
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 14:42:04 GMT</lastBuildDate>
        <item>
            <title><![CDATA[How sophisticated scammers and phishers are preying on customers of Silicon Valley Bank]]></title>
            <link>https://blog.cloudflare.com/how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank/</link>
            <pubDate>Tue, 14 Mar 2023 23:11:35 GMT</pubDate>
            <description><![CDATA[ In order to breach trust and trick unsuspecting victims, threat actors overwhelmingly use topical events as lures. The news about what happened at Silicon Valley Bank is the latest event to watch out for and stay vigilant against opportunistic phishing campaigns using SVB as the lure ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2K9Pq73I7we9IQNaqEV9Yk/dae023389b8cbdc00e8202d96378098c/SVB---Banking-Phishing.png" />
            
            </figure><p>By now, the news about what happened at Silicon Valley Bank (SVB) leading up to its <a href="https://www.cnn.com/2023/03/11/business/svb-collapse-roundup-takeaways/index.html">collapse</a> and takeover by the US Federal Government is well known. The rapid speed with which the collapse took place was surprising to many and the impact on organizations, both large and small, is expected to last a while.</p><p>Unfortunately, where everyone sees a tragic situation, threat actors see opportunity. We have seen this time and again - in order to breach trust and trick unsuspecting victims, threat actors overwhelmingly use topical events as lures. These follow the news cycle or known high profile events (The Super Bowl, March Madness, Tax Day, Black Friday sales, COVID-19, and on and on), since there is a greater likelihood of users falling for messages referencing what’s top of mind at any given moment.</p><p>The SVB news cycle makes for a similarly compelling topical event that threat actors can take advantage of; and it's crucial that organizations bolster their awareness campaigns and technical controls to help counter the eventual use of these tactics in upcoming attacks. It’s tragic that even as the FDIC is guaranteeing that SVB customers’ money is safe, bad actors are attempting to steal that very money!</p>
    <div>
      <h3>Preemptive action</h3>
      <a href="#preemptive-action">
        
      </a>
    </div>
    <p>In anticipation of future phishing attacks taking advantage of the SVB brand, <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a> (Cloudflare’s threat operations and research team) significantly increased our brand monitoring focused on SVB’s digital presence starting March 10, 2023 and launched several additional detection modules to spot SVB-themed phishing campaigns. All of our customers taking advantage of our various <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">phishing protection services</a> automatically get the benefit of these new models.</p><p>Here’s an actual example of a real campaign involving SVB that’s happening since the bank was taken over by the FDIC.</p>
    <div>
      <h3>KYC phish - DocuSign-themed SVB campaign</h3>
      <a href="#kyc-phish-docusign-themed-svb-campaign">
        
      </a>
    </div>
    <p>A frequent tactic used by threat actors is to mimic ongoing KYC (Know Your Customer) efforts that banks routinely perform to validate details about their clients. This is intended to protect financial institutions against fraud, money laundering and financial crime, amongst other things.</p><p>On March 14, 2023, Cloudflare detected a large KYC phishing campaign leveraging the SVB brand in a DocuSign themed template. This campaign targeted Cloudflare and almost all industry verticals. Within the first few hours of the campaign, we detected 79 examples targeting different individuals in multiple organizations. Cloudflare is publishing one specific example of this campaign along with the tactics and observables seen to help customers be aware and vigilant of this activity.</p>
    <div>
      <h3>Campaign Details</h3>
      <a href="#campaign-details">
        
      </a>
    </div>
    <p>The phishing attack shown below targeted Matthew Prince, Founder &amp; CEO of Cloudflare on March 14, 2023. It included HTML code that contains an initial link and a complex redirect chain that is four-deep. The chain begins when the user clicks the ‘<i>Review Documents’</i> link. It takes the user to a trackable analytic link run by Sizmek by Amazon Advertising Server bs[.]serving-sys[.]com. The link then further redirects the user to a Google Firebase Application hosted on the domain na2signing[.]web[.]app. The na2signing[.]web[.]app HTML subsequently redirects the user to a WordPress site which is running yet another redirector at eaglelodgealaska[.]com. After this final redirect, the user is sent to an attacker-controlled docusigning[.]kirklandellis[.]net website.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CUrJjdOU6E91EhkVvJ97S/2539df0907ea0b9f546b5b4507ec99f7/Screenshot-2023-03-14-at-10.11.01.png" />
            
            </figure><p>Campaign Timeline</p>
            <pre><code>2023-03-14T12:05:28Z		First Observed SVB DocuSign Campaign Launched
2023-03-14T15:25:26Z		Last Observed SVB DocuSign Campaign Launched</code></pre>
            
    <div>
      <h3>A look at the HTML file Google Firebase application (na2signing[.]web[.]app)</h3>
      <a href="#a-look-at-the-html-file-google-firebase-application-na2signing-web-app">
        
      </a>
    </div>
    <p>The included HTML file in the attack sends the user to a WordPress instance that has recursive redirection capability. As of this writing, we are not sure if this specific WordPress installation has been compromised or a plugin was installed to open this redirect location.</p>
            <pre><code>&lt;html dir="ltr" class="" lang="en"&gt;&lt;head&gt;
    &lt;title&gt;Sign in to your account&lt;/title&gt;
    
    &lt;script type="text/javascript"&gt;
    window.onload = function() {
        function Redirect (url){
            window.location.href = url;
        }
        var urlParams = new URLSearchParams(window.location.href);
        var e = window.location.href;
        
       
        Redirect("https://eaglelodgealaska[.]com/wp-header.php?url="+e);
    }
&lt;/script&gt;
</code></pre>
            
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    
            <pre><code>na2signing[.]web[.]app	Malicious Google Cloudbase Application.
eaglelodgealaska[.]com	Possibly compromised Wordpress website or an open redirect.

*[.]kirklandellis[.]net		Attacker Controlled Application running on at least docusigning[.]kirklandellis[.]net.</code></pre>
            
    <div>
      <h3>Recommendations</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <ol><li><p>Cloudflare Email Security customers can determine if they have received this campaign in their dashboard with the following search terms:</p><p><code>SH_6a73a08e46058f0ff78784f63927446d875e7e045ef46a3cb7fc00eb8840f6f0</code></p><p>Customers can also track IOCs related to this campaign through our Threat Indicators API. Any updated IOCs will be continually pushed to the relevant API endpoints.</p></li><li><p>Ensure that you have appropriate DMARC policy enforcement for inbound messages. Cloudflare recommends <b>[p = quarantine]</b> for any DMARC failures on incoming messages at a minimum. SVB’s DMARC records [<code>v=DMARC1; p=reject; pct=100</code>] explicitly state rejecting any messages that impersonate their brand and are not being sent from SVB’s list of designated and verified senders. Cloudflare Email Security customers will automatically get this enforcement based on SVB’s published DMARC records. For other domains, or to apply broader DMARC based policies on all inbound messages, Cloudflare recommends adhering to ‘Enhanced Sender Verification’ policies across all inbound emails within their <a href="https://developers.cloudflare.com/email-security/email-configuration/email-policies/">Cloudflare Area 1 dashboard</a>.</p></li><li><p>Cloudflare Gateway customers are automatically protected against these malicious URLs and domains. Customers can check their logs for these specific IOCs to determine if their organization had any traffic to these sites.</p></li><li><p>Work with your phishing awareness and training providers to deploy SVB-themed phishing simulations for your end users, if they haven’t done so already.</p></li><li><p>Encourage your end users to be vigilant about any ACH (Automated Clearing House) or SWIFT (Society for Worldwide Interbank Financial Telecommunication) related messages. ACH &amp; SWIFT are systems which financial institutions use for electronic funds transfers between entities. Given its large scale prevalence, ACH &amp; SWIFT phish are frequent tactics leveraged by threat actors to redirect payments to themselves. While we haven’t seen any large scale ACH campaigns utilizing the SVB brand over the past few days, it doesn’t mean they are not being planned or are imminent. Here are a few example subject lines to be aware of, that we have seen in similar payment fraud campaigns:</p><p><i>“We’ve changed our bank details”“Updated Bank Account Information”“YOUR URGENT ACTION IS NEEDED -Important - Bank account details change”“Important - Bank account details change”“Financial Institution Change Notice”</i></p></li><li><p>Stay vigilant against look-alike or cousin domains that could pop up in your email and web traffic associated with SVB. Cloudflare customers have in-built new domain controls within their email &amp; web traffic which would prevent <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">anomalous activity</a> coming from these new domains from getting through.</p></li><li><p>Ensure any public facing web applications are always patched to the latest versions and run a modern Web Application Firewall service in front of your applications. The campaign mentioned above took advantage of WordPress, which is frequently used by threat actors for their phishing sites. If you’re using the Cloudflare WAF, you can be automatically protected from third party CVEs before you even know about them. Having an effective <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> is critical to preventing threat actors from taking over your public Web presence and using it as part of a phishing campaign, SVB-themed or otherwise.</p></li></ol>
    <div>
      <h3>Staying ahead</h3>
      <a href="#staying-ahead">
        
