February 23, 2026 5m read

Beyond Access: How Cato Measures and Manages User Risk in Real Time

Dr. Guy Waizel
Tomer Doitshman
Aviya Vaidberg
Dr. Guy Waizel , Tomer Doitshman , Aviya Vaidberg

Table of Contents

Wondering where to begin your SASE journey?

We've got you covered!
Listen to post:
Getting your Trinity Audio player ready...

On a quiet Tuesday morning, Jerry, a fictional system administrator, logged in as usual. While testing a new integration script, he visited a documentation page on an unfamiliar domain. It looked harmless and loaded without issue, but behind the scenes, Jerry’s laptop began making a series of small outbound requests to several low-reputation domains. None of these connections were malicious enough to be blocked, yet the pattern resembled early-stage domain-flux activity. 

Across the building, Stacy from Procurement, also part of this example scenario, received a vendor update request that appeared to come from a trusted partner. She opened the attached spreadsheet and continued her day. The file behaved normally, but it quietly attempted to send metadata about her system to an unfamiliar storage endpoint, aligning with indicators such as “Data Transfer to Suspicious Destinations” and “Information Stealers.”

Neither Jerry nor Stacy had malicious intent. They were simply doing their jobs, but their actions, one subtle and one deceptive, elevated their risk profiles in ways that traditional security tools would not have recognized. These fictional examples reflect real-world behaviors that often go unnoticed.

Cato’s User Risk Score identifies these seemingly harmless moments as potential risks and feeds them into the User Risk Level, which is a vital tool for network and security teams for maintaining an always current security posture. It enables zero-trust, dynamic access control policies for both internal applications and internet traffic, providing clear visibility into user risk posture so you can continuously tune policies and adapt your security strategy as threats and user behavior evolve.

How User Risk Score Works

Cato continuously monitors all user activity across its global SASE platform. Each ZTNA client user is dynamically assigned a User Risk Level through a proprietary algorithm that evaluates a wide range of behavioral and security indicators. The system analyzes both threat activity and contextual attributes to reflect each user’s current risk posture in real time.

Cato’s scoring model considers factors such as:

  • Malware and Trojan activity including banking malware, information stealers, and backdoors
  • Botnet and command-and-control traffic such as beaconing or DNS tunneling behavior
  • Ransomware and cryptomining patterns like encryption attempts, ransom note delivery, or abnormal system usage
  • Data exfiltration and credential theft through suspicious uploads, phishing, or brand impersonation
  • Exploitation and web attack attempts including CVE exploitation, injection attacks, and cross-site scripting
  • Scanning and reconnaissance activity from automated tools or targeted vulnerability probes
  • Contextual user attributes such as group membership, platform, country, and connection origin

All these data points are correlated into a single Risk Level that evolves dynamically as new activity is observed. Security teams can use this level directly within Internet or WAN policies to automatically restrict or monitor access for users who present higher risk.

Understanding the Why Behind the Score and Acting on It

When a user’s score increases, the User Risk Dashboard presents any existing XDR stories related to that user. These stories summarize recent detections such as a blocked malicious website, an attempt to install an unauthorized application, or abnormal data movement. Figure 1 shows how each user is assigned a risk level, and Figure 2 shows the dashboard view you can drill into for deeper investigation.

From the User Risk Dashboard, teams can quickly pivot from “who is risky” to “what happened and why.” The dashboard highlights the user’s group membership, a timeline of the user’s risk level and how it changed over time, and a breakdown of contributing signals by security components such as Anti-Malware, IPS, Firewall, and Suspicious Activity. It also surfaces the top risk-driving threats and events for each component, including MITRE ATT&CK tactics where relevant, and provides administrative actions to reset or revoke the user’s risk level when appropriate.

Viewing_user_risk_levels

Figure 1. Viewing user risk levels

User_Risk_Score_Dashboard

Figure 2. User Risk Score Dashboard

Administrators can reference the User Risk Level directly within Internet and WAN policies to manage access according to user posture. (Figure 3) This makes it possible to automatically apply tighter restrictions or additional validation for higher-risk users, while maintaining a seamless experience for those at lower risk.

The User Risk Level can also be shared with external security systems, such as SIEM or SOAR platforms, through Cato’s event export and integration capabilities. This allows organizations to correlate user risk insights with data from identity providers, endpoint protection, or incident response systems, creating a unified and contextual security view across the enterprise.

Configuring_risk_based_policy_actions

Figure 3. Configuring risk-based policy actions to enforce zero-trust dynamically.

Compliance, Framework Alignment, and Security Outcomes

Cato’s User Risk Score helps organizations achieve both operational security and regulatory alignment. It supports modern cybersecurity mandates that emphasize continuous monitoring, behavioral analysis, and dynamic risk management, which are key principles in today’s compliance ecosystem.

  • Under the NIS2 Directive, organizations must implement “appropriate and proportionate measures to manage risks to network and information systems.” Continuous user risk scoring directly fulfills this expectation by identifying behavioral anomalies and surfacing them before they escalate.
  • Similarly, NIST SP 800-53 Rev 5 (AU-6) instructs teams to “review and analyze system audit records for indications of inappropriate or unusual activity and adjust monitoring when there is a change in risk.” Cato’s automated correlation and scoring system brings this control to life without manual effort.

By integrating these frameworks into daily operations, organizations can:

  • Strengthen Zero Trust enforcement with adaptive, user-centric visibility
  • Shorten detection and response times for compromised accounts
  • Demonstrate compliance readiness during audits
  • Maintain clear, auditable trails of user activity and remediation actions

The outcome is a measurable reduction in exposure, faster incident response, and greater assurance that compliance and operational security evolve together.

Conclusion: Seeing and Stopping Risk in Real Time

Cato’s User Risk Score enables security teams to move beyond static access control and truly understand how users behave.
By combining real-time scoring, contextual XDR visibility, and automated policy actions, Cato transforms ZTNA into an adaptive, user-aware defense that continuously measures, manages, and mitigates risk across the enterprise.

In cybersecurity, seeing how users behave is the first step to keeping them, and the business, secure.

Related Topics

Wondering where to begin your SASE journey?

We've got you covered!
Dr. Guy Waizel

Dr. Guy Waizel

Tech Evangelist

Dr. Guy Waizel is a Tech Evangelist at Cato Networks and a member of Cato CTRL. As part of his role, Guy collaborates closely with Cato's researchers, developers, and tech teams to bridge and evangelize tech by researching, writing, presenting, and sharing key insights, innovations, and solutions with the broader tech and cybersecurity community. Prior to joining Cato in 2025, Guy led and evangelized security efforts at Commvault, advising CISOs and CIOs on the company’s entire security portfolio. Guy also worked at TrapX Security (acquired by Commvault) in various hands-on and leadership roles, including support, incident response, forensic investigations, and product development. Guy has more than 25 years of experience spanning across cybersecurity, IT, and AI, and has held key roles at tech startups acquired by Philips, Stanley Healthcare, and Verint. Guy holds a PhD with magna cum laude honors from Alexandru Ioan Cuza University, his research thesis focused on the intersection of marketing strategies, cloud adoption, cybersecurity, and AI; an MBA from Netanya Academic College; a B.Sc. in technology management from Holon Institute of Technology; and multiple cybersecurity certifications.

Read More
Tomer Doitshman

Tomer Doitshman

Tomer Doitshman is a dynamic team leader at Cato Research Labs, Cato Networks, with a passion for cybersecurity spanning reverse engineering, network protocols analysis, and malicious traffic detection. As a machine learning enthusiast, he thrives on solving complex problems. Currently a PhD candidate in Computer Science, Tomer directs his expertise toward cutting-edge network-based security research, crafting innovative methods for threat detection in enterprise environments.

Read More
Aviya Vaidberg

Aviya Vaidberg

Researcher

Aviya Vaidberg is a Researcher at Cato Networks, specializing in network protocols, data analysis, and cybersecurity. He has strong experience in data science, applying statistical modeling and machine learning techniques to analyze large-scale network data, detect anomalies, and improve security insights. He holds a bachelor’s degree in applied mathematics and a master’s degree in mathematics.

Read More