
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026 09:24:07 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Protect against identity-based attacks by sharing Cloudflare user risk scores with Okta]]></title>
            <link>https://blog.cloudflare.com/protect-against-identity-based-attacks-by-sharing-cloudflare-user-risk-with-okta/</link>
            <pubDate>Tue, 15 Oct 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ Uphold Zero Trust principles and protect against identity-based attacks by sharing Cloudflare user risk scores with Okta. Learn how this new integration allows your organization to mitigate risk in real time, make informed access decisions, and free up security resources with automation. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare One, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>secure access service edge (SASE)</u></a> platform, is introducing a new integration with Okta, the <a href="https://www.cloudflare.com/learning/access-management/what-is-identity-and-access-management/"><u>identity and access management (IAM)</u></a> vendor, to share risk indicators in real-time and simplify how organizations can dynamically manage their security posture in response to changes across their environments.</p><p>For many organizations, it is becoming increasingly challenging and inefficient to adapt to risks across their growing <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/"><u>attack surface</u></a>. In particular, security teams struggle with multiple siloed tools that fail to share risk data effectively with each other, leading to excessive manual effort to extract signals from the noise. To address this complexity, Cloudflare launched <a href="https://blog.cloudflare.com/unified-risk-posture/"><u>risk posture management capabilities</u></a> earlier this year to make it easier for organizations to accomplish three key jobs on one platform: </p><ol><li><p>Evaluating risk posed by people by using first-party <a href="https://www.cloudflare.com/learning/security/what-is-ueba/"><u>user entity and behavior analytics (UEBA)</u></a> models</p></li><li><p>Exchanging risk telemetry with best-in-class security tools, and</p></li><li><p>Enforcing risk controls based on those dynamic first- and third-party risk scores.</p></li></ol><p>Today’s announcement builds on these capabilities (particularly job #2) and <a href="https://www.cloudflare.com/partners/technology-partners/okta/"><u>our partnership with Okta</u></a> by enabling organizations to share Cloudflare’s real-time <a href="https://blog.cloudflare.com/cf1-user-risk-score/"><u>user risk scores</u></a> with Okta, which can then automatically enforce policies based on that user’s risk. In this way, organizations can adapt to evolving risks in less time with less manual effort.</p>
    <div>
      <h2>Cloudflare’s user risk scoring</h2>
      <a href="#cloudflares-user-risk-scoring">
        
      </a>
    </div>
    <p><a href="https://blog.cloudflare.com/cf1-user-risk-score/"><u>Introduced earlier this year</u></a>, Cloudflare’s user risk scoring analyzes real-time telemetry of user activities and behaviors and assigns a risk score of high, medium, or low. For example, if Cloudflare detects risky or suspicious activity from a user — such as impossible travel, where a user logs in from multiple geographically dispersed locations within a short time frame, data loss prevention (DLP) detections, or endpoint detections suggesting that the device is infected — the user’s risk score will increase. The activity leading to that scoring is logged for analysis.</p><p>Cloudflare includes <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/"><u>predefined risk behaviors</u></a> to help you get started. Administrators can create policies based on specific risk behaviors and adjust the risk level for each behavior based on their company’s tolerance.</p>
    <div>
      <h2>Share risk scores with Okta and take action automatically</h2>
      <a href="#share-risk-scores-with-okta-and-take-action-automatically">
        
      </a>
    </div>
    <p>Customers that opt in to this new integration will be able to share continually updated Cloudflare user risk scores with <a href="https://www.okta.com/products/identity-threat-protection/"><u>Identity Threat Protection with Okta AI</u></a>. If a user is deemed too risky, Okta will automatically take action to mitigate the risk, such as enforcing <a href="https://www.cloudflare.com/en-gb/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a> verification or universally logging the user out from all applications. </p><p>For example, a user has a low risk score from Cloudflare that was shared with Okta, but after exhibiting “impossible travel” behavior, the user’s risk level is raised to high. Cloudflare sends the updated score to Okta, which triggers a Universal Logout and an MFA challenge if the user attempts to log in again. Access to sensitive systems may be revoked completely until the user is verified. </p>
    <div>
      <h2>How it works: continuous risk evaluation and exchange</h2>
      <a href="#how-it-works-continuous-risk-evaluation-and-exchange">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79JiNwP0P5bbXpW6dy6ORQ/b0dc91943840b44bbcc8e447af64f392/image1.png" />
          </figure><p><sup><b><i>Figure 1.</i></b></sup><sup><i> Diagram showing risky behavior by a user, resulting in sign-out.</i></sup></p><p>We begin by detecting risky behavior from a user (such as an “impossible travel” event between two geographic locations). Instances of risky behavior are called Risk Events. We perform two actions when we observe a Risk Event: logging the event and evaluating whether further action is required. For customers that have enabled <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/#send-risk-score-to-okta"><u>Risk Score Sharing with Okta</u></a>, any change in Risk Score is transmitted to Okta’s Identity Threat Protection (ITP).</p><p>Upon receiving a new event, Okta evaluates the change in user risk against the organization's policies. These policies may include actions such as re-authenticating the user if they become high risk.</p><p>When we design new features, we aim for them to be extensible across the industry. For this reason, we chose the <a href="https://openid.net/specs/openid-sharedsignals-framework-1_0.html"><u>OpenID Shared Signals Framework Specification (SSF)</u></a> to be the foundation of our transmission format. By doing this, we are able to leverage current and future providers that support the standard. The core functionality of SSF revolves around sharing <a href="https://www.rfc-editor.org/rfc/rfc8417.html"><u>Security Event Tokens (SETs)</u></a>, a specialized version of a JSON Web Token (JWT). Providers can produce and consume Security Event Tokens, forming a “network” of shared user risk information between providers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SaWKy4UWPZfa8hf6rHcF8/571a08ddeab08b01b9a38e740ec89644/image2.png" />
          </figure><p><sup><b><i>Figure 2.</i></b></sup><sup><i> Diagram showing a Security Event Token being transmitted from Cloudflare to Okta.</i></sup></p><p>The diagram above (<b>Figure 2</b>) details the process of sharing risk. When sharing Risk Score changes with Okta, we bundle metadata about the risk event and user into the body of a Security Event Token. Following this, the JWT/SET is signed using our private key. This is an important step, as the signature is used to verify the sender's identity (cryptographic authenticity) and that the payload body has not been tampered with (cryptographic integrity). In plain terms, this signature is used by Okta to verify that the event is unaltered and was sent by Cloudflare.</p><p>Once Okta has verified the authenticity and integrity of the SET token, they may use the risk metadata within the body to execute Identity Threat Protection policies defined by the customer. These policies could include actions such as “if a high risk score is received from Cloudflare, sign out the offending user”.</p><p>Learn more about the Shared Signals Framework and CAEP in <a href="https://www.okta.com/blog/2024/08/identity-threat-protection-with-okta-ai/"><u>Okta’s announcement blog post</u></a>.</p>
    <div>
      <h2>Get started today</h2>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>Cloudflare customers can easily <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/#send-risk-score-to-okta"><u>enable risk score sharing from the Cloudflare One SSO setup page</u></a>. This is available to customers whether you’ve already integrated with Okta or are setting up the integration for the first time. You will also be able to confirm that the feature was enabled in your audit logs.</p><p>If you’ve already integrated Okta within your Cloudflare One dashboard:</p><ol><li><p>As an admin, navigate to Settings &gt; Authentication and select the Okta login method.</p></li><li><p>Select “send risk score to Okta.”</p></li></ol><p>If you haven’t yet integrated Okta within your Cloudflare One dashboard:</p><ol><li><p>As an admin, navigate to Settings &gt; Authentication and select a new login method.</p></li><li><p>Follow the instructions to add Okta as an SSO.</p></li><li><p>Select “send risk score to Okta.”</p></li></ol><p>Now, whenever a user’s risk score changes within the organization, information is sent to Okta automatically and an audit log is documented.</p>
    <div>
      <h2>Uphold Zero Trust principles</h2>
      <a href="#uphold-zero-trust-principles">
        
      </a>
    </div>
    <p>In conclusion, the ability to incorporate rich context is essential for making accurate and informed access decisions. With vast amounts of data — including user logins, logouts, websites visited, and emails sent — human analysts would struggle to keep pace with modern security challenges. Cloudflare provides context in the form of a risk score, enabling Okta’s risk engine to make more informed policy decisions about users. This sharing of information powers the continuous evaluation required to enforce Zero Trust policies within your organization, ultimately strengthening your organization’s security posture.</p><p>Not yet a Cloudflare One customer? <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/"><u>Reach out for a consultation</u></a> or contact your account manager.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Okta]]></category>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">7LZCXzvQgHwLVGoT4O4Pj6</guid>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
            <dc:creator>Matt Davis</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare for Unified Risk Posture]]></title>
            <link>https://blog.cloudflare.com/unified-risk-posture/</link>
            <pubDate>Tue, 07 May 2024 13:00:20 GMT</pubDate>
            <description><![CDATA[ Cloudflare for Unified Risk Posture, a new suite of cybersecurity risk management capabilities built on our global network, can help enterprises with automated and dynamic risk posture enforcement across their expanding attack surface ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12txl9X9aO1mdmmdNUBM9U/9544e21096e2c3233982efa99acd984b/image5.png" />
            
            </figure><p>Managing risk posture — how your business assesses, prioritizes, and mitigates risks — has never been easy. But as <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surfaces</a> continue to expand rapidly, doing that job has become increasingly complex and inefficient. (One global survey <a href="https://securityintelligence.com/articles/socs-spend-32-percent-day-incidents-pose-no-threat/">found</a> that SOC team members spend, on average, one-third of their workday on incidents that pose no threat).  </p><p>But what if you could <b>mitigate risk</b> with <b>less effort</b> and <b>less noise</b>?</p><p>This post explores how Cloudflare can help customers do that, thanks to a new suite that converges capabilities across our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Services Edge (SASE)</a> and <a href="https://www.cloudflare.com/application-services/">web application and API (WAAP)</a> security portfolios. We’ll explain:</p><ul><li><p>Why this approach helps protect more of your attack surface, while also reducing SecOps effort</p></li><li><p>Three key use cases — including enforcing Zero Trust with our expanded CrowdStrike partnership</p></li></ul>
    <div>
      <h2>Cloudflare for Unified Risk Posture</h2>
      <a href="#cloudflare-for-unified-risk-posture">
        
      </a>
    </div>
    <p>Today, we’re announcing <a href="https://www.cloudflare.com/cybersecurity-risk-management/"><b>Cloudflare for Unified Risk Posture</b></a>, a new suite of cybersecurity risk management capabilities that can help enterprises with <b>automated and dynamic risk posture enforcement</b> across their expanding attack surface. Today, one unified platform enables organizations to:</p><ul><li><p><b>Evaluate risk across people and applications:</b> Cloudflare evaluates risk posed by people via <a href="https://www.cloudflare.com/learning/security/what-is-ueba/">user entity and behavior analytics (UEBA)</a> models and risks to apps, APIs, and sites via malicious payload, zero-day threat, and bot detection models.</p></li><li><p><b>Exchange risk indicators with best-in-class partners:</b> Cloudflare ingests risk scores from best-in-class <a href="https://www.cloudflare.com/learning/security/glossary/endpoint-security/">endpoint protection (EPP)</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-an-identity-provider/">identity provider (IDP)</a> partners and shares telemetry back with <a href="https://www.cloudflare.com/learning/security/what-is-siem/">security information and event management (SIEM)</a> and extended detection and response (XDR) platforms for further analysis, all via one-time integrations with our unified API.</p></li><li><p><b>Enforce automated risk controls at scale:</b> Based on these dynamic first- and third-party risk scores, Cloudflare enforces consistent risk controls for people and apps across any location around the world.</p></li></ul><p><b>Figure 1: Unified Risk Posture Diagram</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3WLbotRM1RL1VFQwZbNZ8y/8bf5d12d3ed85dba51448b4fad75b4e9/image3.png" />
            
