
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sun, 05 Apr 2026 17:41:21 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Introducing browser isolation for email links to stop modern phishing threats]]></title>
            <link>https://blog.cloudflare.com/email-link-isolation/</link>
            <pubDate>Mon, 20 Jun 2022 14:02:00 GMT</pubDate>
            <description><![CDATA[ As part of our exciting journey to integrate Area 1 into our broader Zero Trust suite, Cloudflare Gateway customers can soon enable Remote Browser Isolation for email links. With Email Link Isolation, gain an unmatched level of protection from sophisticated multi-channel email-based attacks ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YQ1f5ulfZD0daYx2dAfDk/2e897fb4a2f8b01f781b2fe0e37a31c8/image6-8.png" />
            
            </figure><p>There is an implicit and unearned trust we place in our email communications. This realization — that an organization can't truly have a Zero Trust security posture without including email — was the driving force behind <a href="/why-we-are-acquiring-area-1/">Cloudflare’s acquisition of Area 1 Security</a> earlier this year.  Today, we have taken our first step in this exciting journey of integrating Cloudflare Area 1 email security into our broader Cloudflare One platform. Cloudflare Secure Web Gateway customers can soon enable <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI)</a> for email links, giving them an unmatched level of protection from modern multi-channel email-based attacks.</p><p>Research from Cloudflare Area 1 found that nearly 10% of all observed malicious attacks involved credential harvesters, highlighting that victim identity is what threat actors usually seek. While commodity phishing attacks are blocked by existing security controls, modern attacks and payloads don’t have a set pattern that can reliably be matched with a block or quarantine rule. Additionally, with the growth of multi-channel phishing attacks, an effective <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a> needs the ability to detect blended campaigns spanning email and Web delivery, as well as deferred campaigns that are benign at delivery time, but weaponized at click time.</p><p>When enough “fuzzy” signals exist, isolating the destination to ensure end users are secure is the most effective solution. Now, with the integration of <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> into Cloudflare Area 1 email security, these attacks can now be easily detected and neutralized.</p>
    <div>
      <h3>Human error is human</h3>
      <a href="#human-error-is-human">
        
      </a>
    </div>
    <p>Why do humans <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7005690/">still click</a> on malicious links? It’s not because they haven’t attended enough training sessions or are not conscious about security. It’s because they have 50 unread emails in their inbox, have another Zoom meeting to get to, or are balancing a four-year old on their shoulders. They are trying their best. Anyone, <a href="https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/">including security researchers</a>, can fall for socially engineered attacks if the adversary is well-prepared.</p><p>If we accept that human error is here to stay, developing security workflows introduces new questions and goals:</p><ul><li><p>How can we reduce, rather than eliminate, the likelihood of human error?</p></li><li><p>How can we reduce the impact of human error when, not if, it happens?</p></li><li><p>How can security be embedded into an employee’s existing daily workflows?</p></li></ul><p>It’s these questions that we had in mind when we reached the conclusion that email needs to be a fundamental part of any <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>. Humans make mistakes in email just as regularly — in fact, sometimes more so — as they make mistakes surfing the Web.</p>
    <div>
      <h3>To block, or not to block?</h3>
      <a href="#to-block-or-not-to-block">
        
      </a>
    </div>
    <p>For IT teams, that is the question they wrestle with daily to balance risk mitigation with user productivity. The <a href="https://www.cloudflare.com/learning/security/glossary/what-is-a-security-operations-center-soc/">SOC</a> team wants IT to block everything risky or unknown, whereas the business unit wants IT to allow everything not explicitly bad. If IT decides to block risky or unknown links, and it results in a false positive, they waste time manually adding URLs to allow lists — and perhaps the attacker later pivots those URLs to malicious content anyway. If IT decides to allow risky or unknown sites, best case they waste time reimaging infected devices and resetting login credentials — but all too common, they triage the damage from a data breach or <a href="/targeted-ransomware-attack/">ransomware</a> lockdown. The operational simplicity of enabling RBI with email — also known as email link isolation — saves the IT, SOC, and business unit teams significant time.</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>For a Cloudflare Area 1 customer, the initial steps involve enabling RBI within your portal:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DB66MqCc1WgkzVLqbgB0q/27ac7d5a7619a8992949742e89ac50bb/image5-8.png" />
            
            </figure><p>With email link isolation in place, here’s the short-lived life of an email with suspicious links:</p><p><b>Step 1:</b> Cloudflare Area 1 inspects the email and determines that certain links in the messages are suspicious or on the margin</p><p><b>Step 2:</b> Suspicious URLs and hyperlinks in the email get rewritten to a custom Cloudflare Area 1 prefix URL.</p><p><b>Step 3:</b> The email is delivered to the intended inboxes.</p><p><b>Step 4:</b> If a user clicks the link in the email, Cloudflare redirects to a remote browser via <code>&lt;authdomain&gt;.cloudflareaccess.com/browser/{{url}}</code>.</p><p><b>Step 5:</b> Remote browser loads a website on a server on the Cloudflare Global Network and serves draw commands to the user's clientless browser endpoint**.**</p><p>By executing the browser code and controlling user interactions on a remote server rather than a user device, any and all malware and phishing attempts are isolated, and won't infect devices and compromise user identities. This improves both user and endpoint security when there are unknown risks and unmanaged devices, and allows users to access websites without having to connect to a VPN or having strict firewall policies.</p><p>Cloudflare’s RBI technology uses a unique patented technology called <a href="/cloudflare-and-remote-browser-isolation/">Network Vector Rendering (NVR)</a> that utilizes headless Chromium-based browsers in the cloud, transparently intercepts draw layer output, transmits the draw commands efficiency and securely over the web, and redraws them in the windows of local HTML5 browsers. Unlike legacy Browser Isolation technologies that relied on pixel pushing or DOM reconstruction, NVR is optimized for scalability, security and end user transparency, while ensuring the broadest compatibility with websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QDHEc1rlX53Z5kc2k0tob/dab1e12b7103cfca3623ac75965dc599/image1-11.png" />
            
            </figure>
    <div>
      <h3>A phishing attack before email link isolation</h3>
      <a href="#a-phishing-attack-before-email-link-isolation">
        
      </a>
    </div>
    <p>Let’s look at a specific example of a deferred phishing attack, how it slips past traditional defenses, and how email link isolation addresses the threat.</p><p>As organizations look to adopt new security principles and network architectures like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, adversaries continually come up with techniques to bypass these controls by exploiting the most used and most vulnerable application – email. Email is a good candidate for compromise because of its ubiquity and ability to be bypassed pretty easily by a motivated attacker.</p><p>Let’s take an example of a “deferred phishing attack”, without email link isolation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2c21s9A2FUgNs7mjZOInav/b99ae23100048308c28b534bc49a4dfb/image4-9.png" />
            
            </figure><p><b>Attacker preparation: weeks before launch</b>The attacker sets up infrastructure for the phishing attempt to come. This may include:</p><ul><li><p>Registering a domain</p></li><li><p>Encrypting it with SSL</p></li><li><p>Setting up proper email authentication (<a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF</a>, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a>, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC)</a></p></li><li><p>Creating a benign web page</p></li></ul><p>At this point, there is no evidence of an attack that can be picked up by secure email gateways, authentication-based solutions, or threat intelligence that relies solely on reputation-based signals and other deterministic detection techniques.</p><p><b>Attack “launch”: Sunday afternoon</b>The attacker sends an authentic-looking email from the newly-created domain. This email includes a link to the (still benign) webpage. There’s nothing in the email to block or flag it as suspicious. The email gets delivered to intended inboxes.</p><p><b>Attack launch: Sunday evening</b>Once the attacker is sure that all emails have reached their destination, they pivot the link to a malicious destination by changing the attacker-controlled webpage, perhaps by creating a fake login page to harvest credentials.</p><p><b>Attack landing: Monday morning</b>As employees scan their inboxes to begin their week, they see the email. Maybe not all of them click the link, but some of them do. Maybe not all of those that clicked enter their credentials, but a handful do. Without email link isolation, the attack is successful.</p><p>The consequences of the attack have also just begun – once user login credentials are obtained, attackers can <a href="https://www.crn.com/news/security/solarwinds-ceo-confirms-office-365-email-compromise-played-role-in-broad-based-attack">compromise legitimate accounts</a>, distribute malware to your organization’s network, steal confidential information, and cause much more downstream damage.</p>
    <div>
      <h3>A phishing attack after email link isolation</h3>
      <a href="#a-phishing-attack-after-email-link-isolation">
        
