Activate phishing-resistant MFA with Cloudflare

Thwart phishing scams by enforcing strong authentication

Phishing remains one of the most prevalent kinds of threats—and it is often just the first step in a larger attack. Implementing FIDO2-compliant multi-factor authentication (MFA) as part of a Zero Trust security approach neutralizes the threat posed by multi-channel phishing.

Phishing resistant MFA - HERO - Image

The Cloudflare difference

Security lock icon
Reduce multi-channel phishing risk

Avoid vulnerabilities of other authentication methods. Unlike one-time PINs, FIDO2 MFA cannot be intercepted by an attacker. Implement MFA broadly — and require it — through Zero Trust policies.

Icon squared - Phishing
Enhance your access management

Augment your identity provider (or multiple providers) with Zero Trust Network Access (ZTNA) to easily enforce FIDO2 MFA across more resources.

Security shield protection checkmark - Icon
Maximize MFA impact

Avoid vulnerabilities of other authentication methods. Unlike one-time PINs, FIDO2 MFA cannot be intercepted by an attacker. Implement MFA broadly — and require it — through Zero Trust policies.

HOW IT WORKS

Defeat phishing with FIDO2 MFA and Cloudflare

Cloudflare’s Zero Trust platform can enforce FIDO2 MFA consistently across SaaS, self-hosted, and non-web resources.

  • Implement Cloudflare’s ZTNA service to apply strict contextual verification for accessing all your organization’s resources.
  • Bolster security with FIDO2-compliant MFA that makes it nearly impossible to intercept or steal users’ credentials.
  • Selectively enforce strong MFA, starting with sensitive apps. Go beyond just supporting FIDO2 MFA and start to require it.
  • Enable broad deployment. Not all apps support FIDO2 MFA natively. As an aggregation layer, Cloudflare’s ZTNA service helps roll it out to all resources.
[ZT PMM] Phishing resistant MFA diagram

What our customers are saying

Man on laptop
Cloudflare logo

The Cloudflare security team needed to rapidly address a phishing attack that attempted to harvest and then use Okta login credentials from employees. Though the attackers successfully stole credentials and attempted to log in, they could not overcome the security key login requirement of Cloudflare’s Zero Trust implementation.

Requiring FIDO2-compliant MFA, like security keys, as part of Zero Trust access policies for all users and apps can strengthen the barrier against multichannel phishing attacks.

“While the attacker attempted to log in to our systems with compromised credentials, they could not get past the hard key requirement.”

Ready to discuss phishing-resistant MFA?