            </figure><p>As mentioned above, this suite converges capabilities from our SASE and WAAP security portfolios onto our global network. Customers can now take advantage of built-in risk management functionality packaged as part of these existing portfolios.</p><p>This launch builds on our progressive efforts to extend first-party visibility and controls and third-party integrations that make it easier for organizations to adapt to evolving risks. For example, as part of the 2024 <a href="https://www.cloudflare.com/security-week/">Security Week</a>, we announced the general availability of <a href="/cf1-user-risk-score">behavior-based user risk scoring</a> and the beta availability of an <a href="/security-analytics-ai-assistant">AI-enabled assistant</a> to help you analyze risks facing your applications. And in a <a href="/cloudflare-email-security-now-works-with-crowdstrike-falcon-logscale">recent integration in the Fall of 2023</a>, we announced that our cloud email security customers can ingest and display our threat detections within the CrowdStrike Falcon® Next-Gen SIEM dashboard.</p><p>To further manage your risk posture, you will be able to take advantage of new Cloudflare capabilities and integrations, including:</p><ul><li><p>A new integration to share Cloudflare Zero Trust and email log data with the CrowdStrike Falcon Next-Gen SIEM <i>(available now)</i></p></li><li><p>A new integration to share Cloudflare’s user risk score with Okta to enforce access policies <i>(coming by the end of Q2 2024)</i></p></li><li><p>New first-party UEBA models, including user risk scores based on device posture checks <i>(coming by the end of Q2 2024)</i></p></li></ul><p>Unifying the evaluation, exchange, and enforcement stages of risk management onto Cloudflare’s platform helps security leaders mitigate risk with less effort. As a cybersecurity vendor defending both public-facing and internal infrastructure, Cloudflare is uniquely positioned to protect wide swathes of your expanding attack surface. Bringing together dynamic first-party risk scoring, flexible integrations, and automated enforcement helps drive two primary business outcomes:</p><ol><li><p><b>Reducing effort in SecOps</b> with less manual policy building and greater agility in responding to incidents. This means fewer clicks to build policies, more automated workflows, and lower mean times to detect (MTTD) and mean times to respond (MTTR) to incidents.</p></li><li><p><b>Reducing cyber risk</b> with visibility and controls that span people and apps. This means fewer critical incidents and more threats blocked automatically.</p></li></ol><p>Customers like <a href="https://www.indeed.com/about">Indeed</a>, the #1 job site in the world, are already seeing these impacts by partnering with Cloudflare:</p><blockquote><p><i>“Cloudflare is helping us mitigate risk more effectively with less effort and simplifies how we deliver Zero Trust across my organization.”</i>— <b>Anthony Moisant</b>, SVP, Chief Information Officer and Chief Security Officer at <b>Indeed</b>.</p></blockquote>
    <div>
      <h2>Problem: Too many risks across too much attack surface</h2>
      <a href="#problem-too-many-risks-across-too-much-attack-surface">
        
      </a>
    </div>
    <p>Managing risk posture is an inherently broad challenge, covering internal dangers and external threats across attack vectors. Below is just a sampling of risk factors CISOs and their security teams track across three everyday dimensions including people, apps, and data:</p><ul><li><p><b>People risks:</b> Phishing, social engineering, malware, ransomware, remote access, insider threats, physical access compromise, third party / supply chain, mobile devices / BYOD</p></li><li><p><b>App risks:</b> denial of service, zero-day exploits, SQL injection, cross-site scripting, remote code execution, credential stuffing, account takeover, shadow IT usage, API abuse</p></li><li><p><b>Data risks:</b> data loss / exposure, data theft / breach, privacy violation, compliance violation, data tampering</p></li></ul><p>Point solutions emerged to lock down some of these specific risks and attack vectors. But over time, organizations have accumulated many services with a limited ability to talk to one another and build a more holistic view of risk. The granular telemetry generated by each tool has led to information overload for security staff who are often stretched thin already. Security Information and Event Management (SIEM) and Extended Detection &amp; Response (XDR) platforms play a critical role in aggregating risk data across environments and mitigating threats based on analysis, but these tools still demand time, resources, and expertise to operate effectively. All these challenges have gotten worse as attack surfaces have expanded rapidly, as businesses embrace hybrid work, build new digital apps, and more recently, experiment with AI.</p>
    <div>
      <h2>How Cloudflare helps manage risk posture</h2>
      <a href="#how-cloudflare-helps-manage-risk-posture">
        
      </a>
    </div>
    <p>To help restore control over this complexity, Cloudflare for Unified Risk Posture provides one platform to evaluate risk, exchange indicators, and enforce dynamic controls throughout IT environments and around the world, all while complementing the security tools your business already relies on.</p><p>Although the specific risks Cloudflare can mitigate are wide-ranging (including all those in the sample bullets above), the following three use cases represent the full range of our capabilities, which you can start taking advantage of today.</p>
    <div>
      <h3>Use Case #1: Enforce Zero Trust with Cloudflare &amp; CrowdStrike</h3>
      <a href="#use-case-1-enforce-zero-trust-with-cloudflare-crowdstrike">
        
      </a>
    </div>
    <p>This first use case spotlights the flexibility with which Cloudflare fits into your current security ecosystem to make it easier to adopt <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust best practices</a>.</p><p>Cloudflare integrates with and ingests security signals from best-in-class <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/">EPP</a> and <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/">IDP</a> partners to enforce identity and device posture checks for any access request to any destination. You can even onboard multiple providers at once to enforce different policies in different contexts. For example, by integrating with CrowdStrike Falcon®, joint customers can <a href="/cloudflare-crowdstrike-partnership">enforce policies based on the Falcon Zero Trust Assessment (ZTA) score</a>, which delivers continuous real-time security posture assessments across all endpoints in an organization regardless of the location, network or user. Plus, customers can then <a href="https://developers.cloudflare.com/logs/about/">push activity logs</a> generated by Cloudflare, including all access requests, to whichever <a href="https://developers.cloudflare.com/fundamentals/reference/partners/">cloud storage or analytics providers</a> they prefer.</p><p>Today, we are <a href="https://www.cloudflare.com/press-releases/2024/cloudflare-announces-unified-risk-posture-to-provide-comprehensive-and">announcing</a> an expanded partnership with CrowdStrike for a new integration that enables organizations to share logs with Falcon Next-Gen SIEM for deeper analysis and further investigation. Falcon Next-Gen SIEM unifies first- and third-party data, native threat intelligence, AI, and workflow automation to drive SOC transformation and enforce better threat protection. The integration of Cloudflare Zero Trust and email logs with Falcon Next-Gen SIEM allows joint customers to identify and investigate Zero Trust networking and email risks and analyze data with other log sources to uncover hidden threats.</p><blockquote><p><i>“CrowdStrike Falcon Next-Gen SIEM delivers up to 150x faster search performance over legacy SIEMs and products positioned as SIEM alternatives. Our transformative telemetry, paired with Cloudflare’s robust Zero Trust capabilities provides an unprecedented partnership. Together, we are converging two of the most critical pieces of the risk management puzzle that organizations of every size must address in order to combat today’s growing threats.”</i>— <b>Daniel Bernard</b>, Chief Business Officer at <b>CrowdStrike</b></p></blockquote><p>Below is a sample workflow of how Cloudflare and CrowdStrike work together to enforce Zero Trust policies and mitigate emerging risks. Together, Cloudflare and CrowdStrike complement each other by exchanging activity and risk data and enforcing risk-based policies and remediation steps.</p><p><b>Figure 2: Enforce Zero Trust with Cloudflare &amp; CrowdStrike</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sKCifQqdVmtJO1K7BIGP5/9536d135c30aad7f2367bb96dd84031c/image4.png" />
            
            </figure><table><colgroup><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>Phase 1: Automated investigation</span></p></td><td><p><span>Phase 2: Zero Trust enforcement</span></p></td><td><p><span>Phase 3: Remediation</span></p></td></tr><tr><td><p><span>Cloudflare and CrowdStrike help an organization detect that a user is compromised.</span></p><br /><p><span>In this example, Cloudflare has recently blocked web browsing to risky websites and phishing emails, serving as the first line of defense. Those logs are then sent to CrowdStrike Falcon Next-Gen SIEM, which alerts your organization’s analyst about suspicious activity.</span></p><br /><p><span>At the same time, CrowdStrike Falcon Insight XDR automatically scans that user’s device and detects that it is infected. As a result, the Falcon ZTA score reflecting the device’s health is lowered.</span></p></td><td><p><span>This org has set up device posture checks via Cloudflare’s </span><a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/"><span>Zero Trust Network Access</span></a><span> (ZTNA), only allowing access when the Falcon ZTA risk score is above a specific threshold they have defined. </span></p><br /><p><span>Our ZTNA denies the user’s next request to access an application because the Falcon ZTA score falls below that threshold.</span></p><br /><p><span>Because of this failed device posture check, Cloudflare increases the risk score for that user, which places them in a group with more restrictive controls. </span></p><br /><br /><br /></td><td><p><span>In parallel, CrowdStrike’s Next-GenSIEM has continued to analyze the specific user’s activity and broader risks throughout the organization’s environment. Using machine learning models, CrowdStrike surfaces top risks and proposes solutions for each risk to your analyst.</span></p><br /><p><span>The analyst can then review and select remediation tactics — for example, quarantining the user’s device — to further reduce risk throughout the organization. </span></p><br /></td></tr></tbody></table>
    <div>
      <h3>Use Case #2: Protect apps, APIs, &amp; websites</h3>
      <a href="#use-case-2-protect-apps-apis-websites">
        
      </a>
    </div>
    <p>This next use case is focused on protecting apps, APIs, and websites from threat actors and bots. Many customers first adopt Cloudflare for this use case, but may not be aware of the risk evaluation algorithms underpinning their protection.</p><p><b>Figure 3: Protect apps, APIs &amp; sites with ML-backed threat intelligence</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68uD20AuCjTQwmC5lLzE1U/cb4a75aaa0af26941d404555dbb6d9f8/image1.png" />
            
            </figure><p>Cloudflare’s <a href="https://www.cloudflare.com/application-services/">Application Services</a> detect and mitigate malicious payloads and bots using risk models backed by <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a> (ML) including:</p><ul><li><p>Our <a href="https://developers.cloudflare.com/waf/about/waf-attack-score/"><b>WAF attack score</b></a>, which scores whether a request contains a zero-day exploit, or common OWASP Top 10 risks such as a <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL injection</a>, <a href="https://www.cloudflare.com/learning/security/threats/cross-site-scripting/">cross-site scripting</a>, or <a href="https://www.cloudflare.com/learning/security/what-is-remote-code-execution/">remote code execution</a> payload</p></li><li><p>Our <a href="https://developers.cloudflare.com/bots/concepts/bot-score/"><b>bot score</b></a>, which scores the likelihood that a request came from a bot</p></li><li><p>Our <a href="https://developers.cloudflare.com/page-shield/how-it-works/malicious-script-detection/"><b>malicious script classifier</b></a><b>,</b> which looks at the dangers of browser scripts for your website visitors</p></li></ul><p>These risk models are trained largely on telemetry from Cloudflare’s global network, which is used as a reverse proxy by <a href="https://www.cloudflare.com/what-is-cloudflare/">nearly 20% of all websites</a> and sees about 3 trillion DNS queries per day. This unique real-time visibility powers threat intelligence and even enables us to <a href="/detecting-zero-days-before-zero-day">detect and mitigate zero-days before others</a>.</p><p>Cloudflare also uses ML to <a href="/ml-api-discovery-and-schema-learning">discover new API endpoints and schemas</a> without requiring any prerequisite customer input. This helps organizations uncover unauthenticated APIs and map their <a href="https://www.cloudflare.com/2024-api-security-management-report/#:~:text=APIs%20%E2%80%94%20the%20programmable%20interfaces%20comprising,throughout%20the%20API%2Dcentric%20world.">growing attack surface</a> before applying protections.</p><p>Unlike other vendors, Cloudflare’s network architecture enables risk evaluation models and security controls on public-facing and internal infrastructure to be shared across all of our services. This means that organizations can apply protections against app vulnerability exploits, DDoS, and bots in front of internal apps like self-hosted Jira and Confluence servers, protecting them from emerging and even zero-day threats.</p><p>Organizations can review the potential misconfigurations, data leakage risks, and vulnerabilities that impact the risk posture for their apps, APIs, and websites within <a href="https://www.cloudflare.com/application-services/products/securitycenter/">Cloudflare Security Center</a>. We are investing in this centralized view of risk posture management by integrating alerts and insights across our security portfolio. In fact, we <a href="/security-insights-quick-ciso-view">recently announced updates</a> focused on highlighting where gaps exist in how your organization has deployed Cloudflare services.</p><p>Finally, we are also making it easier for organizations to investigate security events directly and <a href="/log-explorer">recently announced beta availability of Log Explorer</a>. In this beta, security teams can view all of their HTTP traffic in one place with search, analytics dashboards, and filters built-in. These capabilities can help customers monitor more risk factors within the Cloudflare platform versus exporting to third party tools.</p>
    <div>
      <h3>Use Case #3: Protect sensitive data with UEBA</h3>
      <a href="#use-case-3-protect-sensitive-data-with-ueba">
        
      </a>
    </div>
    <p>This third use case summarizes one common way many customers plan to leverage our <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/">user risk / UEBA scores</a> to prevent leaks and mishandling of sensitive data:</p><p><b>Figure 4: Protect apps, APIs &amp; sites with ML-backed threat intelligence</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/DA2cbnXZDIx3sGMXGvwfJ/b8cf1f547ec36cbc1e976d554ecf05b5/image2.jpg" />
            
            </figure><ul><li><p><b>Phase 1:</b> In this example, the security team has already configured <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data loss prevention (DLP)</a> policies to detect and block traffic with sensitive data. These policies prevent one user’s multiple, repeated attempts to upload <a href="/dlp-ocr-sourcecode">source code</a> to a public GitHub repository.</p></li><li><p><b>Phase 2</b>: Because this user has now violated a high number of DLP policies within a short time frame, Cloudflare scores that suspicious user as high risk, regardless of whether those uploads had malicious or benign intent. The security team can now further investigate that specific user, including reviewing all of his recent log activity.</p></li><li><p><b>Phase 3</b>: For that specific high-risk user or for a group of high-risk users, administrators can then set ZTNA or even <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a> rules to block or isolate access to applications that contain other sensitive data.</p></li></ul><p>Altogether, this workflow highlights how Cloudflare’s risk posture controls adapt to suspicious behavior from evaluation through to enforcement.</p>
    <div>
      <h2>How to get started with unified risk posture management</h2>
      <a href="#how-to-get-started-with-unified-risk-posture-management">
        
      </a>
    </div>
    <p>The above use cases reflect how our customers are unifying risk management with Cloudflare. Through these customer conversations, a few themes emerged for why they feel confident in our vision to help them manage risk across their expanding attack surface:</p><ul><li><p>The <b>simplicity of our unified platform</b>: We bring together SASE and WAAP risk scoring and controls for people and apps. Plus, with a single API for all Cloudflare services, organizations can automate and customize workflows with infrastructure-as-code tools like <a href="https://developers.cloudflare.com/terraform/">Terraform</a> with ease.</p></li><li><p>The <b>flexibility of our integrations</b>: We exchange risk signals with the EPP, IDP, XDR, and SIEM providers you already use, so you can do more with your tools and data. Plus, with one-time integrations that work across all our services, you can extend controls across your IT environments with agility.</p></li><li><p>The <b>scale of our global network</b>: Every security service is available for customers to run in every location across our network spanning 320+ locations and 13K+ interconnects. In this way, single-pass inspection and risk policy enforcement is always fast, consistent, and resilient, delivered close to your users and apps.</p></li></ul><p>If you’re ready to see how Cloudflare can help you manage risk, <a href="https://www.cloudflare.com/plans/enterprise/contact/">request a consultation today</a>. Or if you’re at RSA Conference 2024, <a href="https://www.cloudflare.com/rsa-conference-2024/">come to any of our in-person events</a>.</p><p>To continue learning more about how Cloudflare can help you evaluate risk, exchange risk indicators, and enforce risk controls, <a href="https://www.cloudflare.com/cybersecurity-risk-management/">explore more resources on our website</a>.</p> ]]></content:encoded>
            <category><![CDATA[Risk Management]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">2lDPGVJ136ZtHceoXGZAxY</guid>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare One for Data Protection]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-data-protection-announcement/</link>
            <pubDate>Thu, 07 Sep 2023 13:00:35 GMT</pubDate>
            <description><![CDATA[ This blog announces Cloudflare One for Data Protection — our unified suite to protect data everywhere across web, SaaS, and private applications. Built on and delivered across our entire global network, Cloudflare One’s data protection suite is architected for the risks of modern coding and AI ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3pZeIACtw7wzkE1aQt7Wbt/8fde767c6c2199f080c529c748b7fbc7/image3.png" />
            
            </figure><p>Data continues to explode in volume, variety, and velocity, and security teams at organizations of all sizes are challenged to keep up. Businesses face escalating risks posed by varied SaaS environments, the emergence of generative <a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">artificial intelligence (AI)</a> tools, and the exposure and theft of valuable source code continues to keep <a href="https://www.cloudflare.com/ciso/">CISOs</a> and Data Officers up at night.  </p><p>Over the past few years, Cloudflare has launched capabilities to help organizations navigate these risks and <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">gain visibility and controls over their data</a> — including the launches of our <a href="/inline-dlp-ga/">data loss prevention (DLP)</a> and <a href="/casb-ga/">cloud access security broker (CASB)</a> services in the fall of 2022.</p>
    <div>
      <h2>Announcing Cloudflare One’s data protection suite</h2>
      <a href="#announcing-cloudflare-ones-data-protection-suite">
        
      </a>
    </div>
    <p>Today, we are building on that momentum and announcing <a href="https://www.cloudflare.com/zero-trust/solutions/data-protection">Cloudflare One for Data Protection</a> — our unified suite to <a href="https://www.cloudflare.com/learning/security/what-is-information-security/">protect data</a> everywhere across web, SaaS, and private applications. Built on and delivered across our entire global network, Cloudflare One’s data protection suite is architected for the risks of modern coding and increased usage of AI.</p><p>Specifically, this suite converges capabilities across Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">DLP</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust network access (ZTNA)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation (RBI)</a>, and <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">cloud email security</a> services onto a single platform for simpler management. All these services are available and packaged now as part of <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform that converges security and network connectivity services.</p><p>A <a href="http://cfl.re/data-protection-roadmap-preview-blog">separate blog post published today</a> looks back on <i>what</i> technologies and features we delivered over the past year and previews new functionality that customers can look forward to.</p><p>In this blog, we focus more on <i>what impact</i> those technologies and features have for customers in addressing modern data risks — with examples of practical use cases. We believe that Cloudflare One is uniquely positioned to deliver better data protection that addresses modern data risks. And by “better,” we mean:</p><ul><li><p>Helping security teams be <b>more effective</b> protecting data by simplifying inline and API connectivity together with policy management</p></li><li><p>Helping employees be <b>more productive</b> by ensuring fast, reliable, and consistent user experiences</p></li><li><p>Helping organizations be <b>more agile</b> by innovating rapidly to meet evolving data security and privacy requirements</p></li></ul>
    <div>
      <h2>Harder than ever to secure data</h2>
      <a href="#harder-than-ever-to-secure-data">
        
      </a>
    </div>
    <p>Data spans more environments than most organizations can keep track of. In conversations with customers, three distinctly modern risks stick out:</p><ol><li><p><b>The growing diversity of cloud and SaaS environments:</b> The apps where knowledge workers spend most of their time — like cloud email inboxes, shared cloud storage folders and documents, SaaS productivity and collaboration suites like Microsoft 365 — are increasingly targeted by threat actors for <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">data exfiltration</a>.</p></li><li><p><b>Emerging AI tools:</b> Business leaders are concerned about users oversharing sensitive information with opaque <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/">large language model tools</a> like ChatGPT, but at the same time, want to leverage the benefits of AI.</p></li><li><p><b>Source code exposure or theft</b>: Developer code fuels digital business, but that same high-value source code can be exposed or targeted for theft across many developer tools like GitHub, including in plain sight locations like public repositories.</p></li></ol><p>These latter two risks, in particular, are already intersecting. Companies like <a href="https://www.businessinsider.com/chatgpt-companies-issued-bans-restrictions-openai-ai-amazon-apple-2023-7">Amazon, Apple, Verizon, Deutsche Bank, and more</a> are blocking employees from using tools like ChatGPT for fear of losing confidential data, and <a href="https://www.forbes.com/sites/siladityaray/2023/05/02/samsung-bans-chatgpt-and-other-chatbots-for-employees-after-sensitive-code-leak/?sh=28ba8bf96078">Samsung</a> recently had an engineer accidentally upload sensitive code to the tool. As organizations prioritize new digital services and experiences, developers face mounting pressure to work faster and smarter. AI tools can help unlock that productivity, but the long-term consequences of oversharing sensitive data with these tools is still unknown.</p><p>All together, data risks are only primed to escalate, particularly as organizations accelerate digital transformation initiatives with hybrid work and development continuing to expand attack surfaces. At the same time, regulatory compliance will only become more demanding, as more countries and states adopt more stringent data privacy laws.</p><p>Traditional DLP services are not equipped to keep up with these modern risks. A combination of high setup and operational complexity plus negative user experiences means that, in practice, DLP controls are often underutilized or bypassed entirely. Whether deployed as a standalone platform or integrated into security products or SaaS applications, DLP products can often become expensive shelfware. And backhauling traffic through on-premise data protection hardware – whether, DLP, firewall and SWG appliances, or otherwise — create costs and slow user experiences that hold businesses back in the long run.</p>
    <div>
      <h3>Figure 1: Modern data risks</h3>
      <a href="#figure-1-modern-data-risks">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6f0YWGx04DZ3Xif9A4MYJE/ce203c56220b49e5173473e8a819fd9d/image2.jpg" />
            
            </figure>
    <div>
      <h2>How customers use Cloudflare for data protection</h2>
      <a href="#how-customers-use-cloudflare-for-data-protection">
        
      </a>
    </div>
    <p>Today, customers are increasingly turning to Cloudflare to address these data risks, including a Fortune 500 natural gas company, a major US job site, a regional US airline, an Australian healthcare company and more. Across these customer engagements, three use cases are standing out as common focus areas when deploying Cloudflare One for data protection.</p>
    <div>
      <h3><i>Use case #1: Securing AI tools and developer code (Applied Systems)</i></h3>
      <a href="#use-case-1-securing-ai-tools-and-developer-code-applied-systems">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/case-studies/applied-systems">Applied Systems</a>, an insurance technology &amp; software company, recently deployed Cloudflare One to <a href="https://www.cloudflare.com/ai-security/">secure data in AI environments</a>.</p><p>Specifically, the company runs the public instance of ChatGPT in an isolated browser, so that the security team can apply <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/isolation-policies/#policy-settings">copy-paste blocks</a>: preventing users from copying sensitive information (including developer code) from other apps into the AI tool. According to Chief Information Security Officer Tanner Randolph, “We wanted to let employees take advantage of AI while keeping it safe.”</p><p>This use case was just one of several Applied Systems tackled when migrating from Zscaler and Cisco to Cloudflare, but we see a growing interest in <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">securing AI</a> and developer code among our customers.</p>
    <div>
      <h3><i>Use case #2: Data exposure visibility</i></h3>
      <a href="#use-case-2-data-exposure-visibility">
        
      </a>
    </div>
    <p>Customers are leveraging Cloudflare One to regain visibility and controls over data exposure risks across their sprawling app environments. For many, the first step is analyzing <a href="https://developers.cloudflare.com/cloudflare-one/insights/analytics/access/">unsanctioned app usage</a>, and then taking steps to allow, block, isolate, or apply other controls to those resources. A second and increasingly popular step is scanning SaaS apps for misconfigurations and sensitive data <a href="/casb-dlp/">via a CASB and DLP</a> service, and then taking prescriptive steps to remediate via SWG policies.</p><p>A UK ecommerce giant with 7,5000 employees turned to Cloudflare for this latter step. As part of a broader <a href="/descaler-program-update/">migration strategy from Zscaler to Cloudflare</a>, this company quickly set up API integrations between its SaaS environments and Cloudflare’s CASB and began scanning for misconfigurations. Plus, during this integration process, the company was able to sync DLP policies with <a href="/cloudflare-dlp-mip/">Microsoft Pureview Information Protection sensitivity labels</a>, so that it could use its existing framework to prioritize what data to protect. All in all, the company was able to begin identifying data exposure risks within a day.</p>
    <div>
      <h3><i>Use case #3: Compliance with regulations</i></h3>
      <a href="#use-case-3-compliance-with-regulations">
        
      </a>
    </div>
    <p>Comprehensive data regulations like <a href="https://www.cloudflare.com/learning/privacy/what-is-the-gdpr/">GDPR</a>, <a href="https://www.cloudflare.com/learning/privacy/what-is-the-ccpa/">CCPA</a>, <a href="https://www.cloudflare.com/learning/privacy/what-is-hipaa-compliance/">HIPAA</a>, and <a href="https://www.ftc.gov/business-guidance/resources/how-comply-privacy-consumer-financial-information-rule-gramm-leach-bliley-act">GLBA</a> have been in our lives for some time now. But new laws are quickly emerging: for example, <a href="https://iapp.org/resources/article/us-state-privacy-legislation-tracker/">11 U.S. states</a> now have comprehensive privacy laws, up from just 3 in 2021. And updates to existing laws like <a href="https://www.cloudflare.com/learning/privacy/what-is-pci-dss-compliance/">PCI DSS</a> now include stricter, more expansive requirements.</p><p>Customers are increasingly turning to Cloudflare One for compliance, in particular by ensuring they can monitor and protect regulated data (e.g. financial data, health data, <a href="https://www.cloudflare.com/learning/privacy/what-is-pii/">PII</a>, <a href="/edm-beta/">exact data matches</a>, and more). Some common steps include first, detecting and applying controls to sensitive data <a href="https://www.cloudflare.com/zero-trust/products/dlp/">via DLP</a>, next, maintaining detailed audit trails via logs and further SIEM analysis, and finally, reducing overall risk with a comprehensive <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> security posture.</p><p>Let’s look at a concrete example. One Zero Trust best practice that is increasingly required is <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">multi-factor authentication (MFA)</a>. In the payment cards industry, PCI DSS <a href="https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf">v4.0</a>, which takes effect in 2025, requires that requests to MFA be enforced for every access request to the cardholder data environment, for every user and for every location – including cloud environments, on-prem apps, workstations and more. (requirement 8.4.2). Plus, those MFA systems must be configured to prevent misuse – including replay attacks and bypass attempts – and must require at least <a href="https://www.cloudflare.com/learning/access-management/what-is-two-factor-authentication/">two different factors</a> that must be successful (requirement 8.5). To help organizations comply with both of these requirements, Cloudflare helps organizations <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/mfa-requirements/">enforce MFA</a> across all apps and users – and in fact, we use our same services to <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">enforce hard key authentication</a> for our own employees.</p>
    <div>
      <h3>Figure 2: Data protection use cases</h3>
      <a href="#figure-2-data-protection-use-cases">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GTjdlDlstogJwsnIMjPJM/2f69aee02d3fa0a03c86ab097ec440f7/image1.png" />
            
            </figure>
    <div>
      <h2>The Cloudflare difference</h2>
      <a href="#the-cloudflare-difference">
        
