Security, Compliance and Privacy

Cato converges SD-WAN and network security into a single cloud service, empowering enterprises to deliver optimized and secure application access to all users and locations. Leveraging Cato Cloud, enterprises can replace the complexity of multiple legacy point products with a simple, agile and secure global network. We are committed to support our customers’ business transformation with a cloud-native network that is designed for the digital era. This is why we built the world’s first SASE platform, designed with security, privacy and transparency in mind, and compliant with leading industry standards.

SOC1, SOC2 and SOC3

As part of our commitment to customer data security, we hold SOC1, SOC2 and SOC3 certifications that are independently validated by a third party. These certifications further demonstrates our secure and reliable strategy to our services, processes and data confidentiality. Download our SOC3 Report

ISO 27001

We are ISO/IEC 27001:2013 certified, validating our risk-based approach for implementing, maintaining and continually improving our information security management system (ISMS). This also indicates our compliance with best practices for identifying, assessing, evaluating and treating information security risks.

UK Cyber Essentials

Our service and company complies with UK Cyber Essentials requirements set forth by the British National Cyber Security Center. Cyber Essentials is an effective, Government backed minimum standard scheme that that helps organizations get protected, whatever its size, against a range of the most common cyber attacks.

cyber essentials


We are GDPR compliant, following the privacy-by-design principles and operating in accordance with all applicable laws to guarantee our customers the right for privacy.

The network you have been waiting for is here.
Prepare to be amazed.

Cato Networks
approvato 12 volte
da Gartner

Market Guide for Managed SD-WAN Services di Gartner

Hype Cycle for Midsize Enterprises, di Gartner

Market Guide for Virtual Private Networks di Gartner

Hype Cycle for Threat-Facing Technologies, di Gartner

Market Guide for Zero Trust Network Access di Gartner

Hype Cycle for Edge Computing, di Gartner

Hype Cycle for Business Continuity Management and IT Resilience

Hype Cycle for Network Security, di Gartner

Hype Cycle for Enterprise Networking, di Gartner

Hype Cycle for Workplace Infrastructure and Operations, di Gartner

Hype Cycle for Cloud Security, di Gartner

Hype Cycle for Cloud Computing, di Gartner

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose