Cloudflare Gateway

A cloud-native, low-latency Secure Web Gateway (SWG)

With visibility into approximately 20% of the web, Cloudflare’s unmatched network scale protects employee Internet browsing and blocks breach-causing threats.

Benefits of Cloudflare Gateway

icon - performance bolt
Accelerate user Internet access

No more traffic backhauling. Our single-pass inspection is 50% faster than SWG alternatives.

Security shield protection checkmark - Icon
Block known and unknown threats

Cloudflare's DNS and HTTP telemetry and threat detection models catch more risks.

Eyeball Tile - Icon
Monitor traffic across your network

Stack in-line Zero Trust services to provide holistic Internet traffic visibility across users, devices, and locations.

Performance wrench - Icon
Easy implementation and management

Streamline policy building and auditing with predefined categories.

How it works

Inspect browser traffic from our global network

Our Secure Web Gateway runs everywhere in Cloudflare’s global network, letting you inspect traffic wherever employees work.

It also runs in-line with our data loss prevention and remote browser isolation — offering secure browsing with no disruptions.

Secure web gateway how it works diagram

Learn how Gateway works within Cloudflare’s SASE platform

ANALYST RECOGNITION

What top analysts say

Analyst Image - Gartner
Cloudflare named a Visionary in 2025 Gartner® Magic Quadrant™ for SASE Platforms
Read report
Analyst image - Forrester
Scored 2nd highest in ‘Strategy’ category in The Forrester Wave™: Zero Trust Platforms, Q3 2025
Read report
Analyst image - Forrester
Cloudflare a Strong Performer in The Forrester Wave™: Email, Messaging, And Collaboration Security Solutions, Q2 2025
Read report

What our customers are saying

Gateway product - placeholder
Algolia Logo

“Algolia is growing pretty fast. We needed a way to have visibility across our corporate network without slowing things down for our employees. Gateway gave us a simple way to do that.”

Director of Infrastructure & Security

TOP GATEWAY USE CASES

Icon squared - Filtering
Remote work security

Protect “work-from-anywhere” users from malware, ransomware, and other online cyber threats.

Office branch icon
Secure guest WiFi

Defend against cyber threats, enforce acceptable use, and optimize visitor experiences on guest WiFi networks.

Security shield protection checkmark - Icon
Protect your sensitive data

Regain full forward-proxy visibility and control over sensitive data and source code across web, SaaS, and private applications.

Helping organizations worldwide progress towards Zero Trust

Pricing

Threat protection features across full Zero Trust platform

Free Plan

$0

forever

Best for teams under 50 users or enterprise proof-of-concept tests.

Pay-as-you-go

$7

per user/month (paid annually)

Best for teams over 50 users solving narrow SSE use cases and do not require enterprise support services.

Contract Plan

Custom price

per user/month (paid annually)

Best for organizations building toward a full-featured SSE or SASE deployment that also desire maximum support.

Threat Protection

Comprehensive security categories
Comprehensive security categories

Block by ransomware, phishing, DGA domains, DNS tunneling, C2 & botnet, and more.

Recursive DNS filtering
Recursive DNS filtering

Filter by security or content category. Deploy via our device client or via routers for locations.

HTTP(S) filtering
HTTP(S) filtering

Control traffic based on source, destination country, domains, hosts, HTTP methods, URLs, and more. Unlimited TLS 1.3 inspection.

L4 firewall filtering
L4 firewall filtering

Allow or block traffic based on ports, IPs, and TCP/UDP protocols.

Antivirus inspection
Antivirus inspection

Scan uploaded / downloaded files across types (PDFs, ZIP, RAR, etc.).

Integrated threat intelligence
Integrated threat intelligence

Detection via our own machine learning algorithms and third-party threat feeds.

IPv6-only & dual stack support
IPv6-only & dual stack support

All functionality available for IPv4 and IPv6 connectivity.

SSH proxying and command logging
SSH proxying and command logging

Create network policies to manage and monitor SSH access to your applications.

Network-level policies for physical locations
Network-level policies for physical locations

Secure connectivity for DNS filtering directly from offices.

Remote Browser Isolation (natively integrated)
Remote Browser Isolation (natively integrated)

Render all browser code at the edge, instead of locally, to mitigate threats. Deploy with or without a device client. Selectively control what activity to isolate and when.

Email security
Email security

Stop phishing and business email compromise.

Proxy endpoints for PAC file support
Proxy endpoints for PAC file support

Apply HTTP policies at the browser level by configuring a PAC file. Apply filters without deploying client software on user devices.

Dedicated egress IPs
Dedicated egress IPs

Dedicated range of IPs (IPv4 or IPv6) geolocated to one or more Cloudflare network locations.

Core Capabilities

Usage
Uptime
Uptime

Dependable service level agreements (SLA) for paid plans with 100% uptime and reliable service you can trust.

Learn more
Support and services
Support and services

Support options vary by plan type. Various professional advisory and hands-on implementation services available as add-on to Contract plans.

Standard log retention
Standard log retention

Zero Trust logs are stored for a varying period of time based on the plan type and service used. Contract users can export logs via Logpush.

See tech docs
Application connector software
Application connector software

Securely connects resources to Cloudflare without a publicly routable IP address. Does not require VM infrastructure and has no throughput limitations.

See tech docs
Device client (agent) software
Device client (agent) software

Securely and privately sends traffic from end user devices to Cloudflare’s global network. Enables capabilities like building device posture rules or enforcing filtering policies anywhere. Self-enroll or deploy via MDM.

See tech docs
Zero Trust Network Access (ZTNA)
Zero Trust Network Access (ZTNA)

ZTNA provides granular identity- and context-based access to all your internal self-hosted, SaaS, and non-web (e.g., SSH) resources.

See tech docs
Secure Web Gateway (SWG)
Secure Web Gateway (SWG)

SWG protects against ransomware, phishing, and other threats using L4-7 network, DNS, and HTTP filtering policies for faster, safer Internet browsing.

See tech docs
Digital Experience Monitoring (DEX)
Digital Experience Monitoring (DEX)

Provides user-centric visibility into device, network, and application performance across your Zero Trust organization.

See tech docs
Network flow monitoring
Network flow monitoring

Provides network traffic visibility and real-time alerts for unified insights into network activity. Available for free to everyone.

See tech docs
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)

CASB continuously monitors SaaS apps at rest to detect potential data exposure due to misconfigurations or weak posture findings.

See tech docs
Data Loss Prevention (DLP)
Data Loss Prevention (DLP)

DLP detects sensitive data in transit and at rest across web, SaaS, and private apps with controls or remediation guides to stop leakage or exposure.

See tech docs
Log Explorer
Log Explorer

Log Explorer provides native log storage, retention, and analytics of HTTP and security event logs. Learn more

PRICING

  • Pay-as-you-go: Free for the first 10 GB, $1 per GB per month after.
  • Contract: Custom pricing
Remote Browser Isolation (RBI)
Remote Browser Isolation (RBI)

RBI layers additional threat defense and data protection controls across browsing activities by running all browser code on Cloudflare's global network.

See tech docs
Email security
Email security

Email security helps block and isolate multichannel phishing threats, including malware and business email compromise.

See tech docs
Network services for SASE
Network services for SASE

Cloudflare One is our single-vendor SASE platform that converges Zero Trust security services from the plans above with Network services — including Magic WAN and Firewall.

See tech docs

Access Controls

Customizable access policies
Customizable access policies

Custom application and private network policies, plus policy tester. Supports temporary authentication, purpose justification, and any IdP-provided auth method.

Protect access to all your apps and private networks
Protect access to all your apps and private networks

Protect self-hosted, SaaS, and non-web (SSH, VNC, RDP) apps, internal IPs and hostnames, or any arbitrary L4–7 TCP or UDP traffic.

Authentication via Identity Providers (IdPs)
Authentication via Identity Providers (IdPs)

Authenticate via enterprise and social IdPs, including multiple IdPs concurrently. Can also use generic SAML and OIDC connectors.

Identity-based context
Identity-based context

Configure contextual access based on IdP groups, geolocation, device posture, session duration, external APIs, etc.

Device posture integration
Device posture integration

Verify device posture using third-party endpoint protection provider integrations.

Clientless access option
Clientless access option

Clientless access for web apps and browser-based SSH or VNC.

Browser-based SSH and VNC
Browser-based SSH and VNC

Privileged SSH and VNC access through in-browser terminal.

