Activate phishing-resistant MFA with Cloudflare

Thwart phishing scams by enforcing strong authentication

Phishing remains one of the most prevalent kinds of threats—and it is often just the first step in a larger attack. Implementing FIDO2-compliant multi-factor authentication (MFA) as part of a Zero Trust security approach neutralizes the threat posed by multi-channel phishing.

Phishing resistant MFA - HERO - Image

The Cloudflare difference

Security lock icon
Reduce multi-channel phishing risk

Avoid vulnerabilities of other authentication methods. Unlike one-time PINs, FIDO2 MFA cannot be intercepted by an attacker. Implement MFA broadly — and require it — through Zero Trust policies.

Icon squared - Phishing
Enhance your access management

Augment your identity provider (or multiple providers) with Zero Trust Network Access (ZTNA) to easily enforce FIDO2 MFA across more resources.

Security shield protection checkmark - Icon
Maximize MFA impact

Avoid vulnerabilities of other authentication methods. Unlike one-time PINs, FIDO2 MFA cannot be intercepted by an attacker. Implement MFA broadly — and require it — through Zero Trust policies.

HOW IT WORKS

Defeat phishing with FIDO2 MFA and Cloudflare

Cloudflare’s Zero Trust platform can enforce FIDO2 MFA consistently across SaaS, self-hosted, and non-web resources.

  • Implement Cloudflare’s ZTNA service to apply strict contextual verification for accessing all your organization’s resources.
  • Bolster security with FIDO2-compliant MFA that makes it nearly impossible to intercept or steal users’ credentials.
  • Selectively enforce strong MFA, starting with sensitive apps. Go beyond just supporting FIDO2 MFA and start to require it.
  • Enable broad deployment. Not all apps support FIDO2 MFA natively. As an aggregation layer, Cloudflare’s ZTNA service helps roll it out to all resources.
[ZT PMM] Phishing resistant MFA diagram

What our customers are saying

Man on laptop
Cloudflare logo

The Cloudflare security team needed to rapidly address a phishing attack that attempted to harvest and then use Okta login credentials from employees. Though the attackers successfully stole credentials and attempted to log in, they could not overcome the security key login requirement of Cloudflare’s Zero Trust implementation.

Requiring FIDO2-compliant MFA, like security keys, as part of Zero Trust access policies for all users and apps can strengthen the barrier against multichannel phishing attacks.

“While the attacker attempted to log in to our systems with compromised credentials, they could not get past the hard key requirement.”

Ready to discuss phishing-resistant MFA?

