Home Cookie Notice

  • SASE
    • SASE 101
    • Why SASE

      What is SASE, its architecture, capabilities, and benefits?

    • Why Cato

      The drivers and the 4 transformational impact areas of Cato’s true SASE platform.

  • Platform
    • Platform Architecture
      • Core Components

        Converged single pass processing, purpose built global cloud service, and open data platform.

      • Design Principles

        360-degree visibility and control, autonomous life cycle and posture management, gradual low risk deployment, and universal management.

      • AI and Machine Learning

        AI/ML for threat intelligence and unclassified application identification, ML engines for threat prevention and incident criticality, ML models for device classification, and GenAI for productivity.

      • SASE elegance ebook cover
    • Platform Capabilities
      • Connect
        • Cloud Network

          A purpose-built global, private backbone with embedded  security and optimization for all traffic.

        • Cloud On-Ramps

          A full set of SASE connectivity options  for locations, users, and cloud.

      • Protect
        • Network Security

          Converged, cloud-native SSE 360 for threat prevention, data protection, and zero trust network access.

        • Endpoint Security

          A full set of SASE connectivity options  for locations, users, and cloud.

      • Detect
        • Incident Life Cycle Management

          AI-driven automated incident detection, complete analyst workbench, and full incident life cycle management from investigation to response.

      • Run
        • Unified Management and Integration

          A single pane of glass and a single API for all configuration, analysis, troubleshooting and 3rd party integration.

    • Platform Features
      • Optimized Networking
        • Software Defined WAN (SD-WAN)
        • Global Private Backbone 
        • Digital Experience Monitoring (DEM)
      • Threat Prevention
        • Firewall-as-a-Service (FWaaS)
        • Secure Web Gateway (SWG)
        • Intrusion Prevention System (IPS)
        • Malware Prevention
        • DNS Security (DNS)
        • Remote Browser Isolation (RBI)
        • IoT/OT Security
      • Data and App Protection
        • Cloud Access Security Broker (CASB)
        • Data Loss Prevention (DLP)
        • Zero Trust Network Access (ZTNA)
      • Detection and Response
        • Extended Detection and Response (XDR)
        • Endpoint Protection (EPP/EDR)
      • Unified Management
        • Management Application (CMA)
        • Platform API
  • Security
    • Security Research
    • Cato CTRL (Cyber Threats Research Lab)
    • Rapid CVE Mitigation
    • Threat Research Reports
    • Cato CTRL banner
  • Use Cases
    • Cato Use Cases
    • Network Modernization
      • MPLS Migration to SD-WAN
      • Global Access Optimization
      • Hybrid Cloud and Multi-Cloud
    • Security Consolidation
      • Secure Hybrid Work
      • Secure Direct Internet Access
      • Secure Application and Data Access
      • Incident Detection and Response
    • Business Transformation
      • Vendor Consolidation
      • Spend Optimization
      • M&A and GEO Expansion
      • Deployment Models
      • Regional Enterprises
      • Global Enterprises
      • Do It Yourself
      • Managed Service
  • Customers
  • Partners
    • Cato Partnership
    • Partners
      • Service Provider
      • MSP
      • Reseller
      • Agent
      • Become a Partner
    • Quick Links
      • Partner Portal
      • Partner Onboarding
      • Managed SASE
    • Testimonials
      • Windstream Enterprise
      • Highlander Computing Solutions
      • C3 Technology Advisors
  • Managed Services
    • Managed Services
    • Managed SASE
    • Managed XDR
    • Intelligent Last-Mile Management
    • Hands-Free Management
    • Site Deployment
  • Company
    • Company
    • Management
    • Board
    • Investors
    • News
    • Partnership with TAG Heuer Porsche Formula E Team
    • Careers
    • Corporate Governance
  • Resources
    • Resources
    • Learn
      • What is ZTNA (Zero Trust Network Access)?
      • What is SD-WAN?
      • What Is a Network Firewall?
      • What is IPS (Intrusion Prevention System)?
      • What is Network Security?
      • What Is MPLS?
      • What is Secure Remote Access?
    • Explore
      • Blog
      • Library
      • Podcast
      • Cybersecurity Masterclass
      • Threat Research Reports
      • Rapid CVE Mitigation
      • Glossary
      • Cato Community
    • Take Action
      • SASE RFP Template
      • Book 1:1 Demo
      • Have it your way!
    • Get SASE Certified
      • SASE Certification Level 1
      • SASE Certification Level 2
      • SSE Expert Certification
      • SASE Advanced Security
      • SASE Deployment and Management
      • SASE Business Impact and Strategy
  • Login
  • English
    • fr
    • de
    • ja
    • ko
    • it
    • es
    • nl
    • zh
  • Contact Us
  • English
    • fr
    • de
    • ja
    • ko
    • it
    • es
    • nl
    • zh
  • SASE
    • SASE 101
    • Why SASE