Split tunneling
Split tunneling

Split tunneling for local or VPN connectivity.

Application launcher
Application launcher

Customizable app launcher for all apps, including bookmarks to apps outside of Access.

Token authentication
Token authentication

Service token support for automated services.

Internal DNS support
Internal DNS support

Configure local domain fallback. Define an internal DNS resolver to resolve private network requests.

Infrastructure-as-code automation (via Terraform)
Infrastructure-as-code automation (via Terraform)

Automate deployment of Cloudflare resources and connections.

mTLS authentication
mTLS authentication

Certificate-based auth for IoT and other mTLS use cases.

Data Protection

Zero Trust access to mitigate data leakage (via ZTNA)
Zero Trust access to mitigate data leakage (via ZTNA)

Set least-privilege policies per application to ensure users only access data they need.

File upload / download controls based on Mime type (via SWG)
File upload / download controls based on Mime type (via SWG)

Allow or block uploads / downloads of files based on Mime type.

Application and application-type controls (via SWG)
Application and application-type controls (via SWG)

Allow or block traffic to specific apps or app types.

CASB to detect risk of data leakage from SaaS apps
CASB to detect risk of data leakage from SaaS apps

Add Cloudflare CASB to detect if misconfigurations in SaaS applications leak sensitive data. View full list of supported integrations.

Data Loss Prevention (DLP)
Data Loss Prevention (DLP)

Inspect HTTP(S) traffic and files for the presence of sensitive data. Free tier includes predefined profiles like financial info, while full-featured contract plans also include custom profiles, custom datasets, OCR, DLP logs, and more.

Controls over data interactions within a browser (via RBI)
Controls over data interactions within a browser (via RBI)

Restrict download, upload, copy/paste, keyboard input, and printing actions within isolated webpages and applications. Prevent data leakage onto local devices, and control user inputs on suspicious websites. Deploy with or without a device client.

SaaS App Protection

Inline access and traffic controls for every SaaS app
Inline access and traffic controls for every SaaS app

All access controls, data controls, and threat protection capabilities (as outlined in prior sections) apply consistently across SaaS apps.

SaaS app tenant controls
SaaS app tenant controls

Allow traffic only to corporate tenants of SaaS apps. Prevent leakage of sensitive data to personal or consumer tenants.

Shadow IT discovery
Shadow IT discovery

Review apps your end users visit. Set approval status for those apps.

In-depth SaaS app integrations
In-depth SaaS app integrations

Integrate with your most-used SaaS apps (e.g., Google Workspace, Microsoft 365) to scan, detect, and monitor for security issues. View full list of supported integrations.

Continuous monitoring of data security risks and user activities
Continuous monitoring of data security risks and user activities

API integrations continuously monitor SaaS apps for suspicious activities, data exfiltration, unauthorized access, and more.

File sharing detection
File sharing detection

Identify inappropriate file sharing behaviors within your most used SaaS apps.

SaaS app posture management and remediation
SaaS app posture management and remediation

Discover misconfigurations and incorrect user permissions within SaaS apps. Immediately action surfaced security findings with step-by-step remediation guides.

Data Loss Prevention (DLP)
Data Loss Prevention (DLP)

Inspect HTTP(S) traffic and files for the presence of sensitive data. Free tier includes predefined profiles like financial info, while full-featured contract plans also include custom profiles, custom datasets, OCR, DLP logs, and more.

Phishing detection for cloud-based email apps
Phishing detection for cloud-based email apps

Stop phishing and business email compromise with Cloudflare’s email security.

Visibility

Standard activity log retention
Standard activity log retention

On contract plans, DNS logs are stored 6 months, and HTTP and network logs for 30 days.

Access and authentication logs
Access and authentication logs

Comprehensive details for all requests, users, and devices, including block reasons. Block policy decisions are stored for a week, and authentication logs for 6 months.

App connector (tunnel) logs
App connector (tunnel) logs

Audit logs for the connection status of tunnels and for when a new DNS record is registered for an app.

Shadow IT visibility with categorized application groups
Shadow IT visibility with categorized application groups

Track usage and review approval status across applications end users visit.

SSH command logging
SSH command logging

Full replay of all commands run during an SSH session. Provides SSH visibility at a network layer.