      </a>
    </div>
    <p>Cloudflare One’s data protection suite is built to stay at the forefront of modern data risks to address these and other evolving use cases.</p><p>With Cloudflare, DLP is not just integrated with other typically distinct security services, like CASB, SWG, ZTNA, RBI, and <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a>, but converged onto a single platform with one control plane and one interface. Beyond the acronym soup, our network architecture is really what enables us to help organizations be more effective, more productive, and more agile with protecting data.</p><p>We simplify connectivity, with flexible options for you to send traffic to Cloudflare for enforcement. Those options include <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/">API-based scans</a> of SaaS suites for misconfigurations and sensitive data. Unlike solutions that require security teams to get full app permissions from IT or business teams, Cloudflare can find risk exposure with read-only app permissions. <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/">Clientless deployments</a> of ZTNA <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/">to secure application access</a> and of <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/">browser isolation</a> to control data within websites and apps are scalable for all users — employees and third-parties like contractors — for the largest enterprises. And when you do want to forward proxy traffic, Cloudflare offers <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/">one device client</a> with self-enrollment permissions or wide area network on-ramps across security services. With so many practical ways to deploy, your data protection approach will be effective and functional — not shelfware.</p><p>Just like your data, our global network is everywhere, now spanning over 300 cities in over 100 countries. We have proven that we enforce controls <a href="/spotlight-on-zero-trust/">faster than vendors like Zscaler, Netskope, and Palo Alto Networks</a> — all with single-pass inspection. We ensure security is quick, reliable, and unintrusive, so you can layer on data controls without disruptive work productivity.</p><p>Our <a href="/building-cloudflare-on-cloudflare/">programmable network architecture</a> enables us to build new capabilities quickly. And we rapidly adopt new security standards and protocols (like IPv6-only connections or HTTP/3 encryption) to ensure data protection remains effective. Altogether, this architecture equips us to evolve alongside changing data protection use cases, like protecting code in AI environments, and quickly deploy AI and <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning models</a> across our network locations to enforce higher precision, context-driven detections.</p>
    <div>
      <h3>Figure 3: Unified data protection with Cloudflare</h3>
      <a href="#figure-3-unified-data-protection-with-cloudflare">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73FFaciX34hSOgWf5tlL9M/68b41d876da9c6d7e6e7e99755b4b3d8/image4.png" />
            
            </figure>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>Modern data risks demand modern security. We feel that Cloudflare One’s unified data protection suite is architected to help organizations navigate their priority risks today and in the future — whether that is securing developer code and AI tools, regaining visibility over SaaS apps, or staying compliant with evolving regulations.</p><p>If you’re ready to explore how Cloudflare can protect your data, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">request a workshop</a> with our experts today.</p><p>Or to learn more about how Cloudflare One protects data, read today’s <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-announces-unified-data-protection-suite-to-address-the-risks-of/">press release</a>, visit <a href="https://www.cloudflare.com/zero-trust/solutions/data-protection">our website</a>, or dive deeper with our <a href="/cloudflare-one-data-protection-roadmap-preview/">accompanying technical blog</a>.</p><p>***</p><ol><li><p><a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2023">The State of Secrets Sprawl 2023, GitGuardian</a></p></li><li><p><a href="https://www.salesforce.com/news/stories/generative-ai-statistics/">Top Generative AI Statistics for 2023, Salesforce</a></p></li><li><p><a href="https://www.ibm.com/reports/data-breach">Cost of a Data Breach Report 2023, IBM</a></p></li><li><p><a href="https://salt.security/state-of-the-ciso-2023">2023 “State of the CISO” report, conducted by Global Survey</a></p></li><li><p><a href="https://unctad.org/page/data-protection-and-privacy-legislation-worldwide">United Nations Conference on Trade &amp; Development</a></p></li><li><p><a href="https://iapp.org/resources/article/us-state-privacy-legislation-tracker/">International Association of Privacy Professionals (IAPP)</a></p></li></ol><p></p><p></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Privacy]]></category>
            <guid isPermaLink="false">QhwALHkPakTUyrr9vQo8k</guid>
            <dc:creator>James Chang</dc:creator>
        </item>
        <item>
            <title><![CDATA[What’s next for Cloudflare One’s data protection suite]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-data-protection-roadmap-preview/</link>
            <pubDate>Thu, 07 Sep 2023 13:00:31 GMT</pubDate>
            <description><![CDATA[ Cloudflare One just launched its data protection suite. This blog previews new functionality to protect data and code in SaaS environments with our DLP and CASB services and looks back on what we have built over the past year ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4WClMGClAUrNY0rHmGzotr/6e13a6250104ebc9b9b6cdff4a34128d/image1-2.png" />
            
            </figure><p>Today, we announced Cloudflare One for Data Protection — a unified suite to protect data everywhere across web, SaaS, and private applications. This suite converges capabilities including our <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data loss prevention (DLP)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">cloud access security broker (CASB)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust network access (ZTNA)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation (RBI)</a>, and <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">cloud email security</a> services. The suite is available and packaged now as part of <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform.</p><p>In the <a href="https://cflr.re/data-protection-announcement-blog">announcement post</a>, we focused on how the data protection suite helps customers navigate modern data risks, with recommended use cases and real-world customer examples.</p><p>In this companion blog post, we recap the capabilities built into the Cloudflare One suite over the past year and preview new functionality that customers can look forward to. This blog is best for practitioners interested in protecting data and SaaS environments using Cloudflare One.</p>
    <div>
      <h2>DLP &amp; CASB capabilities launched in the past year</h2>
      <a href="#dlp-casb-capabilities-launched-in-the-past-year">
        
      </a>
    </div>
    <p>Cloudflare launched both <a href="/inline-dlp-ga/">DLP</a> and <a href="/casb-ga/">CASB</a> services in September 2022, and since then have rapidly built functionality to meet the growing needs of our organizations of all sizes. Before previewing how these services will evolve, it is worth recapping the many enhancements added in the past year.</p><p>Cloudflare’s <a href="/inline-dlp-ga/">DLP</a> solution helps organizations detect and protect sensitive data across their environment based on its several characteristics. DLP controls can be critical in preventing (and detecting) damaging leaks and ensuring compliance for regulated classes of data like financial, health, and <a href="https://www.cloudflare.com/learning/privacy/what-is-pii/">personally identifiable</a> information.</p><p>Improvements to DLP detections and policies can be characterized by three major themes:</p><ul><li><p><b>Customization:</b> making it easy for administrators to design DLP policies with the flexibility they want.</p></li><li><p><b>Deep detections:</b> equipping administrators with increasingly granular controls over what data they protect and how.</p></li><li><p><b>Detailed detections:</b> providing administrators with more detailed visibility and logs to analyze the efficacy of their DLP policies.</p></li></ul><p>Cloudflare’s <a href="/casb-ga/">CASB</a> helps organizations connect to, scan, and monitor third-party SaaS applications for misconfigurations, improper data sharing, and other security risks — all via lightweight API integrations. In this way, organizations can regain visibility and controls over their growing investments in SaaS apps.</p><p>CASB product enhancements can similarly be summarized by three themes:</p><ul><li><p><b>Expanding API integrations:</b> Today, our CASB integrates with <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/">18 of the most popular SaaS apps</a> — Microsoft 365 (including OneDrive), Google Workspace (including Drive), Salesforce, GitHub, and more. Setting up these API integrations takes fewer clicks than first-generation CASB solutions, with comparable coverage to other vendors in the <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">Security Services Edge (SSE)</a> space.</p></li><li><p><b>Strengthening findings of CASB scans:</b> We have made it easier to remediate the misconfigurations identified by these CASB scans with both prescriptive guides and in-line policy actions built into the dashboard.</p></li><li><p><b>Converging CASB &amp; DLP functionality:</b> We started enabling organizations to <a href="/casb-dlp/">scan SaaS apps for sensitive data, as classified by DLP policies</a>. For example, this helps organizations detect when credit cards or social security numbers are in Google documents or spreadsheets that have been made publicly available to anyone on the Internet.</p></li></ul><p>This last theme, in particular, speaks to the value of unifying data protection capabilities on a single platform for simple, streamlined workflows. The below table highlights some major capabilities launched since our general availability announcements last September.</p>
    <div>
      <h3>Table 1: Select DLP and CASB capabilities shipped since 2022 Q4</h3>
      <a href="#table-1-select-dlp-and-casb-capabilities-shipped-since-2022-q4">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Theme</span></th>
    <th><span>Capability</span></th>
    <th><span>Description</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>DLP: Customizability</span></td>
    <td><a href="http://staging.blog.mrk.cfdata.org/cloudflare-dlp-mip/"><span>Microsoft Information Protection labels integration</span></a></td>
    <td><span>After a quick API integration, Cloudflare syncs continuously with the Microsoft Information Protection (MIP) labels you already use to streamline how you build DLP policies.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/custom-dlp-profiles/"><span>Custom DLP profiles</span></a></td>
    <td><span>Administrators can create custom detections using the same regex policy builder used across our entire Zero Trust platform for a consistent configuration experience across services.</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/"><span>Match count controls</span></a></td>
    <td><span>Administrators can set minimum thresholds for the number of times a detection is made before an action (like block or log) is triggered. This way, customers can create policies that allow individual transactions but block up/downloads with high volumes of sensitive data.</span></td>
  </tr>
  <tr>
    <td><span>DLP: Deepening detection</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/"><span>Context analysis</span></a></td>
    <td><span>Context analysis helps reduce false positive detections by analyzing proximity keywords (for example: seeing “expiration date” near a credit card number increases the likelihood of triggering a detection).</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-type"><span>File type control</span></a></td>
    <td><span>DLP scans can be scoped to specific file types, such as Microsoft Office documents, PDF files, and ZIP files.</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/"><span>Expanded predefined DLP profiles</span></a></td>
    <td><span>Since launch, DLP has built out a wider variety of detections for common data types, like financial data, personal identifiers, and credentials.</span></td>
  </tr>
  <tr>
    <td><span>DLP: Detailed detections</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/#http-logs"><span>Expanded logging details</span></a><span> </span></td>
    <td><span>Cloudflare now captures more wide-ranging and granular details of DLP-related activity in logs, including payload analysis, file names, and higher fidelity details of individual files. A large percentage of our customers prefer to push these logs to SIEM tools like </span><a href="http://staging.blog.mrk.cfdata.org/integrate-cloudflare-zero-trust-with-datadog-cloud-siem/"><span>DataDog</span></a><span> and </span><a href="http://staging.blog.mrk.cfdata.org/zero-trust-signals-to-sumo-logic/"><span>Sumo Logic</span></a><span>.</span></td>
  </tr>
  <tr>
    <td><span>CASB: Expanding integrations and findings</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><span>API-based integrations</span></a><br /><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/manage-findings/"><span>Managing findings</span></a></td>
    <td><span>Today, Cloudflare integrates with 18 of the most widely used SaaS apps, including productivity suites, cloud storage, chat tools, and more. </span><br /><span>API-based scans not only reveal misconfigurations, but also offer built-in HTTP policy creation workflows and step-by-step remediation guides. </span></td>
  </tr>
  <tr>
    <td><span>DLP &amp; CASB convergence</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-dlp/"><span>Scanning for sensitive data in SaaS apps</span></a></td>
    <td><span>Today, organizations can set up CASB to scan every publicly accessible file in Google Workspace for text that matches a DLP profile (financial data, personal identifiers, etc.).</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h2>New and upcoming DLP &amp; CASB functionality</h2>
      <a href="#new-and-upcoming-dlp-casb-functionality">
        
      </a>
    </div>
    <p>Today’s launch of <a href="http://cfl.re/data-protection-press-release">Cloudflare One’s data protection suite</a> crystalizes our commitment to keep investing in DLP and CASB functionality across these thematic areas. Below we wanted to preview a few new and upcoming capabilities on the Cloudflare One’s data protection suite roadmap that will become available in the coming weeks for further visibility and controls across data environments.</p>
    <div>
      <h3><i>Exact data matching with custom wordlists</i></h3>
      <a href="#exact-data-matching-with-custom-wordlists">
        
