- Anwendungsfälle von Cato
- ASSUMPTION OF RISK AND RELEASE OF LIABILITY
- California Notice at Collection
- Careers
- Cato Library
- Cato Networks
- CATO networks data processing and privacy agreement
- Cato Networks Privacy Policy
- Cato Resources Korean
- Cato resources Netherlands
- Cato resources Traditional Chinese
- Cato SASE Cloud mit SSE 360
- Cato’s Partner Community
- Code of Ethics and Business Conduct
- Company- German
- Contact us
- Cookie Notice
- Customer Success Stories
- Cybersecurity Masterclass
- Danke sehr!
- Danke! demo
- Dankeschön
- Demo on the way
- Gartner über SASE
- Grazie! SASE Expert
- Have it your way
- Have it your way RFP
- Highlander computing solutions
- iFrame deliveryform
- iFrame deliveryform addrecipient
- IPS: Intrusion Prevention System
- Klimabilanz
- Last-mile Cost Calculator
- Legal
- Live Demo
- Managed Services von Cato
- MSA
- Network and Security Tetris
- Network and Security Tetris Play
- Network Firewall: Components, Solution Types, and Future Trends
- Network Security in 2023: Threats, Tools, and Best Practices
- Porsche Formula E Team
- Quarterly Threat Reports
- Ransomware attackers defenders and fbis perspective
- Rapid CVE Mitigation
- SASE Advanced Security thank you
- SASE Business Impact and Strategy thank you
- SASE Deployment and Management thank you
- Sase Expert Grazie
- SASE thank you
- SASE thank you
- SASE thank you
- SASE thank you – fr
- SASE thank you – nl
- SD-WAN: Was ist Software-Defined WAN?
- Secure Access Service Edge (SASE)
- CASB und SASE – ein Vergleich
- Die SASE-Architektur (Secure Access Service Edge): der Grundstein für Ihr digitales Unternehmensnetzwerk
- Die Vorteile von SASE
- Funktionen von SASE und Zero Trust Network Access (ZTNA)
- SASE in der Fertigungsindustrie
- SASE-Anbieter: Auswahl eines SASE-Anbieters
- SASE-Zertifizierung
- Von SD-WAN zu SASE: Fortschreitende Weiterentwicklung des WAN
- Was ist keine SASE-Lösung?
- Secure Remote Access: The Next Generation
- Security Service Edge (SSE)
- Security, Compliance and Privacy
- Simple Network Automation
- Strategic roadmap for sasea practical guide
- Support
- Thank you Last-mile Calculator
- Thank you poc
- Thank you! content
- Thank You! on-demand-demo
- Thank you! partner-request
- Thank You! webinar
- What Is MPLS? Definition, Pros/Cons and Alternatives
- ZTNA: Zero Trust Network Access
- Agent
- Managed Services Provider
- Managed Services Provider
- Reseller
- Branch Appliance Elimination
- Cloud Datacenter Integration
- Mobile Access Optimization
- Secure Cloud-Based SD-WAN
- Secure Direct Internet Access
- Cato Edge SD-WAN
- Cloud Datacenter Integration
- Global Private Backbone
- Optimized and Secure Remote Access
- SSE 360: Security as a Service
- Data Loss Prevention (DLP)
- Firewall as a Service
- MPLS migration to SD-WAN
- Next Generation Firewall (NGFW)
- Optimized and Secure Mobile Access
- Secure Branch Internet Access
- Secure Web Gateway (SWG)
- Zero Trust Network Access (ZTNA)
- SASE According to Gartner
- SASE Certificate
- SASE Advanced Security
- SASE Business Impact and Strategy
- SASE Deployment and Management
- SSE Expert Certification
- SD-WAN as a Service
Global Private Backbone
Enterprises have long struggled with finding reliable and affordable global connectivity. Global MPLS connections come at a high cost for limited bandwidth, if they’re available at all. The Internet, already unpredictable, is only made worse by the latency of long-distance global connections.
Cato solves the global connectivity problem. The Cato global private backbone is a private network spanning 65+ points of presence (PoPs) worldwide. The backbone is affordable and managed by Cato personnel.
Reliable Global Connectivity at an Affordable Price
Cato dramatically reduces the cost of enterprise-grade global connectivity by leveraging the massive build out in IP capacity. Cato PoPs interconnect across multiple tier-1 providers, backed by SLAs on availability, latency, packet loss, and jitter. Cato’s software monitors the real-time performance of the provider networks and with our application-aware routing algorithms, selects the optimum path across the Cato backbone — even if that path is indirect, via other PoPs. By controlling the routing and only using SLA-backed network capacity, Cato delivers far better performance than the public Internet and at far lower cost than global MPLS.
Customer testing shows how latency across the Cato network rivals MPLS and is far better than the global Internet
WAN Optimization for Peak Throughput
Cato improves application throughput not beyond just minimizing global network latency. Built-in WAN optimization dramatically improves TCP efficiency, increasing data throughput for sites and mobile users by as much as 40x. Cato PoPs proxy TCP connections, allowing TCP clients and servers to send far more data, sooner. Advanced TCP congestion control also enable Cato edges to send and receive more data, as well as better utilize the available bandwidth. Both techniques shorten the time needed to remediate errors, reducing the impact of packet loss on data
By building WAN optimization into the Cato network, sites and mobile users experience significant improvement in data throughput without additional hardware or software
Cloud-native Software for Faster Innovation and Lower Costs
Cato PoPs run our cloud-native software, a fully multitenant and scalable network stack that performs all core networking and security functions — the route calculation, policy-enforcement, and security inspection. The software platform operates on off-the-shelf servers capable of breakthrough performance previously only possible with custom hardware.
Eliminating proprietary appliances transforms the technical, operational, and cost characteristics of a legacy telco network. Without proprietary hardware to acquire or deploy, Cato has been able to expand its network footprint rapidly. Today, the Cato network covers every major business center and, as PoPs are primarily software and standard servers, opening new PoPs can happen quickly. Owning our own software leads to faster innovation enabling Cato to respond rapidly to a customer’s features requests, quickly resolve service issues, and reduce operational costs and 3rd party license fees.
Cato PoPs execute all core networking and security functions in software, allowing for unprecedented roadmap velocity and network expansion.
Self-healing By Design for 24×7 Operation
To ensure maximum availability, the Cato architecture is fully self-healing. All aspects of failure detection, failover, and fail back are automated, requiring no special planning or pre-orchestration. Each PoP contains multiple compute nodes running identical copies of Cato’s software; any compute node can serve any edge tunnel connected to that PoP. Should a compute node fail, the tunnels automatically move to another node. Should a PoP become unreachable, edges connected to that PoP automatically reconnect to the next closest PoP. And should a tier-1 provider connecting Cato PoPs fail or degrade, PoPs automatically switch to one of the alternate tier-1 providers.
Cato’s self-healing architecture automatically detects and routes around failures without requiring planning or pre-orchestration
Built-in End-to-end Encryption and Security
Extensive measures are taken to ensure the security of Cato Cloud. All communications — whether between PoPs or with Cato Sockets or Cato Clients — are secured by AES-256 encrypted tunnels. To minimize the attack surface, only authorized sites and mobile users can connect and send traffic to the backbone. The external IP addresses of the PoPs are protected with specific anti-DDoS measures. Cato service is ISO 27001 certified.
- Get an overview of Cato SASE Cloud
- Learn about SASE