      </a>
    </div>
    <p>Cloudforce One (Cloudflare’s threat operations team) proactively monitors emerging campaigns in their formative stages and publishes advisories and detection model updates to ensure our customers are protected. While this specific campaign is focused on SVB, the tactics seen are no different to other similar campaigns that our global network sees every day and automatically stops them before it impacts our customers.</p><p>Having a blend of strong technical controls across multiple communication channels along with a trained and vigilant workforce that is aware of the dangers posed by digital communications is crucial to stopping these attacks from going through.</p><p>Learn more about how Cloudflare can help in your own journey towards comprehensive phishing protection by using our <a href="https://www.cloudflare.com/zero-trust-hub/">Zero Trust services</a> and reach out for a <a href="https://www.cloudflare.com/lp/emailsecurity/">complimentary assessment today</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">7b0pR9io6vgFmhNY2MJybq</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Blake Darché</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing browser isolation for email links to stop modern phishing threats]]></title>
            <link>https://blog.cloudflare.com/email-link-isolation/</link>
            <pubDate>Mon, 20 Jun 2022 14:02:00 GMT</pubDate>
            <description><![CDATA[ As part of our exciting journey to integrate Area 1 into our broader Zero Trust suite, Cloudflare Gateway customers can soon enable Remote Browser Isolation for email links. With Email Link Isolation, gain an unmatched level of protection from sophisticated multi-channel email-based attacks ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YQ1f5ulfZD0daYx2dAfDk/2e897fb4a2f8b01f781b2fe0e37a31c8/image6-8.png" />
            
            </figure><p>There is an implicit and unearned trust we place in our email communications. This realization — that an organization can't truly have a Zero Trust security posture without including email — was the driving force behind <a href="/why-we-are-acquiring-area-1/">Cloudflare’s acquisition of Area 1 Security</a> earlier this year.  Today, we have taken our first step in this exciting journey of integrating Cloudflare Area 1 email security into our broader Cloudflare One platform. Cloudflare Secure Web Gateway customers can soon enable <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI)</a> for email links, giving them an unmatched level of protection from modern multi-channel email-based attacks.</p><p>Research from Cloudflare Area 1 found that nearly 10% of all observed malicious attacks involved credential harvesters, highlighting that victim identity is what threat actors usually seek. While commodity phishing attacks are blocked by existing security controls, modern attacks and payloads don’t have a set pattern that can reliably be matched with a block or quarantine rule. Additionally, with the growth of multi-channel phishing attacks, an effective <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a> needs the ability to detect blended campaigns spanning email and Web delivery, as well as deferred campaigns that are benign at delivery time, but weaponized at click time.</p><p>When enough “fuzzy” signals exist, isolating the destination to ensure end users are secure is the most effective solution. Now, with the integration of <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> into Cloudflare Area 1 email security, these attacks can now be easily detected and neutralized.</p>
    <div>
      <h3>Human error is human</h3>
      <a href="#human-error-is-human">
        
      </a>
    </div>
    <p>Why do humans <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7005690/">still click</a> on malicious links? It’s not because they haven’t attended enough training sessions or are not conscious about security. It’s because they have 50 unread emails in their inbox, have another Zoom meeting to get to, or are balancing a four-year old on their shoulders. They are trying their best. Anyone, <a href="https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/">including security researchers</a>, can fall for socially engineered attacks if the adversary is well-prepared.</p><p>If we accept that human error is here to stay, developing security workflows introduces new questions and goals:</p><ul><li><p>How can we reduce, rather than eliminate, the likelihood of human error?</p></li><li><p>How can we reduce the impact of human error when, not if, it happens?</p></li><li><p>How can security be embedded into an employee’s existing daily workflows?</p></li></ul><p>It’s these questions that we had in mind when we reached the conclusion that email needs to be a fundamental part of any <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>. Humans make mistakes in email just as regularly — in fact, sometimes more so — as they make mistakes surfing the Web.</p>
    <div>
      <h3>To block, or not to block?</h3>
      <a href="#to-block-or-not-to-block">
        
      </a>
    </div>
    <p>For IT teams, that is the question they wrestle with daily to balance risk mitigation with user productivity. The <a href="https://www.cloudflare.com/learning/security/glossary/what-is-a-security-operations-center-soc/">SOC</a> team wants IT to block everything risky or unknown, whereas the business unit wants IT to allow everything not explicitly bad. If IT decides to block risky or unknown links, and it results in a false positive, they waste time manually adding URLs to allow lists — and perhaps the attacker later pivots those URLs to malicious content anyway. If IT decides to allow risky or unknown sites, best case they waste time reimaging infected devices and resetting login credentials — but all too common, they triage the damage from a data breach or <a href="/targeted-ransomware-attack/">ransomware</a> lockdown. The operational simplicity of enabling RBI with email — also known as email link isolation — saves the IT, SOC, and business unit teams significant time.</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>For a Cloudflare Area 1 customer, the initial steps involve enabling RBI within your portal:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DB66MqCc1WgkzVLqbgB0q/27ac7d5a7619a8992949742e89ac50bb/image5-8.png" />
            
            </figure><p>With email link isolation in place, here’s the short-lived life of an email with suspicious links:</p><p><b>Step 1:</b> Cloudflare Area 1 inspects the email and determines that certain links in the messages are suspicious or on the margin</p><p><b>Step 2:</b> Suspicious URLs and hyperlinks in the email get rewritten to a custom Cloudflare Area 1 prefix URL.</p><p><b>Step 3:</b> The email is delivered to the intended inboxes.</p><p><b>Step 4:</b> If a user clicks the link in the email, Cloudflare redirects to a remote browser via <code>&lt;authdomain&gt;.cloudflareaccess.com/browser/{{url}}</code>.</p><p><b>Step 5:</b> Remote browser loads a website on a server on the Cloudflare Global Network and serves draw commands to the user's clientless browser endpoint**.**</p><p>By executing the browser code and controlling user interactions on a remote server rather than a user device, any and all malware and phishing attempts are isolated, and won't infect devices and compromise user identities. This improves both user and endpoint security when there are unknown risks and unmanaged devices, and allows users to access websites without having to connect to a VPN or having strict firewall policies.</p><p>Cloudflare’s RBI technology uses a unique patented technology called <a href="/cloudflare-and-remote-browser-isolation/">Network Vector Rendering (NVR)</a> that utilizes headless Chromium-based browsers in the cloud, transparently intercepts draw layer output, transmits the draw commands efficiency and securely over the web, and redraws them in the windows of local HTML5 browsers. Unlike legacy Browser Isolation technologies that relied on pixel pushing or DOM reconstruction, NVR is optimized for scalability, security and end user transparency, while ensuring the broadest compatibility with websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QDHEc1rlX53Z5kc2k0tob/dab1e12b7103cfca3623ac75965dc599/image1-11.png" />
            
            </figure>
    <div>
      <h3>A phishing attack before email link isolation</h3>
      <a href="#a-phishing-attack-before-email-link-isolation">
        
      </a>
    </div>
    <p>Let’s look at a specific example of a deferred phishing attack, how it slips past traditional defenses, and how email link isolation addresses the threat.</p><p>As organizations look to adopt new security principles and network architectures like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, adversaries continually come up with techniques to bypass these controls by exploiting the most used and most vulnerable application – email. Email is a good candidate for compromise because of its ubiquity and ability to be bypassed pretty easily by a motivated attacker.</p><p>Let’s take an example of a “deferred phishing attack”, without email link isolation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2c21s9A2FUgNs7mjZOInav/b99ae23100048308c28b534bc49a4dfb/image4-9.png" />
            
            </figure><p><b>Attacker preparation: weeks before launch</b>The attacker sets up infrastructure for the phishing attempt to come. This may include:</p><ul><li><p>Registering a domain</p></li><li><p>Encrypting it with SSL</p></li><li><p>Setting up proper email authentication (<a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF</a>, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a>, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC)</a></p></li><li><p>Creating a benign web page</p></li></ul><p>At this point, there is no evidence of an attack that can be picked up by secure email gateways, authentication-based solutions, or threat intelligence that relies solely on reputation-based signals and other deterministic detection techniques.</p><p><b>Attack “launch”: Sunday afternoon</b>The attacker sends an authentic-looking email from the newly-created domain. This email includes a link to the (still benign) webpage. There’s nothing in the email to block or flag it as suspicious. The email gets delivered to intended inboxes.</p><p><b>Attack launch: Sunday evening</b>Once the attacker is sure that all emails have reached their destination, they pivot the link to a malicious destination by changing the attacker-controlled webpage, perhaps by creating a fake login page to harvest credentials.</p><p><b>Attack landing: Monday morning</b>As employees scan their inboxes to begin their week, they see the email. Maybe not all of them click the link, but some of them do. Maybe not all of those that clicked enter their credentials, but a handful do. Without email link isolation, the attack is successful.</p><p>The consequences of the attack have also just begun – once user login credentials are obtained, attackers can <a href="https://www.crn.com/news/security/solarwinds-ceo-confirms-office-365-email-compromise-played-role-in-broad-based-attack">compromise legitimate accounts</a>, distribute malware to your organization’s network, steal confidential information, and cause much more downstream damage.</p>
    <div>
      <h3>A phishing attack after email link isolation</h3>
      <a href="#a-phishing-attack-after-email-link-isolation">
        
