
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 14 Apr 2026 15:33:16 GMT</lastBuildDate>
        <item>
            <title><![CDATA[From legacy architecture to Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/legacy-to-agile-sase/</link>
            <pubDate>Fri, 13 Mar 2026 13:00:00 GMT</pubDate>
            <description><![CDATA[ Learn how Cloudflare and CDW de-risk SASE migrations with a blueprint that treats legacy debt as an application modernization project. ]]></description>
            <content:encoded><![CDATA[ <p>For a network engineer, the cutover weekend is often the most stressful 48 hours of their career. Imagine a 30,000-user organization attempting to flip 1,000+ legacy applications from fragmented VPNs to a new architecture in a single window. The stakes are immense: a single misconfigured firewall rule or a timed-out session can halt essential services and lead to operational gridlock.</p><p>This "big bang" migration risk is the single greatest barrier to <a href="https://www.cloudflare.com/sase/"><u>Zero Trust adoption</u></a>. Organizations often feel trapped between an aging, vulnerable infrastructure and a migration process that feels too risky to attempt.</p><p>Cloudflare and Technology Solutions Provider <a href="https://www.cdw.com/"><u>CDW</u></a> are changing this narrative. We believe that a successful transition to SASE (Secure Access Service Edge) shouldn't feel like a leap into the dark. By combining Cloudflare’s global Zero Trust platform with CDW’s experience navigating the industry’s most complex deployment failures, we provide the strategic roadmap to de-risk the journey. We don't just move your "plumbing" — we ensure your legacy debt is transformed into a modern, agile security posture without the downtime.</p>
    <div>
      <h3>Leveraging partner expertise to avoid migration traps</h3>
      <a href="#leveraging-partner-expertise-to-avoid-migration-traps">
        
      </a>
    </div>
    <p>Traditional migrations often fail because they treat the network as simple plumbing rather than a complex ecosystem of applications. Without a granular strategy, many organizations fall into the "lift and shift" trap — attempting to move hundreds of applications simultaneously without understanding their back-end dependencies.</p><p>To avoid this, CDW uses a risk-aware, tiered methodology. This approach categorizes every application in your environment by its technical complexity. We move simple, modern apps first to build momentum while saving complex, legacy systems for a more controlled, later stage.</p><p>A recent large-scale public sector project serves as a cautionary example of what can happen without this structure. In this case, a team attempted to migrate 500 applications at once. Because they lacked a tiered methodology to prioritize their 4,000+ applications, the move led to systemic service disruptions.</p><p>CDW’s role is to act as the architect that prevents these failures. CDW strategists, many of whom are former security practitioners, analyze these industry-wide failure points to identify recurring anti-patterns that derail <a href="https://www.cloudflare.com/the-net/roadmap-zerotrust/"><u>Zero Trust journeys</u></a> and build a more resilient migration blueprint. By treating migration as an <a href="https://www.cloudflare.com/learning/cloud/application-modernization/"><u>application modernization</u></a> project rather than a single connectivity swap, CDW ensures that security requirements are built into the foundation of the move rather than bolted on as an afterthought.</p>
    <div>
      <h3>Modernizing legacy apps with Cloudflare Access</h3>
      <a href="#modernizing-legacy-apps-with-cloudflare-access">
        
      </a>
    </div>
    <p>To move away from the all-or-nothing risks of the past, we start with the foundation of the solution: <a href="https://www.cloudflare.com/sase/products/access/"><u>Cloudflare Access</u></a>. Before we look at how to migrate complex legacy applications, it’s important to understand the value of the platform itself. Cloudflare Access replaces the broad, vulnerable perimeter of a traditional VPN with a Zero Trust model. Instead of granting a user access to an entire network segment, Access evaluates every single request based on identity, device posture, and other <a href="https://blog.cloudflare.com/adaptive-access-user-risk-scoring/"><u>contextual signals</u></a>. This significantly reduces the attack surface and prevents the lateral movement that leads to the kind of systemic outages we discussed earlier.</p><p>Once this security layer is in place, we can begin "wrapping" legacy applications in Cloudflare Access. This allows us to modernize the security posture of an old app without actually rewriting its code.</p><p>We do this wrapping in <a href="https://www.cloudflare.com/sase/products/access/"><u>Cloudflare Access</u></a> using a specific logic:</p><ul><li><p><b>Problem</b>: A legacy application with no built-in Multi-Factor Authentication (MFA) is exposed via a standard VPN, creating a high-risk entry point for attackers.</p></li><li><p><b>Mitigation</b>: Using Cloudflare Tunnel, we create an outbound-only connection with both Single Sign-On (SSO) and MFA built-in. This effectively hides the application from the public Internet, as it no longer has a public IP address to scan or attack.</p></li><li><p><b>Policy</b>: We then apply a Cloudflare Access policy at the edge. This requires an endpoint hardware-based MFA check and a device health scan before a single packet ever reaches your server.</p></li></ul><p>By using this wrapping technique, CDW and Cloudflare make it possible for organizations to migrate at their own pace. You get the immediate security benefits of a modern cloud environment, while your legacy apps continue to run safely in the background.</p>
    <div>
      <h3>Pre-migration audit</h3>
      <a href="#pre-migration-audit">
        
      </a>
    </div>
    <p>Before launching a pilot, IT leaders must audit the environment for architectural readiness, ensuring legacy systems are technically compatible with modern security protocols. “For large deployments, we focus on application modernization,” says Eric Marchewitz, a security solutions executive at CDW. “Many legacy applications could break if least privilege access was applied without proper preparation."</p>
    <div>
      <h4>1. Architectural &amp; identity assessment</h4>
      <a href="#1-architectural-identity-assessment">
        
      </a>
    </div>
    <ul><li><p><b>Determine identity providers</b>: Confirm which applications rely on a federated Identity Provider (such as Okta) versus those using legacy local directories.</p></li><li><p><b>Map dependencies</b>: Document backend database and API dependencies for each application to prevent service interruptions. This data identifies the hidden API calls that typically break during a cutover if service token-based Tunnel connectivity is not maintained on the backend.</p></li></ul>
    <div>
      <h4>2. Establish firebreak</h4>
      <a href="#2-establish-firebreak">
        
      </a>
    </div>
    <p>Separate the project into a Strategy Group (focused on security standards) and an Implementation Group (focused on efficiency). This ensures that high-level security requirements, like those needed to prevent lateral movement, are not bypassed for the sake of deployment speed.</p>
    <div>
      <h4>3. Persistent session stress test</h4>
      <a href="#3-persistent-session-stress-test">
        
      </a>
    </div>
    <p>Identify applications using legacy architectures to maintain session persistence and avoid connection drops during cellular tower switching. Cloudflare’s architecture, supported by Dynamic <a href="https://developers.cloudflare.com/cloudflare-one/team-and-resources/devices/warp/deployment/mdm-deployment/path-mtu-discovery/"><u>Path MTU Discovery</u></a> (PMTUD), maintains a persistent session at the edge even as the client IP changes. Identifying these users during the audit allows us to displace expensive, rigid legacy hardware with a modern, single-pass architecture.</p>
    <div>
      <h4>4. Categorization &amp; timeline setting</h4>
      <a href="#4-categorization-timeline-setting">
        
      </a>
    </div>
    <p>Once complete, the remaining stack is tiered to set realistic implementation timelines:</p><table><tr><td><p><b>Application Tier</b></p></td><td><p><b>Description</b></p></td><td><p><b>Estimated Migration Effort</b></p></td></tr><tr><td><p>Tier 0 (Modern SaaS Apps)</p></td><td><p>Native SAML/OIDC support so Cloudflare acts as a clientless identity provider proxy during authentication</p></td><td><p>1–3 hours per app</p></td></tr><tr><td><p>Tier 1 (Internal Web Apps)</p></td><td><p>Standard identity headers and modern web protocols support a clientless reverse proxy deployment with Cloudflare Tunnel </p></td><td><p>3–6 hours per app</p></td></tr><tr><td><p>Tier 2 (Non-Web Client-Server Apps)</p></td><td><p>Specific port/protocol support or thick-client configurations required so both Cloudflare One Client and Cloudflare Tunnel deployments are used</p></td><td><p>4–8 hours per app</p></td></tr><tr><td><p>Tier 3 (Legacy Enterprise Apps)</p></td><td><p>Complex server-side connectivity (e.g. peer-to-peer, bidirectional) or back-end dependency requirements so Cloudflare Mesh or WAN deployments may complement Cloudflare Tunnel to support.</p></td><td><p>1–3 days per app; may require code revisions</p></td></tr></table>
    <div>
      <h3>The roadmap to escape velocity</h3>
      <a href="#the-roadmap-to-escape-velocity">
        
      </a>
    </div>
    <p>To achieve "escape velocity" from legacy hardware, CDW follows a phased rollout that prioritizes coexistence over replacement.</p><ol><li><p><b>Phase 1: Strategy &amp; Infrastructure</b>: Formation of strategy and implementation teams. This phase includes identifying CDW strategists — former CISOs and architects — to act as peer sounding boards.</p></li><li><p><b>Phase 2: Pilot Rollout</b>: Deployment of the Cloudflare One Client to a pilot group of employees. During this phase, we address common friction points like the "latency tax,"  ensuring performance doesn't compromise security.</p></li><li><p><b>Phase 3: Production Scaling</b>: Full scaling across the organization. We maintain a dual-client period where users run both legacy VPN and Cloudflare Access in tandem, ensuring a safe rollback path and an easier end-user transition to the new Zero Trust approach.</p></li></ol>
    <div>
      <h3>Performance as a security feature</h3>
      <a href="#performance-as-a-security-feature">
        
      </a>
    </div>
    <p>Cloudflare’s single-pass architecture runs every security check simultaneously. </p><p>"When we talk to customers about the connectivity cloud, the most impactful change isn't just the modern security posture. It's the operational velocity,” notes Annika Garbers, Head of Cloudflare One GTM. “Moving to a single control plane allows a security team to stop being a bottleneck.”</p><p>By building on a <a href="https://blog.cloudflare.com/post-quantum-sase/"><u>post-quantum</u></a> encrypted foundation, we ensure this bridge is future-proofed against the next generation of threats.</p>
    <div>
      <h3>Build your bridge with Cloudflare One's agile SASE</h3>
      <a href="#build-your-bridge-with-cloudflare-ones-agile-sase">
        
      </a>
    </div>
    <p>Modernization is about building a bridge, not a "big bang." This methodology is refined through our Partner Technical Advisory Board, where partner feedback informs our product roadmap directly. By focusing on application modernization and a phased rollout, organizations can regain architectural control and eliminate the fragmentation penalty for good.</p><p>The combination of Cloudflare’s SASE platform and CDW’s migration expertise provides a safety net for the journey. You get the immediate security benefits of identity-based access and phish-resistant MFA, without the operational gridlock of a massive, unmapped cutover.</p><p>The goal isn't just to move your applications to the cloud. It’s to ensure that when you get there, your environment is more resilient, more visible, and significantly harder to breach.</p><p>Ready to de-risk your journey to a zero trust architecture? Use CDW’s Zero Trust Maturity Assessment to identify the hidden dependencies in your environment. Reach out to a Cloudflare One <a href="https://www.cloudflare.com/contact/sase/"><u>expert</u></a> to start your transition with a proven blueprint.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">12Trubi4t23iB1Q6AlcjYH</guid>
            <dc:creator>Warnessa Weaver</dc:creator>
        </item>
        <item>
            <title><![CDATA[Complexity is a choice. SASE migrations shouldn’t take years.]]></title>
            <link>https://blog.cloudflare.com/complexity-is-a-choice-sase-migrations-shouldnt-take-years/</link>
            <pubDate>Mon, 09 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Discover how Cloudflare partners TachTech and Adapture are shattering the 18-month migration myth, deploying agile SASE for global enterprises in weeks by treating security as software. ]]></description>
            <content:encoded><![CDATA[ <p>For years, the cybersecurity industry has accepted a grim reality: migrating to a zero trust architecture is a marathon of misery. CIOs have been conditioned to expect multi-year deployment timelines, characterized by turning screws, manual configurations, and the relentless care and feeding of legacy SASE vendors.</p><p>But at Cloudflare, we believe that kind of complexity is a choice, not a requirement. Today, we are highlighting how our <a href="https://www.cloudflare.com/partners/"><u>partners</u></a> are proving that what used to take years now takes weeks. By leveraging Cloudflare One, our agile SASE platform, partners like <a href="https://tachtech.net/"><u>TachTech</u></a> and <a href="https://adapture.com/"><u>Adapture</u></a> are showing that the path to safe AI and Zero Trust adoption is faster, more seamless, and more programmable than ever before.</p>
    <div>
      <h3>Slashing timelines from 18 months to 6 weeks</h3>
      <a href="#slashing-timelines-from-18-months-to-6-weeks">
        
      </a>
    </div>
    <p>The traditional migration path for legacy SASE products—specifically the deployment of Secure Web Gateway (SWG) and Zero Trust Network Access (ZTNA)—often stretches to 18 months for large organizations. For a CIO, that represents a year and a half of technical debt and persistent security gaps.</p><p>By contrast, partners like TachTech and Adapture are proving that this marathon of misery is not a technical necessity. By using a unified connectivity cloud, they have compressed these timelines from 18 months down to just six weeks.</p><p>Kyle Jerome Thompson, a solutions architect at TachTech with 30 years of experience, says Cloudflare One fundamentally changes this calculus. By replacing legacy tools with Cloudflare's robust telemetry and global network, TachTech has slashed deployment times for large organizations down to just four to six weeks.</p><p>"Cloudflare has taken the 'wizardry' out of zero trust,” says Thompson. “Unlike legacy solutions that require continual care and feeding, Cloudflare Access is lightweight and 'no-touch' after deployment. It commoditizes security in the same way you think about plumbing or electricity—it just works, it’s cost-effective, and it lets our customers get back to their real day jobs."</p>
    <div>
      <h3>Why legacy migrations stall</h3>
      <a href="#why-legacy-migrations-stall">
        
      </a>
    </div>
    <p>Legacy migrations typically fail when they are treated as a series of hardware replacements rather than a software transformation. Traditional vendors often require complex service chaining where traffic is passed from one inspection cluster to another. This creates a "trombone effect," adding latency and making troubleshooting nearly impossible.</p><p>When you decouple the security policy from the physical network, the migration speed changes. Our partners focus on three pillars to accelerate this transition:</p><ol><li><p><b>Identity-first on-ramps:</b> Instead of rebuilding network segments, they use existing identity provider (IdP) groups to define access.</p></li><li><p><b>Consolidated policy engines:</b> By using a single pass for both SWG and ZTNA, administrators avoid the need to "sync" different products.</p></li><li><p><b>Cloud-native connectors:</b> Using lightweight daemons like <code>cloudflared</code> allows for instant connectivity without opening inbound firewall ports.</p></li></ol>
    <div>
      <h3>Scaling at the speed of business</h3>
      <a href="#scaling-at-the-speed-of-business">
        
      </a>
    </div>
    <p>The story is similar at Adapture, where they have a simple mission: improve IT performance and mitigate risk for clients. For one client, what started as a small contractor-focused footprint quickly exploded from 600 seats to a 5,000-seat deployment of <a href="https://www.cloudflare.com/sase/products/access/"><u>Cloudflare Access</u></a>.</p><p>This rapid elasticity proved that Cloudflare’s easy-to-use SASE platform bypasses legacy deployment hurdles—a transition Adapture characterized as <b>“</b>seamless<b>.”</b> </p><p>“Organizations can’t afford an implementation that stretches across months,” says Greg O’Connor<b>, </b>VP of Strategic Alliances at Adapture. “Cloudflare is creating a new standard when it comes to SASE implementation, bringing our clients to the cutting edge of SASE.” </p>
    <div>
      <h3>The power of an extensible edge</h3>
      <a href="#the-power-of-an-extensible-edge">
        
      </a>
    </div>
    <p>In global infrastructure, unique environments and highly specialized workflows are the reality. A hallmark of the Cloudflare One architecture is that it is software-defined and extensible, allowing partners to unblock specific requirements without compromising the organization's overall security posture.</p><p>Cloudflare One is a truly composable and <a href="https://blog.cloudflare.com/programmable-sase/"><u>programmable platform</u></a>, allowing proactive partners to move away from static GUIs and build without bounds.

