|
By Shlomo Kramer
This past year was a defining one for all of us at Cato Networks and for the industry at large. The enterprise networking and security market is undergoing a seismic shift—one that we have long anticipated. The days of fragmented, bolt-on security solutions are over. The market has spoken, and it’s clear: enterprises demand a single, converged platform to securely connect their operations everywhere. Cato is delivering exactly that.
|
By Eyal Webber Zvik
There was a time when owning a cassette or video player came with a side gig as a repair technician. Whether it was cleaning tape heads, fixing jammed reels, or rewinding tapes, maintenance was unavoidable. With streaming services, all of that effort has become a relic of the past. Music and videos now live in the cloud, accessible at any time, without the headaches of hardware upkeep. It’s a seamless experience—no more troubleshooting, just pure content consumption.
|
By Daniel Liber
Cato announced today that it’s become the first SASE platform vendor to achieve PCI DSS v4.0 compliance. More specifically, compliance with PCI DSS v4.0.1. While particularly significant for retailers handling payment data, PCI DSS v4.0 compliance will also benefit non-retailers strengthening their security posture, reducing risk exposure, and demonstrating compliance with industry best practice.
|
By Dave Greenfield
The latest recognition of Cato Networks in the 2025 GigaOm Radar Report for Secure Access Service Edge (SASE) is just the newest example of our continued excellence in secure networking. Cato was named a Leader and Outperformer for a second consecutive year. Recently, Cato has been recognized for its innovation and leadership in AI-driven security, overall security efficacy, and SD-WAN by Frost & Sullivan and GigaOm.
|
By Angie Oaks
Remote work. Cloud applications. Mobile devices. They’ve eliminated the days of traditional security perimeters. Today, security must happen at the device level—no matter where that device is. Zero Trust Network Access (ZTNA) earned its place as the G.O.A.T. for remote access—and rightly so. It revolutionized how enterprises secure remote work, but it has its limitations and challenges. UZTNA (Universal Zero Trust Network Access) is the next evolution in zero trust.
|
By Eyal Webber Zvik
As adults, we rarely question the safety of the medicine we consume. This confidence stems from knowing that these products undergo rigorous, independent testing before reaching pharmacy shelves. Security solutions, especially those critical to enterprise operations, deserve the same level of scrutiny. Before trusting a platform to safeguard our data and systems, it’s essential to verify that it can counter the sophisticated threats we face today.
|
By Etay Maor
There’s a new ransomware gang targeting critical infrastructure, government organizations, educational institutions, and energy sectors. Their name? Hellcat. But who exactly are they? Hellcat is a new ransomware gang that has surfaced across dark web forums in 2024. Hellcat employs a ransomware-as-a-service (RaaS) model, offering ransomware tools and infrastructure to affiliates in exchange for a share of the profits.
|
By Ido Klinger
Transparency in security practices is essential for building trust in today’s interconnected digital world. Organizations that openly share certifications, audit reports, and policies demonstrate a commitment to safeguarding data and adhering to standards. This openness fosters stronger partnerships and sets a benchmark for accountability.
|
By Christopher Rudolph
It’s becoming all too common these days: ransomware hitting another organization. However, most people don’t know exactly what happens when ransomware is found and what must be addressed. What makes it even more challenging for healthcare is that the data that can be stolen, like personal health information, is much more valuable than credit card numbers.
|
By Dolev Moshe Attiya
In a world where dozens of CVEs are released every day, there are vulnerabilities, and there are vulnerabilities. The latest Microsoft Windows LDAP (Lightweight Directory Access Protocol) vulnerabilities, which were coined not once but twice (“LDAPBleed” and “LDAPNightmare”), clearly belong to the shortlist of new and dangerous CVEs.
|
By Cato Networks
Innovation is at the heart of every successful transformation. Carlsberg Group is leading the way, enhancing network efficiency and security with the Cato SASE Cloud Platform.
|
By Cato Networks
Experience how Cato Networks' revolutionary Safe TLS Inspection eliminates the complexity of inspecting encrypted traffic without impacting performance or user experience. In this demo, see how Cato’s data-driven, automated approach selectively inspects only safe-to-inspect traffic, enabling organizations to uncover hidden threats, prevent data leaks, and fully leverage advanced security features like CASB and DLP. Discover how simple it is to activate this game-changing feature, unleashing the full potential of the Cato SASE Cloud with just a few clicks.
|
By Cato Networks
China is a vital market for global enterprises but often poses connectivity challenges due to strict regulations, unpredictable network performance, and complex compliance requirements. But what if you could turn these challenges into opportunities? Join Philip Walley as he introduces Cato SASE, the ultimate solution for seamless, secure, and high-performance global connectivity to and from China.
|
By Cato Networks
What do motorsport and cybersecurity have in common? Friedemann Kurz, Head of Porsche Motorsport IT, and Etay Maor, Chief Security Strategist at Cato Networks and Founding Member of Cato CTRL, discuss how both rely on teamwork and data to drive success.
|
By Cato Networks
Managing IoT/OT devices can be challenging, but Cato IoT/OT Security simplifies everything. In this demo, see how Cato's SASE platform enables real-time device discovery, granular visibility, and advanced threat prevention. Watch as malicious IoT activity is detected and blocked seamlessly—no extra products or complex setups required!
