• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Cloudflare AREA 1 – Fighting the War Against Phishing

by CXO Staff
April 5, 2023
in Opinions

Security teams are overwhelmed with high volumes of user-reported email threats, time-consuming policy setup and upkeep, and manual incident response.

Cloudflare Simplifies Data migration, Caching, Log Management with R2

A phishing attack is a targeted, fraudulent communication that appears to come from a reputable source. Email phishing occurs when attackers trick legitimate users with proper access credentials into taking action that open the door for unauthorised users, allowing them to transfer information and data out (data exfiltration). The most sophisticated email attacks compromise trusted vendor and partner accounts to steal money and data. Security teams are overwhelmed with high volumes of user-reported email threats, time-consuming policy setup and upkeep, and manual incident response.

There are 5 types of different phishing techniques:

  1. Impersonation phishing: The attacker poses as a known and/or trusted contact.
  2. Credential harvester: The attack focuses on gathering compromised user credentials (emails and passwords).
  3. Malware attachment: The victim is prompted to open an attachment that contains malware.
  4. Voicemail phish (vishing): A supposed voicemail sound file actually redirects the victim to a web site.
  5. Order confirmation phish: In this attack, the victim clicks a link to a spoofed login page.

 

Zero Trust Strategy Needs to Include Email
Email is the most used form of communications today. As per research from Gartner, 70% of organisations use cloud email solutions today. These are primarily Microsoft 365 and Google Workspace.  The firm also estimates that 45% of organisations will have experienced attacks on their software supply chains by 2025. Phishing attacks exploit our implicit trust in email communications. A study by Deloitte shows that 91% of all cyber breaches originate from phishing emails, which target the weakest link in an organisation’s security posture: People. This includes business email compromise (BEC) or Vendor Email Compromise, ransomware and credential harvesting, and malicious attachments. Socially engineered phishing attacks are often delivered under the guise of being a trusted brand or business partner. Therefore, it is imperative that email needs a Zero Trust security model.

 

Weaknesses in Current Security Approaches

When it comes to email security, organisations have legacy Security Email Gateways (SEGs). Security is primarily SPAM focused, not cloud native, has a high miss rate (around 30%), remains reactive and is missing new phishing campaigns. API solutions and email authentication technologies have their limitations and although end-user education is important to create awareness, it cannot alone stop breaches.

 

Cloudflare Area 1 – Pre-emptively Stopping Phishing Attacks

Cloudflare Area 1 is a cloud-native email security solution whose mission is to deliver a clean inbox to organisations. The platform pre-emptively stops targeted phishing and BEC attacks. Cloudflare Area 1 was integrated into Cloudflare One (Zero Trust solution) further to Area 1’s acquisition by Cloudflare in April 2022.

Cloudflare Area 1 uses technology that crawls the entire Internet every week (this means looking at around 8 billion items) for attacker infrastructure and delivery mechanisms, resulting in identification and prevention of phishing attacks during the earliest stages of an attack cycle. This ensures that the system is completely up-to-date. The platform can be deployed inline, over APIs, or in multi-mode deployment. The solution provides customers with a 99.997% detection efficacy rate and offers leading scalable and uptime functions.

Classified by Gartner as an Integrated Cloud Email Security Solution, or ICES, most often referred to as Cloud Email Security, Cloudflare Area 1 was designed and built to offer flexible deployment options that enable customers to get started in a matter of moments.

 

What makes Cloudflare Area 1 Special?

Cloudflare Area 1 provides cloud-native email security that fits into any stack.

It is:

  1. Pre-emptive: with a massive-scale phishing indexing to stop attacks before they reach inboxes.
  2. Continuous: It has multiple protection layers before, during, and after emails reach inboxes.
  3. Flexible: Deployment can be initiated and completed in as little as 5-minutes, with no disruption to mail flow, via inline, API or multi-mode. It saves a lot of time!
  4. Contextual: Analyses content, context, and social graphs of email communications to stop “needle in the haystack” email threats like long-con BEC and vendor invoice fraud.
  5. Comprehensive:  Covers the full range of email attack types (URLs, payloads, BEC), vectors (email, web, network), and attack channels (external, internal, trusted partners).

Cloudflare Area 1 can be the sole provider of email security services, or an augmentation to an existing platform, depending on the unique needs of an organisation. In some cases, the solution is implemented to serve as an added layer to existing SEG services. In other cases, it replaces the legacy SEGs entirely, ultimately removing network complexity and unnecessary renewal fees relating to maintaining the SEG.

Tags: Cloudflarephishing attacks
ShareTweet

Related Posts

Channel Vision Strategy: Empowering cyber resilience
Opinions

What most businesses get wrong about data security

In today's AI-driven world, vast amounts of data are generated daily across industries like finance, e-commerce, healthcare, and government services....

June 11, 2025
Why private cloud matters
Opinions

Why private cloud matters

As digital transformation accelerates across industries, private cloud has become a vital infrastructure model for organisations seeking the flexibility of...

June 9, 2025

Discussion about this post

Latest Issue

SentinelOne accelerates secure cloud migrations for AWS customers

SentinelOne accelerates secure cloud migrations for AWS customers

June 16, 2025
Genetec brings powerful new capabilities to Security Center SaaS

Genetec brings powerful new capabilities to Security Center SaaS

June 16, 2025
Milestone Systems acquires brighter AI, adding state-of-the-art anonymisation technology

Mindware expands Autodesk relationship

June 16, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.