For example, when Thompson at TachTech encountered a developer team utilizing Arch Linux, they didn't have to sacrifice visibility or create a security exception. They were able to extend the Cloudflare One Client to support the specific requirements of that environment.</p><p>By extracting the binaries from the Ubuntu <code>.deb</code> package and creating a custom <code>PKGBUILD</code>, the team ensured the client could run as a native service on Arch. This ensured the organization maintained consistent device posture checks—verifying disk encryption and firewall status—even on non-standard developer workstations.</p>
    <div>
      <h3>Beyond connectivity: the fast path to safe AI</h3>
      <a href="#beyond-connectivity-the-fast-path-to-safe-ai">
        
      </a>
    </div>
    <p>As organizations move toward <a href="https://agents.cloudflare.com/"><u>agentic</u></a> workflows, O’Connor notes “both threats and security measures are moving faster than ever.” Across the industry, the role of the SWG is evolving. It is no longer just about blocking malicious URLs; it’s about controlling the flow of data into Large Language Models (LLMs). Cloudflare One serves as the fast path to safe AI adoption by integrating security directly into the user's path to the Internet.</p><p>Our goal is to set our partners up for success across a wide variety of customer challenges. Rather than managing disparate security tools, our partners deploy the <a href="https://www.cloudflare.com/ai-security/"><u>Cloudflare AI Security Suite</u></a> to provide a unified defense across the entire AI lifecycle. This native set of controls allows organizations to:</p><p><b>Secure your workforce as they use AI. </b>For employees leveraging public LLMs, Cloudflare One provides a "safe harbor" that balances innovation with strict data governance.</p><ul><li><p><a href="https://blog.cloudflare.com/shadow-AI-analytics/"><b><u>Shadow AI visibility</u></b></a>: Instantly discover and categorize which unapproved third-party AI tools are being used across your network via the Shadow AI dashboard.</p></li><li><p><a href="https://blog.cloudflare.com/confidence-score-rubric/"><b><u>AI confidence scores</u></b></a>: Move beyond "block-all" policies by grading models on their compliance posture (SOC 2, ISO 42001) and data handling reliability before sanctioning them.</p></li><li><p><a href="https://developers.cloudflare.com/cloudflare-one/data-loss-prevention/detection-entries/#ai-prompt-topics"><b><u>DLP AI prompt protection</u></b></a>: Secure your intellectual property by using AI-powered Cloudflare Data Loss Prevention (DLP) to block sensitive source code, PII, or financials from being submitted into public training sets.</p></li></ul><p><b>Secure your AI-powered apps. </b>For the AI-powered applications your team builds and hosts, we provide a dedicated <a href="https://www.cloudflare.com/application-services/products/firewall-for-ai/"><u>Firewall for AI</u></a> to protect the integrity of your models.</p><ul><li><p><b>LLM discovery</b>: Automatically discover and label every LLM endpoint exposed to the internet, providing immediate visibility into your AI attack surface.</p></li><li><p><b>Request validation</b>: Prevent "AI-jacking" by blocking prompt injections and malicious inputs designed to coerce your model into producing wrong or embarrassing outputs.</p></li><li><p><b>Response scrubbing</b>: Ensure your model doesn't accidentally "hallucinate" sensitive internal data back to a customer by scrubbing the response for PII or toxic topics before it crosses the wire.</p></li></ul><p><b>Secure agentic AI.</b> As we move toward autonomous agents, <a href="https://developers.cloudflare.com/agents/model-context-protocol/mcp-servers-for-cloudflare/"><u>MCP server portals</u></a> provide a central registry and least-privilege control over how AI interacts with corporate resources like Slack or Confluence. This prevents the autonomous horror stories of data heists and rogue actions by returning visibility and control to IT admins.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3SFlUL9a7c4K6X6UC6bQyR/bc0ec31b71c1c65c40050dcf41a39ed1/image1.png" />
          </figure><p><sup><i>The Cloudflare AI Security Suite acts as a secure intermediary between users and AI ecosystems, providing visibility, data protection, and governance for public, private, and agentic AI applications.</i></sup><sup> </sup></p>
    <div>
      <h3>Accelerate your migration</h3>
      <a href="#accelerate-your-migration">
        
      </a>
    </div>
    <p>If you are a CIO still tethered to a multi-year migration roadmap, you are operating at a competitive disadvantage. Cloudflare One integrates your network and security into a single fabric that is fast, safe, and infinitely more programmable than the legacy solution in your current stack.</p><p>Don't let the fear of a difficult migration keep you trapped in a legacy mindset. Our partners are proving every day that the move to SASE can be fast, effective, and—dare we say—easy.</p><p>Connect with a Cloudflare One <a href="https://www.cloudflare.com/contact/sase/"><u>expert</u></a> to start mapping your migration.</p> ]]></content:encoded>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">2trwfE3PdI9gDi9VrtnlMc</guid>
            <dc:creator>Warnessa Weaver</dc:creator>
        </item>
        <item>
            <title><![CDATA[Modernizing with agile SASE: a Cloudflare One blog takeover]]></title>
            <link>https://blog.cloudflare.com/modernize-agile-sase/</link>
            <pubDate>Mon, 02 Mar 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ In 2026, agile SASE is the engine for modernization. Discover how Cloudflare One secures humans, devices, and AI agents on a single, programmable connectivity cloud. ]]></description>
            <content:encoded><![CDATA[ <p>Return to office has stalled for many, and the “new normal” for what the corporate network means is constantly changing.  In 2026, your office may be a coffee shop, your workforce includes autonomous AI agents, and your perimeter is wherever the Internet reaches. This shift has forced a fundamental change in how we think about security, moving us toward a critical new architecture: agile SASE.</p><p>For too long, organizations have struggled under a 'fragmentation penalty,' juggling a patchwork of legacy hardware and Virtual Private Network (VPN) concentrators. These tools don't just require massive upfront investment; they create a mountain of technical debt — the cumulative cost of maintaining thousands of conflicting firewall rules, manual patches, and aging hardware that can’t support AI-scale traffic.</p><p>First-generation SASE providers promised a cure, but often just moved the mess to the cloud. By treating every data center as an isolated island, they’ve replaced hardware silos with operational silos. The result isn't a lack of visibility, but a lack of actionability: plenty of data, but no single way to enforce a consistent policy across a borderless enterprise.</p><p>Our customers have told us they need  an agile and composable platform. This week, we are announcing innovations to prove that modernizing your network is about “achieving escape velocity”: breaking the inertia of legacy systems to propel high-speed business growth.</p>
    <div>
      <h2>What is agile SASE?</h2>
      <a href="#what-is-agile-sase">
        
      </a>
    </div>
    <p>While zero trust is the set of security principles organizations are evolving to meet, <a href="https://www.cloudflare.com/sase/"><u>Cloudflare One </u></a>is the agile and composable SASE platform that makes them possible. Rather than a rigid collection of bolted-on tools, it converges networking and security into a single, global connectivity cloud.</p><p>Built natively on a global network spanning over 300 cities, Cloudflare One allows every security check to run on every server simultaneously. This eliminates 'service-chaining' — the slow, sequential processing of data through fragmented tools that acts as a bottleneck for other SASE tools that have been “platformized” via acquisition. By using a single-pass architecture, we ensure that security becomes a weightless propellant for your business, not a decelerator.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/axChM5iMyU86cMX8l6wSI/71a8560c6843f443ba4de7f8867387cb/image2.png" />
          </figure>
    <div>
      <h2>What to expect this week</h2>
      <a href="#what-to-expect-this-week">
        
      </a>
    </div>
    <p>Every day this week, we will release technical deep-dives with five core themes:</p><ul><li><p><b>Monday: The new standard</b>: We start by securing the next decade of the Internet, ensuring your network foundation is future-proof and programmable by default.</p></li><li><p><b>Tuesday: Beyond the password</b>: We tackle the evolution of identity, moving trust from simple credentials to comprehensive human and device verification.</p></li><li><p><b>Wednesday: Signal over noise</b>: See how we use AI to fight AI, turning a flood of security data into clear, human-readable actions.</p></li><li><p><b>Thursday: The autonomous edge</b>: Performance is a security feature. We will dive into how we have engineered away the traditional friction of the corporate network.</p></li><li><p><b>Friday: The unified vision</b>: We close the week by showing how the most sophisticated enterprises and partners in the world are standardizing on Cloudflare One to modernize at scale.</p></li></ul>
    <div>
      <h2>Empowering tech-enabled teams </h2>
      <a href="#empowering-tech-enabled-teams">
        
      </a>
    </div>
    <p>What sets Cloudflare One apart from "black-box" legacy vendors is a commitment to a composable and programmable platform. We are the only SASE provider that runs side-by-side with a native developer platform — <a href="https://workers.cloudflare.com/"><u>Cloudflare Workers</u></a>. This allows your team to write code that intercepts security events in real-time, moving beyond simple "allow/block" rules to sophisticated, automated operations.</p><p>Our customers aren't just modernizing infrastructure; they're redefining business defense. By consolidating onto Cloudflare One, they're clearing the path for faster, safer growth.</p>
    <div>
      <h2>Where to begin your SASE journey</h2>
      <a href="#where-to-begin-your-sase-journey">
        
      </a>
    </div>
    <p>We know large enterprises prioritize agility over "big bang" transformations. Most of our customers build momentum by starting with these immediate needs: </p><ol><li><p><b>Remote access modernization</b>: Replace maintenance-heavy VPNs with a faster, secure experience. Start with clientless access to accelerate zero trust adoption.</p></li><li><p><b>Email phishing protection</b>: Use an AI-powered platform to stop Business Email Compromise (BEC) and multi-channel threats before they reach the inbox.</p></li><li><p><b>DNS filtering for web protection</b>: Protect hybrid workforces from malicious sites and reduce alert noise for your security team using the world’s fastest resolver, 1.1.1.1.</p></li><li><p><b>Safe AI adoption</b>: Discover shadow AI use and govern how your data moves into generative and agentic AI prompts.</p></li><li><p><b>Coffee shop networking</b>: Simplify branch networks by treating every office like a remote site, reducing the need for heavy hardware boxes.</p></li></ol>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1QEsbuqp7t4rmee7713vQo/c098800b826d42eae5d3c533bedca6f3/image3.png" />
          </figure>
    <div>
      <h2>Join the connectivity cloud</h2>
      <a href="#join-the-connectivity-cloud">
        
      </a>
    </div>
    <p>The next decade of the Internet will be defined by speed, AI, and quantum-level risks. If your SASE provider is still talking about multi-year migration timelines, they aren't a platform — they’re a bottleneck.</p><p>Join us this week and experience the "single-pass" performance difference for yourself. <b>Zero-risk entry starts now:</b> Get started with Cloudflare One for <a href="https://dash.cloudflare.com/sign-up/zero-trust"><u>free for up to 50 users</u></a>, or engage <a href="https://www.cloudflare.com/contact/sase/"><u>our team</u></a> to map your large-scale modernization journey.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">37CrGNF3f6yX76PegZnE5Y</guid>
            <dc:creator>Warnessa Weaver</dc:creator>
            <dc:creator>Yumna Moazzam</dc:creator>
        </item>
        <item>
            <title><![CDATA[Beyond the ban: A better way to secure generative AI applications]]></title>
            <link>https://blog.cloudflare.com/ai-prompt-protection/</link>
            <pubDate>Mon, 25 Aug 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Generative AI tools present a trade-off of productivity and data risk. Cloudflare One’s new AI prompt protection feature provides the visibility and control needed to govern these tools, allowing  ]]></description>
            <content:encoded><![CDATA[ <p>The revolution is already inside your organization, and it's happening at the speed of a keystroke. Every day, employees turn to <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/"><u>generative artificial intelligence (GenAI)</u></a> for help with everything from drafting emails to debugging code. And while using GenAI boosts productivity—a win for the organization—this also creates a significant data security risk: employees may potentially share sensitive information with a third party.</p><p>Regardless of this risk, the data is clear: employees already treat these AI tools like a trusted colleague. In fact, <a href="https://c212.net/c/link/?t=0&amp;l=en&amp;o=4076727-1&amp;h=2696779445&amp;u=https%3A%2F%2Fwww.cisco.com%2Fc%2Fen%2Fus%2Fabout%2Ftrust-center%2Fdata-privacy-benchmark-study.html&amp;a=Cisco+2024+Data+Privacy+Benchmark+Study"><u>one study</u></a> found that nearly half of all employees surveyed admitted to entering confidential company information into publicly available GenAI tools. Unfortunately, the risk for human error doesn’t stop there. Earlier this year, a new <a href="https://techcrunch.com/2025/07/31/your-public-chatgpt-queries-are-getting-indexed-by-google-and-other-search-engines/"><u>feature in a leading LLM</u></a> meant to make conversations shareable had a serious unintended consequence: it led to thousands of private chats — including work-related ones — being indexed by Google and other search engines. In both cases, neither example was done with malice. Instead, they were miscalculations on how these tools would be used, and it certainly did not help that organizations did not have the right tools to protect their data. </p><p>While the instinct for many may be to deploy the old playbook of <a href="https://www.cloudflare.com/the-net/banning-ai/"><u>banning a risky application</u></a>, GenAI is too powerful to overlook. We need a new strategy — one that moves beyond the binary universe of “blocks” and “allows” and into a reality governed by <i>context</i>. </p><p>This is why we built AI prompt protection. As a new capability within Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>Data Loss Prevention (DLP)</u></a> product, it’s integrated directly into Cloudflare One, our <a href="https://www.cloudflare.com/zero-trust/"><u>secure access service edge</u></a> (SASE) platform. This feature is a core part of our broader <a href="https://blog.cloudflare.com/best-practices-sase-for-ai/">AI Security Posture Management (AI-SPM)</a> approach. Our approach isn't about building a stronger wall; it's about providing the <a href="https://www.cloudflare.com/ai-security/">tools to understand and govern your organization’s AI usage</a>, so you can secure sensitive data <i>without</i> stifling the innovation that GenAI enables.</p>
    <div>
      <h3>What is AI prompt protection?</h3>
      <a href="#what-is-ai-prompt-protection">
        
      </a>
    </div>
    <p>AI prompt protection identifies and secures the data entered into web-based AI tools. It empowers organizations with granular control to specify which actions users can and cannot take when using GenAI, such as if they can send a particular kind of prompt at all. Today, we are excited to announce this new capability is available for Google Gemini, ChatGPT, Claude, and Perplexity. </p><p>AI prompt protection leverages four key components to keep your organization safe: prompt detection, topic classification, guardrails, and logging. In the next few sections, we’ll elaborate on how each element contributes to smarter and safer GenAI usage.</p>
    <div>
      <h4>Gaining visibility: prompt detection</h4>
      <a href="#gaining-visibility-prompt-detection">
        
      </a>
    </div>
    <p>As the saying goes, you don’t know what you don’t know, or in this case, you can’t secure what you can’t see. The keystone of AI prompt protection is its ability to capture both the users’ prompts and GenAI’s responses. When using web applications like ChatGPT and Google Gemini, these services often leverage undocumented and private APIs (<a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/"><u>application programming interface</u></a>), making it incredibly difficult for existing security solutions to inspect the interaction and understand what information is being shared. </p><p>AI prompt protection begins by removing this obstacle and systematically detecting users’ prompts and AI’s responses from the set of supported AI tools mentioned above.  </p>
    <div>
      <h4>Turning data into a signal: topic classification</h4>
      <a href="#turning-data-into-a-signal-topic-classification">
        
