Cloudflare brings DLP controls to enterprise networks
Cloudflare gives new inspection powers to its Cloudflare One service
Internet infrastructure company Cloudflare has launched a product to ensure sensitive information does not leave the corporate network, which these days extends beyond the physical boundaries of the corporate office.
Besides the corporate network, users can use the new Cloudflare Data Loss Prevention (DLP) to apply network-wide data security policies and controls to their cloud computing infrastructure as well as to the devices of remote employees.
“Everyone knows they need a DLP solution, but the only options are expensive, hard to manage, and haven’t seen innovation in years,” said Matthew Prince, co-founder and CEO, Cloudflare.
We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.
- These are some of the best endpoint protection software
- Here are the best firewall apps and services
- Secure your credentials with one of the best security keys
Extension of the network
Price suggests that their solution, which sits between the corporate network and applications, reimagines DLP as an extension of the network.
Cloudflare argues that while all other DLP products require traffic to pass through a central location in order for it to be effectively examined against the defined policies, Cloudflare’s DLP, which is offered as part of Cloudflare One, leverages on the fact that its customers are already using its infrastructure.
“We have talked to hundreds of customers who have resorted to applying stopgap measures to try and maintain that castle-and-moat model in some form, but each of those band-aids slow down their users or drive up costs - or both,” says Cloudflare’s Director of Product, Sam Rhea while introducing their solution.
Instead, the company just added the ability to perform inline inspection against all traffic flowing through a company’s Cloudflare One network. Furthermore, it’s also added the ability to define Zero Trust permissions for all applications.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
- We’ve also compiled a list of the best antivirus products
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.