Private network discovery
Private network discovery

Passively monitor private network traffic to catalog discovered apps and users who access them.

Exclude personally identifiable information (PII)
Exclude personally identifiable information (PII)

By default, logs will not store any employee PII (source IP, user email, user ID, etc.) and will be unavailable to all roles in your organization.

Digital Experience Monitoring (DEX)
Digital Experience Monitoring (DEX)

Provides predictive, historical, and real-time intelligence around application outages, network issues, and performance slow-downs to keep users productive. View capabilities.

Network flow monitoring
CASB findings
CASB findings

Findings are security issues detected within SaaS applications that involve users, data at rest, and other configuration settings. Free tier includes basic findings, while Contract plans include deeper details about each instance.

Redact PII
Redact PII

PII can be redacted from logs for all permission roles except for those specially designated.

Logpush to SIEM
Logpush to SIEM

Integrations with analytics and SIEM tools like Sumo Logic, Splunk, and Datadog.

Log Explorer
Log Explorer

Log Explorer provides native log storage, retention, and analytics of HTTP and security event logs. Learn more

PRICING

  • Pay-as-you-go: Free for the first 10 GB, $1 per GB per month after.
  • Contract: Custom pricing
Logpush to cloud storage
Logpush to cloud storage

Built-in support for one or more storage destinations concurrently including AWS, Azure, Google Cloud, and any S3-compatible API.

Network Performance and Connectivity On-ramps

Lightning-fast network speed
Lightning-fast network speed

50 ms away from 95% of the Internet-connected population globally.

Global Anycast network
Global Anycast network

Anycast network spanning 330 cities in 125 countries with 388 Tbps of network edge capacity.

Global interconnects
Global interconnects

13,000 interconnects, including major ISPs, cloud services, and enterprises.

One control plane for all edge services
One control plane for all edge services

Network architected so that every service operating at the edge is built to run in every data center and be available to every customer.

Single-pass inspection for L3–7 traffic
Single-pass inspection for L3–7 traffic

All traffic is processed in a single pass at the data center closest to its source. No backhauling.

Smart routing over virtual backbone
Smart routing over virtual backbone

Optimized routes to avoid congestion issues.

Device client (agent) software
Device client (agent) software

Available across all major OSes (Win, Mac, iOS, Android, Linux, ChromeOS).

Multiple modes for device client (agent)
Multiple modes for device client (agent)

Default mode sends traffic through WireGuard tunnels to enable the full range of security functionality.

Use DoH mode to only enforce DNS filtering policies, or use proxy mode to filter traffic only to specific apps.

Managed deployment and self-enrollment options
Managed deployment and self-enrollment options

Deploy to your entire device fleet via MDM tools. Or, users can download the device client themselves to self-enroll.

App connector (tunnels)
App connector (tunnels)

Connect resources to Cloudflare without a publicly routable IP address. Deploy via UI, API, or CLI.

Resources

Report thumbnail
Securing distributed workplaces

Modernize branch office security with approachable initial steps like location-based DNS filtering.

Read solution brief
Virtual workshop thumbnail
Multi-channel phishing threat defense

See how Cloudflare protects users, apps, and networks from multi-channel phishing.

Watch demo
Video thumbnail
Interactive tour of Cloudflare’s Zero Trust platform

Walk through key capabilities in a simulated dashboard, exploring workflows across 25+ short demo videos.