      </a>
    </div>
    <p><b>Already shipped:</b> <a href="/edm-beta/">Exact Data Match</a>, moves from out of beta to general availability, allowing customers to tell Cloudflare’s DLP exactly what data to look for by uploading a dataset, which could include names, phone numbers, or anything else.</p><p><b>Next 30 days:</b> Customers will soon be able to upload a list of specific words, create DLP policies to search for those important keywords in files, and block and log that activity.</p><p><b>How customers benefit:</b> Administrators can be more specific about what they need to protect and save time creating policies by bulk uploading the data and terms that they care most about. Over time, many organizations have amassed long lists of terms configured for incumbent DLP services, and these customizable upload capabilities <a href="/descaler-program-update/">streamline migration from other vendors</a> to Cloudflare. Just as with all other DLP profiles, Cloudflare searches for these custom lists and keywords within in-line traffic and in integrated SaaS apps.</p>
    <div>
      <h3><i>Detecting source code and health data</i></h3>
      <a href="#detecting-source-code-and-health-data">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Soon, Clouflare’s DLP will include predefined profiles to detect developer source code and <a href="https://www.cloudflare.com/learning/privacy/what-is-hipaa-compliance/">protected health information (PHI)</a>. Initially, code data will include languages like Python, Javascript, Java, and C++ — four of the most popular languages today — and PHI data will include medication and diagnosis names — two highly sensitive medical topics.</p><p><b>How customers benefit:</b> These predefined profiles expand coverage to some of the most valuable — and in the case of PHI, one of the most regulated — types of data within an organization.</p>
    <div>
      <h3><i>Converging API-driven CASB &amp; DLP for data-at-rest protections</i></h3>
      <a href="#converging-api-driven-casb-dlp-for-data-at-rest-protections">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Soon, organizations will be able to scan for sensitive data at rest in Microsoft 365 (e.g. OneDrive). API-based scans of these environments will flag, for example, whether credit card numbers, source code, or other data configured via DLP policies reside within publicly accessible files. Administrators can then take prescriptive steps to remediate via in-line CASB gateway policies.</p><p><b>Shipping by the end of the year:</b> Within the next few months, this same integration will be available with GitHub.</p><p><b>How customers benefit:</b> Between the existing <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-dlp/">Google Workspace</a> integration and this upcoming Microsoft 365 integration, customers can scan for sensitive data across two of the most prominent cloud productivity suites — where users spend much of their time and where large percentages of organizational data lives. This new Microsoft integration represents a continued investment in streamlining security workflows across the Microsoft ecosystem — whether for <a href="/expanding-our-collaboration-with-microsoft-proactive-and-automated-zero-trust-security/">managing identity and application access</a>, <a href="/cloudflare-microsoft-intune-partner-to-give-cisos-secure-control-across-devices-applications/">enforcing device posture</a>, or <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/azuread-risky-users/?cf_target_id=9878E2009FA06D9AC4B5552DD9D7E75D">isolating risky users</a>.</p><p>The GitHub integration also restores visibility over one of the most critical developer environments that is also increasingly a risk for <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data leaks</a>. In fact, according to <a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2023">GitGuardian</a>, 10 million hard-coded secrets were exposed in public GitHub commits in 2022, a figure that is up 67% from 2021 and only expected to grow. Preventing source code exposure on GitHub is a problem area our product team regularly hears from our customers, and we will continue to prioritize securing developer environments.</p>
    <div>
      <h3><i>Layering on Zero Trust context: User Risk Score</i></h3>
      <a href="#layering-on-zero-trust-context-user-risk-score">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Cloudflare will introduce a risk score based on user behavior and activities that have been detected across Cloudflare One’s services. Organizations will be able to detect user behaviors that introduce risk from action like an Impossible Travel anomaly or detections from too many DLP violations in a given period of time. Shortly following the detection capabilities will be the option to take preventative or remediative policy actions, within the wider Cloudflare One suite. In this way, organizations can control access to sensitive data and applications based on changing risk factors and real-time context.</p><p><b>How customers benefit:</b> Today, intensive time, labor, and money are spent on analyzing large volumes of log data to identify patterns of risk. Cloudflare's ‘out-of-the-box’ risk score simplifies that process, helping organizations gain visibility into and lock down suspicious activity with speed and efficiency.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>These are just some of the capabilities on our short-term roadmap, and we can’t wait to share more with you as the data protection suite evolves. If you’re ready to explore how Cloudflare One can protect your data, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">request a workshop</a> with our experts today.</p><p>Or to learn more about how Cloudflare One protects data, read <a href="https://cfl.re/data-protection-press-release">today’s press release</a>, visit our <a href="https://www.cloudflare.com/zero-trust/solutions/data-protection">website</a>, or dive deeper with a <a href="https://cfl.re/data-protection-demo">technical demo</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">5UtpTLoZcB9dgL16R3HWNw</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Manage and control the use of dedicated egress IPs with Cloudflare Zero Trust]]></title>
            <link>https://blog.cloudflare.com/gateway-egress-policies/</link>
            <pubDate>Fri, 03 Feb 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Administrators can now use Gateway traffic egress policies to determine which egress IPs are used when. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/n2EL5cxGe6DoEC8l0uIfO/4f37f5248a6bdb58b8ac88ab7912f301/image5-1.png" />
            
            </figure><p>Before identity-driven Zero Trust rules, some SaaS applications on the public Internet relied on the IP address of a connecting user as a security model. Users would connect from known office locations, with fixed IP address ranges, and the SaaS application would check their address in addition to their login credentials.</p><p>Many systems still offer that second factor method. Customers of Cloudflare One can use a dedicated egress IP for this purpose as part of their journey to a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a>. Unlike other solutions, customers using this option do not need to deploy any infrastructure of their own. However, not all traffic needs to use those dedicated egress IPs.</p><p>Today, we are announcing policies that give administrators control over when Cloudflare uses their dedicated egress IPs. Specifically, administrators can use a rule builder in the Cloudflare dashboard to determine which egress IP is used and when, based on attributes like identity, application, IP address, and geolocation. This capability is available to any enterprise-contracted customer that adds on dedicated egress IPs to their Zero Trust subscription.</p>
    <div>
      <h3>Why did we build this?</h3>
      <a href="#why-did-we-build-this">
        
      </a>
    </div>
    <p>In today’s hybrid work environment, organizations aspire for more consistent security and IT experiences to manage their employees’ traffic egressing from offices, data centers, and roaming users. To deliver a more streamlined experience, many organizations are adopting modern, cloud-delivered proxy services like <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateways</a> (SWGs) and deprecating their complex mix of on-premise appliances.</p><p>One traditional convenience of these legacy tools has been the ability to create allowlist policies based on static source IPs. When users were primarily in one place, verifying traffic based on egress location was easy and reliable enough. Many organizations want or are required to maintain this method of traffic validation even as their users have moved beyond being in one place.</p><p>So far, Cloudflare has supported these organizations by providing dedicated egress IPs as an add-on to our proxy <a href="https://www.cloudflare.com/products/zero-trust/">Zero Trust services</a>. Unlike the default egress IPs, these dedicated egress IPs are not shared amongst any other Gateway accounts and are only used to egress proxied traffic for the designated account.</p><p>As <a href="/gateway-dedicated-egress-policies/">discussed in a previous blog post</a>, customers are already using Cloudflare’s dedicated egress IPs to deprecate their VPN use by using them to identify their users proxied traffic or to add these to allow lists on third party providers. These organizations benefit from the simplicity of still using fixed, known IPs, and their traffic avoids the bottlenecks and backhauling of traditional on-premise appliances.</p>
    <div>
      <h3>When to use egress policies</h3>
      <a href="#when-to-use-egress-policies">
        
      </a>
    </div>
    <p>The Gateway Egress policy builder empowers administrators with enhanced flexibility and specificity to egress traffic based on the user’s identity, device posture, source/destination IP address, and more.</p><p>Traffic egressing from specific geolocations to provide geo-specific experiences (e.g. language format, regional page differences) for select user groups is a common use case. For example, Cloudflare is currently working with the marketing department of a global media conglomerate. Their designers and web experts based in India often need to verify the layout of advertisements and websites that are running in different countries.</p><p>However, those websites restrict or change access based on the geolocation of the source IP address of the user. This required the team to use an additional VPN service for just this purpose. With egress policies, administrators can create a rule to match the domain IP address or destination country IP geolocation and marketing employees to egress traffic from a dedicated egress IP geo-located to the country where they need to verify the domain. This allows their security team to rest easy as they no longer have to maintain this hole in their perimeter defense, another VPN service just for marketing, and can enforce all of their other filtering capabilities to this traffic.</p><p>Another example use case is allowlisting access to applications or services maintained by a third party. While security administrators can control how their teams access their resources and even apply filtering to their traffic they often can’t change the security controls enforced by third parties. For example, while working with a large credit processor they used a third party service to verify the riskiness of transactions routed through their Zero Trust network. This third party required them to allowlist their source IPs.</p><p>To meet this goal, this customer could have just used dedicated egress IPs and called it a day, but this means that all of their traffic is now being routed through the data center with their dedicated egress IPs. So if a user wanted to browse any other sites they would receive a subpar experience since their traffic may not be taking the most efficient path to the upstream. But now with egress policies this customer can now only apply this dedicated egress IP to this third party provider traffic and let all other user traffic egress via the default Gateway egress IPs.</p>
    <div>
      <h3>Building egress policies</h3>
      <a href="#building-egress-policies">
        
      </a>
    </div>
    <p>To <a href="https://www.cloudflare.com/products/zero-trust/interactive-demo/">demonstrate</a> how easy it is for an administrator to configure a policy let’s walk through the last scenario. My organization uses a third-party service and in addition to a username/password login they require us to use a static source IP or network range to access their domain.</p><p>To set this up, I just have to navigate to Egress Policies under Gateway on the Zero Trust dashboard. Once there I can hit ‘Create egress policy’:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/yuJg8Ppn8asHZyfbw1L9R/ae805efe79147a7df6b61e04cbf6d0e6/image3-1.png" />
            
            </figure><p>For my organization most of my users accessing this third-party service are located in Portugal so I’ll use my dedicated egress IPs that are assigned to Montijo, Portugal. The users will access example.com hosted on 203.0.113.10 so I’ll use the destination IP selector to match all traffic to this site; policy configuration below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xfip4X6BAuf5PVeo0wDYE/18556fb7fc1620e4e621aaa9ec13fb6d/image2.png" />
            
            </figure><p>Once my policy is created, I’ll add in one more as a catch-all for my organization to make sure they don’t use any dedicated egress IPs for destinations not associated with this third-party service. This is key to add in because it makes sure my users receive the most performant network experience while still maintaining their privacy by egress via our shared Enterprise pool of IPs; policy configuration below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6pybWxPAfzFcURsoGQ3MC5/9201edcdad977b2698ae8a11e87fadd4/image4.png" />
            
            </figure><p>Taking a look at the egress policy list we can see both policies are enabled and now when my users try to access example.com they will be using either the primary or secondary dedicated IPv4 or the IPv6 range as the egress IP. And for all other traffic, the default Cloudflare egress IPs will be used.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7nW6c0Qx8QXR4tZT1IMNLH/dfec617aadbd186f79b4f6f5e3445463/image1-3.png" />
            
            </figure>
    <div>
      <h3>Next steps</h3>
      <a href="#next-steps">
        
      </a>
    </div>
    <p>We recognize that as organizations migrate away from on-premise appliances, they want continued simplicity and control as they proxy more traffic through their cloud security stack. With Gateway egress policies administrators will now be able to control traffic flows for their increasingly distributed workforces.</p><p>If you are interested in building policies around Cloudflare’s dedicated egress IPs, you can add them onto a <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">Cloudflare Zero Trust Enterprise plan</a> or contact your account manager.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <guid isPermaLink="false">30tNAkm8l8BZhgtLo3fWmK</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>James Chang</dc:creator>
        </item>
        <item>
            <title><![CDATA[CIO Week 2023 recap]]></title>
            <link>https://blog.cloudflare.com/cio-week-2023-recap/</link>
            <pubDate>Fri, 13 Jan 2023 14:01:00 GMT</pubDate>
            <description><![CDATA[ Learn about all the new products, partnerships, and innovations Cloudflare announced during CIO Week to help organizations modernize their IT and security. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UE0B1mqbvC2In2FvI9zP3/8271edb763419010c0f8be743a5df82d/CIO-Week-2023-Recap.png" />
            
            </figure><p>In our <a href="/welcome-to-cio-week-2023/">Welcome to CIO Week 2023</a> post, we talked about wanting to start the year by celebrating the work Chief Information Officers do to keep their organizations safe and productive.</p><p>Over the past week, you learned about announcements addressing all facets of your technology stack – including new services, betas, strategic partnerships, third party integrations, and more. This recap blog summarizes each announcement and labels what capability is generally available (GA), in beta, or on our roadmap.</p><p>We delivered on critical capabilities requested by our customers – such as <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-announces-comprehensive-email-security-and-data-protection-tools/">even more comprehensive phishing protection</a> and <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-expands-relationship-with-microsoft-zero-trust/">deeper integrations with the Microsoft ecosystem</a>. Looking ahead, we also described our roadmap for emerging technology categories like <a href="https://www.cloudflare.com/press-releases/2023/digital-experience-monitoring-cios/">Digital Experience Monitoring</a> and our vision to make it exceedingly simple <a href="https://www.cloudflare.com/press-releases/2023/magic-wan-connector-corporate-network/">to route traffic from any source to any destination through Cloudflare’s network</a>.</p><p>Everything we launched is designed to <a href="https://www.cloudflare.com/cio/">help CIOs accelerate their pursuit of digital transformation</a>. In this blog, we organized our announcement summaries based on the three feelings we want CIOs to have when they consider partnering with Cloudflare:</p><ol><li><p><b>CIOs now have a simpler roadmap to Zero Trust and SASE:</b> We announced new capabilities and tighter integrations that make it easier for organizations to adopt <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> best practices and move towards aspirational architectures like <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a>.</p></li><li><p><b>CIOs have access to the right technology and channel partners:</b> We announced integrations and programming to help organizations access the right expertise to modernize IT and security at their own pace with the technologies they already use.</p></li><li><p><b>CIOs can streamline a multi-cloud strategy with ease:</b> We announced new ways to connect, secure, and accelerate traffic across diverse cloud environments.</p></li></ol><p>Thank you for following <a href="https://www.cloudflare.com/cio-week/">CIO Week</a>, Cloudflare’s first of many Innovation Weeks in 2023. It can be hard to keep up with our pace of innovation sometimes, but we hope that reading this blog and <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4063103/">registering for our recap webinar</a> will help!</p><p>If you want to speak with us about <a href="https://www.cloudflare.com/learning/network-layer/how-to-prepare-for-network-modernization-projects/">how to modernize your IT and security</a> and make life easier for your organization’s CIO, <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">fill out the form here.</a></p>
    <div>
      <h2>Simplifying your journey to Zero Trust and SASE</h2>
      <a href="#simplifying-your-journey-to-zero-trust-and-sase">
        
      </a>
    </div>
    <p><i><b>Securing access</b></i>These blog posts are focused on making it faster, easier, and safer to connect any user to any application with the granular controls and comprehensive visibility needed to achieve Zero Trust.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/introducing-digital-experience-monitoring/"><span>Introducing Digital Experience Monitoring</span></a></td>
    <td><span>Cloudflare Digital Experience Monitoring will be an all-in-one dashboard that helps CIOs understand how critical applications and Internet services are performing across their entire corporate network. </span><a href="https://cloudflare.com/lp/digital-experience-monitoring/"><span>Sign up for beta access. </span></a></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/warp-to-warp/"><span>Weave your own global, private, virtual Zero Trust network on Cloudflare with WARP-to-WARP</span></a></td>
    <td><span>With a single click, any device running Cloudflare’s device client, WARP, in your organization can reach any other device running WARP over a private network. </span><a href="https://www.cloudflare.com/lp/warp-peering/"><span>Sign up for beta access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/403-logs-cloudflare-access/"><span>New ways to troubleshoot Cloudflare Access 'blocked' messages</span></a></td>
    <td><span>Investigate ‘allow’ or ‘block’ decisions based on how a connection was made with the same level of ease that you can troubleshoot user identity within Cloudflare’s Zero Trust platform.</span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/one-click-zerotrust-isolation/"><span>One-click data security for your internal and SaaS applications</span></a></td>
    <td><span>Secure sensitive data by running application sessions in an isolated browser and control how users interact with sensitive data – now with just one click. </span><a href="https://www.cloudflare.com/lp/application-isolation-beta/"><span>Sign up for beta access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/access-and-gateway-with-scim/"><span>Announcing SCIM support for Cloudflare Access &amp; Gateway</span></a></td>
    <td><span>Cloudflare’s ZTNA (Access) and SWG (Gateway) services now support the System for Cross-domain Identity Management (SCIM) protocol, making it easier for administrators to manage identity records across systems.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/the-most-exciting-ping-release"><span>Cloudflare Zero Trust: The Most Exciting Ping Release Since 1983</span></a></td>
    <td><span>Cloudflare Zero Trust administrators can use familiar debugging tools that use the ICMP protocol (like Ping, Traceroute, and MTR) to test connectivity to private network destinations.</span></td>
  </tr>
</tbody>
</table><p><i><b>Threat defense</b></i>These blog posts are focused on helping organizations filter, inspect, and isolate traffic to protect users from phishing, ransomware, and other Internet threats.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/area1-eli-ga"><span>Email Link Isolation: your safety net for the latest phishing attacks</span></a></td>
    <td><span>Email Link Isolation is your safety net for the suspicious links that end up in inboxes and that users may click. This added protection turns </span><a href="https://www.cloudflare.com/products/zero-trust/email-security/"><span>Cloudflare Area 1</span></a><span> into the most comprehensive email security solution when it comes to protecting against phishing attacks.</span></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/bring-your-certificates-cloudflare-gateway/"><span>Bring your own certificates to Cloudflare Gateway</span></a></td>
    <td><span>Administrators can use their own custom certificates to apply HTTP, DNS, CASB, DLP, RBI and other filtering policies.</span></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/custom-dlp-profiles/"><span>Announcing Custom DLP profiles</span></a></td>
    <td><span>Cloudflare’s Data Loss Prevention (DLP) service now offers the ability to create custom detections, so that organizations can inspect traffic for their most sensitive data.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/gateway-managed-service-provider"><span>Cloudflare Zero Trust for Managed Service Providers</span></a></td>
    <td><span>Learn how the U.S. Federal Government and other large Managed Service Providers (MSPs) are using Cloudflare’s Tenant API to apply security policies like DNS filtering across the organizations they manage.</span></td>
  </tr>
</tbody>
</table><p><b><i>Secure SaaS environments</i></b>These blog posts are focused on maintaining consistent security and visibility across SaaS application environments, in particular to protect leaks of sensitive data.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/casb-dlp/"><span>How Cloudflare CASB and DLP work together to protect your data</span></a></td>
    <td><span>Cloudflare Zero Trust will introduce capabilities between our CASB and DLP services that will enable administrators to peer into the files stored in their SaaS applications and identify sensitive data inside them.</span></td>
  </tr>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/dlp-area1-to-protect-data-in-email/"><span>How Cloudflare Area 1 and DLP work together to protect data in email</span></a></td>
    <td><span>Cloudflare is combining capabilities from Area 1 Email Security and Data Loss Prevention (DLP) to provide complete data protection for corporate email. </span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/casb-adds-salesforce-and-box-integrations"><span>Cloudflare CASB: Scan Salesforce and Box for security issues</span></a></td>
    <td><span>Cloudflare CASB now integrates with Salesforce and Box, enabling IT and security teams to scan these SaaS environments for security risks.</span></td>
  </tr>
</tbody>
</table><p><i><b>Accelerating and securing connectivity</b></i>In addition to product capabilities, blog posts in this section highlight speed and other strategic benefits that organizations realize with Cloudflare.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/why-cios-select-cloudflare-one/"><span>Why do CIOs choose Cloudflare One?</span></a></td>
    <td><span>As part of CIO Week, we spoke with the leaders of some of our largest customers to better understand why they selected Cloudflare One. Learn six thematic reasons why.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/network-performance-update-cio-edition/"><span>Cloudflare is faster than Zscaler</span></a></td>
    <td><span>Cloudflare is 38-55% faster at delivering Zero Trust experiences than Zscaler, as validated by </span><a href="https://www.cloudflare.com/lp/miercom-report-cloudflare-vs-zscaler/?cf_target_id=1C6571CB318780CED4741A383010B000"><span>third party testing</span></a><span>.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/location-aware-warp/"><span>Network detection and settings profiles for the Cloudflare One agent</span></a></td>
    <td><span>Cloudflare's device client (WARP) can now securely detect pre-configured locations and route traffic based on the needs of the organization for that location.</span></td>
  </tr>
</tbody>
</table><p><b><i>Making Cloudflare easier to use</i></b>These blog posts highlight innovations across the Cloudflare portfolio, and outside the Zero Trust and SASE categories, to help organizations secure and accelerate traffic with ease.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/preview-today/"><span>Preview any Cloudflare product today</span></a></td>
    <td><span>Enterprise customers can now start previewing non-contracted services with a single click in the dashboard. </span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/improved-api-access-control/"><span>Improved access controls: API access can now be selectively disabled</span></a></td>
    <td><span>Cloudflare is making it easier for account owners to view and manage the access their users have on an account by allowing them to restrict API access to the account.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/zone-versioning-ga"><span>Zone Versioning is now generally available</span></a></td>
    <td><span>Zone Versioning allows customers to safely manage zone configuration by versioning changes and choosing how and when to deploy those changes to defined environments of traffic. </span></td>
  </tr>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/app-services-private-networks"><span>Cloudflare Application Services for private networks: do more with the tools you already love</span></a></td>
    <td><span>Cloudflare is unlocking operational efficiencies by working on integrations between our <a href="https://www.cloudflare.com/application-services/">Application Services</a> to protect Internet-facing websites and our Cloudflare One platform to protect corporate networks. </span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Collaborating with the right partners</h3>
      <a href="#collaborating-with-the-right-partners">
        
      </a>
    </div>
    <p>In addition to new programming for our channel partners, these blog posts describe deeper technical integrations that help organizations work more efficiently with the IT and security tools they already use.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/expanding-our-collaboration-with-microsoft-proactive-and-automated-zero-trust-security/"><span>Expanding our Microsoft collaboration: Proactive and automated Zero Trust security for customers</span></a></td>
    <td><span>Cloudflare announced four new integrations between Microsoft Azure Active Directory (Azure AD) and Cloudflare Zero Trust that reduce risk proactively. These integrated offerings increase automation, allowing security teams to focus on threats versus implementation and maintenance. </span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/api-based-email-scanning"><span>API-based email scanning</span></a></td>
    <td><span>Now, Microsoft Office 365 customers can deploy Area 1 cloud email security via Microsoft Graph API. This feature enables O365 customers to quickly deploy the Area 1 product via API, with onboarding through the Microsoft Marketplace coming in the near future.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/china-express"><span>China Express: Cloudflare partners to boost performance in China for corporate networks</span></a></td>
    <td><span>China Express is a suite of offerings designed to simplify connectivity and improve performance for users in China and developed in partnership with China Mobile International and China Broadband Communications.</span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/cloudflare-one-authorized-services-delivery-partner-track/"><span>Announcing the Authorized Partner Service Delivery Track for Cloudflare One</span></a></td>
    <td><span>Cloudflare announced the limited availability of a new specialization track for our channel and implementation partners, designed to help develop their expertise in delivering Cloudflare One services. </span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Streamlining your multi-cloud strategy</h3>
      <a href="#streamlining-your-multi-cloud-strategy">
        
      </a>
    </div>
    <p>These blog posts highlight innovations that make it easier for organizations to simply ‘plug into’ Cloudflare’s network and send traffic from any source to any destination.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Beta</span><span>: </span><a href="http://staging.blog.mrk.cfdata.org/magic-wan-connector/"><span>Announcing the Magic WAN Connector: the easiest on-ramp to your next generation network</span></a></td>
    <td><span>Cloudflare is making it even easier to get connected with the Magic WAN Connector: a lightweight software package you can install in any physical or cloud network to automatically connect, steer, and shape any IP traffic. </span><a href="https://www.cloudflare.com/lp/magic-wan-connector/"><span>Sign up for early access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA</span><span>: </span><a href="http://staging.blog.mrk.cfdata.org/cloud-cni"><span>Cloud CNI privately connects your clouds to Cloudflare</span></a></td>
    <td><span>Customers using Google Cloud Platform, Azure, Oracle Cloud, IBM Cloud, and Amazon Web Services can now open direct connections from their private cloud instances into Cloudflare.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/cardinal-directions-and-network-traffic/"><span>Cloudflare protection for all your cardinal directions</span></a></td>
    <td><span>This blog post recaps how definitions of corporate network traffic have shifted and how Cloudflare One provides protection for all traffic flows, regardless of source or destination.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[CASB]]></category>
            <guid isPermaLink="false">477jyoRer3hkZsismayuDK</guid>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Decommissioning your VDI]]></title>
            <link>https://blog.cloudflare.com/decommissioning-virtual-desktop/</link>
            <pubDate>Fri, 24 Jun 2022 13:45:06 GMT</pubDate>
            <description><![CDATA[ This blog offers Cloudflare’s perspective on how remote browser isolation can help organizations offload internal web application use cases currently secured by virtual desktop infrastructure (VDI) ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/77iYwkTG9OSkNMxplpH1bn/746c0332dd8b033a75221fac1e75a1b6/Decommissioning-VDI-1.png" />
            
            </figure><p>This blog offers Cloudflare’s perspective on how <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> can help organizations offload internal web application use cases currently secured by virtual desktop infrastructure (VDI). VDI has historically been useful to <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">secure remote work</a>, particularly when users relied on desktop applications. However, as web-based apps have become more popular than desktop apps, the drawbacks of VDI – high costs, unresponsive user experience, and complexity – have become harder to ignore. In response, we offer practical recommendations and a phased approach to transition away from VDI, so that organizations can lower cost and unlock productivity by improving employee experiences and simplifying administrative overhead.</p>
    <div>
      <h2>Modern Virtual Desktop usage</h2>
      <a href="#modern-virtual-desktop-usage">
        
      </a>
    </div>
    
    <div>
      <h4>Background on Virtual Desktop Infrastructure (VDI)</h4>
      <a href="#background-on-virtual-desktop-infrastructure-vdi">
        
      </a>
    </div>
    <p>Virtual Desktop Infrastructure describes running desktop environments on virtual computers hosted in a data center. When users access resources within VDI, video streams from those virtual desktops are delivered securely to endpoint devices over a network. Today, <a href="https://www.gartner.com/en/information-technology/glossary/virtual-desktop-infrastructure-vdi#:~:text=Virtual%20desktop%20infrastructure%20(VDI)%20is,users%20to%20their%20desktop%20environments">VDI</a> is predominantly hosted on-premise in data centers and either managed directly by organizations themselves or by third-party <a href="https://www.gartner.com/en/information-technology/glossary/desktop-as-a-service-daas">Desktop-as-a-Service (DaaS)</a> providers. In spite of web application usage growing in favor of desktop applications, DaaS is growing, with Gartner® recently projecting DaaS spending to <a href="https://www.gartner.com/en/articles/3-cloud-technologies-to-support-hybrid-work-experiences">double by 2024</a>.</p><p>Both flavors of VDI promise benefits to support remote work. For security, VDI offers a way to centralize configuration for many dispersed users and to keep sensitive data far away from devices. Business executives are often attracted to VDI because of potential cost savings over purchasing and distributing devices to every user. The theory is that when processing is shifted to centralized servers, IT teams can save money shipping out fewer managed laptops and instead support bring-your-own-device (BYOD). When hardware is needed, they can purchase less expensive devices and even extend the lifespan of older devices.</p>
    <div>
      <h2>Challenges with VDI</h2>
      <a href="#challenges-with-vdi">
        