      </a>
    </div>
    <p>The integration between Cloudflare Area 1 and Cloudflare Browser Isolation provides a critical layer of post-delivery protection that can foil attacks like the deferred phishing example described above.</p><p>If the attacker prepares for and executes the attack as stated in the previous section, our email link isolation would analyze the email link at the time of click and perform a high-level assessment on whether the user should be able to navigate to it.</p><p><b>Safe link</b> - Users will be redirected to this site transparently</p><p><b>Malicious link</b> - Users are blocked from navigating</p><p><b>Suspicious link</b> - Users are heavily discouraged to navigating and are presented with a splash warning page encouraging them to view in the link in an isolated browser</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WinnctxUCvAnCPJsM45BE/45d9fda72b702eb51d0f39683b4b3408/image3-14.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CAGmRXrUrW6Le2iX3yLjH/3a4889d9b6c627a9f4bd94a1a4c78361/image2-15.png" />
            
            </figure><p>While a splash warning page was the mitigation employed in the above example, email link isolation will also offer security administrators other customizable mitigation options as well, including putting the webpage in read-only mode, restricting the download and upload of files, and disabling keyboard input altogether within their Cloudflare Gateway consoles.</p><p>Email link isolation also fits into users’ existing workflows without impacting productivity or sapping their time with IT tickets. Because Cloudflare Browser Isolation is built and deployed on the Cloudflare network, with global locations in 270 cities, web browsing sessions are served as close to users as possible, minimizing latency. Additionally, Cloudflare Browser Isolation sends the final output of each webpage to a user instead of page scrubbing or sending a pixel stream, further reducing latency and not breaking browser-based applications such as SaaS.</p>
    <div>
      <h3>How do I get started?</h3>
      <a href="#how-do-i-get-started">
        
      </a>
    </div>
    <p>Existing Cloudflare Area 1 and Cloudflare Gateway customers are eligible for the beta release of email link isolation. To learn more and to express interest, <a href="http://www.cloudflare.com/zero-trust/lp/email-link-isolation">sign up for our upcoming beta</a>.</p><p>If you’d like to see what threats Cloudflare Area 1 detects on your live email traffic, request a free phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>. It takes five minutes to get started and does not impact mail flow.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">22Vv0Qr11T3jQcQy2q08TS</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Tarika Srinivasan</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to replace your email gateway with Cloudflare Area 1]]></title>
            <link>https://blog.cloudflare.com/replace-your-email-gateway-with-area-1/</link>
            <pubDate>Mon, 20 Jun 2022 13:14:55 GMT</pubDate>
            <description><![CDATA[ Traditional SEG architectures were built for the email environments of yesterday. Learn how to seamlessly transition to cloud-native, preemptive email security ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Leaders and practitioners responsible for <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> are faced with a few truths every day. It’s likely true that their email is cloud-delivered and comes with some built-in protection that does an OK job of stopping spam and commodity malware. It’s likely true that they have spent considerable time, money, and staffing on their Secure Email Gateway (SEG) to stop phishing, malware, and other email-borne threats. Despite this, it’s also true that email continues to be the most frequent source of Internet threats, with Deloitte research finding that 91% of all cyber attacks begin with phishing.</p><p>If anti-phishing and SEG services have both been around for so long, why do so many phish still get through? If you’re sympathetic to <a href="https://en.wikipedia.org/wiki/Occam's_razor">Occam’s razor</a>, it’s because the SEG was not designed to protect the email environments of today, nor is it effective at reliably stopping today’s phishing attacks.</p><p>But if you need a stronger case than Occam delivers — then keep on reading.</p>
    <div>
      <h3>Why the world has moved past the SEG</h3>
      <a href="#why-the-world-has-moved-past-the-seg">
        
      </a>
    </div>
    <p>The most prominent change within the email market is also what makes a traditional SEG redundant – the move to cloud-native email services. More than 85% of organizations are expected to embrace a “cloud-first” strategy by 2025, <a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences">according to Gartner</a>®. Organizations that expect cloud-native scale, resiliency, and flexibility from their security controls are not going to get it from legacy devices such as SEGs.</p><p>When it comes to email specifically, <a href="https://www.gartner.com/document/4006566">Gartner® notes</a> that, “Advanced email security capabilities are increasingly being deployed as integrated cloud email security solutions rather than as a gateway” - with at least 40% of organizations using built-in protection capabilities from cloud email providers instead of a SEG, by 2023. Today, email comes from everywhere and goes everywhere – putting a SEG in front of your Exchange server is anachronistic; and putting a SEG in front of cloud inboxes in a mobile and remote-first world is intractable. <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">Email security</a> today should follow your user, should be close to your inbox, and should “be everywhere”.</p><p>Apart from being architecturally out of time, a SEG also falls short at detecting advanced phishing and socially engineered attacks. This is because a SEG was originally designed to stop spam – a high-volume problem that needs large attack samples to detect and nullify. But today’s phishing attacks are more sniper than scattergun. They are low volume, highly targeted, and exploit our implicit trust in email communications to steal money and data. Detecting modern phishing attacks requires compute-intensive advanced email analysis and threat detection algorithms that a SEG cannot perform at scale.</p><p>Nowhere is a SEG’s outdated detection philosophy more laid bare than when admins are confronted with a mountain of email threat policies to create and tune. Unlike most other cyber attacks, email phishing and <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise (BEC)</a> have too many “fuzzy” signals and cannot solely be detected by deterministic if-then statements. Moreover, attackers don’t stand still while you create email threat policies – they adapt fast and modify techniques to bypass the rules you just created. Relying on SEG tuning to stop phishing is like playing a game of Whack-A-Mole rigged in the attacker’s favor.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SK0PsBM13jyobYcZF25fg/3d9efeb49a1df1a1d49c316692f283a8/image1-12.png" />
            
            </figure>
    <div>
      <h3>To stop phishing, look ahead</h3>
      <a href="#to-stop-phishing-look-ahead">
        
      </a>
    </div>
    <p>Traditional email security defenses rely on knowledge of yesterday’s active attack characteristics, such as reputation data and threat signatures, to detect the next attack, and therefore can’t reliably defend against modern phishing attacks that continually evolve.</p><p>What’s needed is forward-looking security technology that is aware not only of yesterday’s active phishing payloads, websites, and techniques — but also has insight into the threat actors’ next moves. Which sites and accounts are they compromising or establishing for use in tomorrow’s attacks? What payloads and techniques are they preparing to use in those attacks? Where are they prodding and probing before an attack?</p><p>Cloudflare Area 1 proactively scans the Internet for attacker infrastructure and phishing campaigns that are under construction. Area 1’s threat-focused web crawlers dynamically analyze suspicious web pages and payloads, and continuously update detection models as attacker tactics evolve – all to stop phishing attacks days before they reach the inbox.</p><p>When combined with the 1T+ daily DNS requests observed by <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>, this corpus of threat intelligence enables customers to stop phishing threats at the earliest stage of the attack cycle. In addition, the use of deep contextual analytics to understand message sentiment, tone, tenor and thread variations allows Area 1 to understand and distinguish between valid business process messages and sophisticated impersonation campaigns.</p><p>While we are big believers in layering security, the layers should not be redundant. A SEG duplicates a lot of capabilities that customers now get bundled in with their cloud email offering. Area 1 is built to enhance - not duplicate - native email security and stop phishing attacks that get past initial layers of defense.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wa98Zw9glRlVzhd2Ehdaz/0974a784a8561c9d49e2b519b89403f1/image4-10.png" />
            
            </figure>
    <div>
      <h3>Planning for your SEG replacement project</h3>
      <a href="#planning-for-your-seg-replacement-project">
        
      </a>
    </div>
    <p>The best way to get started with your SEG replacement project is deciding whether it’s a straight replacement or an eventual replacement that starts with augmentation. While Cloudflare Area 1 has plenty of customers that have replaced their SEG (more on that later), we have also seen scenarios where customers prefer to run Cloudflare Area 1 downstream of their SEG initially, assess the efficacy of both services, and then make a more final determination. We make the process straightforward either way!</p><p>As you start the project, it’s important to involve the right stakeholders. At a minimum, you should involve an IT admin to ensure email delivery and productivity isn’t impacted and a security admin to monitor detection efficacy. Other stakeholders might include your channel partner if that’s your preferred procurement process and someone from the privacy and compliance team to verify proper handling of data.</p><p>Next, you should decide your preferred Cloudflare Area 1 deployment architecture. Cloudflare Area 1 can be deployed as the MX record, over APIs, and can even run in multi-mode deployment. We recommend deploying Cloudflare Area 1 as the MX record for the most effective <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protection against external threats</a>, but the service fits into your world based on your business logic and specific needs.</p><p>The final piece of preparation involves mapping out your email flow. If you have multiple domains, identify where emails from each of your domains route to. Check your different routing layers (e.g. are there MTAs that relay inbound messages?). Having a good understanding of the logical and physical SMTP layers within the organization will ensure proper routing of messages. Discuss what email traffic Cloudflare Area 1 should scan (north/south, east/west, both) and where it fits with your existing email policies.</p>
    <div>
      <h3>Executing the transition plan</h3>
      <a href="#executing-the-transition-plan">
        
