Cloudflare Zero Trust Services vs. Microsoft Defender for Cloud Apps

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cloudflare Zero Trust Services
Score 8.7 out of 10
N/A
Cloudflare's Zero Trust Network Access (ZTNA) technologies create secure boundaries around applications. When resources are protected with ZTNA, users are only allowed to access resources after verifying the identity, context, and policy adherence of each specific request. Cloudflare's Zero-Trust-as-a-Service model enables users to deploy access controls on the company's instant-on cloud platform, backed by Cloudflare's global network.N/A
Microsoft Defender for Cloud Apps
Score 8.5 out of 10
N/A
Microsoft Defender for Cloud Apps (formerly Microsoft Cloud App Security) is a multimode cloud access security broker.N/A
Pricing
Cloudflare Zero Trust ServicesMicrosoft Defender for Cloud Apps
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cloudflare Zero Trust ServicesMicrosoft Defender for Cloud Apps
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Cloudflare Zero Trust ServicesMicrosoft Defender for Cloud Apps
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
Cloudflare Zero Trust ServicesMicrosoft Defender for Cloud Apps
Small Businesses
ThreatLocker
ThreatLocker
Score 9.0 out of 10

No answers on this topic

Medium-sized Companies
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.4 out of 10
Avanan
Avanan
Score 8.8 out of 10
Enterprises
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.4 out of 10
Avanan
Avanan
Score 8.8 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Cloudflare Zero Trust ServicesMicrosoft Defender for Cloud Apps
Likelihood to Recommend
9.6
(4 ratings)
7.5
(10 ratings)
Support Rating
9.1
(3 ratings)
5.0
(1 ratings)
User Testimonials
Cloudflare Zero Trust ServicesMicrosoft Defender for Cloud Apps
Likelihood to Recommend
Cloudflare
For example, Cloudflare is a very good solution for ZTNA implementation. Cloudflare has Warp for propagating Gateway rules and checking device posture. Browser Isolation gives you more abilities to use internet resources without any restrictions and at the same time not put the company at risk. For example, if there is no DLP solution in place blocking the printing function can partly protect the company's sensitive data from intentional or intentional leakage through the online forms. A similar approach protects the end-user device from Zero-day threats and malicious software code. Moreover, Remote Browser Isolation technology protects not only the user's device but also the user himself from possible phishing attacks - for example, even if the user enters his username and password on the phishing website, bank card issuers, or other personal or confidential data, data will not go beyond the isolated cloud environment. Cloudflare Access gives company administrators a great opportunity to implement role-based access policies and make effect segmentation and diversification of company network groups.
Read full review
Microsoft
It is well suited if your team is working with Microsoft tools and Azure services. but if you are using other cloud service providers and don't want to spend efforts in learning integration with third-party software then this is not a great fit for you. overall we are very satisfied with the product. If your corporation with Microsoft tools then I would recommend it.
Read full review
Pros
Cloudflare
  • Block access to known bad, risky, or unwanted destinations at the DNS or HTTP level.
  • Excellent protection for remote users.
  • Best in class browser isolation techniques.
Read full review
Microsoft
  • Detect threats based on user activity logs.
  • Set manual and automatic alert remediation.
  • Implement activity policies.
  • Detect threats based on user activity logs.
Read full review
Cons
Cloudflare
  • Very API [oriented] which is fine, but the GUI is sometimes inconsistent
Read full review
Microsoft
  • In the event of Cloud traffic it is not easy to monitor and identify attacks.
  • Difficult to protect unmatched Cloud devices.
Read full review
Support Rating
Cloudflare
Good chat support from the portal for basic questions and minor issues. The enterprise support line is provided as well.
Read full review
Microsoft
I have not utilized actual support but the Sales and Product teams have been super helpful in moving our implementation forward and showing us the best practices.
Read full review
Alternatives Considered
Cloudflare
As long as all Cloudflare products and services rely on anycast technology, in a complex approach Cloudflare is faster and more relevant for cloud applications. The balance between security and performance is fully established. Also, Cloudflare has quite a good stack for API connection protection, like the API Shield example, which makes it more effective compared to F5 for example. Warp as a ZTNA agent gives better visibility and device posture information than FortiClient does.
Read full review
Microsoft
Microsoft Defender for Cloud Apps was chosen primarily due to its ability to work perfectly within our mostly M365 environment. Given that this was an added feature of our E5 license, we chose to dive into it and use it due to it's good visibility into user actions and the ability to tie all M365 actions together into one place. We did not see similar visibility with other tools that we vetted
Read full review
Return on Investment
Cloudflare
  • Complete solution in case of using with Cloudflare Access.
  • No need of maintenance.
  • No skilled staff and trainings required.
Read full review
Microsoft
  • Cloud App Security saves us thousands of dollars finding and rectifying apps security issues
  • Identity Security Posture helps the organization identity stay in shape, saving thousands of dollars on security consultations
  • The cost of suffering a breach cannot be quantified, CAS helps minimize the chances of the attackers succeeding, with excellent historical logging for most operations
Read full review
ScreenShots