      </a>
    </div>
    
    <div>
      <h4>High costs</h4>
      <a href="#high-costs">
        
      </a>
    </div>
    <p>The reality of VDI is often quite different. In particular, it ends up being much more costly than organizations anticipate for both capital and operational expenditures. <a href="https://www.gartner.com/en/documents/4008018">Gartner</a>® projects that “by 2024, more than 90% of desktop virtualization projects deployed primarily to save cost will fail to meet their objectives.”</p><p>The reasons are multiple. On-premise VDI comes with significant upfront capital expenditures (CapEx) in servers. DaaS deployments require organizations to make opaque decisions about virtual machines (e.g. number, region, service levels, etc.) and their specifications (e.g. persistent vs. pooled, always-on vs. on-demand, etc.). In either scenario, the operational expenditures (OpEx) from maintenance and failing to rightsize capacity can lead to surprises and overruns. For both flavors, the more organizations commit to virtualization, the more they are locked into high ongoing compute expenses, particularly as workforces grow remotely.</p>
    <div>
      <h4>Poor user experience</h4>
      <a href="#poor-user-experience">
        
      </a>
    </div>
    <p>VDI also delivers a subpar user experience. Expectations for frictionless IT experiences have only increased during remote work, and users can still tell the difference between accessing apps directly versus from within a virtual desktop. VDI environments that are not rightsized can lead to clunky, latent, and unresponsive performance. Poor experiences can negatively impact productivity, security (as users seek workarounds outside of VDI), and employee retention (as users grow disaffected).</p>
    <div>
      <h4>Complexity</h4>
      <a href="#complexity">
        
      </a>
    </div>
    <p>Overall, VDI is notoriously complex. Initial setup is multi-faceted and labor-intensive, with steps including investing in servers and end user licenses, planning VM requirements and capacity, virtualizing apps, setting up network connectivity, and rolling out VDI thin clients. Establishing security policies is often the last step, and for this reason, can sometimes be overlooked, leading to security gaps.</p><p>Moving VDI into full production not only requires cross-functional coordination across typical teams like IT, security, and infrastructure &amp; operations, but also typically requires highly specialized talent, often known as virtual desktop administrators. These skills are hard to find and retain, which can be risky to rely on during this current high-turnover labor market.</p><p>Even still, administrators often need to build their own logging, auditing, inspection, and identity-based access policies on top of these virtualized environments. This means additional overhead of configuring separate services like secure web gateways.</p><p>Some organizations deploy VDI primarily to avoid the shipping costs, logistical hassles, and regulatory headaches of sending out managed laptops to their global workforce. But with VDI, what seemed like a fix for one problem can quickly create more overhead and frustration. Wrestling with VDI’s complexity is likely not worthwhile, particularly if users only need to access a select few internal web services.</p>
    <div>
      <h2>Offloading Virtual Desktop use cases with Remote Browser Isolation</h2>
      <a href="#offloading-virtual-desktop-use-cases-with-remote-browser-isolation">
        
      </a>
    </div>
    <p>To avoid these frictions, organizations are exploring ways to shift use cases away from VDI, particularly when on-prem. Most applications that workforces rely on today are accessible via the browser and are hosted in public or hybrid cloud or SaaS environments, and even occasionally in legacy data centers. As a result, modern services like remote browser isolation (RBI) increasingly make sense as alternatives to begin offloading VDI workloads and shift security to the cloud.</p><p>Like VDI, <a href="https://www.cloudflare.com/static/9946ae465a200fc87c0972abc3c3d065/Cloudflare_Browser_Isolation_-_Product_Brief__2022_Q2_.pdf">Cloudflare Browser Isolation</a> minimizes <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surface</a> by running all app and web code away from endpoints — in this case, on Cloudflare’s global network. In the process, Cloudflare can secure data-in-use within a browser from untrusted users and devices, plus insulate those endpoints from threats like ransomware, phishing and even zero-day attacks. Within an isolated browser, administrators can set <a href="/data-protection-browser/">policies to protect sensitive data</a> on any web-based or SaaS app, just as they would with VDI. Sample controls include restrictions on file uploads / downloads, copy and paste, keyboard inputs, and printing functionality.</p><p>This comparable security comes with more achievable business benefits, starting with helping employees be more productive:</p><ol><li><p><i>End users benefit from a faster and more transparent experience than with VDI.</i> Our browser isolation is designed to run across our 270+ locations, so that isolated sessions are served as close to end users as possible. Unlike with VDI, there is no backhauling user traffic to centralized data centers. Plus, Cloudflare’s <a href="/browser-isolation-for-teams-of-all-sizes/">Network Vector Rendering (NVR)</a> approach ensures that the in-app experience feels like a native, local browser – without bandwidth intensive pixel pushing techniques.</p></li><li><p><i>Administrators benefit because they can skip all the up-front planning, ongoing overhead, and scaling pains associated with VDI.</i> Instead, administrators turn on isolation policies from a single dashboard and let Cloudflare handle scaling to users and devices. Plus, native integrations with ZTNA, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">SWG</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, and other security services make it easy to begin modernizing VDI-adjacent use cases.</p></li></ol><p>On the cost side, expenses associated with browser isolation are overall lower, smoother, and more predictable than with VDI. In fact, <a href="https://www.cloudflare.com/lp/gartner-hype-cycle-for-network-security/">Gartner</a>® recently highlighted that “RBI is cheaper than using VDI for isolation if the only application being isolated is the browser.”</p><p>Unlike on-prem VDI, there are no capital expenditures on VM capacity, and unlike DaaS subscriptions, Cloudflare offers simple, seat-based pricing with no add-on fees for configurations. Organizations also can skip purchasing standalone point solutions because Cloudflare’s RBI comes natively integrated with other services in the <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare Zero Trust platform</a>. Most notably, we do not charge for cloud consumption, which is a common source of VDI surprise.</p>
    <div>
      <h4>Transitioning to Cloudflare Browser Isolation</h4>
      <a href="#transitioning-to-cloudflare-browser-isolation">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wxHxebhspJ8vu9R9kF0xz/eb3cfdb6b7fa8469432ae2e5714c5e5f/Decommissioning-VDI_Diagram.png" />
            
            </figure><p><i>Note: Above diagram includes this table below</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SHS0uvO0eHv2HguEw3l60/fec198954f312e1a1746a2df817a759d/Screen-Shot-2022-06-23-at-4.20.45-PM.png" />
            
            </figure>
    <div>
      <h3>Customer story: PensionBee</h3>
      <a href="#customer-story-pensionbee">
        
      </a>
    </div>
    <p><a href="https://www.pensionbee.com/">PensionBee</a>, a leading online pension provider in the UK, recognized this opportunity to offload virtual desktop use cases and switch to RBI. As a reaction to the pandemic, PensionBee initially onboarded a DaaS solution (Amazon WorkSpaces) to help employees access internal resources remotely. Specifically, CTO Jonathan Lister Parsons was most concerned about securing Salesforce, where PensionBee held its customers’ sensitive pension data.</p><p>The DaaS supported <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access controls</a> similar to PensionBee configured for employees when they previously were in the office (e.g. allowlisting the IPs of the virtual desktops). But shortly after rollout, Lister Parsons began developing concerns about the unresponsive user experience. In <a href="https://gateway.on24.com/wcc/gateway/eliteCloudflareInc/2153307/3490369?_gl=1*1a9y4bl*_ga*MTkxODk3NTg2MC4xNjMyMTUzNjc4*_gid*MzM3MDkyNzQ3LjE2NTQwMDkxNTg">this recent webinar</a>, he in fact guesstimated that “users are generally about 10% less productive when they’re using the DaaS to do their work.” This negative experience increased the support burden on PensionBee’s IT staff to the point where they had to build an automated tool to reboot an employee’s DaaS service whenever it was acting up.</p><p>“From a usability perspective, it’s clearly better if employees can have a native browsing experience that people are used to compared to a remote desktop. That’s sort of a no-brainer,” Lister Parsons said. “But typically, it’s been hard to deliver that while keeping security in place, costs low, and setup complexity down.”</p><p>When Lister Parsons encountered Cloudflare Browser Isolation, he was impressed with the service’s performance and lightweight user experience. Because PensionBee employees accessed the vast majority of their apps (including Salesforce) via a browser, RBI was a strong fit. Cloudflare’s controls over copy/paste and file downloads reduced the risk of customer pension details in Salesforce reaching local devices.</p><p>"We started using Cloudflare Zero Trust with Browser Isolation to help provide the best security for our customers' data and protect employees from malware,” he said. “It worked so well I forgot it was on."</p><p>PensionBee is just one of many organizations developing a roadmap for this transition from VDI. In the next section, we provide Cloudflare’s recommendations for planning and executing that journey.</p>
    <div>
      <h2>Practical recommendations</h2>
      <a href="#practical-recommendations">
        
      </a>
    </div>
    
    <div>
      <h4>Pre-implementation planning</h4>
      <a href="#pre-implementation-planning">
        
      </a>
    </div>
    <p>Understanding <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">where to start this transition</a> some forethought. Specifically, cross-functional teams – across groups like IT, security, and infrastructure &amp; operations (IO) – should develop a collective understanding of how VDI is used today, what use cases should be offloaded first, and what impact any changes will have across both end users and administrators.</p><p>In our own consultations, we start by asking about the needs and expectations of <b>end users</b> because their consistent adoption will dictate an initiative’s success. Based on that foundation, we then typically help organizations map out and prioritize the <b>applications</b> and <b>data</b> they need to secure. Last but not least, we strategize around the <i>‘how:’</i> what <b>administrators</b> and expertise will be needed not only for the initial configuration of new services, but also for the ongoing improvement. Below are select questions we ask customers to consider across those key dimensions to help them navigate their VDI transition.</p>
    <div>
      <h4>Questions to consider</h4>
      <a href="#questions-to-consider">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ybRTthEVyt55zvUuPhVIv/eda4df3b0dc2ea410751919a2bb555ba/Screen-Shot-2022-06-23-at-4.22.38-PM.png" />
            
            </figure>
    <div>
      <h2>Migration from VDI to RBI</h2>
      <a href="#migration-from-vdi-to-rbi">
        
      </a>
    </div>
    <p>Organizations can leverage Cloudflare Browser Isolation and other Zero Trust services to begin offloading VDI use cases and realize cost savings and productivity gains within days of rollout. Our recommended three-phase approach focuses on securing the most critical services with the least disruption to user experience, while also prioritizing quick time-to-value.</p>
    <div>
      <h4>Phase 1: Configure clientless web isolation for web-based applications</h4>
      <a href="#phase-1-configure-clientless-web-isolation-for-web-based-applications">
        
      </a>
    </div>
    <p>Using our <a href="/clientless-web-isolation-general-availability/">clientless web isolation approach</a>, administrators can send users to their private web application served in an isolated browser environment with just a hyperlink – without any software needed on endpoints. Then, administrators can build data protection rules preventing risky user actions within these isolated browser-based apps. Plus, because administrators avoid rolling out endpoint clients, scaling access to employees, contractors, or <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">third parties</a> even on unmanaged devices is as easy as sending a link.</p><p>These isolated links can exist in parallel with your existing VDI, enabling a graceful migration to this new approach longer term. Comparing the different experiences side by side can help your internal stakeholders evangelize the RBI-based approach over time. Cross-functional communication is critical throughout this phased rollout: for example, in prioritizing what web apps to isolate before configuration, and after configuration, articulating how those changes will affect end users.</p>
    <div>
      <h4>Phase 2: Shift SSH- and VNC-based apps from VDI to Cloudflare</h4>
      <a href="#phase-2-shift-ssh-and-vnc-based-apps-from-vdi-to-cloudflare">
        
      </a>
    </div>
    <p>Clientless isolation is a great fit to secure web apps. This next phase helps secure non-web apps within VDI environments, which are commonly accessed via an SSH or VNC connection. For example, privileged administrators often use <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH</a> to control remote desktops and fulfill service requests. Other less technical employees may need the VNC’s graphical user interface to work in legacy apps inaccessible via a modern operating system.</p><p>Cloudflare enables access to these SSH and VNC environments through a browser – again without requiring any software installed on endpoints. Both the <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/ssh/">SSH</a> and <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/vnc-client-in-browser/">VNC setups</a> are similar in that administrators create a secure outbound-only connection between a machine and Cloudflare’s network before a terminal is rendered in a browser. By sending traffic to our network, Cloudflare can authenticate access to apps based on identity check and other granular policies and can provide detailed audits of each user session. (You can read more about the <a href="/browser-ssh-terminal-with-auditing/">SSH</a> and <a href="/browser-vnc-with-zero-trust-rules/">VNC</a> experience in prior blog posts.)</p><p>We recommend first securing SSH apps to support privileged administrators, who can provide valuable feedback. Then, move to support the broader range of users who rely on VNC. Administrators will set up connections and policies using <a href="https://www.cloudflare.com/products/zero-trust/access/">our ZTNA service</a> from the same management panel used for RBI. Altogether, this browser-based experience should reduce latency and have users feeling more at home and productive than in their virtualized desktops.</p>
    <div>
      <h4>Phase 3: Progress towards Zero Trust security posture</h4>
      <a href="#phase-3-progress-towards-zero-trust-security-posture">
        
