Security Research

Cato Networks was built with AI, security, and networking in its DNA. Our security capabilities are delivered from a single, cloud-native platform, with expert security researchers and data scientists working 24/7 to ensure customers benefit from the most advanced threat prevention and data protection. Cato provides enterprises of all sizes,  across all verticals, with consistent security inspection and enforcement – keeping them at an optimal security posture everywhere, anytime, for everyone and everything.

Security_Research

Cato CTRL

A cyber threats research lab collecting, analyzing, and reporting on external and internal threats and trends 

Cato CTRL (Cyber Threats Research Lab) is Cato Networks’ dedicated threat intelligence unit. It delivers Actionable, Reliable, and Timely (ART) insights to support strategic, operational, and tactical risk management. By analyzing internal network telemetry, external threat data, and applying expert human analysis, Cato CTRL equips SOC teams, leadership, and boards with critical intelligence. Its security reports, real‑time blogs, and webinars dissect threat actors’ tactics, tools, and procedures to strengthen enterprise security across the full threat lifecycle.

CTRL

Rapid CVE Mitigation

Automatic deployment of IPS rules to quickly adapt to new and critical CVEs

Cato’s Rapid CVE Mitigation provides automated virtual patching, proactively protecting enterprises from critical vulnerabilities before exploits occur. Leveraging the cloud-native IPS layer of its Single Pass Cloud Engine (SPACE), Cato quickly detects and neutralizes new CVEs in days—or sometimes even hours—eliminating manual patching delays. This capability significantly reduces enterprise exposure to threats that could lead to data breaches, service disruptions, and financial or reputational damage, ensuring continuous, optimal security posture without overloading IT security teams.

Rapid_CVE_Mitigation 

Cybersecurity Masterclass

Cutting edge research and analysis from renowned CISOs, researchers, law enforcement, and others

Cato’s Cybersecurity Masterclasses, hosted by Etay Maor (Cato’s Chief Security Strategist) and Cato CTRL experts, offer hands-on, case-driven deep dives into real-world cyber threats. Each ~60‑minute episode tackles topics ranging from OSINT and ransomware tactics to AI misuse, phishing evasion, supply chain compromises, and industrial control system risks. Geared toward security pros, IT teams, and C‑suite leaders, these sessions blend expert insight with practical guidance to help organizations stay ahead of the ever-evolving threat landscape. up-to-date protection with near zero false positives with no customer involvement.

Cybersecurity_Masterclass 

Research Reports

Detailed analysis of novel attacks, threat actors, and trends discovered by Cato CTRL

Cato’s Threat Research Reports, produced by Cato CTRL, surface real-world threat trends such as the resurgence of Log4j, rising in reputation‑based/phishing attacks, IoT and TOR misuse, and advanced techniques like deepfake voice cloning and AI‑assisted hacking. These reports uniquely fuse granular network telemetry, threat intelligence, AI and ML, MITRE ATT&CK mapping, and dark web insights—offering actionable intelligence and visibility critical for cybersecurity professionals aiming to anticipate and defend against evolving threats.

Upcoming Events

Hear Cato security researchers and experts speak at leading events

Cato CTRL researchers are featured at major security conferences, delivering unique insights on AI‑enhanced threats and evasive cyberattacks. In their talks, they spotlight how threat actors exploit IT complexity and use advanced evasion methods to bypass layered defenses. They’ve uncovered LLM jailbreak tactics like “Immersive World,” identified WormGPT variants, demonstrated AI‑powered systems that mine real‑time data from platforms like X, and revealed advanced stealth tactics used by adversaries to bypass cloud and network protections.

Upcoming_Events

Meet The Cato Security Research Team

Cato’s security research and engineering teams are built from ex-IDF cyber security analysts and data scientist that work together to make sure our customers are always protected against known and emerging cyber threats and attacks. Their area of expertise span across advanced attack analysis, reverse engineering, software development, data science, and AI (artificial intelligence) and ML (machine learning).

Elad Menahem – VP Research

Learn about the unique background of Cato’s security personnel and why converging security and networking data is critical for any security researcher.

Avishay Zawoznik – Security Research Manager: Security Content

Cato sets records on time to protect. See how the team identifies new threats and implements pinpoint protections so quickly.

Avidan Avraham – Security Research Manager: Data Science

Hear how Cato’s security and data scientists develop models to enrich security visibility and control across the Cato security stack.

The Strategic Benefits of a True SASE Platform

Architected from the ground up as a true cloud-native SASE platform, all Cato’s security capabilities, today and in the future, leverage the global distribution, massive scalability, advanced resiliency, autonomous life cycle management, and consistent management model of the Cato platform.

Consistent Policy Enforcement

Cato extends all security capabilities globally to deliver consistent policy enforcement everywhere and to everyone, from the largest datacenters down to a single user device.

Scalable and Resilient Protection

Cato scales to inspect multi-gig traffic streams with full TLS decryption and across all security capabilities, and can automatically recover from service component failures to ensure continuous security protection.

Autonomous Life Cycle Management

Cato ensures the SASE cloud platform maintains optimal security posture, 99.999% service availability, and low-latency security processing for all users and locations, without any customer involvement.

Single Pane of Glass

Cato provides a single pane of glass to consistently manage all security and networking capabilities including configuration, analytics, troubleshooting, and incident detection and response. Unified management model eases new capabilities adoption by IT and the business.

“We ran a breach-and-attack simulator on Cato, Infection rates and lateral movement just dropped while detection rates soared. These were key factors in trusting Cato security.”

Try Cato

The Solution that IT teams have been waiting for.
Prepare to be amazed!