
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 16:53:48 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Cloudflare recognized as a Visionary in 2025 Gartner® Magic Quadrant™ for SASE Platforms]]></title>
            <link>https://blog.cloudflare.com/cloudflare-sase-gartner-magic-quadrant-2025/</link>
            <pubDate>Tue, 15 Jul 2025 15:00:00 GMT</pubDate>
            <description><![CDATA[ Gartner has recognized Cloudflare as a Visionary in the 2025 Gartner® Magic Quadrant™ for SASE Platforms report. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We are thrilled to announce that Cloudflare has been named a Visionary in the 2025 Gartner® Magic Quadrant™ for Secure Access Service Edge (SASE) Platforms<sup>1</sup> report. We view this evaluation as a significant recognition of our strategy to help connect and secure workspace security and coffee shop networking through our unique connectivity cloud approach. You can read more about our position in the report <a href="https://www.cloudflare.com/lp/gartner-magic-quadrant-sase-platforms-2025/"><u>here</u></a>.</p><p>Since <a href="https://blog.cloudflare.com/introducing-cloudflare-one"><u>launching Cloudflare One</u></a>, our SASE platform, we have delivered hundreds of features and capabilities from our <a href="https://blog.cloudflare.com/magic-wan-connector-general-availability"><u>lightweight branch connector</u></a> and <a href="https://blog.cloudflare.com/cloudflare-one-data-protection-roadmap-preview/"><u>intuitive native Data Loss Prevention (DLP) service</u></a> to our <a href="https://blog.cloudflare.com/cloudflare-acquires-bastionzero"><u>new secure infrastructure access tools</u></a>. By operating the world’s most powerful, programmable network we’ve built an incredible foundation to deliver a comprehensive SASE platform. </p><p>Today, we operate the world's most expansive SASE network in order to deliver connectivity and security close to where users and applications are, anywhere in the world. We’ve developed our services from the ground up to be fully integrated and run on every server across our network, delivering a unified experience to our customers. And we enable these services with a unified control plane, enabling end-to-end visibility and control anywhere in the world. Tens of thousands of customers trust Cloudflare with their network and security infrastructure.</p><p>We’re thrilled with our inclusion in this report and are even more excited that we’re only just getting started. Building on this foundation, we’re investing to move even faster to solve problems for our customers.</p>
    <div>
      <h3>What is SASE?</h3>
      <a href="#what-is-sase">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>SASE</u></a> (pronounced “sassy”) is an architectural model that delivers network connectivity and security functions, and delivers them through a single cloud platform and/or centralized policy control.</p><p>Given the extent of what organizations need for networking and security, not all SASE capabilities may be available from a single vendor. For example, the security-as-a-service model is sometimes consumed as a part of <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/"><u>Security Service Edge (SSE)</u></a>.</p><p>The evolution of this architecture, where a vendor delivers key functionality across networking and security service in a single offering, is SASE. What’s important to note, however, is that convergence can mean many, many different things. For example, some vendors started with SSE capabilities and are building out infrastructure to support it. Some vendors are using public cloud for their infrastructure. Some are aggressively pursuing M&amp;A to acquire functionality. These decisions have led to many problematic questions such as: how many interfaces do organizations need to manage their network and security needs? Why is security enforcement sometimes in the cloud and sometimes at the branch edge?</p><p>We believe that the market deserves more than a buffet of features. Convergence should be greater than the sum of the parts. The infrastructure/control plane/data plane for networking services should not be an independent entity from the security services. We believe that we are delivering SASE capabilities in a fundamentally different manner than the majority of vendors in the market: <b>by building out the platform first, and layering services upon it.</b></p><p>We also believe that our efforts to focus on the underlying network delivers better solutions for simplifying your infrastructure, establishing control, and maintaining visibility to support branch connectivity, hybrid work, Zero Trust, and secure cloud access.</p>
    <div>
      <h3>What is required for SASE and how is Cloudflare different?</h3>
      <a href="#what-is-required-for-sase-and-how-is-cloudflare-different">
        
      </a>
    </div>
    <p>The Cloudflare Global network is one of the largest, most well-connected networks in the world, spanning more than 330 cities in over 125 countries. We are not a new vendor entering a new market, but rather one that has been delivering services upon a mature platform that’s been tested under the most extreme circumstances over the past 15+ years.</p><p>Our unified platform, Cloudflare’s <a href="https://www.cloudflare.com/connectivity-cloud/"><u>connectivity cloud</u></a>, is built upon a set of principles across our infrastructure, our control plane, and our data plane, that guides everything we do:</p><p><b>Infrastructure</b>: The infrastructure that we build must be everywhere our customers do business. Users, applications, and data are everywhere, and therefore we build ahead of our customer’s needs to ensure that they can connect anything to anywhere, quickly and reliably.</p><p><b>Control Plane: </b>To stay on top of operations, organizations want a single user interface for monitoring activity and enforcing policies, with changes pushed out globally in seconds. In addition, our customers want APIs to extend management into automation and infrastructure-as-code tools. We help organizations cut down on the tool sprawl, doing away with the drudgery and complexity that affects even the most basic administrative tasks with conventional tech stacks. And we restore <a href="https://www.cloudflare.com/learning/performance/what-is-observability/">observability across activity</a> (again by virtue of facilitating any-to-any connectivity) to help with operations with troubleshooting, forensics, and insights across the application landscape.</p><p><b>Data Plane: </b>The data plane is where services are delivered, and we constantly deliver innovations in how users connect, consistently enforce inspection and policy, and deliver traffic to the intended location securely. These services are composable, meaning that new functionality can be enabled from the Control Plane, without the headaches of network downtime normally associated with appliance insertion.</p>
    <div>
      <h3>How customers benefit from Cloudflare’s design principles </h3>
      <a href="#how-customers-benefit-from-cloudflares-design-principles">
        
      </a>
    </div>
    <p>These principles are crucial for delivering a superior, end-to-end user experience. Your SASE environment is (or will be) processing packets from users across the globe. Latency damages the user experience, in ways that are similar to how a smoothly running engine becomes unreliable and inefficient as internal components become dirty. Our design principles establish the north star to ensure that everything we do and everything we build does not add grit to the engine. This is important because we are seeing a lot of confusion (and some obfuscation) about how to deliver performant SASE services.</p><p>To understand how our principles apply towards the delivery of SASE services:</p><p><b>Connecting users to a data center (last mile latency):</b> With traditional on-prem networking, one of the major sources of latency is getting the traffic to the security stack. Both hub &amp; spoke and VPN focus on taking traffic (from sometimes distant locations) to one of the organization’s security enforcement points such as a perimeter firewall. With SASE, the objective is to deliver the security closer to the user, using one of the SASE provider’s data centers. Cloudflare’s global coverage delivers service to within 50ms of 95% of the world’s population. This is something unique to Cloudflare, in that other vendors seldom discuss how much data center coverage is needed to deliver sufficient last mile performance, or sometimes use confusing metrics about the latency within their data centers (see next section) to infer what organizations might expect with end-to-end latency.</p><p><b>Delivering key networking and security services (processing latency):</b> SASE data centers must deliver networking and security, but not all cloud data centers are designed the same. Some implementations in the market separate the SASE edge (the point of presence) from the actual compute (the data center itself). Some have disguised their single-pass processing with a series of daisy-chained proxies, which requires inefficiently decoding packets multiple times (From L3 to L7 and back to L3) to perform different security functions. As a result, there’s often a delta between the performance of a configuration that offers low latency and the configuration with the security features that customers want enabled. Cloudflare delivers full compute in every data center. There is no “next-hop” to compute; instead, there are fungible compute resources to ensure the fastest interface-to-interface possible with all the security features (including TLS decryption) enabled.</p><p><b>Connecting from the SASE to applications (Internet exchanges, private backbone, optimized routing and peering): </b>Many vendors optimize their data centers to focus on egress to the Internet/cloud, typically by participating in <a href="https://www.cloudflare.com/learning/cdn/glossary/internet-exchange-point-ixp/"><u>Internet exchanges</u></a> along with a handful of peering relationships. In other words, their networks were not designed for traffic between data centers, which is a suboptimal design for branch-to-branch or branch-to-data-center traffic.</p><p>Cloudflare’s network operates a private backbone for traffic destined to another Cloudflare data center, and we are one of the largest participants in Internet exchanges in the world for traffic destined to the Internet/cloud. We are connected to over 13,000 public and private networks, plus our open peering policy provides extensive access for networks of different sizes to participate as well. But user experience isn’t determinable solely by the number of interconnections. Not all Internet exchanges are the same, and in many cases there are variables that affect the quality and reliability of any given connection. That’s why Cloudflare further optimizes the connection to the user’s ultimate destination, whether destined to a public or private network, to make path selection more intelligent than simply counting hops over routing protocols.</p>
    <div>
      <h3>How customers adopt Cloudflare One</h3>
      <a href="#how-customers-adopt-cloudflare-one">
        
      </a>
    </div>
    <p>We’ve discussed how we do what we do. Now let’s discuss the services we deliver. While customers have a number of different requirements that are specific to their organization, we do see centers of gravity that drive their use cases:</p><p><b>Network modernization initiatives:</b> Enterprise networks are in ways more complicated than they need to be. To make the enterprise network suitable for today’s hybrid workspace, many organizations are looking for ways to converge the on-prem and remote user experience. The adoption of the coffee shop networking architecture is driving many projects towards single-vendor SASE. By using <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Cloudflare Access</u></a>, users can access applications securely with identity and device-based contextual controls. Organizations use <a href="https://www.cloudflare.com/network-services/products/magic-wan/"><u>Magic WAN</u></a> for network connectivity across branch offices, headquarters, regional campuses and the data center.</p><p><b>Security modernization initiatives:</b> Security teams with concerns about enforcing more granular security controls to access critical resources are making efforts to adopt Zero Trust. These initiatives drive security-focused SASE use cases, which can both reduce the attack surface and centralize enforcement of adaptive access policies. Security teams need to both enable access to private applications while also securing access to the Internet. Use Cloudflare Access to implement Zero Trust Network Access, which accelerates the deployment of protections by layering granular, user-specific access controls on top of the existing network topology. Use <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a> to enforce content filtering policies to protect access to the Internet. Use <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> to stop phishing attacks and disrupt the business email compromise attack lifecycle. </p><p><b>Transformation initiatives: </b>Most organizations have legacy investments in both networking and security infrastructure, and are embarking upon a transformation across their business to support their future needs. Organizations that are transforming need to tackle both networking and security modernization. <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a> addresses comprehensive transformation by delivering networking services through Cloudflare Magic WAN, Cloudflare Access to implement ZTNA, Cloudflare Gateway to protect users from Internet threats, Cloudflare CASB to secure SaaS, and more.</p>
    <div>
      <h3>Building beyond SASE</h3>
      <a href="#building-beyond-sase">
        
      </a>
    </div>
    <p>We’re building new capabilities that extend beyond the traditional definition of SASE, all while leveraging our core Cloudflare network foundation. This includes addressing a broader spectrum of security concerns that organizations face, such as <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/"><u>phishing</u></a> and <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>DDoS attacks</u></a>.</p><p>We are expanding our networking capabilities to help organizations <a href="https://www.cloudflare.com/multi-cloud/"><u>simplify and automate multi-cloud connectivity</u></a>. As the boundaries between public and private networking blur, particularly with the widespread adoption of AI across various applications, customers are looking for a single set of controls for all their applications. This requires market-leading Web Application and API Protection (WAAP) services that natively support both positive and negative security models as part of SASE.</p><p>Furthermore, we are<a href="https://blog.cloudflare.com/workers-ai"> <u>rapidly deploying Graphics Processing Units (GPUs) in our data centers</u></a> to<a href="https://ai.cloudflare.com/"> <u>power AI protections and support customer applications</u></a>. As the only SASE platform that also serves as a leading Edge Distribution Platform with AI primitives, we are uniquely positioned to help customers to understand the latest AI capabilities and secure their users, networks, applications, and data with a security-first approach across the entire application lifecycle. We provide holistic support for the age of AI, and many leading Generative AI platforms rely on our network as critical infrastructure to operate. With their traffic and often code on our network, we enable the safeguard of customers' AI usage.</p><p>We believe that these efforts will help the market evolve and address a broader range of customer concerns. We’re doing this incrementally, building integrated solutions on top of our foundation and accelerating our pace. We can’t wait to show you what we’ve got planned for the year ahead in SASE.</p><p>Are you interested in Cloudflare One? <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/"><u>Contact us</u></a> to learn more about how we can help.</p><p>***</p><p><sup>1</sup><sub>Gartner, Magic Quadrant for SASE Platforms, Analyst(s): Jonathan Forest, Neil MacDonald, Dale Koeppen, July 9, 2025</sub></p><p><sub>GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.</sub></p><p><sub>Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</sub></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Gartner]]></category>
            <guid isPermaLink="false">1Imd4sxStKlQyqPxmCp6TP</guid>
            <dc:creator>Abe Carryl</dc:creator>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare named in 2025 Gartner® Magic Quadrant™ for Security Service Edge]]></title>
            <link>https://blog.cloudflare.com/cloudflare-sse-gartner-magic-quadrant-2025/</link>
            <pubDate>Fri, 23 May 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ For the third consecutive year, Gartner has named Cloudflare to the Gartner® Magic Quadrant™ for Security Service Edge (SSE) report. ]]></description>
            <content:encoded><![CDATA[ <p>For the third consecutive year, Gartner has named Cloudflare in the Gartner® Magic Quadrant™ for Security Service Edge (SSE) report. This analyst evaluation helps security and network leaders make informed choices about their long-term partners in digital transformation. We are excited to share that Cloudflare is one of only nine vendors recognized in this year’s report. </p><p>What’s more exciting is that we’re just getting started. <a href="https://blog.cloudflare.com/introducing-cloudflare-access/"><u>Since 2018</u></a>, starting with our Zero Trust Network Access (ZTNA) service <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Cloudflare Access</u></a>, we’ve continued to push the boundaries of how quickly we can build and deliver a mature SSE platform. In that time, we’ve released multiple products each year, delivering hundreds of features across our platform. That’s not possible without our customers. Today, tens of thousands of customers have chosen to connect and protect their people, devices, applications, networks, and data with Cloudflare. They tell us our platform is faster and easier to deploy and provides a more consistent and reliable user experience, all on a more agile architecture for longer term modernization. We’ve made a commitment to those customers to continue to deliver innovative solutions with the velocity and resilience they have come to expect from us. If you want to join them on this journey today, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/"><u>contact us</u></a> to discuss your own SSE journey. </p>
    <div>
      <h2>What is a Security Service Edge?</h2>
      <a href="#what-is-a-security-service-edge">
        
      </a>
    </div>
    <p>In general, a <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/"><u>Security Service Edge (SSE)</u></a> provides a helpful framing that gives teams guardrails as they adopt a Zero Trust architecture. The concept breaks down into a few typical buckets:</p><ul><li><p><b>Zero Trust access control</b>: Protect applications that hold sensitive data by creating <a href="https://www.cloudflare.com/learning/access-management/principle-of-least-privilege/">least privilege</a> rules that check for identity, device posture, and other signals on each and every request or connection.</p></li><li><p><b>Outbound filtering</b>: Keep people and devices safe as they connect to the rest of the Internet by filtering and logging network traffic, DNS queries, and HTTP requests.</p></li><li><p><b>Secure SaaS usage</b>: Analyze traffic to SaaS applications and scan the data sitting inside of SaaS applications for potential <a href="https://www.cloudflare.com/learning/access-management/what-is-shadow-it/">Shadow IT policy violations</a>, misconfigurations, or data mishandling.</p></li><li><p><b>Data protection</b>: Scan for data leaving your organization towards destinations that do not comply with your organization’s policies. Find data stored inside your organization, even in trusted tools, that should not be retained or that needs tighter <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">access controls</a>.</p></li><li><p><b>Employee experience</b>: <a href="https://www.cloudflare.com/learning/performance/what-is-digital-experience-monitoring/">Monitor and improve the experience</a> that your team members have when using tools and applications on the Internet or hosted inside your own organization.</p></li></ul><p>The SSE space is a component of the larger <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>Secure Access Service Edge (SASE)</u></a> market. You can think of the SSE capabilities as the security half of SASE, while the other half consists of the networking technologies that connect offices and data centers to each other along with everything that SSE connects. Some vendors only focus on the SSE side and rely on partners to connect customers to their security solutions. Other companies just provide the networking pieces. While today’s announcement highlights our SSE capabilities, Cloudflare offers both components as a unified SASE platform.</p>
    <div>
      <h2>How does Cloudflare fit into the SSE space?</h2>
      <a href="#how-does-cloudflare-fit-into-the-sse-space">
        
      </a>
    </div>
    <p>Cloudflare’s global network was built for this. We’ve developed a unified, programmable <a href="https://www.cloudflare.com/network"><u>network</u></a> in which every service runs in every data center, spanning more than 330 cities across the globe. Cloudflare operates within approximately 50 milliseconds of 95% of the Internet-connected population globally. That means that regardless of where your people, apps, and data are located, your Security Service Edge is not far away.</p><p>Our SSE services operate on the same infrastructure and locations that support many of the world's most prominent Internet platforms. We've integrated proven strengths including the <a href="https://1.1.1.1/"><u>world’s fastest DNS resolver</u></a>, our robust <a href="https://workers.cloudflare.com/?_gl=1*1fqsg8y*_gcl_au*MTU0MzQ4NzIwMS4xNzQyMjE4OTk0*_ga*NjkzNTc3NzkzLjE3NDIyMTg5OTQ.*_ga_SQCRB0TXZW*MTc0NTU3ODIzOC4yNS4xLjE3NDU1NzkwMTEuMTkuMC4w"><u>serverless compute platform</u></a>, intelligence from our leading <a href="https://www.cloudflare.com/application-services/products/?_gl=1*1fqsg8y*_gcl_au*MTU0MzQ4NzIwMS4xNzQyMjE4OTk0*_ga*NjkzNTc3NzkzLjE3NDIyMTg5OTQ.*_ga_SQCRB0TXZW*MTc0NTU3ODIzOC4yNS4xLjE3NDU1NzkwMTEuMTkuMC4w"><u>Web Application and API Protection (WAAP) platform</u></a> and <a href="https://blog.cloudflare.com/network-performance-update-cio-edition/"><u>advanced global traffic routing</u></a> capabilities developed as a result of proxying and protecting <a href="https://w3techs.com/technologies/overview/proxy"><u>approximately 20% of websites</u></a>. Our architecture ensures single-pass inspection, regardless of how customers connect. We also consistently hear that this <a href="https://blog.cloudflare.com/spotlight-on-zero-trust"><u>performance is core</u></a> to why customers chose Cloudflare. When customers choose Cloudflare, they’re choosing a unified, resilient platform built for the future.</p><p>By building our SSE platform on top of our own network, it puts Cloudflare in the driver’s seat. Whether that’s implementing best practices like IPv6, incorporating new technologies like WireGuard or <a href="https://blog.cloudflare.com/masque-building-a-new-protocol-into-cloudflare-warp/"><u>MASQUE</u></a>, or safeguarding against the future with <a href="https://www.cloudflare.com/learning/ssl/quantum/what-is-post-quantum-cryptography/"><u>post-quantum encryption</u></a>, by building on our own network we’re able to react quickly as new Internet security standards mature.</p><p>Customers can rely on Cloudflare to solve a broad range of security problems represented by the SSE category. They can also just start with a single component. We know that an entire modernization journey can be an overwhelming prospect for any organization. While all the use cases below are built to work better together, we make it simple for teams to start by just solving one problem at a time.</p>
    <div>
      <h3>Zero Trust access control</h3>
      <a href="#zero-trust-access-control">
        
      </a>
    </div>
    <p>Traditional VPNs have been the backbone of enterprise remote access for decades. However, organizations are <a href="https://www.cloudflare.com/zero-trust/solutions/vpn-replacement/">rapidly moving away from VPNs</a> due to security vulnerabilities, performance bottlenecks, and poor user experience. As businesses adopt <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust principles</a>, they expect modern solutions that:</p><ul><li><p>Improve security posture by enforcing least privilege access and per-resource authorization, eliminating dependence on perimeter-based defenses</p></li><li><p>Enhance user experience with seamless, high-performance connectivity.</p></li><li><p><a href="https://www.cloudflare.com/the-net/everywhere-security/">Reduce complexity and operational overhead</a> by consolidating tools and automating access policies.</p></li></ul><p>Cloudflare enables identity-driven, context-aware policies which replace the traditional <a href="https://www.cloudflare.com/learning/access-management/castle-and-moat-network-security/?_gl=1*q87nt7*_gcl_au*MTcyNTU4My4xNzQyMjIwMTA5*_ga*MTUyNTE2MzE3NC4xNzQyMjIwMTM2*_ga_SQCRB0TXZW*MTc0NTUwMzg1OS4yMS4xLjE3NDU1MDM5MjguNjAuMC4w"><u>castle-and-moat</u></a> model that come with VPN-based solutions. Applications can be made available to employees as well as third parties through a completely clientless deployment. Policies can also be applied to the applications that sit outside your infrastructure to ensure a consistent experience across SaaS applications as well. </p><p>By mid-2026, we plan to ship a number of new access control capabilities, including:</p><ul><li><p><b>Identity provider (IdP) agnostic </b><a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><b><u>multi-factor authentication (MFA)</u></b></a><b>:</b> Admins can enforce step-up MFA without having to direct a user back to an identity provider.</p></li><li><p><b>Just-in-time access controls:</b> Review and approve timely access requests to sensitive resources. Users can request access via tools like Slack and Google Chat.</p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/use-cases/rdp/rdp-browser/"><b><u>Browser-based RDP</u></b></a><b>:</b> Traditionally, vendors provide a limited number of PoPs which can support clientless RDP. With Cloudflare, customers get highly performant clientless RDP from the browser by connecting to any of Cloudflare’s data centers. This feature enables access to RDP targets without any software installed on the user’s machine.</p></li></ul>
    <div>
      <h3>Secure Web Gateway and DNS filtering</h3>
      <a href="#secure-web-gateway-and-dns-filtering">
        
      </a>
    </div>
    <p>For decades, organizations relied on on-prem hardware firewalls to secure Internet access. Like applications, users have moved beyond the perimeter and <a href="https://www.cloudflare.com/learning/cloud/cloud-native-security/">cloud-based security services</a> have become essential. Modern businesses expect solutions that:</p><ul><li><p>Protect users across locations from malware, ransomware, and other Internet threats</p></li><li><p>Enforce those protections with real-time, comprehensive threat intelligence that adapts with emerging attack vectors</p></li><li><p>Reduce management complexity while maintaining granular policy control across the entire network</p></li></ul><p><a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a>, inspects and filters DNS, network, HTTP, and egress traffic with consistent protections across the Internet and internal resources. Customers adopt our SWG to block threats across remote and office workers, enforce acceptable use policies, encrypt traffic, and block unauthorized SaaS and cloud destinations. In a single-pass architecture, all traffic is verified, filtered, and inspected without the performance penalties seen with hardware-based firewalls and proxies. Threat intelligence is derived from unique real-time visibility across our global network, including 4.3 trillion DNS queries per day, which powers AI-backed threat hunting models to identify, for example, new / newly seen domains before other vendors. </p><p><a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/"><u>Browser isolation</u></a> capabilities are also natively built-in, enabling organizations to insulate users from threats online and protect data in applications with a seamless user experience. For example, isolating web browsing safeguards users from unknown threats, including zero-days, while isolating apps like AI tools can restrict oversharing of proprietary information.</p><p>Customers can get started with a variety of deployment methods including device agents, network locations, PAC files, or DNS over HTTPS (DoH) endpoints. Regardless of implementation, consistent policy enforcement and comprehensive logging is easily accessible through our dashboard, our SQL-based Log Explorer experience, or third-party tools via LogPush.</p><p>By mid-2026, we plan to ship a number of new filtering and traffic handling capabilities, including:</p><ul><li><p>Deep packet inspection to apply filtering to non-standard ports for protocols like HTTP, SSH, and many others.</p></li><li><p>Filtering using Fully Qualified Domain Names (FQDNs): Admins will no longer need to filter packets or egress connections based on destination IP addresses. They will be able to use the FQDN, application name, or destination category with the egress and network policy builders.</p></li><li><p>Identity + PAC files, providing identity-based filtering without having to install the device client.</p></li></ul>
    <div>
      <h3>Cloud firewall</h3>
      <a href="#cloud-firewall">
        
      </a>
    </div>
    <p>Our comprehensive cloud firewall delivers <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">“firewall as a service” protection</a> that helps organizations manage traffic flows globally. All traffic passing through Cloudflare has firewall policies evaluated first, thus providing the first layer of defense, eliminating unnecessary/unwanted traffic before being further evaluated against security policies. The Cloudflare firewall applies configuration changes globally in seconds, thus providing immediate response to emerging needs. With Cloudflare’s network and data center capacity, you get virtually limitless firewall capacity, without the constraints of traditional hardware firewalls, making it a vital component of your Zero Trust and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-defense-in-depth/">defense-in-depth architecture</a>.</p>
    <div>
      <h3>Inline and API-based CASB</h3>
      <a href="#inline-and-api-based-casb">
        