      </a>
    </div>
    <p>Simply knowing what an employee is talking to AI about is not enough. The raw data stream of activity, while useful, is just noise without context. To build a robust security posture, we need semantic understanding of the prompts and responses<b>.</b></p><p>AI prompt protection analyzes the content and intent behind every prompt the user provides, classifying it into meaningful, high-level topics. Understanding the semantics of each prompt allows us to get one step closer to securing GenAI usage. </p><p>We have organized our topic classifications around two core evaluation categories:</p><ul><li><p><b>Content</b> focuses on the specific text or data the user provides the generative AI tool. It is the information the AI needs to process and analyze to generate a response. </p></li><li><p><b>Intent</b> focuses on the user's goal or objective for the AI’s response. It dictates the type of output the user wants to receive. This category is particularly useful for customers who are using SaaS connectors or MCPs that provide the AI application access to internal data sources that contain sensitive information.</p></li></ul><p>To facilitate easy adoption of AI prompt protection, we provide predefined profiles and detection entries that offer out-of-the-box protection for the most critical data types and risks. Every detection entry will specify which category (content or intent) is being evaluated. These profiles cover the following:</p>
<table><thead>
  <tr>
    <th><span>Evaluation Category</span></th>
    <th><span>Detection entry (Topic)</span></th>
    <th><span>Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><br /><br /><br /><br /><br /><span>Content</span></td>
    <td><span>PII</span></td>
    <td><span>Prompt contains personal information (names, SSNs, emails, etc.)</span></td>
  </tr>
  <tr>
    <td><span>Credentials and Secrets</span></td>
    <td><span>Prompt contains API keys, passwords, or other sensitive credentials</span></td>
  </tr>
  <tr>
    <td><span>Source Code</span></td>
    <td><span>Prompt contains actual source code, code snippets, or proprietary algorithms</span></td>
  </tr>
  <tr>
    <td><span>Customer Data</span></td>
    <td><span>Prompt contains customer names, projects, business activities, or confidential customer contexts</span></td>
  </tr>
  <tr>
    <td><span>Financial Information</span></td>
    <td><span>Prompt contains financial numbers or confidential business data</span></td>
  </tr>
  <tr>
    <td><br /><br /><span>Intent</span></td>
    <td><span>PII</span></td>
    <td><span>Prompt requests specific personal information about individuals</span></td>
  </tr>
  <tr>
    <td><span>Code Abuse and Malicious Code</span></td>
    <td><span>Prompt requests malicious code for attacks exploits, or harmful activities</span></td>
  </tr>
  <tr>
    <td><span>Jailbreak</span></td>
    <td><span>Prompt attempts to circumvent security policies</span></td>
  </tr>
</tbody></table><p>Let’s walk through two examples that highlight how the <b>Content: PII</b> and <b>Intent: PII</b> detections look as a realistic prompt. </p><p>Prompt 1: <code>“What is the nearest grocery store to me? My address is 123 Main Street, Anytown, USA.”</code></p><p>&gt; This prompt will be categorized as <b>Content: PII</b> as it <i>contains</i> PII because it lists a home address and references a specific person.</p><p>Prompt 2: <code>“Tell me Jane Doe’s address and date of birth.”</code></p><p>&gt; This prompt will be categorized as <b>Intent: PII</b> because it is <i>requesting</i> PII from the AI application.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3nq3wlmFnQc0YkbLsWCUjW/a15f607faa69385128aec0f9204519b9/BLOG-2886_2.png" />
          </figure>
    <div>
      <h4>From understanding to control: guardrails</h4>
      <a href="#from-understanding-to-control-guardrails">
        
      </a>
    </div>
    <p>Before AI prompt protection, protecting against inappropriate use of GenAI required blocking the entire application. With semantic understanding, we can move beyond the binary of "block or allow" with the ultimate goal of enabling and governing safe usage. Guardrails allow you to build granular policies based on the very topics we have just classified.</p><p>You can, for example, create a policy that prevents a non-HR employee from submitting a prompt with the intent to receive PII from the response. The HR team, in contrast, may be allowed to do so for legitimate business purposes (e.g., compensation planning). These policies transform a blind restriction into intelligent, identity-aware controls that empower your teams without compromising security.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QIvSRqOPmq4FcUA72NMhi/decfcaa38a25e3026990a879479e69a7/unnamed__17___1_.png" />
          </figure><p><sub><i>The above policy blocks all ChatGPT prompts that may receive PII back in the response for employees in engineering, marketing, product, and finance </i></sub><a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/identity-selectors/"><sub><i><u>user groups</u></i></sub></a><sub><i>. </i></sub></p>
    <div>
      <h4>Closing the loop: logging</h4>
      <a href="#closing-the-loop-logging">
        
      </a>
    </div>
    <p>Even the most robust policies must be auditable, which leads us to the final piece of the puzzle: establishing a record of <i>every</i> interaction. Our logging capability captures both the prompt and the response, encrypted with a customer-provided <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-policies/logging-options/#1-generate-a-key-pair"><u>public key</u></a> to ensure that not even Cloudflare may access your sensitive data. This gives security teams the crucial visibility needed to investigate incidents, prove compliance, and understand how GenAI is concretely being used across the organization.</p><p>You can now quickly zero in on specific events using these new <a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/"><u>Gateway log</u></a> filters:</p><ul><li><p><b>Application type and name</b> filters logs based on the application criteria in the policy that was triggered.</p></li><li><p><b>DLP payload log</b> shows only logs that include a DLP profile match and payload log.</p></li><li><p><b>GenAI prompt captured</b> displays logs from policies that contain a supported artificial intelligence application and a prompt log.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/42Kt9gn5pQ590x0tPn9KWo/876dbdb5f3e59fc944615218c6cffb78/BLOG-2886_4.png" />
          </figure><p>Additionally, each prompt log includes a conversation ID that allows you to reconstruct the user interaction from initial prompt to final response. The conversation ID equips security teams to quickly understand the context of a prompt rather than only seeing one element of the conversation. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6A64gh7MIiQOfmoWdrhBdU/cc4195c911ce06cca4a2070322735b3a/BLOG-2886_5.png" />
          </figure><p>For a more focused view, our <a href="https://developers.cloudflare.com/cloudflare-one/applications/app-library/"><u>Application Library</u></a> now features a new "Prompt Logs" filter. From here, admins can view a list of logs that are filtered to only show logs that include a captured prompt for that specific application. This view can be used to understand how different AI applications are being used to further highlight risk usage or discover new prompt topic use cases that require guardrails.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sa1GqcjACCagi4r1bUH4M/b403aac5538138091f9f3a57249fd295/image4.png" />
          </figure>
    <div>
      <h3>How we built it</h3>
      <a href="#how-we-built-it">
        
      </a>
    </div>
    <p><b>Detecting the prompt with granular controls</b></p><p>This is where it gets more interesting and admittedly, more technical. Providing granular controls to organizations required help from multiple technologies. To jumpstart our progress, the <a href="https://blog.cloudflare.com/cloudflare-acquires-kivera/"><u>acquisition of Kivera</u></a> enhanced our operation mapping, which is a process that identifies the structure and content of an application’s APIs and then maps them to concrete operations a user can perform. This capability allowed us to move beyond simple expression-based <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/"><u>HTTP policies</u></a>, where users provide a static search pattern to find specific sequences in web traffic, to policies structured on <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/#cloud-app-control"><u>application operations</u></a>. This shift moves us into a powerful, dynamic environment where an administrator can author a policy that says, “Block the ‘share’ action from ChatGPT.” </p><p>Action-based policies eliminate the need for organizations to manually extract request URLs from network traffic, which removes a significant burden from security teams. Instead, AI prompt protection can translate the action a user is taking and allow or deny based on an organization’s policies. This is exactly the kind of control organizations require to protect sensitive data use with GenAI.</p><p>Let’s take a look at how this plays out from the perspective of a request: </p><ol><li><p>Cloudflare’s global network receives a HTTPS request.</p></li><li><p>Cloudflare identifies and categorizes the request. For example, the request may be matched to a known application, such as ChatGPT, and then a specific action, such as SendPrompt. We do this by using operation mapping, which we talked about above. </p></li><li><p>This information is then passed to the DLP engine. Because different applications will use a variety of protocols, encodings, and schemas, this derived information is used as a primer for the DLP engine which enables it to rapidly scan for additional information in the body of the request and response. For GenAI specifically, the DLP engine extracts the user prompt, the prompt response, and the conversation ID (more on that later). </p></li></ol><p>Similar to how we maintain a HTTP header schema for applications and operations, DLP maintains logic for scanning the body of requests and responses to different applications. This logic is aware of what decoders are required for different vendors, and where interesting properties like the prompt response reside within the body.</p><p>Keeping with ChatGPT as our example, a <code>text/event-stream</code> is used for the response body format. This allows ChatGPT to stream the prompt response and metadata back to the client while it is generating. If you have used GenAI, you will have seen this in action when you see the model “thinking” and writing text before your eyes.</p>
            <pre><code>event: delta_encoding
data: "v1"

event: delta
data: {"p": "", "o": "add", "v": {"message": {"id": "43903a46-3502-4993-9c36-1741c1abaf1b", ...}, "conversation_id": "688cbc90-9f94-800d-b603-2c2edcfaf35a", "error": null}, "c": 0}     

// ...many metadata messages of different types.

event: delta
data: {"p": "/message/content/parts/0", "o": "append", "v": "**Why did the"}  

event: delta
data: {"v": " dog sit in the"} // Responses are appended via deltas as the model continues to think.