      </a>
    </div>
    <p>The integration between Cloudflare Area 1 and Cloudflare Browser Isolation provides a critical layer of post-delivery protection that can foil attacks like the deferred phishing example described above.</p><p>If the attacker prepares for and executes the attack as stated in the previous section, our email link isolation would analyze the email link at the time of click and perform a high-level assessment on whether the user should be able to navigate to it.</p><p><b>Safe link</b> - Users will be redirected to this site transparently</p><p><b>Malicious link</b> - Users are blocked from navigating</p><p><b>Suspicious link</b> - Users are heavily discouraged to navigating and are presented with a splash warning page encouraging them to view in the link in an isolated browser</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WinnctxUCvAnCPJsM45BE/45d9fda72b702eb51d0f39683b4b3408/image3-14.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CAGmRXrUrW6Le2iX3yLjH/3a4889d9b6c627a9f4bd94a1a4c78361/image2-15.png" />
            
            </figure><p>While a splash warning page was the mitigation employed in the above example, email link isolation will also offer security administrators other customizable mitigation options as well, including putting the webpage in read-only mode, restricting the download and upload of files, and disabling keyboard input altogether within their Cloudflare Gateway consoles.</p><p>Email link isolation also fits into users’ existing workflows without impacting productivity or sapping their time with IT tickets. Because Cloudflare Browser Isolation is built and deployed on the Cloudflare network, with global locations in 270 cities, web browsing sessions are served as close to users as possible, minimizing latency. Additionally, Cloudflare Browser Isolation sends the final output of each webpage to a user instead of page scrubbing or sending a pixel stream, further reducing latency and not breaking browser-based applications such as SaaS.</p>
    <div>
      <h3>How do I get started?</h3>
      <a href="#how-do-i-get-started">
        
      </a>
    </div>
    <p>Existing Cloudflare Area 1 and Cloudflare Gateway customers are eligible for the beta release of email link isolation. To learn more and to express interest, <a href="http://www.cloudflare.com/zero-trust/lp/email-link-isolation">sign up for our upcoming beta</a>.</p><p>If you’d like to see what threats Cloudflare Area 1 detects on your live email traffic, request a free phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>. It takes five minutes to get started and does not impact mail flow.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">22Vv0Qr11T3jQcQy2q08TS</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Tarika Srinivasan</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to replace your email gateway with Cloudflare Area 1]]></title>
            <link>https://blog.cloudflare.com/replace-your-email-gateway-with-area-1/</link>
            <pubDate>Mon, 20 Jun 2022 13:14:55 GMT</pubDate>
            <description><![CDATA[ Traditional SEG architectures were built for the email environments of yesterday. Learn how to seamlessly transition to cloud-native, preemptive email security ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Leaders and practitioners responsible for <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> are faced with a few truths every day. It’s likely true that their email is cloud-delivered and comes with some built-in protection that does an OK job of stopping spam and commodity malware. It’s likely true that they have spent considerable time, money, and staffing on their Secure Email Gateway (SEG) to stop phishing, malware, and other email-borne threats. Despite this, it’s also true that email continues to be the most frequent source of Internet threats, with Deloitte research finding that 91% of all cyber attacks begin with phishing.</p><p>If anti-phishing and SEG services have both been around for so long, why do so many phish still get through? If you’re sympathetic to <a href="https://en.wikipedia.org/wiki/Occam's_razor">Occam’s razor</a>, it’s because the SEG was not designed to protect the email environments of today, nor is it effective at reliably stopping today’s phishing attacks.</p><p>But if you need a stronger case than Occam delivers — then keep on reading.</p>
    <div>
      <h3>Why the world has moved past the SEG</h3>
      <a href="#why-the-world-has-moved-past-the-seg">
        