      </a>
    </div>
    <p>SaaS applications relieve IT teams of the burden to host, maintain, and monitor the tools behind their business. However, they also create entirely new headaches for corresponding security teams. Modern organizations need solutions that:</p><ul><li><p>Provide visibility into unauthorized application usage that creates compliance and security risks</p></li><li><p>Enable granular control over data flows within both sanctioned and unsanctioned applications</p></li><li><p>Automate discovery and remediation of security misconfigurations in approved SaaS tools</p></li></ul><p>Any user in an enterprise now needs to connect to an application on the public Internet to do their work, and some users prefer to use their favorite application rather than the ones vetted and approved by the IT department. This kind of Shadow IT infrastructure can lead to <a href="https://www.cloudflare.com/the-net/shadow-it/">surprise fees, compliance violations, and data loss</a>.</p><p>Cloudflare offers comprehensive scanning and filtering to detect when team members are using unapproved tools. With a single click, administrators can block those tools outright or control how those applications can be used. If your marketing team needs to use Google Drive to collaborate with a vendor, you can quickly apply a rule that makes sure they can only download files and never upload. Alternatively, you can allow users to visit an application and read from it while blocking all text input. Cloudflare's Shadow IT policies offer easy-to-deploy controls to help manage how your organization uses the Internet.</p><p>Beyond unsanctioned applications, even approved resources can cause trouble. Your organization might rely on Microsoft OneDrive for day-to-day work, but your compliance policies prohibit your HR department from storing files with employee Social Security numbers in the tool. Cloudflare's <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">Cloud Access Security Broker (CASB) </a>can routinely scan the SaaS applications your team relies on to detect improper usage, missing controls, or potential misconfiguration.</p><p>By mid-2026, we look forward to bringing our customers a slew of new capabilities designed to give teams even better visibility and control over their SaaS and cloud applications, including:</p><ul><li><p><b>Robust remediation capabilities:</b> Resolve detected issues right from the dashboard, both automatically and on-demand with a single click.</p></li><li><p><b>Advanced workflows:</b> Configure automated behavior when new issues are detected, like custom alerting outputs and business justification prompts.</p></li><li><p><b>User and Entity Behavior Analytics (UEBA) &amp; suspicious activity monitoring:</b> Monitor live events across your SaaS apps and detect anomalous/suspicious activity that could indicate compromise.</p></li></ul>
    <div>
      <h3>Data security</h3>
      <a href="#data-security">
        
      </a>
    </div>
    <p>Over the past year, <a href="https://www.cloudflare.com/cio/">CIOs</a> and <a href="https://www.cloudflare.com/ciso/">CISOs</a> have consistently identified data protection as a top concern, particularly regarding artificial intelligence and large language models. As organizations increasingly rely on cloud services and AI tools, they require modern solutions that:</p><ul><li><p>Protect sensitive information across all environments without hampering productivity</p></li><li><p>Provide visibility into how data flows through both internal and external systems</p></li><li><p>Enforce consistent security policies that adapt to evolving regulatory requirements</p></li></ul><p>Cloudflare provides comprehensive visibility and control over data movement and data at rest. This helps organizations avoid the <a href="https://www.cloudflare.com/the-net/pursuing-privacy-first-security/privacy-led-security/">financial impact and reputational consequences of data loss and theft</a>.</p><p>Our data security is an integral component of our SASE platform, providing granular control over how users interact with applications. This approach allows organizations to establish nuanced policies that <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">safeguard sensitive information</a> without completely blocking access to productivity-enhancing technologies.</p><p>We are introducing a number of exciting data protection capabilities by mid-2026, including <a href="https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis/"><u>AI-based DLP detections</u></a>, <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-policies/logging-options/#send-http-requests-to-logpush-destination"><u>delivering simple, innovative forensics</u></a>, <a href="https://blog.cloudflare.com/scan-cloud-dlp-with-casb/"><u>classifying sensitive data in the public cloud</u></a>, and <a href="https://blog.cloudflare.com/cloudflare-acquires-kivera/"><u>innovative, preventative cloud security controls</u></a>. These features provide administrators with robust controls while maintaining the seamless performance and user experience that organizations expect from Cloudflare. </p>
    <div>
      <h3>Digital experience monitoring</h3>
      <a href="#digital-experience-monitoring">
        
      </a>
    </div>
    <p>Organizations today struggle with limited visibility into their users' digital experiences. When performance or availability issues arise, internal support teams often lack the tools to determine whether problems originate in the first, middle, or last mile, resulting in multiple support tickets and delayed resolutions.</p><p>Cloudflare addresses this challenge with a comprehensive monitoring toolkit built on the same systems we use to manage our massive global network in-house. This solution empowers IT teams to:</p><ul><li><p>Collect on-demand forensic and diagnostic information</p></li><li><p>Systematically gather telemetry data</p></li><li><p>Analyze patterns to anticipate issues before they impact productivity</p></li></ul><p>Cloudflare provides unmatched insight into Internet outages and performance trends that affect your users. This intelligence allows administrators to refine their deployments and quickly identify whether issues are localized to their environment or part of broader global disruptions.</p><p>By mid-2026, we plan to ship a number of new <a href="https://www.cloudflare.com/learning/performance/what-is-digital-experience-monitoring/">digital experience monitoring capabilities</a>, including:</p><ul><li><p>Real user monitoring (RUM) that measures the performance of every user’s request.</p></li><li><p>Advanced monitoring for communication applications like Zoom and Microsoft Teams.</p></li><li><p>Contextualizing user performance in terms of global Internet performance data.</p></li></ul>
    <div>
      <h3>Built for what’s next</h3>
      <a href="#built-for-whats-next">
        
      </a>
    </div>
    <p>Security Service Edge forms a critical component of modern enterprise protection, but organizations have modernization requirements across their network infrastructure. Cloudflare designed our capabilities with these needs in mind, because we deliver true convergence of both networking and security from our connectivity cloud.</p><p>Across the industry, we’ve seen many instances where vendors start with either networking or security as their primary focus, and acquire a vendor with an entirely different architecture to enter the SASE market. In such scenarios, there is no convergence with security and networking, because internal traffic is handled through different security controls than the cloud traffic. </p><p>Cloudflare delivers networking services using the same global data centers and backbone as our security components. Our composable architecture ensures all of our services are designed to work together, in any order. This means that your security and networking stays consistent and provides a common destination for your SASE journey, no matter where you start. </p><p>We’re proud of the work that we’ve done to solve customer problems. Cloudflare continues to receive industry-wide recognition, earning additional positions in 2024 for our comprehensive suite of security solutions beyond SSE, built for the enterprise.</p><ul><li><p>Cloudflare named in <a href="https://www.cloudflare.com/lp/gartner-magic-quadrant-cloud-application-platforms-2024/"><u>Gartner® Magic Quadrant™ for Cloud Application Platforms</u></a><sup>2</sup></p></li><li><p>Cloudflare named in <a href="https://www.gartner.com/en/documents/6019335">Gartner® Magic Quadrant™ for Email Security Platforms</a><sup>3</sup></p></li><li><p>Cloudflare named in <a href="https://www.cloudflare.com/lp/gartner-magic-quadrant-single-vendor-sase-2024/"><u>Gartner® Magic Quadrant™ for Single-Vendor SASE</u></a><sup>4</sup></p></li></ul><p>We believe this recognition underscores our position as a pioneering security and networking platform built for tomorrow's challenges. When organizations choose Cloudflare, they gain more than just another SSE vendor; they’re establishing a partnership with a holistic platform capable of addressing their broader spectrum of requirements for both public and private resources, both today and in the future.</p>
    <div>
      <h2>How does that impact customers?</h2>
      <a href="#how-does-that-impact-customers">
        
      </a>
    </div>
    <p>Tens of thousands of organizations trust Cloudflare to secure their teams every day.  We talk to customers directly about that feedback, and they have helped us understand <a href="https://blog.cloudflare.com/why-cios-select-cloudflare-one"><u>why CIOs and CISOs choose Cloudflare One</u></a>. For some teams we offer a cost-efficient opportunity to consolidate point solutions. Others appreciate that the ease-of-use means that many practitioners have set up our solution before they even talk to our team. <a href="https://blog.cloudflare.com/spotlight-on-zero-trust"><u>We know that speed matters</u></a> when we are 46% faster than Zscaler, 56% faster than Netskope, and 10% faster than Palo Alto Networks.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We kicked off 2025 with a <a href="https://www.cloudflare.com/security-week/"><u>week focused on new security features</u></a> that teams can begin deploying now. In the year ahead, look forward to announcements for our Secure Web Gateway, data protection capabilities, digital experience monitoring, and our inline and API CASB tools. And stay tuned for exciting innovations with AI-driven analytics and monitoring tools, too.</p><p>Our commitment in 2025 is the same as it was in 2024. We are going to continue to help your teams solve more security problems so that you can focus on your own mission.</p><p>Ready to hold us to that commitment? Cloudflare offers something unique among the players in this space — you can start using nearly every feature in our SSE platform right now at no cost. Teams of up to 50 users can adopt the solution <a href="https://www.cloudflare.com/zero-trust/products/#overview"><u>for free</u></a> to jumpstart a proof of concept. We believe that organizations of any size should be able to quickly and easily start their journey to modernize security.</p><p>Footnotes:</p><p><sup>1 </sup>Gartner, Magic Quadrant for Security Service Edge, Analyst(s): Charlie Winckless, Thomas Lintemuth, Dale Koeppen, Charanpal Bhogal, May 20, 2025</p><p><sup>2 </sup>Gartner, Magic Quadrant for Cloud Application Platforms, Analyst(s): Tigran Egiazarov, Mukul Saha, Anne Thomas, Steve Schwent, November 1, 2024</p><p><sup>3 </sup>Gartner, Magic Quadrant for Email Security Platforms, Analyst(s): Max Taggett, Nikul Patel, Franz Hinner, Deepak Mishra, December 16, 2024</p><p><sup>4 </sup>Gartner, Magic Quadrant for Single-Vendor SASE, Analyst(s): Andrew Lerner, Neil MacDonald, Jonathan Forest, Charlie Winckless, July 3, 2024</p><p>GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.</p><p>Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SSE]]></category>
            <category><![CDATA[Gartner]]></category>
            <guid isPermaLink="false">3hrGWvhYC2P5tMUc42xvuX</guid>
            <dc:creator>Abe Carryl</dc:creator>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare named in 2024 Gartner® Magic Quadrant™ for Security Service Edge]]></title>
            <link>https://blog.cloudflare.com/cloudflare-sse-gartner-magic-quadrant-2024/</link>
            <pubDate>Thu, 18 Apr 2024 14:58:23 GMT</pubDate>
            <description><![CDATA[ Gartner has once again named Cloudflare to the Gartner® Magic Quadrant™ for Security Service Edge (SSE) report ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/662cBI3NCcvlyl0OjiQzEv/96500a36f1f589e28d4de5b528feed72/image1-18.png" />
            
            </figure><p>Gartner has once again named Cloudflare to the Gartner® Magic Quadrant™ for Security Service Edge (SSE) report<sup>1</sup>. We are excited to share that Cloudflare is one of only ten vendors recognized in this report. For the second year in a row, we are recognized for our ability to execute and the completeness of our vision. You can read more about our position in the report <a href="https://www.cloudflare.com/lp/gartner-magic-quadrant-sse-2024/">here</a>.</p><p><a href="/cloudflare-sse-gartner-magic-quadrant">Last year</a>, we became the only new vendor named in the 2023 Gartner® Magic Quadrant™ for SSE. We did so in the shortest amount of time as measured by the date since our first product launched. We also <a href="/cloudflare-sse-gartner-magic-quadrant#:~:text=bot%20management.-,What%E2%80%99s%20next%3F,-When%20customers%20choose">made a commitment</a> to our customers at that time that we would only build faster. We are happy to report back on the impact that has had on customers and the Gartner recognition of their feedback.</p><p>Cloudflare can bring capabilities to market quicker, and with greater cost efficiency, than competitors thanks to the investments we have made in our global network over the last 14 years. We believe we were able to become the only new vendor in 2023 by combining existing advantages like our robust, multi-use global proxy, our lightning-fast DNS resolver, our serverless compute platform, and our ability to reliably route and accelerate traffic around the world.</p><p>We believe we advanced further in the SSE market over the last year by building on the strength of that network as larger customers adopted <a href="https://www.cloudflare.com/zero-trust/">Cloudflare One</a>. We took the ability of our Web Application Firewall (WAF) to scan for attacks without compromising speed and applied that to our now comprehensive Data Loss Prevention (DLP) approach. We repurposed the tools that we use to measure our own network and delivered an increasingly mature Digital Experience Monitoring (DEX) suite for administrators. And we extended our Cloud Access Security Broker (CASB) toolset to scan more applications for new types of data.</p><p>We are grateful to the customers who have trusted us on this journey so far, and we are especially proud of our customer reviews in the Gartner® Peer Insights™ panel as those customers report back on their experience with Cloudflare One. The feedback has been so consistently positive that Gartner named Cloudflare a <a href="https://www.gartner.com/reviews/market/zero-trust-network-access/vendor/cloudflare/product/cloudflare-access">Customers’ Choice</a><sup>2</sup> for 2024. We are going to make the same commitment to you today that we made in 2023: Cloudflare will only build faster as we continue to build out the industry’s best SSE platform.</p>
    <div>
      <h2>What is a Security Service Edge?</h2>
      <a href="#what-is-a-security-service-edge">
        
      </a>
    </div>
    <p>A <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">Security Service Edge (SSE)</a> “secures access to the web, cloud services and private applications. Capabilities include access control, threat protection, data security, security monitoring, and acceptable-use control enforced by network-based and API-based integration. SSE is primarily delivered as a cloud-based service, and may include on-premises or agent-based components.”<sup>3</sup></p><p>The SSE solutions in the market began to take shape as companies dealt with users, devices, and data leaving their security perimeters at scale. In previous generations, teams could keep their organization safe by hiding from the rest of the world behind a figurative castle-and-moat. The firewalls that protected their devices and data sat inside the physical walls of their space. The applications their users needed to reach sat on the same intranet. When users occasionally left the office they dealt with the hassle of backhauling their traffic through a legacy <a href="https://www.cloudflare.com/learning/access-management/what-is-a-vpn/">virtual private network (VPN)</a> client.</p><p>This concept started to fall apart when applications left the building. SaaS applications offered a cheaper, easier alternative to self-hosting your resources. The cost and time savings drove IT departments to migrate and security teams had to play catch up as all of their most sensitive data also migrated.</p><p>At the same time, users began working away from the office more often. The rarely used VPN infrastructure inside an office suddenly struggled to stay afloat with the new demands from more users connecting to more of the Internet.</p><p>As a result, the band-aid boxes in an organization failed — in some cases slowly and in other situations all at once. SSE vendors offer a cloud-based answer. SSE providers operate their own security services from their own data centers or on a public cloud platform. Like the SaaS applications that drove the first wave of migration, these SSE services are maintained by the vendor and scale in a way that offers budget savings. The end user experience improves by avoiding the backhaul and security administrators can more easily build smarter, safer policies to defend their team.</p><p>The SSE space covers a broad category. If you ask five security teams what an SSE or <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> solution is, you’ll probably get six answers. In general, SSE provides a helpful framing that gives teams guard rails as they try to adopt a Zero Trust architecture. The concept breaks down into a few typical buckets:</p><ul><li><p><b>Zero Trust Access Control</b>: protect applications that hold sensitive data by creating least-privilege rules that check for identity and other contextual signals on each and every request or connection.</p></li><li><p><b>Outbound Filtering</b>: keep users and devices safe as they connect to the rest of the Internet by filtering and logging DNS queries, HTTP requests, or even network-level traffic.</p></li><li><p><b>Secure SaaS Usage</b>: analyze traffic to SaaS applications and scan the data sitting inside of SaaS applications for potential Shadow IT policy violations, misconfigurations, or data mishandling.</p></li><li><p><b>Data Protection</b>: scan for data leaving your organization or for destinations that do not comply with your organization’s policies. Find data stored inside your organization, even in trusted tools, that should not be retained or needs tighter access controls.</p></li><li><p><b>Employee Experience</b>: monitor and improve the experience that your team members have when using tools and applications on the Internet or hosted inside your own organization.</p></li></ul><p>The SSE space is a component of the larger <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a> market. You can think of the SSE capabilities as the security half of SASE while the other half consists of the networking technologies that connect users, offices, applications, and data centers. Some vendors only focus on the SSE side and rely on partners to connect customers to their security solutions. Other companies just provide the networking pieces. While today’s announcement highlights our SSE capabilities, Cloudflare offers both components as a comprehensive, <a href="/single-vendor-sase-announcement-2024">single-vendor SASE</a> provider.</p>
    <div>
      <h2>How does Cloudflare One fit into the SSE space?</h2>
      <a href="#how-does-cloudflare-one-fit-into-the-sse-space">
        
      </a>
    </div>
    <p>Customers can rely on Cloudflare to solve the entire range of security problems represented by the SSE category. They also can just start with a single component. We know that an entire “digital transformation” can be an overwhelming prospect for any organization. While all the use cases below work better together, we make it simple for teams to start by just solving one problem at a time.</p>
    <div>
      <h3>Zero Trust access control</h3>
      <a href="#zero-trust-access-control">
        
      </a>
    </div>
    <p>Most organizations begin that problem-solving journey by attacking their virtual private network (VPN). In many cases, a legacy VPN operates in a model where anyone on that private network is trusted by default to access anything else. The applications and data sitting on that network become vulnerable to any user who can connect. Augmenting or replacing legacy VPNs is one of the leading Zero Trust use cases we see customers adopting, in part to eliminate pains related to the ongoing series of high-impact VPN <a href="https://www.cisa.gov/news-events/alerts/2024/04/12/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400">vulnerabilities</a> in on-premises firewalls and gateways.</p><p>Cloudflare provides teams with the ability to build Zero Trust rules that replace the security model of a traditional VPN with one that evaluates every request and connection for trust signals like identity, device posture, location, and multifactor authentication method. Through <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access (ZTNA)</a>, administrators can make applications available to employees and third-party contractors through a fully clientless option that makes traditional tools feel just like SaaS applications. Teams that need more of a private network can still build one on Cloudflare that supports arbitrary TCP, UDP, and ICMP traffic, including <a href="/introducing-warp-connector-paving-the-path-to-any-to-any-connectivity-2">bidirectional traffic</a>, while still enforcing Zero Trust rules.</p><p>Cloudflare One can also apply these rules to the applications that sit outside your infrastructure. You can deploy Cloudflare’s identity proxy to enforce consistent and granular policies that determine how team members log into their SaaS applications, as well.</p>
    <div>
      <h3>DNS filtering and Secure Web Gateway capabilities</h3>
      <a href="#dns-filtering-and-secure-web-gateway-capabilities">
        
      </a>
    </div>
    <p>Cloudflare operates the world’s fastest DNS resolver, helping users connect safely to the Internet whether they are working from a coffee shop or operating inside some of the <a href="/helping-keep-governments-safe-and-secure/">world’s largest networks</a>.</p><p>Beyond just <a href="https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/">DNS filtering</a>, Cloudflare also provides organizations with a comprehensive <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway (SWG)</a> that inspects the HTTP traffic leaving a device or entire network. Cloudflare filters each request for dangerous destinations or potentially malicious downloads. Besides SSE use cases, Cloudflare operates one of the largest forward proxies in the world for Internet privacy used by Apple iCloud Private Relay, Microsoft Edge Secure Network, and beyond.</p><p>You can also mix-and-match how you want to send traffic to Cloudflare. Your team can decide to send all traffic from every mobile device or just plug in your office or data center network to Cloudflare’s network. Each request or DNS query is logged and made available for review in our dashboard or can be exported to a 3rd party logging solution.</p>
    <div>
      <h3>In-line and at-rest CASB</h3>
      <a href="#in-line-and-at-rest-casb">
        
      </a>
    </div>
    <p>SaaS applications relieve IT teams of the burden to host, maintain, and monitor the tools behind their business. They also create entirely new headaches for corresponding security teams.</p><p>Any user in an enterprise now needs to connect to an application on the public Internet to do their work, and some users prefer to use their favorite application rather than the ones vetted and approved by the IT department. This kind of <a href="https://www.cloudflare.com/learning/access-management/what-is-shadow-it/">Shadow IT</a> infrastructure can lead to surprise fees, compliance violations, and data loss.</p><p>Cloudflare offers comprehensive scanning and filtering to detect when team members are using unapproved tools. With a single click, administrators can block those tools outright or control how those applications can be used. If your marketing team needs to use Google Drive to collaborate with a vendor, you can apply a quick rule that makes sure they can only download files and never upload. Alternatively, allow users to visit an application and read from it while blocking all text input. Cloudflare’s Shadow IT policies offer easy-to-deploy controls over how your organization uses the Internet.</p><p>Beyond unsanctioned applications, even approved resources can cause trouble. Your organization might rely on Microsoft OneDrive for day-to-day work, but your compliance policies prohibit your HR department from storing files with employee Social Security numbers in the tool. Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">Cloud Access Security Broker (CASB)</a> can routinely scan the SaaS applications your team relies on to detect improper usage, missing controls, or potential misconfiguration.</p>
    <div>
      <h3>Digital Experience Monitoring</h3>
      <a href="#digital-experience-monitoring">
        
      </a>
    </div>
    <p>Enterprise users have consumer expectations about how they connect to the Internet. When they encounter delays or latency, they turn to IT help desks to complain. Those complaints only get louder when help desks lack the proper tools to granularly understand or solve the issues.</p><p>Cloudflare One provides teams with a <a href="https://www.cloudflare.com/learning/performance/what-is-digital-experience-monitoring/">Digital Experience Monitoring</a> toolkit that we built based on the tools we have used for years inside of Cloudflare to monitor our own global network. Administrators can measure global, regional, or individual latency to applications on the Internet. IT teams can open our dashboard to troubleshoot connectivity issues with single users. The same capabilities we use to <a href="https://w3techs.com/technologies/overview/proxy">proxy approximately 20% of the web</a> are now available to teams of any size, so they can help their users.</p>
    <div>
      <h3>Data security</h3>
      <a href="#data-security">
        
      </a>
    </div>
    <p>The most pressing concern we have heard from CIOs and CISOs over the last year is the fear around data protection. Whether data loss is malicious or accidental, the consequences can erode customer trust and create penalties for the business.</p><p>We also hear that deploying any sort of effective data security is just plain hard. Customers tell us anecdotes about expensive point solutions they purchased with the intention to implement them quickly and keep data safe, that ultimately just didn’t work or slowed down their teams to the point that they became shelfware.</p><p>We have spent the last year aggressively improving our solution to that problem as the single largest focus area of investment in the Cloudflare One team. Our data security portfolio, including <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data loss prevention (DLP)</a>, can now scan for data leaving your organization, as well as data stored inside your SaaS applications, and prevent loss based on exact data matches that you provide or through fuzzier patterns. Teams can apply optical character recognition (OCR) to find potential loss in images, scan for public cloud keys in a single click, and software companies can rely on predefined ML-based source code detections.</p><p><a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">Data security</a> will continue to be our largest area of focus in Cloudflare One over the next year. We are excited to continue to deliver an SSE platform that gives administrators comprehensive control without interrupting or slowing down their users.</p>
    <div>
      <h3>Beyond the SSE</h3>
      <a href="#beyond-the-sse">
        
      </a>
    </div>
    <p>The scope of an SSE solution captures a wide range of the security problems that plague enterprises. We also know that issues beyond that definition can compromise a team. In addition to offering an industry-leading SSE platform, Cloudflare gives your team a <a href="https://www.cloudflare.com/cybersecurity/">full range of cybersecurity tools</a> to protect your organization, to connect your team, and to secure all of your applications.</p><p>IT compromise tends to start with email. The majority of attacks begin with some kind of multi-channel <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing</a> campaign or social engineering attack sent to the largest hole in any organization’s perimeter: their employees’ email inboxes. We believe that you should be protected from that too, even before the layers of our SSE platform kick in to catch malicious links or files from those emails, so Cloudflare One also features best-in-class cloud <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">email security</a>. The capabilities just work with the rest of Cloudflare One to help stop all phishing channels — inbox (cloud email security), social media (SWG), SMS (ZTNA <a href="/2022-07-sms-phishing-attacks/">together with hard keys</a>), and cloud collaboration (CASB). For example, you can allow team members to still click on potentially malicious links in an email while forcing those destinations to load in an isolated browser that is transparent to the user.</p><p>Most SSE solutions stop there, though, and only solve the security challenge. Team members, devices, offices, and data centers still need to connect in a way that is performant and highly available. Other SSE vendors partner with networking providers to solve that challenge while adding extra hops and latency. Cloudflare customers don’t have to compromise. Cloudflare One offers a complete <a href="/magic-wan-connector-general-availability">WAN connectivity solution</a> delivered in the same data centers as our security components. Organizations can rely on a single vendor to solve how they connect and how they do so securely. No extra hops or invoices needed.</p><p>We also know that security problems do not distinguish between what happens inside your enterprise and the applications you make available to the rest of the world. You can secure and accelerate the applications that you build to serve your own customers through Cloudflare, as well. Analysts have also <a href="https://www.cloudflare.com/analysts/">recognized</a> Cloudflare’s <a href="https://www.cloudflare.com/application-services/products/">Web Application and API Protection (WAAP) platform</a>, which protects some of the world’s largest Internet destinations.</p>
    <div>
      <h2>How does that impact customers?</h2>
      <a href="#how-does-that-impact-customers">
        
      </a>
    </div>
    <p>Tens of thousands of organizations trust Cloudflare One to secure their teams every day. And they love it. Over 200 enterprises have reviewed Cloudflare’s Zero Trust platform as part of Gartner® Peer Insights™. As mentioned previously, the feedback has been so consistently positive that Gartner named Cloudflare a <a href="https://www.gartner.com/reviews/market/zero-trust-network-access/vendor/cloudflare/product/cloudflare-access">Customers’ Choice</a> for 2024.</p><p>We talk to customers directly about that feedback, and they have helped us understand <a href="/why-cios-select-cloudflare-one">why CIOs and CISOs choose Cloudflare One</a>. For some teams, we offer a cost-efficient opportunity to consolidate point solutions. Others appreciate that our ease-of-use means that many practitioners have set up our platform before they even talk to our team. <a href="/spotlight-on-zero-trust">We also hear that speed matters</a> to ensure a slick end user experience when we are 46% faster than Zscaler, 56% faster than Netskope, and 10% faster than Palo Alto Networks.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We kicked off 2024 with a <a href="https://www.cloudflare.com/security-week/">week focused on new security features</a> that teams can begin deploying now. Looking ahead to the rest of the year, you can expect additional investment as we add depth to our Secure Web Gateway product. We also have work underway to make our industry-leading access control features even easier to use. Our largest focus areas will include our data protection platform, digital experience monitoring, and our in-line and at-rest CASB tools. And stay tuned for an overhaul to how we surface analytics and help teams meet compliance needs, too.</p><p>Our commitment to our customers in 2024 is the same as it was in 2023. We are going to continue to help your teams solve more security problems so that you can focus on your own mission.</p><p>Ready to hold us to that commitment? Cloudflare offers something unique among the leaders in this space — you can start using nearly every feature in Cloudflare One right now at no cost. Teams of up to 50 users can <a href="https://www.cloudflare.com/zero-trust/products/">adopt our Zero Trustplatform for free</a>, whether for their small team or as part of a larger enterprise proof of concept. We believe that organizations of any size should be able to start their journey to deploy industry-leading security.</p><p>***</p><p><sup>1</sup>Gartner, Magic Quadrant for Security Service Edge, By Charlie Winckless, Thomas Lintemuth, Dale Koeppen, April 15, 2024</p><p><sup>2</sup>Gartner, Voice of the Customer for Zero Trust Network Access, By Peer Contributors, 30 January 2024</p><p><sup>3</sup><a href="https://www.gartner.com/en/information-technology/glossary/security-service-edge-sse">https://www.gartner.com/en/information-technology/glossary/security-service-edge-sse</a></p><p>GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, MAGIC QUADRANT and PEER INSIGHTS are registered trademarks and The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.</p><p>Gartner® Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its a iliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.</p><p>Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security Service Edge]]></category>
            <category><![CDATA[SSE]]></category>
            <category><![CDATA[Gartner]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">74GVTMXQHRWPaBWcm9NRgX</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare One named in Gartner® Magic Quadrant™ for Security Service Edge]]></title>
            <link>https://blog.cloudflare.com/cloudflare-sse-gartner-magic-quadrant/</link>
            <pubDate>Thu, 13 Apr 2023 15:13:42 GMT</pubDate>
            <description><![CDATA[ Cloudflare Zero Trust named to Gartner® Magic Quadrant™ for Security Service Edge ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5f8Dl6fedmDRmheRrIf5vt/8b0e7ecef14733a971eb13ad97094b19/unnamed--1-.png" />
            
            </figure><p>Gartner has recognized Cloudflare in the 2023 “Gartner® Magic Quadrant™ for Security Service Edge (SSE)” report for its ability to execute and completeness of vision. We are excited to share that the <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare Zero Trust</a> solution, part of our <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> platform, is one of only ten vendors recognized in the report.</p><p>Of the 10 companies named to this year’s Gartner® Magic Quadrant™ report, Cloudflare is the only new vendor addition. You can read more about our position in the report and what customers say about using Cloudflare One <a href="https://cloudflare.com/lp/gartner-magic-quadrant-sse-2023/">here</a>.</p><p>Cloudflare is also the newest vendor when measured by the date since our first products in the SSE space launched. We <a href="/cloudflare-access-now-teams-of-any-size-can-turn-off-their-vpn/">launched Cloudflare Access</a>, our best-in-class Zero Trust access control product, a little less than five years ago. Since then, we have released hundreds of features and shipped nearly a dozen more products to create a comprehensive SSE solution that over 10,000 organizations trust to keep their organizations data, devices and teams both safe and fast. We moved that quickly because we built Cloudflare One on top of the same network that already secures and accelerates large segments of the Internet today.</p><p>We deliver our SSE services on the same servers and in the same locations that serve some of the world’s largest Internet properties. We combined existing advantages like the <a href="https://1.1.1.1/">world’s fastest DNS resolver</a>, Cloudflare’s <a href="https://workers.cloudflare.com/">serverless compute</a> platform, and our ability to <a href="/network-performance-update-cio-edition/">route and accelerate traffic</a> around the globe. We might be new to the report, but customers who select Cloudflare One are not betting on an upstart provider; they are choosing an industry-leading solution made possible by a network that already secures millions of destinations and billions of users every day.</p><p>We are flattered by the recognition from Gartner this week and even more thrilled by the customer outcomes we make possible today. That said, we are not done and we are only going faster.</p>
    <div>
      <h2>What is a Security Service Edge?</h2>
      <a href="#what-is-a-security-service-edge">
        
      </a>
    </div>
    <p>A <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">Security Service Edge</a> (SSE) “secures access to the web, cloud services and private applications. Capabilities include access control, threat protection, <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">data security</a>, security monitoring, and acceptable-use control enforced by network-based and API-based integration. SSE is primarily delivered as a cloud-based service, and may include on-premises or agent-based components.”<sup>1</sup></p><p>The SSE space developed to meet organizations as they encountered a new class of security problems. Years ago, teams could keep their devices, services, and data safe by hiding from the rest of the world behind a figurative castle-and-moat. The defense perimeter for an enterprise corresponded to the literal walls of their office. Applications ran in server closets or self-managed data centers. Businesses could deploy firewalls, proxies, and filtering appliances in the form of on-premise hardware. Remote users suffered through the setup by backhauling their traffic through the physical office with a legacy virtual private network (VPN) client.</p><p>That model began to break down when applications started to leave the building. Teams began migrating to SaaS tools and public cloud providers. They could no longer control security by placing physical appliances in the flow of their one path to the Internet.</p><p>Meanwhile, users also left the office, placing stress on the ability of a self-managed private network to scale with the traffic. Performance and availability suffered while costs increased as organizations carried more traffic and deployed more bandaids to try and buy time.</p><p>Bad actors also evolved. Attacks became more sophisticated and exploited the migration away from a classic security perimeter. The legacy appliances deployed could not keep up with the changes in attack patterns and scale of attacks.</p><p>SSE vendors provide organizations with a cloud-based solution to those challenges. SSE providers deploy and maintain security services in their own points of presence or in a public cloud provider, giving enterprises a secure first hop before they connect to the rest of the Internet or to their internal tools. IT teams can deprecate the physical or virtual appliances that they spent days maintaining. Security teams benefit from filtering and policies that update constantly to defend against new threats.</p><p>Some SSE features target remote access replacement by offering customers the ability to connect users to internal tools with Zero Trust access control rules. Other parts of an SSE platform focus on applying Zero Trust scrutiny to the rest of the Internet, replacing the on-premise filtering appliances of an enterprise with cloud-based firewalls, resolvers, and proxies that filter and log traffic leaving a device closer to the user instead of forcing a backhaul to a centralized location.</p>
    <div>
      <h3>What about SASE?</h3>
      <a href="#what-about-sase">
        
      </a>
    </div>
    <p>You might also be familiar with the term <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge</a> (SASE). We hear customers talk about their “SASE” goals more often than “SSE” alone. SASE extends the definition of SSE to include managing the connectivity of the traffic being secured. Network-as-a-Service vendors help enterprises connect their users, devices, sites, and services. SSE providers <a href="https://www.cloudflare.com/network-services/solutions/enterprise-network-security/">secure</a> that traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rkvq7XmV0DpUVvfW7Rew7/c4564c1b87eceaca28eee35ea3cedff4/Screenshot-2023-03-01-at-16.30.12.png" />
            
            </figure><p>Most vendors focus on one side of the equation. Network-as-a-service companies sell <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">software-defined wide area network (SD-WAN)</a>, interconnection, and traffic optimization solutions to help enterprises manage and accelerate connectivity, but those enterprises wind up losing those benefits by sending all that traffic to an SSE provider for filtering. SSE providers deliver security tools for traffic of nearly any type, but they still need customers to buy additional networking services to get that traffic to their locations.</p><p>Cloudflare One is a single vendor SASE platform. Cloudflare offers enterprises a comprehensive <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service</a> where teams can send all traffic to Cloudflare’s network, where we can help teams manage connectivity and improve performance. Enterprises can choose from flexible on-ramps, like their existing hardware routers, agents running on laptops and mobile devices, physical and virtual interconnects, or Cloudflare’s <a href="/magic-wan-connector/">own last mile connector</a>.</p><p>When that traffic reaches Cloudflare’s network, our SSE services apply security filtering in the same locations where we manage and route connectivity. Cloudflare’s SSE solution does not add additional hops; we deliver filtering and logging in-line with the traffic we accelerate for our customers. The value of our single vendor SASE solution is just another outcome of an obsession we’ve had since we first launched our reverse proxy over ten years ago: customers should not have to compromise performance for security and vice versa.</p>
    <div>
      <h2>So where does Cloudflare One fit?</h2>
      <a href="#so-where-does-cloudflare-one-fit">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> connects enterprises to the tools they need while securing their devices, applications and data without compromising on performance. The platform consists of two primary components: our Cloudflare Zero Trust products, which represent our SSE offering, and our network-as-a-service solution. As much as today’s announcement separates out those features, we prefer to talk about how they work together.</p><p>Cloudflare’s network-as-a-service offering, our Magic WAN solution, extends our network for customers to use as their own. Enterprises can take advantage of the investments we have made over more than a decade to build out one of the world’s most peered, most performant, and most available networks. Teams can connect individual roaming devices, offices and physical sites, or entire networks and data centers through Cloudflare to the rest of the Internet or internal destinations.</p><p>We want to make it as easy as possible for customers to send us their traffic, so we provide many flexible “on-ramps” to easily fit into their existing infrastructure. Enterprises can use our roaming agent to connect user devices, our Cloudflare Tunnel service for application-level connectivity, network-level tunnels from our <a href="/magic-wan-connector/">Magic WAN Connector</a> or their existing router or SD-WAN hardware, and/or direct physical or virtual interconnections for dedicated connectivity to on-prem or cloud infrastructure at 1,600+ locations around the world. When packets arrive at the closest Cloudflare location, we provide optimization, acceleration and logging to give customers visibility into their traffic flows.</p><p>Instead of sending that accelerated traffic to an additional intermediary for security filtering, our Cloudflare Zero Trust platform can take over to provide SSE security filtering in the same location - generally on the exact same server - as our network-as-a-service functions. Enterprises can pick and choose what SSE features they want to enable to strengthen their security posture over time.</p>
    <div>
      <h2>Cloudflare One and the SSE feature set</h2>
      <a href="#cloudflare-one-and-the-sse-feature-set">
        
      </a>
    </div>
    <p>The security features inside of Cloudflare One provide comprehensive SSE coverage to enterprises operating at any scale. Customers just need to send traffic to a Cloudflare location within a few milliseconds of their users and Cloudflare Zero Trust handles everything else.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7J0yjZm1I1A6k2VoaoM3DI/020161dc87ae633b0c791ec81a80004c/2fUYKtUxdMunJRmzZBz89PTwIW1ks_TR9qk7CoLnFVC_P8603M3x7o2MXqPkpAO5FmVj4Ew6eYBSsbQn6WfQ2wJEnwfNHE8Rf0vmQfCg1AqMsjjzVTLpneY1sVuT.png" />
            
            </figure>
    <div>
      <h3>Cloudflare One SSE Capabilities</h3>
      <a href="#cloudflare-one-sse-capabilities">
        
      </a>
    </div>
    <p><b>Zero Trust Access Control</b>Cloudflare provides a <a href="https://www.cloudflare.com/products/zero-trust/vpn-replacement/">Zero Trust VPN replacement</a> for teams that host and control their own resources. Customers can deploy a private network inside of Cloudflare’s network for more traditional connectivity or extend access to contractors without any agent required. Regardless of how users connect, and for any type of destination they need, Cloudflare’s network gives administrators the ability to <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/">build granular rules</a> on a per-resource or global basis. Teams can combine one or more <a href="https://developers.cloudflare.com/cloudflare-one/identity/">identity providers</a>, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/">device posture</a> inputs, and other sources of signal to determine when and how a user should be able to connect.</p><p>Organizations can also extend these types of Zero Trust access control <a href="/cloudflare-access-for-saas/">rules to the SaaS applications</a> where they do not control the hosting by introducing Cloudflare’s identity proxy into the login flow. They can continue to use their existing identity provider but layer on additional checks like device posture, country, and multifactor method.</p><p><b>DNS filtering</b>Cloudflare’s DNS filtering solution runs on the world’s fastest DNS resolver, filtering and logging the DNS queries leaving individual devices or some of the <a href="/helping-keep-governments-safe-and-secure/">world’s largest networks</a>.</p><p><b>Network firewall</b>Organizations that maintain on-premise hardware firewalls or cloud-based equivalents can deprecate their boxes by sending traffic through Cloudflare where our <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">firewall-as-a-service</a> can filter and log traffic. Our Network Firewall includes L3-L7 filtering, Intrusion Detection, and direct integrations with our Threat Intelligence feeds and the rest of our SSE suite. It enables security teams to build sophisticated policies without any of the headaches of traditional hardware: no capacity or redundancy planning, no throughput restrictions, no manual patches or upgrades.</p><p><b>Secure Web Gateway</b>Cloudflare’s <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Secure Web Gateway</a> (SWG) service inspects, filters, and logs traffic in a Cloudflare PoP close to a user regardless of where they work. The <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">SWG</a> can block <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">HTTP requests</a> bound for dangerous destinations, scan traffic for viruses and malware, and control how traffic routes to the rest of the Internet without the need for additional hardware or virtualized services.</p><p><b>In-line Cloud Access Security Broker and Shadow IT</b>The proliferation of <a href="https://www.cloudflare.com/saas/">SaaS applications</a> can help teams cut costs but poses a real risk; sometimes users prefer tools other than the ones selected by their IT or Security teams. Cloudflare’s in-line <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">Cloud Access Security Broker (CASB)</a> gives administrators the tools to make sure employees use SaaS applications as intended. Teams can build tenant control rules that restrict employees from logging into personal accounts, policies that only allow file uploads of certain types to approved SaaS applications, and filters that restrict employees from using unapproved services.</p><p>Cloudflare’s <a href="/introducing-shadow-it-discovery/">“Shadow IT” service</a> scans and catalogs user traffic to the Internet to help IT and Security teams detect and monitor the unauthorized use of SaaS applications. For example, teams can ensure that their approved cloud storage is the only place where users can upload materials.</p><p><b>API-driven Cloud Access Security Broker</b>Cloudflare’s superpower is our <a href="https://www.cloudflare.com/network/">network</a>, but sometimes the worst attacks start with data sitting still. Teams that adopt SaaS applications can share work products and collaborate together from any location; that same convenience makes it simple for mistakes or bad actors to cause a serious <a href="https://www.cloudflare.com/learning/security/what-is-a-data-breach/">data breach</a>.</p><p>In some cases, employees might overshare a document with sensitive information by selecting the wrong button in the “Share” menu. With just one click, a spreadsheet with customer contact data could become public on the Internet. In other situations, users might share a report with their personal account without realizing they just violated internal compliance rules.</p><p>Regardless of how the potential data breach started, Cloudflare’s <a href="https://www.cloudflare.com/products/zero-trust/casb/">API-driven CASB</a> constantly scans the SaaS applications that your team uses for potential misconfiguration and data loss. Once detected, Cloudflare’s CASB will alert administrators and provide a comprehensive guide to remediating the incident.</p><p><b>Data Loss Prevention</b>Cloudflare’s <a href="https://www.cloudflare.com/products/zero-trust/dlp/">Data Loss Prevention</a> service scans traffic to detect and block potential data loss. Administrators can select from common precreated profiles, like social security numbers or credit card numbers, or create their own criteria using regular expressions or integrate with existing Microsoft Information Protection labels.</p><p><b>Remote Browser Isolation</b>Cloudflare’s <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">browser isolation service</a> runs a browser inside of our network, in a data center just milliseconds from the user, and sends the vector rendering of the web page to the local device. Team members can use any modern browser and, <a href="/cloudflare-and-remote-browser-isolation/">unlike other approaches</a>, the Internet just feels like the Internet. Administrators can <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">isolate sites</a> on the fly, choosing to only isolate unknown destinations or providing contractors with an agentless workstation. Security teams can add additional protection like blocking copy-paste or printing.</p>
    <div>
      <h3>Security beyond the SSE</h3>
      <a href="#security-beyond-the-sse">
        
      </a>
    </div>
    <p>Many of the customers who talk to us about their SSE goals are not ready to begin adopting every security service in the category from Day 1. Instead, they tend to have strategic SSE goals and tactical immediate problems. That’s fine. We <a href="https://zerotrustroadmap.org/">can meet customers</a> wherever they begin on their journey and sometimes that journey starts with pain points that sit just a bit outside of the current SSE definition. We can help in those areas, too.</p><p>Many of the types of attacks that an SSE model aims to prevent begin with email, but that falls outside of the traditional SSE definition. Attackers will target specific employees or entire workforces with phishing links or <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware</a> that the default filtering available from email providers today miss.</p><p>We want to help customers stop these attacks at the inbox before SSE features like <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a> or SWG filtering need to apply. Cloudflare One includes <a href="https://www.cloudflare.com/products/zero-trust/email-security/">industry-leading email security</a> through our Area 1 product to protect teams regardless of their email provider. Area 1 is not just a standalone solution bundled into our SSE; Cloudflare Zero Trust <a href="/email-link-isolation/">features work better together</a> alongside Area 1. Suspicious emails can open links in an isolated browser, for example, to give customers a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-defense-in-depth/">defense-in-depth security model</a> without the risk of more IT help desk tickets.</p><p>Cloudflare One customers can also take advantage of another <a href="/cloudflare-waap-named-leader-gartner-magic-quadrant-2022/">Gartner-recognized platform in Cloudflare</a>, our application security suite. Cloudflare’s industry-leading <a href="https://www.cloudflare.com/learning/security/what-is-web-application-security/">application security</a> features, like our <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall</a> and <a href="https://www.cloudflare.com/learning/ddos/ddos-mitigation/">DDoS mitigation service</a>, can be deployed in-line with our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security features</a>. Teams can add bot management alerts, <a href="https://www.cloudflare.com/application-services/products/api-gateway/">API protection</a>, and faster caching to their internal tools with a single click.</p>
    <div>
      <h2>Why Cloudflare?</h2>
      <a href="#why-cloudflare">
        
      </a>
    </div>
    <p>Over 10,000 organizations trust Cloudflare One to connect and secure their <a href="https://www.cloudflare.com/plans/enterprise/">enterprise</a>. Cloudflare One helps protect and accelerate teams from the world’s largest IT organization, the US Federal Government, to thousands of small groups who rely on our free plan. A couple of months ago we spoke with customers as part of our <a href="https://www.cloudflare.com/cio-week/">CIO Week</a> to listen to the reasons they select Cloudflare One. Their feedback followed a few <a href="/why-cios-select-cloudflare-one/">consistent themes</a>.</p><p><b>1) Cloudflare One delivers more complete security</b>Nearly every SSE vendor offers improved security compared to a traditional <a href="https://www.cloudflare.com/learning/access-management/castle-and-moat-network-security/">castle-and-moat model</a>, but that is a low bar. We built the security features in Cloudflare One to be best in class. Our industry-leading <a href="https://www.cloudflare.com/zero-trust/products/access/">access control solution</a> provides more built-in options to control who can connect to the tools that power your business.</p><p>We partner leading identity providers and endpoint protection platforms, like <a href="/cloudflare-partners-with-microsoft-to-protect-joint-customers-with-global-zero-trust-network/">Microsoft</a> and <a href="/cloudflare-crowdstrike-partnership/">CrowdStrike</a>, to provide a Zero Trust VPN replacement that is better than anything else on the market. On the outbound filtering side, every filtering option relies on threat intelligence gathered and curated by <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a>, our dedicated threat research team.</p><p><b>2) Cloudflare One makes your team faster</b>Cloudflare One accelerates your end users from the first moment they connect to the Internet by starting with the <a href="https://1.1.1.1/">world’s fastest DNS resolver</a>. End users send those DNS queries and establish connectivity over a secure tunnel optimized based on feedback from the millions of users who rely on our popular <a href="/1111-warp-better-vpn/">consumer forward proxy</a>. Entire sites connect through a variety of tunnel options to Cloudflare’s network where we are the <a href="/network-performance-update-developer-week/">fastest connectivity provider</a> for the most number of the world’s 3,000 largest networks.</p><p>We compete and measure ourselves against pure connectivity providers. When we measure ourselves against pure SSE providers, like Zscaler, <a href="/network-performance-update-cio-edition/">we significantly outperform</a> by 38% to 59% depending on use case.</p><p><b>3) Cloudflare One is easier to manage</b>The Cloudflare Zero Trust products are unique in the SSE market in that we offer a <a href="https://www.cloudflare.com/plans/free/">free plan</a> that covers nearly every feature. We make these services available at no cost to groups of up to 50 users because we believe that security on the Internet should be accessible to anyone on any budget.</p><p>A consequence of that commitment is that we built products that have to be easy to use. Unlike other SSE providers who only sell to the enterprise and can rely on large systems integrators for deployment, we had to create a solution that any team could deploy. From <a href="/cloudflare-zero-trust-for-galileo-and-athenian/">human rights organizations</a> without full-time IT departments to <a href="/startup-program-v2/">start ups</a> who want to spend more time building and less time worrying about vulnerabilities.</p><p>We also know that administrators want more options than just an intuitive dashboard. We provide <a href="https://api.cloudflare.com/">API support</a> for managing every Cloudflare One feature, and we maintain a <a href="https://developers.cloudflare.com/cloudflare-one/api-terraform/access-with-terraform/">Terraform provider</a> for teams that need the option for peer reviewed configuration-as-code management.</p><p><b>4) Cloudflare One is the most cost-efficient comprehensive SASE offering</b>Cloudflare is responsible for delivering and securing millions of websites on the Internet every day. To support that volume of traffic, we had to <a href="/cloudflares-gen-x-servers-for-an-accelerated-future/">build our network</a> for scale and <a href="/extending-the-life-of-hardware/">cost-efficiency</a>.</p><p>The largest enterprises’ internal network traffic does not (yet) match the volume of even moderately popular Internet properties. When those teams send traffic to Cloudflare One, we rely on the same hardware and the same data centers that power our <a href="https://www.cloudflare.com/application-services/">application services</a> business to apply security and networking features. As a result, we can help deliver comprehensive security to any team at a price point that is made possible by our existing investment in our network.</p><p><b>5) Cloudflare can be your single, consolidated security vendor</b>Cloudflare One is only the most recent part of the Cloudflare platform to be recognized in industry analyst reports. In 2022 Gartner named Cloudflare a Leaderin <a href="/cloudflare-waap-named-leader-gartner-magic-quadrant-2022/">Web Application and API Protection (WAAP)</a>. When customers select Cloudflare to solve their SSE challenges, they have the opportunity to add best-in-class solutions all from the same vendor.</p><p>Dozens of <a href="https://www.cloudflare.com/analysts/">independent analyst firms</a> continue to recognize Cloudflare for our ability to deliver results to our customers on services ranging from <a href="https://www.cloudflare.com/ddos/">DDoS protection</a>, <a href="https://www.cloudflare.com/cdn/">CDN</a> and <a href="https://www.cloudflare.com/learning/serverless/glossary/what-is-edge-computing/">edge computing</a> to <a href="https://www.cloudflare.com/application-services/products/bot-management/">bot management</a>.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>When customers choose Cloudflare One, they trust our network to secure the most sensitive aspects of their enterprise without slowing down their business. We are grateful to the more than 10,000 organizations who have selected us as their vendor in the last five years, from small teams on our free plan to <a href="https://www.cloudflare.com/nl-nl/case-studies/">Fortune 500 companies</a> and <a href="/helping-keep-governments-safe-and-secure/">government agencies</a>.</p><p>Today’s announcement only accelerates the momentum in Cloudflare One. We are focused on building the next wave of security and connectivity features our customers need to focus on their own mission. We’re going to keep going faster to help more and more organizations. Want to get started on that journey with us? Let us know <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">here</a> and we’ll reach out.</p><p>Gartner, “Magic Quadrant for Security Service Edge”, Analyst(s): Charlie Winckless, Aaron McQuaid, John Watts, Craig Lawson, Thomas Lintemuth, Dale Koeppen, April 10, 2023.</p><p>......</p><p><sup>1</sup><a href="https://www.gartner.com/en/information-technology/glossary/security-service-edge-sse">https://www.gartner.com/en/information-technology/glossary/security-service-edge-sse</a></p><p>GARTNER is a registered trademark and service mark of Gartner and Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</p> ]]></content:encoded>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Gartner]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">6PFNNYIxIykzs5nijXYK8</guid>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare named a Leader by Gartner]]></title>
            <link>https://blog.cloudflare.com/cloudflare-waap-named-leader-gartner-magic-quadrant-2022/</link>
            <pubDate>Tue, 06 Sep 2022 16:15:44 GMT</pubDate>
            <description><![CDATA[ Gartner has recognised Cloudflare as a Leader in the 2022 "Gartner® Magic Quadrant™ for Web Application and API Protection (WAAP)" report that evaluated 11 vendors for their ‘ability to execute’ and ‘completeness of vision’ ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4faqwOuCjNSeiaq3MqY8rw/b4c0fdf3b2682a7c99a586ebc9272176/BDES-3702-Gartner-MQ-Social_Blue_V2_1200x628_NOCTA--1-.png" />
            
