Secure and Global
SD-WAN as a Service

Cato Cloud Features

  • Converged SD-WAN and Security in the Cloud

    Cut MPLS costs, appliance sprawl and complex management of point solutions. Cato connects your business into one global network, secured by enterprise grade security services, enforcing a unified policy and managed via a cloud-based management application.

  • Affordable, SLA-backed global backbone

    Augment or replace your expensive MPLS services, or enhance unpredictable internet-based connectivity, with global SD-WAN and SLA-backed backbone.

  • Your IT Team, augmented

    Cato’s global Network and Security Operations Center, manned by network and security experts, augment your IT teams with crucial network management and network security skills to ensure your business remains connected and secured 24/7/365.

  • Enterprise-grade security everywhere

    No need to settle for capacity constrained and high maintenance security appliances. The Cato Cloud seamlessly scales to support your business for all the security capabilities and inspected traffic.

  • Cloud-wide threat visibility

    With full visibility of the traffic flowing through the Cato Cloud, Cato Research Labs can identify emerging threats at any given customer and proactively deploy countermeasures to protect all customers.

  • Always up-to-date agile cloud software

    Skip those tedious updates and upgrades of appliances and their software. Cato agile cloud software is constantly and seamlessly updated to incorporate the most up-to-date defense against emerging threats.

Secure and Global SD-WAN as a Service

The Cato Cloud delivers a global, cloud-based SD-WAN with built-in network security stack for all enterprise locations, cloud resources and mobile users

  • Cato Cloud Network

    Cloud-based and SLA-backed Global Backbone

    Connecting to the Cato Cloud Network

    • Existing Equipment Configuration

      Admins can configure existing network and security equipment (routers / firewalls) to securely tunnel traffic to the Cato Cloud.

    • Cato Socket, Cato Client

      Cato provides multiple secure tunnelling options to Cato Cloud. Cato Socket is a zero touch SD-WAN device for physical locations. Cloud datacenters are integrated via a tunnel from the Cato Cloud to the VPN Gateway (agent-less). Cato Client is endpoint software for laptops, tablets and smartphones.

    • ISP Integration

      Users of Cato’s partner ISPs enjoy seamless tunnelling of their traffic to the Cato Cloud.

  • Cato Security Services

    Enterprise grade, elastic and agile network security services, tightly integrated into the Cloud network.

    • Comprehensive Network Security Everywhere

      Cato has built a full network security stack directly into the global backbone software. This architecture extends enterprise-grade network security protection for every business user and location – without deploying edge security appliances. Inspection and enforcement are applied to both WAN- and Internet-bound traffic as well as TLS encrypted traffic.

    • Up-to-date and Up-to-size Protection

      Without the constraints of physical appliances, Cato experts seamlessly update the cloud-based software to address emerging threats and scale the cloud infrastructure to support any traffic volume. Customers are relieved from the need to patch sprawling appliances software or upgrade dated and underpowered hardware.

    • Unified Enterprise Policy

      Security policies can be applied corporate wide or down to specific users and locations to secure access to both on-premise applications, cloud data centers, and public cloud applications such as Office 365, Box and Salesforce.

    Cato Security Services

    • Next Generation Firewall

      Protects internet, cloud and WAN traffic at any location using application aware policies, without hardware appliances or traffic backhaul. Seamlessly scales to support multi-gigabit traffic and upgrades with new capabilities and countermeasures against emerging threats.

    • Secure Web Gateway

      Detects and prevent access to phishing and malicious websites to minimize the risk of credential theft, vulnerability exploitation, and malware infection.

    • Advanced Threat Prevention

      Inspects all traffic for a wide range of threats using multiple layers of protection to prevent compromise of users’ desktops, laptops, tablets, and smartphones.

    • Secure Cloud and Mobile Access

      Controls and secures access from mobile devices to cloud applications (Office 365, Salesforce, etc.) and cloud infrastructure (Amazon AWS, Microsoft Azure).

    • Network Forensics

      Consolidates network and security events for analysis by Cato’s Management Application or sharing with third party tools such as SIEM. Cato Research Labs performs ongoing evaluation of network activity for malicious traffic within the corporate network and to the Internet.

    • Cloud-based Management

      Provides in depth visibility into overall network activity by location, applications, groups and users. Admins can centrally configure application-aware policies to control resource usage and access, and be alerted to security and network events.

    • Cato Management Application

      Cato Management Application enables full traffic visibility for the entire organizational network and a way to manage a unified policy across all users, locations, data and applications (both internal and Internet/Cloud-based). Request a Demo

    • Cato Managed Services

      The Cato Cloud environment is managed by Cato’s global Network and Security Operations Center, manned by a team of network and security experts to ensure maximum uptime, optimal performance and highest level of security.