MORE POSTS
March 18, 2023 5:00 PM
Wildcard and multi-domain support in Cloudflare Access
We are thrilled to announce the full support of wildcard and multi-hostname application definitions in Cloudflare Access...
March 17, 2023 1:00 PM
Introducing custom pages for Cloudflare Access
As more users start their day with Cloudflare Access, we’re excited to announce new options to customize how those users experience our industry-leading Zero Trust solution. We’re excited to announce customizable Cloudflare Access pages including login, blocks and the application...
March 13, 2023 1:00 PM
Using Cloudflare Access with CNI
We are thrilled to introduce an innovative new approach to secure hosted applications via Cloudflare Access without the need for any installed software or custom code on your application server....
January 12, 2023 2:02 PM
Announcing SCIM support for Cloudflare Access & Gateway
Cloudflare Access & Gateway now support the System for Cross-domain Identity Management (SCIM) protocol....
January 11, 2023 1:00 PM
One-click data security for your internal and SaaS applications
Protect sensitive data on any Access app for any user on any device....
January 10, 2023 2:00 PM
New ways to troubleshoot Cloudflare Access 'blocked' messages
Investigate, allow or block decisions based on how a connection was made with the same level of ease that you can troubleshoot user identity....
September 19, 2022 1:15 PM
Improved Access Control: Domain Scoped Roles are now generally available
Starting today, it is possible to scope your users’ access to specific domains with Domain Scoped Roles becoming generally available...
August 09, 2022 3:56 PM
The mechanics of a sophisticated phishing scam and how we stopped it
Yesterday, August 8, 2022, Twilio shared that they’d been compromised by a targeted phishing attack. Around the same time as Twilio was attacked, we saw an attack with very similar characteristics also targeting Cloudflare’s employees...
June 24, 2022 2:15 PM
How Cloudflare Security does Zero Trust
How Cloudflare’s security team implemented Zero Trust controls...
June 22, 2022 1:38 PM
Verify Apple devices with no installed software
Security teams that rely on Cloudflare Access can verify a user’s Apple device before they access a sensitive application — no additional software required...
June 22, 2022 1:27 PM
How to augment or replace your VPN with Cloudflare
Offloading key applications from your traditional VPN to a cloud-native ZTNA solution like Cloudflare Access is a great place to start with Zero Trust and provides an approachable, meaningful upgrade for your business...
June 21, 2022 1:44 PM
Infinitely extensible Access policies
Starting today, we’re excited that Access policies can consider anything before allowing a user access to an application. And by anything, we really do mean absolutely anything....
March 17, 2022 12:59 PM
Clientless Web Isolation is now generally available
Today, we’re excited to announce that Clientless Web Isolation is generally available...
December 08, 2021 1:59 PM
Guest Blog: k8s tunnels with Kudelski Security
At Kudelski Security, we've been working on implementing our Zero Trust strategy for the last two years. In many aspects, it's been an incredible journey, and although we're not quite finished yet, we're excited by the progress made so far with Cloudflare....
December 08, 2021 1:59 PM
Introducing Clientless Web Isolation
Safely browse risky and sensitive websites on any device without installing any software...