      </a>
    </div>
    <p><b>Step 1: Implement email protection</b>Here are the broad steps you should follow if Cloudflare Area 1 is configured as the MX record (time estimate: ~30 minutes):</p><ul><li><p>Configure the downstream service to accept mail from Cloudflare Area 1.</p></li><li><p>Ensure that Cloudflare Area 1’s egress IPs are not rate limited or blocked as this would affect delivery of messages.</p></li><li><p>If the email server is on-premises, update firewall rules to allow Cloudflare Area 1 to deliver to these systems.</p></li><li><p>Configure remediation rules (e.g. quarantine, add subject or message body prefix, etc.).</p></li><li><p>Test the message flow by injecting messages into Cloudflare Area 1 to confirm proper delivery. (our team can assist with this step.)</p></li><li><p>Update MX records to point to Cloudflare Area 1.</p></li></ul><p>Here are the steps if Cloudflare Area 1 is deployed downstream from an existing email security solution (time estimate: ~30 minutes):</p><ul><li><p>Configure the proper look back hops on Cloudflare Area 1, so that Cloudflare Area 1 can detect the original sender IP address.</p></li><li><p>If your email server is on-premises, update firewall rules to allow Cloudflare Area 1 to deliver to the email server.</p></li><li><p>Configure remediation rules (e.g. quarantine, add subject or message body prefix, etc.).</p></li><li><p>Test the message flow by injecting messages into Cloudflare Area 1 to confirm proper delivery. (our team can assist with this step.)</p></li><li><p>Update the delivery routes on your SEG to deliver all mail to Cloudflare Area 1, instead of the email servers.</p></li></ul><p><b>Step 2: Integrate DNS</b>One of the most common post-email steps customers follow is to integrate Cloudflare Area 1 with their DNS service. If you’re a Cloudflare Gateway customer, good news – Cloudflare Area 1 now uses Cloudflare Gateway as its <a href="https://www.cloudflare.com/learning/dns/what-is-recursive-dns/">recursive DNS</a> to protect end users from accessing phishing and malicious sites through email links or web browsing.</p><p><b>Step 3: Integrate with downstream security monitoring and remediation services</b>Cloudflare Area 1’s detailed and customizable reporting allows for at-a-glance visibility into threats. By integrating with SIEMs through our robust APIs, you can easily correlate Cloudflare Area 1 detections with events from network, endpoint and other security tools for simplified incident management.</p><p>While Cloudflare Area 1 provides built-in remediation and message retraction to allow customers to respond to threats directly within the Cloudflare Area 1 dashboard, many organizations also choose to integrate with orchestration tools for custom response playbooks. Many customers leverage our API hooks to integrate with SOAR services to manage response processes across their organization.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XVEtkicf9X4ySbz5UZyjE/9ac44ea6c8dc47c3bf6dd511dcd06a75/image2-16.png" />
            
            </figure>
    <div>
      <h3>Metrics to measure success</h3>
      <a href="#metrics-to-measure-success">
        
      </a>
    </div>
    <p>How will you know your SEG replacement project has been successful and had the desired impact? We recommend measuring metrics relevant to both detection efficacy and operational simplicity.</p><p>On the detection front, the obvious metric to measure is the number and nature of phishing attacks blocked before and after the project. Are you seeing new types of phishing attacks being blocked that you weren’t seeing before? Are you getting visibility into campaigns that hit multiple mailboxes? The other detection-based metric to keep in mind is the number of false positives.</p><p>On the operational front, it’s critical that email productivity isn’t impacted. A good proxy for this is measuring the number of IT tickets related to email delivery. The availability and uptime of the email security service is another key lever to keep an eye on.</p><p>Finally, and perhaps most importantly, measure how much time your security team is spending on email security. Hopefully it’s much less than before! A SEG is known to be a heavy-lift service deployment to ongoing maintenance. If Cloudflare Area 1 can free up your team’s time to work on other pressing security concerns, that’s as meaningful as stopping the phish themselves.</p>
    <div>
      <h3>You have lots of company</h3>
      <a href="#you-have-lots-of-company">
        
      </a>
    </div>
    <p>The reason we are articulating a SEG replacement plan here is because many of our customers have done it already and are happy with the outcomes.</p><p>For example, a Fortune 50 global insurance provider that serves 90 million customers in over 60 countries found their SEG to be insufficient in stopping phishing attacks. Specifically, it was an onerous process to search for “missed phish” once they got past the SEG and reached the inbox. They needed an <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> that could catch these phishing attacks and support a hybrid architecture with both cloud and on-premises mailboxes.</p><p>After deploying Cloudflare Area 1 downstream of their Microsoft 365 and SEG layers, our customer was protected against more than 14,000 phishing threats within the first month; none of those phishing messages reached a user’s inbox. A one-step integration with existing email infrastructure meant that maintenance and operational issues were next to none. Cloudflare Area 1’s automated message retraction and post-delivery protection also enabled the insurance provider to easily search and remediate any missed phish as well.</p><p>If you are interested in speaking with any of our customers that have augmented or replaced their SEG with Cloudflare Area 1, please reach out to your account team to learn more! If you’d like to see Cloudflare Area 1 in action, sign up for a Phishing Risk Assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p><p>Replacing a SEG is a great project to fit into your overall <a href="https://zerotrustroadmap.org/">Zero Trust roadmap</a>. For a full summary of Cloudflare One Week and what’s new, tune in to our <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3824611/the-evolution-of-cloudflare-one">recap webinar</a>.</p><p>-</p><p><sup>1</sup>Gartner Press Release, “<a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences">Gartner Says Cloud Will Be the Centerpiece of New Digital Experiences</a>”, 11 November 2021</p><p><sup>2</sup>Gartner, “Market Guide for Email Security,” 7 October 2021, Mark Harris, Peter Firstbrook, Ravisha Chugh, Mario de BoerGARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">7yjswOAjVL3CSZoC2SxJI2</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Tarika Srinivasan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Democratizing email security: protecting individuals and businesses of all sizes from phishing and malware attacks]]></title>
            <link>https://blog.cloudflare.com/democratizing-email-security/</link>
            <pubDate>Mon, 14 Mar 2022 12:59:33 GMT</pubDate>
            <description><![CDATA[ Once the acquisition of Area 1 closes, we plan to give all paid self-serve plans access to their email security technology at no additional charge ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5t6mGqXJD9qlJOdDYKgFW4/062c99b0769b5c30eb07e056c53a87cd/image1-10.png" />
            
            </figure><p>Since our founding, Cloudflare has been on a mission to take expensive, complex security solutions typically only available to the largest companies and make them easy to use and accessible to everyone. In 2011 and 2015 we did this for the <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">web application firewall</a> and SSL/TLS markets, simplifying the process of protecting websites from application vulnerabilities and encrypting HTTP requests down to single clicks; in 2020, during the start of the COVID-19 pandemic, we made our Zero Trust suite available to everyone; and today—in the face of heightened phishing attacks—we’re doing the same for the email security market.</p><p>Once the acquisition of Area 1 closes, as we expect early in the second quarter of 2022, we plan to give all paid self-serve plans access to their <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security technology</a> at no additional charge. Control, customization, and visibility via analytics will vary with plan level, and the highest flexibility and support levels will be available to Enterprise customers for purchase.</p><p>All self-serve users will also get access to a more feature-packed version of the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust solution</a> we made available to everyone in 2020. Zero Trust services are incomplete without an <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a>, and <a href="https://www.cisa.gov/news/2021/10/01/cisa-kicks-cybersecurity-awareness-month">CISA’s recent report</a> makes that clearer than ever: over 90% of successful cyber attacks start with a phishing email, so we expect that over time analysts will have no choice but to include email in their definitions of secure access and zero edges.</p><p><b>If you’re interested in reserving your place in line, register your interest by logging into your Cloudflare account at dash.cloudflare.com, selecting your domain, clicking Email, and then “Join Waitlist” at the top of the page; we’ll reach out after the Area 1 acquisition is completed, and the integration is ready, in the order we received your request.</b></p>
    <div>
      <h3>One-click deployment</h3>
      <a href="#one-click-deployment">
        
      </a>
    </div>
    <p>If you’re already managing your authoritative DNS with Cloudflare, as nearly 100% of <a href="https://www.cloudflare.com/plans/">non-Enterprise plans</a> are, there will just be a single click to get started. Once clicked, we’ll start returning different MX records to anyone trying to send email to your domain. This change will attract all emails destined for your domain, during which they’ll be run through Area 1’s models and potentially be quarantined or flagged. Customers of Microsoft Office 365 will also be able to take advantage of APIs for an even deeper integration and capabilities like post-delivery message redaction.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CbqzMF8kBl1AP1z62smRo/54807cd4dcf81335a7f0471d01fc67be/image2-10.png" />
            
            </figure><p>In addition to routing and filtering email, we’ll also automagically take care of your DNS email security records such as SPF, DKIM, DMARC, etc. We launched a tool to help with this last year, and soon we’ll be making it even more comprehensive and easier to use.</p>
    <div>
      <h3>Integration with other Zero Trust products</h3>
      <a href="#integration-with-other-zero-trust-products">
        
