Cloudflare Cloud Email Security
Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.
Features
- In-the-wild discovery of attacker infrastructure and phishing campaigns
- Heuristic-based and ML-based detection techniques ensuring broadest possible threat coverage
- Get real-time threat updates, review detection metrics and forensics
- Deep integration with Microsoft 365 and Google Workspace environments
- Automated and managed phishing triage and remediation
- Protection against all 4 Gartner-defined BEC attack types
- Protection against web-based phishing campaigns via globally-distributed, recursive DNS service
- Multi-mode deployment with flexible options including inline, API, journaling, connectors
- Cloud-native architecture built to dynamically scale and ensure business continuity
- Integrations to route data to SIEMs and take enforcement actions
Benefits
- Free of charge, no obligation trial to prove the value
- No impact to mail flow or the end user experience
- Receive real-time updates on incidents that require immediate attention
- Stop the most advanced email threats. Pre-emptively stop phishing attacks
- Augment/replace the native security offered by cloud email vendors
- Stop Business Email Compromise (BEC), and email supply chain attacks
- Leverage threat intelligence from Area 1 with other Cloudflare products
- Rapid deployment in minutes without any hardware, agents, or appliances
- Customers entitled to give free licences to supply chain partners
- SOC investigations with post-delivery message retractions and SIEM/SOAR integration
Pricing
£6.16 a user
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 8 9 3 5 3 8 3 4 4 9 6 8 2 5
Contact
INTEGRITY360 LIMITED
Paul Momirovski
Telephone: +44 20 3397 3414
Email: bidreviewboard@integrity360.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
-
"We support on-premise and cloud based email, including Microsoft Office 365, Google and any other email systems
" - Cloud deployment model
- Private cloud
- Service constraints
-
"N/A
" - System requirements
-
- Internet connectivity
- Email system connectivity (API or inline)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Phone, chat, and email support with median response time of 15 minutes. For critical business issues, Enterprise customers have access to our 24/7/365 emergency phone support hotline
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Cloudflare provides the delivery of the content ensuring speed, reliability, and security. The WCAG 2.0 standards would not apply as the proposed solution is not providing the content but delivering and securing it.
- Web chat accessibility testing
-
"N/A
" - Onsite support
- Yes, at extra cost
- Support levels
-
"Enterprise customers can choose between Enterprise support and Premium Support. Premium Enterprise support includes increased SLA response times and prioritised ticket handling. Enterprise is included as a part of the standard Enterprise contract. Premium Support pricing is bespoke. Premium customers receive a dedicated Customer Success Manager and Customer Solutions Engineer.
" - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Cloudflare assists enterprise customers start using our service in a consultative manner using various methods, including remote and on-site and written documentation.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- The Cloudflare User Interface includes data aggregation logs, which include audit logs (log of every action taken within the interface and change to an account setting), as well as HTTP request logs. Data can be extracted via API in aggregate, or individual requests can be downloaded from the UI directly. Upon ending a contract, Cloudflare will advise customers on capturing all these data prior to account termination.
- End-of-contract process
- Cloudflare supports customers through the end of their contract and does not charge for reasonable off-boarding services. If a customer requires an extension of service during the off-boarding process, this may be subject to the same terms as the original contract, but will be determined through joint agreement between Cloudflare and the customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- API integration into the customer's email system, administered via the web based management console
- Accessibility standards
- None or don’t know
- Description of accessibility
- N/A
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- The Cloudflare API exposes the entire Cloudflare functionality via a programmatic interface. You can manage your account settings, configure products, and develop applications using the Cloudflare API.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Policies can be customised from within the console by the customer to handle risky emails
Scaling
- Independence of resources
-
"Cloud Email Security is provided by Cloudflare's Anycast architecture and software-based security implementation to ensure high reliability and scalability across our 270+ data centres, facilitating up to a 142 TB/sec throughput.
All of our services run on all of our servers, in every data centre, paired with a 100% Anycast architecture. Anycast network routing is able to route incoming connection requests across multiple data centres"
Analytics
- Service usage metrics
- Yes
- Metrics types
- Service data is provided through a Status page (public and available within the portal and through API) as well as visibility into the delivery queues (via portal).
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Cloudflare
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via reports or SIEM integrations
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- Other
- Other data import formats
- Not applicable as service monitors emails being sent
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
"100% uptime guarantee
" - Approach to resilience
-
" Cloudflare's network is based on Anycast routing, any one of thousands of servers in 270+ locations around the world is able to provide all of our service functionality on a given IP address. The network is the most interconnected network in the world - present in more Internet Exchanges globally than any other. The network is designed to cope with many nodes on the network map becoming unavailable and still providing service.
