TrustRadius: an HG Insights company

Cloudflare One (SASE)

Score9.2 out of 10

25 Reviews and Ratings

What is Cloudflare One (SASE)?

Cloudflare One is a single-vendor secure access service edge (SASE) platform that converges security and networking services into a unified, global connectivity cloud. Cloudflare One connects and protects an organization's workforce, AI agents, and infrastructure.

Top Performing Features

  • Multi-Factor Authentication

    Using multiple, independent components to gain access

    Category average: 8.8

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 8.9

  • Threat Recognition

    Detection and recognition of malicious software within a network that could pose a threat to sensitive information.

    Category average: 8

Areas for Improvement

  • Automated Alerts and Reporting

    Systems in place to automatically alert, report, or notify of issues that may need timely remediation.

    Category average: 8.2

  • Network Traffic Analysis

    Software that monitors network traffic and provides detailed reports on the users who access the network.

    Category average: 8.5

  • Network Analytics

    Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.

    Category average: 8.2

Very slick

Use Cases and Deployment Scope

Transitioning away from P2S VPN and moving over to Cloudflare Zero trust allowed us to jump massively towards a highly available service. Setting up multiple tunnels and routes in depending on device status and user properties allowed a secure and highly redundant service without spending a fortune on firewalls.

<div>

</div><div>Since deploying our design we have yet to see a single outage for remote workers.</div>

Pros

  • Redundant tunnel endpoints
  • Zero trust access management

Cons

  • Static IP addresses are behind a subscription tier. Being able to pay for specific features would be useful when you don’t be the full stack on offer.
  • Alerts for tunnels going down could be more granular. While you can subscribe to tunnel down events, there isn’t an obvious difference between 1/5 is down vs 9/10 out of action. Where the latter would be substantially more of a pressing issue you have to login to check which is the case.

Return on Investment

  • 100% of our services run through zero trust, not even a printer can be accessed without the user being verified and the workstation in good standing via Defender. This means our WiFi is just a ‘guest’ internet access setup and is of no security risk to us.

Usability

Great Security with Amazing Network Performance.

Use Cases and Deployment Scope

We use Cloudflare's Zero Trust service as an alternative to Business VPN services. We wanted to get secure tunneling to connect to our servers without compromising on security and network performance. Cloudflare's Zero Trust is very easy to set up and get started with. It provides secure VPN-like services to secure any device with its 1.1.1.1 apps, and It also provides Warp protocol along with zero trust, so we get great network performance as well. Overall, it fulfills our basic requirements.

Pros

  • Great Security with Zero Trust Concept.
  • Provides Warp Protocol for faster performance.
  • Provides capability to monitor the traffic.
  • Is very easy and quick to set up.

Cons

  • Cloudflare picks the nearest device location to route the traffic, but It would be great if we could select any particular location.
  • Cloudflare enables monitoring for all the connected clients; it would be great if we could monitor any individual client device while keeping some client devices private.
  • Sometimes, its DNS is not able to resolve a few project websites; we have to manually purge the cache and even disable the Security to get the work done. So, it would be better if we could manually provide a DNS list or whitelist some websites.

Return on Investment

  • The cost of Cloudflare Zero trust is much lower, hence reducing spending on infrastructure security.
  • The Network performance is improved thanks to Warp protocol.
  • Requires less maintenance and hence saves time.

Usability

Cloudflare provides best ZTNA solution on the market

Use Cases and Deployment Scope

We use Cloudflare Services (WAF) for protecting University's site and inner restrictions in students' labs. Cloudflare gives us an option to make granular restriction rules with Magic Firewall.

Pros

  • Granular Restrictions
  • Bot Management
  • DNS protection

Cons

  • Cloudflare still need to improve CASB direction to complete set of SASE tools.
  • More integrations with the third-party agents to check device posture in the Zero Trust framework.
  • More granularity in firewall rules for full replacement of on-premise solutions.

Return on Investment

  • Cloudflare as a multipurpose vendor and solution helped us to replace many overlapped imperfect solutions.
  • Cloudflare gives the company administrator a single pane of glass view which makes his work more effective.
  • Cloudflare makes cloud transformation easier and more effective.

Alternatives Considered

F5 Distributed Cloud WAF and FortiClient

Other Software Used

Bitdefender GravityZone, Tenable.io, Proofpoint Insider Threat Management (ObserveIT), Proofpoint Email Fraud Defense, AttackIQ Security Optimization Platform

Efficient and easy to use secure web gateway

Use Cases and Deployment Scope

In most scenarios Cloudflare Gateway is used with Cloudflare Access, actually, Gateway is a proxy that filters end-user requests to web resources. It keeps an organization's data safe from malware, ransomware, phishing, command &amp; control, and shadow IT.

Pros

  • Block access to known bad, risky, or unwanted destinations at the DNS or HTTP level.
  • Excellent protection for remote users.
  • Best in class browser isolation techniques.

Cons

  • Good to see content re-categorization with different list for organizations.
  • URL and headers rewrite.
  • Events forwarding to on-premise SIEM.

Most Important Features

  • Disabling download/upload, printing or keyboard input.
  • Blocking suspicions web resources.
  • Comprehensive applications list for policy usage.

Return on Investment

  • Complete solution in case of using with Cloudflare Access.
  • No need of maintenance.
  • No skilled staff and trainings required.

Alternatives Considered

McAfee Web Gateway and Forcepoint Trusted Gateway System

Other Software Used

McAfee Web Gateway, Bitdefender GravityZone, Fortinet FortiGate

Good product with great features

Use Cases and Deployment Scope

Cloudflare is used for providing internal application access through Cloudflare tunnel and using Google IDP from WARP installed system. It was a replacement for VPN. Also used Cloudflare for DNS management to maintain domain records. Cloudflare provides cloud-based WAF to protect the internet-facing applications from external web-based threats. Deployment is very quick and gets good support.

Pros

  • Fastest DNS response
  • Managed WAF firewall rules
  • Analytics and detailed information
  • SSL certificate

Cons

  • Schedule report
  • Email notifications for required rules
  • Filters save for admins

Return on Investment

  • Makes application faster
  • Complete security with ZTNA
  • replacement of on premise WAF