            </figure><p>Gartner has recognised Cloudflare as a Leader in the 2022 "Gartner® Magic Quadrant™ for Web Application and API Protection (WAAP)" report that evaluated 11 vendors for their ‘ability to execute’ and ‘completeness of vision’. You can register for a complimentary copy of the most recent Gartner WAAP report <a href="https://www.cloudflare.com/lp/gartner-cloud-web-application-api-protection-market-guide/">here</a>.</p><p>We believe this achievement highlights our continued commitment and investment in this space as we aim to provide better and more effective security solutions to our users and customers.</p>
    <div>
      <h2>Keeping up with application security</h2>
      <a href="#keeping-up-with-application-security">
        
      </a>
    </div>
    <p>With over 36 million HTTP requests per second being processed by the Cloudflare global network we get unprecedented visibility into network patterns and attack vectors. This scale allows us to effectively differentiate clean traffic from malicious, resulting in about <a href="/application-security/">1 in every 10 HTTP requests proxied by Cloudflare being mitigated at the edge</a> by our WAAP portfolio.</p><p>Visibility is not enough, and as new use cases and patterns emerge, we invest in research and new product development. For example, <a href="/landscape-of-api-traffic/">API traffic is increasing</a> (55%+ of total traffic) and we don’t expect this trend to slow down. To help customers with these new workloads, our <a href="/api-gateway/">API Gateway</a> builds upon our <a href="https://www.cloudflare.com/waf/">WAF</a> to provide better visibility and mitigations for well-structured API traffic for which we’ve observed different attack profiles compared to standard web based applications.</p><p>We believe our continued investment in application security has helped us gain our position in this space, and we’d like to thank Gartner for the recognition.</p>
    <div>
      <h2>Cloudflare WAAP</h2>
      <a href="#cloudflare-waap">
        
      </a>
    </div>
    <p>At Cloudflare, we have built several features that fall under the Web Application and API Protection (WAAP) umbrella.</p>
    <div>
      <h3>DDoS protection &amp; mitigation</h3>
      <a href="#ddos-protection-mitigation">
        
      </a>
    </div>
    <p>Our <a href="https://www.cloudflare.com/network/">network</a>, which spans more than 275 cities in over 100 countries is the backbone of our platform, and is a core component that allows us to mitigate <a href="/ddos-attack-trends-for-2022-q2/">DDoS attacks of any size</a>.</p><p>To help with this, our network is intentionally anycasted and advertises the same IP addresses from all locations, allowing us to “split” incoming traffic into manageable chunks that each location can handle with ease, and this is especially important when mitigating large volumetric Distributed Denial of Service (DDoS) attacks.</p><p>The system is designed to require little to no configuration while also being “always-on” ensuring attacks are mitigated instantly. Add to that some very smart software such as our new <a href="/location-aware-ddos-protection/">location aware mitigation</a>, and DDoS attacks become a solved problem.</p><p>For customers with very specific traffic patterns, <a href="/http-ddos-managed-rules/">full configurability of our DDoS Managed Rules</a> is just a click away.</p>
    <div>
      <h3>Web Application Firewall</h3>
      <a href="#web-application-firewall">
        
      </a>
    </div>
    <p>Our <a href="https://www.cloudflare.com/waf/">WAF</a> is a core component of our application security and ensures hackers and vulnerability scanners have a hard time trying to find potential vulnerabilities in web applications.</p><p>This is very important when zero-day vulnerabilities become publicly available as we’ve seen bad actors attempt to leverage new vectors within hours of them becoming public. <a href="/tag/log4j/">Log4J</a>, and even more recently the <a href="/cloudflare-customers-are-protected-from-the-atlassian-confluence-cve-2022-26134/">Confluence CVE</a>, are just two examples where we observed this behavior. That’s why our WAF is also backed by a team of security experts who <a href="https://developers.cloudflare.com/waf/change-log/scheduled-changes">constantly monitor and develop/improve signatures</a> to ensure we “buy” precious time for our customers to harden and patch their backend systems when necessary. Additionally, and complementary to signatures, our <a href="/waf-ml/">WAF machine learning system</a> classifies each request providing a much wider view in traffic patterns.</p><p>Our WAF comes packed with many advanced features such as <a href="https://developers.cloudflare.com/waf/exposed-credentials-check/">leaked credential checks</a>, <a href="https://developers.cloudflare.com/waf/analytics/">advanced analytics</a> and <a href="/get-notified-when-your-site-is-under-attack/">alerting</a> and <a href="https://developers.cloudflare.com/waf/managed-rulesets/payload-logging/">payload logging</a>.</p>
    <div>
      <h3>Bot Management</h3>
      <a href="#bot-management">
        
      </a>
    </div>
    <p>It is no secret that <a href="https://radar.cloudflare.com/">a large portion of web traffic is automated</a>, and while not all automation is bad, some is unnecessary and may also be malicious.</p><p>Our <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a> product works in parallel to our WAF and scores every request with the likelihood of it being generated by a bot, allowing you to easily filter unwanted traffic by deploying a WAF Custom Rule, all this backed by powerful analytics. We make this easy by also maintaining a list of <a href="https://radar.cloudflare.com/verified-bots">verified bots</a> that can be used to further improve a security policy.</p><p>In the event you want to block automated traffic, <a href="/end-cloudflare-captcha/">Cloudflare's managed challenge</a> ensures that only bots receive a hard time without impacting the experience of real users.</p>
    <div>
      <h3>API Gateway</h3>
      <a href="#api-gateway">
        
      </a>
    </div>
    <p>API traffic, by definition, is very well-structured relative to standard web pages consumed by browsers. At the same time, <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">APIs</a> tend to be closer abstractions to back end databases and services, resulting in increased attention from malicious actors and often go unnoticed even to internal security teams (<a href="https://www.cloudflare.com/learning/security/api/what-is-shadow-api/">shadow APIs</a>).</p><p><a href="/api-gateway/">API Gateway</a>, that can be layered on top of our WAF, helps you both <a href="https://developers.cloudflare.com/api-shield/security/api-discovery/">discover API endpoints</a> served by your infrastructure, as well detect potential anomalies in traffic flows that may indicate compromise, both from a <a href="https://developers.cloudflare.com/api-shield/security/volumetric-abuse-detection/">volumetric</a> and <a href="https://developers.cloudflare.com/api-shield/security/sequential-abuse-detection/">sequential</a> perspective.</p><p>The nature of APIs also allows API Gateway to much more easily provide a positive security model contrary to our WAF: only allow known good traffic and block everything else. Customers can leverage <a href="https://developers.cloudflare.com/api-shield/security/schema-validation/">schema protection</a> and <a href="https://developers.cloudflare.com/api-shield/security/mtls/">mutual TLS authentication (mTLS)</a> to achieve this with ease.</p>
    <div>
      <h3>Page Shield</h3>
      <a href="#page-shield">
        
      </a>
    </div>
    <p>Attacks that leverage the browser environment directly can go unnoticed for some time, as they don’t necessarily require the back end application to be compromised. For example, if any third party JavaScript library used by a web application is performing malicious behavior, application administrators and users may be none the wiser while credit card details are being leaked to a third party endpoint controlled by an attacker. This is a common vector for Magecart, one of many client side security attacks.</p><p><a href="https://www.cloudflare.com/page-shield/">Page Shield</a> is solving client side security by providing active monitoring of third party libraries and <a href="https://developers.cloudflare.com/page-shield/reference/alerts/">alerting application owners whenever a third party asset shows malicious activity</a>. It leverages both public standards such as content security policies (CSP) along with <a href="/detecting-magecart-style-attacks-for-pageshield/">custom classifiers</a> to ensure coverage.</p><p>Page Shield, just like our other WAAP products, is fully integrated on the Cloudflare platform and requires one single click to turn on.</p>
    <div>
      <h3>Security Center</h3>
      <a href="#security-center">
        
      </a>
    </div>
    <p>Cloudflare's new <a href="https://www.cloudflare.com/securitycenter/">Security Center</a> is the home of the WAAP portfolio. A single place for security professionals to get a broad view across both <a href="https://developers.cloudflare.com/security-center/tasks/review-insights/">network</a> and <a href="https://developers.cloudflare.com/security-center/tasks/review-infrastructure/">infrastructure</a> assets protected by Cloudflare.</p><p>Moving forward we plan for the Security Center to be the starting point for forensics and analysis, allowing you to also leverage Cloudflare threat intelligence <a href="/security-center-investigate/">when investigating incidents</a>.</p>
    <div>
      <h2>The Cloudflare advantage</h2>
      <a href="#the-cloudflare-advantage">
        
      </a>
    </div>
    <p>Our WAAP portfolio is delivered from a single horizontal platform, allowing you to leverage all security features without additional deployments. Additionally, scaling, maintenance and updates are fully managed by Cloudflare allowing you to focus on delivering business value on your application.</p><p>This applies even beyond WAAP, as, although we started building products and services for web applications, our position in the network allows us to protect anything connected to the Internet, including teams, offices and internal facing applications. All from the same single platform. Our <a href="https://www.cloudflare.com/products/zero-trust/">Zero Trust portfolio</a> is now an integral part of our business and WAAP customers can start leveraging our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">secure access service edge (SASE)</a> with just a few clicks.</p><p>If you are looking to consolidate your security posture, both from a management and budget perspective, application services teams can use the same platform that internal IT services teams use, to protect staff and internal networks.</p>
    <div>
      <h2>Continuous innovation</h2>
      <a href="#continuous-innovation">
        
      </a>
    </div>
    <p>We did not build our WAAP portfolio overnight, and over just the past year we’ve released more than five major WAAP portfolio security product releases. To showcase our speed of innovation, here is a selection of our top picks:</p><ul><li><p><a href="/protecting-apis-from-abuse-and-data-exfiltration/">API Shield Schema Protection</a>: traditional signature based WAF approaches (negative security model) don’t always work well with well-structured data such as API traffic. Given the fast growth in API traffic across the network we built a new incremental product that allows you to enforce API schemas directly at the edge using a positive security model: only let well-formed data through to your origin web servers;</p></li><li><p><a href="/api-abuse-detection/">API Abuse Detection</a>: complementary to API Schema Protection, API Abuse Detection warns you whenever anomalies are detected on your API endpoints. These can be triggered by unusual traffic flows or patterns that don’t follow normal traffic activity;</p></li><li><p><a href="/new-cloudflare-waf/">Our new Web Application Firewall</a>: built on top of our new Edge Rules Engine, the core Web Application Firewall received a complete overhaul, all the way from engine internals to the UI. Better performance both in terms of latency and efficacy at blocking malicious payloads, along with brand-new capabilities including but not limited to Exposed Credential Checks, account wide configurations and payload logging;</p></li><li><p><a href="/http-ddos-managed-rules/">DDoS customizable Managed Rules</a>: to provide additional configuration flexibility, we started exposing some of our internal DDoS mitigation managed rules for custom configurations to further reduce false positives and allow customers to increase thresholds / detections as required;</p></li><li><p><a href="/security-center/">Security Center</a>: Cloudflare view on infrastructure and network assets, along with alerts and notifications for miss configurations and potential security issues;</p></li><li><p><a href="/page-shield-generally-available/">Page Shield</a>: based on growing customer demand and the rise of attack vectors focusing on the end user browser environment, Page Shield helps you detect whenever malicious JavaScript may have made its way into your application’s code;</p></li><li><p><a href="/api-gateway/">API Gateway</a>: full <a href="https://www.cloudflare.com/application-services/products/api-gateway/">API management</a>, including routing directly from the Cloudflare edge, with API Security baked in, including encryption and mutual TLS authentication (mTLS);</p></li><li><p><a href="/waf-ml/">Machine Learning WAF</a>: complementary to our WAF Managed Rulesets, our new ML WAF engine, scores every single request from 1 (clean) to 99 (malicious) giving you additional visibility in both valid and non-valid malicious payloads increasing our ability to detect targeted attacks and scans towards your application;</p></li></ul>
    <div>
      <h2>Looking forward</h2>
      <a href="#looking-forward">
        