Data centres are regularly taken offline for among other reasons maintenance without any service degradation. Should a certain location become unavailable due to high load from an attack, we will proactively re-route our prioritised Enterprise service level customers to ensure the minimal impact is seen for your application users in that region.
Within each datacenter, no single server/node is responsible for any service. These are also distributed across all metals such that server failures, hardware or networking issues won't impact the service/performance of our customers." - Outage reporting
- Public dashboard, email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- User name and password with 2-factor authentication/Single Sign On via standards based strong authentication methods i.e. using a customer's choice of federated identity if available
- Access restrictions in management interfaces and support channels
-
"Cloudflare provisions access based on the principles of least privilege and need to know. Additional access must be requested via our internal ticketing system and it requires both a legitimate business reason and manager approval. Logging and Monitoring Policy requires logging of activities in critical systems. We perform quarterly access reviews for privileged access
Cloudflare's 24/7 Detection and Response team monitors logs/alerts for malicious activity on both servers and endpoints." - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Description of management access authentication
- User name and password with 2-factor authentication/Single Sign On.A Customer's administrator must log in using username, password and two factor authentication code.
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Schellman
- ISO/IEC 27001 accreditation date
- 16/03/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- PSC (Part of the NCC Group
- PCI DSS accreditation date
- 18/03/2024
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 27701:2019
- ISO 27018
- SOC 2 Type II
- PCI DSS 3.2.1
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
"Cloudflare has the following certifications/external accredited audits for compliance with these standards:
ISO 27001:2013
ISO 27701:2019
ISO 27018
SOC 2 Type II
PCI DSS 3.2.1
Cloudflare has a security team made up of approx.70 individuals. Our security team is headed by the Chief Security Officer and contains: Governance Risk and Compliance, Program Management Organisation, Product Security (App Sec), Engineering (Edge), Incident Response/Threat Intel, and Physical Security. Each of those directs has team members that report directly to them."
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
"Changes to server configurations are tracked via Cloudflare's ticketing system. These changes are peer reviewed and receive additional review by a member of the Site Reliability Engineering team. Major changes require rollback procedures and are vetted for potential impact to products and services.
Major releases undergo Security Architecture reviews.Cloudflare conducts static code scans of its code base. Cloudflare also scans its dependencies for vulnerabilities.
Enterprise risk assessments are conducted annually, and targeted risk assessments are conducted throughout the year. Risks also include vulnerabilities and deficiencies that are observed by other teams." - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- " Cloudflare's Vulnerability Management Policy is aligned with PCI-DSS, ISO27001, and SOC 2. Cloudflare subscribes to intelligence feeds and leverages open source vulnerability databases such as the NVD. Cloudflare has a Bug Bounty program in place which leverages a community of security researchers to uncover vulnerabilities that may have been missed by our penetration test."
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
"A 24/7 Detection and Response team monitors logs/alerts for malicious activity on both servers and endpoints.
" - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Users can report incidents via the Cloudflare dashboard or Enterprise phone line. Cloudflare also monitors other channels, such as social media, to ensure that we are aware of any potential issue in the provision of service. Pre-defined processes exist for incident management, including common events. Incidents are subject to Cloudflare's Security Incident Response Policy, which includes requirements for root cause analysis and full reporting.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
"Transparency is one of Cloudflare's core values. It's how we work to build trust with our customers in everything we do, and that includes our sustainability efforts. Our goal is simple: help build a better, greener Internet with no carbon emissions that is powered by renewable energy.
To help us get there, Cloudflare is making two announcements. The first is that we're committed to powering our network with 100% renewable energy. This builds on work we started back in 2018, and we think is clearly the right thing to do. We also believe it will ultimately lead to more efficient, more sustainable, and potentially cheaper products for our customers.
The second is that by 2025 Cloudflare aims to remove all greenhouse gases emitted as the result of powering our network since our launch in 2010. As we continue to improve the way we track and mitigate our carbon footprint, we want to help the Internet begin with a fresh start.
As part of our effort to track and mitigate our emissions, we publish an annual carbon emissions inventory report. The report provides detail on exactly how we calculate our carbon emissions as well as our renewable energy purchases. Cloudflare has also committed to setting near-term companywide emissions reduction targets in line with climate science with the SBTi.
"
Pricing
- Price
- £6.16 a user
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Entities who are evaluating Cloudflare's Enterprise service may conduct a Proof of Concept supported by Cloudflare. Sign up for a proof of value by contacting Cloudflare.