      </a>
    </div>
    <p>The most prominent change within the email market is also what makes a traditional SEG redundant – the move to cloud-native email services. More than 85% of organizations are expected to embrace a “cloud-first” strategy by 2025, <a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences">according to Gartner</a>®. Organizations that expect cloud-native scale, resiliency, and flexibility from their security controls are not going to get it from legacy devices such as SEGs.</p><p>When it comes to email specifically, <a href="https://www.gartner.com/document/4006566">Gartner® notes</a> that, “Advanced email security capabilities are increasingly being deployed as integrated cloud email security solutions rather than as a gateway” - with at least 40% of organizations using built-in protection capabilities from cloud email providers instead of a SEG, by 2023. Today, email comes from everywhere and goes everywhere – putting a SEG in front of your Exchange server is anachronistic; and putting a SEG in front of cloud inboxes in a mobile and remote-first world is intractable. <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">Email security</a> today should follow your user, should be close to your inbox, and should “be everywhere”.</p><p>Apart from being architecturally out of time, a SEG also falls short at detecting advanced phishing and socially engineered attacks. This is because a SEG was originally designed to stop spam – a high-volume problem that needs large attack samples to detect and nullify. But today’s phishing attacks are more sniper than scattergun. They are low volume, highly targeted, and exploit our implicit trust in email communications to steal money and data. Detecting modern phishing attacks requires compute-intensive advanced email analysis and threat detection algorithms that a SEG cannot perform at scale.</p><p>Nowhere is a SEG’s outdated detection philosophy more laid bare than when admins are confronted with a mountain of email threat policies to create and tune. Unlike most other cyber attacks, email phishing and <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise (BEC)</a> have too many “fuzzy” signals and cannot solely be detected by deterministic if-then statements. Moreover, attackers don’t stand still while you create email threat policies – they adapt fast and modify techniques to bypass the rules you just created. Relying on SEG tuning to stop phishing is like playing a game of Whack-A-Mole rigged in the attacker’s favor.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SK0PsBM13jyobYcZF25fg/3d9efeb49a1df1a1d49c316692f283a8/image1-12.png" />
            
            </figure>
    <div>
      <h3>To stop phishing, look ahead</h3>
      <a href="#to-stop-phishing-look-ahead">
        
      </a>
    </div>
    <p>Traditional email security defenses rely on knowledge of yesterday’s active attack characteristics, such as reputation data and threat signatures, to detect the next attack, and therefore can’t reliably defend against modern phishing attacks that continually evolve.</p><p>What’s needed is forward-looking security technology that is aware not only of yesterday’s active phishing payloads, websites, and techniques — but also has insight into the threat actors’ next moves. Which sites and accounts are they compromising or establishing for use in tomorrow’s attacks? What payloads and techniques are they preparing to use in those attacks? Where are they prodding and probing before an attack?</p><p>Cloudflare Area 1 proactively scans the Internet for attacker infrastructure and phishing campaigns that are under construction. Area 1’s threat-focused web crawlers dynamically analyze suspicious web pages and payloads, and continuously update detection models as attacker tactics evolve – all to stop phishing attacks days before they reach the inbox.</p><p>When combined with the 1T+ daily DNS requests observed by <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>, this corpus of threat intelligence enables customers to stop phishing threats at the earliest stage of the attack cycle. In addition, the use of deep contextual analytics to understand message sentiment, tone, tenor and thread variations allows Area 1 to understand and distinguish between valid business process messages and sophisticated impersonation campaigns.</p><p>While we are big believers in layering security, the layers should not be redundant. A SEG duplicates a lot of capabilities that customers now get bundled in with their cloud email offering. Area 1 is built to enhance - not duplicate - native email security and stop phishing attacks that get past initial layers of defense.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wa98Zw9glRlVzhd2Ehdaz/0974a784a8561c9d49e2b519b89403f1/image4-10.png" />
            