      </a>
    </div>
    <p>As we wrote in the <a href="/why-we-are-acquiring-area-1/">acquisition announcement post</a> on this blog, we’re excited to integrate email security with other products in our Zero Trust suite. For customers of Gateway and Remote Browser Isolation (RBI), we’ll automatically route potentially suspicious domains and links through these protective layers. Our built-in <a href="/data-loss-prevention/">data loss prevention (DLP) technology</a> will also be wired into Area 1’s technology in deployments where visibility into outbound email is available.</p>
    <div>
      <h3>Improving threat intelligence with new data sources</h3>
      <a href="#improving-threat-intelligence-with-new-data-sources">
        
      </a>
    </div>
    <p>In addition to integrating directly with Zero Trust products, we’re excited about connecting threat data sources from Area 1 into existing Cloudflare products and vice versa. For example, phishing infrastructure identified during Area 1’s Internet-wide scans will be displayed within the recently launched Cloudflare Security Center, and 1.1.1.1’s trillions of queries per month will help Area 1 identify new domains that may be threats. Domains that are newly registered, or registered with slight variations of legitimate domains, are often warning signs of an upcoming phishing attack.</p>
    <div>
      <h3>Getting started</h3>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>Cloudflare has been a happy customer of Area 1’s technology for years, and we’re excited to open it up to all of our customers as soon as possible. If you’re excited as we are about being able to use this in your Pro or Business plan, reserve your place in line today within the Email tab for your domain. Or if you’re an Enterprise customer and want to get started immediately, fill out <a href="https://www.cloudflare.com/lp/emailsecurity/">this form</a> or contact your Customer Success Manager.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">3FxihkQRtKc61pl0Sevyjt</guid>
            <dc:creator>Patrick R. Donahue</dc:creator>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Tip of the ICEberg for Cloud-Native Email Security: Area 1 Named in the Gartner™ Market Guide for Email Security]]></title>
            <link>https://blog.cloudflare.com/2021-gartner-email-security-analysis/</link>
            <pubDate>Thu, 09 Dec 2021 15:53:00 GMT</pubDate>
            <description><![CDATA[ Gone are the days of the Secure Email Gateway (SEG) being an option. Cloud-native email protection with multiple deployment options are now changing the game. With winter in our minds, it’s time to start talking about “ICE.” ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in December 2021 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p><a href="https://www.cloudflare.com/zero-trust/products/email-security/">Email Security</a> has certainly come a long way. With cloud messaging now the standard versus the legacy on premise approach (Lotus Notes anyone?) the strategy of securing these clouds has also experienced a revolution. Gone are the days of the Secure Email Gateway (SEG) being an option. Cloud-native email protection with multiple deployment options are now changing the game. With winter in our minds, it’s time to start talking about “ICE.”</p><p>“ICES” (Integrated Cloud Email Security) solutions appeared for the first time in the recently-published Gartner <a href="https://www.cloudflare.com/lp/gartner-market-guide-email-security/">2021 Market Guide for Email Security</a> (ID G00735200).</p><p>In terms of the broader landscape, two trends carried over from the 2020 Market Guide:</p><ol><li><p>Cloud adoption continues to grow; and</p></li><li><p>Phishing, ransomware and account takeover attacks continue to increase.</p></li></ol><p>Gartner estimates that 70% of organizations now use cloud suites, primarily Microsoft 365 and Google Workspace. Even though these cloud email providers have provided built-in email hygiene and protection capabilities, email continues to be a significant attack vector, with phishing, ransomware and Business Email Compromise attacks resulting in large financial losses. Gartner cautions that, <b>“Continued increases in the volume and success of phishing attacks and migration to cloud email require a reevaluation of email security controls and processes. Security and risk management leaders must ensure that their existing solution remains appropriate for the changing landscape.”</b></p>
    <div>
      <h2>New Gartner Category Provides Better Security ChoICES</h2>
      <a href="#new-gartner-category-provides-better-security-choices">
        
      </a>
    </div>
    <p>In this year’s report, Gartner introduced a new category, Integrated Cloud Email Security (ICES), positioning it as the predominant defense against phishing threats slipping past traditional security controls. Although specific vendor capabilities vary, ICES can offer several advantages over traditional SEGs: advanced threat detection, ease of use, and improved visibility and response. Area 1 Security is pleased to be recognized as a Representative Vendor for this growing new category.</p>
    <div>
      <h3>Advanced Threat Detection</h3>
      <a href="#advanced-threat-detection">
        
      </a>
    </div>
    <p>One of the challenges of sophisticated phishing attacks is that there is often no link or attachment to scan for malware. Instead, attacks use social engineering to lure victims into sending money or sharing credentials. Other advanced attacks embed malicious links or weaponized documents behind layers of benign content, making detection difficult.</p><p>And as Gartner notes, “As built-in security from Microsoft and Google has improved, threat actors are also getting more sophisticated, often targeting them using fake login pages as a way of harvesting credentials.” And, “Many ransomware-as-a-service gangs use email as the initial entry point. Beyond malware, business email compromise and account takeover threats continue to rise, with significant financial losses as a result.”</p><p>Gartner explains that, “To combat these, [ICES] email security solutions use a variety of more-advanced detection techniques, including NLU, NLP, social graph analysis (patterns of email communication) and image recognition.”</p>
    <div>
      <h3>Ease of Use</h3>
      <a href="#ease-of-use">
        
      </a>
    </div>
    <p>With the majority of organizations using cloud email providers, ease of use and ease of integration are important when adding solutions for advanced threat detection. As an ICES solution, Area 1 Horizon™ can integrate with email providers via API, offering flexibility and faster time to value. (More on that flexibility part later.)</p><p>Gartner indicates that more customers will opt for API-based solutions in the future, predicting that the number of <a href="https://www.cloudflare.com/zero-trust/products/email-security/">anti-phishing solutions</a> delivered via API integration with the email platform will increase more than 4x by 2025.</p>
    <div>
      <h3>Improved Visibility and Response</h3>
      <a href="#improved-visibility-and-response">
        
      </a>
    </div>
    <p>Detection is only one piece of the puzzle; broad visibility and fast response are also necessary for an effective cybersecurity program.</p><p>Building on the advantages of APIs just mentioned, ICES solutions allow easy integration of email events into <a href="https://www.cloudflare.com/learning/security/what-is-siem/">security information and event management (SIEM)</a> or security orchestration, analytics and reporting (SOAR) systems via API. This allows for increased threat visibility and better coordinated response. Many ICES also offer built-in response capabilities or managed services offerings.</p>
    <div>
      <h2>Are SEGs on Thin Ice?</h2>
      <a href="#are-segs-on-thin-ice">
        
      </a>
    </div>
    <p>With all the advantages of ICES, it appears that traditional email security systems, many of which are still hardware-based/hosted hypervisors, are having a hard time keeping up. In our experience, many, if not most, of our customers have existing SEGs but come to us to eliminate the security gap left by <a href="https://www.cloudflare.com/static/576535737328a3d81de5dfe644af4b51/BDES-3794_CloudflareArea1_Report_TheStoryBehind140000MissedPhish_REVSEPT2022.pdf">SEGs missing threats</a>.</p><p>Gartner seems to agree, noting that “Initially, these solutions are deployed as a supplement to existing gateway solutions, but <b>increasingly the combination of the cloud email providers’ native capabilities and an ICES is replacing the traditional SEG.”</b></p><p>Gartner also predicts that nearly half (40%) of all organizations will switch to using built-in protection capabilities from cloud email providers and ICES rather than a SEG by 2023. This is an increase of nearly 150%.</p>
    <div>
      <h2>Area 1 Horizon Supports All Gartner Best PractICES</h2>
      <a href="#area-1-horizon-supports-all-gartner-best-practices">
        
      </a>
    </div>
    <p>We are pleased to be recognized in the Gartner first-time ever Integrated Cloud Email Security (ICES) category, and believe that we offer the most effective (and only preemptive) email security to defend organizations against advanced threats.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3wZtNqKWxkUVYpUgzpaIdL/882a41e292b21526310f3566e2f6a22d/image1-28.png" />
            
            </figure><p>As an ICES, Area 1 Horizon uses a variety of more-advanced detection techniques, including NLU, NLP, social graph analysis (patterns of email communication) and image recognition to preemptively detect and stop advanced threats.</p><p>However, unlike many other ICES vendors with API-only integration options, Area 1 can be deployed via API as well as inline as the MX record holder, simultaneously ensuring protection across the entire cycle: pre-delivery, at-delivery and post-delivery. With a focus on providing comprehensive security, our <a href="https://developers.cloudflare.com/email-security/deployment/">flexible deployment options</a> and direct integration make our solution easy to evaluate and prove business value.</p><p>For better visibility and faster response, the Area 1 Horizon platform also comes with built-in response with message retraction, and we easily integrate with SIEMs and SOARs for a cohesive extended detection and response (XDR) strategy.</p><p>As typical of their Market Guides, Gartner provides security practitioners with a short list of recommended vendor criteria.</p><p>We believe that Area 1 successfully maps to every single recommendation, as detailed below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LrYycNR5zXvThxX0y2rco/630dfa42f570f07f3f4d7028fa175033/image3-11.png" />
            