      </a>
    </div>
    <p>Our roadmap is packed with both new application security features and improvements to existing systems. As we learn more about the Internet we find ourselves better equipped to keep your applications safe. Stay tuned for more.</p><p><i>Gartner, “Magic Quadrant for Web Application and API Protection”, Analyst(s): Jeremy D'Hoinne, Rajpreet Kaur, John Watts, Adam Hils, August 30, 2022.</i></p><p><i>Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.</i></p><p><i>Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</i></p> ]]></content:encoded>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Bot Management]]></category>
            <category><![CDATA[Page Shield]]></category>
            <category><![CDATA[Gartner]]></category>
            <guid isPermaLink="false">2tRJFHozu8n8pAwXBJ1tSY</guid>
            <dc:creator>Michael Tremante</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s WAF is recognized as customers’ choice for 2021]]></title>
            <link>https://blog.cloudflare.com/cloudflare-waf-is-recognized-as-customers-choice-for-2021/</link>
            <pubDate>Tue, 30 Mar 2021 15:30:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare has been recognised as Gartner Peer Insights Customers’ Choice for WAF vendor in 2021 by Gartner. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17H1H17nkD4fQmC02L1aM9/32ff81ce23ec550b192f826ba9dcf63f/pasted-image-0-3.png" />
            
            </figure><p>The team at Cloudflare building our <a href="https://www.cloudflare.com/waf/">Web Application Firewall (WAF)</a> has continued to innovate over the past year. Today, we received public recognition of our work.</p><p>The ease of use, scale, and innovative controls provided by the Cloudflare WAF has translated into positive customer reviews, earning us the Gartner Peer Insights Customers' Choice Distinction for WAF for 2021. You can download a complimentary copy of the report <a href="https://www.cloudflare.com/gartner-customerschoice-waf-2021/">here</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dF2jprOwD0ojNaDr8dhAg/ba4c5ee905f0584020f7c9a5f31654b0/Cloudflare-has-been-recognised-as-Gartner-Peer-Insights-Customers--Choice-for-WAF-vendor-in-2021-by-Gartner.png" />
            
            </figure><p>Gartner Peer Insights Customers’ Choice distinctions recognize vendors and products that are highly rated by their customers. The data collected represents a top-level synthesis of vendor software products most valued by IT Enterprise professionals.</p><p>The positive feedback we have received is consistent and leads back to Cloudflare’s product principles. <a href="https://www.gartner.com/reviews/market/web-application-firewalls/vendor/cloudflare/product/cloudflare-waf/reviews">Customers find that</a> Cloudflare’s WAF is:</p><ul><li><p><b>“An excellent hosted WAF, and a company that acts more like a partner than a vendor”</b> — <i>Principal Site Reliability Architect in the Services Industry</i> <i>[</i><a href="https://www.gartner.com/reviews/market/web-application-firewalls/vendor/cloudflare/product/cloudflare-waf/review/view/3501511"><i>Full Review</i></a><i>];</i></p></li><li><p><b>“A straightforward yet highly effective WAF solution”</b> <i>— VP in the Finance Industry</i> <i>[</i><a href="https://www.gartner.com/reviews/market/web-application-firewalls/vendor/cloudflare/product/cloudflare-waf/review/view/1366292"><i>Full Review</i></a><i>];</i></p></li><li><p><b>“Easy and Powerful with Outstanding Support” </b><i><b>— VP Technology in the Retail Industry</b></i><b> </b><i><b>[</b></i><a href="https://www.gartner.com/reviews/market/web-application-firewalls/vendor/cloudflare/product/cloudflare-waf/review/view/3501341"><i><b>Full Review</b></i></a><i><b>];</b></i></p></li><li><p><b>“Secure, Intuitive and a Delight for web security and accelerations” </b><i><b>— Sr Director-Technical Product Mgmt in the Manufacturing Industry</b></i><b> </b><i><b>[</b></i><a href="https://www.gartner.com/reviews/market/web-application-firewalls/vendor/cloudflare/product/cloudflare-waf/review/view/3501369"><i><b>Full Review</b></i></a><i><b>];</b></i></p></li></ul><p>2020 was a <a href="/cloudflare-named-the-innovation-leader-in-holistic-web-protection/">prolific year</a> for Cloudflare’s security products releases. To name a few:</p><ul><li><p><a href="/introducing-ip-lists/">IP lists</a> provide greater configuration flexibility via reusable first class data structures for managing network lists;</p></li><li><p><a href="/encrypt-waf-payloads-hpke/">Payload Encryption</a> allows customers to log the full payload of requests blocked by the WAF for forensics purposes while keeping user privacy in mind;</p></li><li><p>Customers can <a href="/stream-firewall-events-directly-to-your-siem/">stream security events</a> in near real time directly in their SIEMs;</p></li><li><p><a href="/introducing-the-cloudflare-data-localization-suite/">The Data Localization Suite</a> lets businesses set rules and controls at the edge about where their data is stored and protected;</p></li><li><p>Firewall Rules can be written with full regex capabilities against both <a href="https://developers.cloudflare.com/firewall/cf-firewall-language/fields#http-header-fields">HTTP headers</a> and <a href="https://developers.cloudflare.com/firewall/cf-firewall-language/fields#http-body-fields">HTTP bodies</a>;</p></li><li><p><a href="/introducing-api-shield/">API Shield</a> lets you easily deploy mutual TLS authentication on API endpoints;</p></li><li><p>Securing gRPC traffic is now possible with <a href="/announcing-grpc/">gRPC proxy support</a>;</p></li></ul><p>We are pleased to be recognized as Gartner Peer Insights Customers’ Choice for WAF 2021. On behalf of the entire team, we would like to thank all of our customers for the continued support.</p><p>For more information on the Cloudflare WAF <a href="http://www.cloudflare.com/enterprise">reach out to us here</a>, for hands-on evaluation of Cloudflare, sign up <a href="https://dash.cloudflare.com/sign-up">here</a>.</p><p><sub>Gartner Peer Insights ‘Voice of the Customer’: Web Application Firewall, March 25, 2021.The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.. Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.</sub></p><p><sub>Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates.</sub></p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Gartner]]></category>
            <guid isPermaLink="false">6OaYwK37bcctH5Zxy5tswL</guid>
            <dc:creator>Michael Tremante</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS attacks have evolved, and so should your DDoS protection]]></title>
            <link>https://blog.cloudflare.com/ddos-attacks-have-evolved-and-so-should-your-ddos-protection/</link>
            <pubDate>Thu, 30 Apr 2020 15:26:13 GMT</pubDate>
            <description><![CDATA[ Building a modern DDoS solution that is truly effective in thwarting ever-evolving DDoS attacks, to protect all of our customers has been a core tenet for us - enabling us to be an industry leader. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The proliferation of DDoS attacks of varying size, duration, and persistence has made DDoS protection a foundational part of every business and organization’s online presence. However, there are key considerations including network capacity, management capabilities, global distribution, alerting, reporting and support that security and risk management technical professionals need to evaluate when selecting a DDoS protection solution.</p>
    <div>
      <h3>Gartner’s view of the DDoS solutions; How did Cloudflare fare?</h3>
      <a href="#gartners-view-of-the-ddos-solutions-how-did-cloudflare-fare">
        
      </a>
    </div>
    <p>Gartner recently published the report Solution Comparison for DDoS Cloud Scrubbing Centers (ID G00467346), authored by Thomas Lintemuth, Patrick Hevesi and Sushil Aryal. This report enables customers to view a side-by-side solution comparison of different DDoS cloud scrubbing centers measured against common assessment criteria.  If you have a Gartner subscription, you can view the report <a href="https://www.gartner.com/document/3983636">here</a>. Cloudflare has received the greatest number of ‘High’ ratings as compared to the 6 other DDoS vendors across 23 assessment criteria in the report.</p>
    <div>
      <h3>The vast landscape of DDoS attacks</h3>
      <a href="#the-vast-landscape-of-ddos-attacks">
        
      </a>
    </div>
    <p>From our perspective, the nature of DDoS attacks has transformed, as the economics and ease of launching a DDoS attack has changed dramatically. With a rise in cost-effective capabilities of launching a DDoS attack, we have observed a rise in the number of under 10 Gbps DDoS network-level attacks, as shown in the figure below. Even though 10 Gbps from an attack size perspective does not seem that large, it is large enough to significantly affect a majority of the websites existing today.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ra5D7MmxLrRGPozCBPLvR/c2fb0687a97c9757da0e49d97f9d6d8e/image3-17.png" />
            
            </figure><p>At the same time, larger-sized DDoS attacks are still prevalent and have the capability of crippling the availability of an organization’s infrastructure. In March 2020, Cloudflare observed numerous 300+ Gbps attacks with the largest attack being 550 Gbps in size.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6OB9Z5DNZ7BWXFCVuzT367/2686a778cbe056a2f36b145f5f0c14b7/image2-22.png" />
            
            </figure><p>In the report Gartner also observes a similar trend, <i>“In speaking with the vendors for this research, Gartner discovered a consistent theme: Clients are experiencing more frequent smaller attacks versus larger volumetric attacks.</i>” In addition, they also observe that <i>“For enterprises with Internet connections up to and exceeding 10 Gbps, frequent but short attacks up to 10 Gbps are still quite disruptive without DDoS protection. Not to say that large attacks have gone away. We haven’t seen a 1-plus Tbps attack since spring 2018, but attacks over 500 Gbps are still common.”</i></p><p>Gartner recommends in the report to <i>“Choose a provider that offers scrubbing capacity of three times the largest documented volumetric attack on your continent.”</i></p><p>From an application-level DDoS attack perspective an interesting DDoS attack observed and mitigated by Cloudflare last year, is shown below. This HTTP DDoS attack had a peak of 1.4M requests per second, which isn’t highly rate-intensive. However, the fact that the 1.1M IPs from which the attack originated were unique and not spoofed made the attack quite interesting. The unique IP addresses were actual clients who were able to complete a TCP and HTTPS handshake.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2GpF3Jz6n0qYY1XxOwfNLv/bdc22fae5c1c5efb4ed6242ff967c6ad/image4-14.png" />
            
            </figure>
    <div>
      <h3>Harness the full power of Cloudflare’s DDoS protection</h3>
      <a href="#harness-the-full-power-of-cloudflares-ddos-protection">
        
      </a>
    </div>
    <p>Cloudflare’s cloud-delivered DDoS solution provides key features that enable security professionals to protect their organizations and customers against even the most sophisticated DDoS attacks. Some of the key features and benefits include:</p><ul><li><p><b>Massive network capacity</b>: With over 35 Tbps of network capacity, Cloudflare ensures that you are protected against even the most sophisticated and largest DDoS attacks. Cloudflare’s network capacity is almost equal to the total scrubbing capacity of the other 6 leading DDoS vendors combined.</p></li><li><p><b>Globally distributed architecture</b>: Having a few scrubbing centers globally to mitigate DDoS attacks is an outdated approach. As DDoS attacks scale and individual attacks originate from millions of unique IPs worldwide, it’s important to have a DDoS solution that mitigates the attack at the source rather than hauling traffic to a dedicated scrubbing center. With every one of our data centers across 200 cities enabled with full DDoS mitigation capabilities, Cloudflare has more points of presence than the 6 leading DDoS vendors combined.</p></li><li><p><b>Fast time to mitigation</b>: Automated edge-analyzed and edge-enforced DDoS mitigation capabilities allows us to mitigate attacks at unprecedented speeds. Typical time to mitigate a DDoS attack is less than 10s.</p></li><li><p><b>Integrated security:</b> A key design tenet while building products at Cloudflare is integration. Our DDoS solution integrates seamlessly with other product offerings including WAF, Bot Management, CDN and many more. A comprehensive and integrated security solution to bolster the security posture while aiding performance. No tradeoffs between security and performance!</p></li><li><p><b>Unmetered and unlimited mitigation:</b> Cloudflare offers unlimited and unmetered DDoS mitigation. This eliminates the legacy concept of ‘Surge Pricing,’ which is especially painful when a business is under duress and experiencing a DDoS attack. This enables you to avoid unpredictable costs from traffic.</p></li></ul><p>Whether you’re part of a large global enterprise, or use Cloudflare for your personal site, we want to make sure that you’re protected and also have the visibility that you need. DDoS Protection is included as part of every Cloudflare service. Enterprise-level plans include advanced mitigation, detailed reporting, enriched logs, productivity enhancements and fine-grained controls. Enterprise Plan customers also receive access to dedicated customer success and solution engineering.</p><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/contact/">contact us</a> or <a href="https://dash.cloudflare.com/sign-up">get started</a>.</p><p>*Gartner “Solution Comparison for DDoS Cloud Scrubbing Centers,” Thomas Lintemuth,  Patrick Hevesi, Sushil Aryal, 16 April 2020</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Gartner]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <guid isPermaLink="false">2PeoRADj0aE5C25sWpAM9f</guid>
            <dc:creator>Arun Singh</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
    </channel>
</rss>