            </figure>
    <div>
      <h3>Planning for your SEG replacement project</h3>
      <a href="#planning-for-your-seg-replacement-project">
        
      </a>
    </div>
    <p>The best way to get started with your SEG replacement project is deciding whether it’s a straight replacement or an eventual replacement that starts with augmentation. While Cloudflare Area 1 has plenty of customers that have replaced their SEG (more on that later), we have also seen scenarios where customers prefer to run Cloudflare Area 1 downstream of their SEG initially, assess the efficacy of both services, and then make a more final determination. We make the process straightforward either way!</p><p>As you start the project, it’s important to involve the right stakeholders. At a minimum, you should involve an IT admin to ensure email delivery and productivity isn’t impacted and a security admin to monitor detection efficacy. Other stakeholders might include your channel partner if that’s your preferred procurement process and someone from the privacy and compliance team to verify proper handling of data.</p><p>Next, you should decide your preferred Cloudflare Area 1 deployment architecture. Cloudflare Area 1 can be deployed as the MX record, over APIs, and can even run in multi-mode deployment. We recommend deploying Cloudflare Area 1 as the MX record for the most effective <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protection against external threats</a>, but the service fits into your world based on your business logic and specific needs.</p><p>The final piece of preparation involves mapping out your email flow. If you have multiple domains, identify where emails from each of your domains route to. Check your different routing layers (e.g. are there MTAs that relay inbound messages?). Having a good understanding of the logical and physical SMTP layers within the organization will ensure proper routing of messages. Discuss what email traffic Cloudflare Area 1 should scan (north/south, east/west, both) and where it fits with your existing email policies.</p>
    <div>
      <h3>Executing the transition plan</h3>
      <a href="#executing-the-transition-plan">
        
      </a>
    </div>
    <p><b>Step 1: Implement email protection</b>Here are the broad steps you should follow if Cloudflare Area 1 is configured as the MX record (time estimate: ~30 minutes):</p><ul><li><p>Configure the downstream service to accept mail from Cloudflare Area 1.</p></li><li><p>Ensure that Cloudflare Area 1’s egress IPs are not rate limited or blocked as this would affect delivery of messages.</p></li><li><p>If the email server is on-premises, update firewall rules to allow Cloudflare Area 1 to deliver to these systems.</p></li><li><p>Configure remediation rules (e.g. quarantine, add subject or message body prefix, etc.).</p></li><li><p>Test the message flow by injecting messages into Cloudflare Area 1 to confirm proper delivery. (our team can assist with this step.)</p></li><li><p>Update MX records to point to Cloudflare Area 1.</p></li></ul><p>Here are the steps if Cloudflare Area 1 is deployed downstream from an existing email security solution (time estimate: ~30 minutes):</p><ul><li><p>Configure the proper look back hops on Cloudflare Area 1, so that Cloudflare Area 1 can detect the original sender IP address.</p></li><li><p>If your email server is on-premises, update firewall rules to allow Cloudflare Area 1 to deliver to the email server.</p></li><li><p>Configure remediation rules (e.g. quarantine, add subject or message body prefix, etc.).</p></li><li><p>Test the message flow by injecting messages into Cloudflare Area 1 to confirm proper delivery. (our team can assist with this step.)</p></li><li><p>Update the delivery routes on your SEG to deliver all mail to Cloudflare Area 1, instead of the email servers.</p></li></ul><p><b>Step 2: Integrate DNS</b>One of the most common post-email steps customers follow is to integrate Cloudflare Area 1 with their DNS service. If you’re a Cloudflare Gateway customer, good news – Cloudflare Area 1 now uses Cloudflare Gateway as its <a href="https://www.cloudflare.com/learning/dns/what-is-recursive-dns/">recursive DNS</a> to protect end users from accessing phishing and malicious sites through email links or web browsing.</p><p><b>Step 3: Integrate with downstream security monitoring and remediation services</b>Cloudflare Area 1’s detailed and customizable reporting allows for at-a-glance visibility into threats. By integrating with SIEMs through our robust APIs, you can easily correlate Cloudflare Area 1 detections with events from network, endpoint and other security tools for simplified incident management.</p><p>While Cloudflare Area 1 provides built-in remediation and message retraction to allow customers to respond to threats directly within the Cloudflare Area 1 dashboard, many organizations also choose to integrate with orchestration tools for custom response playbooks. Many customers leverage our API hooks to integrate with SOAR services to manage response processes across their organization.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XVEtkicf9X4ySbz5UZyjE/9ac44ea6c8dc47c3bf6dd511dcd06a75/image2-16.png" />
            
            </figure>
    <div>
      <h3>Metrics to measure success</h3>
      <a href="#metrics-to-measure-success">
        
      </a>
    </div>
    <p>How will you know your SEG replacement project has been successful and had the desired impact? We recommend measuring metrics relevant to both detection efficacy and operational simplicity.</p><p>On the detection front, the obvious metric to measure is the number and nature of phishing attacks blocked before and after the project. Are you seeing new types of phishing attacks being blocked that you weren’t seeing before? Are you getting visibility into campaigns that hit multiple mailboxes? The other detection-based metric to keep in mind is the number of false positives.</p><p>On the operational front, it’s critical that email productivity isn’t impacted. A good proxy for this is measuring the number of IT tickets related to email delivery. The availability and uptime of the email security service is another key lever to keep an eye on.</p><p>Finally, and perhaps most importantly, measure how much time your security team is spending on email security. Hopefully it’s much less than before! A SEG is known to be a heavy-lift service deployment to ongoing maintenance. If Cloudflare Area 1 can free up your team’s time to work on other pressing security concerns, that’s as meaningful as stopping the phish themselves.</p>
    <div>
      <h3>You have lots of company</h3>
      <a href="#you-have-lots-of-company">
        
      </a>
    </div>
    <p>The reason we are articulating a SEG replacement plan here is because many of our customers have done it already and are happy with the outcomes.</p><p>For example, a Fortune 50 global insurance provider that serves 90 million customers in over 60 countries found their SEG to be insufficient in stopping phishing attacks. Specifically, it was an onerous process to search for “missed phish” once they got past the SEG and reached the inbox. They needed an <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> that could catch these phishing attacks and support a hybrid architecture with both cloud and on-premises mailboxes.</p><p>After deploying Cloudflare Area 1 downstream of their Microsoft 365 and SEG layers, our customer was protected against more than 14,000 phishing threats within the first month; none of those phishing messages reached a user’s inbox. A one-step integration with existing email infrastructure meant that maintenance and operational issues were next to none. Cloudflare Area 1’s automated message retraction and post-delivery protection also enabled the insurance provider to easily search and remediate any missed phish as well.</p><p>If you are interested in speaking with any of our customers that have augmented or replaced their SEG with Cloudflare Area 1, please reach out to your account team to learn more! If you’d like to see Cloudflare Area 1 in action, sign up for a Phishing Risk Assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p><p>Replacing a SEG is a great project to fit into your overall <a href="https://zerotrustroadmap.org/">Zero Trust roadmap</a>. For a full summary of Cloudflare One Week and what’s new, tune in to our <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3824611/the-evolution-of-cloudflare-one">recap webinar</a>.</p><p>-</p><p><sup>1</sup>Gartner Press Release, “<a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences">Gartner Says Cloud Will Be the Centerpiece of New Digital Experiences</a>”, 11 November 2021</p><p><sup>2</sup>Gartner, “Market Guide for Email Security,” 7 October 2021, Mark Harris, Peter Firstbrook, Ravisha Chugh, Mario de BoerGARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">7yjswOAjVL3CSZoC2SxJI2</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Tarika Srinivasan</dc:creator>
        </item>
    </channel>
</rss>