
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Thu, 09 Apr 2026 10:06:25 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Best Practices for Securing Generative AI with SASE]]></title>
            <link>https://blog.cloudflare.com/best-practices-sase-for-ai/</link>
            <pubDate>Tue, 26 Aug 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ This guide provides best practices for Security and IT leaders to securely adopt generative AI using Cloudflare’s SASE architecture as part of a strategy for AI Security Posture Management (AI-SPM). ]]></description>
            <content:encoded><![CDATA[ <p>As <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/"><u>Generative AI</u></a> revolutionizes businesses everywhere, security and IT leaders find themselves in a tough spot. Executives are mandating speedy adoption of Generative AI tools to drive efficiency and stay abreast of competitors. Meanwhile, IT and Security teams must rapidly develop an <a href="https://www.cloudflare.com/ai-security/">AI Security Strategy</a>, even before the organization really understands exactly how it plans to adopt and deploy Generative AI. </p><p>IT and Security teams are no strangers to “building the airplane while it is in flight”. But this moment comes with new and complex security challenges. There is an explosion in new AI capabilities adopted by employees across all business functions — both sanctioned and unsanctioned. AI Agents are ingesting authentication credentials and autonomously interacting with sensitive corporate resources. Sensitive data is being shared with AI tools, even as security and compliance frameworks struggle to keep up.</p><p>While it demands strategic thinking from Security and IT leaders, the problem of governing the use of AI internally is far from insurmountable. <a href="https://www.cloudflare.com/zero-trust/"><u>SASE (Secure Access Service Edge)</u></a> is a popular cloud-based network architecture that combines networking and security functions into a single, integrated service that provides employees with secure and efficient access to the Internet and to corporate resources, regardless of their location. The SASE architecture can be effectively extended to meet the risk and security needs of organizations in a world of AI. </p><p>Cloudflare’s SASE Platform is uniquely well-positioned to help IT teams govern their AI usage in a secure and responsible way — without extinguishing innovation. What makes Cloudflare different in this space is that we are one of the few SASE vendors that operate not just in cybersecurity, but also in AI infrastructure. This includes: providing AI infrastructure for developers (e.g. <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a>, <a href="https://developers.cloudflare.com/ai-gateway/"><u>AI Gateway</u></a>, <a href="https://developers.cloudflare.com/agents/guides/remote-mcp-server/"><u>remote MCP servers</u></a>, <a href="https://realtime.cloudflare.com/"><u>Realtime AI Apps</u></a>) to securing public-facing LLMs (e.g. <a href="https://developers.cloudflare.com/waf/detections/firewall-for-ai/"><u>Firewall for AI</u></a> or <a href="https://blog.cloudflare.com/ai-labyrinth/"><u>AI Labyrinth</u></a>), to allowing content creators to <a href="https://blog.cloudflare.com/introducing-pay-per-crawl/"><u>charge AI crawlers for access to their content</u></a>, and the list goes on. Our expertise in this space gives us a unique view into governing AI usage inside an organization.  It also gives our customers the opportunity to plug different components of our platform together to build out their AI <i>and</i> AI cybersecurity infrastructure.</p><p>This week, we are taking this AI expertise and using it to help ensure you have what you need to implement a successful <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">AI Security Strategy</a>. As part of this, we are announcing several new AI Security Posture Management (AI-SPM) features, including:</p><ul><li><p><a href="http://blog.cloudflare.com/shadow-AI-analytics/"><u>shadow AI reporting</u></a> to gain visibility into employee’s use of AI,</p></li><li><p><a href="http://blog.cloudflare.com/confidence-score-rubric/"><u>confidence scoring</u></a> of AI providers to manage risk, </p></li><li><p><a href="http://blog.cloudflare.com/ai-prompt-protection/"><u>AI prompt protection</u></a> to defend against malicious inputs and prevent data loss, </p></li><li><p>out-of-band <a href="http://blog.cloudflare.com/casb-ai-integrations/"><u>API CASB integrations </u></a>with AI providers to detect misconfigurations, </p></li><li><p>new tools that <a href="http://blog.cloudflare.com/zero-trust-mcp-server-portals/"><u>untangle and secure</u></a>  <a href="https://www.cloudflare.com/learning/ai/what-is-model-context-protocol-mcp/"><u>Model Context Protocol (MCP)</u></a> deployments in the enterprise.</p></li></ul><p>All of these new AI-SPM features are built directly into Cloudflare’s powerful <a href="https://www.cloudflare.com/zero-trust/"><u>SASE</u></a> platform.</p><p>And we’re just getting started. In the coming months you can expect to see additional valuable AI-SPM features launch across the <a href="https://www.cloudflare.com/"><u>Cloudflare platform</u></a>, as we continue investing in making Cloudflare the best place to protect, connect, and build with AI.</p>
    <div>
      <h3>What’s in this AI security guide?</h3>
      <a href="#whats-in-this-ai-security-guide">
        
      </a>
    </div>
    <p>In this guide, we will cover best practices for adopting generative AI in your organization using Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/"><u>SASE (Secure Access Service Edge)</u></a> platform. We start by covering how IT and Security leaders can formulate their AI Security Strategy. Then, we show how to implement this strategy using long-standing features of our SASE platform alongside the new AI-SPM features we launched this week. </p><p>This guide below is divided into three key pillars for dealing with (human) employee access to AI – Visibility, Risk Management and Data Protection — followed by additional guidelines around deploying agentic AI in the enterprise using MCP. Our objective is to help you align your security strategy with your business goals while driving adoption of AI across all your projects and teams. </p><p>And we do this all using our single <a href="https://www.cloudflare.com/zero-trust/"><u>SASE</u></a> platform, so you don’t have to deploy and manage a complex hodgepodge of point solutions and security tools. In fact, we provide you with an overview of your AI security posture in a single dashboard, as you can see here:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5y6ZHDu9lwCSHZ1FuZsoWT/b3f6a9eb034a3cdb2b663cff428a2335/1.png" />
          </figure><p><i>AI Security Report in Cloudflare’s SASE platform</i></p>
    <div>
      <h2>Develop your AI Security Strategy</h2>
      <a href="#develop-your-ai-security-strategy">
        
      </a>
    </div>
    <p>The first step to securing AI usage is to establish your organization's level of risk tolerance. This includes pinpointing your biggest security concerns for your users and your data, along with relevant legal and compliance requirements.   Relevant issues to consider include: </p><ul><li><p>Do you have specific <b>sensitive data that should not be shared</b> with certain AI tools? (Some examples include personally identifiable information (PII), personal health information (PHI), sensitive financial data, secrets and credentials, source code or other proprietary business information.)</p></li><li><p>Are there <b>business decisions that your employees should not be making using assistance from AI</b>? (For instance, the EU AI Act AI prohibits the use of AI to evaluate or classify individuals based on their social behavior, personal characteristics, or personality traits.)</p></li><li><p>Are you subject to <b>compliance frameworks</b> that require you to produce records of the generative AI tools that your employees used, and perhaps even the prompts that your employees input into AI providers? (For example, HIPAA requires organizations to implement audit trails that records who accessed PHI and when, GDPR requires the same for PII, SOC2 requires the same for secrets and credentials.)</p></li><li><p>Do you have specific data protection requirements that require employees to use the <b>sanctioned, enterprise version of a certain generative AI provider</b>, and avoid certain AI tools or their consumer versions?  (Enterprise AI tools often have more favorable terms of service, including shorter data retention periods, more limited data-sharing with third-parties, and/or a promise not to train AI models on user inputs.)</p></li><li><p>Do you require employees to completely <b>avoid the use of certain AI tools</b>, perhaps because they are unreliable, unreviewed or headquartered in a risky geography? </p></li><li><p>Are there security protections offered by your organization's sanctioned AI providers and to what extent do you plan to <b>protect against misconfigurations of AI tools</b> that can result in leaks of sensitive data?  </p></li><li><p>What is your <a href="https://www.cloudflare.com/the-net/building-cyber-resilience/secure-govern-ai-agents/">policy around the use of autonomous AI agents</a>?  What is your strategy for <b>adopting the </b><a href="https://www.cloudflare.com/learning/ai/what-is-model-context-protocol-mcp/"><b><u>Model Context Protocol (MCP)</u></b></a>? (The Model Context Protocol is a standard way to make information available to large language models (LLMs), similar to the way an application programming interface (API) works. It supports agentic AI that autonomously pursues goals and takes action.)</p></li></ul><p>While almost every organization has relevant compliance requirements that implicate their use of generative AI, there is no “one size fits all” for addressing these issues. </p><ul><li><p>Some organizations have mandates to broadly adopt AI tools of all stripes, while others require employees to interact with sanctioned AI tools only. </p></li><li><p>Some organizations are rapidly adopting the MCP, while others are not yet ready for agents to autonomously interact with their corporate resources. </p></li><li><p>Some organizations have robust requirements around data loss prevention (DLP), while others are still early in the process of deploying DLP in their organization.</p></li></ul><p>Even with this diversity of goals and requirements, Cloudflare SASE provides a flexible platform for the implementation of your organization’s AI Security Strategy.</p>
    <div>
      <h2>Build a solid foundation for AI Security </h2>
      <a href="#build-a-solid-foundation-for-ai-security">
        
      </a>
    </div>
    <p>To implement your AI Security Strategy, you first need a solid <a href="https://developers.cloudflare.com/reference-architecture/architectures/sase/"><u>SASE deployment</u></a>. </p><p>SASE provides a unified platform that consolidates security and networking, replacing a fragmented patchwork of point solutions with a single platform that controls application visibility, user authentication, <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/"><u>Data Loss Prevention (DLP)</u></a>, and other policies for access to the Internet and access to internal corporate resources.  SASE is the essential foundation for an effective AI Security Strategy. </p><p><a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>SASE architecture</u></a> allows you to execute your AI security strategy by discovering and inventorying the AI tools used by your employees. With this visibility, you can proactively manage risk and support compliance requirements by monitoring AI prompts and responses to understand what data is being shared with AI tools. Robust DLP allows you to scan and block sensitive data from being entered into AI tools, preventing data leakage and protecting your organization's most valuable information. Our <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Secure Web Gateway (SWG)</u></a> allows you to redirect traffic from unsanctioned AI providers to user education pages or to sanctioned enterprise AI providers. And our new integration of MCP tooling into our SASE platform helps you secure the deployment of agentic AI inside your organization.</p><p>If you're just starting your SASE journey, our <a href="https://developers.cloudflare.com/learning-paths/secure-internet-traffic/concepts/"><u>Secure Internet Traffic Deployment Guide</u></a> is the best place to begin. For this guide, however, we will skip these introductory details and dive right into using SASE to secure the use of Generative AI. </p>
    <div>
      <h2>Gain visibility into your AI landscape </h2>
      <a href="#gain-visibility-into-your-ai-landscape">
        
      </a>
    </div>
    <p>You can't protect what you can't see. The first step is to gain visibility into your AI landscape, which is essential for discovering and inventorying all the AI tools that your employees are using, deploying or experimenting with in your organization. </p>
    <div>
      <h3>Discover Shadow AI </h3>
      <a href="#discover-shadow-ai">
        
      </a>
    </div>
    <p>Shadow AI refers to the use of AI applications that haven't been officially sanctioned by your IT department. Shadow AI is not an uncommon phenomenon – Salesforce found that <a href="https://www.salesforce.com/news/stories/ai-at-work-research/?utm_campaign=amer_cbaw&amp;utm_content=Salesforce_World+Tour&amp;utm_medium=organic_social&amp;utm_source=linkedin"><u>over half of the knowledge workers it surveyed</u></a> admitted to using unsanctioned AI tools at work. Use of unsanctioned AI is not necessarily a sign of malicious intent; employees are often just trying to do their jobs better. As an IT or Security leader, your goal should be to discover Shadow AI and then apply the appropriate AI security policy. There are two powerful ways to do this: inline and out-of-band.</p>
    <div>
      <h4>Discover employee usage of AI, inline</h4>
      <a href="#discover-employee-usage-of-ai-inline">
        
      </a>
    </div>
    <p>The most direct way to get visibility is by using <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare's Secure Web Gateway (SWG)</u></a>. </p><p>SWG helps you get a clear picture of both sanctioned and unsanctioned AI and chat applications. By reviewing your detected usage, you'll gain insight into which AI apps are being used in your organization. This knowledge is essential for building policies that support approved tools, and block or control risky ones. This feature requires you to deploy the WARP client in Gateway proxy mode on your end-user devices.</p><p>You can review your company’s AI app usage using our new Application Library and <a href="http://blog.cloudflare.com/shadow-AI-analytics/"><u>Shadow IT </u></a>dashboards. These tools allow you to: </p><ul><li><p>Review traffic from user devices to understand how many users engage with a specific application over time.</p></li><li><p>Denote application’s status (e.g., Approved, Unapproved) inside your organization, and use that as input to a variety of SWG policies that control access to applications with that status. </p></li><li><p> Automate assessment of SaaS and Gen AI applications at scale with our soon-to-be-released <a href="http://blog.cloudflare.com/confidence-score-rubric/"><u>Cloudflare Application Confidence Scores</u><b><u>. </u></b></a></p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NFrOpJkBMH6tsPZVec02Q/37b54f7477082dedcac2adcba31e2c29/2.png" />
          </figure><p><sup><i>Shadow IT dashboard showing utilization of applications of different status (Approved, Unapproved, In Review, Unreviewed).</i></sup></p>
    <div>
      <h4>Discover employee usage of AI, out-of-band</h4>
      <a href="#discover-employee-usage-of-ai-out-of-band">
        
      </a>
    </div>
    <p>Even if your organization doesn't use a device client, you can still get valuable data on Shadow AI usage if you use Cloudflare's integrations for Cloud Access Security Broker (<a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>CASB</u></a>) with services like Google Workspace, Microsoft 365, or GitHub. </p><p><a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>Cloudflare CASB</u></a> provides high-fidelity detail about your SaaS environments, including sensitive data visibility and suspicious user activity. By integrating CASB with your SSO provider, you can see if your users have authenticated to any third-party AI applications, giving you a clear and non-invasive sense of app usage across your organization.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HDUtSAX9f5XZasSyACTiV/367f80a5d745070fd8e0191d0e36e61d/3.png" />
          </figure><p><sup><i>An API CASB integration with Google Workspace, showing findings filtered to third party integrations. Findings discover multiple LLM integrations.</i></sup></p>
    <div>
      <h2>Implement an AI risk management framework</h2>
      <a href="#implement-an-ai-risk-management-framework">
        
      </a>
    </div>
    <p>Now that you’ve gained visibility into your AI landscape, the next step is to proactively manage that risk. Cloudflare’s SASE platform allows you to monitor AI prompts and responses, enforce granular security policies, coach users on secure behavior, and prevent misconfigurations in your enterprise AI providers.</p>
    <div>
      <h3>Detect and monitor AI prompts and responses</h3>
      <a href="#detect-and-monitor-ai-prompts-and-responses">
        
      </a>
    </div>
    <p>If you have <a href="https://developers.cloudflare.com/learning-paths/replace-vpn/configure-device-agent/enable-tls-decryption/"><u>TLS decryption enabled</u></a> in your SASE platform, you can gain new and powerful insights into how your employees are using AI with our new <a href="http://blog.cloudflare.com/ai-prompt-protection/"><u>AI prompt protection</u></a> feature.  </p><p>AI Prompt Protection provides you with visibility into the exact prompts and responses from your employees’ interactions with supported AI applications. This allows you to go beyond simply knowing which tools are being used and gives you insight into exactly what kind of information is being shared.  </p><p>This feature also works with <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/"><u>DLP profiles</u></a> to detect sensitive data in prompts. You can also choose whether to block the action or simply monitor it.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JpNZiyklt6qBRjW4LZuSW/1ea4043b6d03f8de31ce24175aa6ca02/4.png" />
          </figure><p><sup><i>Log entry for a prompt detected using AI prompt protection.</i></sup></p>
    <div>
      <h3>Build granular AI security policies</h3>
      <a href="#build-granular-ai-security-policies">
        
      </a>
    </div>
    <p>Once your monitoring tools give you a clear understanding of AI usage, you can begin building security policies to achieve your security goals. Cloudflare's Gateway allows you to create policies based on application categories, application approval status, users, user groups, and device status. For example, you can:</p><ul><li><p>create policies to explicitly allow approved AI applications while blocking unapproved AI applications;</p></li><li><p>create <a href="https://developers.cloudflare.com/changelog/2025-04-11-http-redirect-custom-block-page-redirect/"><u>policies that redirect users</u></a> from unapproved AI applications to an approved AI application;</p></li><li><p>limit access to certain applications to specific users or groups that have specific device security posture;</p></li><li><p>build policies to enable prompt capture (with<a href="http://blog.cloudflare.com/ai-prompt-protection/"><u> AI prompt protection</u></a>) for specific high-risk user groups, such as contractors or new employees, without affecting the rest of the organization; and</p></li><li><p>put certain applications behind <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/"><u>Remote Browser Isolation (RBI)</u></a>, to prevent end users from uploading files or pasting data into the application.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2BCDxoKrUDRAOO13V8Qd4W/28e84e4529f3e040ba4a2c3c98c6eed7/5.png" />
          </figure><p><sup><i>Gateway application status policy selector</i></sup></p><p>All of these policies can be written in Cloudflare Gateway’s unified policy builder, making it easy to deploy your AI Security Strategy across your organization.</p>
    <div>
      <h3>Control access to internal LLMs </h3>
      <a href="#control-access-to-internal-llms">
        
      </a>
    </div>
    <p>You can use <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/"><u>Cloudflare Access</u></a> to control your employees’ access to your organization’s internal LLMs, including any <a href="https://www.cloudflare.com/learning/ai/how-to-secure-training-data-against-ai-data-leaks/">proprietary models you train internally</a> and/or models that your organization runs on <a href="https://developers.cloudflare.com/workers-ai/"><u>Cloudflare Worker’s AI</u></a>. </p><p>Cloudflare Access allows you to gate access to these LLMs using fine-grained policies, including ensuring users are granted access based on their identity, user group, device posture, and other contextual signals. For example, you can use <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/"><u>Cloudflare Access</u></a> to write a policy that ensures that only certain data scientists at your organization can access a <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a> model that is <a href="https://developers.cloudflare.com/workers-ai/guides/tutorials/fine-tune-models-with-autotrain/"><u>trained</u></a> on certain types of customer data. </p>
    <div>
      <h3>Manage the security posture of third-party AI providers</h3>
      <a href="#manage-the-security-posture-of-third-party-ai-providers">
        
      </a>
    </div>
    <p>As you define which AI tools are sanctioned, you can develop functional security controls for consistent usage. Cloudflare newly supports <a href="http://blog.cloudflare.com/casb-ai-integrations/"><u>API CASB integrations with popular AI tools</u></a> like OpenAI (ChatGPT), Anthropic (Claude), and Google Gemini. These "out-of-band" integrations provide immediate visibility into how users are engaging with sanctioned AI tools, allowing you to report on posture management findings include:</p><ul><li><p>Misconfigurations related to sharing settings.</p></li><li><p>Best practices for API key management.</p></li><li><p>DLP profile matches in uploaded attachments</p></li><li><p>Riskier AI features (e.g. autonomous web browsing, code execution) that are toggled on</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/0a6FVjCwejeyUzdQR0pyb/79f29b0d92c27bcd400ed7ded8d4c4e3/6.png" />
          </figure><p><sup><i>OpenAI API CASB Integration showing riskier features that are toggled on, security posture risks like unused admin credentials, and an uploaded attachment with a DLP profile match.</i></sup></p>
    <div>
      <h2>Layer on data protection </h2>
      <a href="#layer-on-data-protection">
        
      </a>
    </div>
    <p>Robust data protection is the final pillar that protects your employee’s access to AI.. </p>
    <div>
      <h3>Prevent data loss</h3>
      <a href="#prevent-data-loss">
        
      </a>
    </div>
    <p>Our SASE platform has long supported Data Loss Prevention (<a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/"><u>DLP</u></a>) tools that scan and block sensitive data from being entered into AI tools, to prevent data leakage and protect your organization's most valuable information.  You can write policies that detect sensitive data while adapting to <a href="https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis/"><u>organization-specific traffic patterns</u></a>, and use Cloudflare Gateway’s unified policy builder to apply these to your users' interactions with AI tools or other applications. For example, you could write a DLP policy that detects and blocks the upload of a social security number (SSN), phone number or address.</p><p>As part of our new <a href="http://blog.cloudflare.com/ai-prompt-protection/"><u>AI prompt protection</u></a> feature, you can now also gain a semantic understanding of your users’ interactions with supported AI providers. Prompts are classified <i>inline </i>into meaningful, high-level topics that include PII, credentials and secrets, source code, financial information, code abuse / malicious code and prompt injection / jailbreak.  You can then build inline granular policies based on these high-level topic classifications. For example, you could create a policy that blocks a non-HR employee from submitting a prompt with the intent to receive PII from the response, while allowing the HR team to do so during a compensation planning cycle. </p><p>Our new <a href="http://blog.cloudflare.com/ai-prompt-protection/"><u>AI prompt protection</u></a> feature empowers you to apply smart, user-specific DLP rules that empower your teams to get work done, all while strengthening your security posture. To use our most advanced DLP feature, you'll need to enable TLS decryption to inspect traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3dUnu8P5cMS18k9BxkGoHY/16fdccae7f8e99dc34ebfe7399db4b94/7.png" />
          </figure><p><sup><i>The above policy blocks all ChatGPT prompts that may receive PII back in the response for employees in engineering, marketing, product, and finance </i></sup><a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/identity-selectors/"><sup><i><u>user groups</u></i></sup></a><sup><i>. </i></sup></p>
    <div>
      <h2>Secure MCP — and Agentic AI </h2>
      <a href="#secure-mcp-and-agentic-ai">
        
      </a>
    </div>
    <p>MCP (Model Context Protocol) is an emerging AI standard, where MCP servers act as a translation layer for <a href="https://www.cloudflare.com/learning/ai/what-is-agentic-ai/"><u>AI agents</u></a>, allowing them to communicate with public and private APIs, understand datasets, and perform actions. Because these servers are a primary entry point for AI agents to engage with and manipulate your data, they are a new and critical security asset for your security team to manage.</p><p>Cloudflare already offers a robust set of developer tools for deploying <a href="https://developers.cloudflare.com/agents/guides/remote-mcp-server/"><u>remote MCP servers</u></a>—a cloud-based server that acts as a bridge between a user's data and tools and various AI applications. But now our customers are asking for help securing their enterprise MCP deployments. </p><p>That is why we’re making MCP security controls a core part of our SASE platform.</p>
    <div>
      <h4>Control MCP Authorization</h4>
      <a href="#control-mcp-authorization">
        
      </a>
    </div>
    <p>MCP servers typically use OAuth for authorization, where the server inherits the permissions of the authorizing user. While this adheres to least-privilege for the user, it can lead to <b>authorization sprawl </b>— where the agent accumulates an excessive number of permissions over time. This makes the agent a high-value target for attackers.</p><p><a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/mcp-servers"><u>Cloudflare Access</u></a> now helps you manage authorization sprawl by applying <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/"><u>Zero Trust principles</u></a> to MCP server access. A Zero Trust model assumes no user, device, or network can be trusted implicitly, so every request is continuously verified. This <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/mcp-servers"><u>approach </u></a>ensures secure authentication and management of these critical assets as your business adopts more agentic workflows. </p>
    <div>
      <h4>Centralize management of MCP servers</h4>
      <a href="#centralize-management-of-mcp-servers">
        
      </a>
    </div>
    <p><a href="http://blog.cloudflare.com/zero-trust-mcp-server-portals/"><u>Cloudflare MCP Server Portal</u></a> is a new feature in Cloudflare’s SASE platform that centralizes the management, security, and observation of an organization’s MCP servers.</p><p>MCP Server Portal allows you to register all your MCP servers with Cloudflare and provide your end users with a single, unified Portal endpoint to configure in their MCP client. This approach simplifies the user experience, because it eliminates the need to configure a one-to-one connection between every MCP client and server. It also means that new MCP servers dynamically become available to users whenever they are added to the Portal. </p><p>Beyond these usability enhancements, MCP Server Portal addresses the significant security risks associated with MCP in the enterprise. The current decentralized approach of MCP deployments creates a tangle of unmanaged one-to-one connections that are difficult to secure. The lack of centralized controls creates a variety of risks including prompt injection, tool injection (where malicious code is part of the MCP server itself), supply chain attacks and data leakage. </p><p>MCP Server Portals solve this by routing all MCP traffic through Cloudflare, allowing for centralized policy enforcement, comprehensive visibility and logging, and a curated user experience based on the principle of least privilege. Administrators can review and approve MCP servers before making them available, and users are only presented with the servers and tools they are authorized to use, which prevents the use of unvetted or malicious third-party servers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64a5Snga1xwRHeCmdbYrpj/f23dc4584618f0c37fb0be8f3399554b/8.png" />
          </figure><p><sup><i>An MCP Server Portal in the Cloudflare Dashboard</i></sup></p><p>All of these features are only the beginning of our MCP security roadmap, as we continue advancing our support for MCP infrastructure and security controls across the entire Cloudflare platform.</p>
    <div>
      <h2>Implement your AI security strategy in a single platform</h2>
      <a href="#implement-your-ai-security-strategy-in-a-single-platform">
        
      </a>
    </div>
    <p>As organizations rapidly develop and deploy their AI security strategies, Cloudflare’s SASE platform is ideally situated to implement policies that balance productivity with data and security controls.</p><p>Our SASE has a full suite of features to protect employee interactions with AI. Some of these features are deeply integrated in our <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Secure Web Gateway (SWG)</u></a>, including the ability to write fine-grained access policies, gain visibility into <a href="http://blog.cloudflare.com/shadow-AI-analytics/"><u>Shadow IT </u></a>and introspect on interactions with AI tools using <a href="http://blog.cloudflare.com/ai-prompt-protection/"><u>AI prompt protection</u></a>. Apart from these inline controls, our <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/"><u>CASB</u></a> provides visibility and control using out-of-band API integrations. Our Cloudflare <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/"><u>Access</u></a> product can apply Zero Trust principles while protecting employee access to corporate LLMs that are hosted on <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a> or elsewhere. We’re newly integrating controls for <a href="http://blog.cloudflare.com/zero-trust-mcp-server-portals/"><u>securing MCP</u></a> that can also be used alongside Cloudflare’s <a href="https://blog.cloudflare.com/remote-model-context-protocol-servers-mcp/"><u>Remote MCP Server</u></a> platform.</p><p>And all of these features are integrated directly into Cloudflare’s SASE’s unified dashboard, providing a unified platform for you to implement your AI security strategy. You can even gain a holistic view of all of your AI-SPM controls using our newly-released AI-SPM overview dashboard. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WzeNXp9TbX0h0QF8Nyby5/bcbeb8824e3eb5558826aed2cb17c11a/9.png" />
          </figure><p><sup><i>AI security report showing utilization of AI applications.</i></sup></p><p>As one the few SASE vendors that also offer AI infrastructure, Cloudflare’s SASE platform can also be deployed alongside products from our developer and application security platforms to holistically implement your AI security strategy alongside your AI infrastructure strategy (using, for example, <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a>, <a href="https://developers.cloudflare.com/ai-gateway/"><u>AI Gateway</u></a>, <a href="https://developers.cloudflare.com/agents/guides/remote-mcp-server/"><u>remote MCP servers</u></a>, <a href="https://realtime.cloudflare.com/"><u>Realtime AI Apps</u></a>, <a href="https://developers.cloudflare.com/waf/detections/firewall-for-ai/"><u>Firewall for AI</u></a>, <a href="https://blog.cloudflare.com/ai-labyrinth/"><u>AI Labyrinth</u></a>, or <a href="https://blog.cloudflare.com/introducing-pay-per-crawl/"><u>pay per crawl</u></a> .)</p>
    <div>
      <h2>Cloudflare is committed to helping enterprises securely adopt AI</h2>
      <a href="#cloudflare-is-committed-to-helping-enterprises-securely-adopt-ai">
        
      </a>
    </div>
    <p>Ensuring AI is scalable, safe, and secure is a natural extension of Cloudflare’s mission, given so much of our success relies on a safe Internet. As AI adoption continues to accelerate, so too does our mission to provide a market-leading set of controls for AI Security Posture Management (AI-SPM). Learn more about how <a href="https://developers.cloudflare.com/learning-paths/holistic-ai-security/concepts/"><u>Cloudflare helps secure AI</u></a> or start exploring our new AI-SPM features in Cloudflare’s SASE <a href="https://dash.cloudflare.com/"><u>dashboard </u></a>today!</p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[AI-SPM]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Access]]></category>
            <category><![CDATA[MCP]]></category>
            <guid isPermaLink="false">55IAKy7DMqbZKAy8htcUiO</guid>
            <dc:creator>AJ Gerstenhaber</dc:creator>
            <dc:creator>Sharon Goldberg</dc:creator>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Yumna Moazzam</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare recognized as a Visionary in 2025 Gartner® Magic Quadrant™ for SASE Platforms]]></title>
            <link>https://blog.cloudflare.com/cloudflare-sase-gartner-magic-quadrant-2025/</link>
            <pubDate>Tue, 15 Jul 2025 15:00:00 GMT</pubDate>
            <description><![CDATA[ Gartner has recognized Cloudflare as a Visionary in the 2025 Gartner® Magic Quadrant™ for SASE Platforms report. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We are thrilled to announce that Cloudflare has been named a Visionary in the 2025 Gartner® Magic Quadrant™ for Secure Access Service Edge (SASE) Platforms<sup>1</sup> report. We view this evaluation as a significant recognition of our strategy to help connect and secure workspace security and coffee shop networking through our unique connectivity cloud approach. You can read more about our position in the report <a href="https://www.cloudflare.com/lp/gartner-magic-quadrant-sase-platforms-2025/"><u>here</u></a>.</p><p>Since <a href="https://blog.cloudflare.com/introducing-cloudflare-one"><u>launching Cloudflare One</u></a>, our SASE platform, we have delivered hundreds of features and capabilities from our <a href="https://blog.cloudflare.com/magic-wan-connector-general-availability"><u>lightweight branch connector</u></a> and <a href="https://blog.cloudflare.com/cloudflare-one-data-protection-roadmap-preview/"><u>intuitive native Data Loss Prevention (DLP) service</u></a> to our <a href="https://blog.cloudflare.com/cloudflare-acquires-bastionzero"><u>new secure infrastructure access tools</u></a>. By operating the world’s most powerful, programmable network we’ve built an incredible foundation to deliver a comprehensive SASE platform. </p><p>Today, we operate the world's most expansive SASE network in order to deliver connectivity and security close to where users and applications are, anywhere in the world. We’ve developed our services from the ground up to be fully integrated and run on every server across our network, delivering a unified experience to our customers. And we enable these services with a unified control plane, enabling end-to-end visibility and control anywhere in the world. Tens of thousands of customers trust Cloudflare with their network and security infrastructure.</p><p>We’re thrilled with our inclusion in this report and are even more excited that we’re only just getting started. Building on this foundation, we’re investing to move even faster to solve problems for our customers.</p>
    <div>
      <h3>What is SASE?</h3>
      <a href="#what-is-sase">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>SASE</u></a> (pronounced “sassy”) is an architectural model that delivers network connectivity and security functions, and delivers them through a single cloud platform and/or centralized policy control.</p><p>Given the extent of what organizations need for networking and security, not all SASE capabilities may be available from a single vendor. For example, the security-as-a-service model is sometimes consumed as a part of <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/"><u>Security Service Edge (SSE)</u></a>.</p><p>The evolution of this architecture, where a vendor delivers key functionality across networking and security service in a single offering, is SASE. What’s important to note, however, is that convergence can mean many, many different things. For example, some vendors started with SSE capabilities and are building out infrastructure to support it. Some vendors are using public cloud for their infrastructure. Some are aggressively pursuing M&amp;A to acquire functionality. These decisions have led to many problematic questions such as: how many interfaces do organizations need to manage their network and security needs? Why is security enforcement sometimes in the cloud and sometimes at the branch edge?</p><p>We believe that the market deserves more than a buffet of features. Convergence should be greater than the sum of the parts. The infrastructure/control plane/data plane for networking services should not be an independent entity from the security services. We believe that we are delivering SASE capabilities in a fundamentally different manner than the majority of vendors in the market: <b>by building out the platform first, and layering services upon it.</b></p><p>We also believe that our efforts to focus on the underlying network delivers better solutions for simplifying your infrastructure, establishing control, and maintaining visibility to support branch connectivity, hybrid work, Zero Trust, and secure cloud access.</p>
    <div>
      <h3>What is required for SASE and how is Cloudflare different?</h3>
      <a href="#what-is-required-for-sase-and-how-is-cloudflare-different">
        
      </a>
    </div>
    <p>The Cloudflare Global network is one of the largest, most well-connected networks in the world, spanning more than 330 cities in over 125 countries. We are not a new vendor entering a new market, but rather one that has been delivering services upon a mature platform that’s been tested under the most extreme circumstances over the past 15+ years.</p><p>Our unified platform, Cloudflare’s <a href="https://www.cloudflare.com/connectivity-cloud/"><u>connectivity cloud</u></a>, is built upon a set of principles across our infrastructure, our control plane, and our data plane, that guides everything we do:</p><p><b>Infrastructure</b>: The infrastructure that we build must be everywhere our customers do business. Users, applications, and data are everywhere, and therefore we build ahead of our customer’s needs to ensure that they can connect anything to anywhere, quickly and reliably.</p><p><b>Control Plane: </b>To stay on top of operations, organizations want a single user interface for monitoring activity and enforcing policies, with changes pushed out globally in seconds. In addition, our customers want APIs to extend management into automation and infrastructure-as-code tools. We help organizations cut down on the tool sprawl, doing away with the drudgery and complexity that affects even the most basic administrative tasks with conventional tech stacks. And we restore <a href="https://www.cloudflare.com/learning/performance/what-is-observability/">observability across activity</a> (again by virtue of facilitating any-to-any connectivity) to help with operations with troubleshooting, forensics, and insights across the application landscape.</p><p><b>Data Plane: </b>The data plane is where services are delivered, and we constantly deliver innovations in how users connect, consistently enforce inspection and policy, and deliver traffic to the intended location securely. These services are composable, meaning that new functionality can be enabled from the Control Plane, without the headaches of network downtime normally associated with appliance insertion.</p>
    <div>
      <h3>How customers benefit from Cloudflare’s design principles </h3>
      <a href="#how-customers-benefit-from-cloudflares-design-principles">
        
      </a>
    </div>
    <p>These principles are crucial for delivering a superior, end-to-end user experience. Your SASE environment is (or will be) processing packets from users across the globe. Latency damages the user experience, in ways that are similar to how a smoothly running engine becomes unreliable and inefficient as internal components become dirty. Our design principles establish the north star to ensure that everything we do and everything we build does not add grit to the engine. This is important because we are seeing a lot of confusion (and some obfuscation) about how to deliver performant SASE services.</p><p>To understand how our principles apply towards the delivery of SASE services:</p><p><b>Connecting users to a data center (last mile latency):</b> With traditional on-prem networking, one of the major sources of latency is getting the traffic to the security stack. Both hub &amp; spoke and VPN focus on taking traffic (from sometimes distant locations) to one of the organization’s security enforcement points such as a perimeter firewall. With SASE, the objective is to deliver the security closer to the user, using one of the SASE provider’s data centers. Cloudflare’s global coverage delivers service to within 50ms of 95% of the world’s population. This is something unique to Cloudflare, in that other vendors seldom discuss how much data center coverage is needed to deliver sufficient last mile performance, or sometimes use confusing metrics about the latency within their data centers (see next section) to infer what organizations might expect with end-to-end latency.</p><p><b>Delivering key networking and security services (processing latency):</b> SASE data centers must deliver networking and security, but not all cloud data centers are designed the same. Some implementations in the market separate the SASE edge (the point of presence) from the actual compute (the data center itself). Some have disguised their single-pass processing with a series of daisy-chained proxies, which requires inefficiently decoding packets multiple times (From L3 to L7 and back to L3) to perform different security functions. As a result, there’s often a delta between the performance of a configuration that offers low latency and the configuration with the security features that customers want enabled. Cloudflare delivers full compute in every data center. There is no “next-hop” to compute; instead, there are fungible compute resources to ensure the fastest interface-to-interface possible with all the security features (including TLS decryption) enabled.</p><p><b>Connecting from the SASE to applications (Internet exchanges, private backbone, optimized routing and peering): </b>Many vendors optimize their data centers to focus on egress to the Internet/cloud, typically by participating in <a href="https://www.cloudflare.com/learning/cdn/glossary/internet-exchange-point-ixp/"><u>Internet exchanges</u></a> along with a handful of peering relationships. In other words, their networks were not designed for traffic between data centers, which is a suboptimal design for branch-to-branch or branch-to-data-center traffic.</p><p>Cloudflare’s network operates a private backbone for traffic destined to another Cloudflare data center, and we are one of the largest participants in Internet exchanges in the world for traffic destined to the Internet/cloud. We are connected to over 13,000 public and private networks, plus our open peering policy provides extensive access for networks of different sizes to participate as well. But user experience isn’t determinable solely by the number of interconnections. Not all Internet exchanges are the same, and in many cases there are variables that affect the quality and reliability of any given connection. That’s why Cloudflare further optimizes the connection to the user’s ultimate destination, whether destined to a public or private network, to make path selection more intelligent than simply counting hops over routing protocols.</p>
    <div>
      <h3>How customers adopt Cloudflare One</h3>
      <a href="#how-customers-adopt-cloudflare-one">
        
      </a>
    </div>
    <p>We’ve discussed how we do what we do. Now let’s discuss the services we deliver. While customers have a number of different requirements that are specific to their organization, we do see centers of gravity that drive their use cases:</p><p><b>Network modernization initiatives:</b> Enterprise networks are in ways more complicated than they need to be. To make the enterprise network suitable for today’s hybrid workspace, many organizations are looking for ways to converge the on-prem and remote user experience. The adoption of the coffee shop networking architecture is driving many projects towards single-vendor SASE. By using <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Cloudflare Access</u></a>, users can access applications securely with identity and device-based contextual controls. Organizations use <a href="https://www.cloudflare.com/network-services/products/magic-wan/"><u>Magic WAN</u></a> for network connectivity across branch offices, headquarters, regional campuses and the data center.</p><p><b>Security modernization initiatives:</b> Security teams with concerns about enforcing more granular security controls to access critical resources are making efforts to adopt Zero Trust. These initiatives drive security-focused SASE use cases, which can both reduce the attack surface and centralize enforcement of adaptive access policies. Security teams need to both enable access to private applications while also securing access to the Internet. Use Cloudflare Access to implement Zero Trust Network Access, which accelerates the deployment of protections by layering granular, user-specific access controls on top of the existing network topology. Use <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a> to enforce content filtering policies to protect access to the Internet. Use <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> to stop phishing attacks and disrupt the business email compromise attack lifecycle. </p><p><b>Transformation initiatives: </b>Most organizations have legacy investments in both networking and security infrastructure, and are embarking upon a transformation across their business to support their future needs. Organizations that are transforming need to tackle both networking and security modernization. <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a> addresses comprehensive transformation by delivering networking services through Cloudflare Magic WAN, Cloudflare Access to implement ZTNA, Cloudflare Gateway to protect users from Internet threats, Cloudflare CASB to secure SaaS, and more.</p>
    <div>
      <h3>Building beyond SASE</h3>
      <a href="#building-beyond-sase">
        
      </a>
    </div>
    <p>We’re building new capabilities that extend beyond the traditional definition of SASE, all while leveraging our core Cloudflare network foundation. This includes addressing a broader spectrum of security concerns that organizations face, such as <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/"><u>phishing</u></a> and <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>DDoS attacks</u></a>.</p><p>We are expanding our networking capabilities to help organizations <a href="https://www.cloudflare.com/multi-cloud/"><u>simplify and automate multi-cloud connectivity</u></a>. As the boundaries between public and private networking blur, particularly with the widespread adoption of AI across various applications, customers are looking for a single set of controls for all their applications. This requires market-leading Web Application and API Protection (WAAP) services that natively support both positive and negative security models as part of SASE.</p><p>Furthermore, we are<a href="https://blog.cloudflare.com/workers-ai"> <u>rapidly deploying Graphics Processing Units (GPUs) in our data centers</u></a> to<a href="https://ai.cloudflare.com/"> <u>power AI protections and support customer applications</u></a>. As the only SASE platform that also serves as a leading Edge Distribution Platform with AI primitives, we are uniquely positioned to help customers to understand the latest AI capabilities and secure their users, networks, applications, and data with a security-first approach across the entire application lifecycle. We provide holistic support for the age of AI, and many leading Generative AI platforms rely on our network as critical infrastructure to operate. With their traffic and often code on our network, we enable the safeguard of customers' AI usage.</p><p>We believe that these efforts will help the market evolve and address a broader range of customer concerns. We’re doing this incrementally, building integrated solutions on top of our foundation and accelerating our pace. We can’t wait to show you what we’ve got planned for the year ahead in SASE.</p><p>Are you interested in Cloudflare One? <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/"><u>Contact us</u></a> to learn more about how we can help.</p><p>***</p><p><sup>1</sup><sub>Gartner, Magic Quadrant for SASE Platforms, Analyst(s): Jonathan Forest, Neil MacDonald, Dale Koeppen, July 9, 2025</sub></p><p><sub>GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.</sub></p><p><sub>Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</sub></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Gartner]]></category>
            <guid isPermaLink="false">1Imd4sxStKlQyqPxmCp6TP</guid>
            <dc:creator>Abe Carryl</dc:creator>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare named in 2025 Gartner® Magic Quadrant™ for Security Service Edge]]></title>
            <link>https://blog.cloudflare.com/cloudflare-sse-gartner-magic-quadrant-2025/</link>
            <pubDate>Fri, 23 May 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ For the third consecutive year, Gartner has named Cloudflare to the Gartner® Magic Quadrant™ for Security Service Edge (SSE) report. ]]></description>
            <content:encoded><![CDATA[ <p>For the third consecutive year, Gartner has named Cloudflare in the Gartner® Magic Quadrant™ for Security Service Edge (SSE) report. This analyst evaluation helps security and network leaders make informed choices about their long-term partners in digital transformation. We are excited to share that Cloudflare is one of only nine vendors recognized in this year’s report. </p><p>What’s more exciting is that we’re just getting started. <a href="https://blog.cloudflare.com/introducing-cloudflare-access/"><u>Since 2018</u></a>, starting with our Zero Trust Network Access (ZTNA) service <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Cloudflare Access</u></a>, we’ve continued to push the boundaries of how quickly we can build and deliver a mature SSE platform. In that time, we’ve released multiple products each year, delivering hundreds of features across our platform. That’s not possible without our customers. Today, tens of thousands of customers have chosen to connect and protect their people, devices, applications, networks, and data with Cloudflare. They tell us our platform is faster and easier to deploy and provides a more consistent and reliable user experience, all on a more agile architecture for longer term modernization. We’ve made a commitment to those customers to continue to deliver innovative solutions with the velocity and resilience they have come to expect from us. If you want to join them on this journey today, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/"><u>contact us</u></a> to discuss your own SSE journey. </p>
    <div>
      <h2>What is a Security Service Edge?</h2>
      <a href="#what-is-a-security-service-edge">
        
      </a>
    </div>
    <p>In general, a <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/"><u>Security Service Edge (SSE)</u></a> provides a helpful framing that gives teams guardrails as they adopt a Zero Trust architecture. The concept breaks down into a few typical buckets:</p><ul><li><p><b>Zero Trust access control</b>: Protect applications that hold sensitive data by creating <a href="https://www.cloudflare.com/learning/access-management/principle-of-least-privilege/">least privilege</a> rules that check for identity, device posture, and other signals on each and every request or connection.</p></li><li><p><b>Outbound filtering</b>: Keep people and devices safe as they connect to the rest of the Internet by filtering and logging network traffic, DNS queries, and HTTP requests.</p></li><li><p><b>Secure SaaS usage</b>: Analyze traffic to SaaS applications and scan the data sitting inside of SaaS applications for potential <a href="https://www.cloudflare.com/learning/access-management/what-is-shadow-it/">Shadow IT policy violations</a>, misconfigurations, or data mishandling.</p></li><li><p><b>Data protection</b>: Scan for data leaving your organization towards destinations that do not comply with your organization’s policies. Find data stored inside your organization, even in trusted tools, that should not be retained or that needs tighter <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access controls</a>.</p></li><li><p><b>Employee experience</b>: <a href="https://www.cloudflare.com/learning/performance/what-is-digital-experience-monitoring/">Monitor and improve the experience</a> that your team members have when using tools and applications on the Internet or hosted inside your own organization.</p></li></ul><p>The SSE space is a component of the larger <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>Secure Access Service Edge (SASE)</u></a> market. You can think of the SSE capabilities as the security half of SASE, while the other half consists of the networking technologies that connect offices and data centers to each other along with everything that SSE connects. Some vendors only focus on the SSE side and rely on partners to connect customers to their security solutions. Other companies just provide the networking pieces. While today’s announcement highlights our SSE capabilities, Cloudflare offers both components as a unified SASE platform.</p>
    <div>
      <h2>How does Cloudflare fit into the SSE space?</h2>
      <a href="#how-does-cloudflare-fit-into-the-sse-space">
        
      </a>
    </div>
    <p>Cloudflare’s global network was built for this. We’ve developed a unified, programmable <a href="https://www.cloudflare.com/network"><u>network</u></a> in which every service runs in every data center, spanning more than 330 cities across the globe. Cloudflare operates within approximately 50 milliseconds of 95% of the Internet-connected population globally. That means that regardless of where your people, apps, and data are located, your Security Service Edge is not far away.</p><p>Our SSE services operate on the same infrastructure and locations that support many of the world's most prominent Internet platforms. We've integrated proven strengths including the <a href="https://1.1.1.1/"><u>world’s fastest DNS resolver</u></a>, our robust <a href="https://workers.cloudflare.com/?_gl=1*1fqsg8y*_gcl_au*MTU0MzQ4NzIwMS4xNzQyMjE4OTk0*_ga*NjkzNTc3NzkzLjE3NDIyMTg5OTQ.*_ga_SQCRB0TXZW*MTc0NTU3ODIzOC4yNS4xLjE3NDU1NzkwMTEuMTkuMC4w"><u>serverless compute platform</u></a>, intelligence from our leading <a href="https://www.cloudflare.com/application-services/products/?_gl=1*1fqsg8y*_gcl_au*MTU0MzQ4NzIwMS4xNzQyMjE4OTk0*_ga*NjkzNTc3NzkzLjE3NDIyMTg5OTQ.*_ga_SQCRB0TXZW*MTc0NTU3ODIzOC4yNS4xLjE3NDU1NzkwMTEuMTkuMC4w"><u>Web Application and API Protection (WAAP) platform</u></a> and <a href="https://blog.cloudflare.com/network-performance-update-cio-edition/"><u>advanced global traffic routing</u></a> capabilities developed as a result of proxying and protecting <a href="https://w3techs.com/technologies/overview/proxy"><u>approximately 20% of websites</u></a>. Our architecture ensures single-pass inspection, regardless of how customers connect. We also consistently hear that this <a href="https://blog.cloudflare.com/spotlight-on-zero-trust"><u>performance is core</u></a> to why customers chose Cloudflare. When customers choose Cloudflare, they’re choosing a unified, resilient platform built for the future.</p><p>By building our SSE platform on top of our own network, it puts Cloudflare in the driver’s seat. Whether that’s implementing best practices like IPv6, incorporating new technologies like WireGuard or <a href="https://blog.cloudflare.com/masque-building-a-new-protocol-into-cloudflare-warp/"><u>MASQUE</u></a>, or safeguarding against the future with <a href="https://www.cloudflare.com/learning/ssl/quantum/what-is-post-quantum-cryptography/"><u>post-quantum encryption</u></a>, by building on our own network we’re able to react quickly as new Internet security standards mature.</p><p>Customers can rely on Cloudflare to solve a broad range of security problems represented by the SSE category. They can also just start with a single component. We know that an entire modernization journey can be an overwhelming prospect for any organization. While all the use cases below are built to work better together, we make it simple for teams to start by just solving one problem at a time.</p>
    <div>
      <h3>Zero Trust access control</h3>
      <a href="#zero-trust-access-control">
        
      </a>
    </div>
    <p>Traditional VPNs have been the backbone of enterprise remote access for decades. However, organizations are <a href="https://www.cloudflare.com/zero-trust/solutions/vpn-replacement/">rapidly moving away from VPNs</a> due to security vulnerabilities, performance bottlenecks, and poor user experience. As businesses adopt <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust principles</a>, they expect modern solutions that:</p><ul><li><p>Improve security posture by enforcing least privilege access and per-resource authorization, eliminating dependence on perimeter-based defenses</p></li><li><p>Enhance user experience with seamless, high-performance connectivity.</p></li><li><p><a href="https://www.cloudflare.com/the-net/everywhere-security/">Reduce complexity and operational overhead</a> by consolidating tools and automating access policies.</p></li></ul><p>Cloudflare enables identity-driven, context-aware policies which replace the traditional <a href="https://www.cloudflare.com/learning/access-management/castle-and-moat-network-security/?_gl=1*q87nt7*_gcl_au*MTcyNTU4My4xNzQyMjIwMTA5*_ga*MTUyNTE2MzE3NC4xNzQyMjIwMTM2*_ga_SQCRB0TXZW*MTc0NTUwMzg1OS4yMS4xLjE3NDU1MDM5MjguNjAuMC4w"><u>castle-and-moat</u></a> model that come with VPN-based solutions. Applications can be made available to employees as well as third parties through a completely clientless deployment. Policies can also be applied to the applications that sit outside your infrastructure to ensure a consistent experience across SaaS applications as well. </p><p>By mid-2026, we plan to ship a number of new access control capabilities, including:</p><ul><li><p><b>Identity provider (IdP) agnostic </b><a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><b><u>multi-factor authentication (MFA)</u></b></a><b>:</b> Admins can enforce step-up MFA without having to direct a user back to an identity provider.</p></li><li><p><b>Just-in-time access controls:</b> Review and approve timely access requests to sensitive resources. Users can request access via tools like Slack and Google Chat.</p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/rdp/rdp-browser/"><b><u>Browser-based RDP</u></b></a><b>:</b> Traditionally, vendors provide a limited number of PoPs which can support clientless RDP. With Cloudflare, customers get highly performant clientless RDP from the browser by connecting to any of Cloudflare’s data centers. This feature enables access to RDP targets without any software installed on the user’s machine.</p></li></ul>
    <div>
      <h3>Secure Web Gateway and DNS filtering</h3>
      <a href="#secure-web-gateway-and-dns-filtering">
        
      </a>
    </div>
    <p>For decades, organizations relied on on-prem hardware firewalls to secure Internet access. Like applications, users have moved beyond the perimeter and <a href="https://www.cloudflare.com/learning/cloud/cloud-native-security/">cloud-based security services</a> have become essential. Modern businesses expect solutions that:</p><ul><li><p>Protect users across locations from malware, ransomware, and other Internet threats</p></li><li><p>Enforce those protections with real-time, comprehensive threat intelligence that adapts with emerging attack vectors</p></li><li><p>Reduce management complexity while maintaining granular policy control across the entire network</p></li></ul><p><a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a>, inspects and filters DNS, network, HTTP, and egress traffic with consistent protections across the Internet and internal resources. Customers adopt our SWG to block threats across remote and office workers, enforce acceptable use policies, encrypt traffic, and block unauthorized SaaS and cloud destinations. In a single-pass architecture, all traffic is verified, filtered, and inspected without the performance penalties seen with hardware-based firewalls and proxies. Threat intelligence is derived from unique real-time visibility across our global network, including 4.3 trillion DNS queries per day, which powers AI-backed threat hunting models to identify, for example, new / newly seen domains before other vendors. </p><p><a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/"><u>Browser isolation</u></a> capabilities are also natively built-in, enabling organizations to insulate users from threats online and protect data in applications with a seamless user experience. For example, isolating web browsing safeguards users from unknown threats, including zero-days, while isolating apps like AI tools can restrict oversharing of proprietary information.</p><p>Customers can get started with a variety of deployment methods including device agents, network locations, PAC files, or DNS over HTTPS (DoH) endpoints. Regardless of implementation, consistent policy enforcement and comprehensive logging is easily accessible through our dashboard, our SQL-based Log Explorer experience, or third-party tools via LogPush.</p><p>By mid-2026, we plan to ship a number of new filtering and traffic handling capabilities, including:</p><ul><li><p>Deep packet inspection to apply filtering to non-standard ports for protocols like HTTP, SSH, and many others.</p></li><li><p>Filtering using Fully Qualified Domain Names (FQDNs): Admins will no longer need to filter packets or egress connections based on destination IP addresses. They will be able to use the FQDN, application name, or destination category with the egress and network policy builders.</p></li><li><p>Identity + PAC files, providing identity-based filtering without having to install the device client.</p></li></ul>
    <div>
      <h3>Cloud firewall</h3>
      <a href="#cloud-firewall">
        
      </a>
    </div>
    <p>Our comprehensive cloud firewall delivers <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">“firewall as a service” protection</a> that helps organizations manage traffic flows globally. All traffic passing through Cloudflare has firewall policies evaluated first, thus providing the first layer of defense, eliminating unnecessary/unwanted traffic before being further evaluated against security policies. The Cloudflare firewall applies configuration changes globally in seconds, thus providing immediate response to emerging needs. With Cloudflare’s network and data center capacity, you get virtually limitless firewall capacity, without the constraints of traditional hardware firewalls, making it a vital component of your Zero Trust and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-defense-in-depth/">defense-in-depth architecture</a>.</p>
    <div>
      <h3>Inline and API-based CASB</h3>
      <a href="#inline-and-api-based-casb">
        
      </a>
    </div>
    <p>SaaS applications relieve IT teams of the burden to host, maintain, and monitor the tools behind their business. However, they also create entirely new headaches for corresponding security teams. Modern organizations need solutions that:</p><ul><li><p>Provide visibility into unauthorized application usage that creates compliance and security risks</p></li><li><p>Enable granular control over data flows within both sanctioned and unsanctioned applications</p></li><li><p>Automate discovery and remediation of security misconfigurations in approved SaaS tools</p></li></ul><p>Any user in an enterprise now needs to connect to an application on the public Internet to do their work, and some users prefer to use their favorite application rather than the ones vetted and approved by the IT department. This kind of Shadow IT infrastructure can lead to <a href="https://www.cloudflare.com/the-net/shadow-it/">surprise fees, compliance violations, and data loss</a>.</p><p>Cloudflare offers comprehensive scanning and filtering to detect when team members are using unapproved tools. With a single click, administrators can block those tools outright or control how those applications can be used. If your marketing team needs to use Google Drive to collaborate with a vendor, you can quickly apply a rule that makes sure they can only download files and never upload. Alternatively, you can allow users to visit an application and read from it while blocking all text input. Cloudflare's Shadow IT policies offer easy-to-deploy controls to help manage how your organization uses the Internet.</p><p>Beyond unsanctioned applications, even approved resources can cause trouble. Your organization might rely on Microsoft OneDrive for day-to-day work, but your compliance policies prohibit your HR department from storing files with employee Social Security numbers in the tool. Cloudflare's <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">Cloud Access Security Broker (CASB) </a>can routinely scan the SaaS applications your team relies on to detect improper usage, missing controls, or potential misconfiguration.</p><p>By mid-2026, we look forward to bringing our customers a slew of new capabilities designed to give teams even better visibility and control over their SaaS and cloud applications, including:</p><ul><li><p><b>Robust remediation capabilities:</b> Resolve detected issues right from the dashboard, both automatically and on-demand with a single click.</p></li><li><p><b>Advanced workflows:</b> Configure automated behavior when new issues are detected, like custom alerting outputs and business justification prompts.</p></li><li><p><b>User and Entity Behavior Analytics (UEBA) &amp; suspicious activity monitoring:</b> Monitor live events across your SaaS apps and detect anomalous/suspicious activity that could indicate compromise.</p></li></ul>
    <div>
      <h3>Data security</h3>
      <a href="#data-security">
        
      </a>
    </div>
    <p>Over the past year, <a href="https://www.cloudflare.com/cio/">CIOs</a> and <a href="https://www.cloudflare.com/ciso/">CISOs</a> have consistently identified data protection as a top concern, particularly regarding artificial intelligence and large language models. As organizations increasingly rely on cloud services and AI tools, they require modern solutions that:</p><ul><li><p>Protect sensitive information across all environments without hampering productivity</p></li><li><p>Provide visibility into how data flows through both internal and external systems</p></li><li><p>Enforce consistent security policies that adapt to evolving regulatory requirements</p></li></ul><p>Cloudflare provides comprehensive visibility and control over data movement and data at rest. This helps organizations avoid the <a href="https://www.cloudflare.com/the-net/pursuing-privacy-first-security/privacy-led-security/">financial impact and reputational consequences of data loss and theft</a>.</p><p>Our data security is an integral component of our SASE platform, providing granular control over how users interact with applications. This approach allows organizations to establish nuanced policies that <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">safeguard sensitive information</a> without completely blocking access to productivity-enhancing technologies.</p><p>We are introducing a number of exciting data protection capabilities by mid-2026, including <a href="https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis/"><u>AI-based DLP detections</u></a>, <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-policies/logging-options/#send-http-requests-to-logpush-destination"><u>delivering simple, innovative forensics</u></a>, <a href="https://blog.cloudflare.com/scan-cloud-dlp-with-casb/"><u>classifying sensitive data in the public cloud</u></a>, and <a href="https://blog.cloudflare.com/cloudflare-acquires-kivera/"><u>innovative, preventative cloud security controls</u></a>. These features provide administrators with robust controls while maintaining the seamless performance and user experience that organizations expect from Cloudflare. </p>
    <div>
      <h3>Digital experience monitoring</h3>
      <a href="#digital-experience-monitoring">
        
      </a>
    </div>
    <p>Organizations today struggle with limited visibility into their users' digital experiences. When performance or availability issues arise, internal support teams often lack the tools to determine whether problems originate in the first, middle, or last mile, resulting in multiple support tickets and delayed resolutions.</p><p>Cloudflare addresses this challenge with a comprehensive monitoring toolkit built on the same systems we use to manage our massive global network in-house. This solution empowers IT teams to:</p><ul><li><p>Collect on-demand forensic and diagnostic information</p></li><li><p>Systematically gather telemetry data</p></li><li><p>Analyze patterns to anticipate issues before they impact productivity</p></li></ul><p>Cloudflare provides unmatched insight into Internet outages and performance trends that affect your users. This intelligence allows administrators to refine their deployments and quickly identify whether issues are localized to their environment or part of broader global disruptions.</p><p>By mid-2026, we plan to ship a number of new <a href="https://www.cloudflare.com/learning/performance/what-is-digital-experience-monitoring/">digital experience monitoring capabilities</a>, including:</p><ul><li><p>Real user monitoring (RUM) that measures the performance of every user’s request.</p></li><li><p>Advanced monitoring for communication applications like Zoom and Microsoft Teams.</p></li><li><p>Contextualizing user performance in terms of global Internet performance data.</p></li></ul>
    <div>
      <h3>Built for what’s next</h3>
      <a href="#built-for-whats-next">
        
      </a>
    </div>
    <p>Security Service Edge forms a critical component of modern enterprise protection, but organizations have modernization requirements across their network infrastructure. Cloudflare designed our capabilities with these needs in mind, because we deliver true convergence of both networking and security from our connectivity cloud.</p><p>Across the industry, we’ve seen many instances where vendors start with either networking or security as their primary focus, and acquire a vendor with an entirely different architecture to enter the SASE market. In such scenarios, there is no convergence with security and networking, because internal traffic is handled through different security controls than the cloud traffic. </p><p>Cloudflare delivers networking services using the same global data centers and backbone as our security components. Our composable architecture ensures all of our services are designed to work together, in any order. This means that your security and networking stays consistent and provides a common destination for your SASE journey, no matter where you start. </p><p>We’re proud of the work that we’ve done to solve customer problems. Cloudflare continues to receive industry-wide recognition, earning additional positions in 2024 for our comprehensive suite of security solutions beyond SSE, built for the enterprise.</p><ul><li><p>Cloudflare named in <a href="https://www.cloudflare.com/lp/gartner-magic-quadrant-cloud-application-platforms-2024/"><u>Gartner® Magic Quadrant™ for Cloud Application Platforms</u></a><sup>2</sup></p></li><li><p>Cloudflare named in <a href="https://www.gartner.com/en/documents/6019335">Gartner® Magic Quadrant™ for Email Security Platforms</a><sup>3</sup></p></li><li><p>Cloudflare named in <a href="https://www.cloudflare.com/lp/gartner-magic-quadrant-single-vendor-sase-2024/"><u>Gartner® Magic Quadrant™ for Single-Vendor SASE</u></a><sup>4</sup></p></li></ul><p>We believe this recognition underscores our position as a pioneering security and networking platform built for tomorrow's challenges. When organizations choose Cloudflare, they gain more than just another SSE vendor; they’re establishing a partnership with a holistic platform capable of addressing their broader spectrum of requirements for both public and private resources, both today and in the future.</p>
    <div>
      <h2>How does that impact customers?</h2>
      <a href="#how-does-that-impact-customers">
        
      </a>
    </div>
    <p>Tens of thousands of organizations trust Cloudflare to secure their teams every day.  We talk to customers directly about that feedback, and they have helped us understand <a href="https://blog.cloudflare.com/why-cios-select-cloudflare-one"><u>why CIOs and CISOs choose Cloudflare One</u></a>. For some teams we offer a cost-efficient opportunity to consolidate point solutions. Others appreciate that the ease-of-use means that many practitioners have set up our solution before they even talk to our team. <a href="https://blog.cloudflare.com/spotlight-on-zero-trust"><u>We know that speed matters</u></a> when we are 46% faster than Zscaler, 56% faster than Netskope, and 10% faster than Palo Alto Networks.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We kicked off 2025 with a <a href="https://www.cloudflare.com/security-week/"><u>week focused on new security features</u></a> that teams can begin deploying now. In the year ahead, look forward to announcements for our Secure Web Gateway, data protection capabilities, digital experience monitoring, and our inline and API CASB tools. And stay tuned for exciting innovations with AI-driven analytics and monitoring tools, too.</p><p>Our commitment in 2025 is the same as it was in 2024. We are going to continue to help your teams solve more security problems so that you can focus on your own mission.</p><p>Ready to hold us to that commitment? Cloudflare offers something unique among the players in this space — you can start using nearly every feature in our SSE platform right now at no cost. Teams of up to 50 users can adopt the solution <a href="https://www.cloudflare.com/zero-trust/products/#overview"><u>for free</u></a> to jumpstart a proof of concept. We believe that organizations of any size should be able to quickly and easily start their journey to modernize security.</p><p>Footnotes:</p><p><sup>1 </sup>Gartner, Magic Quadrant for Security Service Edge, Analyst(s): Charlie Winckless, Thomas Lintemuth, Dale Koeppen, Charanpal Bhogal, May 20, 2025</p><p><sup>2 </sup>Gartner, Magic Quadrant for Cloud Application Platforms, Analyst(s): Tigran Egiazarov, Mukul Saha, Anne Thomas, Steve Schwent, November 1, 2024</p><p><sup>3 </sup>Gartner, Magic Quadrant for Email Security Platforms, Analyst(s): Max Taggett, Nikul Patel, Franz Hinner, Deepak Mishra, December 16, 2024</p><p><sup>4 </sup>Gartner, Magic Quadrant for Single-Vendor SASE, Analyst(s): Andrew Lerner, Neil MacDonald, Jonathan Forest, Charlie Winckless, July 3, 2024</p><p>GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.</p><p>Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SSE]]></category>
            <category><![CDATA[Gartner]]></category>
            <guid isPermaLink="false">3hrGWvhYC2P5tMUc42xvuX</guid>
            <dc:creator>Abe Carryl</dc:creator>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Customers get increased integration with Cloudflare Email Security and Zero Trust through expanded partnership with CrowdStrike]]></title>
            <link>https://blog.cloudflare.com/customers-get-increased-integration-with-cloudflare-email-security-and-zero-trust/</link>
            <pubDate>Wed, 11 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ This post explains how our integrations with CrowdStrike Falcon® Next-Gen SIEM allow customers to identify and investigate risky user behavior and analyze data combined with other log sources to uncover hidden threats. ]]></description>
            <content:encoded><![CDATA[ <p>Today, we’re excited to expand <a href="https://blog.cloudflare.com/unified-risk-posture"><u>our recent Unified Risk Posture announcement</u></a> with more information on our latest integrations with <a href="https://www.crowdstrike.com/"><u>CrowdStrike</u></a>. We <a href="https://blog.cloudflare.com/unified-risk-posture"><u>previously shared</u></a> that our CrowdStrike Falcon Next-Gen SIEM integration allows for deeper analysis and further investigations by unifying first- and third-party data, native threat intelligence, AI, and workflow automation to allow your security teams to focus on work that matters.</p><p>This post explains how Falcon Next-Gen SIEM allows customers to identify and investigate risky user behavior and analyze data combined with other log sources to uncover hidden threats. By combining Cloudflare and CrowdStrike, organizations are better equipped to manage risk and decisively take action to stop cyberattacks.</p><p>By leveraging the combined capabilities of Cloudflare and CrowdStrike, organizations combine Cloudflare’s email security and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust </a>logging capabilities with CrowdStrike’s dashboards and custom workflows to get better visibility into their environments and remediate potential threats. <a href="https://www.happycog.com/">Happy Cog</a>, a full-service digital agency, currently leverages the integration. Co-Founder and President Matthew Weinberg said: </p><blockquote><p>'The integration of Cloudflare’s robust Zero Trust capabilities with CrowdStrike Falcon Next-Gen SIEM enables organizations to gain a more comprehensive view of the threat landscape and take action to mitigate both internal and external risks posed by today’s security challenges.'</p></blockquote>
    <div>
      <h3>Cloudflare Email Security with Falcon Next-Gen SIEM</h3>
      <a href="#cloudflare-email-security-with-falcon-next-gen-siem">
        
      </a>
    </div>
    <p>With <a href="https://developers.cloudflare.com/email-security/"><u>Cloudflare Email Security’s</u></a> configurable policies, organizations can now push indicators of compromise (IoC) alerts to Falcon Next-Gen SIEM, notifying analysts about suspicious activity, such as a user engaging with a phishing email. By proactively alerting analysts when suspicious activity is detected, Cloudflare and CrowdStrike can provide early detection of account compromises or insider threats.</p>
    <div>
      <h3>Cloudflare Zero Trust Logs with Falcon Next-Gen SIEM</h3>
      <a href="#cloudflare-zero-trust-logs-with-falcon-next-gen-siem">
        
      </a>
    </div>
    <p>We are also integrating <a href="https://developers.cloudflare.com/cloudflare-one/"><u>Cloudflare’s Zero Trust</u></a> platform with Falcon Next-Gen SIEM. This allows our mutual customers to push Cloudflare Zero Trust logs from Cloudflare Access and Cloudflare Gateway to Falcon Next-Gen SIEM for better visualization, analysis, and remediation. This integration allows Cloudflare logs to be used to customize and enhance Falcon Next-Gen SIEM detections and trigger CrowdStrike workflows to automatically configure a response action. An example workflow: based on a new detection of a user’s access request being deemed fraudulent, or if a user is engaging with risky websites, the Falcon platform can trigger Cloudflare to move users to affected user groups and apply adaptive access control policies, such as access isolating or quarantining the user.</p>
    <div>
      <h3>How To Get Started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>To connect Cloudflare Zero Trust logs, start with the Falcon Next-Gen SIEM module. Navigate to the Data Connectors tab of your Falcon Next-Gen SIEM dashboard and select the Cloudflare Data Connector.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68WBQjl9Y4v8FFZQ8GD7gd/9e2bfa370303f1a3ccfe7a858089b195/image3.png" />
          </figure><p>Give the connector a name and select “Save”, and you will receive two pieces of information: an API key and an API URL. Be sure to make note of the key, as it will only be shown once.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6VqTqVgB9mf3CHeYomnfkP/6ae503472ca78969f2a8e26201b5b276/image1.png" />
          </figure><p>Next, in Cloudflare, create an <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/http/"><u>HTTP logpush job via API</u></a>, and format the "destination_conf" field as follows:</p><p><code>"destination_conf": "&lt;API URL&gt;?header_Authorization=Bearer%20&lt;API KEY&gt;&amp;tags=&lt;ZONE&gt;,dataset:&lt;DATASET&gt;"</code></p><p>Note: </p><ul><li><p>&lt;ZONE&gt; is optional for account-level logpush jobs </p></li><li><p>&lt;DATASET&gt; follows a dot delimited syntax, so <code>http_requests</code> becomes <code>http.requests</code></p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hWaxWcelja9tY4q6ZSRwT/659bd80980cba2b5988279209fe6fdff/image2.png" />
          </figure><p>Once the job is created and active, you will start to see events populating in the My Connectors section of your Falcon dashboard. Once Cloudflare data is populated in Falcon Next-Gen SIEM, you can now search events and create Falcon Fusion SOAR automation workflows and correlation rules, all based on Cloudflare log events.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7g7PFWfKkHyT8gtKjROCbB/7a09065ff88e2cae7b905b8cc30f6442/image5.png" />
          </figure>
    <div>
      <h3>In Summary</h3>
      <a href="#in-summary">
        
      </a>
    </div>
    <p>Together, CrowdStrike and Cloudflare’s shared telemetry will further decrease the mean time to containment and expedite any organization’s ability to decisively respond to risks within their environment. The two platforms work together as one, allowing organizations to block suspicious activity and deliver high-fidelity alerts to security analysts for further investigation.</p><p>To learn more about these integrations, feel free to <a href="https://www.cloudflare.com/zero-trust/trial/"><u>reach out to us</u></a> to get started with a consultation. We can discuss your existing environment and ensure that you are best equipped to achieve better visibility and remediation in the face of emerging threats.</p> ]]></content:encoded>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2oxT0UhMM8loVoSuUom7W8</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Michael Mcgrory</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
        </item>
        <item>
            <title><![CDATA[Simpler migration from Netskope and Zscaler to Cloudflare: introducing Deskope and a Descaler partner update]]></title>
            <link>https://blog.cloudflare.com/deskope-program-and-asdp-for-descaler/</link>
            <pubDate>Tue, 05 Mar 2024 14:00:38 GMT</pubDate>
            <description><![CDATA[ Today, Cloudflare is excited to expand the Descaler program to Authorized Service Delivery Partners (ASDPs) who will now have exclusive access to the Descaler toolkit. Cloudflare is also launching Deskope, a new set of tooling to also help migrate existing Netskope customers to Cloudflare One ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/158jQPHzctPpFEz7cJC7sQ/9615792204eaf0dfa5e3be18389de0c6/image1-5.png" />
            
            </figure><p>Today, Cloudflare is launching early access to the Deskope Program, a new set of tooling to help migrate existing Netskope customers to Cloudflare One for a faster and easier security experience. In addition, we’re also thrilled to announce the expansion of the <a href="/descaler-program">Descaler Program</a> to Authorized Service Delivery Partners, who will now have exclusive access to the Descaler toolkit to help customers move safely and quickly to Cloudflare.</p>
    <div>
      <h3>Introducing Deskope — Migrate from Netskope to Cloudflare One</h3>
      <a href="#introducing-deskope-migrate-from-netskope-to-cloudflare-one">
        
      </a>
    </div>
    <p>To set the stage, <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> is our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a> platform that combines network connectivity services with <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> on one of the fastest, most resilient, and most composable global networks. The Descaler Program was <a href="/descaler-program">announced</a> in early 2023 as a frictionless path to migrate existing Zscaler customers to Cloudflare One. Today, we are announcing the Deskope Program as a new and equally effortless path to migrate existing Netskope customers to Cloudflare One.</p><p>The Deskope Program follows the same approach as the <a href="/descaler-program">Descaler process</a>, including the tools, process, and partners you need for a frictionless technical migration. This program is completed through architecture workshops, technical migration tooling, and when requested, trusted partner engagements.</p><p>Deskope's approach is based on minimizing manual effort and reducing the potential for error, allowing for a migration experience that is both fast and reliable. Combining automated tools and expert support, we ensure that your Netskope configurations are accurately translated and optimized for Cloudflare's environment. Following an extract, transform, and load sequence using <a href="https://www.cloudflare.com/learning/security/api/what-is-api-call/">API calls</a> to your current Netskope account, the Deskope toolkit will export your current Netskope Next Gen Secure Web Gateway (SWG) configuration and transform it to be Cloudflare One-compatible before migrating it into a new Cloudflare One account (or an existing one, if you’d prefer).</p><p>Drawing from the success of the Descaler process and migrating customers <a href="/descaler-program-update">in just a few hours</a>, Cloudflare is now expanding the offering to customers who wish to migrate from Netskope to Cloudflare One.</p>
    <div>
      <h3>Why Deskope? Speed and simplicity</h3>
      <a href="#why-deskope-speed-and-simplicity">
        
      </a>
    </div>
    <p>When it comes to speed, Cloudflare Gateway, our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway</a>, is simply faster.</p><p>During 2023’s Speed Week, we published a blog called <a href="/spotlight-on-zero-trust">Spotlight on Zero Trust: we're fastest and here's the proof</a> comparing secure web gateway products. This data shows that Cloudflare’s Gateway is faster to more websites from more places than any of our competitors. To quote from the blog:</p><blockquote><p><i>“In one exercise we pitted the</i> <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><i>Cloudflare Gateway</i></a> <i>and WARP client against Zscaler, Netskope, and Palo Alto which all have products that perform the same functions. Cloudflare users benefit from Gateway and Cloudflare’s network being embedded deep into last mile networks close to users, being peered with over 12,000 networks. That heightened connectivity shows because Cloudflare Gateway is the fastest network in 42% of tested scenarios:”</i></p></blockquote><p>But speed without control can be dangerous. The good news is that all the speed is easy to manage and deploy.</p><p>When it comes to simplicity, Cloudflare One is a unified, cloud-native platform that is easy to set up and manage, with a single onboarding wizard that further streamlines setup for both policy and the single-agent deployment to endpoints. This is in contrast to Netskope, where the policy creation process can slow administrators down as they have to first build reusable objects from scratch, so even a basic Secure Web Gateway policy requires many different elements to get started. Cloudflare’s Gateway policy builder is streamlined to allow administrators to quickly set a <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/initial-setup/">policy’s</a> scope by defining conditions for Gateway to match traffic against. Traffic, identity, and even device posture conditions can be joined with logical operators 'AND' or 'OR' to easily manage what would otherwise be complex filtering controls.</p><p>Cloudflare is equally committed to making the migration process as cost-effective as possible using flexible financial options for customers wanting to migrate over.</p><p>As we introduce the Deskope Program, we are equally excited to accelerate Descaler even further by inviting Authorized Service Delivery Partners to leverage the Descaler toolkit to help more customers move to Cloudflare One.</p>
    <div>
      <h3>Welcome Authorized Service Delivery Partners to Descaler</h3>
      <a href="#welcome-authorized-service-delivery-partners-to-descaler">
        
      </a>
    </div>
    <p><a href="/shaping-the-future-cloudflares-service-partner-strategy">In a May 2023 blog post</a> detailing our global services partner strategy and the momentum of our Authorized Service Delivery Partner program, we showcased our partnership with service providers all around the world, highlighting the strategic importance of the program in delivering unparalleled Cloudflare solutions through our trusted network of service providers.</p><p>We are thrilled to announce that our Authorized Service Delivery Partners now have the option to access the Descaler toolkit, along with training and support materials we have developed from our global experience with key customers. This initiative is designed to empower our authorized partners, complementing their existing skills and unique service offerings.</p><p>With access to the Descaler tool, our partners will be even better equipped to assist with your critical migration requirements to Cloudflare. Plans are underway to launch exclusive Descaler training for our partners in March 2024. Access to this training, as well as the Descaler tool itself, will be by invitation only, extended to our authorized partners.</p>
    <div>
      <h3>How to get started Deskoping (or Descaling)</h3>
      <a href="#how-to-get-started-deskoping-or-descaling">
        
      </a>
    </div>
    <p><b>For customers and prospects</b>, joining the Descaler or early access Deskope Programs are as easy as signing up using the link below. From there, the Cloudflare team will reach out to you for further enrollment details. By providing details about your current <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">SSE deployment</a>, ongoing challenges, and future Zero Trust or SASE goals, we’ll be able to hit the ground running. To get started, <a href="https://www.cloudflare.com/lp/sse-migration/">sign up here</a>.</p><p><b>For partners</b>, to get detailed information and to express interest in participating, connect with your assigned Channel Account Manager or Partner Service Delivery Manager. We look forward to supporting our partners in delivering high-quality services and enhancing their capability to meet the evolving needs of the market. If you are a partner with experience in delivering Cloudflare services and would like to become an Authorized Service Delivery Partner, please use this <a href="https://www.cloudflare.com/static/16d21a3680c5673df2c243d3741c5f9e/Authorized_Service_Delivery_Partner_Track_for_CF1.pdf">checklist</a> to get started.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7EVYsgnsLfzMzKRmpUPstx/f393f64ab5dfe66ac216e277b175185c/The-Descaler-cleaning-shelf.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Descaler]]></category>
            <category><![CDATA[Deskope]]></category>
            <guid isPermaLink="false">6owh8mDiiFZs6ND0LGL97d</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Anil Erduran</dc:creator>
            <dc:creator>Denis Kieft</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enhancing security analysis with Cloudflare Zero Trust logs and Elastic SIEM]]></title>
            <link>https://blog.cloudflare.com/enhancing-security-analysis-with-cloudflare-zero-trust-logs-and-elastic-siem/</link>
            <pubDate>Thu, 22 Feb 2024 14:00:26 GMT</pubDate>
            <description><![CDATA[ Today, we are thrilled to announce new Cloudflare Zero Trust dashboards on Elastic. Shared customers using Elastic can now use these pre-built dashboards to store, search, and analyze their Zero Trust logs ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/696ov5uPtgNwN7Qm735ESm/6f88ef27e4cacb8057d6e600fd20d378/image3-7.png" />
            
            </figure><p>Today, we are thrilled to announce new Cloudflare Zero Trust dashboards on Elastic. Shared customers using Elastic can now use these pre-built <a href="https://docs.elastic.co/integrations/cloudflare_logpush#zero-trust-events">dashboards to store, search, and analyze</a> their Zero Trust logs.</p><p>When organizations look to adopt a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust architecture</a>, there are many components to get right. If products are configured incorrectly, used maliciously, or security is somehow breached during the process, it can open your organization to underlying security risks without the ability to get insight from your data quickly and efficiently.</p><p>As a Cloudflare technology partner, Elastic helps Cloudflare customers find what they need faster, while keeping applications running smoothly and <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protecting against cyber threats</a>. “I'm pleased to share our collaboration with Cloudflare, making it even easier to deploy log and analytics dashboards. This partnership combines Elastic's open approach with Cloudflare's practical solutions, offering straightforward tools for enterprise search, observability, and security deployment,” explained Mark Dodds, Chief Revenue Officer at Elastic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7kDqbu2kQvUL1P47N6aDMY/8dacf9b75432a900b32cb900f080366a/image5-3.png" />
            
            </figure>
    <div>
      <h2>Value of Zero Trust logs in Elastic</h2>
      <a href="#value-of-zero-trust-logs-in-elastic">
        
      </a>
    </div>
    <p>With this joint solution, we’ve made it easy for customers to seamlessly forward their Zero Trust logs to Elastic via Logpush jobs. This can be achieved directly via a Restful API or through an intermediary storage solution like AWS S3 or Google Cloud. Additionally, Cloudflare's integration with Elastic has undergone improvements to encompass all categories of Zero Trust logs generated by Cloudflare.</p><p><b>Here are detailed some highlights of what the integration offers:</b></p><ul><li><p><b>Comprehensive Visibility:</b> Integrating Cloudflare Logpush into Elastic provides organizations with a real-time, comprehensive view of events related to Zero Trust. This enables a detailed understanding of who is accessing resources and applications, from where, and at what times. Enhanced visibility helps detect anomalous behavior and potential security threats more effectively, allowing for early response and mitigation.</p></li><li><p><b>Field Normalization:</b> By unifying data from Zero Trust logs in Elastic, it's possible to apply consistent field normalization not only for Zero Trust logs but also for other sources. This simplifies the process of search and analysis, as data is presented in a uniform format. Normalization also facilitates the creation of alerts and the identification of patterns of malicious or unusual activity.</p></li><li><p><b>Efficient Search and Analysis:</b> Elastic provides powerful data search and analysis capabilities. Having Zero Trust logs in Elastic enables quick and precise searching for specific information. This is crucial for investigating security incidents, understanding workflows, and making informed decisions.</p></li><li><p><b>Correlation and Threat Detection:</b> By combining Zero Trust data with other security events and data, Elastic enables deeper and more effective correlation. This is essential for detecting threats that might go unnoticed when analyzing each data source separately. Correlation aids in pattern identification and the detection of sophisticated attacks.</p></li><li><p><b>Prebuilt Dashboards:</b> The integration provides out-of-the-box dashboards offering a quick start to visualizing key metrics and patterns. These dashboards help security teams visualize the security landscape in a clear and concise manner. The integration not only provides the advantage of prebuilt dashboards designed for Zero Trust datasets but also empowers users to curate their own visualizations.</p></li></ul>
    <div>
      <h2>What’s new on the dashboards</h2>
      <a href="#whats-new-on-the-dashboards">
        
      </a>
    </div>
    <p>One of the main assets of the integration is the out-of-the-box dashboards tailored specifically for each type of Zero Trust log. Let's explore some of these dashboards in more detail to find out how they can help us in terms of visibility.</p>
    <div>
      <h3>Gateway HTTP</h3>
      <a href="#gateway-http">
        
      </a>
    </div>
    <p>This dashboard focuses on HTTP traffic and allows for monitoring and analyzing HTTP requests passing through Cloudflare's <a href="https://www.cloudflare.com/zero-trust/products/gateway/">Secure Web Gateway</a>.</p><p>Here, patterns of traffic can be identified, potential threats detected, and a better understanding gained of how resources are being used within the network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2C5VeJ6U4MfZjn7cmHgAPn/0e2600c2f5cfdd83d9f9713d60454cc0/image2-10.png" />
            
            </figure><p>Every visualization in the stage is interactive. Therefore, the whole dashboard adapts to enabled filters, and they can be pinned across dashboards for pivoting. For instance, if clicking on one of the sections of the donut showing the different actions, a filter is automatically applied on that value and the whole dashboard is oriented around it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oHgZ74rXxV1we32WHqsye/ae9d1d99546257b6a6140e0a94947ca8/image1-9.png" />
            
            </figure>
    <div>
      <h3>CASB</h3>
      <a href="#casb">
        
      </a>
    </div>
    <p>Following with a different perspective, the <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB (Cloud Access Security Broker)</a> dashboard provides visibility over cloud applications used by users. Its visualizations are targeted to detect threats effectively, helping in the risk management and regulatory compliance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79LR83kaKlJg7kzZS5ewTq/5e86a9bcf83db0940d14aef082c7fdde/image4-5.png" />
            
            </figure><p>These examples illustrate how dashboards in the integration between Cloudflare and Elastic offer practical and effective data visualization for Zero Trust. They enable us to make data-driven decisions, identify behavioral patterns, and proactively respond to threats. By providing relevant information in a visual and accessible manner, these dashboards strengthen security posture and allow for more efficient risk management in the Zero Trust environment.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>Setup and deployment is simple. Use the Cloudflare dashboard or API to create Logpush jobs with all fields enabled for each dataset you’d like to ingest on Elastic. There are eight account-scoped datasets available to use today (Access Requests, Audit logs, CASB findings, Gateway logs including DNS, Network, HTTP; Zero Trust Session Logs) that can be ingested into Elastic.</p><p>Setup <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/elastic/">Logpush jobs</a> to your Elastic destination via one of the following methods:</p><ul><li><p><b>HTTP Endpoint mode</b> - Cloudflare pushes logs directly to an HTTP endpoint hosted by your Elastic Agent.</p></li><li><p><b>AWS S3 polling mode</b> - Cloudflare writes data to S3 and Elastic Agent polls the S3 bucket by listing its contents and reading new files.</p></li><li><p><b>AWS S3 SQS mode</b> - Cloudflare writes data to S3, S3 pushes a new object notification to SQS, Elastic Agent receives the notification from SQS, and then reads the S3 object. Multiple Agents can be used in this mode.</p></li></ul>
    <div>
      <h3>Enabling the integration in Elastic</h3>
      <a href="#enabling-the-integration-in-elastic">
        
      </a>
    </div>
    <ol><li><p>In Kibana, go to Management &gt; Integrations</p></li><li><p>In the integrations search bar type Cloudflare Logpush.</p></li><li><p>Click the Cloudflare Logpush integration from the search results.</p></li><li><p>Click the Add Cloudflare Logpush button to add Cloudflare Logpush integration.</p></li><li><p>Enable the Integration with the HTTP Endpoint, AWS S3 input or GCS input.</p></li><li><p>Under the AWS S3 input, there are two types of inputs: using AWS S3 Bucket or using SQS.</p></li><li><p>Configure Cloudflare to send logs to the Elastic Agent.</p></li></ol>
    <div>
      <h2>What’s next</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>As organizations increasingly adopt a Zero Trust architecture, understanding your organization’s security posture is paramount. The dashboards help with necessary tools to build a robust security strategy, centered around visibility, early detection, and effective threat response.  By <a href="https://www.cloudflare.com/learning/security/what-is-siem/">unifying data</a>, normalizing fields, facilitating search, and enabling the creation of custom dashboards, this integration becomes a valuable asset for any cybersecurity team aiming to strengthen their security posture.</p><p>We’re looking forward to continuing to connect Cloudflare customers with our community of technology partners, to help in the adoption of a Zero Trust architecture.</p><p>Explore this new integration today.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Logs]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[SIEM]]></category>
            <category><![CDATA[Elastic]]></category>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">6amHiWxrNpxWRyQhTWFUSu</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Chema Martínez (Guest Author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[What’s next for Cloudflare One’s data protection suite]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-data-protection-roadmap-preview/</link>
            <pubDate>Thu, 07 Sep 2023 13:00:31 GMT</pubDate>
            <description><![CDATA[ Cloudflare One just launched its data protection suite. This blog previews new functionality to protect data and code in SaaS environments with our DLP and CASB services and looks back on what we have built over the past year ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4WClMGClAUrNY0rHmGzotr/6e13a6250104ebc9b9b6cdff4a34128d/image1-2.png" />
            
            </figure><p>Today, we announced Cloudflare One for Data Protection — a unified suite to protect data everywhere across web, SaaS, and private applications. This suite converges capabilities including our <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data loss prevention (DLP)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">cloud access security broker (CASB)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust network access (ZTNA)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation (RBI)</a>, and <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">cloud email security</a> services. The suite is available and packaged now as part of <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform.</p><p>In the <a href="https://cflr.re/data-protection-announcement-blog">announcement post</a>, we focused on how the data protection suite helps customers navigate modern data risks, with recommended use cases and real-world customer examples.</p><p>In this companion blog post, we recap the capabilities built into the Cloudflare One suite over the past year and preview new functionality that customers can look forward to. This blog is best for practitioners interested in protecting data and SaaS environments using Cloudflare One.</p>
    <div>
      <h2>DLP &amp; CASB capabilities launched in the past year</h2>
      <a href="#dlp-casb-capabilities-launched-in-the-past-year">
        
      </a>
    </div>
    <p>Cloudflare launched both <a href="/inline-dlp-ga/">DLP</a> and <a href="/casb-ga/">CASB</a> services in September 2022, and since then have rapidly built functionality to meet the growing needs of our organizations of all sizes. Before previewing how these services will evolve, it is worth recapping the many enhancements added in the past year.</p><p>Cloudflare’s <a href="/inline-dlp-ga/">DLP</a> solution helps organizations detect and protect sensitive data across their environment based on its several characteristics. DLP controls can be critical in preventing (and detecting) damaging leaks and ensuring compliance for regulated classes of data like financial, health, and <a href="https://www.cloudflare.com/learning/privacy/what-is-pii/">personally identifiable</a> information.</p><p>Improvements to DLP detections and policies can be characterized by three major themes:</p><ul><li><p><b>Customization:</b> making it easy for administrators to design DLP policies with the flexibility they want.</p></li><li><p><b>Deep detections:</b> equipping administrators with increasingly granular controls over what data they protect and how.</p></li><li><p><b>Detailed detections:</b> providing administrators with more detailed visibility and logs to analyze the efficacy of their DLP policies.</p></li></ul><p>Cloudflare’s <a href="/casb-ga/">CASB</a> helps organizations connect to, scan, and monitor third-party SaaS applications for misconfigurations, improper data sharing, and other security risks — all via lightweight API integrations. In this way, organizations can regain visibility and controls over their growing investments in SaaS apps.</p><p>CASB product enhancements can similarly be summarized by three themes:</p><ul><li><p><b>Expanding API integrations:</b> Today, our CASB integrates with <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/">18 of the most popular SaaS apps</a> — Microsoft 365 (including OneDrive), Google Workspace (including Drive), Salesforce, GitHub, and more. Setting up these API integrations takes fewer clicks than first-generation CASB solutions, with comparable coverage to other vendors in the <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">Security Services Edge (SSE)</a> space.</p></li><li><p><b>Strengthening findings of CASB scans:</b> We have made it easier to remediate the misconfigurations identified by these CASB scans with both prescriptive guides and in-line policy actions built into the dashboard.</p></li><li><p><b>Converging CASB &amp; DLP functionality:</b> We started enabling organizations to <a href="/casb-dlp/">scan SaaS apps for sensitive data, as classified by DLP policies</a>. For example, this helps organizations detect when credit cards or social security numbers are in Google documents or spreadsheets that have been made publicly available to anyone on the Internet.</p></li></ul><p>This last theme, in particular, speaks to the value of unifying data protection capabilities on a single platform for simple, streamlined workflows. The below table highlights some major capabilities launched since our general availability announcements last September.</p>
    <div>
      <h3>Table 1: Select DLP and CASB capabilities shipped since 2022 Q4</h3>
      <a href="#table-1-select-dlp-and-casb-capabilities-shipped-since-2022-q4">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Theme</span></th>
    <th><span>Capability</span></th>
    <th><span>Description</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>DLP: Customizability</span></td>
    <td><a href="http://staging.blog.mrk.cfdata.org/cloudflare-dlp-mip/"><span>Microsoft Information Protection labels integration</span></a></td>
    <td><span>After a quick API integration, Cloudflare syncs continuously with the Microsoft Information Protection (MIP) labels you already use to streamline how you build DLP policies.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/custom-dlp-profiles/"><span>Custom DLP profiles</span></a></td>
    <td><span>Administrators can create custom detections using the same regex policy builder used across our entire Zero Trust platform for a consistent configuration experience across services.</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/"><span>Match count controls</span></a></td>
    <td><span>Administrators can set minimum thresholds for the number of times a detection is made before an action (like block or log) is triggered. This way, customers can create policies that allow individual transactions but block up/downloads with high volumes of sensitive data.</span></td>
  </tr>
  <tr>
    <td><span>DLP: Deepening detection</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/"><span>Context analysis</span></a></td>
    <td><span>Context analysis helps reduce false positive detections by analyzing proximity keywords (for example: seeing “expiration date” near a credit card number increases the likelihood of triggering a detection).</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-type"><span>File type control</span></a></td>
    <td><span>DLP scans can be scoped to specific file types, such as Microsoft Office documents, PDF files, and ZIP files.</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/"><span>Expanded predefined DLP profiles</span></a></td>
    <td><span>Since launch, DLP has built out a wider variety of detections for common data types, like financial data, personal identifiers, and credentials.</span></td>
  </tr>
  <tr>
    <td><span>DLP: Detailed detections</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/#http-logs"><span>Expanded logging details</span></a><span> </span></td>
    <td><span>Cloudflare now captures more wide-ranging and granular details of DLP-related activity in logs, including payload analysis, file names, and higher fidelity details of individual files. A large percentage of our customers prefer to push these logs to SIEM tools like </span><a href="http://staging.blog.mrk.cfdata.org/integrate-cloudflare-zero-trust-with-datadog-cloud-siem/"><span>DataDog</span></a><span> and </span><a href="http://staging.blog.mrk.cfdata.org/zero-trust-signals-to-sumo-logic/"><span>Sumo Logic</span></a><span>.</span></td>
  </tr>
  <tr>
    <td><span>CASB: Expanding integrations and findings</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><span>API-based integrations</span></a><br /><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/manage-findings/"><span>Managing findings</span></a></td>
    <td><span>Today, Cloudflare integrates with 18 of the most widely used SaaS apps, including productivity suites, cloud storage, chat tools, and more. </span><br /><span>API-based scans not only reveal misconfigurations, but also offer built-in HTTP policy creation workflows and step-by-step remediation guides. </span></td>
  </tr>
  <tr>
    <td><span>DLP &amp; CASB convergence</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-dlp/"><span>Scanning for sensitive data in SaaS apps</span></a></td>
    <td><span>Today, organizations can set up CASB to scan every publicly accessible file in Google Workspace for text that matches a DLP profile (financial data, personal identifiers, etc.).</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h2>New and upcoming DLP &amp; CASB functionality</h2>
      <a href="#new-and-upcoming-dlp-casb-functionality">
        
      </a>
    </div>
    <p>Today’s launch of <a href="http://cfl.re/data-protection-press-release">Cloudflare One’s data protection suite</a> crystalizes our commitment to keep investing in DLP and CASB functionality across these thematic areas. Below we wanted to preview a few new and upcoming capabilities on the Cloudflare One’s data protection suite roadmap that will become available in the coming weeks for further visibility and controls across data environments.</p>
    <div>
      <h3><i>Exact data matching with custom wordlists</i></h3>
      <a href="#exact-data-matching-with-custom-wordlists">
        
      </a>
    </div>
    <p><b>Already shipped:</b> <a href="/edm-beta/">Exact Data Match</a>, moves from out of beta to general availability, allowing customers to tell Cloudflare’s DLP exactly what data to look for by uploading a dataset, which could include names, phone numbers, or anything else.</p><p><b>Next 30 days:</b> Customers will soon be able to upload a list of specific words, create DLP policies to search for those important keywords in files, and block and log that activity.</p><p><b>How customers benefit:</b> Administrators can be more specific about what they need to protect and save time creating policies by bulk uploading the data and terms that they care most about. Over time, many organizations have amassed long lists of terms configured for incumbent DLP services, and these customizable upload capabilities <a href="/descaler-program-update/">streamline migration from other vendors</a> to Cloudflare. Just as with all other DLP profiles, Cloudflare searches for these custom lists and keywords within in-line traffic and in integrated SaaS apps.</p>
    <div>
      <h3><i>Detecting source code and health data</i></h3>
      <a href="#detecting-source-code-and-health-data">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Soon, Clouflare’s DLP will include predefined profiles to detect developer source code and <a href="https://www.cloudflare.com/learning/privacy/what-is-hipaa-compliance/">protected health information (PHI)</a>. Initially, code data will include languages like Python, Javascript, Java, and C++ — four of the most popular languages today — and PHI data will include medication and diagnosis names — two highly sensitive medical topics.</p><p><b>How customers benefit:</b> These predefined profiles expand coverage to some of the most valuable — and in the case of PHI, one of the most regulated — types of data within an organization.</p>
    <div>
      <h3><i>Converging API-driven CASB &amp; DLP for data-at-rest protections</i></h3>
      <a href="#converging-api-driven-casb-dlp-for-data-at-rest-protections">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Soon, organizations will be able to scan for sensitive data at rest in Microsoft 365 (e.g. OneDrive). API-based scans of these environments will flag, for example, whether credit card numbers, source code, or other data configured via DLP policies reside within publicly accessible files. Administrators can then take prescriptive steps to remediate via in-line CASB gateway policies.</p><p><b>Shipping by the end of the year:</b> Within the next few months, this same integration will be available with GitHub.</p><p><b>How customers benefit:</b> Between the existing <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-dlp/">Google Workspace</a> integration and this upcoming Microsoft 365 integration, customers can scan for sensitive data across two of the most prominent cloud productivity suites — where users spend much of their time and where large percentages of organizational data lives. This new Microsoft integration represents a continued investment in streamlining security workflows across the Microsoft ecosystem — whether for <a href="/expanding-our-collaboration-with-microsoft-proactive-and-automated-zero-trust-security/">managing identity and application access</a>, <a href="/cloudflare-microsoft-intune-partner-to-give-cisos-secure-control-across-devices-applications/">enforcing device posture</a>, or <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/azuread-risky-users/?cf_target_id=9878E2009FA06D9AC4B5552DD9D7E75D">isolating risky users</a>.</p><p>The GitHub integration also restores visibility over one of the most critical developer environments that is also increasingly a risk for <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data leaks</a>. In fact, according to <a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2023">GitGuardian</a>, 10 million hard-coded secrets were exposed in public GitHub commits in 2022, a figure that is up 67% from 2021 and only expected to grow. Preventing source code exposure on GitHub is a problem area our product team regularly hears from our customers, and we will continue to prioritize securing developer environments.</p>
    <div>
      <h3><i>Layering on Zero Trust context: User Risk Score</i></h3>
      <a href="#layering-on-zero-trust-context-user-risk-score">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Cloudflare will introduce a risk score based on user behavior and activities that have been detected across Cloudflare One’s services. Organizations will be able to detect user behaviors that introduce risk from action like an Impossible Travel anomaly or detections from too many DLP violations in a given period of time. Shortly following the detection capabilities will be the option to take preventative or remediative policy actions, within the wider Cloudflare One suite. In this way, organizations can control access to sensitive data and applications based on changing risk factors and real-time context.</p><p><b>How customers benefit:</b> Today, intensive time, labor, and money are spent on analyzing large volumes of log data to identify patterns of risk. Cloudflare's ‘out-of-the-box’ risk score simplifies that process, helping organizations gain visibility into and lock down suspicious activity with speed and efficiency.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>These are just some of the capabilities on our short-term roadmap, and we can’t wait to share more with you as the data protection suite evolves. If you’re ready to explore how Cloudflare One can protect your data, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">request a workshop</a> with our experts today.</p><p>Or to learn more about how Cloudflare One protects data, read <a href="https://cfl.re/data-protection-press-release">today’s press release</a>, visit our <a href="https://www.cloudflare.com/zero-trust/solutions/data-protection">website</a>, or dive deeper with a <a href="https://cfl.re/data-protection-demo">technical demo</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">5UtpTLoZcB9dgL16R3HWNw</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Descale your network with Cloudflare’s enhanced Descaler Program]]></title>
            <link>https://blog.cloudflare.com/descaler-program-update/</link>
            <pubDate>Thu, 22 Jun 2023 13:00:38 GMT</pubDate>
            <description><![CDATA[ At its core, the Descaler Program helps derisk change. It’s designed to be simple and straightforward, with resources to ensure a smooth transition and supporting technology to ensure the migration achieves your organization's goals ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4FQY6zNk7rpdYUKaFPRSG2/6b79b732952be3fb095084faeee0ab36/image2-25.png" />
            
            </figure><p>Speed matters, especially when it comes to exiting a slower service and transitioning to a new one. Back in March, 2023, we announced the <a href="/descaler-program/">Descaler Program</a>, a frictionless path to migrate existing Zscaler customers to Cloudflare One. This program makes it easy for customers to make the switch to a <a href="/network-performance-update-cio-edition/">faster</a>, simpler, and more agile foundation for security and network transformation with Cloudflare.</p><p>Through repeated engagements with customers of all sizes, we've improved the Descaler tooling to allow Zscaler to Cloudflare configuration migrations to be completed in hours, not days. This accelerated transition has helped organizations meet migration deadlines and eliminate countless hours of manual migration effort without skipping a beat. Today we’re excited to share more stories from customers and the amount of time it took them to ‘descale’.</p>
    <div>
      <h3>Cloudflare One and the Descaler Program</h3>
      <a href="#cloudflare-one-and-the-descaler-program">
        
      </a>
    </div>
    <p>As a quick recap, <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> is our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a> platform that combines network connectivity services with <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security services</a> on one of the fastest, most resilient and most composable global networks. The platform dynamically connects users to enterprise resources, with identity-based security controls delivered close to users, wherever they are.</p><p>At its core, the Descaler Program helps derisk change. It’s designed to be simple and straightforward, with resources to ensure a smooth transition and supporting technology to ensure the migration achieves your organization's goals. The magic of this process is in the technology and its simplicity. Following extract, transform, and load best practices, using supported and documented <a href="https://www.cloudflare.com/learning/security/api/what-is-api-call/">API calls</a> to your current account, the Descaler toolkit will export your current configuration and settings and transform them to be Cloudflare One-compatible before migrating into a new Cloudflare One account.</p><p>A question almost every customer asked was “so, how long is this going to take?”. The answer? As soon as you can meet with the Cloudflare team.</p>
    <div>
      <h3>Migrate in minutes, not months</h3>
      <a href="#migrate-in-minutes-not-months">
        
      </a>
    </div>
    <p>The speed at which customers are able to move from Zscaler ZIA to <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> continually gets faster. As the title of this blog post implies, it usually takes more time to set up a meeting with the right technical administrators than to migrate settings, configurations, lists, policies and more to Cloudflare. We’ve seen this time continue to get faster through Descaler engagements. But it wasn’t this way from the onset. To be the fastest at everything we do, it means iterating and learning from customers to find the best solution possible. Here are three customer stories of doing just that.</p>
    <div>
      <h3>Customer migration time: seven days | “Is there a summary available?”</h3>
      <a href="#customer-migration-time-seven-days-is-there-a-summary-available">
        
      </a>
    </div>
    <p>A UK ecommerce giant with 7,500 employees sought a solution that could provide them with faster, safer access to corporate resources and SaaS apps while eliminating the exorbitant costs associated with Zscaler. With Descaler, they achieved this goal in just one week. Our streamlined migration process ensured minimal disruption to their operations, empowering them to seamlessly transition to Cloudflare One before a tight renewal deadline. By reducing the time and cost involved in the migration, they were able to focus on what matters most—driving their business forward.</p><p>To better communicate what is available to be moved into Cloudflare Gateway, the team was curious on what objects they had active in their account in a simplified view. Based on this feedback, the Cloudflare team added the option for the Descaler tool to provide a summary of what will be moved to Cloudflare, as shown below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/11IUOxkfyrz4AT6AWME5Jd/91c849939bee18182e981bd862070c90/image3-20.png" />
            
            </figure><p>Sample Descaler summary output</p>
    <div>
      <h3>Customer migration time: two days | Lots and lots of lists</h3>
      <a href="#customer-migration-time-two-days-lots-and-lots-of-lists">
        
      </a>
    </div>
    <p>For a US-based Fortune 100 oil and gas company with nearly 20,000 employees, the key priority was to streamline their application, network, and security services. With Descaler, they were able to move over more of their security service and achieved this objective in just under two days. Cloudflare’s intuitive dashboard provided them with a single pane of glass to manage all their services efficiently, simplifying their operations and enhancing their overall productivity. The speed at which Descaler facilitated their migration allowed them to seamlessly consolidate their services, unlocking new levels of efficiency and cost savings.</p><p>The team had also put a significant amount of effort into curating lists of IP addresses, hostnames, and URLs of sites and services used in their filtering policies. These thousands of items were transformed and loaded into their new Cloudflare production account almost instantly. With some minor testing, they were able to save hours of copying and retain their security intelligence.</p>
    <div>
      <h3>Customer migration time: 24 hours | “What about Terraform?”</h3>
      <a href="#customer-migration-time-24-hours-what-about-terraform">
        
      </a>
    </div>
    <p>Recently a prominent Australian based telecommunications company that owns one of the countries largest fiber networks prioritized employee Internet security and the prevention of malware attacks. Descaler played a crucial role in their quest to protect users and block malware, with a configuration migration time of less than 24 hours. By migrating to Cloudflare One, they ensured their employees had access to robust security features and comprehensive protection, bolstering their defense against potential threats.</p><p>Having <a href="https://developers.cloudflare.com/cloudflare-one/api-terraform/access-with-terraform/">Terraform</a> output was table stakes for this organization and many others the team interacted with. Terraform is a tool for building, changing, and versioning infrastructure, and provides components and documentation for building Cloudflare resources. Without the ability to manage their Cloudflare configuration as infrastructure-as-code, it meant breaking their normal workflows. From this feedback the Descaler team added the option to export the configuration in a shareable Terraform file which was then shared with the customer.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7IJ11oMdzZrmQON1SWjNX7/fd26cc8d0429d82fdd9a14afe0c3a786/image4-18.png" />
            
            </figure>
    <div>
      <h3>How to get started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>Migration times are still getting faster and the overall process even smoother due to iterations like the ones mentioned above. We’re excited to invite new customers to take advantage of the program by signing up using the link below. From there, the Cloudflare team will reach out to you with further enrollment details.</p><p>With the Descaler Program we’re excited to offer a clear path for customers to make the switch to Cloudflare One. To get started, <a href="https://cloudflare.com/lp/zscaler-migration/">sign up here</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/77Epp66D8RfFs872OVgQwC/5a77963fee0823dd2a9ed860225b7cb5/image1-29.png" />
            
            </figure> ]]></content:encoded>
            <category><![CDATA[Speed Week]]></category>
            <guid isPermaLink="false">7EQGADuzCdJ86jb5dD1W9U</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Denis Kieft</dc:creator>
        </item>
        <item>
            <title><![CDATA[No hassle migration from Zscaler to Cloudflare One with The Descaler Program]]></title>
            <link>https://blog.cloudflare.com/descaler-program/</link>
            <pubDate>Tue, 14 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is excited to launch the Descaler Program, a frictionless path to migrate existing Zscaler customers to Cloudflare One. Cloudflare is making it even easier for enterprise customers to make the switch to a faster, simpler, and more agile foundation for security and network transformation ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/aVioJtBFJgD00GSrE44Le/f10a5c7f18a73f71e85a038d98e2c0eb/image3-18.png" />
            
            </figure><p>Today, Cloudflare is excited to launch the Descaler Program, a frictionless path to migrate existing Zscaler customers to Cloudflare One. With this announcement, Cloudflare is making it even easier for enterprise customers to make the switch to a <a href="/network-performance-update-cio-edition/">faster</a>, simpler, and more agile foundation for security and network transformation.</p><p>Zscaler customers are increasingly telling us that they’re unhappy with the way in which they have to manage multiple solutions to achieve their goals and with the commercial terms they are being offered. Cloudflare One offers a larger network, a ‘single stack’ solution with no service chaining that enables innovation at an incredible rate, meaning lots of new product and feature releases.</p><p>At its core, the Descaler Program helps derisk change. It’s designed to be simple and straightforward, with technical resources to ensure a smooth transition and strategic consultation to ensure the migration achieves your organization's goals. Customers can expect to be up and running on Cloudflare One in a matter of weeks without disruption to their business operations.</p>
    <div>
      <h2>What makes up the Descaler Program?</h2>
      <a href="#what-makes-up-the-descaler-program">
        
      </a>
    </div>
    <p>Knowledgeable people. Clear process. Like-magic technology. Getting the people, process, and technology right is critical for any successful change. That’s why we’ve brought together the best of each to help customers experience a frictionless migration to Cloudflare One.</p><p><a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> is our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a> platform that combines network connectivity services with <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security services</a> on one of the fastest, most resilient and most composable global networks. The platform dynamically connects users to enterprise resources, with identity-based security controls delivered close to users, wherever they are.</p>
    <div>
      <h3>Eligibility</h3>
      <a href="#eligibility">
        
      </a>
    </div>
    <p>Enterprise organizations who use competitive security products from Zscaler, such as ZIA or ZPA, and have 1,000 employees or more are eligible to participate. The Descaler Program builds in resources and touch points with Cloudflare experts on two related paths – one focused on technical success, the other focused on business success.</p>
    <div>
      <h3>Technology success</h3>
      <a href="#technology-success">
        
      </a>
    </div>
    <p>Administrators rejoice. The Descaler Program includes the tools, process and partners you need for a frictionless technical migration.</p><p><b>1. Architecture workshops</b>. Our experts and yours will take a fresh look at where you are and where you need to go over the next two to three years to enable digital transformation. This interactive session with Cloudflare experts will help us focus together on the most meaningful migration paths for your organization and dive into the supporting technologies available to make the transition to Cloudflare even easier.</p><p>Outcomes from this mutual investment of time will include a custom migration plan, access to the Descaler toolkit, and dedicated resources from Cloudflare to facilitate a seamless cutover while sharpening focus on your short, medium, and long term business goals facilitated through networking and security technology. You will leave with a better understanding of your migration path to an Internet-native SASE platform, but more importantly, how you can make Zero Trust and SASE concepts tangible for your business.</p><p><b>2. Technical migration tools</b>. In addition to providing people and processes focused on supporting your migration, Cloudflare can help you leverage a suite of technical tools and scripts that in just a few clicks, automatically export settings and configurations of already deployed Zscaler products to be migrated into Cloudflare One. This toolkit is positioned to save countless hours of unnecessary point-and-click time wasted.</p><p>The magic of this flow is in its simplicity. Following extract, transform, and load (ETL) best practices, using supported and documented API calls to your current account, the Descaler toolkit will export your current configuration and settings from ZIA or ZPA, transform them to be Cloudflare One-compatible before migrating into a new Cloudflare One account.</p><p>Take a ZPA application for example, the Descaler toolkit will look at existing settings around Application name, Domain/SNI, IPs, Ports allowed, Protocols allowed, User groups, and more before exporting, transforming, and importing into a new Cloudflare One account. In situations where time is of the essence, quick time to value migration paths can be taken. For example, if faced with an urgent ZIA migration then it's simply a matter of switching over DNS to get a baseline of protection, turning off Zscaler and then managing the process to deploy WARP and a full Secure Web Gateway in short order.</p><p><b>Getting started with the toolkit</b>You’ll first be asked to create a new API key in your ZIA or ZPA account. From there the Cloudflare team will share the toolkit to be run locally by one of your system administrators alongside members of the Cloudflare team to support in case there are any questions. Cloudflare won’t ever need or ask for your API key, just the outputs. Cloudflare will then use the output to transform and load the configurations into a newly provisioned Cloudflare One account.</p><p>The Descaler toolkit only performs read and list API requests to your Zscaler account. In scenarios where systems or services you wish to migrate do not map 1:1, the Cloudflare team and our Authorized Partners will be standing by to assist in making the migration process as smooth as possible.</p><p><b>3. Trusted partner engagements.</b> The <a href="https://www.cloudflare.com/partners/">Cloudflare Partner Network</a> includes service and implementation partners who deliver security, reliability and performance solutions with a broad range of value-added services. Our Technology Partners offer customers complementary solutions within the cloud stack for hands-on keyboard assistance when desired. Back in January we announced the <a href="/cloudflare-one-authorized-services-delivery-partner-track/">Authorized Partner Service Delivery Track</a> for Cloudflare One and are excited to connect customers to authorized partners that meet Cloudflare’s high standards for professional services delivery.</p><p>As the Descaler Program continues to grow additional capabilities such as full technical training with customer certification courses along with support for in-house professional services and authorized partner professional services delivery are being explored to make the transition process even easier. This is only the beginning of the technical resources being made available to customers looking to make the switch to Cloudflare.</p>
    <div>
      <h3>Business components</h3>
      <a href="#business-components">
        
      </a>
    </div>
    <p>For CxOs, it couldn’t be more clear when it comes to showing tangible business value and cost savings that impact your businesses bottom line.</p><ol><li><p><b>Return On Investment (ROI) calculation</b>. We value showing, not just telling you about the value from Cloudflare One. We want to make sure customers migrating anything recognize the quantifiable business impacts that can potentially be realized by moving to the Cloudflare One platform.</p></li><li><p><b>Escape hatch for your current contract.</b> Don’t let your existing contract be a stopper to your long term security modernization. Cloudflare is committed to making the migration process as cost-effective as possible – which means tools and flexible financial options for customers to reach escape velocity from Zscaler and land safely with Cloudflare. You won’t regret this interaction come renewal time.</p></li><li><p><b>Zero Trust roadmap assessment</b>. Going from zero to Zero Trust means looking ahead to what’s next with a concrete understanding of where you are today. For business leaders, that means using resources like our vendor-agnostic <a href="https://cfl.re/zero-trust-roadmap-wp">Zero Trust Roadmap</a> to map out future initiatives today with help from architects, engineers and other business leaders.</p></li></ol><p>If your Internet pipes are all clogged up then use The Descaler Program to get a faster flow:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48LfPu4KlKI1ikNATvSwJd/37b90f5c10ae0fd373fb7db8b86e851e/Cf-vs-Zscaler-1.png" />
            
            </figure><p>[2] <a href="/network-performance-update-cio-edition">https://blog.cloudflare.com/network-performance-update-cio-edition</a>, SWG = Secure Web Gateway, RBI = Remote Browser Isolation, ZTNA = Zero Trust Network Access.</p>
    <div>
      <h2>Why migrating from Zscaler to Cloudflare One just makes sense</h2>
      <a href="#why-migrating-from-zscaler-to-cloudflare-one-just-makes-sense">
        
      </a>
    </div>
    <p>More and more organizations are choosing Cloudflare over Zscaler to modernize security, and when they do, they typically cite our strengths across a few key evaluation criteria:</p><ol><li><p><b>User experience:</b> IT and security administrators have found our services easier to deploy and simpler to manage. End users benefit from <a href="/network-performance-update-cio-edition/">faster performance across security services</a>. Whereas Zscaler’s fragmented clouds and piecemeal services add management complexity over time, Cloudflare offers a single, unified control plane that keeps your organization progressing quickly towards its security goals.</p></li><li><p><b>Connectivity:</b> Customers value the reliability and scalability of our larger global network footprint to secure any traffic. Plus, unlike Zscaler, Cloudflare’s network is designed to run every service in every location to ensure consistent protections for users around the world.</p></li><li><p><b>Agility for the future:</b> Customers recognize that progressing towards Zero Trust and SASE require long-term partnerships. For that journey, they trust in Cloudflare’s track record of rapid innovation and value our flexible architecture to adopt new security standards and technologies and stay ahead of the curve.</p></li></ol><p>These are just a few reasons why organizations choose Cloudflare – and if you’re looking for even more reasons and customer stories, we encourage you to check out this <a href="/why-cios-select-cloudflare-one/">recent blog post.</a></p><p>If you’re looking to motivate your colleagues to take advantage of the Descaler Program, we encourage you to explore more direct comparisons with <a href="https://cfl.re/cloudflare-vs-zscaler-infographic">this infographic</a> or <a href="https://www.cloudflare.com/products/zero-trust/cloudflare-vs-zscaler/">our website</a>.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>Joining the Descaler Program is as easy as signing up using the link below. From there, the Cloudflare team will reach out to you for further enrollment details. By providing details about your current Zscaler deployments, ongoing challenges and your future Zero Trust or SASE goals we’ll be able to hit the ground running.</p><p>With the Descaler Program we’re excited to offer a clear path for customers to make the switch to Cloudflare One. To get started, <a href="http://cloudflare.com/lp/zscaler-migration/">sign up here</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/45Ef7xPEuPR49YvJpfOhAe/a496b7f0ba97064bf11c95d52c80635a/image2-11.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Descaler]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">3r2d2x4ACbSgmA5tZvF2Wg</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>AJ Gerstenhaber</dc:creator>
            <dc:creator>Dave Barnett</dc:creator>
        </item>
        <item>
            <title><![CDATA[Adding Zero Trust signals to Sumo Logic for better security insights]]></title>
            <link>https://blog.cloudflare.com/zero-trust-signals-to-sumo-logic/</link>
            <pubDate>Tue, 14 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ The Cloudflare App for Sumo Logic now supports Zero Trust logs for out of the box, ready-made security dashboards ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hVaAd6pJq09fsIs5GU53e/9b7d0ab2abdc7dcb528072566797c9ab/Dashboard_-Quick-Navigation-1.png" />
            
            </figure><p>A picture is worth a thousand words and the same is true when it comes to getting visualizations, trends, and data in the form of a ready-made security dashboard.</p><p>Today we’re excited to announce the expansion of support for automated normalization and correlation of Zero Trust logs for <a href="https://developers.cloudflare.com/logs/about/">Logpush</a> in Sumo Logic’s <a href="https://www.sumologic.com/solutions/cloud-siem-enterprise/">Cloud SIEM</a>. As a Cloudflare <a href="https://www.cloudflare.com/partners/technology-partners/sumo-logic/">technology partner</a>, Sumo Logic is the pioneer in continuous intelligence, a new category of software which enables organizations of all sizes to address the data challenges and opportunities presented by digital transformation, modern applications, and cloud computing.</p><p>The updated content in Sumo Logic Cloud SIEM helps joint Cloudflare customers reduce alert fatigue tied to Zero Trust logs and accelerates the triage process for security analysts by converging security and network data into high-fidelity insights. This new functionality complements the existing <a href="https://www.sumologic.com/application/cloudflare/">Cloudflare App for Sumo Logic</a> designed to help IT and security teams gain insights, understand anomalous activity, and better trend security and network performance data over time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4v27Z4MHNSnxP9M0Rs8F75/f0ebc2440edf9807d87a0081777f9463/Cloud-SIEM-HUD.png" />
            
            </figure>
    <div>
      <h3>Deeper integration to deliver Zero Trust insights</h3>
      <a href="#deeper-integration-to-deliver-zero-trust-insights">
        
      </a>
    </div>
    <p>Using Cloudflare Zero Trust helps protect users, devices, and data, and in the process can create a large volume of logs. These logs are helpful and important because they provide the who, what, when, and where for activity happening within and across an organization. They contain <a href="https://www.cloudflare.com/learning/security/what-is-siem/">information</a> such as what website was accessed, who signed in to an application, or what data may have been shared from a SaaS service.</p><p>Up until now, our integrations with Sumo Logic only allowed automated correlation of security signals for Cloudflare only included core services. While it’s critical to ensure collection of <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> and bot detection events across your fabric, extended visibility into <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust components</a> has now become more important than ever with the explosion of distributed work and adoption of hybrid and multi-cloud infrastructure architectures.</p><p>With the expanded Zero Trust logs now available in Sumo Logic Cloud SIEM, customers can now get deeper context into security insights thanks to the broad set of network and security logs produced by Cloudflare products:</p><ul><li><p><a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> (Network, DNS, HTTP)</p></li><li><p><a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Remote Browser Isolation</a> (included with Gateway logs)</p></li><li><p><a href="https://www.cloudflare.com/products/zero-trust/dlp/">Cloudflare Data Loss Prevention</a> (included with Gateway logs)</p></li><li><p><a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a> (Access audit logs)</p></li><li><p><a href="https://www.cloudflare.com/products/zero-trust/casb/">Cloudflare Cloud Access Security Broker</a> (Findings logs)</p></li></ul><blockquote><p>“As a long time Cloudflare partner, we’ve worked together to help joint customers analyze events and trends from their websites and applications to provide end-to-end visibility and improve digital experiences. We’re excited to expand this partnership to provide real-time insights into the Zero Trust security posture of mutual customers in Sumo Logic’s Cloud SIEM.”- <b>John Coyle</b> - Vice President of Business Development, Sumo Logic</p></blockquote>
    <div>
      <h3>How to get started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>To take advantage of the suite of integrations available for Sumo Logic and Cloudflare logs available via Logpush, first enable Logpush to Sumo Logic, which will ship logs directly to Sumo Logic’s cloud-native platform. Then, install the Cloudflare App and (for Cloud SIEM customers) enable forwarding of these logs to Cloud SIEM for automated normalization and correlation of security insights.</p><p>Note that Cloudflare’s Logpush service is only available to Enterprise customers. If you are interested in upgrading, <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">please contact us here</a>.</p><ol><li><p><a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/sumo-logic/"><b>Enable Logpush to Sumo Logic</b></a>Cloudflare Logpush supports pushing logs directly to Sumo Logic via the Cloudflare dashboard or via API.</p></li><li><p><b>Install the </b><a href="https://www.sumologic.com/application/cloudflare/"><b>Cloudflare App for Sumo Logic</b></a>Locate and install the Cloudflare app from the App Catalog, linked above. If you want to see a preview of the dashboards included with the app before installing, click Preview Dashboards. Once installed, you can now view key information in the Cloudflare Dashboards for all core services.</p></li><li><p><b>(Cloud SIEM Customers) Forward logs to Cloud SIEM</b>After the steps above, enable the updated parser for Cloudflare logs by <a href="https://help.sumologic.com/docs/integrations/saas-cloud/cloudflare/#prerequisites">adding the _parser field</a> to your S3 source created when installing the Cloudflare App.</p></li></ol>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>As more organizations move towards a Zero Trust model for security, it's increasingly important to have visibility into every aspect of the network with logs playing a crucial role in this effort.</p><p>If your organization is just getting started and not already using a tool like Sumo Logic, <a href="/announcing-logs-engine/">Cloudflare R2 for log storage</a> is worth considering. <a href="www.cloudflare.com/developer-platform/r2/">Cloudflare R2</a> offers a scalable, cost-effective solution for log storage.</p><p>We’re excited to continue closely working with technology partners to expand existing and create new integrations that help customers on their Zero Trust journey.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Logs]]></category>
            <category><![CDATA[Dashboard]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Sumo Logic]]></category>
            <category><![CDATA[Guest Post]]></category>
            <guid isPermaLink="false">1LqRHHF3LAkWnMU7gmt639</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Drew Horn (Guest Author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[CIO Week 2023 recap]]></title>
            <link>https://blog.cloudflare.com/cio-week-2023-recap/</link>
            <pubDate>Fri, 13 Jan 2023 14:01:00 GMT</pubDate>
            <description><![CDATA[ Learn about all the new products, partnerships, and innovations Cloudflare announced during CIO Week to help organizations modernize their IT and security. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UE0B1mqbvC2In2FvI9zP3/8271edb763419010c0f8be743a5df82d/CIO-Week-2023-Recap.png" />
            