Tour our Zero Trust platform

Cloudflare Gateway FAQs

Security Shield Protection Icon

Get Cloudflare Gateway for your enterprise

Talk to an expert

选择您的职位级别……*
首席高管
副总裁
总监
经理
个人贡献者
学生
其他
选择您的工作职能……*
IT
安全
网络
基础设施
工程
DevOps
高管
产品
财务/采购
销售/营销
学生
新闻/媒体
其他
选择您的国家/地区...
阿富汗
阿兰群岛
阿尔巴尼亚
阿尔及利亚
安道尔
安哥拉
安圭拉
南极洲
安提瓜和巴布达
阿根廷
亚美尼亚
阿鲁巴
澳大利亚
奥地利
阿塞拜疆
巴哈马
巴林
孟加拉国
巴巴多斯
白俄罗斯
比利时
伯利兹
贝宁
百慕大
不丹
玻利维亚多民族国
博内尔岛、圣尤斯特歇斯和萨巴岛
波斯尼亚和黑塞哥维那
博茨瓦纳
布维岛
巴西
英属印度洋领地
文莱达鲁萨兰国
保加利亚
布基纳法索
布隆迪
柬埔寨
喀麦隆
加拿大
佛得角
开曼群岛
中非共和国
乍得
智利
中国大陆
圣诞岛
科科斯(基林)群岛
哥伦比亚
科摩罗
刚果民主共和国
刚果
库克群岛
哥斯达黎加
科特迪瓦
克罗地亚
古巴
库拉索
塞浦路斯
捷克共和国
丹麦
吉布提
多米尼加
多米尼加共和国
厄瓜多尔
埃及
萨尔瓦多
赤道几内亚
厄立特里亚
爱沙尼亚
埃塞俄比亚
福克兰群岛(马尔维纳斯)
法罗群岛
斐济
芬兰
法国
法属圭亚那
法属波利尼西亚
法属南部领土
加蓬
冈比亚
格鲁吉亚
德国
加纳
直布罗陀
希腊
格陵兰
格林纳达
瓜德罗普岛
危地马拉
格恩西岛
几内亚比绍
几内亚
圭亚那
海地
赫德和麦克唐纳群岛
梵蒂冈(教区)
洪都拉斯
中国香港特别行政区
匈牙利
冰岛
印度
印度尼西亚
伊朗
伊拉克
爱尔兰
马恩岛
以色列
意大利语
牙买加
日本
新泽西
约旦
哈萨克斯坦
肯尼亚
基里巴斯
科威特
吉尔吉斯斯坦
老挝人民民主共和国
拉脱维亚
黎巴嫩
莱索托
利比里亚
利比亚
列支敦士登
立陶宛
卢森堡
中国澳门特别行政区
前南斯拉夫马其顿共和国
马达加斯加
马拉维
马来西亚
马尔代夫
马里
马耳他
马提尼克
毛里塔尼亚
毛里求斯
马约特
墨西哥
摩尔多瓦共和国
摩纳哥
蒙古
黑山
蒙特塞拉特
摩洛哥
莫桑比克
缅甸
纳米比亚
瑙鲁
尼泊尔
荷兰
新喀里多尼亚
新西兰
尼加拉瓜
尼日尔
尼日利亚
纽埃
诺福克岛
朝鲜
挪威
阿曼
巴基斯坦
巴勒斯坦
巴拿马
巴布亚新几内亚
巴拉圭
秘鲁
菲律宾
皮特凯恩
波兰
葡萄牙
波多黎各
卡塔尔
留尼旺
罗马尼亚
俄罗斯联邦
卢旺达
圣巴泰勒米
圣赫勒拿、阿森松和特里斯坦达昆哈
圣基茨和尼维斯
圣卢西亚
圣马丁(法属)
圣皮埃尔和密克隆群岛
圣文森特和格林纳丁斯
萨摩亚
圣马力诺
圣多美和普林西比
沙特阿拉伯
塞内加尔
塞尔维亚
塞舌尔
塞拉利昂
新加坡
圣马丁(荷属)
斯洛伐克
斯洛文尼亚
所罗门群岛
索马里
南非
南乔治亚和南德桑威奇群岛
韩国
南苏丹
西班牙
斯里兰卡
苏丹
苏里南
斯瓦尔巴岛和扬马延岛
斯威士兰
瑞典
瑞士
叙利亚
台湾地区
塔吉克斯坦
坦桑尼亚联合共和国
泰国
东帝汶
多哥
托克劳
汤加
特立尼达和多巴哥
突尼斯
土耳其
土库曼斯坦
特克斯和凯科斯群岛
图瓦卢
乌干达
乌克兰
阿拉伯联合酋长国
英国
美国
乌拉圭
乌兹别克斯坦
瓦努阿图
委内瑞拉玻利瓦尔共和国
越南
英属维尔京群岛
瓦利斯和富图纳
西撒哈拉
也门
赞比亚
津巴布韦

 
In submitting this form, you agree to receive information from Cloudflare related to our products, events, and special offers. You can unsubscribe from such messages at any time. We never sell your data, and we value your privacy choices. Please see our Privacy Policy for information.