
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 10 Apr 2026 19:30:02 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Customers get increased integration with Cloudflare Email Security and Zero Trust through expanded partnership with CrowdStrike]]></title>
            <link>https://blog.cloudflare.com/customers-get-increased-integration-with-cloudflare-email-security-and-zero-trust/</link>
            <pubDate>Wed, 11 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ This post explains how our integrations with CrowdStrike Falcon® Next-Gen SIEM allow customers to identify and investigate risky user behavior and analyze data combined with other log sources to uncover hidden threats. ]]></description>
            <content:encoded><![CDATA[ <p>Today, we’re excited to expand <a href="https://blog.cloudflare.com/unified-risk-posture"><u>our recent Unified Risk Posture announcement</u></a> with more information on our latest integrations with <a href="https://www.crowdstrike.com/"><u>CrowdStrike</u></a>. We <a href="https://blog.cloudflare.com/unified-risk-posture"><u>previously shared</u></a> that our CrowdStrike Falcon Next-Gen SIEM integration allows for deeper analysis and further investigations by unifying first- and third-party data, native threat intelligence, AI, and workflow automation to allow your security teams to focus on work that matters.</p><p>This post explains how Falcon Next-Gen SIEM allows customers to identify and investigate risky user behavior and analyze data combined with other log sources to uncover hidden threats. By combining Cloudflare and CrowdStrike, organizations are better equipped to manage risk and decisively take action to stop cyberattacks.</p><p>By leveraging the combined capabilities of Cloudflare and CrowdStrike, organizations combine Cloudflare’s email security and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">zero trust </a>logging capabilities with CrowdStrike’s dashboards and custom workflows to get better visibility into their environments and remediate potential threats. <a href="https://www.happycog.com/">Happy Cog</a>, a full-service digital agency, currently leverages the integration. Co-Founder and President Matthew Weinberg said: </p><blockquote><p>'The integration of Cloudflare’s robust Zero Trust capabilities with CrowdStrike Falcon Next-Gen SIEM enables organizations to gain a more comprehensive view of the threat landscape and take action to mitigate both internal and external risks posed by today’s security challenges.'</p></blockquote>
    <div>
      <h3>Cloudflare Email Security with Falcon Next-Gen SIEM</h3>
      <a href="#cloudflare-email-security-with-falcon-next-gen-siem">
        
      </a>
    </div>
    <p>With <a href="https://developers.cloudflare.com/email-security/"><u>Cloudflare Email Security’s</u></a> configurable policies, organizations can now push indicators of compromise (IoC) alerts to Falcon Next-Gen SIEM, notifying analysts about suspicious activity, such as a user engaging with a phishing email. By proactively alerting analysts when suspicious activity is detected, Cloudflare and CrowdStrike can provide early detection of account compromises or insider threats.</p>
    <div>
      <h3>Cloudflare Zero Trust Logs with Falcon Next-Gen SIEM</h3>
      <a href="#cloudflare-zero-trust-logs-with-falcon-next-gen-siem">
        
      </a>
    </div>
    <p>We are also integrating <a href="https://developers.cloudflare.com/cloudflare-one/"><u>Cloudflare’s Zero Trust</u></a> platform with Falcon Next-Gen SIEM. This allows our mutual customers to push Cloudflare Zero Trust logs from Cloudflare Access and Cloudflare Gateway to Falcon Next-Gen SIEM for better visualization, analysis, and remediation. This integration allows Cloudflare logs to be used to customize and enhance Falcon Next-Gen SIEM detections and trigger CrowdStrike workflows to automatically configure a response action. An example workflow: based on a new detection of a user’s access request being deemed fraudulent, or if a user is engaging with risky websites, the Falcon platform can trigger Cloudflare to move users to affected user groups and apply adaptive access control policies, such as access isolating or quarantining the user.</p>
    <div>
      <h3>How To Get Started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>To connect Cloudflare Zero Trust logs, start with the Falcon Next-Gen SIEM module. Navigate to the Data Connectors tab of your Falcon Next-Gen SIEM dashboard and select the Cloudflare Data Connector.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68WBQjl9Y4v8FFZQ8GD7gd/9e2bfa370303f1a3ccfe7a858089b195/image3.png" />
          </figure><p>Give the connector a name and select “Save”, and you will receive two pieces of information: an API key and an API URL. Be sure to make note of the key, as it will only be shown once.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6VqTqVgB9mf3CHeYomnfkP/6ae503472ca78969f2a8e26201b5b276/image1.png" />
          </figure><p>Next, in Cloudflare, create an <a href="https://developers.cloudflare.com/logs/get-started/enable-destinations/http/"><u>HTTP logpush job via API</u></a>, and format the "destination_conf" field as follows:</p><p><code>"destination_conf": "&lt;API URL&gt;?header_Authorization=Bearer%20&lt;API KEY&gt;&amp;tags=&lt;ZONE&gt;,dataset:&lt;DATASET&gt;"</code></p><p>Note: </p><ul><li><p>&lt;ZONE&gt; is optional for account-level logpush jobs </p></li><li><p>&lt;DATASET&gt; follows a dot delimited syntax, so <code>http_requests</code> becomes <code>http.requests</code></p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6hWaxWcelja9tY4q6ZSRwT/659bd80980cba2b5988279209fe6fdff/image2.png" />
          </figure><p>Once the job is created and active, you will start to see events populating in the My Connectors section of your Falcon dashboard. Once Cloudflare data is populated in Falcon Next-Gen SIEM, you can now search events and create Falcon Fusion SOAR automation workflows and correlation rules, all based on Cloudflare log events.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7g7PFWfKkHyT8gtKjROCbB/7a09065ff88e2cae7b905b8cc30f6442/image5.png" />
          </figure>
    <div>
      <h3>In Summary</h3>
      <a href="#in-summary">
        
      </a>
    </div>
    <p>Together, CrowdStrike and Cloudflare’s shared telemetry will further decrease the mean time to containment and expedite any organization’s ability to decisively respond to risks within their environment. The two platforms work together as one, allowing organizations to block suspicious activity and deliver high-fidelity alerts to security analysts for further investigation.</p><p>To learn more about these integrations, feel free to <a href="https://www.cloudflare.com/zero-trust/trial/"><u>reach out to us</u></a> to get started with a consultation. We can discuss your existing environment and ensure that you are best equipped to achieve better visibility and remediation in the face of emerging threats.</p> ]]></content:encoded>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2oxT0UhMM8loVoSuUom7W8</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Michael Mcgrory</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare for Unified Risk Posture]]></title>
            <link>https://blog.cloudflare.com/unified-risk-posture/</link>
            <pubDate>Tue, 07 May 2024 13:00:20 GMT</pubDate>
            <description><![CDATA[ Cloudflare for Unified Risk Posture, a new suite of cybersecurity risk management capabilities built on our global network, can help enterprises with automated and dynamic risk posture enforcement across their expanding attack surface ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12txl9X9aO1mdmmdNUBM9U/9544e21096e2c3233982efa99acd984b/image5.png" />
            
            </figure><p>Managing risk posture — how your business assesses, prioritizes, and mitigates risks — has never been easy. But as <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surfaces</a> continue to expand rapidly, doing that job has become increasingly complex and inefficient. (One global survey <a href="https://securityintelligence.com/articles/socs-spend-32-percent-day-incidents-pose-no-threat/">found</a> that SOC team members spend, on average, one-third of their workday on incidents that pose no threat).  </p><p>But what if you could <b>mitigate risk</b> with <b>less effort</b> and <b>less noise</b>?</p><p>This post explores how Cloudflare can help customers do that, thanks to a new suite that converges capabilities across our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Services Edge (SASE)</a> and <a href="https://www.cloudflare.com/application-services/">web application and API (WAAP)</a> security portfolios. We’ll explain:</p><ul><li><p>Why this approach helps protect more of your attack surface, while also reducing SecOps effort</p></li><li><p>Three key use cases — including enforcing Zero Trust with our expanded CrowdStrike partnership</p></li></ul>
    <div>
      <h2>Cloudflare for Unified Risk Posture</h2>
      <a href="#cloudflare-for-unified-risk-posture">
        
      </a>
    </div>
    <p>Today, we’re announcing <a href="https://www.cloudflare.com/cybersecurity-risk-management/"><b>Cloudflare for Unified Risk Posture</b></a>, a new suite of cybersecurity risk management capabilities that can help enterprises with <b>automated and dynamic risk posture enforcement</b> across their expanding attack surface. Today, one unified platform enables organizations to:</p><ul><li><p><b>Evaluate risk across people and applications:</b> Cloudflare evaluates risk posed by people via <a href="https://www.cloudflare.com/learning/security/what-is-ueba/">user entity and behavior analytics (UEBA)</a> models and risks to apps, APIs, and sites via malicious payload, zero-day threat, and bot detection models.</p></li><li><p><b>Exchange risk indicators with best-in-class partners:</b> Cloudflare ingests risk scores from best-in-class <a href="https://www.cloudflare.com/learning/security/glossary/endpoint-security/">endpoint protection (EPP)</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-an-identity-provider/">identity provider (IDP)</a> partners and shares telemetry back with <a href="https://www.cloudflare.com/learning/security/what-is-siem/">security information and event management (SIEM)</a> and extended detection and response (XDR) platforms for further analysis, all via one-time integrations with our unified API.</p></li><li><p><b>Enforce automated risk controls at scale:</b> Based on these dynamic first- and third-party risk scores, Cloudflare enforces consistent risk controls for people and apps across any location around the world.</p></li></ul><p><b>Figure 1: Unified Risk Posture Diagram</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3WLbotRM1RL1VFQwZbNZ8y/8bf5d12d3ed85dba51448b4fad75b4e9/image3.png" />
            
            </figure><p>As mentioned above, this suite converges capabilities from our SASE and WAAP security portfolios onto our global network. Customers can now take advantage of built-in risk management functionality packaged as part of these existing portfolios.</p><p>This launch builds on our progressive efforts to extend first-party visibility and controls and third-party integrations that make it easier for organizations to adapt to evolving risks. For example, as part of the 2024 <a href="https://www.cloudflare.com/security-week/">Security Week</a>, we announced the general availability of <a href="/cf1-user-risk-score">behavior-based user risk scoring</a> and the beta availability of an <a href="/security-analytics-ai-assistant">AI-enabled assistant</a> to help you analyze risks facing your applications. And in a <a href="/cloudflare-email-security-now-works-with-crowdstrike-falcon-logscale">recent integration in the Fall of 2023</a>, we announced that our cloud email security customers can ingest and display our threat detections within the CrowdStrike Falcon® Next-Gen SIEM dashboard.</p><p>To further manage your risk posture, you will be able to take advantage of new Cloudflare capabilities and integrations, including:</p><ul><li><p>A new integration to share Cloudflare Zero Trust and email log data with the CrowdStrike Falcon Next-Gen SIEM <i>(available now)</i></p></li><li><p>A new integration to share Cloudflare’s user risk score with Okta to enforce access policies <i>(coming by the end of Q2 2024)</i></p></li><li><p>New first-party UEBA models, including user risk scores based on device posture checks <i>(coming by the end of Q2 2024)</i></p></li></ul><p>Unifying the evaluation, exchange, and enforcement stages of risk management onto Cloudflare’s platform helps security leaders mitigate risk with less effort. As a cybersecurity vendor defending both public-facing and internal infrastructure, Cloudflare is uniquely positioned to protect wide swathes of your expanding attack surface. Bringing together dynamic first-party risk scoring, flexible integrations, and automated enforcement helps drive two primary business outcomes:</p><ol><li><p><b>Reducing effort in SecOps</b> with less manual policy building and greater agility in responding to incidents. This means fewer clicks to build policies, more automated workflows, and lower mean times to detect (MTTD) and mean times to respond (MTTR) to incidents.</p></li><li><p><b>Reducing cyber risk</b> with visibility and controls that span people and apps. This means fewer critical incidents and more threats blocked automatically.</p></li></ol><p>Customers like <a href="https://www.indeed.com/about">Indeed</a>, the #1 job site in the world, are already seeing these impacts by partnering with Cloudflare:</p><blockquote><p><i>“Cloudflare is helping us mitigate risk more effectively with less effort and simplifies how we deliver Zero Trust across my organization.”</i>— <b>Anthony Moisant</b>, SVP, Chief Information Officer and Chief Security Officer at <b>Indeed</b>.</p></blockquote>
    <div>
      <h2>Problem: Too many risks across too much attack surface</h2>
      <a href="#problem-too-many-risks-across-too-much-attack-surface">
        
      </a>
    </div>
    <p>Managing risk posture is an inherently broad challenge, covering internal dangers and external threats across attack vectors. Below is just a sampling of risk factors CISOs and their security teams track across three everyday dimensions including people, apps, and data:</p><ul><li><p><b>People risks:</b> Phishing, social engineering, malware, ransomware, remote access, insider threats, physical access compromise, third party / supply chain, mobile devices / BYOD</p></li><li><p><b>App risks:</b> denial of service, zero-day exploits, SQL injection, cross-site scripting, remote code execution, credential stuffing, account takeover, shadow IT usage, API abuse</p></li><li><p><b>Data risks:</b> data loss / exposure, data theft / breach, privacy violation, compliance violation, data tampering</p></li></ul><p>Point solutions emerged to lock down some of these specific risks and attack vectors. But over time, organizations have accumulated many services with a limited ability to talk to one another and build a more holistic view of risk. The granular telemetry generated by each tool has led to information overload for security staff who are often stretched thin already. Security Information and Event Management (SIEM) and Extended Detection &amp; Response (XDR) platforms play a critical role in aggregating risk data across environments and mitigating threats based on analysis, but these tools still demand time, resources, and expertise to operate effectively. All these challenges have gotten worse as attack surfaces have expanded rapidly, as businesses embrace hybrid work, build new digital apps, and more recently, experiment with AI.</p>
    <div>
      <h2>How Cloudflare helps manage risk posture</h2>
      <a href="#how-cloudflare-helps-manage-risk-posture">
        
      </a>
    </div>
    <p>To help restore control over this complexity, Cloudflare for Unified Risk Posture provides one platform to evaluate risk, exchange indicators, and enforce dynamic controls throughout IT environments and around the world, all while complementing the security tools your business already relies on.</p><p>Although the specific risks Cloudflare can mitigate are wide-ranging (including all those in the sample bullets above), the following three use cases represent the full range of our capabilities, which you can start taking advantage of today.</p>
    <div>
      <h3>Use Case #1: Enforce Zero Trust with Cloudflare &amp; CrowdStrike</h3>
      <a href="#use-case-1-enforce-zero-trust-with-cloudflare-crowdstrike">
        
