Cloudflare Launches New Zero Trust Tools for Secure AI Adoption at Scale
New innovations help security teams monitor AI usage, protect against Shadow AI and safeguard sensitive data, from a single centralized platform
Across every team – from finance and marketing to engineering and design – companies are using generative AI to work faster, streamline daily tasks, and create powerful new applications. However, this widespread adoption is frequently occurring without security or privacy in mind. For example, employees may accidentally paste confidential company information into chatbots, or engineers may deploy AI-driven apps without the input of their security teams. To prevent these risks, businesses need to understand and manage the use of AI so all employees can use it efficiently and safely—with security built in by default.
“Cloudflare is the best place to help any business roll out AI securely. We are the only company today that can offer the security of a
- Discover how employees are using AI: With Cloudflare’s new Shadow AI Report, security teams can get instant insights from their traffic to gain a clear, data-driven picture of their organization's AI usage. This granular view allows them to see not just that an employee is using an AI app, but which AI app, and what users are accessing it.
- Protect against Shadow AI: Cloudflare Gateway makes it easy to automatically enforce AI policies at the edge of Cloudflare’s network, ensuring consistent security for every employee, no matter where they work. Security teams can choose to fully block unapproved AI applications, limit the types of data uploaded into AI applications, and complete reviews of AI tools, to ensure they continue to meet security and privacy standards.
- Safeguard sensitive data without fully restricting AI usage: AIPrompt Protection allows security teams to identify potentially dangerous or risky employee interactions with AI models, and flag those prompts and responses. Policies can now be enforced inline at the prompt level to mitigate risk early on, and warn the employee about, or block them from, submitting sensitive data—like source code—being entered into an untrusted AI provider. This will give security teams the control they need to monitor company data that may be sent outside the organization, without fully restricting employees’ usage of AI tools.
-
Gain visibility of AI model interactions with tools outside the business: Zero Trust MCP Server Control consolidates all MCP tool calls—a request from an AI model or application to a server to execute a specific task—into a single dashboard. This visibility ultimately allows all MCP traffic, regardless of origin, to be routed through
Cloudflare for increased control and access management. Now, with centralized insights, security teams can set user-level policies at both the gateway and individual MCP server levels.
To learn more, please check out the resources below:
- Cloudflare One
- Blog: Best Practices for Securing Generative AI with Cloudflare SASE
- Blog: Unmasking the Unseen: Your Guide to Taming Shadow AI with Cloudflare One
About
Powered by one of the world’s largest and most interconnected networks,
Learn more about Cloudflare’s connectivity cloud at cloudflare.com/connectivity-cloud. Learn more about the latest Internet trends and insights at https://radar.cloudflare.com.
Follow us: Blog | X | LinkedIn | Facebook | Instagram
Forward-Looking Statements
This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended, which statements involve substantial risks and uncertainties. In some cases, you can identify forward-looking statements because they contain words such as “may,” “will,” “should,” “expect,” “explore,” “plan,” “anticipate,” “could,” “intend,” “target,” “project,” “contemplate,” “believe,” “estimate,” “predict,” “potential,” or “continue,” or the negative of these words, or other similar terms or expressions that concern Cloudflare’s expectations, strategy, plans, or intentions. However, not all forward-looking statements contain these identifying words. Forward-looking statements expressed or implied in this press release include, but are not limited to, statements regarding the capabilities and effectiveness of new features in the Cloudflare One suite of
The forward-looking statements made in this press release relate only to events as of the date on which the statements are made.
©2025
View source version on businesswire.com: https://www.businesswire.com/news/home/20250825753948/en/
Vice President, Head of
press@cloudflare.com
Source: