

  • Embedding generation — convert call transcripts and deal notes into vector embeddings for semantic search across the Revenue Graph. Run Whisper for STT directly in Workers AI, eliminating a third-party transcription vendor.
  • Classification at scale — tag objection types, competitor mentions, and deal signals across 312K+ calls using smaller open-source models (Llama 3.1 8B) at a fraction of GPT-4o cost — routed through AI Gateway for full observability.
  • Vectorize — Cloudflare's vector database for semantic search across Terret's call and deal archive. Powers the "find calls where reps mentioned pricing in minute 1" type queries that Nexus runs at analysis time.
Terret fit: Not every inference call needs GPT-4o. Workers AI + Vectorize handles the high-volume classification and retrieval layer, reserving frontier model calls for the complex analysis and generation tasks — cutting inference cost significantly at Terret's call volume.

Application Security

WAF + Bot Management + API Shield + DDoS

docs ↗
High Priority

Terret's attack surface is meaningful: app.boostup.ai is a public-facing SaaS app that processes enterprise deal intelligence, and the Nexus Q&A interface accepts natural language queries against live customer revenue data. The REST API ingests CRM webhooks from Salesforce, HubSpot, and other revenue tooling — all of which are high-value targets for credential stuffing, scrapers, and application-layer abuse.

Cloudflare's application security stack sits in front of all of this at the network edge — before traffic ever reaches Terret's origin — with no performance penalty to legitimate users.

🛡️
WAF — Managed Ruleset

Cloudflare's managed ruleset (OWASP + Cloudflare's own threat intelligence) blocks SQLi, XSS, and CSRF out of the box. Custom rules can protect Terret-specific API paths — for example, blocking access to /api/deals/* without a valid session token at the edge, before it hits the origin.

🤖
Bot Management

Terret's Nexus UI contains competitively sensitive information — rep performance data, win/loss patterns, deal intelligence. Bot Management uses ML-based fingerprinting to block scrapers and headless browsers that probe the application, while passing legitimate enterprise users without friction (no CAPTCHAs on authenticated sessions).

🔌
API Shield

Terret's inbound webhook surface (Salesforce → Terret, HubSpot → Terret, Slack → Terret) is an API that accepts untrusted external events. API Shield validates that inbound requests match the expected schema, enforces mTLS for webhook sources, and rate-limits per-integration endpoint — preventing malformed payloads from reaching Terret's pipeline.

DDoS Protection — Unmetered

Terret's value to customers is highest during active sales cycles — QBR season, quarter-end pushes. These are also the moments when a coordinated attack against app.boostup.ai would be most damaging. Cloudflare's unmetered DDoS protection (L3/L4 and L7) absorbs volumetric attacks automatically with no bandwidth overage charges.

🎯
Credential stuffing

Login endpoint abuse targeting enterprise rep accounts — blocked by Bot Management's ML fingerprinting before reaching Terret's auth layer.

🕷️
Competitive intelligence scraping

Automated scrapers probing the Nexus interface for win rates, rep performance, and deal patterns — blocked by Bot Management without disrupting authenticated user sessions.

💥
API abuse / webhook flooding

Malformed or high-volume webhook payloads from compromised integration sources — rate-limited and schema-validated by API Shield at the edge.

Terret fit: The Carta CRO highlighted infosec in his public testimonial — that means enterprise buyers are asking hard questions. Cloudflare WAF + Bot Management gives Terret's security team a credible, enterprise-grade answer to "what protects your API surface" that goes beyond VPC isolation and into the application layer where most real attacks land.

Performance & Delivery

CDN + Smart Routing + Pages

docs ↗
High Priority

Terret's platform has a hard real-time delivery requirement: pre-call briefs reach 500+ reps 30 minutes before each meeting. That delivery window is simultaneously the highest-traffic moment (everyone opens their brief at the same time) and the highest-stakes moment (a slow or failed delivery directly impacts a rep's call prep). The CDN layer is the infrastructure that makes this SLA survivable under load.

Cloudflare's CDN runs across 330+ cities on an anycast network — meaning a rep in London, Chicago, and Singapore all hit a local PoP, not a single US-east origin. Response times for cached brief assets drop from 300–600ms (cross-continental origin) to under 30ms (local PoP).

Smart Tiered Cache

Brief PDFs, playbook documents, and training decks generated by Nexus are identical for many recipients. Cloudflare's tiered cache serves these assets from edge PoPs without hitting Terret's origin — absorbing the simultaneous brief-open spike that happens every morning across enterprise accounts.

🌍
Argo Smart Routing

For uncacheable, real-time Nexus API calls (deal state queries, live forecast updates), Argo routes requests over Cloudflare's private backbone rather than the public internet — reducing latency by 30–40% on average for API traffic that can't be cached.

🚀
Pages — Frontend Deployment

app.boostup.ai's React/Next.js frontend deployed on Cloudflare Pages: git-push deploys with instant global distribution, per-PR preview environments, and automatic cache invalidation on new deploys. Zero origin scaling required for the static asset layer.

📊
Cache Analytics + Real User Monitoring

Cloudflare's cache analytics show cache hit ratios per asset type, origin response times, and bandwidth saved. Terret can instrument real user performance metrics via Cloudflare's RUM to baseline brief delivery latency per geographic market and per enterprise customer.

Brief delivery latency — before vs. after CDN
Origin direct (US-East → London rep)
~420ms
Cloudflare CDN (London PoP)
<30ms
Spike resilience (500 reps simultaneous)
Origin scales → CDN absorbs
Terret fit: The 30-minute pre-call brief SLA is a core product promise. CDN makes it survivable at scale — 500 reps opening briefs simultaneously doesn't touch Terret's origin. Argo cuts latency on the real-time API calls that power the live Nexus interface for globally distributed enterprise accounts.

Full solution map

Terret Requirement Cloudflare Product Specific Value Priority
LLM inference cost, reliability, observability AI Gateway Semantic caching, model fallback, per-request cost logs, rate limiting Highest
Agentic playbook execution at scale Workers Durable Objects Workflows Per-deal stateful agents, durable retryable pipelines, sub-50ms API responses High
Call archive + Revenue Graph storage R2 D1 $0 egress on multi-TB call archive, serverless SQL for deal graph queries High
Internal access control, infosec posture Zero Trust Tunnel WAF No VPN, device posture, no exposed IPs, API surface protection High
High-volume transcript classification + embedding Workers AI Vectorize Serverless GPU inference for open-source models, vector search over Revenue Graph Consider
API surface, login endpoint, scraper & DDoS protection WAF Bot Mgmt API Shield DDoS Managed ruleset, ML bot fingerprinting, API schema validation, unmetered L7 DDoS High
Brief delivery SLA, global performance, frontend resilience CDN Argo Pages <30ms brief delivery from local PoP, Argo smart routing on API calls, spike absorption High
Cloudflare is already a Terret customer

You already trust Cloudflare on the revenue side.
This is about the infrastructure side.

Cloudflare's sales team uses Terret Nexus to run pipeline analysis, generate rep briefs, and forecast revenue. That means Terret's platform is processing Cloudflare's deal data — and Cloudflare is one of the logos on your homepage. The conversation we're proposing is: let's also power the infrastructure that makes Terret Nexus run.

Cloudflare Terret customer
Carta · Grafana · Teradata Shared enterprise customers
IIT Bombay → Yahoo → Terret Amit's background: ML, distributed systems, RBAC security
For Amit Sasturkar · CTO & Co-founder, Terret

Two concrete starting points

Neither requires commitment. Both deliver immediate value.

02

Architecture review call

A 45-minute call with Ted Patsos (AE) and Cloudflare's SE team to map Terret's current infrastructure stack to the Cloudflare products above — prioritized by what delivers the fastest value at your current scale.

Schedule with Ted →