|
By Cato Networks
Discover how Cato Networks revolutionizes IoT/OT security with its SASE Cloud platform. Watch this demo to see how we ensure seamless visibility, precise policy enforcement, and real-time threat prevention for your enterprise, all while simplifying security management and enhancing operational continuity.
|
By Cato Networks
Managing firewall rules for IoT/OT devices can be complex—but not with Cato Networks. This video demonstrates how to create precise access rules for IoT/OT devices, like blocking Siemens PLC devices, using Cato's flexible, native SASE platform capabilities. Learn how Cato ensures secure, seamless operations. Visit our website for more info!
|
By Cato Networks
You may have heard of tools like ChatGPT and CoPilot, but do you know the difference between machine learning and generative AI? Join Robin Johns as he starts to explore the basic concepts of AI/ML, and how Cato Networks leverages this technology to help protect our customers.
|
By Cato Networks
Gamuda Berhad built what CNN described as one of the top 10 world’s greatest tunnels. Now learn how Gamuda transformed its IT operations and improved its security posture by moving to SASE.
|
By Cato Networks
When you put a cloud network in between your users and applications you can achieve bidirectional QoS. Of course, it helps to have a network edge service/appliance delivered by the same Cloud.
|
By Cato Networks
Organizations require an understanding of the positive ROI implications of security transformation with a holistic, cloud-delivered security architecture. A well-formed security transformation strategy provides an objective cost analysis of potential savings gained by retiring traditional security tools. Understanding how a single converged software stack provides both a financial ROI and a technical ROI will help organizations uncover hidden savings to be gained with their transformation projects.
|
By Cato Networks
When exploring a revolutionary architecture like SASE, it helps to have specific, relatable examples. SASE overlaps both networking and security spaces, sometimes making it difficult to see the whole picture. In this new eBook, we explore what SASE looks like for 5 different industry verticals: Retail & Hospitality, Manufacturing, Credit Unions, Health & Pharmaceuticals and Technology. Many of the benefits of SASE can provide value to any organization, so even if your specific vertical isn't covered, you should take a look!
|
By Cato Networks
While organizations realize they must deploy zero trust, knowing where to begin and how to deploy has become an impediment for many. The Cybersecurity and Infrastructure Agency (CISA) is one of several zero-trust maturity models that provide organizations with a measurable path to zero trust. The Cato SSE 360 architecture is a secure platform that helps facilitate Zero Trust maturity while delivering complete 360-degree protection for users, applications and data. This white paper will discuss how Cato SSE 360 can help facilitate Zero Trust Maturity.
|
By Cato Networks
Before SASE, network and network security services were delivered through multiple point solutions, including legacy appliances. These legacy appliances operated in silos and required countless IT resources and attention to deploy, manage, maintain, and replace. Today, some enterprises are still trapped using these legacy appliances, despite their shortcomings. In the parallel, modern world, SASE offers a single cloud-native network and security service for all networking and security needs.
|
By Cato Networks
Migrating a branch firewall to cloud? Pretty straightforward.... But enterprise security teams often find it challenging when contemplating moving the datacenter FW to the cloud. Unlike the branch firewall or UTM, the datacenter FW is responsible for providing visibility and control over inbound and outbound internet traffic, WAN traffic, vLAN traffic, and more. In this whitepaper, understand all the challenges that come with migrating your datacenter FW to the cloud, in addition to.
|
By Cato Networks
Your SSE project is right around the corner. Our helpful SSE RFP template allows you to meet both current and future security threats while ensuring that your key business objectives are met. Our template, divided into four sections, provides key questions to incorporate into your SSE RFP. This RFP template will allow you to easily identify.
- February 2025 (5)
- January 2025 (8)
- December 2024 (15)
- November 2024 (6)
- October 2024 (9)
- September 2024 (7)
- August 2024 (5)
- July 2024 (15)
- June 2024 (10)
- May 2024 (5)
- April 2024 (6)
- March 2024 (5)
- February 2024 (11)
- January 2024 (11)
- December 2023 (5)
- November 2023 (8)
- October 2023 (8)
- September 2023 (12)
- August 2023 (15)
- July 2023 (13)
- June 2023 (9)
- May 2023 (14)
- April 2023 (14)
- March 2023 (14)
Cato enables customers to gradually transform their networking and security infrastructure for the digital business. You can address one or more of the use cases below at your own pace. No matter where you start, Cato will support you throughout your journey.
Cato SASE Cloud with SSE 360 provides a global converged cloud-native service that securely and optimally connects all branches, datacenters, people, and clouds. Cato can be gradually deployed to replace or augment legacy network services and security point solutions.
Cato SASE Cloud:
- Converged: Cato converges SD-WAN and network security capabilities into a single pass architecture.
- Cloud-native: Cato is built from the ground up as an elastic, resilient, and scalable cloud service.
- Global: Cato is available across 75+ global PoPs to support any business location or user.
- All edges: Cato secures and optimizes traffic from all users, locations, clouds, and applications.
SASE, SSE, ZTNA, SD-WAN: Your journey, your way.