PARTNERS

Endpoint Security Partnerships

Securing sensitive resources means ensuring every connection originates from trusted devices and verified users.

Cloudflare is partnering with leading endpoint security providers to make Zero Trust security seamless for organizations. Cloudflare Zero Trust customers can now configure rules to restrict access to sensitive resources based on the device posture signals from our partners' endpoint security platforms.

Cloudflare Endpoint Security Partnerships

Välj din jobbnivå … *
Annat
C-nivå
Chef
Direktör
Individuell medverkande
Student
VP
Välj din jobbroll … *
Annat
Chef
DevOps
Finans/anskaffning
Försäljning/marknadsföring
Infrastruktur
IT
Nätverk
Press/Media
Produkt
Student
Säkerhet
Teknik
Välj land …
Afghanistan
Albanien
Algeriet
Andorra
Angola
Anguilla
Antarktis
Antigua och Barbuda
Argentina
Armenien
Aruba
Australien
Azerbajdzjan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgien
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius och Saba
Bosnien och Hercegovina
Botswana
Bouvetön
Brasilien
Brittiska Jungfruöarna
Brittiska territoriet i Indiska oceanen
Brunei
Bulgarien
Burkina Faso
Burundi
Caymanöarna
Centralafrikanska republiken
Chile
Colombia
Cooköarna
Costa Rica
Curaçao
Cypern
Danmark
Djibouti
Dominica
Dominikanska republiken
Ecuador
Egypten
Ekvatorialguinea
El Salvador
Elfenbenskusten
Eritrea
Estland
Etiopien
Falklandsöarna
Fiji
Filippinerna
Finland
Frankrike
Franska Guyana
Franska Polynesien
Franska sydterritorierna
Färöarna
Förenade arabemiraten
Gabon
Gambia
Georgien
Ghana
Gibraltar
Grekland
Grenada
Grönland
Guadeloupe
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard- och McDonaldöarna
Heliga stolen (Vatikanstaten)
Honduras
Hongkong
Indien
Indonesien
Irak
Iran
Irland
Island
Isle of Man
Israel
Italien
Jamaica
Japan
Jemen
Jersey
Jordanien
Julön
Kambodja
Kamerun
Kanada
Kap Verde
Kazakstan
Kenya
Kina
Kirgizistan
Kiribati
Kokosöarna
Komorerna
Kongo
Kongo-Kinshasa
Kroatien
Kuba
Kuwait
Laos
Lesotho
Lettland
Libanon
Liberia
Libyen
Liechtenstein
Litauen
Luxemburg
Macao
Madagaskar
Malawi
Malaysia
Maldiverna
Mali
Malta
Marocko
Martinique
Mauretanien
Mauritius
Mayotte
Mexiko
Moldavien
Monaco
Mongoliet
Montenegro
Montserrat
Mozambique
Myanmar
Namibia
Nauru
Nederländerna
Nepal
Nicaragua
Niger
Nigeria
Niue
Nordkorea
Nordmakedonien
Norfolkön
Norge
Nya Kaledonien
Nya Zeeland
Oman
Pakistan
Palestina
Panama
Papua Nya Guinea
Paraguay
Peru
Pitcairnöarna
Polen
Portugal
Puerto Rico
Qatar
Réunion
Rumänien
Rwanda
Ryska federationen
Saint Kitts och Nevis
Saint Lucia
Saint Vincent och Grenadinerna
Saint-Barthélemy
Saint-Martin (franska delen)
Saint-Pierre och Miquelon
Salomonöarna
Samoa
San Marino
Sankta Helena, Ascension och Tristan da Cunha
São Tomé och Príncipe
Saudiarabien
Schweiz
Senegal
Serbien
Seychellerna
Sierra Leone
Singapore
Sint Maarten (nederländska delen)
Slovakien
Slovenien
Somalia
Spanien
Sri Lanka
Storbritannien
Sudan
Surinam
Svalbard och Jan Mayen
Sverige
Swaziland
Sydafrika
Sydgeorgien och Sydsandwichöarna
Sydkorea
Sydsudan
Syrien
Tadzjikistan
Taiwan
Tanzania
Tchad
Thailand
Tjeckien
Togo
Tokelau
Tonga
Trinidad och Tobago
Tunisien
Turkiet
Turkmenistan
Turks- och Caicosöarna
Tuvalu
Tyskland
Uganda
Ukraina
Ungern
Uruguay
USA
Uzbekistan
Vanuatu
Venezuela
Vietnam
Västsahara
Wallis- och Futunaöarna
Zambia
Zimbabwe
Åland
Österrike
Östtimor

 
In submitting this form, you agree to receive information from Cloudflare related to our products, events, and special offers. You can unsubscribe from such messages at any time. We never sell your data, and we value your privacy choices. Please see our Privacy Policy for information.