      </a>
    </div>
    <p>This first use case spotlights the flexibility with which Cloudflare fits into your current security ecosystem to make it easier to adopt <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust best practices</a>.</p><p>Cloudflare integrates with and ingests security signals from best-in-class <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/">EPP</a> and <a href="https://developers.cloudflare.com/cloudflare-one/identity/idp-integration/">IDP</a> partners to enforce identity and device posture checks for any access request to any destination. You can even onboard multiple providers at once to enforce different policies in different contexts. For example, by integrating with CrowdStrike Falcon®, joint customers can <a href="/cloudflare-crowdstrike-partnership">enforce policies based on the Falcon Zero Trust Assessment (ZTA) score</a>, which delivers continuous real-time security posture assessments across all endpoints in an organization regardless of the location, network or user. Plus, customers can then <a href="https://developers.cloudflare.com/logs/about/">push activity logs</a> generated by Cloudflare, including all access requests, to whichever <a href="https://developers.cloudflare.com/fundamentals/reference/partners/">cloud storage or analytics providers</a> they prefer.</p><p>Today, we are <a href="https://www.cloudflare.com/press-releases/2024/cloudflare-announces-unified-risk-posture-to-provide-comprehensive-and">announcing</a> an expanded partnership with CrowdStrike for a new integration that enables organizations to share logs with Falcon Next-Gen SIEM for deeper analysis and further investigation. Falcon Next-Gen SIEM unifies first- and third-party data, native threat intelligence, AI, and workflow automation to drive SOC transformation and enforce better threat protection. The integration of Cloudflare Zero Trust and email logs with Falcon Next-Gen SIEM allows joint customers to identify and investigate Zero Trust networking and email risks and analyze data with other log sources to uncover hidden threats.</p><blockquote><p><i>“CrowdStrike Falcon Next-Gen SIEM delivers up to 150x faster search performance over legacy SIEMs and products positioned as SIEM alternatives. Our transformative telemetry, paired with Cloudflare’s robust Zero Trust capabilities provides an unprecedented partnership. Together, we are converging two of the most critical pieces of the risk management puzzle that organizations of every size must address in order to combat today’s growing threats.”</i>— <b>Daniel Bernard</b>, Chief Business Officer at <b>CrowdStrike</b></p></blockquote><p>Below is a sample workflow of how Cloudflare and CrowdStrike work together to enforce Zero Trust policies and mitigate emerging risks. Together, Cloudflare and CrowdStrike complement each other by exchanging activity and risk data and enforcing risk-based policies and remediation steps.</p><p><b>Figure 2: Enforce Zero Trust with Cloudflare &amp; CrowdStrike</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sKCifQqdVmtJO1K7BIGP5/9536d135c30aad7f2367bb96dd84031c/image4.png" />
            
            </figure><table><colgroup><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>Phase 1: Automated investigation</span></p></td><td><p><span>Phase 2: Zero Trust enforcement</span></p></td><td><p><span>Phase 3: Remediation</span></p></td></tr><tr><td><p><span>Cloudflare and CrowdStrike help an organization detect that a user is compromised.</span></p><br /><p><span>In this example, Cloudflare has recently blocked web browsing to risky websites and phishing emails, serving as the first line of defense. Those logs are then sent to CrowdStrike Falcon Next-Gen SIEM, which alerts your organization’s analyst about suspicious activity.</span></p><br /><p><span>At the same time, CrowdStrike Falcon Insight XDR automatically scans that user’s device and detects that it is infected. As a result, the Falcon ZTA score reflecting the device’s health is lowered.</span></p></td><td><p><span>This org has set up device posture checks via Cloudflare’s </span><a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/"><span>Zero Trust Network Access</span></a><span> (ZTNA), only allowing access when the Falcon ZTA risk score is above a specific threshold they have defined. </span></p><br /><p><span>Our ZTNA denies the user’s next request to access an application because the Falcon ZTA score falls below that threshold.</span></p><br /><p><span>Because of this failed device posture check, Cloudflare increases the risk score for that user, which places them in a group with more restrictive controls. </span></p><br /><br /><br /></td><td><p><span>In parallel, CrowdStrike’s Next-GenSIEM has continued to analyze the specific user’s activity and broader risks throughout the organization’s environment. Using machine learning models, CrowdStrike surfaces top risks and proposes solutions for each risk to your analyst.</span></p><br /><p><span>The analyst can then review and select remediation tactics — for example, quarantining the user’s device — to further reduce risk throughout the organization. </span></p><br /></td></tr></tbody></table>
    <div>
      <h3>Use Case #2: Protect apps, APIs, &amp; websites</h3>
      <a href="#use-case-2-protect-apps-apis-websites">
        
      </a>
    </div>
    <p>This next use case is focused on protecting apps, APIs, and websites from threat actors and bots. Many customers first adopt Cloudflare for this use case, but may not be aware of the risk evaluation algorithms underpinning their protection.</p><p><b>Figure 3: Protect apps, APIs &amp; sites with ML-backed threat intelligence</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68uD20AuCjTQwmC5lLzE1U/cb4a75aaa0af26941d404555dbb6d9f8/image1.png" />
            