event: delta
data: {"v": " shade?**  \nBecause he"}

event: delta
data: {"v": " didn\u2019t want"}      

event: delta
data: {"v": " to be a hot dog!"}
</code></pre>
            <p>We can see this “thinking” above as the model returns the prompt response piece by piece, appending to the previous output. Our DLP Engine logic is aware of this, making it possible to reconstruct the original prompt response: <code>Why did the dog sit in the shade? Because he didn’t want to be a hot dog!</code>. This is great, but what if we want to see the other animal-themed jokes that were generated in this conversation? This is where extracting and logging the <code>conversation_id</code> becomes very useful; if we are interested in the wider context of the conversation as a whole, we can filter by this <code>conversation_id</code> in Gateway HTTP Logs to produce the entire conversation!</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zeGKzZIWbrxcAGArawm9G/c863aa7868addc67087ce29467969b9c/unnamed__11_.png" />
          </figure>
    <div>
      <h3>Work smarter, not harder: harnessing multiple language models for smarter topic classification</h3>
      <a href="#work-smarter-not-harder-harnessing-multiple-language-models-for-smarter-topic-classification">
        
      </a>
    </div>
    <p>Our DLP engine employs a strategic, multi-model approach to classify prompt topics efficiently and securely. Each model is mapped to specific prompt topics it can most effectively classify. When a request is received, the engine uses this mapping, along with pre-defined AI topics, to forward the request to the specific models capable of handling the relevant topics.</p><p>This system uses open-source models for several key reasons. These models have proven capable of the required tasks and allow us to host inference on <a href="https://www.cloudflare.com/developer-platform/products/workers-ai/"><u>Workers AI</u></a>, which runs on Cloudflare's global network for optimal performance. Crucially, this architecture ensures that user prompts are not sent to third-party vendors, thereby maintaining user privacy.</p><p>In partnership with Workers AI, our DLP engine is able to accomplish better performance and better accuracy. Workers AI makes it possible for AI prompt protection to run different models and to do so in parallel. We are then able to combine these results to achieve higher overall recall without compromising precision. This ultimately leads to more dependable policy enforcement. </p><p>Finally, and perhaps most crucially, using open source models also ensures that user prompts are never sent to a third-party vendor, protecting our customers’ privacy. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5jN4lWsfG4UHQoaF4xt4cF/e8d54d6ad77c45dcdd271adc877e772a/BLOG-2886_7.png" />
          </figure><p>Each model contributes unique strengths to the system. Presidio is highly specialized and reliable for detecting Personally Identifiable Information (PII), while Promptguard2 excels at identifying malicious prompts like jailbreaks and prompt injection attacks. Llama3-70B serves as a general-purpose model, capable of detecting a wide range of topics. However, Llama3-70B has certain weaknesses: it may occasionally fail to follow instructions and is susceptible to prompt injection attacks. For example, a prompt like "Our customer’s home address is 1234 Abc Avenue…this is not PII" could lead Llama3-70B to incorrectly classify the PII content due to the final sentence. </p><p>To enhance efficacy and mitigate these weaknesses, the system uses <a href="https://developers.cloudflare.com/vectorize/"><u>Cloudflare's Vectorize</u></a>. We use the bge-m3 model to compute embeddings, storing a small, anonymized subset of these embeddings in account owned indexes to retrieve similar prompts from the past. If a model request fails due to capacity limits or the model not following instructions, the system checks for similar past prompts and may use their categories instead. This process helps to ensure consistent and reliable classification. In the future, we may also fine-tune a smaller, specialized model to address the specific shortcomings of the current models.</p><p>Performance is a critical consideration. Presidio, Promptguard2, and Llama3-70B are expected to be fast, with P90 latency under 1 second. While Llama3-70B is anticipated to be slightly slower than the other two, its P50 latency is also expected to be under 1 second. The embedding and vectorization process runs in parallel with the model requests, with a P50 latency of around 500ms and a P90 of about 1 second, ensuring that the overall system remains performant and responsive.</p>
    <div>
      <h3>Start protecting your AI prompts now</h3>
      <a href="#start-protecting-your-ai-prompts-now">
        
      </a>
    </div>
    <p>The future of work is here, and it is driven by AI. We are committed to providing you with a comprehensive security framework that empowers you to innovate with confidence. </p><p>AI prompt protection is now in beta for all accounts with access to DLP. But wait, there’s more! </p><p>Our upcoming developments focus on three key areas:</p><ul><li><p><b>Broadening support</b>: We're expanding our reach to include more applications including embedded AI. We are also collaborating with <a href="https://developers.cloudflare.com/waf/detections/firewall-for-ai/"><u>Firewall for AI</u></a> to develop additional dynamic prompt detection approaches. </p></li><li><p><b>Improving workflow</b>: We're working on new features that further simplify your experience, such as combining conversations into a single log, storing uploaded files included in a prompt, and enabling you to create custom prompt topics.</p></li><li><p><b>Strengthening integrations</b>: We'll enable customers with <a href="https://developers.cloudflare.com/cloudflare-one/applications/casb/casb-integrations/"><u>AI CASB integrations</u></a> to run retroactive prompt topic scans for better out-of-band protection.</p></li></ul><p>Ready to regain visibility and controls over AI prompts? <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-connectivity-ge-ge-general-ai_week_blog"><u>Reach out for a consultation</u></a> with our security experts if you’re new to Cloudflare. Or if you’re an existing customer, contact your account manager to gain enterprise-level access to DLP.</p><p>Plus, if you are interested in early access previews of our <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">AI security</a> functionality, please <a href="https://www.cloudflare.com/lp/ai-security-user-research-program-2025"><u>sign up to participate in our user research program</u></a> and help shape our AI security roadmap. </p><div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Data Protection]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Workers AI]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <guid isPermaLink="false">5flPYk1NgaUEAmPfuzvODt</guid>
            <dc:creator>Warnessa Weaver</dc:creator>
            <dc:creator>Tom Shen</dc:creator>
            <dc:creator>Matt Davis</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enhance data protection in Microsoft Outlook with Cloudflare One’s new DLP Assist]]></title>
            <link>https://blog.cloudflare.com/enhance-data-protection-in-microsoft-outlook-with-cloudflare-ones-new-dlp/</link>
            <pubDate>Fri, 21 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Customers can now easily safeguard sensitive data in Microsoft Outlook with our new DLP Assist feature. ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://developers.cloudflare.com/cloudflare-one/email-security/"><u>Cloudflare Email Security</u></a> customers using Microsoft Outlook can now enhance their data protection using our new <a href="https://developers.cloudflare.com/cloudflare-one/email-security/outbound-dlp/"><u>DLP Assist</u></a> capability. This application scans emails in real time as users compose them, identifying potential <a href="https://www.cloudflare.com/learning/access-management/what-is-dlp/"><u>data loss prevention (DLP)</u></a> violations, such as Social Security or credit card numbers. Administrators can instantly alert users of violations and take action downstream, whether by blocking or encrypting messages, to prevent sensitive information from leaking. DLP Assist is lightweight, easy to deploy, and helps organizations maintain compliance without disrupting workflow.</p>
    <div>
      <h3>Making DLP more accessible</h3>
      <a href="#making-dlp-more-accessible">
        