Endpoint security illustration

Our partners

Device posture rules illustration

Never trust, always verify device posture

Add device posture signals to Cloudflare’s zero trust platform to make sure every connection to corporate apps is verified for user and device posture.

When a user logs in to an application protected by Cloudflare, we verify whether the device is managed by an endpoint security provider and also cross check the user's identity with their identity provider. The result — every connection to your corporate application gets an additional layer of identity and device assurance and users avoid having to fire up a VPN to get connected.

Benefits

ABM - Stryker - Secure your AI initiatives with Cloudflare - 6 icons - Card 1 - Icon
Global reach

Bring enforcement decisions within approximately 50 ms of about 95% of the world’s Internet-connected population.

Ease of use - Tile
Easy setup

Add device posture signals into Cloudflare Zero Trust policies with just a few clicks.

Process stack - Icon
Integration with multiple providers

Mix and match across endpoint security and identity providers.

What our customers are saying

Report testimonial - Thumbnail
Tanium logo

''Zero Trust security architectures started at the network level with segmentation and enforcement, but as corporate resources and data increasingly live on endpoints, a Zero Trust architecture must take both the endpoint and the network into consideration. Knowing the identity of the endpoint, as well as knowing that it's up-to-date, hardened against security threats and hasn’t been compromised, is paramount in ensuring secure access to an organization's resources.''

Pete Constantine, Chief Product Officer, Tanium

What our customers are saying

Cloudflare Rate Limiting - Testimonial - Image
SentinelOne logo

“Enterprises have come to terms with the notion of a disintegrating traditional perimeter. The distributed and dynamic perimeter of today requires a fundamentally new approach to security. In partnership with Cloudflare, our AI-powered cybersecurity platform offers modern enterprises a more robust Zero Trust security solution that spans the devices, the network, and the mission-critical applications enterprises rely on.”

Chuck Fontana, Senior Vice President, Business & Corporate Development, SentinelOne

What our customers are saying

ZT Access - Testimonial  - Content - image
VMWare Carbon Black Logo

“The VMware Carbon Black Cloud consolidates multiple endpoint and workload security offerings into a single, cloud native platform. Leveraging VMware Carbon Black Cloud, Cloudflare can help customers secure and manage devices connecting to their cloud and Zero Trust networks.”

Tom Corn, Senior Vice President, Security, VMWare Carbon Black

What our customers are saying

Gateway product - placeholder
Tanium logo

"Zero Trust security architectures started at the network level with segmentation and enforcement, but as corporate resources and data increasingly live on endpoints, a Zero Trust architecture must take both the endpoint and the network into consideration. Knowing the identity of the endpoint, as well as knowing that it's up-to-date, hardened against security threats and hasn’t been compromised, is paramount in ensuring secure access to an organization's resources."

Pete Constantine,
Chief Product Officer, Tanium

Resources

Blog Resource Thumbnail

Blog

Introducing Cloudflare One

Cloudflare One is a Zero Trust network-as-a-service platform that dynamically connects users to enterprise resources, with identity-based security controls delivered close to users, wherever they are. Read the blog post that first articulated Cloudflare's vision for SASE transformation.

Read blog
Thumbnail - Product update - template 3 video player person waving

Solution & Product Guides

Cloudflare's Zero Trust Integrations

Cloudflare empowers your organization with flexibility to build on the identity, endpoint protection, and cloud providers you already use and avoid vendor lock-in. Learn how we approach technology integrations and partnerships for our Zero Trust platform, Teams.

Download PDF
Thumbnail - Blog post - Template 1 - Lava lamp

Blog

New device security partnerships for Cloudflare One

Learn how Cloudflare's integrations with leading endpoint providers helped Cloudflare Zero Trust customers restrict access to applications based on security signals from their devices.

Read blog