            </figure><p>Cloudflare’s <a href="https://www.cloudflare.com/application-services/">Application Services</a> detect and mitigate malicious payloads and bots using risk models backed by <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a> (ML) including:</p><ul><li><p>Our <a href="https://developers.cloudflare.com/waf/about/waf-attack-score/"><b>WAF attack score</b></a>, which scores whether a request contains a zero-day exploit, or common OWASP Top 10 risks such as a <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL injection</a>, <a href="https://www.cloudflare.com/learning/security/threats/cross-site-scripting/">cross-site scripting</a>, or <a href="https://www.cloudflare.com/learning/security/what-is-remote-code-execution/">remote code execution</a> payload</p></li><li><p>Our <a href="https://developers.cloudflare.com/bots/concepts/bot-score/"><b>bot score</b></a>, which scores the likelihood that a request came from a bot</p></li><li><p>Our <a href="https://developers.cloudflare.com/page-shield/how-it-works/malicious-script-detection/"><b>malicious script classifier</b></a><b>,</b> which looks at the dangers of browser scripts for your website visitors</p></li></ul><p>These risk models are trained largely on telemetry from Cloudflare’s global network, which is used as a reverse proxy by <a href="https://www.cloudflare.com/what-is-cloudflare/">nearly 20% of all websites</a> and sees about 3 trillion DNS queries per day. This unique real-time visibility powers threat intelligence and even enables us to <a href="/detecting-zero-days-before-zero-day">detect and mitigate zero-days before others</a>.</p><p>Cloudflare also uses ML to <a href="/ml-api-discovery-and-schema-learning">discover new API endpoints and schemas</a> without requiring any prerequisite customer input. This helps organizations uncover unauthenticated APIs and map their <a href="https://www.cloudflare.com/2024-api-security-management-report/#:~:text=APIs%20%E2%80%94%20the%20programmable%20interfaces%20comprising,throughout%20the%20API%2Dcentric%20world.">growing attack surface</a> before applying protections.</p><p>Unlike other vendors, Cloudflare’s network architecture enables risk evaluation models and security controls on public-facing and internal infrastructure to be shared across all of our services. This means that organizations can apply protections against app vulnerability exploits, DDoS, and bots in front of internal apps like self-hosted Jira and Confluence servers, protecting them from emerging and even zero-day threats.</p><p>Organizations can review the potential misconfigurations, data leakage risks, and vulnerabilities that impact the risk posture for their apps, APIs, and websites within <a href="https://www.cloudflare.com/application-services/products/securitycenter/">Cloudflare Security Center</a>. We are investing in this centralized view of risk posture management by integrating alerts and insights across our security portfolio. In fact, we <a href="/security-insights-quick-ciso-view">recently announced updates</a> focused on highlighting where gaps exist in how your organization has deployed Cloudflare services.</p><p>Finally, we are also making it easier for organizations to investigate security events directly and <a href="/log-explorer">recently announced beta availability of Log Explorer</a>. In this beta, security teams can view all of their HTTP traffic in one place with search, analytics dashboards, and filters built-in. These capabilities can help customers monitor more risk factors within the Cloudflare platform versus exporting to third party tools.</p>
    <div>
      <h3>Use Case #3: Protect sensitive data with UEBA</h3>
      <a href="#use-case-3-protect-sensitive-data-with-ueba">
        
      </a>
    </div>
    <p>This third use case summarizes one common way many customers plan to leverage our <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/">user risk / UEBA scores</a> to prevent leaks and mishandling of sensitive data:</p><p><b>Figure 4: Protect apps, APIs &amp; sites with ML-backed threat intelligence</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/DA2cbnXZDIx3sGMXGvwfJ/b8cf1f547ec36cbc1e976d554ecf05b5/image2.jpg" />
            
            </figure><ul><li><p><b>Phase 1:</b> In this example, the security team has already configured <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data loss prevention (DLP)</a> policies to detect and block traffic with sensitive data. These policies prevent one user’s multiple, repeated attempts to upload <a href="/dlp-ocr-sourcecode">source code</a> to a public GitHub repository.</p></li><li><p><b>Phase 2</b>: Because this user has now violated a high number of DLP policies within a short time frame, Cloudflare scores that suspicious user as high risk, regardless of whether those uploads had malicious or benign intent. The security team can now further investigate that specific user, including reviewing all of his recent log activity.</p></li><li><p><b>Phase 3</b>: For that specific high-risk user or for a group of high-risk users, administrators can then set ZTNA or even <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation</a> rules to block or isolate access to applications that contain other sensitive data.</p></li></ul><p>Altogether, this workflow highlights how Cloudflare’s risk posture controls adapt to suspicious behavior from evaluation through to enforcement.</p>
    <div>
      <h2>How to get started with unified risk posture management</h2>
      <a href="#how-to-get-started-with-unified-risk-posture-management">
        