Contact us

Selecteer je functieniveau... *
C-Level
Directeur
Individuele medewerker
Manager
Overige
Student
VP
Selecteer je functie... *
DevOps
Financiën/Inkoop
Infrastructuur
IT
Leidinggevende
Netwerk
Overige
Pers/media
Product
Student
Techniek
Veiligheid
Verkoop/Marketing
Selecteer uw land...
Afganistan
Aland-eilanden
Albanië
Algerije
Andorra
Angola
Anguilla
Antigua en Barbuda
Argentinië
Armenië
Aruba
Australië
Azerbajdzjan
Bahama's
Bahrein
Bangladesh
Barbados
België
Belize
Benin
Bermuda
Bhutan
Bolivia, Plurinationale Staat van
Bonaire, Sint Eustatius en Saba
Bosnië en Herzegovina
Botswana
Bouveteiland
Brazilië
Brits Indische Oceaanterritorium
Britse Maagdeneilanden
Brunei Darussalam
Bulgarije
Burkina Faso
Burundi
Cambodja
Canada
Centraal-Afrikaanse Republiek
Chili
China
Cocos (Keeling) Eilanden
Colombia
Comoren
Congo
Congo, de Democratische Republiek van
Cookeilanden
Costa Rica
Cuba
Curaçao
Cyprus
Democratische Volksrepubliek Laos
Denemarken
Djibouti
Dominica
Dominicaanse Republiek
Duitsland
Ecuador
Egypte
El Salvador
Equatoriaal-Guinea
Eritrea
Estland
Ethiopië
Faeröer
Falklandeilanden
Fiji
Filippijnen
Finland
Frankrijk
Frans-Guyana
Frans-Polynesië
Franse zuidelijke gebieden
Gabon
Gambia
Georgia
Ghana
Gibraltar
Grenada
Griekenland
Groenland
Guadeloupe
Guatemala
Guernsey
Guinea
Guinee-Bissau
Guyana
Haïti
Heard- en McDonaldeilanden
Honduras
Hongarije
Hongkong
Ierland
Ijsland
India
Indonesië
Irak
Iran
Israël
Italië
Ivoorkust
Jamaica
Japan
Jemen
Jersey
Jordanië
Kaaimaneilanden
Kaapverdië
Kameroen
Katar
Kazachstan
Kenia
Kersteiland
Kirgizië
Kiribati
Koeweit
Kroatië
Lesotho
Letland
Libanon
Liberia
Libië
Liechtenstein
Litouwen
Luxemburg
Macau
Macedonië, de Voormalige Joegoslavische Republiek
Madagaskar
Malawi
Maldiven
Maleisië
Mali
Malta
Man-eiland
Marokko
Martinique
Mauritanië
Mauritius
Mayotte
Mexico
Moldavië, Republiek
Monaco
Mongolië
Montenegro
Montserrat
Mozambique
Myanmar
Namibië
Nauru
Nederland
Nepal
Nicaragua
Nieuw-Caledonië
Nieuw-Zeeland
Niger
Nigeria
Niue
Noord-Korea
Noorwegen
Norfolkeiland
Oekraïne
Oezbekistan
Oman
Oostenrijk
Pakistan
Palestina
Panama
Papoea-Nieuw-Guinea
Paraguay
Peru
Pitcairn
Polen
Portugal
Puerto Rico
Reunion
Roemenië
Rusland
Rwanda
Saint Barthélemy
Saint Kitts en Nevis
Saint Martin (Frans deel)
Saint Pierre en Miquelon
Saint Vincent en de Grenadines
Salomonseilanden
Samoa
San Marino
Sao Tomé en Principe
Saoedi-Arabië
Senegal
Servië
Seychellen
Sierra Leone
Singapore
Sint Lucia
Sint-Helena, Ascension en Tristan da Cunha
Sint-Maarten (Nederlands deel)
Slovenië
Slowakije
Soedan
Somalië
Spanje
Sri Lanka
Suriname
Svalbard en Jan Mayen
Swaziland
Syrië
Tadzjikistan
Taiwan
Tanzania, Verenigde Republiek
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad en Tobago
Tsjaad
Tsjechië
Tunesië
Turkije
Turkmenistan
Turks- en Caicoseilanden
Tuvalu
Uganda
Uruguay
Vanuatu
Vaticaanstad
Venezuela, Bolivariaanse Republiek
Verenigd Koninkrijk
Verenigde Arabische Emiraten
Verenigde Staten
Vietnam
Wallis en Futuna
West-Sahara
Wit-Rusland
Zambia
Zimbabwe
Zuid-Afrika
Zuid-Georgië en de Zuidelijke Sandwicheilanden
Zuid-Korea
Zuid-Soedan
Zuidpoolgebied
Zweden
Zwitserland

 
In submitting this form, you agree to receive information from Cloudflare related to our products, events, and special offers. You can unsubscribe from such messages at any time. We never sell your data, and we value your privacy choices. Please see our Privacy Policy for information.

WHY CLOUDFLARE

Cloudflare’s connectivity cloud restores control and visibility to IT environments

Using Cloudflare’s unified platform of cloud-native services, you can implement a Zero Trust security model with strong MFA capabilities that conquer phishing schemes.

Icon container
Composable architecture

Address diverse security and networking needs with extensive interoperability and customizable networking.

ABM - Woolworths - Elevating the Digital Customer Journey - Card 1 - Icon
Performance

Deliver better user experiences with a global network that is approximately 50 ms from ~95% of Internet users.

Cloudflare radar - Tile
Threat intelligence

Prevent more attacks with intelligence gleaned from proxying ~20% of the web and blocking ~215 billion threats daily.

Mobile device icon
Unified interface

Reduce tool sprawl and alert fatigue by uniting every hybrid work security service in one UI.

Resources

Thumbnail - Report - Template 3 Graphs

Case study

How Cloudflare stopped a targeted phishing attack

Read how Cloudflare’s Zero Trust approach, including security keys, helped thwart a targeted phishing attack.

Read case study  
Blog Resource Thumbnail

BLOG POST

How Cloudflare implemented security keys

Learn the steps Cloudflare took to roll out FIDO2 security keys and Zero Trust to all apps and employees.

Read blog  

Phishing-resistant MFA FAQs