A roadmap to Zero Trust with Cloudflare and CrowdStrike
Achieve end-to-end protection across endpoints, networks, and applications


Every security leader understands the challenges that cloud migration and distributed workforces pose to their corporate network and endpoints, and the importance of moving to a Zero Trust architecture. But the journey to Zero Trust can seem complex and difficult.
This recorded session shares how Cloudflare offers one uniform, composable platform to make this journey extremely simple and effective for organisations of all sizes.
Watch now to discover how joint customers of Cloudflare and CrowdStrike use both platforms to achieve end-to-end protection across endpoints, networks, and applications.
Provided by
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Eset Protect Cloud Advanced review: An impressive arsenal of endpoint protection features
Reviews Policy management is complex, but Eset offers an affordable and flexible cloud-hosted solution
By Dave Mitchell Published
-
Microsoft Defender “obliterating” users with false password alerts
News Windows 11 devices have been affected by the Defender for Endpoint error, which flags SSO domains as problematic
By Rory Bathgate Published
-
Zero Trust myths: Fact or fiction?
Whitepaper What the myths get right and wrong about Zero Trust
By ITPro Published
-
ZTNA vs on-premises VPN
Whitepaper How ZTNA wins the network security game
By ITPro Published
-
Spanish spyware outfit uncovered, develops exploits for Windows, Chrome, and Firefox
News Google was only able to discover the company after an anonymous submission was made to its Chrome bug reporting programme
By Zach Marzouk Published
-
State-sponsored hackers delay new Microsoft Exchange Server by four years
News Hafnium's devastating zero-day exploit chain in 2021 forced Microsoft to improve the security of current versions instead of releasing the new one on schedule
By Connor Jones Published
-
Chinese hackers exploit Microsoft zero-day as list of vulnerable Office products grows
News Microsoft has published a support guide and temporary workarounds for IT admins to mitigate the threat
By Connor Jones Published
-
Microsoft's Windows Autopatch brings automated updates for IT admins
News Endpoint Manager updates also include targeted IT messages for organisations and more security controls
By Bobby Hellard Published