      </a>
    </div>
    <p>The above use cases reflect how our customers are unifying risk management with Cloudflare. Through these customer conversations, a few themes emerged for why they feel confident in our vision to help them manage risk across their expanding attack surface:</p><ul><li><p>The <b>simplicity of our unified platform</b>: We bring together SASE and WAAP risk scoring and controls for people and apps. Plus, with a single API for all Cloudflare services, organizations can automate and customize workflows with infrastructure-as-code tools like <a href="https://developers.cloudflare.com/terraform/">Terraform</a> with ease.</p></li><li><p>The <b>flexibility of our integrations</b>: We exchange risk signals with the EPP, IDP, XDR, and SIEM providers you already use, so you can do more with your tools and data. Plus, with one-time integrations that work across all our services, you can extend controls across your IT environments with agility.</p></li><li><p>The <b>scale of our global network</b>: Every security service is available for customers to run in every location across our network spanning 320+ locations and 13K+ interconnects. In this way, single-pass inspection and risk policy enforcement is always fast, consistent, and resilient, delivered close to your users and apps.</p></li></ul><p>If you’re ready to see how Cloudflare can help you manage risk, <a href="https://www.cloudflare.com/plans/enterprise/contact/">request a consultation today</a>. Or if you’re at RSA Conference 2024, <a href="https://www.cloudflare.com/rsa-conference-2024/">come to any of our in-person events</a>.</p><p>To continue learning more about how Cloudflare can help you evaluate risk, exchange risk indicators, and enforce risk controls, <a href="https://www.cloudflare.com/cybersecurity-risk-management/">explore more resources on our website</a>.</p> ]]></content:encoded>
            <category><![CDATA[Risk Management]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">2lDPGVJ136ZtHceoXGZAxY</guid>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Email Security now works with CrowdStrike Falcon LogScale]]></title>
            <link>https://blog.cloudflare.com/cloudflare-email-security-now-works-with-crowdstrike-falcon-logscale/</link>
            <pubDate>Thu, 21 Sep 2023 13:00:27 GMT</pubDate>
            <description><![CDATA[ With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FquuHyDPsMcYwbXrqCMn8/0c5b2fec070a0ddf8eb8df42fdcc668a/image5-1.png" />
            
            </figure><p>We are excited to announce an extended partnership between CrowdStrike and Cloudflare to bring together <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare Email Security</a> and CrowdStrike Falcon® LogScale. With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard.</p>
    <div>
      <h3>What is CrowdStrike Falcon LogScale?</h3>
      <a href="#what-is-crowdstrike-falcon-logscale">
        
      </a>
    </div>
    <p>CrowdStrike Falcon LogScale enables organizations to ingest, aggregate and analyze massive volumes of streaming log data from a wide array of sources at petabyte scale. It offers search and visualization capabilities, enabling users to easily query and explore their log data to gain valuable insights and identify security threats or anomalies.</p><p>Falcon LogScale helps customers by providing:</p><p><b>Log Ingestion</b> It supports the collection of logs from diverse sources and can handle high volumes of log data in real time.</p><p><b>Real-Time Search</b> Users can perform fast searches across their log data, enabling quick detection and investigation of security incidents or operational issues.</p><p><b>Dashboards and Visualizations</b> Falcon LogScale offers customizable dashboards and visualizations to help teams gain insights from their log data.</p><p>All of these capabilities enable proactive threat hunting by leveraging advanced analytics. It helps security teams identify potential threats, detect anomalies, and quickly remediate security incidents. Falcon LogScale is designed to handle large-scale log data ingestion and analysis. It can scale to accommodate <a href="https://www.cloudflare.com/learning/performance/log-retention-best-practices/">growing log volumes</a> and provide consistent performance.</p><p>Falcon LogScale is the solution for organizations that are looking to consolidate their log management and analysis efforts. It makes monitoring and securing their environments effective and efficient.</p>
    <div>
      <h3>How Cloudflare Email works with Falcon LogScale</h3>
      <a href="#how-cloudflare-email-works-with-falcon-logscale">
        
      </a>
    </div>
    <p>Customers who have both Cloudflare Email Security and CrowdStrike Falcon LogScale can now send detection data to Falcon LogScale. Within Falcon LogScale, this detection information can be visualized and queried.</p><p>To set up Cloudflare Email Security detections to flow into Falcon LogScale, navigate to the Settings section and choose the Marketplace tab in the lefthand toolbar, as shown in the screenshot below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4WABmFgLPIpepczMvGOlFh/69ac599cc39729cad37b28430a446070/image2.png" />
            
            </figure><p>After installing the package, an ingest token needs to be generated. Navigate to the “Ingest Tokens” tab under Settings and create one.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5gV4sogmc8QmbhHzFsrYCO/23d16e335db132bacabd9bb7b735ddd0/image4-1.png" />
            
            </figure><p>Copy the ingest token to save it for later. From here, customers can navigate to the Cloudflare Email Security dashboard, go to the Settings section, select the Alert Webhooks tab and choose “+ New Webhook”. Then click the SIEM option, choose Other from the dropdown, and input the following information:</p><p><b>Auth Token:</b> Bearer [INGEST TOKEN]<b>Target:</b> <a href="https://cloud.community.humio.com/api/v1/ingest/hec/raw">https://cloud.community.humio.com/api/v1/ingest/hec/raw</a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/gXAcCOsoN71yC2Kn9DJwV/8d1bdf8c1cf7c85b8b7bc90003dd8fbf/Screenshot-2023-09-08-at-10.31.26.png" />
            
