Cloudflare's Zero Trust Network Access (ZTNA) technologies create secure boundaries around applications. When resources are protected with ZTNA, users are only allowed to access resources after verifying the identity, context, and policy adherence of each specific request. Cloudflare's Zero-Trust-as-a-Service model enables users to deploy access controls on the company's instant-on cloud platform, backed by Cloudflare's global network.
N/A
Microsoft Defender for Cloud Apps
Score 7.1 out of 10
N/A
Microsoft Defender for Cloud Apps (formerly Microsoft Cloud App Security) is a multimode cloud access security broker.
N/A
Pricing
Cloudflare Zero Trust Services
Microsoft Defender for Cloud Apps
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cloudflare Zero Trust Services
Microsoft Defender for Cloud Apps
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
Cloudflare Zero Trust Services
Microsoft Defender for Cloud Apps
Features
Cloudflare Zero Trust Services
Microsoft Defender for Cloud Apps
Identity Management
Comparison of Identity Management features of Product A and Product B
Cloudflare Zero Trust Services
10.0
1 Ratings
10% above category average
Microsoft Defender for Cloud Apps
-
Ratings
Multi-Factor Authentication
10.01 Ratings
00 Ratings
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Cloudflare Zero Trust Services
10.0
1 Ratings
5% above category average
Microsoft Defender for Cloud Apps
-
Ratings
Endpoint Detection and Response (EDR)
10.01 Ratings
00 Ratings
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Cloudflare Zero Trust Services
10.0
1 Ratings
13% above category average
Microsoft Defender for Cloud Apps
-
Ratings
Network Analytics
10.01 Ratings
00 Ratings
Threat Recognition
10.01 Ratings
00 Ratings
Vulnerability Classification
10.01 Ratings
00 Ratings
Automated Alerts and Reporting
10.01 Ratings
00 Ratings
Threat Analysis
10.01 Ratings
00 Ratings
Threat Intelligence Reporting
10.01 Ratings
00 Ratings
Automated Threat Identification
10.01 Ratings
00 Ratings
Zero Trust Security
Comparison of Zero Trust Security features of Product A and Product B
I wanted to securely connect to my servers without getting tracked by malicious attackers, even though I was on public Wi-Fi. Security was my top priority, and I also wanted a setup that was easy and quick to start and provided great network performance. Cloudflare's Zero trust matches my criteria for becoming my first choice.
It is well suited if your team is working with Microsoft tools and Azure services. but if you are using other cloud service providers and don't want to spend efforts in learning integration with third-party software then this is not a great fit for you. overall we are very satisfied with the product. If your corporation with Microsoft tools then I would recommend it.
Overall, Cloudflare Zero Trust Services is very usable. We just need to do a one-time setup on Cloudflare Zero Trust Service's website, download their app on the device, and connect it with secure authentication. That's it. The apps are available for almost all kinds of devices that we use, and hence, we can secure all of our required devices. The app interface is very user-friendly and has logging capability to debug in case something goes wrong.
The interface is pretty simple and easy to use; however, you will need to do a lot of investigative research on your own to get comfortable with it. Originally, many of the Microsoft security tools had their own seperate consoles. Overtime, they have blended into one interface which is the ideal state. In some cases it is clear Microsoft had to pick which console a certain feature or setting was going to reside in and this leads to some confusion. For example, DLP is managed through Defender for Cloud Apps but you will also need to jump into Purview. For things like reverse proxy on your M365 tenant, you will need to go into Azure and setup conditional access rules. Not a big problem and I can understand why the settings are located where they are but for someone just starting out with Defender for Cloud Apps, it will take some time to figure out.
I have not utilized actual support but the Sales and Product teams have been super helpful in moving our implementation forward and showing us the best practices.
Microsoft Defender for Cloud Apps was chosen primarily due to its ability to work perfectly within our mostly M365 environment. Given that this was an added feature of our E5 license, we chose to dive into it and use it due to it's good visibility into user actions and the ability to tie all M365 actions together into one place. We did not see similar visibility with other tools that we vetted
Cloud App Security saves us thousands of dollars finding and rectifying apps security issues
Identity Security Posture helps the organization identity stay in shape, saving thousands of dollars on security consultations
The cost of suffering a breach cannot be quantified, CAS helps minimize the chances of the attackers succeeding, with excellent historical logging for most operations