      What is SASE, its architecture, capabilities, and benefits?

    • Why Cato

      The drivers and the 4 transformational impact areas of Cato’s true SASE platform.

  • Platform
    • Platform Architecture
      • Core Components

        Converged single pass processing, purpose built global cloud service, and open data platform.

      • Design Principles

        360-degree visibility and control, autonomous life cycle and posture management, gradual low risk deployment, and universal management.

      • AI and Machine Learning

        AI/ML for threat intelligence and unclassified application identification, ML engines for threat prevention and incident criticality, ML models for device classification, and GenAI for productivity.

      • SASE elegance ebook cover
    • Platform Capabilities
      • Connect
        • Cloud Network

          A purpose-built global, private backbone with embedded  security and optimization for all traffic.

        • Cloud On-Ramps

          A full set of SASE connectivity options  for locations, users, and cloud.

      • Protect
        • Network Security

          Converged, cloud-native SSE 360 for threat prevention, data protection, and zero trust network access.

        • Endpoint Security

          A full set of SASE connectivity options  for locations, users, and cloud.

      • Detect
        • Incident Life Cycle Management

          AI-driven automated incident detection, complete analyst workbench, and full incident life cycle management from investigation to response.

      • Run
        • Unified Management and Integration

          A single pane of glass and a single API for all configuration, analysis, troubleshooting and 3rd party integration.

    • Platform Features
      • Optimized Networking
        • Software Defined WAN (SD-WAN)
        • Global Private Backbone 
        • Digital Experience Monitoring (DEM)
      • Threat Prevention
        • Firewall-as-a-Service (FWaaS)
        • Secure Web Gateway (SWG)
        • Intrusion Prevention System (IPS)
        • Malware Prevention
        • DNS Security (DNS)
        • Remote Browser Isolation (RBI)
        • IoT/OT Security
      • Data and App Protection
        • Cloud Access Security Broker (CASB)
        • Data Loss Prevention (DLP)
        • Zero Trust Network Access (ZTNA)
      • Detection and Response
        • Extended Detection and Response (XDR)
        • Endpoint Protection (EPP/EDR)
      • Unified Management
        • Management Application (CMA)
        • Platform API
  • Security
    • Security Research
    • Cato CTRL (Cyber Threats Research Lab)
    • Rapid CVE Mitigation
    • Threat Research Reports
    • Cato CTRL banner
  • Use Cases
    • Cato Use Cases
    • Network Modernization
      • MPLS Migration to SD-WAN
      • Global Access Optimization
      • Hybrid Cloud and Multi-Cloud
    • Security Consolidation
      • Secure Hybrid Work
      • Secure Direct Internet Access
      • Secure Application and Data Access
      • Incident Detection and Response
    • Business Transformation
      • Vendor Consolidation
      • Spend Optimization
      • M&A and GEO Expansion
      • Deployment Models
      • Regional Enterprises
      • Global Enterprises
      • Do It Yourself
      • Managed Service
  • Customers
  • Partners
    • Cato Partnership
    • Partners
      • Service Provider
      • MSP
      • Reseller
      • Agent
      • Become a Partner
    • Quick Links
      • Partner Portal
      • Partner Onboarding
      • Managed SASE
    • Testimonials
      • Windstream Enterprise
      • Highlander Computing Solutions
      • C3 Technology Advisors
  • Managed Services
    • Managed Services
    • Managed SASE
    • Managed XDR
    • Intelligent Last-Mile Management
    • Hands-Free Management
    • Site Deployment
  • Company
    • Company
    • Management
    • Board
    • Investors
    • News
    • Partnership with TAG Heuer Porsche Formula E Team
    • Careers
    • Corporate Governance
  • Resources
    • Resources
    • Learn
      • What is ZTNA (Zero Trust Network Access)?
      • What is SD-WAN?
      • What Is a Network Firewall?
      • What is IPS (Intrusion Prevention System)?
      • What is Network Security?
      • What Is MPLS?
      • What is Secure Remote Access?
    • Explore
      • Blog
      • Library
      • Podcast
      • Cybersecurity Masterclass
      • Threat Research Reports
      • Rapid CVE Mitigation
      • Glossary
      • Cato Community
    • Take Action
      • SASE RFP Template
      • Book 1:1 Demo
      • Have it your way!
    • Get SASE Certified
      • SASE Certification Level 1
      • SASE Certification Level 2
      • SSE Expert Certification
      • SASE Advanced Security
      • SASE Deployment and Management
      • SASE Business Impact and Strategy
  • English
    • fr
    • de
    • ja
    • ko
    • it
    • es
    • nl
    • zh