            </figure><p>Customers can choose which events to send to Falcon LogScale by selecting the expanded option. In the screenshot above, the user has chosen to only send malicious and suspicious detections.</p><p>A few minutes after creating a new webhook, Cloudflare Email Security will start sending detection data to the Falcon LogScale instance.</p><p>When the Cloudflare Email Security package from the Falcon LogScale marketplace is installed, customers are provided with a parser for field extraction and out-of-box content through a dashboard. The parser allows the Falcon LogScale product to be able to query the detection data while the dashboard allows organizations to quickly get the relevant information about their email security. Below is what the dashboard looks like:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uDCtxex6GqQIyBWncKjZp/4fc41be69ec551d11f0c766d8b4f94a3/image3-2.png" />
            
            </figure><p>As you can see, we have included visualizations and queries to get teams up and running quickly, but it is meant to be a starting point for customers to build on. Customers can write their own queries and use them to create their own widgets. From there, they can create their own rendition of this dashboard to fit their needs.</p><p>More information about setting up this integration can be found here: <a href="https://library.humio.com/integrations/integrations-cloudflare-package-area1.html">https://library.humio.com/integrations/integrations-cloudflare-package-area1.html</a></p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We are currently looking to expand the integration of Cloudflare products with Falcon LogScale. Our plan is to extend the integration to the remaining components of the Zero Trust Suite, enabling the relaying of logs and detection data to Falcon LogScale. This will allow customers to visualize and analyze data from these products, similar to the existing Cloudflare Email Security integration. If you are interested and would like to learn more, please reach out to your Cloudflare account contact.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">5AP5vOnMtPTlQoO8ixyJNs</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>John Smith (Guest Author)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare and CrowdStrike partner to give CISOs secure control across devices, applications, and corporate networks]]></title>
            <link>https://blog.cloudflare.com/cloudflare-crowdstrike-partnership/</link>
            <pubDate>Thu, 17 Mar 2022 09:59:08 GMT</pubDate>
            <description><![CDATA[ We're very excited to announce multiple new integrations with CrowdStrike. These integrations combine the power of Cloudflare’s expansive network and Zero Trust suite, with CrowdStrike’s Endpoint Detection and Response (EDR) and incident remediation offerings ]]></description>
            <content:encoded><![CDATA[ <p>Today, we are very excited to announce multiple new integrations with CrowdStrike. These integrations combine the power of Cloudflare’s expansive network and Zero Trust suite, with CrowdStrike’s Endpoint Detection and Response (EDR) and incident remediation offerings.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EQn2t3p7cIUbbrrpQNDvd/10dee97ffae460a6264ddb4cc8c37711/Crowdstrike-Partnership.png" />
            
            </figure><p>At Cloudflare, we believe in making our solutions easily integrate with the existing technology stack of our customers. Through our partnerships and integrations, we make it easier for our customers to use Cloudflare solutions jointly with that of partners, to further strengthen their security posture and unlock more value. Our partnership with CrowdStrike is an apt example of such efforts.</p><p>Together, Cloudflare and CrowdStrike are working to simplify the adoption of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> for IT and security teams. With this expanded partnership, joint customers can identify, investigate, and remediate threats faster through multiple integrations:</p><p><b>First,</b> by integrating <a href="https://www.cloudflare.com/zero-trust/solutions/">Cloudflare’s Zero Trust services</a> with CrowdStrike Falcon Zero Trust Assessment (ZTA), which provides continuous real-time device posture assessments, our customers can verify users’ device posture before granting them access to internal or external applications.</p><p><b>Second,</b> we joined the <a href="https://www.crowdstrike.com/press-releases/crowdstrike-adds-new-strategic-partners-to-groundbreaking-crowdxdr-alliance/#:~:text=Cloudflare%2C%20Armis%20and%20ThreatWarrior%20are,%2C%20Mimecast%2C%20Claroty%20and%20Corelight.">CrowdXDR Alliance</a> in December 2021 and are partnering with CrowdStrike to share security telemetry and other insights to make it easier for customers to identify and mitigate threats. Cloudflare’s global network spans more than 250 cities in over 100 countries, blocking an average of 76 billion cyber threats each day. This provides customers with unparalleled insights, helping security teams better protect their organization. By joining the CrowdXDR Alliance, we will be able to use security signals from Cloudflare’s global network with CrowdStrike’s leading endpoint protection to help mutual customers stop cyber attacks anywhere in their network.</p><p><b>Third,</b> CrowdStrike is one of Cloudflare’s incident response partners, providing rapid and effective support. CrowdStrike’s incident response team deals with active under attack situations day in, day out — helping customers mitigate the attack and get their web property and network back online. Our partnership with CrowdStrike enables rapid remediation of under attack scenarios to safeguard organizations from adversaries.</p><blockquote><p><i>“The speed in which a company is able to identify, investigate and remediate a threat heavily determines how it will fare in the end. Our partnership with Cloudflare provides companies the ability to take action rapidly and contain exposure at the time of an attack, enabling them to get back on their feet and return to business as usual as quickly as possible.”</i>- <b>Thomas Etheridge</b>, Senior Vice President, CrowdStrike Services</p></blockquote><p>CrowdStrike’s endpoint security meets Cloudflare’s Zero Trust Services</p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2uD91HZrTzA9yoIVsNgOAk/a11987d539f1b9c7f97bc3d618ec97a0/pasted-image-0--1--1.png" />
            