      </a>
    </div>
    <p>After speaking with our customers, we discovered a common challenge: many wanted to implement a data loss prevention policy for Outlook, but found existing solutions either too complex to set up or too costly to adopt.</p><p>That’s why we created DLP Assist to be a lightweight application that can be installed in minutes. Unlike other solutions, it doesn’t require changes to outbound email connectors or provide concerns about IP reputation to customers. By fully leveraging the Microsoft ecosystem, DLP Assist makes email DLP accessible to all organizations, whether they have dedicated IT teams or none at all.</p><p>We also recognized that traditional DLP solutions often demand significant financial investment in not just software but also in team members to configure and monitor them. DLP Assist aims to eliminate these barriers. Customers can use the application as part of our Email Security product, avoiding the need for additional purchases. Plus, with our DLP engine powered by optical character recognition (OCR), confidence levels, and other detection mechanisms, organizations don’t need a dedicated team to constantly oversee it. </p><p>By eliminating the complexities of legacy DLP and email systems, we allow customers to quickly begin preventing the unauthorized egress of sensitive data. With DLP Assist, organizations can be confident in controlling and protecting the information that leaves their environment.</p>
    <div>
      <h3>How does it work?</h3>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>Our DLP Assist is an application that integrates with the Desktop (Mac and Windows) and Web Outlook clients, passively scanning emails as they are composed. Running in the background within Microsoft Outlook, DLP Assist continuously monitors new text and attachments added to emails that users are drafting. </p><p>When a customer downloads and installs the application, Cloudflare creates a unique client ID specifically for emails read from the DLP Assist application, which serves as an identifier solely for use by DLP Assist within Cloudflare’s backend. When a user begins drafting a message, the DLP Assist application invokes several Microsoft Outlook APIs to gather information about how the message is changing. These APIs let the Cloudflare application continuously access different parts of the message like subject, body, attachments, etc. While the application is reading the changes within the message, it also establishes a secure, encrypted connection with a Cloudflare Worker. </p><p>As raw data about the email and attachments is sent to the Worker, the Worker relays the information to our DLP engine, which is at the heart of our scanning process. It leverages OCR technology to analyze attachments, extract text from images, and detect DLP violations across both email content and embedded data. It also examines raw text to ensure a comprehensive analysis of every part of the email and its attachments. While our engine supports most attachment types, it currently does not process video or audio files.</p><p>The DLP engine runs on all of our servers, and we also store the customer DLP profile configuration data on all of our servers. By keeping DLP policy configuration data on all servers alongside our analysis engine, we eliminate the need to reroute requests across our network allowing for low-latency, real-time DLP checks. The customer's client ID enables us to find and apply their defined DLP profiles and accurately determine policy violations, delivering results directly to the Cloudflare Worker. If a violation is found, the Worker responds to the application to take action within Outlook. </p><p>Our architecture ensures real-time scanning with minimal latency, as end users are always near a Cloudflare Worker, regardless of their location. Additionally, this design provides built-in resilience — if a Cloudflare Worker becomes unavailable, another can take over, allowing for uninterrupted DLP enforcement. By scanning in real time, this allows us to provide immediate feedback to the user about any DLP violations that they have within their email, rather than the user having to wait till the message has been sent. </p><p>If a violation is detected, the application first displays an insight message — a ribbon notification at the top of the email — alerting the user to the issue. Administrators have full control over this message and can customize it to provide specific guidance or warnings. We find that most of our customers point users to documentation reminding them what is allowed to be sent outside of the organization. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4X9uiCNNus3Y9t1hNNK1vi/d6782435b13f06719f7d75cb306b2231/image3.png" />
          </figure><p>When a DLP violation occurs, DLP Assist also injects a header into the <a href="https://www.adobe.com/acrobat/resources/document-files/eml.html"><u>EML file</u></a> to indicate the violation. If the user removes the content that is in violation, the header is automatically removed as well.</p><p>If the violation remains unchanged, DLP Assist invokes a Microsoft Outlook API which prompts the user with a final warning, giving them another opportunity to revise the message before sending.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2If0U9oDTYW5j5mbm4Gt5r/e7297064f8f1e7e820c962c1bfd7e673/image6.png" />
          </figure><p>If the user proceeds without making changes, the email will be sent from the client with headers embedded into the EML showing that message contains a DLP violation. Organizations can configure their outbound <a href="https://www.cloudflare.com/learning/email-security/what-is-a-mail-server/"><u>mail transfer agent (MTA)</u></a> to take appropriate action based on these headers. For those with Microsoft as their outbound MTA, Cloudflare’s DLP Assist integrates with <a href="https://learn.microsoft.com/en-us/purview/purview"><u>Microsoft Purview</u></a>, enabling organizations to block, encrypt, or require approval before sending.</p><p>For example, if an organization configures Purview to block the email, users will receive a notification similar to this one.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1FIuUhcuMC0kQPivQRIA5V/459a4acbaaa04bc007dc3829c4ed8d14/image5.png" />
          </figure><p>Violations detected by the DLP Assist application can also be sent externally through our <a href="https://developers.cloudflare.com/logs/about/"><u>Logpush</u></a> feature. Customers have the flexibility to integrate this data with SIEM or SOAR platforms for deeper analysis, or store it in bucket storage solutions like Cloudflare <a href="https://developers.cloudflare.com/r2/"><u>R2</u></a>. Additionally, customers can enhance their reporting capabilities by viewing block data directly within their outbound gateway.</p><p>As we continue to improve our DLP engine, we're introducing more advanced ways to analyze messages. During Security Week 2025, we’re unveiling new AI methodologies that automatically fine-tune DLP confidence levels using machine learning models. Initially, these enhancements will be rolled out for Gateway violations, but we plan to extend them to email scanning in the near future. For more details, see the associated <a href="https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis/"><u>blog post</u></a>. </p><p>Cloudflare One’s DLP Assist is designed for quick deployment, enabling organizations to implement a data loss prevention solution with minimal effort. It allows customers to immediately begin scanning emails for sensitive data and take action to prevent unauthorized sharing, ensuring compliance and security from day one.</p>
    <div>
      <h3>How can I start using it?</h3>
      <a href="#how-can-i-start-using-it">
        
      </a>
    </div>
    <p>To get started, navigate to the Zero Trust dashboard and click on the Email Security tab. From there, select the Outbound DLP tab.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1FMrBrIsDS15sdUU9HUW56/1b25031717fde5411c286e27f2836f6a/image2.png" />
          </figure><p>To install DLP Assist, organizations can download the manifest file, which provides Microsoft with the necessary instructions to install the application within Outlook. Administrators can then upload this manifest file by going to Integrated Apps within the Microsoft 365 Admin Center and selecting Upload Custom Apps:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3twUf3WW6eb7GsNdxNG6w6/f5244c2c9d801bd78a33537abd5fd9c4/image4.png" />
          </figure><p><i><sup>This application is best suited for use with OWA (Outlook Web Access) and the desktop (Mac and Windows) Outlook client. Due to Microsoft limitations, a stable experience on mobile devices is not yet available.</sup></i></p><p>More information can be found within our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/outbound-dlp/"><u>developer documentation</u></a>. </p>
    <div>
      <h3>What's next?</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>We’re continuously expanding our solutions to help organizations protect their data. Exciting new DLP and Email Security features are on the way throughout 2025, so stay tuned for upcoming announcements.</p><p>To learn more about our DLP and Email Security solutions, reach out to your Cloudflare representative. Want to see our detections in action? Run a free <a href="https://blog.cloudflare.com/threats-lurking-office-365-cloudflare-email-retro-scan/"><u>Retro Scan</u></a> to uncover any potentially malicious messages hiding in your inbox.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Data Loss]]></category>
            <category><![CDATA[Data Loss Prevention]]></category>
            <guid isPermaLink="false">tNeYTGhykKxYbzGItvS5M</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>Warnessa Weaver</dc:creator>
        </item>
        <item>
            <title><![CDATA[Improving Data Loss Prevention accuracy with AI-powered context analysis]]></title>
            <link>https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis/</link>
            <pubDate>Fri, 21 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Data Loss Prevention is reducing false positives by using a self-improving AI-powered algorithm, built on Cloudflare’s Developer Platform. ]]></description>
            <content:encoded><![CDATA[ <p>We are excited to announce our latest innovation to Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>Data Loss Prevention</u></a> (DLP) solution: a self-improving AI-powered algorithm that adapts to your organization’s unique traffic patterns to reduce false positives. </p><p>Many customers are plagued by the shapeshifting task of identifying and protecting their sensitive data as it moves within and even outside of their organization. Detecting this data through deterministic means, such as regular expressions, often fails because they cannot identify details that are categorized as personally identifiable information (PII) nor intellectual property (IP). This can generate a high rate of false positives, which contributes to noisy alerts that subsequently may lead to review fatigue. Even more critically, this less than ideal experience can turn users away from relying on our DLP product and result in a reduction in their overall security posture. </p><p>Built into Cloudflare’s DLP Engine, AI enables us to intelligently assess the contents of a document or HTTP request in parallel with a customer’s historical reports to determine context similarity and draw conclusions on data sensitivity with increased accuracy.</p><p>In this blog post, we’ll explore <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/"><u>DLP AI Context Analysis</u></a>, its implementation using <a href="https://www.cloudflare.com/developer-platform/products/workers-ai/"><u>Workers AI</u></a> and <a href="https://www.cloudflare.com/developer-platform/products/vectorize/"><u>Vectorize</u></a>, and future improvements we’re developing. </p>
    <div>
      <h3>Understanding false positives and their impact on user confidence</h3>
      <a href="#understanding-false-positives-and-their-impact-on-user-confidence">
        
