Security Research

Cato Networks was built with security and networking DNA in a one company. All our security capabilities are delivered in a single, cloud-native platform while our expert security researchers work 24/7 to ensure the best protection is in place for our customers. With Cato, enterprises enjoy consistent inspection and policy enforcement everywhere with always up-to-date security engines – with the confidence that security teams seek, and the experience that end users love.

A True Security Company

A Security Vendor With a True Security DNA You Can Trust

Founded and lead by one of the godfathers of cyber security, Shlomo Kramer (co-founder of Checkpoint Software and Imperva), the Cato Networks team has a true security DNA. The team is built from security industry veterans and ex-military intelligence threat research experts, and the solution is architected from the ground up to deliver enterprise-grade security to every organization. Customers benefit from a trusted partner that understands security inside-out and delivers outcomes that continuously improve the enterprise’s security posture.

A Purpose-built, Automated, AI-Managed Threat Intelligence System

Up-to-date threat intelligence is key to maintaining optimal security posture and stopping malware, phishing, ransomware, and other cyber-attacks. Cato’s teams of security experts has developed a purpose-built AI-based reputation system that autonomously aggregates and scores threat indicators from 250+ threat intelligence feeds. The system continuously measures threat records quality and relevancy and simulates potential impact on real traffic. An updated and aggregated blacklist is automatically published across the Cato SASE Cloud Platform, ensuring up-to-date protection with near zero false positives with no customer involvement.

Rapid Mitigation of Emerging Threats

Enterprises often struggle with the process, resources, and time it takes to protect their networks from emerging vulnerabilities (CVEs). Through the Cato IPS, we provide virtual patching to rapidly block attempts to exploit these vulnerabilities and secure our customer’s networks. Cato’s dedicated team of experts build, test and deploy new IPS rules in record time to quickly adapt to new CVEs without requiring any customer involvement. This “virtual patching” provides enterprises with the assurance that they are protected from high-risk emerging threats while they take the time needed to carefully update and patch impacted systems.

Advanced Security Research and Knowledge Sharing with The Cyber Community

Cato performs ongoing security research across a wide area of domains and shares its findings with the community. We publish periodic threat research reports that present attack and risk trends and provide a detailed analysis of specific research projects. Our experts speak at global security conferences and publish technical and thought leadership blogs covering a wide range of topics, allowing security professionals to tap into our knowledge and expertise. And, Cato provides free educational materials on key topics in our Cyber Security Master Class webinar series.

Meet The Cato Security Research Team

Cato’s security research and engineering teams are built from ex-IDF cyber security analysts and data scientist that work together to make sure our customers are always protected against known and emerging cyber threats and attacks. Their area of expertise span across advanced attack analysis, reverse engineering, software development, data science, and AI (artificial intelligence) and ML (machine learning).

Elad Menahem – VP Research

Learn about the unique background of Cato’s security personnel and why converging security and networking data is critical for any security researcher.

Avishay Zawoznik – Security Research Manager: Security Content

Cato sets records on time to protect. See how the team identifies new threats and implements pinpoint protections so quickly.

Avidan Avraham – Security Research Manager: Data Science

Hear how Cato’s security and data scientists develop models to enrich security visibility and control across the Cato security stack.

The Strategic Benefits of a True SASE Platform

Architected from the ground up as a true cloud-native SASE platform, all Cato's security capabilities, today and in the future, leverage the global distribution, massive scalability, advanced resiliency, autonomous life cycle management, and consistent management model of the Cato platform.

Consistent Policy
Enforcement 

Cato extends all security capabilities globally to deliver consistent policy enforcement everywhere and to everyone, from the largest datacenters and down to a single user device.

Scalable and Resilient Protection

Cato scales to inspect multi-gig traffic streams with full TLS decryption and across all security capabilities, and can automatically recover from service component failures to ensure continuous security protection.

Autonomous Life Cycle Management

Cato ensures the SASE cloud platform maintains optimal security posture, 99.999% service availability, and low-latency security processing for all users and locations without any customer involvement.

Single Pane of Glass

Cato provides a single pane of glass to consistently manage all security and networking capabilities including configuration, analytics, troubleshooting, and incident detection and response. Unified management model eases new capabilities adoption by IT and the business.

Cato SASE Cloud Platform Powers the Digital Business

Cato changes the ownership model of IT infrastructure to “as-a-service” platform to transform how IT delivers the capabilities the business needs when and where they need it.  The Cato SASE platform represents the essential re-architecture of networking and security to meet the speed, agility, and security needed for the digital business.  

Try Cato

The Solution that IT teams have been
Waiting for. Prepare to be amazed!

Contact Us