Secure and Global
SD-WAN as a Service

Cato Cloud Features

  • Converged SD-WAN and Security in the Cloud

    Cut MPLS costs, appliance sprawl and complex management of point solutions. Cato connects your business into one global network, secured by enterprise grade security services, enforcing a unified policy and managed via a cloud-based management application.

  • Affordable, SLA-backed global backbone

    Augment or replace your expensive MPLS services, or enhance unpredictable internet-based connectivity, with global SD-WAN and SLA-backed backbone.

  • Your IT Team, augmented

    Cato’s global Network and Security Operations Center, manned by network and security experts, augment your IT teams with crucial network management and network security skills to ensure your business remains connected and secured 24/7/365.

  • Enterprise-grade security everywhere

    No need to settle for capacity constrained and high maintenance security appliances. The Cato Cloud seamlessly scales to support your business for all the security capabilities and inspected traffic.

  • Cloud-wide threat visibility

    With full visibility of the traffic flowing through the Cato Cloud, Cato Research Labs can identify emerging threats at any given customer and proactively deploy countermeasures to protect all customers.

  • Always up-to-date agile cloud software

    Skip those tedious updates and upgrades of appliances and their software. Cato agile cloud software is constantly and seamlessly updated to incorporate the most up-to-date defense against emerging threats.

Secure and Global SD-WAN as a Service

The Cato Cloud delivers a global, cloud-based SD-WAN with built-in network security stack for all enterprise locations, cloud resources and mobile users

  • Cato Cloud Network

    Cloud-based and SLA-backed Global Backbone

    • SLA-backed Global Backbone

      The Cato Cloud Network is built on a globally distributed, scalable, and redundant Points of Presence (PoPs). The PoPs are interconnected with SLA-backed global carrier transports. The PoPs are meshed into a global overlay and continuously monitor the carriers latency and packet loss to determine optimal path between any two locations. The PoPs run Cato’s integrated network and security software stack to optimize and secure traffic flow. This software-defined architecture enables the rapid introduction of new capabilities when compared with legacy hardware-based or virtual routers.

    • Optimized Last Mile Connectivity

      Cato optimizes last mile connectivity through multiple techniques including application- and link-aware policy-based routing, hybrid WAN support (MPLS+Internet), Active/Active link management, Forward Error Correction (FEC) for packet loss mitigation, and TCP Proxy for traffic acceleration. Unlike appliance-based SD-WAN solutions, Cato uniquely optimizes both the last mile between the customer edges and the Cato PoPs, and the middle mile on the Cato global backbone. This optimization maximizes throughput end-to-end by controlling packet flow throughout the entire route.

    Connecting to the Cato Cloud Network

    • Existing Equipment Configuration

      Admins can configure existing network and security equipment (routers / firewalls) to securely tunnel traffic to the Cato Cloud.

    • Cato Socket, Cato vSocket and Cato Client

      Cato provides multiple secure tunnelling solutions to the Cato Cloud Network. The Cato Socket is a zero touch SD-WAN device for physical locations. The Cato vSocket is a virtual socket for cloud datacenters. The Cato Client is a software client for laptops, tablets and mobile devices.

    • ISP Redirection

      Subscribers of Cato’s partner ISPs enjoy seamless tunnelling of their traffic to the Cato Cloud.

  • Cato Security Services

    Enterprise grade, elastic and agile network security services, tightly integrated into the Cloud network.

    • Comprehensive Network Security Everywhere

      Cato has built a full network security stack directly into the global backbone software. This architecture extends enterprise-grade network security protection for every business user and location – without deploying edge security appliances. Inspection and enforcement are applied to both WAN- and Internet-bound traffic as well as TLS encrypted traffic.

    • Up-to-date and Up-to-size Protection

      Without the constraints of physical appliances, Cato experts seamlessly update the cloud-based software to address emerging threats and scale the cloud infrastructure to support any traffic volume. Customers are relieved from the need to patch sprawling appliances software or upgrade dated and underpowered hardware.

    • Unified Enterprise Policy

      Security policies can be applied corporate wide or down to specific users and locations to secure access to both on-premise applications, cloud data centers, and public cloud applications such as Office 365, Box and Salesforce.

    Cato Security Services

    • Next Generation Firewall

      Protects internet, cloud and WAN traffic at any location using application aware policies, without hardware appliances or traffic backhaul. Seamlessly scales to support multi-gigabit traffic and upgrades with new capabilities and countermeasures against emerging threats.

    • Secure Web Gateway

      Detects and prevent access to phishing and malicious websites to minimize the risk of credential theft, vulnerability exploitation, and malware infection.

    • Advanced Threat Prevention

      Inspects all traffic for a wide range of threats using multiple layers of protection to prevent compromise of users’ desktops, laptops, tablets, and smartphones.

    • Secure Cloud and Mobile Access

      Controls and secures access from mobile devices to cloud applications (Office 365, Salesforce, etc.) and cloud infrastructure (Amazon AWS, Microsoft Azure).

    • Network Forensics

      Consolidates network and security events for analysis by Cato’s Management Application or sharing with third party tools such as SIEM. Cato Research Labs performs ongoing evaluation of network activity for malicious traffic within the corporate network and to the Internet.

    • Cloud-based Management

      Provides in depth visibility into overall network activity by location, applications, groups and users. Admins can centrally configure application-aware policies to control resource usage and access, and be alerted to security and network events.

    • Cato Management Application

      Cato Management Application enables full traffic visibility for the entire organizational network and a way to manage a unified policy across all users, locations, data and applications (both internal and Internet/Cloud-based).Request a Demo

    • Cato Manage Services

      The Cato Cloud environment is managed by Cato’s global Network and Security Operations Center, manned by a team of network and security experts to ensure maximum uptime, optimal performance and highest level of security.

  • Cato Editions

    Cato Editions address diverse enterprise needs and deployment scenarios

    • Cato Secure Web Gateway

      Secures Cloud and Internet Traffic

      Cloud and Internet traffic is carried over multiple  links to the Cato Cloud and secured by Cato Security Services.

      WAN traffic is handled by current WAN.

      Select >

      Try Cato Secure Web Gateway

    • Cato Secure Network

      Optimizes and Secures All Enterprise Traffic

      WAN and Cloud traffic is carried over an optimized overlay of Internet links to Cato, or using MPLS links.

      Cato Security Services secure all traffic.

      Select >

      Try Cato Secure Network

    • Cato SD-WAN

      Optimizes All Enterprise Traffic

      WAN and Cloud traffic is carried over an optimized overlay of Internet links to Cato, or using MPLS links.

      Security is handled by existing network security stack.

      Select >

      Try Cato SD-WAN

Loading...