Security, Compliance and Privacy

Cato converges SD-WAN and network security into a single cloud service, empowering enterprises to deliver optimized and secure application access to all users and locations. Leveraging Cato Cloud, enterprises can replace the complexity of multiple legacy point products with a simple, agile and secure global network. We are committed to support our customers’ business transformation with a cloud-native network that is designed for the digital era. This is why we built the world’s first SASE platform, designed with security, privacy and transparency in mind, and compliant with leading industry standards.

SOC1, SOC2 and SOC3

As part of our commitment to customer data security, we hold SOC1, SOC2 and SOC3 certifications that are independently validated by a third party. These certifications further demonstrates our secure and reliable strategy to our services, processes and data confidentiality. Download our SOC3 Report

ISO 27001

We are ISO/IEC 27001:2013 certified, validating our risk-based approach for implementing, maintaining and continually improving our information security management system (ISMS). This also indicates our compliance with best practices for identifying, assessing, evaluating and treating information security risks.

UK Cyber Essentials

Our service and company complies with UK Cyber Essentials requirements set forth by the British National Cyber Security Center. Cyber Essentials is an effective, Government backed minimum standard scheme that that helps organizations get protected, whatever its size, against a range of the most common cyber attacks.

cyber essentials


We are GDPR compliant, following the privacy-by-design principles and operating in accordance with all applicable laws to guarantee our customers the right for privacy.

The network you have been waiting for is here.
Prepare to be amazed.

Cato Networks
recognized 13x
by Gartner

Market Guide for Single-Vendor SASE

Gartner Market Guide for Managed SD-WAN Services

Gartner Hype Cycle for Midsize Enterprises

Gartner Market Guide for Virtual Private Networks

Gartner Hype Cycle for Threat-Facing Technologies

Gartner Market Guide for Zero Trust Network Access

Gartner Hype Cycle for Edge Computing

Hype Cycle for Business Continuity Management and IT Resilience

Gartner Hype Cycle for Network Security

Gartner Hype Cycle for Enterprise Networking

Gartner Hype Cycle for Workplace Infrastructure and Operations

Gartner Hype Cycle for Cloud Security

Gartner Hype Cycle for Cloud Computing

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose