• Built-in network segmentation

    The cloud network is segmented by default preventing access between network resources, unless specifically permitted.

  • Advanced malware protection

    Cato inspects all access to websites for malicious domains (phishing and malware delivery sites), as well as WAN and Internet traffic for malicious files.

  • Intrusion prevention

    Cato performs Deep Packet Inspection (DPI) on all traffic for indicators of compromised or malicious patterns. Protocol validation, known CVEs, flagged domains, IPs, and advanced behavioral analysis are seamlessly performed in Cato Cloud.

  • Network anomaly detection

    Cato enforces application aware policies across all network resources. DPI is used to look for attack patterns within internal and external network activity.

  • Rapid threat adaptation

    Cato leverages the unprecedented visibility into traffic to detect network anomalies and emerging threats. This enables quick adaptation of Advanced Threat Protection to protect all customers.

  • Cross-domain event correlation

    Cato looks at network activity across multiple domains to identify complex attack patterns in real time.

  • Unrestricted scalability and self-maintaining service

    With the elastic nature of Cato PoPs and large compute power, Cato ensures traffic automatically routes to the nearest available PoP. Cato inspects any traffic mix (encrypted and unencrypted) and ensures capacity is available to provide subscribed services. Without the need to size, upgrade, patch or refresh appliances, customers are relieved of the ongoing grunt work of keeping their network security up-to-date against emerging threats and evolving business needs.

The network you have been waiting for is here.
Prepare to be amazed.