            </figure><p>In our <a href="/welcome-to-cio-week-2023/">Welcome to CIO Week 2023</a> post, we talked about wanting to start the year by celebrating the work Chief Information Officers do to keep their organizations safe and productive.</p><p>Over the past week, you learned about announcements addressing all facets of your technology stack – including new services, betas, strategic partnerships, third party integrations, and more. This recap blog summarizes each announcement and labels what capability is generally available (GA), in beta, or on our roadmap.</p><p>We delivered on critical capabilities requested by our customers – such as <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-announces-comprehensive-email-security-and-data-protection-tools/">even more comprehensive phishing protection</a> and <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-expands-relationship-with-microsoft-zero-trust/">deeper integrations with the Microsoft ecosystem</a>. Looking ahead, we also described our roadmap for emerging technology categories like <a href="https://www.cloudflare.com/press-releases/2023/digital-experience-monitoring-cios/">Digital Experience Monitoring</a> and our vision to make it exceedingly simple <a href="https://www.cloudflare.com/press-releases/2023/magic-wan-connector-corporate-network/">to route traffic from any source to any destination through Cloudflare’s network</a>.</p><p>Everything we launched is designed to <a href="https://www.cloudflare.com/cio/">help CIOs accelerate their pursuit of digital transformation</a>. In this blog, we organized our announcement summaries based on the three feelings we want CIOs to have when they consider partnering with Cloudflare:</p><ol><li><p><b>CIOs now have a simpler roadmap to Zero Trust and SASE:</b> We announced new capabilities and tighter integrations that make it easier for organizations to adopt <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> best practices and move towards aspirational architectures like <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a>.</p></li><li><p><b>CIOs have access to the right technology and channel partners:</b> We announced integrations and programming to help organizations access the right expertise to modernize IT and security at their own pace with the technologies they already use.</p></li><li><p><b>CIOs can streamline a multi-cloud strategy with ease:</b> We announced new ways to connect, secure, and accelerate traffic across diverse cloud environments.</p></li></ol><p>Thank you for following <a href="https://www.cloudflare.com/cio-week/">CIO Week</a>, Cloudflare’s first of many Innovation Weeks in 2023. It can be hard to keep up with our pace of innovation sometimes, but we hope that reading this blog and <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4063103/">registering for our recap webinar</a> will help!</p><p>If you want to speak with us about <a href="https://www.cloudflare.com/learning/network-layer/how-to-prepare-for-network-modernization-projects/">how to modernize your IT and security</a> and make life easier for your organization’s CIO, <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">fill out the form here.</a></p>
    <div>
      <h2>Simplifying your journey to Zero Trust and SASE</h2>
      <a href="#simplifying-your-journey-to-zero-trust-and-sase">
        
      </a>
    </div>
    <p><i><b>Securing access</b></i>These blog posts are focused on making it faster, easier, and safer to connect any user to any application with the granular controls and comprehensive visibility needed to achieve Zero Trust.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/introducing-digital-experience-monitoring/"><span>Introducing Digital Experience Monitoring</span></a></td>
    <td><span>Cloudflare Digital Experience Monitoring will be an all-in-one dashboard that helps CIOs understand how critical applications and Internet services are performing across their entire corporate network. </span><a href="https://cloudflare.com/lp/digital-experience-monitoring/"><span>Sign up for beta access. </span></a></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/warp-to-warp/"><span>Weave your own global, private, virtual Zero Trust network on Cloudflare with WARP-to-WARP</span></a></td>
    <td><span>With a single click, any device running Cloudflare’s device client, WARP, in your organization can reach any other device running WARP over a private network. </span><a href="https://www.cloudflare.com/lp/warp-peering/"><span>Sign up for beta access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/403-logs-cloudflare-access/"><span>New ways to troubleshoot Cloudflare Access 'blocked' messages</span></a></td>
    <td><span>Investigate ‘allow’ or ‘block’ decisions based on how a connection was made with the same level of ease that you can troubleshoot user identity within Cloudflare’s Zero Trust platform.</span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/one-click-zerotrust-isolation/"><span>One-click data security for your internal and SaaS applications</span></a></td>
    <td><span>Secure sensitive data by running application sessions in an isolated browser and control how users interact with sensitive data – now with just one click. </span><a href="https://www.cloudflare.com/lp/application-isolation-beta/"><span>Sign up for beta access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/access-and-gateway-with-scim/"><span>Announcing SCIM support for Cloudflare Access &amp; Gateway</span></a></td>
    <td><span>Cloudflare’s ZTNA (Access) and SWG (Gateway) services now support the System for Cross-domain Identity Management (SCIM) protocol, making it easier for administrators to manage identity records across systems.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/the-most-exciting-ping-release"><span>Cloudflare Zero Trust: The Most Exciting Ping Release Since 1983</span></a></td>
    <td><span>Cloudflare Zero Trust administrators can use familiar debugging tools that use the ICMP protocol (like Ping, Traceroute, and MTR) to test connectivity to private network destinations.</span></td>
  </tr>
</tbody>
</table><p><i><b>Threat defense</b></i>These blog posts are focused on helping organizations filter, inspect, and isolate traffic to protect users from phishing, ransomware, and other Internet threats.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/area1-eli-ga"><span>Email Link Isolation: your safety net for the latest phishing attacks</span></a></td>
    <td><span>Email Link Isolation is your safety net for the suspicious links that end up in inboxes and that users may click. This added protection turns </span><a href="https://www.cloudflare.com/products/zero-trust/email-security/"><span>Cloudflare Area 1</span></a><span> into the most comprehensive email security solution when it comes to protecting against phishing attacks.</span></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/bring-your-certificates-cloudflare-gateway/"><span>Bring your own certificates to Cloudflare Gateway</span></a></td>
    <td><span>Administrators can use their own custom certificates to apply HTTP, DNS, CASB, DLP, RBI and other filtering policies.</span></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/custom-dlp-profiles/"><span>Announcing Custom DLP profiles</span></a></td>
    <td><span>Cloudflare’s Data Loss Prevention (DLP) service now offers the ability to create custom detections, so that organizations can inspect traffic for their most sensitive data.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/gateway-managed-service-provider"><span>Cloudflare Zero Trust for Managed Service Providers</span></a></td>
    <td><span>Learn how the U.S. Federal Government and other large Managed Service Providers (MSPs) are using Cloudflare’s Tenant API to apply security policies like DNS filtering across the organizations they manage.</span></td>
  </tr>
</tbody>
</table><p><b><i>Secure SaaS environments</i></b>These blog posts are focused on maintaining consistent security and visibility across SaaS application environments, in particular to protect leaks of sensitive data.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/casb-dlp/"><span>How Cloudflare CASB and DLP work together to protect your data</span></a></td>
    <td><span>Cloudflare Zero Trust will introduce capabilities between our CASB and DLP services that will enable administrators to peer into the files stored in their SaaS applications and identify sensitive data inside them.</span></td>
  </tr>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/dlp-area1-to-protect-data-in-email/"><span>How Cloudflare Area 1 and DLP work together to protect data in email</span></a></td>
    <td><span>Cloudflare is combining capabilities from Area 1 Email Security and Data Loss Prevention (DLP) to provide complete data protection for corporate email. </span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/casb-adds-salesforce-and-box-integrations"><span>Cloudflare CASB: Scan Salesforce and Box for security issues</span></a></td>
    <td><span>Cloudflare CASB now integrates with Salesforce and Box, enabling IT and security teams to scan these SaaS environments for security risks.</span></td>
  </tr>
</tbody>
</table><p><i><b>Accelerating and securing connectivity</b></i>In addition to product capabilities, blog posts in this section highlight speed and other strategic benefits that organizations realize with Cloudflare.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/why-cios-select-cloudflare-one/"><span>Why do CIOs choose Cloudflare One?</span></a></td>
    <td><span>As part of CIO Week, we spoke with the leaders of some of our largest customers to better understand why they selected Cloudflare One. Learn six thematic reasons why.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/network-performance-update-cio-edition/"><span>Cloudflare is faster than Zscaler</span></a></td>
    <td><span>Cloudflare is 38-55% faster at delivering Zero Trust experiences than Zscaler, as validated by </span><a href="https://www.cloudflare.com/lp/miercom-report-cloudflare-vs-zscaler/?cf_target_id=1C6571CB318780CED4741A383010B000"><span>third party testing</span></a><span>.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/location-aware-warp/"><span>Network detection and settings profiles for the Cloudflare One agent</span></a></td>
    <td><span>Cloudflare's device client (WARP) can now securely detect pre-configured locations and route traffic based on the needs of the organization for that location.</span></td>
  </tr>
</tbody>
</table><p><b><i>Making Cloudflare easier to use</i></b>These blog posts highlight innovations across the Cloudflare portfolio, and outside the Zero Trust and SASE categories, to help organizations secure and accelerate traffic with ease.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/preview-today/"><span>Preview any Cloudflare product today</span></a></td>
    <td><span>Enterprise customers can now start previewing non-contracted services with a single click in the dashboard. </span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/improved-api-access-control/"><span>Improved access controls: API access can now be selectively disabled</span></a></td>
    <td><span>Cloudflare is making it easier for account owners to view and manage the access their users have on an account by allowing them to restrict API access to the account.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/zone-versioning-ga"><span>Zone Versioning is now generally available</span></a></td>
    <td><span>Zone Versioning allows customers to safely manage zone configuration by versioning changes and choosing how and when to deploy those changes to defined environments of traffic. </span></td>
  </tr>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/app-services-private-networks"><span>Cloudflare Application Services for private networks: do more with the tools you already love</span></a></td>
    <td><span>Cloudflare is unlocking operational efficiencies by working on integrations between our <a href="https://www.cloudflare.com/application-services/">Application Services</a> to protect Internet-facing websites and our Cloudflare One platform to protect corporate networks. </span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Collaborating with the right partners</h3>
      <a href="#collaborating-with-the-right-partners">
        
      </a>
    </div>
    <p>In addition to new programming for our channel partners, these blog posts describe deeper technical integrations that help organizations work more efficiently with the IT and security tools they already use.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/expanding-our-collaboration-with-microsoft-proactive-and-automated-zero-trust-security/"><span>Expanding our Microsoft collaboration: Proactive and automated Zero Trust security for customers</span></a></td>
    <td><span>Cloudflare announced four new integrations between Microsoft Azure Active Directory (Azure AD) and Cloudflare Zero Trust that reduce risk proactively. These integrated offerings increase automation, allowing security teams to focus on threats versus implementation and maintenance. </span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/api-based-email-scanning"><span>API-based email scanning</span></a></td>
    <td><span>Now, Microsoft Office 365 customers can deploy Area 1 cloud email security via Microsoft Graph API. This feature enables O365 customers to quickly deploy the Area 1 product via API, with onboarding through the Microsoft Marketplace coming in the near future.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/china-express"><span>China Express: Cloudflare partners to boost performance in China for corporate networks</span></a></td>
    <td><span>China Express is a suite of offerings designed to simplify connectivity and improve performance for users in China and developed in partnership with China Mobile International and China Broadband Communications.</span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/cloudflare-one-authorized-services-delivery-partner-track/"><span>Announcing the Authorized Partner Service Delivery Track for Cloudflare One</span></a></td>
    <td><span>Cloudflare announced the limited availability of a new specialization track for our channel and implementation partners, designed to help develop their expertise in delivering Cloudflare One services. </span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Streamlining your multi-cloud strategy</h3>
      <a href="#streamlining-your-multi-cloud-strategy">
        
      </a>
    </div>
    <p>These blog posts highlight innovations that make it easier for organizations to simply ‘plug into’ Cloudflare’s network and send traffic from any source to any destination.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Beta</span><span>: </span><a href="http://staging.blog.mrk.cfdata.org/magic-wan-connector/"><span>Announcing the Magic WAN Connector: the easiest on-ramp to your next generation network</span></a></td>
    <td><span>Cloudflare is making it even easier to get connected with the Magic WAN Connector: a lightweight software package you can install in any physical or cloud network to automatically connect, steer, and shape any IP traffic. </span><a href="https://www.cloudflare.com/lp/magic-wan-connector/"><span>Sign up for early access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA</span><span>: </span><a href="http://staging.blog.mrk.cfdata.org/cloud-cni"><span>Cloud CNI privately connects your clouds to Cloudflare</span></a></td>
    <td><span>Customers using Google Cloud Platform, Azure, Oracle Cloud, IBM Cloud, and Amazon Web Services can now open direct connections from their private cloud instances into Cloudflare.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/cardinal-directions-and-network-traffic/"><span>Cloudflare protection for all your cardinal directions</span></a></td>
    <td><span>This blog post recaps how definitions of corporate network traffic have shifted and how Cloudflare One provides protection for all traffic flows, regardless of source or destination.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[CASB]]></category>
            <guid isPermaLink="false">477jyoRer3hkZsismayuDK</guid>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Welcome to CIO Week 2023]]></title>
            <link>https://blog.cloudflare.com/welcome-to-cio-week-2023/</link>
            <pubDate>Sun, 08 Jan 2023 18:00:00 GMT</pubDate>
            <description><![CDATA[ This CIO Week we’ll demonstrate how Cloudflare is helping CIOs keep data, devices and employees both safe and fast across hybrid and remote environments. We’ll show how Cloudflare accelerates digital transformation and modernizes networking and security towards a Zero Trust model ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Bn7uzx42TjOCfOV8JRSZe/a9c9c356d94b93cb725047a9c410b556/image1-3.png" />
            
            </figure><p>When you are the Chief Information Officer (CIO), your systems need to just work. A quiet day when users go about their job without interruption is a celebration. When they do notice, something has probably fallen apart.</p><p>We understand. CIOs own some of an organization's most mission-critical challenges. Your security counterparts expect safety to be robust while your users want it to be unintrusive. Your sales team continues to open offices in new locations while those new hires need rapid connectivity to your applications. You own a budget that never seems to grow fast enough to match price increases from point solution vendors. On top of that, CIOs must support their organizations' shifts to new remote and <a href="https://events.actualtechmedia.com/on-demand/1315/the-cios-crystal-ball-2023-strategy-for-hybrid-work/">hybrid work models</a>, which means modernizing applications and infrastructure faster than ever before.</p><p>Today marks the start of CIO Week, our celebration of the work that you and your teams accomplish every day. We’ve assembled this week to showcase features, stories, and tools that you can use to continue to deliver on your mission while also improving the experience of your users and administrators. We’ve even included announcements to help on the budget front.</p><p>We’re doing this because we’ve been in the same places. Our own security team could not compromise on tools to safeguard Cloudflare while we grew beyond the walls of a couple of locations. We hired new staff members around the globe to manage one of the world’s largest networks, and they needed access to be fast. We were also predominantly a work-from-office organization. Today, we're hiring for <a href="https://www.cloudflare.com/careers/jobs/">in-office, remote and hybrid opportunities</a> all over the world.</p><p>We believe CIOs are shaping the future of the modern organization. From securely connecting employees and third-parties to critical applications, to safeguarding sensitive company data from phishing and other malicious threats, CIOs are effectively tasked with protecting an organization’s crown jewels. This week we’ll demonstrate how Cloudflare is helping CIOs to accelerate digital transformation and maximize employee collaboration and productivity – all while strengthening security. Welcome to CIO Week.</p>
    <div>
      <h3>All eyes on digital transformation</h3>
      <a href="#all-eyes-on-digital-transformation">
        
      </a>
    </div>
    <p>CIOs own, sponsor, or support an organization's digital transformation strategy that touches all parts of a business. These cross-functional efforts can include moving applications and data to the cloud, building new competencies in areas like data analytics or automation, and developing new digital products and services to drive growth.</p><p>While these initiatives are largely driven by the motivation to go faster, CIOs recognize that speed cannot come at the expense of safety. Balancing both goals, however, can quickly become complicated. Layering on new technologies can add overhead and increase total cost of ownership. Administrators can struggle if products require different management interfaces and control planes or work differently in different locations. Plus, poor integrations and interoperability can mean precious time is wasted just getting services to work together.</p><p>We think about hidden challenges like these often when building new products at Cloudflare. As Cloudflare’s CIO, who you’ll hear from shortly, likes to phrase it, we’re helping CIOs by “bringing the glue”. That is, when building anything new, we ask ourselves to focus on delivering benefits that could not be obtained using individual products in silos. Throughout this innovation week, you’ll see announcements highlighting how organizations can realize more value when services work natively together.</p><p>Designing our security products to be composable and easy to use helps our customers speed up their digital strategy.  But we think about speed in other ways too. First, we optimize our services to enforce protections for any request, from anywhere around the globe, so that security doesn’t get in the way of end users. (In fact, we’re so proud of this that we even dedicated an entire <a href="/fastest-internet/">innovation week</a> to delivering speedy user experiences across the Internet). Second, we pride ourselves on being speedy in innovation, delivering new capabilities and services at such high velocity that we not only solve the problems you’re facing today, but also help you proactively plan for fixing your problems of tomorrow.</p>
    <div>
      <h3>SASE, Zero Trust and the CIO</h3>
      <a href="#sase-zero-trust-and-the-cio">
        
      </a>
    </div>
    <p>For many organizations, an increasingly critical goal of digital transformation is revamping networking and security. As applications, users, and data have shifted outside the walls of the <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">corporate perimeter</a>, the traditional tools of the <a href="https://www.cloudflare.com/learning/access-management/castle-and-moat-network-security/">castle-and-moat model</a> no longer make sense.</p><p>Instead, modernized architectures like <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE (or Secure Access Service Edge)</a> are gaining traction, advocating to unify all networking and security controls to a single control plane in the cloud. On that journey, we’re seeing organizations turning to <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> for best practices and principles to enable the broader visibility and granular controls needed to steer the modern workforce.</p><p>While concepts like SASE and Zero Trust still need the <a href="/cloudflare-one-week-2022/">occasional explainer</a>, the benefits are real, and CIOs are turning to our SASE platform – <a href="https://www.cloudflare.com/cloudflare-one/#transformation">Cloudflare One</a> – to start realizing those business benefits. When customers start their SASE and Zero Trust journeys with Cloudflare, they are connecting their employees to our global network to inspect and apply controls to as much traffic and data as they want. Whether your traffic is traversing from on-premise to the cloud, from one cloud to another, or something in between, Cloudflare has a way to secure and accelerate traffic.</p><p>This week, we will be announcing even more capabilities and products that make the single-vendor SASE dream a reality.</p>
    <div>
      <h3>If you want to go far, let’s go together</h3>
      <a href="#if-you-want-to-go-far-lets-go-together">
        
      </a>
    </div>
    <p>Before taking on any long-term digital transformation challenge, it’s vital to make sure you're surrounded by the right people and partners to go the distance.</p><p>With our broad mission to help build a better Internet, it means that we must do the same at Cloudflare. We partner with fellow industry leaders to help CIOs with efforts like the <a href="https://www.cloudflare.com/partners/technology-partners/cidp/">Critical Infrastructure Defense Project</a> to quickly improve the cyber readiness of vulnerable infrastructure or <a href="/making-phishing-defense-seamless-cloudflare-yubico/">our partnership with Yubico</a> to provide security keys at “Good for the Internet” pricing (for as low as $10 per key!).</p><p>This collaborative ethos extends far beyond just these types of focused initiatives. Over recent years, Cloudflare has invested in our <a href="https://www.cloudflare.com/partners/">ecosystem</a> of alliances, channel partners (including system integrators and advisory / consulting firms), and technology partners to make sure customers have options to pursue digital transformation in the way that makes the most sense for them. In particular, we have seen more customers and partners collaborating on long term SASE and Zero Trust use cases with our Cloudflare One platform.</p><p>Over the course of this week, we’ll share more about strategic partnerships, including opportunities to enable a Zero Trust strategy using Cloudflare One platform services and deeper integrations with key partners like Microsoft.</p><p>The expertise of partners combined with Cloudflare’s network scale and simplicity helps CIOs modernize security at their own pace.</p>
    <div>
      <h3>Cloudflare is the neutral supercloud control plane</h3>
      <a href="#cloudflare-is-the-neutral-supercloud-control-plane">
        
      </a>
    </div>
    <p>When CIOs think about a multi-cloud strategy it tends to center around applications. Multi-cloud strategies devise careful plans for migrating applications, ensuring that efficiency, scale and speed of delivery goals are met in the cloud.</p><p>But often overlooked are the highways of connectivity that are essential for a speedy connection from one cloud to another or from an on-premise data center to another network in a cloud provider. While speeding up applications is the focus, having a global endpoint and identity-neutral network fabric for consistency and composability is equally important.</p><p>This week, we’ll highlight how Cloudflare is able to connect you to/from anything. Whether a request is coming to or from other cloud providers, IoT devices, or in challenging regions or areas, Cloudflare provides a global control plane to help your business stay secure and keep things moving fast.</p><p>We believe that Cloudflare is the neutral supercloud control plane. Over the course of this week, we’ll show you how our platform is built to work seamlessly with multiple cloud providers, allowing organizations to easily and securely manage their cloud infrastructure.</p>
    <div>
      <h3>A warm welcome from Cloudflare’s CIO</h3>
      <a href="#a-warm-welcome-from-cloudflares-cio">
        
      </a>
    </div>
    <p>New project kickoff, budget planning update, security compliance report, hiring review board, hybrid tooling workshop and the list goes on.</p><p>All this and it’s only Monday morning. Sound familiar?</p><p>My job as  Cloudflare’s CIO shares most of the challenges that any other CIO post faces in these uncertain times. Today business technology leaders have to balance managing short term budget pressure, while at the same time having to keep strategic areas properly funded to not mortgage the company’s future. On the other hand one of the perks of being Cloudflare’s CIO is being a direct participant in the incredible rate of innovation we hold ourselves to at Cloudflare, and in return, the benefit we can deliver to our customers.</p><p>I can’t wait for us to share all the exciting announcements and new product features this week. Why? Well, my team has been using a lot of them from even the early versions.</p><p>One of the awesome things about getting to be CIO here is being Customer Zero for most of Cloudflare’s products, getting to try everything first, and play Product Manager from time to time… Before we ask you to trust us with your networks, security, or data, we’ve put ourselves through the test first. <a href="/securing-cloudflare-using-cloudflare/">Securing Cloudflare using Cloudflare</a>, or “Dog Fooding” as we call it internally, is something ingrained in our culture.</p><p>But don’t just take it from me, during the week you’ll hear from other fellow CIOs who view Cloudflare as a trusted partner. My hope is at the end of the week, you’ll consider having Cloudflare as a trusted partner too.</p><p>Welcome to CIO Week!</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[NaaS]]></category>
            <guid isPermaLink="false">1HBdYWMEk5PimNM9Xy8Gq5</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Juan M. Rodriguez</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Gateway + CASB]]></title>
            <link>https://blog.cloudflare.com/announcing-gateway-and-casb/</link>
            <pubDate>Fri, 24 Jun 2022 13:00:04 GMT</pubDate>
            <description><![CDATA[ Find and fix shadow IT with Cloudflare’s Secure Web Gateway and API-driven Cloud Access Security Broker (CASB) ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Shadow IT and managing access to sanctioned or unsanctioned SaaS applications remain one of the biggest pain points for IT administrators in the era of the cloud.</p><p>We're excited to announce that starting soon, Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> and our new API-driven Cloud Access Security Broker (CASB) work seamlessly together to help IT and security teams go from finding Shadow IT to fixing it in minutes.</p>
    <div>
      <h3>Detect security issues within SaaS applications</h3>
      <a href="#detect-security-issues-within-saas-applications">
        
      </a>
    </div>
    <p>Cloudflare's API-driven [CASB](API-driven CASB starts) starts by providing comprehensive visibility into SaaS applications, so you can easily <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">prevent data leaks</a> and compliance violations. Setup takes just a few clicks to integrate with your organization's SaaS services, like Google Workspace and Microsoft 365. From there, IT and security teams can see what applications and services their users are logging into and how company data is being shared.</p><p>So you’ve found the issues. But what happens next?</p>
    <div>
      <h3>Identify and detect, but then what?</h3>
      <a href="#identify-and-detect-but-then-what">
        
      </a>
    </div>
    <p>Customer feedback from the API-driven CASB beta has followed a similar theme: <i>it was super easy to set up and detect all my security issues, but how do I fix this stuff?</i></p><p>Almost immediately after investigating the most critical issues, it makes sense to want to start taking action. Whether it be detecting an unknown application being used for Shadow IT or wanting to limit functionality, access, or behaviors to a known but unapproved application, remediation is front of mind.</p><p>This led to customers feeling like they had a bunch of useful data in front of them, but no clear action to take to get started on fixing them.</p>
    <div>
      <h3>Create Gateway policies from CASB security findings</h3>
      <a href="#create-gateway-policies-from-casb-security-findings">
        
      </a>
    </div>
    <p>To solve this problem, we’re allowing you to easily create Gateway policies from CASB <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/#view-security-findings">security findings</a>. Security findings are issues detected within SaaS applications that involve users, data at rest, and settings that are assigned a Low, Medium, High or Critical severity per integration.</p><p>Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to company security policy. This means going from viewing a CASB security issue, like the use of an unapproved SaaS application, to preventing or controlling access in minutes. This seamless cross-product experience all happens from a single, unified platform.</p><p>For example, take the CASB Google Workspace <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/google-workspace/#third-party-apps">security finding around third-party apps</a> which detects sign-ins or other permission sharing from a user's account. In just a few clicks, you can create a Gateway policy to block some or all of the activity, like uploads or downloads, to the detected SaaS application. This policy can be applied to some or all users, based on what access has been granted to the user’s account.</p><p>By surfacing the exact behavior with CASB, you can take swift and targeted action to better protect your organization with Gateway.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/yn5pqqYDDAvwF5IN25dEj/9b603887cb14e1f7f01ff25dbaf66acf/image1-44.png" />
            
            </figure>
    <div>
      <h3>Get started today with the Cloudflare One</h3>
      <a href="#get-started-today-with-the-cloudflare-one">
        
      </a>
    </div>
    <p>This post highlights one of the many ways the Cloudflare One suite of solutions work seamlessly together as a unified platform to find and fix security issues across SaaS applications.</p><p>Get started now with Cloudflare’s Secure Web Gateway by <a href="https://dash.cloudflare.com/sign-up/teams">signing up here</a>. Cloudflare’s API-driven CASB is in closed beta with new customers being onboarded each week. You can <a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta/">request access here</a> to try out this exciting new cross-product feature.</p><p>To learn more about simplifying the way you protect SaaS applications, <a href="https://cfl.re/saas-security-whitepaper">read our whitepaper</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">6kEpWG201kBCnNMiW0zTBW</guid>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Managing Clouds - Cloudflare CASB and our not so secret plan for what’s next]]></title>
            <link>https://blog.cloudflare.com/managing-clouds-cloudflare-casb/</link>
            <pubDate>Fri, 18 Mar 2022 13:00:08 GMT</pubDate>
            <description><![CDATA[ Right now we’re working on making the out-of-band CASB product a seamless part of the Zero Trust platform ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Last month we introduced Cloudflare’s new API–driven <a href="/cloudflare-zero-trust-casb/">Cloud Access Security Broker (CASB)</a> via the acquisition of Vectrix. As a quick recap, Cloudflare’s CASB helps IT and security teams detect security issues in and across their SaaS applications. We look at both data and users in SaaS apps to alert teams to issues ranging from unauthorized user access and file exposure to misconfigurations and shadow IT.</p><p>I’m excited to share two updates since we announced the introduction of <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB functionality</a> to Cloudflare Zero Trust. First, we’ve heard from Cloudflare customers who cannot wait to deploy the CASB and want to use it in more depth. Today, we’re outlining what we’re building next, based on that feedback, to give you a preview of what you can expect. Second, we’re opening the sign-up for our beta, and I’m going to walk through what will be available to new users as they are invited from the waitlist.</p>
    <div>
      <h2>What’s next in Cloudflare CASB?</h2>
      <a href="#whats-next-in-cloudflare-casb">
        
      </a>
    </div>
    <p>The vision for Cloudflare’s API–driven CASB is to provide IT and security owners an easy-to-use, one-stop shop to protect the security of their data and users across their fleet of SaaS tools. Our goal is to make sure any IT or security admin can go from <a href="https://dash.cloudflare.com/sign-up/teams">creating a Zero Trust account</a> for the first time to protecting what matters most in minutes.</p><p>Beyond that immediate level of visibility, we know the problems discovered by IT and security administrators still require time to find, understand, and resolve. We’re introducing three new features to the core CASB platform in the coming months to address each of those challenges.</p>
    <div>
      <h3>New integrations (with more yet to come)</h3>
      <a href="#new-integrations-with-more-yet-to-come">
        
      </a>
    </div>
    <p>First, what are integrations? Integrations are what we call the method to grant permissions and connect SaaS applications (via API) to CASB for security scanning and management. Generally speaking, integrations are done following an OAuth 2.0 flow, however this varies between third-party SaaS apps. Aligning to our goal, we’ll always make sure that integration set up flows are as simple as possible and can be done in minutes.</p><p>As with most security strategies, protecting your most critical assets first becomes the priority. Integrations with Google Workspace and GitHub will be available in beta (<a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta/">request access here</a>). We’ll soon follow with integrations to Zoom, Slack, and Okta before adding services like Microsoft 365 and Salesforce later this year. Working closely with customers will drive which applications we integrate with next.</p>
    <div>
      <h3>SaaS asset management</h3>
      <a href="#saas-asset-management">
        
      </a>
    </div>
    <p>On top of integrations, managing the various assets, or “digital nouns” like users, data, folders, repos, meetings, calendars, files, settings, recordings, etc. across services is tricky to say the least. Spreadsheets are hard to manage for tracking who has access to what or what files have been shared with whom.</p><p>This isn’t efficient and is ripe for human error. CASB SaaS asset management allows IT and security teams to view all of their data settings and user activity around said data from a single dashboard. Quickly being able to answer questions like; “did we disable the account for a user across these six services?” becomes a quick task instead of logging into each service and addressing individually.</p>
    <div>
      <h3>Remediation guides + automated workflows</h3>
      <a href="#remediation-guides-automated-workflows">
        
      </a>
    </div>
    <p>Detect, prevent, and fix. With detailed SaaS remediation guides, IT administrators can assign and tackle issues with the right team. By arming teams with what they need to know in context, it makes preventing issues from happening again seamless. In situations where action should be taken straight away, automated SaaS workflows provide the ability to solve SaaS security issues in one click. Need to remove sharing permissions from that file in OneDrive? A remediation button allows for action from anywhere, anytime.</p>
    <div>
      <h3>Cloudflare Gateway + CASB</h3>
      <a href="#cloudflare-gateway-casb">
        
      </a>
    </div>
    <p>Combining products across the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> platform means solving complex problems through one seamless experience. Starting with the power of <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Gateway</a> and CASB, customers will be able to take immediate action to wrangle in <a href="/introducing-shadow-it-discovery/">Shadow IT</a>. In just a few clicks, a detected unauthorized SaaS application from the Gateway shadow IT report can go from being the wild west to a sanctioned and secure one with a CASB integration. This is just one example to highlight the many solutions we’re excited about that can be solved with the <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xUzXluYMtMoRh54FG6tHP/3ac7e7eb9411d900c8e2c17be0c09052/image2-63.png" />
            
            </figure>
    <div>
      <h2>Launching the Cloudflare CASB beta and what you can expect</h2>
      <a href="#launching-the-cloudflare-casb-beta-and-what-you-can-expect">
        
      </a>
    </div>
    <p>In the CASB beta you can deploy popular integrations like Google Workspace on day one. You’ll also get direct access to our Product team to help shape what comes next. We’re excited to work closely with a number of early customers to align on which integrations and features matter most to them.</p>
    <div>
      <h2>Getting started today with the Cloudflare CASB beta</h2>
      <a href="#getting-started-today-with-the-cloudflare-casb-beta">
        
      </a>
    </div>
    <p>Right now we’re working on making the out-of-band CASB product a seamless part of the Zero Trust platform. We'll be sending out the first wave of beta invitations early next month – you can <a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta/">request access here</a>.</p><p>We have some big ideas of what the CASB product can and will do. While this post highlights some exciting things to come, you can get started right now with Cloudflare’s Zero Trust platform by <a href="https://dash.cloudflare.com/sign-up/teams">signing up here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">Nw0EqXr6RdYAdrkV4Uknx</guid>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare acquires Vectrix to expand Zero Trust SaaS security]]></title>
            <link>https://blog.cloudflare.com/cloudflare-acquires-vectrix-to-expand-zero-trust-saas-security/</link>
            <pubDate>Thu, 10 Feb 2022 21:19:31 GMT</pubDate>
            <description><![CDATA[ We are excited to share that Vectrix has been acquired by Cloudflare! 
Vectrix helps IT and security teams detect security issues across their SaaS applications ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2dOkY5QDJfM6IXw2bL6gtT/e4c8f799e885d0bca83e75cdb50f78ae/image2-10.png" />
            
            </figure><p>We are excited to share that Vectrix has been acquired by Cloudflare!</p><p>Vectrix helps IT and security teams detect security issues across their SaaS applications. We look at both data and users in SaaS apps to alert teams to issues ranging from unauthorized user access and file exposure to misconfigurations and shadow IT.</p><p>We built Vectrix to solve a problem that terrified us as security engineers ourselves: how do we know if the SaaS apps we use have the right controls in place? Is our company data protected? SaaS tools make it easy to work with data and collaborate across organizations of any size, but that also makes them vulnerable.</p>
    <div>
      <h3>The growing SaaS security problem</h3>
      <a href="#the-growing-saas-security-problem">
        
      </a>
    </div>
    <p>The past two years have accelerated SaaS adoption much faster than any of us could have imagined and without much input on how to secure this new business stack.</p><p>Google Workspace for collaboration. Microsoft Teams for communication. Workday for HR. Salesforce for customer relationship management. The list goes on.</p><p>With this new reliance on SaaS, IT and security teams are faced with a new set of problems like files and folders being made public on the Internet, external users joining private chat channels, or an employee downloading all customer data from customer relationship tools.</p><p>The challenge of securing users and data across even a handful of applications, each with its own set of security risks and a unique way of protecting it, is overwhelming for most IT and security teams. Where should they begin?</p>
    <div>
      <h3>One platform, many solutions</h3>
      <a href="#one-platform-many-solutions">
        
      </a>
    </div>
    <p>Enter the API-driven <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">Cloud Access Security Broker (CASB)</a>. We think about an API-driven CASB as a solution that can scan, detect, and continuously monitor for security issues across organization-approved, IT-managed SaaS apps like Microsoft 365, ServiceNow, Zoom, or Okta.</p><p>CASB solutions help teams with:</p><ul><li><p><b>Data security</b> - ensuring the wrong file or folder is not shared publicly in Dropbox.</p></li><li><p><b>User activity</b> - alerting to suspicious user permissions changing in Workday at 2:00 AM.</p></li><li><p><b>Misconfigurations</b> - keeping Zoom Recordings from becoming publicly accessible.</p></li><li><p><b>Compliance</b> - tracking and reporting who modified Bitbucket branch permissions.</p></li><li><p><b>Shadow IT</b> - detecting users that signed up for an unapproved app with their work email.</p></li></ul><p><a href="https://www.cloudflare.com/application-services/solutions/">Securing SaaS applications</a> starts with visibility into what users and data reside in a service, and then understanding how they’re used. From there, protective and preventive measures, within the SaaS application and on the network, can be used to ensure data stays safe.</p><p>It’s not always the extremely complex things either. A really good example of this came from an early Vectrix customer who asked if we could detect public Google Calendars for them. They recently had an issue where someone on the team had shared their calendar which contained several sensitive meeting links and passcodes. They would have saved themselves a headache if they could have detected this prior, and even better, been able to correct it in a few clicks.</p><p>In this SaaS age something as innocent as a calendar invite can introduce risks that IT and security teams now have to think about. This is why we’re excited to grow further at Cloudflare, helping more teams stay one step ahead.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/N1DZNQ3B5Av5h94AmYCyZ/158720e015e7ecdfaa6321f87465d84f/image3-14.png" />
            
            </figure>
    <div>
      <h3>Ridiculously easy setup</h3>
      <a href="#ridiculously-easy-setup">
        
      </a>
    </div>
    <p>A core component of an API-first approach is the access system, which powers integrations via an OAuth 2.0 or vendor marketplace app to authorize secure API access into SaaS services. This means the API-driven CASB works out of band, or not in the direct network path, and won’t cause any network slowdowns or require any network configuration changes.</p><p>In just a few clicks, you can securely integrate with SaaS apps from anywhere—no agents, no installs, no downloads.</p><p>Over a cup of coffee an IT or security system administrator can connect their company's critical SaaS apps and start getting visibility into data and user activity right away. In fact, we usually see no more than 15 minutes pass from creating an account to the first findings being reported.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7uHxEUxm4HmZl5rWnVF1Fu/d64adb38cb72d1d612fea57b09419346/image1-11.png" />
            
            </figure>
    <div>
      <h3>The more, the merrier</h3>
      <a href="#the-more-the-merrier">
        
      </a>
    </div>
    <p>By integrating with more and more organization-approved SaaS application patterns that may otherwise not be visible start to emerge.</p><p>For example, being alerted that Sam attempted to disable two-factor authentication in multiple SaaS applications may indicate a need for more security awareness training. Or being able to detect numerous users granting sensitive account permissions to an unapproved third-party app could indicate a possible phishing attempt.</p><p>The more integrations you protect the better your overall SaaS security becomes.</p>
    <div>
      <h3>Better together in Zero Trust</h3>
      <a href="#better-together-in-zero-trust">
        
      </a>
    </div>
    <p>The entire Vectrix team has joined Cloudflare and will be integrating API-driven CASB functionality into the <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare Zero Trust platform</a>, launching later this year.</p><p>This means an already impressive set of growing products like <a href="https://www.cloudflare.com/teams/access/">Access (ZTNA)</a>, <a href="https://www.cloudflare.com/teams/gateway/">Gateway (SWG)</a>, and <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a>, will be getting even better, together. Even more exciting though, is that using all of these services will be a seamless experience, managed from a unified <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust platform</a> and dashboard.</p><p>A few examples of what we’re looking forward to growing together are:</p><ul><li><p><b>Shadow IT:</b> use <a href="https://www.cloudflare.com/teams/gateway/">Gateway</a> to detect all your SaaS apps in use, block those that are unapproved, and use CASB to ensure your data stays safe in sanctioned ones.</p></li><li><p><b>Secure access</b>: use <a href="https://www.cloudflare.com/teams/access/">Access</a> to ensure only users who match your device policies will be allowed into SaaS apps and CASB to ensure the SaaS app stays configured only for your approved authentication method.</p></li><li><p><b>Data control</b>: use <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a>’s input controls to prevent users from copy/pasting or printing data and CASB to ensure the data isn’t modified to be shared publicly from within the SaaS app itself for total control.</p></li></ul>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Vectrix will be integrated into the <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare Zero Trust platform</a> to extend the security of Cloudflare’s global network to the data stored in SaaS applications from a single control plane.</p><p>If you’d like early beta access, <a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta">please click here to join the waitlist</a>. We will send invites out in the sign-up order we received them. You can learn more about the acquisition <a href="/cloudflare-zero-trust-casb/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[Acquisitions]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">12fnt5xyJTCWx4Jjs0OpDA</guid>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
    </channel>
</rss>