Security Research

Cato Networks was built with security and networking DNA in one company. All our security capabilities are delivered in a single, cloud-native platform while our expert security researchers work 24/7 to ensure the best protection is in place for our customers. With Cato, enterprises enjoy consistent inspection and policy enforcement everywhere with always up-to-date security engines – with the confidence that security teams seek, and the experience that end users love.

A True Security Company

A Security Vendor With a True Security DNA You Can Trust

Founded and lead by one of the godfathers of cyber security, Shlomo Kramer (co-founder of Checkpoint Software and Imperva), the Cato Networks team has a true security DNA. The team is built from security industry veterans and ex-military intelligence threat research experts, and the solution is architected from the ground up to deliver enterprise-grade security to every organization. Customers benefit from a trusted partner that understands security inside-out and delivers outcomes that continuously improve the enterprise’s security posture.

Cato CTRL: Sharing Threat Intelligence and Research with The Cyber Community

Cato Cyber Threats Research Lab (CTRL) performs ongoing security research across a wide area of domains, providing actionable, reliable, and timely threat intelligence. Cato CTRL experts publish blogs, research papers, reports, and masterclass webinars – all of which can be found on the Cato CTRL page.

Learn More about Cato CTRL

A Purpose-built, Automated, AI-Managed Threat Intelligence System

Up-to-date threat intelligence is key to maintaining optimal security posture and stopping malware, phishing, ransomware, and other cyber-attacks. Cato’s teams of security experts has developed a purpose-built AI-based reputation system that autonomously aggregates and scores threat indicators from 250+ threat intelligence feeds. The system continuously measures threat records quality and relevancy and simulates potential impact on real traffic. An updated and aggregated blacklist is automatically published across the Cato SASE Cloud Platform, ensuring up-to-date protection with near zero false positives with no customer involvement.

Learn more about Cato AI/ML

Rapid Mitigation of Emerging Threats

Enterprises often struggle with the process, resources, and time it takes to protect their networks from emerging vulnerabilities (CVEs). Through the Cato IPS, we provide virtual patching to rapidly block attempts to exploit these vulnerabilities and secure our customer’s networks. Cato’s dedicated team of experts build, test and deploy new IPS rules in record time to quickly adapt to new CVEs without requiring any customer involvement. This “virtual patching” provides enterprises with the assurance that they are protected from high-risk emerging threats while they take the time needed to carefully update and patch impacted systems.

Meet The Cato Security Research Team

Cato’s security research and engineering teams are built from ex-IDF cyber security analysts and data scientist that work together to make sure our customers are always protected against known and emerging cyber threats and attacks. Their area of expertise span across advanced attack analysis, reverse engineering, software development, data science, and AI (artificial intelligence) and ML (machine learning).

Elad Menahem – VP Research

Learn about the unique background of Cato’s security personnel and why converging security and networking data is critical for any security researcher.

Avishay Zawoznik – Security Research Manager: Security Content

Cato sets records on time to protect. See how the team identifies new threats and implements pinpoint protections so quickly.

Avidan Avraham – Security Research Manager: Data Science

Hear how Cato’s security and data scientists develop models to enrich security visibility and control across the Cato security stack.

The Strategic Benefits of a True SASE Platform

Architected from the ground up as a true cloud-native SASE platform, all Cato's security capabilities, today and in the future, leverage the global distribution, massive scalability, advanced resiliency, autonomous life cycle management, and consistent management model of the Cato platform.

Consistent Policy

Cato extends all security capabilities globally to deliver consistent policy enforcement everywhere and to everyone, from the largest datacenters and down to a single user device.

Scalable and Resilient Protection

Cato scales to inspect multi-gig traffic streams with full TLS decryption and across all security capabilities, and can automatically recover from service component failures to ensure continuous security protection.

Autonomous Life Cycle Management

Cato ensures the SASE cloud platform maintains optimal security posture, 99.999% service availability, and low-latency security processing for all users and locations without any customer involvement.

Single Pane of Glass

Cato provides a single pane of glass to consistently manage all security and networking capabilities including configuration, analytics, troubleshooting, and incident detection and response. Unified management model eases new capabilities adoption by IT and the business.

Cato SASE Cloud Platform Powers the Digital Business

Cato changes the ownership model of IT infrastructure to “as-a-service” platform to transform how IT delivers the capabilities the business needs when and where they need it.  The Cato SASE platform represents the essential re-architecture of networking and security to meet the speed, agility, and security needed for the digital business.  

“We ran a breach-and-attack simulator on Cato, Infection rates and lateral movement just dropped while detection rates soared. These were key factors in trusting Cato security.”

Try Cato

The Solution that IT teams have been
Waiting for. Prepare to be amazed!

Contact Us