Cookie Notice

This Cookie Notice explains how Cato Networks Ltd. and its affiliates (“Cato”, “we”, “us” or “our”) uses cookies and similar technologies in connection with the Cato website and any other website that we own or control and to which this Cookie Notice is posted (collectively, the “Sites”); and

What are cookies?

Cookies are small data files that are placed on your computer or mobile device when you visit a website. Cookies serve different purposes, like helping us understand how a site is being used, letting you navigate between pages efficiently, remembering your preferences and generally improving your browsing experience.

Our Sites may use both session cookies (which expire once you close your web browser) and persistent cookies (which stay on your computer or mobile device until you delete them).

We use two broad categories of cookies: (1) first party cookies, served directly by us, which we use to recognize your computer or mobile device when it revisits our Sites; and (2) third party cookies, which are served by service providers or business partners on our Sites, and can be used by these parties to recognize your computer or mobile device when it visits other websites. Third party cookies can be used for a variety of purposes, including site analytics, advertising and social media features.

What types of cookies and similar technologies are used on your Sites?

On the Sites, we use cookies and other tracking technologies in the following categories described in the table below.

 

Type Description Who serves the cookies How to control them
Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites
  • YouTube
  • Google Marketing Platform
  • LinkedIn
  • Facebook
  • Bing
  • Google Ads
  • Twiter / x
  • Taboola
  • Raddit
  • Microsoft Advertising
  • Chili Piper
  • TradeDesk
  • Mutiny
  • Demandbase
  • TikTok
See ‘your choices’ below.
Strictly Necessary Cookies

 

 

 

 

 

 

 

 

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms.

You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

  • Cookiebot
  • Kinsta

 

See ‘your choices’ below.
Functionality Cookies

 

These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages.

If you do not allow these cookies, then some or all of these services may not function properly.

  • Drift
  • TrenDemon
  • Marketo
See ‘your choices’ below.
Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site.

All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance

 

  • Influ2
  • Outbrain
  • hotjar
  • TechTarget
  • Marketo
  • G2
  • zoominfo
  • TrenDemon
  • WordLift
  • Capterra
See ‘your choices’ below.

Other technologies

In addition to cookies, our Sites and emails may use other technologies to collect information. For example, we may use web beacons (which are also known as pixel tags and clear GIFs) on our Sites and in our HTML formatted emails to track the actions of users on our Sites and whether recipients of our marketing emails open or click links within them. Unlike cookies, which are stored on the hard drive of your computer or mobile device by a website, pixel tags are embedded invisibly on webpages or within HTML formatted emails. Pixel tags are used to demonstrate that a webpage was accessed or that certain content was viewed, typically to measure the success of our marketing campaigns or engagement with our emails (e.g., they may tell us whether you have opened an email, and/or forwarded it on to someone else) and to compile statistics about usage of the Sites, so that we can manage our content more effectively.

Mobile application software development kits (SDKs)

We may use third-party software development kits (“SDKs”) in our mobile applications. An SDK is third-party computer code that may be used for a variety of purposes, including to provide us with analytics regarding the use of our mobile applications, to integrate with social media, add features or functionality to our app, or to facilitate online advertising.