      </a>
    </div>
    <p><b>Step 3A: Set up identity verification policies per application</b>With phases 1 and 2, you have been using Cloudflare to progressively secure access to web and non-app apps for select VDI use cases**.** In phase 3, build on that foundation by adopting <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">ZTNA</a> for all your applications, not just ones accessed through VDI.</p><p>Administrators use the same Cloudflare policy builder to add more granular conditional access rules in line with <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> security best practices, including checking for an identity provider (IdP). Cloudflare integrates with multiple IdPs simultaneously and can federate multiple instances of the same IdP, enabling flexibility to support any variety of users. After setting up IdP verification, we see administrators often enhance security by requiring MFA. These types of identity checks can also be set up within VDI environments, which can build confidence in adopting Zero Trust before deprecating VDI entirely.</p><p><b>Step 3B: Rebuild confidence in user devices by layering in device posture checks</b>So far, the practical steps we’ve recommended do not require any Cloudflare software on endpoints – which optimizes for deployment speed in offloading VDI use cases. But longer term, there are security, visibility, and productivity benefits to deploying Cloudflare’s device client where it makes sense.</p><p>Cloudflare’s device client (aka <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/require-warp/">WARP</a>) works across all major operating systems and is optimized for flexible deployment. For managed devices, use any script-based method with popular <a href="https://www.cloudflare.com/partners/mdm/">mobile device management (MDM) software</a>, and self-enrollment is a useful option for third-party users. With WARP deployed, administrators can enhance application access policies by first checking for the presence of specific programs or files, disk encryption status, the right OS version, and other <a href="/6-new-ways-to-validate-device-posture/">additional attributes</a>. Plus, if your organization uses <a href="https://www.cloudflare.com/endpoint-partners/">endpoint protection (EPP) providers</a> like <a href="https://www.cloudflare.com/partners/technology-partners/crowdstrike/endpoint-partners/">Crowdstrike</a>, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/sentinel-one">SentinelOne</a>, and more, verify access by first checking for the presence of that software or examining device health.</p><p>Altogether, adding device posture signals both levels up security and enables more granular visibility for both managed and BYOD devices. As with identity verification, administrators can start by enabling device posture checks for users still using virtual desktops. Over time, as administrators build more confidence in user devices, they should begin routing users on managed devices to apps directly, as opposed to through the slower VDI experience.</p><p><b>Step 3C: Progressively shift security services away from virtualized environments to Zero Trust</b>Rethinking application access use cases in prior phases has reduced reliance on complex VDI. By now, Administrators should already be building comfort with Zero Trust policies, as enabled by Cloudflare. Our final recommendation in this article is to continue that journey away from virtualization and towards <a href="https://www.cloudflare.com/products/zero-trust/zero-trust-network-access/">Zero Trust Network Access</a>.</p><p>Instead of sending any users into virtualized apps in virtualized desktops, organizations can reduce their overhead entirely and embrace cloud-delivered ZTNA to protect one-to-one connections between all users and all apps in any cloud environment. The more apps secured with Cloudflare vs. VDI, the greater consistency of controls, visibility, and end user experience.</p><p>Virtualization has provided a powerful technology to bridge the gap between our hardware-centric legacy investments and IT’s cloud-first future. At this point, however, reliance on virtualization puts undue pressure on your administrators and risks diminishing end user productivity. As apps, users, and data accelerate their migration to the cloud, it only makes sense to shift security controls there too with cloud-native, not virtualized services.</p><p>As longer term steps, organizations can explore taking advantage of Cloudflare’s other natively-integrated services, such as our <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Secure Web Gateway (SWG)</a>, <a href="https://www.cloudflare.com/products/zero-trust/casb/">Cloud Access Security Broker (CASB)</a>, and <a href="https://www.cloudflare.com/products/zero-trust/email-security/">email security</a>. Other blogs this week outline how to transition to these Cloudflare services from other legacy technologies.</p>
    <div>
      <h3><b>Summary table</b></h3>
      <a href="#summary-table">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4KNcEBR0awcS9DGR9hSAvp/385ab8b7aa18b7ba8a59669a5f741243/Screen-Shot-2022-06-23-at-4.29.15-PM.png" />
            
            </figure>
    <div>
      <h3>Best practices and progress metrics</h3>
      <a href="#best-practices-and-progress-metrics">
        
      </a>
    </div>
    <p>Below are sample best practices we recommend achieving as smooth a transition as possible, followed by sample metrics to track progress on your initiative:</p><ul><li><p><b>Be attuned to end user experiences:</b> Whatever replaces VDI needs to perform better than what came before. When trying to change user habits and drive adoption, administrators must closely track what users like and dislike about the new services.</p></li><li><p><b>Prioritize cross-functional collaboration:</b> Sunsetting VDI will inevitably involve coordination across diverse teams across IT, security, infrastructure, and virtual desktop administrators. It is critical to establish shared ways of working and trust to overcome any road bumps.</p></li><li><p><b>Roll out incrementally and learn:</b> Test out each step with a subset of users and apps before rolling out more widely to figure out what works (and does not). Start by testing out clientless web isolation for select apps to gain buy-in from users and executives.</p></li></ul>
    <div>
      <h3><b>Sample progress metrics</b></h3>
      <a href="#sample-progress-metrics">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5mXifJi41c4K5EG7DVkYRi/2001754978bbb13adbd2eebaad512c8e/Screen-Shot-2022-06-23-at-4.24.39-PM.png" />
            
            </figure>
    <div>
      <h2>Explore your VDI transition</h2>
      <a href="#explore-your-vdi-transition">
        
      </a>
    </div>
    <p>Cloudflare Zero Trust makes it easy to begin sunsetting your VDI, beginning with leveraging our clientless browser isolation to secure web apps.</p><p>To learn more about how to move towards Zero Trust and away from virtualized desktops, request a <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">Zero Trust consultation</a> today.Replacing your VDI is a great project to fit into your overall <a href="https://zerotrustroadmap.org/">Zero Trust roadmap</a>. For a full summary of Cloudflare One Week and what’s new, tune in to our <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3824611/the-evolution-of-cloudflare-one?partnerref=blog">recap webinar</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[VDI]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Deep Dive]]></category>
            <guid isPermaLink="false">74yr4pY539cPXER9Vje7RB</guid>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Gateway dedicated egress and egress policies]]></title>
            <link>https://blog.cloudflare.com/gateway-dedicated-egress-policies/</link>
            <pubDate>Thu, 23 Jun 2022 13:27:35 GMT</pubDate>
            <description><![CDATA[ Cloudflare Gateway customers can now utilize dedicated egress IPs and soon will be able to control how these IPs are applied via egress policies ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ieRNok92g8GFFvha3iB5a/98615d1ecc4215a46842d1c0142e2c67/image1-37.png" />
            
            </figure><p>Today, we are highlighting how Cloudflare enables administrators to create security policies while using dedicated source IPs. With on-premise appliances like legacy VPNs, firewalls, and <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateways (SWGs)</a>, it has been convenient for organizations to rely on allowlist policies based on static source IPs. But these hardware appliances are hard to manage/scale, come with inherent vulnerabilities, and struggle to support globally distributed traffic from remote workers.</p><p>Throughout this week, we’ve <a href="https://www.cloudflare.com/cloudflare-one-week/">written</a> about how to transition away from these legacy tools towards Internet-native <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> offered by services like Cloudflare Gateway, our <a href="https://www.cloudflare.com/products/zero-trust/gateway/">SWG</a>. As a critical service natively integrated with the rest of our broader Zero Trust platform, Cloudflare Gateway also enables traffic filtering and routing for recursive DNS, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust network access</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a>, and inline <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, among other functions.</p><p>Nevertheless, we recognize that administrators want to maintain the convenience of source IPs as organizations transition to cloud-based proxy services. In this blog, we describe our approach to offering dedicated IPs for egressing traffic and share some upcoming functionality to empower administrators with even greater control.</p>
    <div>
      <h3>Cloudflare’s dedicated egress IPs</h3>
      <a href="#cloudflares-dedicated-egress-ips">
        
      </a>
    </div>
    <p>Source IPs are still a popular method of verifying that traffic originates from a known organization/user when accessing applications and third party destinations on the Internet. When organizations use Cloudflare as a secure web gateway, user traffic is proxied through our global network, where we apply filtering and routing policies at the closest data center to the user. This is especially powerful for globally distributed workforces or roaming users. Administrators do not have to make updates to static IP lists as users travel, and no single location becomes a bottleneck for user traffic.</p><p>Today the source IP for proxied traffic is one of two options:</p><ul><li><p>Device client (WARP) Proxy IP – Cloudflare forward proxies traffic from the user using an IP from the default IP range shared across all Zero Trust accounts</p></li><li><p>Dedicated egress IP – Cloudflare provides customers with a dedicated IP (IPv4 and IPv6) or range of IPs geolocated to one or more Cloudflare network locations</p></li></ul><p>The WARP Proxy IP range is the default egress method for all Cloudflare Zero Trust customers. It is a great way to preserve the privacy of your organization as user traffic is sent to the nearest Cloudflare network location which ensures the most performant Internet experience. But setting source IP security policies based on this default IP range does not provide the granularity that admins often require to filter their user traffic.</p><p>Dedicated egress IPs are useful in situations where administrators want to allowlist traffic based on a persistent identifier. As their name suggests, these dedicated egress IPs are exclusively available to the assigned customer—and not used by any other customers routing traffic through Cloudflare’s network.</p><p>Additionally, leasing these dedicated egress IPs from Cloudflare helps avoid any privacy concerns which arise when carving them out from an organization’s own IP ranges. And furthermore, alleviates the need to protect your any of the IP ranges that are assigned to your on-premise VPN appliance from DDoS attacks or otherwise.</p><p>Dedicated egress IPs are available as add-on to for any Cloudflare Zero Trust enterprise-contracted customer. Contract customers can select the specific Cloudflare data centers used for their dedicated egress, and all subscribing customers receive at least two IPs to start, so user traffic is always routed to the closest dedicated egress data center for performance and resiliency. Finally, organizations can egress their traffic through Cloudflare’s dedicated IPs via their preferred on-ramps. These include Cloudflare’s device client (WARP), proxy endpoints, GRE and IPsec on-ramps, or any of our 1600+ peering network locations, including major ISPs, cloud providers, and enterprises.</p>
    <div>
      <h3>Customer use cases today</h3>
      <a href="#customer-use-cases-today">
        
      </a>
    </div>
    <p>Cloudflare customers around the world are taking advantage of Gateway dedicated egress IPs to streamline application access. Below are three most common use cases we’ve seen deployed by customers of varying sizes and across industries:</p><ul><li><p><b>Allowlisting access to apps from third parties:</b> Users often need to access tools controlled by suppliers, partners, and other third party organizations. Many of those external organizations still rely on source IP to authenticate traffic. Dedicated egress IPs make it easy for those third parties to fit within these existing constraints.</p></li><li><p><b>Allowlisting access to SaaS apps:</b> Source IPs are still commonly used as a defense-in-depth layer for how users access SaaS apps, alongside other more advanced measures like <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">multi-factor authentication</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-an-identity-provider/">identity provider checks</a>.</p></li><li><p><b>Deprecating VPN usage:</b> Often hosted VPNs will be allocated IPs within the customers advertised IP range. The security flaws, performance limitations, and administrative complexities of VPNs are well-documented in our <a href="/how-to-augment-or-replace-your-vpn">recent Cloudflare blog</a>. To ease customer migration, users will often choose to maintain any IP allowlist processes in place today.</p></li></ul><p>Through this, administrators are able to maintain the convenience of building policies with fixed, known IPs, while accelerating performance for end users by routing through Cloudflare’s global network.</p>
    <div>
      <h3>Cloudflare Zero Trust egress policies</h3>
      <a href="#cloudflare-zero-trust-egress-policies">
        
      </a>
    </div>
    <p>Today, we are excited to announce an upcoming way to build more granular policies using Cloudflare’s dedicated egress IPs. With a forthcoming egress IP policy builder in the Cloudflare Zero Trust dashboard, administrators can specify which IP is used for egress traffic based on identity, application, network and geolocation attributes.</p><p>Administrators often want to route only certain traffic through dedicated egress IPs—whether for certain applications, certain Internet destinations, and certain user groups. Soon, administrators can set their preferred egress method based on a wide variety of selectors such as application, content category, domain, user group, destination IP, and more. This flexibility helps organizations take a layered approach to security, while also maintaining high performance (often via dedicated IPs) to the most critical destinations.</p><p>Furthermore, administrators will be able to use the egress IP policy builder to geolocate traffic to any country or region where Cloudflare has a presence. This geolocation capability is particularly useful for globally distributed teams which require geo-specific experiences.</p><p>For example, a large media conglomerate has marketing teams that would verify the layouts of digital advertisements running across multiple regions. Prior to partnering with Cloudflare, these teams had clunky, manual processes to verify their ads were displaying as expected in local markets: either they had to ask colleagues in those local markets to check, or they had to spin up a VPN service to proxy traffic to the region. With an egress policy these teams would simply be able to match a custom test domain for each region and egress using their dedicated IP deployed there.</p>
    <div>
      <h3>What’s Next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>You can take advantage of Cloudflare’s dedicated egress IPs by adding them onto a Cloudflare Zero Trust <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">Enterprise plan</a> or contacting your account team. If you would like to be contacted when we release the Gateway egress policy builder, <a href="http://www.cloudflare.com/zero-trust/lp/egress-policies-beta">join the waitlist here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Egress]]></category>
            <guid isPermaLink="false">4eW5y859iFlWmPFC0ENX2b</guid>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>James Chang</dc:creator>
        </item>
    </channel>
</rss>