            </figure><p>In addition, Area 1 Security supports 16 out of the 19 key features Gartner calls out for all email security vendors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ch6XCi7mYo3oeNHuxO7aw/5bdcb47a0ae8bdeee4ae0dc33cfc99de/image2-19.png" />
            
            </figure><p>In short, Area 1 offers seamless, deep integration with cloud email providers like Microsoft 365 and Google Workspace for better security. And while many prefer to deploy us just with their email provider for a modern, cloud-first architecture, we also “play nICE” with SEGs, too.</p><p><b>To request a complimentary copy of the Gartner 2021 Market Guide for Email Security, click</b> <a href="https://www.cloudflare.com/lp/gartner-market-guide-email-security/"><b>here</b></a><b>.</b></p><p><b>To assess whether Area 1 Security can help address gaps in your current email security defenses, contact us for a free Phishing Risk Assessment,</b> <a href="https://www.cloudflare.com/lp/emailsecurity/"><b>here</b></a><b>.</b></p><p>Gartner, “Market Guide for Email Security,” Mark Harris, Peter Firstbrook, Ravisha Chugh, Mario de Boer, 7 October 2021.</p><p><b>Gartner Disclaimer:</b>Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1VB3WGHm4OI7GTvUqGvR6V</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Area 1 Security Announces the Most Spoofed Brand of 2020]]></title>
            <link>https://blog.cloudflare.com/2021-march-hackness-phishing-champion/</link>
            <pubDate>Fri, 02 Apr 2021 15:15:00 GMT</pubDate>
            <description><![CDATA[ The COVID-19 pandemic’s influence on phishing and cyberattack lures is clear. Area 1 Security identified over 2 million phishing spoofs that exploited the World Health Organization between May 2020 and February 2021. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in April 2021 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>AMERICA! WE HAVE A 2021 MARCH HACKNESS CHAMPION! (Granted, it’s a phishy title that no organization really wants to win).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5OP9kMN0ogbyWKw3NGGbzY/73cbb05ce10aed1cf311b1ead7133232/image2-2.jpg" />
            
            </figure><p>A Cinderella story. The underdog. The New Kid on the Block is … the <b>World Health Organization</b>!</p><p>Although the WHO won’t want you to get fooled (with phishing) again, they are the undisputed March Hackness Champion of 2021!</p><p>Truly, what a difference a year makes. The COVID-19 pandemic changed the world, including the world of Phishing and cyberattack lures. Our researchers identified <b>over 2 million Phishing spoofs (out of more than 22 million)</b> that specifically exploited the WHO brand between May 2020 to February 2021.</p><p>For example, in this phishing message from last year, the attacker lures victims by posing as the WHO, claiming to offer safety measures on how to stop the spread of the virus. We see Display Name Spoofing, where the <i>true</i> sender is actually this alansariornan[.]com domain.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6lBRIYNkaBnS8r8VibzByK/b4402a8809d643ad17eace65466d57b8/image1-30.png" />
            
            </figure><p>In an attempt to add legitimacy to the phishing example above:</p><ul><li><p>The attacker added the logo for the WHO in the body of their message. This is a common tactic, which Area 1 uses to help detect malicious messages (more specifically, our advanced computer vision algorithms and statistical models essentially train computers to interpret and understand digital images).</p></li><li><p>The attacker also used a fairly sophisticated technique to avoid detection by abusing the legitimate service, Appspot.com, to host their phishing site. Appspot is a cloud computing platform for developing and hosting web apps in Google-managed data centers, so naturally, those domains are commonly whitelisted — and the corresponding links are <i>not</i> typically evaluated.</p></li><li><p>Campaigns like this use well-designed login pages in an attempt to capture login credentials, which are then sent to a remote server controlled by the attacker.</p></li></ul><p>Attackers cleverly and maliciously pivoted to exploit other COVID-19 trends, such as <a href="https://www.nytimes.com/2020/03/22/business/coronavirus-emails.html">businesses sending more sales emails</a>, <a href="https://www.cnbc.com/2020/12/15/coronavirus-pandemic-has-pushed-shoppers-to-e-commerce-sites.html">consumers shopping online more</a>, <a href="https://magazine.realtor/news-and-commentary/feature/covid-19-s-impact-on-real-estate">the real estate surge</a>, and the <a href="https://www.nielsen.com/us/en/insights/article/2020/covid-19-tracking-the-impact-on-media-consumption/">growth of online news content consumption</a>.</p><p>Aside from the likes of the WHO (#1), Moderna (#25) and CDC (#48), these companies (whether they like it or not!) also made our annual phishing bracket for the first time this year:</p><ul><li><p><b><b><b>#7 — Marketo</b></b></b></p></li><li><p><b><b><b>#20 — Columbia Sportswear</b></b></b></p></li><li><p><b><b><b>#24 — UPS</b></b></b></p></li><li><p><b><b><b>#38 — CNN</b></b></b></p></li><li><p><b><b><b>#50 — Zoom</b></b></b></p></li><li><p><b><b><b>#51 — Adidas</b></b></b></p></li><li><p><b><b><b>#53 — Nike</b></b></b></p></li><li><p><b><b><b>#63 — Zillow</b></b></b></p></li></ul><p>Much like in the real tournament, there were several upsets in the Phishing brackets as well. Former 2017 and 2019 March Hackness bracket champion, <b>PayPal</b>, didn’t even crack the Sweet 16 round this time.</p><p><b>With the world on edge in 2020, hackers took every advantage they could to find a way into organizations.</b> Their weapon of choice is trust. Who wouldn’t want information from the WHO about a virus that is affecting every aspect of their lives? Hackers know this, so they use it.</p><p>And as I shared in our prior Not-so-Sweet 16 post, email authentication and sender reputation standards (such as SPF, DKIM and DMARC) aren’t enough to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevent phishing attacks</a> from reaching inboxes.</p><p>Email authentication and sender reputation were designed to help brands deliver their email messages properly — not to help defend your organization from the most sophisticated phish.</p><p>In fact, our co-founder/CSO, Blake Darché, and our principal security researcher, Javier Castro, <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3955867/how-bad-actors-get-past-dmarc-in-60-minutes-or-less">demonstrated</a> through the creation of a real-time, DMARC-passing attack, just how fast and easy it is for attackers to get phishing emails into your inbox.</p><p>Remember, even when you deploy DMARC for your domain:</p><ul><li><p>It’s easy it is to establish a new phishing domain that exploits trusted infrastructure</p></li><li><p>It’s fast to set up DMARC, SPF and DKIM policies for new phishing domains in order to reach inboxes</p></li><li><p>You need to detect phish beyond email authentication via comprehensive message analysis, computer vision, domain registration checks, and other techniques beyond email authentication.</p></li></ul>
    <div>
      <h3>Takeaways from the 2021 March Hackness Tournament</h3>
      <a href="#takeaways-from-the-2021-march-hackness-tournament">
        
      </a>
    </div>
    <p>Here are some other key insights on the past year’s contenders:</p><ul><li><p>The Top 4 “seeds” were seen in over 6 million phishing attacks.</p></li><li><p>The Top 10 accounted for over 56% of ALL spoof- and impersonation-based phishing attacks.</p></li><li><p>Our 64-brand bracket included 15 different industries. The most well-represented were Technology and Financial Services/Banking.</p></li><li><p>Attackers will use what is in the headlines to make attacks land. COVID-19 and a Presidential Election heavily influenced the attack patterns of phishing attacks in the U.S. last year.</p></li></ul><p>Well America, I had a great time with you for the 2021 March Hackness tournament. Will our Cinderella return to the ball next year? You’ll have to join us again to find out!</p><p>Until next time… <i>(Dick Vitale one last time)</i></p><p><b>GOODNIGHT BABY! WE’LL BE DANCING AGAIN NEXT YEAR!</b></p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Spoofing]]></category>
            <guid isPermaLink="false">2MnR0ZE77vjdtm4uMlhKWa</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Annual March Hackness 2021: The Not-So-Sweet 16 —The Pandemic’s Phishing Influence]]></title>
            <link>https://blog.cloudflare.com/2021-march-hackness-not-sweet-16/</link>
            <pubDate>Wed, 31 Mar 2021 15:22:00 GMT</pubDate>
            <description><![CDATA[ The COVID-19 pandemic influenced which brands attackers exploited for phishing campaigns in 2021. For example, the World Health Organization and DocuSign made Area 1 Security’s 2021 March Hackness “Not-so-Sweet 16.” ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2021 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Dick Vitale impression returning in:</p><p><i>3…</i></p><p><i>2…</i></p><p><i>1…</i></p><p>OH MY, WHAT A TOURNAMENT IT HAS BEEN! SOME STUNNING UPSETS! MILLIONS OF BRACKETS BUSTED! IT’S AWESOME (and sometimes awful), BABY!</p><p>Whew… Got that out of the way.</p><p>So, what have we learned from the first two rounds of the Annual March Hackness phishing tournament?</p><p>The COVID-19 pandemic has definitely played into what attackers are using in their business.</p><p>The proof? Cinderella runs thus far for some of our (not-so-Sweet) 16 of top-impersonated newcomers: the <b>World Health Organization</b> (which we’ve seen daily in the news); <b>Target</b> (whose online sales surged by $10 billion last year); and <b>DocuSign</b> (whose revenue exploded by nearly 50%, thanks to post-COVID remote business). Reminiscent of Marquette’s 2013 run, in my opinion!</p><p>That said, our major players of <b>Microsoft</b> and <b>Google</b> are still accounted for — they remain attackers’ favorite brands year after year. (Case in point: our security research team <a href="https://threatpost.com/office-365-phishing-attack-financial-execs/164925/">recently uncovered</a> a highly sophisticated Microsoft 365 phishing campaign targeting financial departments and unsuspecting assistants and CEOs).</p><p>But … who honestly could have predicted <b>PayPal</b> getting knocked out in the first round? Our 2019 March Hackness Champion goes home early! Congratulations to them for being Most Improved (aka, less spoofed)!</p><p>Remember folks, in our phishing bracket, a first round knockout is actually a badge of honor!</p><p>Which brings us into the Not-So-Sweet 16. Can the WHO continue its historic run? Can Twitter upset the Duke-esque status of Microsoft? Will Facebook survive a matchup against Amazon? Only time will tell!</p><p>The Madness is setting in!</p><p><b><i>Let’s check back with Dicky V for analysis of the perfect phishing bracket:</i></b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3luci9yL7tWMhI5sHzkAwh/8ceda12d77b67aec8f71fd65ef85486c/image1-1.jpg" />
            
            </figure>
    <div>
      <h3>Some takeaways for the Sweet 16?</h3>
      <a href="#some-takeaways-for-the-sweet-16">
        
      </a>
    </div>
    <ul><li><p>OH BABY! We’ve got quite a few Juggernaut matchups! Microsoft has that champion pedigree but Twitter is a strong contender!</p></li><li><p>Facebook vs Amazon! That’s a championship matchup in its own right … expect a lot of fireworks there!</p></li><li><p>I like Apple’s odds of making it to the finals!</p></li><li><p>I think our Cinderella, the WHO, might be making it to the ball!</p></li></ul><p><b>Tune in on April 5th to see who will be crowned our OPHISHAL Champion for 2021! IT’S AWESOME BABY!</b></p>
    <div>
      <h3>And Now Some Additional Analysis</h3>
      <a href="#and-now-some-additional-analysis">
        
      </a>
    </div>
    <p>By the way, in case you’re wondering: <i>is email authentication (SPF, DKIM, DMARC) THE winning way to stop brand spoofing and impersonation-based phishing attacks from ever reaching inboxes?</i></p><p>The answer is: <b>No.</b> Over the past year, we’ve blocked 22 million of these types of phishing attacks — <b>and while we know all three standards can help with preventing</b> <b><i>some</i></b> <b>forms of phishing, attackers can</b> <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3955867/how-bad-actors-get-past-dmarc-in-60-minutes-or-less"><b>easily bypass email authentication</b></a><b>.</b></p><p>The SPF, DKIM and DMARC standards are certainly useful for validating server and tenant origins, <a href="https://www.cloudflare.com/learning/dns/dns-records/protect-domains-without-email/">protecting message integrity</a> and providing policy enforcement. However, security professionals should know that:</p><ol><li><p><i>Anyone can set up emails that pass email authentication.</i></p></li><li><p><i>Email authentication does not inspect content.</i></p></li><li><p><i>Email authentication does not protect against look-alike domains</i>.</p></li><li><p><i>Email authentication does not protect against compromised domains</i>.</p></li><li><p><i>The vast majority of organizations and domains do not use email authentication</i>.</p></li><li><p><i>Email authentication can be difficult to set up properly.</i></p></li></ol><p>Below is a brief description of what each standard does, what types of threats it can protect against and what types of threats it <i>cannot</i> protect against.</p><table>
<thead>
  <tr>
    <th>DMARC <br />(Domain-based Message Authentication, Reporting and Conformance)</th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>Purpose</td>
    <td>Providing policy enforcement and reporting for SPF and DKIM<br />Stipulating what policy to follow if an email doesn’t pass SPF or DKIM authentication (e.g. reject/delete, quarantine, no policy/send)<br />Reporting function allows domain owners to who is sending email on their behalf </td>
  </tr>
  <tr>
    <td>Best for:</td>
    <td>Protecting against spoofing of your own domain and brand abuse<br />(Does not prevent spoofing of another brand’s domain.)</td>
  </tr>
  <tr>
    <td>Limitations</td>
    <td>Does not prevent spoofing of another brand’s domain<br />Does not prevent look-alike email, domain or display name spoofing<br />Domain owners specify what percentage of mail DMARC policies applies to; application percentages of less than 100% are virtually meaningless<br />Does not protect against attacks using “validated” emails with embedded URLs, malicious payloads or attachments</td>
  </tr>
</tbody>
</table> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Spoofing]]></category>
            <guid isPermaLink="false">77snTm9iI8gSS8PZ5JOqkD</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Annual March Hackness: The Opener — What a Difference a Year Makes in the World of Phishing Attacks]]></title>
            <link>https://blog.cloudflare.com/2021-march-hackness-phishing-opener/</link>
            <pubDate>Mon, 22 Mar 2021 16:33:00 GMT</pubDate>
            <description><![CDATA[ Area 1 has been doing our own Phishing brackets over the past five years. We took a hiatus in 2020 (as did the NCAA), so today, we proudly introduce the 5th Annual March Hackness: The Phishing Tournament. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2021 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Well America, it’s back! That glorious time of year that has everyone asking, <i>“Is Gonzaga actually for real this time? Have we learned nothing?!”</i> Yes that’s right, March Madness is back!</p><p>After a LONG and hard 2020, it’s beginning to look a little more normal these days. Nothing signals normal like the return of March Madness! We can finally have the thrill and gut punching heartbreak of busted brackets, 15-seed upsets, and those weird bragging rights of <i>“I called that upset, I just didn’t put it down on my bracket…”</i></p><p>We at Area 1 have been doing our own Phishing brackets over the past five years. We took a hiatus in 2020 (as did the NCAA), so today, we proudly introduce the <b>5th Annual March Hackness: The Phishing Tournament</b>.</p><p>In creating their Phishing campaigns, attackers take advantage of a simple idea - Trust. Nothing speaks to that more than the brands that everyone knows and loves and interacts with in their everyday lives or see in the headlines.</p><p>We’ve analyzed over 500 different organizations — across multiple divisions (aka industries) — that have been spoofed in more than 22 million Phishing messages over the past year. From there, we’ve identified <i>the</i> Top 64 companies whose brands have become <i>the</i> go-to lures for Phishing campaigns.</p><p>Although March Madness took last year off due to the COVID-19 pandemic, attackers sure didn’t. (Just see some proof here, and here, and here…)</p><p>And now…</p><p><i>(Prepares best Dick Vitale voice possible)</i> …</p><p>WE’RE BACK AT IT  BABY! OH AMERICA, ARE YOU SERIOUS? IT’S AWESOME BABY!</p><p>Wow, that takes a ton of energy to pull off!</p><p>With Area 1’s March Hackness tournament, you’ll get to see who is the latest Cinderella story to come out of nowhere and disrupt the typical “Power 5” technology brands that typically dominate the Phishing world. (Here’s looking at you PayPal, <a href="https://www.area1security.com/blog/the-fourth-annual-march-hackness/">our previous 2019 champion</a>).</p><p>Let’s see what a difference a year makes in the world of Phishing.</p><p>I’m excited, you get excited!</p><p>EVERYONE ON THEIR FEET!</p><p>LET’S SEE THAT BRACKET BABY!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Vd7W7CRXsN4cKJ8S2qScm/1723449adc3e33bcf32399de4d254f96/image1-3.jpg" />
            
            </figure>
    <div>
      <h3>Some fast break takeaways for this year’s March Hackness?</h3>
      <a href="#some-fast-break-takeaways-for-this-years-march-hackness">
        