Your choices

Your options for controlling what information cookies and similar technologies collect about you include:

  • Blocking cookies in your browser. Most browsers let you remove or reject cookies. To do this, follow the instructions in your browser settings. Many browsers accept cookies by default until you change your settings. Please note that if you set your browser to disable cookies, the Sites may not work properly. For more information about cookies, including how to see what cookies have been set on your device and how to manage and delete them, visit www.allaboutcookies.org. If you do not accept our cookies, you may experience some inconvenience in your use of our Sites. For example, we may not be able to recognize your computer or mobile device and you may need to log in every time you visit our Sites.
  • Third party opt-out option. You can opt-out of interest-based advertising through some of the third parties listed in the chart above by using the corresponding third party opt-out tool provided in the chart.
  • Industry association opt-outs. You may opt out of receiving interest-based advertising on websites through members of the Network Advertising Initiative by clicking here or the Digital Advertising Alliance by clicking here. You may opt out of receiving targeted advertising in mobile apps through participating members of the Digital Advertising Alliance by installing the AppChoices mobile app, available here, and selecting the user’s choices. Please note that we also may work with companies that offer their own opt-out mechanisms and may not participate in the opt-out mechanisms linked above.
  • Blocking advertising ID use in your mobile settings. Your mobile device settings may provide functionality to limit use of the advertising ID associated with your mobile device for interest-based advertising purposes.

Changes

Information about the cookies we use may be updated from time to time, so please check back on a regular basis for any changes.

Questions

If you have any questions about this Cookie Notice, please contact us by email at privacy@catonetworks.com.

For more information about how we collect, use and share your information, see our Privacy Policy.

 

The network you have been waiting for is here.
Prepare to be amazed.

  • TRY US
We Are SASE®
  • SASE
    • SASE 101
    • Why SASE
    • Why Cato
    • Security Research
    • Customers
  • Platform
    • Platform Architecture
      • Core Components
      • Design Principles
    • Platform Capabilities
      • Connect
      • Protect
      • Detect
      • Run
  • Platform Features
    • Optimized Networking
      • Software Defined WAN (SD-WAN)
      • Global Private Backbone 
      • Digital Experience Monitoring (DEM)
    • Threat Prevention
      • Firewall-as-a-Service (FWaaS)
      • Secure Web Gateway (SWG)
      • Intrusion Prevention System (IPS)
      • Malware Prevention
      • DNS Security (DNS)
      • Remote Browser Isolation (RBI)
      • IoT/OT Security
    • Data and App Protection
      • Cloud Access Security Broker (CASB)
      • Data Loss Prevention (DLP)
      • Zero Trust Network Access (ZTNA)
    • Detection And Response
      • Extended Detection and Response (XDR)
      • Endpoint Protection (EPP)
    • Unified Management
      • Management Application (CMA)
      • Platform API
  • Use Cases
    • Network Transformation
      • MPLS to SD-WAN Migration
      • Global Access Optimization
      • Hybrid Cloud and Multi-Cloud
    • Security Transformation
      • Secure Hybrid Work
      • Secure Direct Internet Access
      • Secure Application and Data Access
      • Incident Detection and Response
    • Business Transformation
      • Vendor Consolidation
      • Spend Optimization
      • M&A and GEO Expansion
    • Deployment Models
      • Regional Enterprises
      • Global Enterprises
      • Do It Yourself
      • Managed Service
  • Company
    • Management
    • Board
    • Investors
    • Careers
    • Legal Documents
    • Cookie Notice
  • Resources
    • Blog
    • Library
    • Customer Success Stories
    • Rapid CVE Mitigation
    • What is SD-WAN?
    • What is ZTNA?
    • What is Network Security?
    • Glossary
  • Partners
    • Become a Partner
    • Partner Portal Login
  • Contact
    • Contact Us
    • Request a Demo
    • Support
    • Customer Login
    • tagheuer-porsche-logo
    • Podcast Listen to our podcast ›
    • Social media
  • Podcast Listen to our podcast ›
  • Social media
  • tagheuer-porsche-logo
  • ISO 27001 Certified
  • SOC2 Approved
  • GDPR Compliant
  • Business Continuity
  • Cato Networks Privacy Policy
  • Security, Compliance and Privacy
  • Cookie Notice
Copyright © 2025. All rights reserved.