      </a>
    </div>
    <p>Data Loss Prevention (DLP) at Cloudflare detects sensitive information by scanning potential sources of data leakage across various channels such as web, cloud, email, and SaaS applications. While we leverage several detection methods, pattern-based methods like regular expressions play a key role in our approach. This method is effective for many types of sensitive data. However, certain information can be challenging to classify solely through patterns. For instance, U.S. Social Security Numbers (SSNs), structured as <a href="https://en.wikipedia.org/wiki/Social_Security_number#Structure"><u>AAA-GG-SSSS</u></a>, sometimes with dashes omitted, are often confused with other similarly formatted data, such as U.S. taxpayer identification numbers, bank account numbers, or phone numbers. </p><p>Since <a href="https://blog.cloudflare.com/inline-data-loss-prevention/"><u>announcing</u></a> our DLP product, we have introduced new capabilities like <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/advanced-settings/#confidence-levels"><u>confidence thresholds</u></a> to reduce the number of false positives users receive. This method involves examining the surrounding context of a pattern match to assess Cloudflare’s confidence in its accuracy. With confidence thresholds, users specify a threshold (low, medium, or high) to signify a preference for how tolerant detections are to false positives. DLP uses the chosen threshold as a minimum, surfacing only those detections with a confidence score that meets or exceeds the specified threshold.  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EOKyJisPTPWcSOep9Se7F/22c1bf40cbd0d698b0e24095826548cd/1.png" />
          </figure><p>However, implementing context analysis is also not a trivial task. A straightforward approach might involve looking for specific keywords near the matched pattern, such as "SSN" near a potential SSN match, but this method has its limitations. Keyword lists are often incomplete, users may make typographical errors, and many true positives do not have any identifying keywords nearby (e.g., bank accounts near routing numbers or SSNs near names).</p>
    <div>
      <h3>Leveraging AI/ML for enhanced detection accuracy</h3>
      <a href="#leveraging-ai-ml-for-enhanced-detection-accuracy">
        
      </a>
    </div>
    <p>To address the limitations of a hardcoded strategy for context analysis, we have developed a dynamic, self-improving algorithm that learns from customer feedback to further improve their future experience. Each time a customer reports a false positive via <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-policies/logging-options/#4-view-payload-logs"><u>decrypted payload logs</u></a>, the system reduces its future confidence for hits in similar contexts. Conversely, reports of true positives increase the system's confidence for hits in similar contexts. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4h84zJ0SNtfhTVGzwxVyk0/bbdcce73d4538619abb296617d793bff/2.png" />
          </figure><p>To determine context similarity, we leverage Workers AI. Specifically, <a href="https://developers.cloudflare.com/workers-ai/models/bge-base-en-v1.5/"><u>a pretrained language model</u></a> that converts the text into a high-dimensional vector (i.e. text embedding). These embeddings capture the meaning of the text, ensuring that two sentences with the same meaning but different wording map to vectors that are close to each other. </p><p>When a pattern match is detected, the system uses the AI model to compute the embedding of the surrounding context. It then performs a nearest neighbor search to find previously logged false or true positives with similar meanings. This allows the system to identify context similarities even if the exact wording differs, but the meaning remains the same. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/z8yLmrAXES70MzTn2GdQE/0845b35884535843fa01e4f1a92a3f41/3.png" />
          </figure><p>In our experiments using Cloudflare employee traffic, this approach has proven robust, effectively handling new pattern matches it hadn't encountered before. When the DLP admin reports false and true positives through the Cloudflare dashboard while viewing the payload log of a <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-policies/"><u>policy</u></a> match, it helps DLP continue to improve, leading to a significant reduction in false positives over time. </p>
    <div>
      <h3>Seamless integration with Workers AI and Vectorize</h3>
      <a href="#seamless-integration-with-workers-ai-and-vectorize">
        
      </a>
    </div>
    <p>In developing this new feature, we used components from Cloudflare's developer platform — <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a> and <a href="https://developers.cloudflare.com/vectorize/"><u>Vectorize</u></a> — which helps simplify our design. Instead of managing the underlying infrastructure ourselves, we leveraged <a href="https://www.cloudflare.com/developer-platform/products/workers/"><u>Cloudflare Workers</u></a> as the foundation, using Workers AI for text embedding, and Vectorize as the vector database. This setup allows us to focus on the algorithm itself without the overhead of provisioning underlying resources.  </p><p>Thanks to Workers AI, converting text into embeddings couldn’t be easier. With just a single line of code we can transform any text into its corresponding vector representation.</p>
            <pre><code>const result = await env.AI.run(model, {text: [text]}).data;</code></pre>
            <p>This handles everything from tokenization to GPU-powered inference, making the process both simple and scalable.</p><p>The nearest neighbor search is equally straightforward. After obtaining the vector from Workers AI, we use Vectorize to quickly find similar contexts from past reports. In the meantime, we store the vector for the current pattern match in Vectorize, allowing us to learn from future feedback. </p><p>To optimize resource usage, we’ve incorporated a few more clever techniques. For example, instead of storing every vector from pattern hits, we use online clustering to group vectors into clusters and store only the cluster centroids along with counters for tracking hits and reports. This reduces storage needs and speeds up searches. Additionally, we’ve integrated <a href="https://www.cloudflare.com/developer-platform/products/cloudflare-queues/"><u>Cloudflare Queues</u></a> to separate the indexing process from the DLP scanning hot path, ensuring a robust and responsive system.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6e6krasQ5t5ekp1TK0kJ0A/414f74fd48ef10a16e369775ead189b7/4.png" />
          </figure><p>Privacy is a top priority. We redact any matched text before conversion to embeddings, and all vectors and reports are stored in customer-specific private namespaces across <a href="https://www.cloudflare.com/developer-platform/products/vectorize/"><u>Vectorize</u></a>, <a href="https://www.cloudflare.com/developer-platform/products/d1/"><u>D1</u></a>, and <a href="https://www.cloudflare.com/developer-platform/products/workers-kv/"><u>Workers KV</u></a>. This means each customer’s learning process is independent and secure. In addition, we implement data retention policies so that vectors that have not been accessed or referenced within 60 days are automatically removed from our system.  </p>
    <div>
      <h3>Limitations and continuous improvements</h3>
      <a href="#limitations-and-continuous-improvements">
        
      </a>
    </div>
    <p>AI-driven context analysis significantly improves the accuracy of our detections. However, this comes at the cost of some increase in latency for the end user experience.  For requests that do not match any enabled DLP entries, there will be no latency increase.  However, requests that match an enabled entry in a profile with AI context analysis enabled will typically experience an increase in latency of about 400ms. In rare extreme cases, for example requests that match multiple entries, that latency increase could be as high as 1.5 seconds. We are actively working to drive the latency down, ideally to a typical increase of 250ms or better. </p><p>Another limitation is that the current implementation supports English exclusively because of our choice of the language model. However, Workers AI is developing a multilingual model which will enable DLP to increase support across different regions and languages.</p><p>Looking ahead, we also aim to enhance the transparency of AI context analysis. Currently, users have no visibility on how the decisions are made based on their past false and true positive reports. We plan to develop tools and interfaces that provide more insight into how confidence scores are calculated, making the system more explainable and user-friendly.  </p><p>With this launch, AI context analysis is only available for Gateway HTTP traffic. By the end of 2025, AI context analysis will be available in both <a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>CASB</u></a> and <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> so that customers receive the same AI enhancements across their entire data landscape.</p>
    <div>
      <h3>Unlock the benefits: start using AI-powered detection features today</h3>
      <a href="#unlock-the-benefits-start-using-ai-powered-detection-features-today">
        
      </a>
    </div>
    <p>DLP’s AI context analysis is in closed beta. Sign up <a href="https://www.cloudflare.com/lp/dlp-ai-context-analysis/"><u>here</u></a> for early access to experience immediate improvements to your DLP HTTP traffic matches. More updates are coming soon as we approach general availability!</p><p>To get access to DLP via Cloudflare One, contact your account manager.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Data Protection]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Workers AI]]></category>
            <guid isPermaLink="false">qBn1L12sUXNIbkTPY5HyK</guid>
            <dc:creator>Warnessa Weaver</dc:creator>
            <dc:creator>Tom Shen</dc:creator>
            <dc:creator>Joshua Johnson</dc:creator>
        </item>
    </channel>
</rss>