            </figure><p>Before we get deep into how the integration works, let’s first recap Cloudflare’s Zero Trust Services.</p>
    <div>
      <h3>Cloudflare Access and Gateway</h3>
      <a href="#cloudflare-access-and-gateway">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a> determines if a user should be allowed access to an application or not. It uses our global network to check every request or connection for identity, device posture, location, multifactor method, and many more attributes to do so. Access also logs every request and connection — providing administrators with high-visibility. The upshot of all of this: it enables customers to deprecate their legacy VPNs.</p><p><a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> protects users as they connect to the rest of the Internet. Instead of back hauling traffic to a centralized location, users connect to a nearby Cloudflare data center where we apply one or more layers of security, filtering, and logging, before accelerating their traffic to its final destination.</p>
    <div>
      <h3>Zero Trust Integration with CrowdStrike</h3>
      <a href="#zero-trust-integration-with-crowdstrike">
        
      </a>
    </div>
    <p>Cloudflare’s customers can now build Access and Gateway policies based on the presence of a CrowdStrike agent at the endpoint. In conjunction with our Zero Trust client, we are able to leverage the enhanced telemetry that CrowdStrike provides surrounding a user’s device.</p><p>CrowdStrike’s Zero Trust Assessment (ZTA) delivers continuous real-time security posture assessments across all endpoints in an organization regardless of the location, network or user. The ZTA scores enable enforcement of conditional policies based on device health and compliance checks to mitigate risks. These policies are evaluated each time a connection request is made, making the conditional access adaptive to the evolving condition of the device.</p><p>With this integration, organizations can build on top of their existing Cloudflare Access and Gateway policies ensuring that a minimum ZTA score or version has been met before a user is granted access. Because these policies work across our entire Zero Trust platform, organizations can use these to build powerful rules invoking Browser Isolation, <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/tenant-control/">tenant control</a>, antivirus or any part of their Cloudflare deployment.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7EB1HVVJRq3hHI01r3hXK9/1f76feee182a8ca2ee9fc2076851628a/pasted-image-0--2--1.png" />
            
            </figure><blockquote><p>_"The CrowdStrike Falcon platform secures customers through verified access controls, helping customers reduce their attack surface and simplify, empower and accelerate their Zero Trust journey. By expanding our partnership with Cloudflare, we are making it easier for joint customers to strengthen their Zero Trust security posture across all endpoints and their entire corporate network."_- <b>Michael Sentonas</b>, Chief Technology Officer, CrowdStrike</p></blockquote>
    <div>
      <h3>How the integration works</h3>
      <a href="#how-the-integration-works">
        
      </a>
    </div>
    <p>Customers using our Zero Trust suite can add CrowdStrike as a device posture provider in the Cloudflare Zero Trust dashboard under Settings → Devices → Device Posture Providers. The details required from the CrowdStrike dashboard include: ClientID, Client Secret, REST API URL, and Customer ID.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ODgmsQQuKOvgiJOeSL1Vt/7d9f7e168f3f0b51e46a8c2cc2b3d61d/pasted-image-0--3--1.png" />
            
            </figure><p>After creating the CrowdStrike Posture Provider, customers can create specific device posture checks requiring users’ devices to meet a certain threshold of <a href="https://falcon.us-2.crowdstrike.com/documentation/156/zero-trust-assessment-apis">ZTA scores</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Akw1cK9qyCYbKIz34l4It/c6920245f80941c52e21eb271c07e1e7/Screen-Shot-2022-03-16-at-4.48.42-PM.png" />
            
            </figure><p>These rules can now be used to create conditional <a href="https://developers.cloudflare.com/cloudflare-one/policies/zero-trust/">Access</a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/">Gateway</a> policies to allow or deny access to applications, networks, or sites. Administrators can choose to block or isolate users or user groups with malicious or insecure devices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gwoBIcA58pmUqjhgvgxxr/28a1903ece64e5bbf60fbf33bdb7625b/pasted-image-0--5-.png" />
            
            </figure>
    <div>
      <h2>What comes next?</h2>
      <a href="#what-comes-next">
        
      </a>
    </div>
    <p>In the coming months, we will be further strengthening our integrations with CrowdStrike by allowing customers to correlate their Cloudflare logs with Falcon telemetry, for timely detection and mitigation of sophisticated threats.If you’re using Cloudflare Zero Trust products today and are interested in using this integration with CrowdStrike, please visit our <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/crowdstrike/">documentation</a> to learn about how you can enable it. If you want to learn more or have additional questions, please fill out the <a href="https://www.cloudflare.com/partners/technology-partners/crowdstrike/">form</a> or get in touch with your Cloudflare CSM or AE, and we'll be happy to help you.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[CrowdStrike]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">4TrcHN6XAjvNLiDb1M8DZF</guid>
            <dc:creator>Deeksha Lamba</dc:creator>
            <dc:creator>Kyle Krum</dc:creator>
        </item>
    </channel>
</rss>