      </a>
    </div>
    <ul><li><p>We see some (unfortunate) new players in the space this year: themes around COVID-19 made a strong impact on our Top 64 bracket.</p></li><li><p>For example, newcomers like the World Health Organization and Centers for Disease Control make appearances for the first time, as well as pharmaceutical sweethearts, Moderna.</p></li><li><p>Our typical heavy hitters are still accounted for, like Microsoft, Google, Facebook, and PayPal. However, how well will they survive the tournament? Can they make it to the championship?</p></li></ul><p>Tune in soon to find out who cuts down the nets to evade detection in this year’s tournament!</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Spoofing]]></category>
            <guid isPermaLink="false">3EjpM3dZIra3S7NPEPSJtq</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
        <item>
            <title><![CDATA[What is an Integrated Email Security solution? And is it right for your organization?]]></title>
            <link>https://blog.cloudflare.com/2020-market-guide-integrated-email-security/</link>
            <pubDate>Tue, 10 Nov 2020 14:49:00 GMT</pubDate>
            <description><![CDATA[ Gartner has named Area 1 Security as a Representative Vendor for IESS. We believe, Area 1 Security, as an IESS, provides the core functionalities of a SEG, but has the advantage of being very quick and easy to deploy, without requiring changes to the email flow at the gateway. ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in November 2020 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>On Sept. 8, Gartner published its latest Market Guide for Email Security (Gartner Doc ID: G00722358). Given the continued increase of phishing and advanced attacks, ongoing enterprise migration to cloud email providers and the recent transition to remote work for many organizations, we at Area 1 Security believe this is an aptly-timed update.</p><p>One new item of particular note in the report is Gartner’s new category of Integrated Email Security Solutions (IESS). While Area 1 Security was also recognized as a Representative Vendor in the Gartner 2019 Market Guide for Email Security, Gartner has now named Area 1 Security as a Representative Vendor for IESS. According to Gartner: “They [IESSs] often include other capabilities such as machine-learning-based detection trained on existing emails, image analysis, account takeover detection and image recognition of URLs to identify phishing attacks as well providing protection for internal emails and M-SOAR functionality.”</p><p>We believe, Area 1 Security, as an IESS, provides the core functionalities of a SEG, but has the advantage of being very quick and easy to deploy, without requiring changes to the email flow at the gateway through <a href="https://developers.cloudflare.com/email-security/deployment/">direct integrations</a> with Office 365 and Google G Suite.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/46q1ifYavhta2GKeg6Mdcs/3cc65ccf2f9600f31a73627a27910532/image2-3.png" />
            
            </figure><p>As an increasing number of threats bypass legacy Secure Email Gateways (SEGs), Area 1 Security’s customers and prospects have increasingly expressed that traditional SEGs don’t adequately address their security needs. In fact, we are often brought in to either replace or supplement SEGs such as those from Proofpoint, Agari and Mimecast.</p><p>With SEGs missing over 30 percent of phishing campaigns, IESS solutions like Area 1 Security offer an attractive <a href="/replace-your-email-gateway-with-area-1/">SEG replacement</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7h9VKgnuAHmhvZ1uYe0ZDX/50b5bf73690445c54f4d142a0369aad4/image1-2.jpg" />
            
            </figure>
    <div>
      <h3>Additional Highlights from the Market Guide for Email Security</h3>
      <a href="#additional-highlights-from-the-market-guide-for-email-security">
        
      </a>
    </div>
    <ul><li><p>Per our understanding, Gartner advises security and risk management leaders responsible for email security to “Address gaps in the advanced threat defense capabilities of an incumbent secure email gateway (SEG) by either replacing them or supplementing them with complementary capabilities via API integration.” Some customers may decide to address these gaps by replacing an incumbent SEG with an IESS.</p></li><li><p>Also, as noted in the report, “Integrated protection, because it has historical data on communication patterns, can use its social graph to flag anomalous messages as suspicious” and integrated solutions also “increasingly using natural language processing and understanding to identify account takeover attacks.”</p></li><li><p>The Market Guide highlights differentiating capabilities for <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">next-generation email security products</a>:</p></li></ul><p><b>Network Sandbox</b><b>Content Disarm and Reconstruction</b><b>URL Rewriting and Time-of-Click Analysis</b><b>Remote Browser Isolation</b><b>Display Name Spoof Detection</b><b>Domain-Based Message Authentication, Reporting and Conformance on Inbound Email</b><b>Lookalike Domain Detection</b><b>Anomaly Detection</b></p><ul><li><p>Per our understanding, Gartner also lists additional differentiating email security capabilities such as graymail handling, data protection, and post-delivery protection and M-SOAR.</p></li></ul><p>Area 1 Security believes it provides coverage across all the above differentiating capabilities (seven fully, and one in prototype / planned phase as of this quarter). The table below is a quick analysis of the key capabilities outlined within the 2020 Email Security Market Guide and how our technology fulfills each criteria. Where relevant, the matrix highlights capabilities that we believe are unique to our Area 1 Horizon™  service.</p><p><b>Differentiating Capabilities Matrix - Area 1 Analysis</b></p><table>
<thead>
  <tr>
    <th>Capabilities referenced in the 2020 Market Guide for Email Security*</th>
    <th>Area 1 Coverage</th>
    <th>Area 1 Capabilities </th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>Network Sandbox</td>
    <td>Yes</td>
    <td>UNIQUE: Dual sandboxing. In-the-wild sandboxing for preemptive campaign identification; inline sandboxing as messages flow through the service</td>
  </tr>
  <tr>
    <td>Content Disarm and Reconstruction</td>
    <td>Yes</td>
    <td>Area 1 deconstructs content into discrete pieces and reconstructs as needed to make an assessment on the attachment<br />UNIQUE: Encrypted payload scanning; including the ability to unscramble inline passwords (either as text or as an image) to open up the payload for analysis. <br />UNIQUE:  Image assessments and reconstruction using advanced computer vision techniques for brand impersonation detection.</td>
  </tr>
  <tr>
    <td>URL Rewriting and Time-of-Click analysis</td>
    <td>Yes</td>
    <td>Ability to defang<br />Ability to rewrite<br />UNIQUE: Invokes instant crawl on links that need escalated assessments<br />UNIQUE: Assessing nested URLs within attachments, especially PDFs and archives</td>
  </tr>
  <tr>
    <td>Display Name Spoof Detection</td>
    <td>Yes</td>
    <td>Simple and complex matches<br />Header and body matches<br />UNIQUE: Exact and fuzzy matches using configurable Levenshtein distance algorithms<br />UNIQUE: Non-directory based matches<br />UNIQUE: Multivariate matches based on message analytics and sentiment<br />UNIQUE: Conversation / thread analysis for Type 3 &amp; 4 BECs<br />UNIQUE: Partner social graph for auto-discovery of business partners<br />UNIQUE: Verdict escalations for active fraud campaigns</td>
  </tr>
  <tr>
    <td>Domain-Based Message Authentication, Reporting and Conformance on Inbound Email</td>
    <td>Yes</td>
    <td>Automated spoof detection<br />Automated SPF / DKIM / DMARC based analysis<br />Envelope-From and Mail-From mismatch detection</td>
  </tr>
  <tr>
    <td>Lookalike Domain Detection</td>
    <td>Yes</td>
    <td>Automated cousin domain detections<br />UNIQUE: Automated new domain registration detections; cousin or non-cousin based</td>
  </tr>
  <tr>
    <td>Anomaly Detection</td>
    <td>Yes</td>
    <td>Metadata analysis<br />Content analysis<br />Historical / trend analysis</td>
  </tr>
  <tr>
    <td>APBC (Anti-Phishing Behavioral Conditioning / Training)</td>
    <td>N/A</td>
    <td>Area 1 currently does not focus on end user education or training use cases</td>
  </tr>
  <tr>
    <td>Graymail Handling</td>
    <td>Yes</td>
    <td>Spoof and spam detections<br />New domain detections also trigger marketing messages detections, with the ability to mark or notify the user of such messages</td>
  </tr>
  <tr>
    <td>Data Protection</td>
    <td>N/A</td>
    <td>Area 1 currently does not focus on outbound email delivery and DLP use cases but integrates quickly and seamlessly with many DLP solutions and partners</td>
  </tr>
  <tr>
    <td>Postdelivery Protection and M-SOAR (Mail Security Orchestration, Automation and Response)</td>
    <td>Yes</td>
    <td>UNIQUE - Integrated, cloud-scale automated triage and detection search, cluster wide<br />UNIQUE - Integrated, cloud-scale message trace, cluster wide<br />Detection details reports<br />API-based JSON access to detections and full messages<br />Integrated message retraction and post-delivery actions<br />SIEM integrations, SOAR hooks<br />NOTE: No additional license or products needed, unlike other vendors. </td>
  </tr>
  <tr>
    <td>Integration Into Security Tools</td>
    <td>Yes</td>
    <td>Integration with DNS for protected web browsing as part of service<br />Integration with data analysis tools, SIEMs, SOARs, identity platforms, firewalls, network security tools and proprietary systems</td>
  </tr>
</tbody>
</table><p><i>*Bolded capabilities are part of Gartner’s key selection criteria for next-generation email security</i></p><p>According to Gartner, “As organizations migrate to cloud email, the need to reevaluate email security is even greater.” The rise of malware, Business Email Compromise (BEC) attacks and other sophisticated email threats also means organizations should revisit their email security architecture.</p><blockquote><p><b><i>To assess whether Area 1 Security can help address gaps in your current email security defenses, contact us for a free Phishing Risk Assessment,</i></b><i> </i><a href="https://www.cloudflare.com/lp/emailsecurity/"><b><i>here</i></b></a><b><i>.</i></b>- <i>Gartner, “Market Guide for Email Security,” Mark Harris, Peter Firstbrook, Ravisha Chugh, 8 September 2020.</i></p></blockquote>
    <div>
      <h3>Gartner Disclaimer:</h3>
      <a href="#gartner-disclaimer">
        
      </a>
    </div>
    <p><i>Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</i></p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5TTAXD8uQee5mdHKpAagyE</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
    </channel>
</rss>