Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Cloudflare Launches New Zero Trust Networking, Security Platform

Cloudflare on Monday announced the launch of a new zero trust platform that can help organizations address the networing and security challenges associated with an increasingly remote workforce.

Cloudflare on Monday announced the launch of a new zero trust platform that can help organizations address the networing and security challenges associated with an increasingly remote workforce.

Cloudflare One is a cloud-based network-as-a-service solution that is designed to protect networks, devices and applications, and improve performance.

The security and performance solutions provider says it has launched the new platform in response to organizations increasingly moving to the cloud and the changes related to remote workforces brought on by the COVID-19 pandemic.Cloudflare announces new platform

According to the company, the Cloudflare One platform provides a set of tools that allows users to safely and quickly connect to work applications, it enables remote workers to use the same app without the need to expose it to the public internet, and it makes personal devices more secure for business use.

Cloudflare One leverages Cloudflare Access for identification purposes and Cloudflare Gateway to inspect traffic on the network and block threats and data exfiltration. The platform also leverages a next-generation firewall, called Magic Firewall, for network layer filtering, and browser isolation tech to provide protection against attacks coming from the internet. All of these components will be rolled out and detailed this week.

The solution integrates with identity services from Okta, OneLogin, Ping Identity, Facebook, LinkedIn, GitHub, Microsoft and Google, and endpoint security solutions from CrowdStrike, SentinelOne, Tanium and Carbon Black.

“Cloudflare One puts the entire corporate network behind a single pane of glass. By integrating with leading identity providers and endpoint security solutions, Cloudflare One enables companies to enforce a consistent set of policies across all their applications,” said Matthew Prince, co-founder and CEO of Cloudflare. “Since the network is the common denominator of all applications, by building control into the network Cloudflare One ensures consistent policies whether an application is new or legacy, run on-premise or in the cloud, and delivered from your own infrastructure or a multi-tenant SaaS provider.”

Cloudflare has hired Forrester Consulting to conduct a study on the impact of COVID-19 on cybersecurity teams. The study found that more than three-quarters of businesses believe their cybersecurity approach is “antiquated” and nearly two-thirds believe legacy network security tools are not effective in protecting corporate data.

As for the shift to remote work, 58% of those surveyed said they experienced a data breach and nearly as many reported seeing an increase in phishing attacks.

Advertisement. Scroll to continue reading.

Related: Cloudflare Announces Free Security Services for Political Campaigns

Related: Cloudflare Raises $150 Million

Related: Cloudflare Open-Sources Network Vulnerability Scanner

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.