Contact us

Pilih tingkat pekerjaan Anda... *
C-Level
Direktur
Kontributor Perorangan
Lainnya
Manajer
Siswa
VP
Pilih fungsi pekerjaan Anda... *
DevOps
Eksekutif
Infrastruktur
Jaringan
Keamanan
Keuangan/ Pengadaan
Lainnya
Penjualan / Pemasaran
Pers / Media
Produk
Rekayasa
Siswa
TI
Pilih Negara Anda...
Afghanistan
Afrika Selatan
Albania
Aljazair
Amerika Serikat
Andorra
Angola
Anguilla
Antartika
Antigua dan Barbuda
Arab Saudi
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahama
Bahrain
Bangladesh
Barbados
Belanda
Belarusia
Belgia
Belize
Benin
Bermuda
Bhutan
Bonaire, Sint Eustatius dan Saba
Bosnia dan Herzegovina
Botswana
Brasil
Britania Raya
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cape Verde
Chad
Chili
China
Curaçao
Denmark
Djibouti
Dominika
Ekuador
El Salvador
Eritrea
Estonia
Ethiopia
Federasi Rusia
Fiji
Filipina
Finlandia
Gabon
Gambia
Georgia
Ghana
Gibraltar
Greenland
Grenada
Guadeloupe
Guatemala
Guernsey
Guinea
Guinea Ekuator
Guinea-Bissau
Guyana
Guyana Prancis
Haiti
Honduras
Hong Kong
Hungaria
India
Indonesia
Irak
Iran
Irlandia
Islandia
Israel
Italia
Jamaika
Jepang
Jerman
Jersey
Kaledonia Baru
Kamboja
Kamerun
Kanada
Kazakhstan
Kenya
Kepulauan Aland
Kepulauan Cayman
Kepulauan Cocos (Keeling)
Kepulauan Cook
Kepulauan Falkland (Malvinas)
Kepulauan Faroe
Kepulauan Georgia Selatan dan Sandwich Selatan
Kepulauan Solomon
Kepulauan Turks dan Caicos
Kepulauan Virgin, Inggris
Kirgistan
Kiribati
Kolombia
Komoro
Kongo
Korea Selatan
Korea Utara
Kosta Rika
Kroasia
Kuba
Kuwait
Latvia
Lebanon
Lesotho
Liberia
Libya
Liechtenstein
Lithuania
Luxemburg
Madagaskar
Makau
Makedonia, sebelumnya Republik Yugoslavia
Maladewa
Malawi
Malaysia
Mali
Malta
Maroko
Martinique
Mauritania
Mauritius
Mayotte
Meksiko
Mesir
Monako
Mongolia
Montenegro
Montserrat
Mozambik
Myanmar
Namibia
Nauru
Negara Plurinasional Bolivia
Nepal
Niger
Nigeria
Nikaragua
Niue
Norwegia
Oman
Pakistan
Palestina
Panama
Pantai Gading
Papua Nugini
Paraguay
Peru
Pitcairn
Polandia
Polinesia Prancis
Portugal
Prancis
Puerto Riko
Pulau Bouvet
Pulau Heard dan Kepulauan McDonald
Pulau Man
Pulau Natal
Pulau Norfolk
Qatar
Republik Afrika Tengah
Republik Bersatu Tanzania
Republik Bolivarian Venezuela
Republik Ceko
Republik Demokratik Kongo
Republik Demokratik Rakyat Laos
Republik Dominika
Republik Moldova
Reunion
Rumania
Rwanda
Sahara Barat
Saint Barthélemy
Saint Helena, Ascension dan Tristan da Cunha
Saint Kitts dan Nevis
Saint Lucia
Saint Martin (bagian Prancis)
Saint Pierre dan Miquelon
Saint Vincent dan Grenadines
Samoa
San Marino
Sao Tome dan Principe
Selandia Baru
Senegal
Serbia
Seychelles
Sierra Leone
Singapura
Sint Maarten (bagian Belanda)
Siprus
Slovakia
Slovenia
Somalia
Spanyol
Sri Lanka
Sudan
Sudan Selatan
Suriah
Suriname
Svalbard dan Jan Mayen
Swaziland
Swedia
Swiss
Taiwan
Tajikistan
Takhta Suci (Negara Kota Vatikan)
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad dan Tobago
Tunisia
Turki
Turkmenistan
Tuvalu
Uganda
Ukraina
Uni Emirat Arab
Uruguay
Uzbekistan
Vanuatu
Vietnam
Wallis dan Futuna
Wilayah Samudra Hindia Britania
Wilayah Selatan Prancis
Yaman
Yordania
Yunani
Zambia
Zimbabwe

 
In submitting this form, you agree to receive information from Cloudflare related to our products, events, and special offers. You can unsubscribe from such messages at any time. We never sell your data, and we value your privacy choices. Please see our Privacy Policy for information.

WHY CLOUDFLARE

Cloudflare’s connectivity cloud restores control and visibility to IT environments

Using Cloudflare’s unified platform of cloud-native services, you can implement a Zero Trust security model with strong MFA capabilities that conquer phishing schemes.

Icon container
Composable architecture

Address diverse security and networking needs with extensive interoperability and customizable networking.

ABM - Woolworths - Elevating the Digital Customer Journey - Card 1 - Icon
Performance

Deliver better user experiences with a global network that is approximately 50 ms from ~95% of Internet users.

Cloudflare radar - Tile
Threat intelligence

Prevent more attacks with intelligence gleaned from proxying ~20% of the web and blocking ~215 billion threats daily.

Mobile device icon
Unified interface

Reduce tool sprawl and alert fatigue by uniting every hybrid work security service in one UI.

Resources

Thumbnail - Report - Template 3 Graphs

Case study

How Cloudflare stopped a targeted phishing attack

Read how Cloudflare’s Zero Trust approach, including security keys, helped thwart a targeted phishing attack.

Read case study  
Blog Resource Thumbnail

BLOG POST

How Cloudflare implemented security keys

Learn the steps Cloudflare took to roll out FIDO2 security keys and Zero Trust to all apps and employees.

Read blog  

Phishing-resistant MFA FAQs