Universal Zero Trust Network Access (ZTNA)

Universal Zero Trust Network Access (ZTNA) allows organizations to create a single access policy to enterprise resources based on risk and least privilege principles, and enforce it on all users regardless of location โ€“ in the office, at home or remote.

WAN Firewall Policy Device Posture Configuration Bandwidth Management Priorities Clientless Access Configuration User Application Analytics Self Service Onboarding Portal

Single, Risk-based ZTNA Policy Everywhere

Catoโ€™s Universal ZTNA uses a single risk-based policy to control user access to sensitive data using identity and a variety of access context attributes including device security posture, user geography, application risk, and compliance ratings. Cato consistently enforces ZTNA policies across its global cloud service and all users regardless of their location โ€“ office, home, or remote.

WAN Firewall Policy

Continuous Device Posture Evaluation

Cato evaluates connected device posture, including operating system and patches, anti-virus, disk encryption, device firewall, geographic location, and device certificate at connection and throughout the session. If a posture check fails, Cato can terminate the userโ€™s connection entirely or block access to specific resources until the device becomes compliant. Continuous device posture evaluation strengthens the security posture of organizations by ensuring devices meet a minimum set of requirements, reducing the risk of data breaches from compromised endpoints.

Device Posture Configuration

Application Optimization for Consistent User Experience

Remote users often complain about application performance degradation, impacting their productivity. This is typically a result of an unreliable internet connection and traffic backhauling to a central location for security inspection.

The Cato SASE Cloud Platform includes a global private backbone that features robust optimization and QoS capabilities, targeted to deliver optimized access to cloud and on-premises resources from anywhere. With Cato, remote users connected to The Cato SASE Cloud Platform enjoy the same optimized application access as users at office locations, ensuring optimal user experience and maximum productivity, without security compromises.

Bandwidth Management Priorities

Clientless Application Access for 3rd-parties and BYOD

Cato natively supports browser-based clientless access to private applications for users who canโ€™t use the Cato Client. Admins can easily publish applications to a web portal, create access policies, and enable instant secure application access for any user. Catoโ€™s clientless access requires minimal setup and can be deployed with secure authentication from an external SSO and MFA provider of your choice or using Catoโ€™s user database.

Clientless Access Configuration

Full Remote Access Visibility and Control

Cato provides administrators and auditors a dedicated dashboard to monitor remote user connectivity and activity. The dashboard shows currently connected users, their location, their source device and posture, and their application usage analytics. One-click filtering allows further per-user analysis, for related networking, access, and security events which can support the creation of new access policies.

User Application Analytics

Corporate, BYOD, and Wide OS Support for Every Use Case

Cato Universal ZTNA client supports Windows, MacOS, iOS, Android, and Linux for maximum coverage, regardless if the device is corporate-owned or BYOD. To help admins seamlessly migrate from their legacy VPN to the Cato Universal ZTNA, central deployment via common Mobile Device Management (MDM) is supported. A self-service portal for user provisioning is available for external contractors and enterprises who do not use MDMs.

Self Service Onboarding Portal

Continuous Threat Prevention and Data Protection

Cato continuously evaluates all user traffic for threat prevention and data protection. Catoโ€™s Single Pass Cloud Engine (SPACE) inspects the userโ€™s session traffic using multiple security engines including FWaaS, SWG, IPS, NGAM, CASB, DLP, RBI, and more. Malicious traffic and unauthorized access to sensitive data are identified, audited, and blocked. Cato helps enterprises address remote access, threat prevention, and data protection requirements using a single platform, avoiding complex routing and integration projects often needed to support remote access cases.

Zero Trust Network Access Video Demo

Cato’s SASE platform offers full-mesh connectivity for all users and locations connected to the service. Granular, context-aware policies are defined in the WAN firewall rules. By default, users can only access explicitly permitted resources, with clientless access options and comprehensive visibility and event tracking.

็œŸๆญฃ SASE ๅนณๅฐ็š„็ญ–็•ฅๆ€งๅ„ชๅ‹ข

Cato ๅนณๅฐไปฅ็œŸๆญฃ้›ฒ็ซฏๅŽŸ็”Ÿ็š„ SASE ๅนณๅฐ็‚บๅŸบ็คŽ่จญ่จˆ๏ผŒ็„ก่ซ–ๆ˜ฏ็พๆœ‰้‚„ๆ˜ฏๆœชไพ†็š„ๅฎ‰ๅ…จๅŠŸ่ƒฝ๏ผŒ้ƒฝๅ……ๅˆ†ๅˆฉ็”จๅ…ถๅ…จ็ƒๅˆ†ไฝˆใ€ๅคง่ฆๆจกๆ“ดๅฑ•่ƒฝๅŠ›ใ€ๅ“่ถŠ็š„้ŸŒๆ€งใ€่‡ชไธป็”Ÿๅ‘ฝ้€ฑๆœŸ็ฎก็†ไปฅๅŠไธ€่‡ด็š„็ฎก็†ๆจกๅผใ€‚

ไธ€่‡ด็š„ๆ”ฟ็ญ–ๅŸท่กŒ

Cato ๅฐ‡ๆ‰€ๆœ‰ๅฎ‰ๅ…จๅŠŸ่ƒฝๅปถไผธ่‡ณๅ…จ็ƒ๏ผŒๅพžๅคงๅž‹ๆ•ธๆ“šไธญๅฟƒๅˆฐๅ–ฎไธ€็”จๆˆถ่ฃ็ฝฎ๏ผŒๅ…จ้ขๅฏฆ็พไธ€่‡ด็š„ๆ”ฟ็ญ–ๅŸท่กŒใ€‚

ๅ…ทๆ“ดๅฑ•ๆ€งไธ”้ซ˜้ŸŒๆ€ง็š„ไฟ่ญท

Cato ๅฏๆ“ดๅฑ•่‡ณๆชขๆŸฅๅคš Gbps ็š„ๆต้‡๏ผŒๅŒ…ๆ‹ฌๅฎŒๆ•ด็š„ TLS ่งฃๅฏ†ๅŠๆ‰€ๆœ‰ๅฎ‰ๅ…จๅŠŸ่ƒฝ๏ผŒไธฆๅ…ทๅ‚™่‡ชๅ‹•ๅพฉๅŽŸ่ƒฝๅŠ›๏ผŒ่ƒฝๅœจ็ณป็ตฑๅ…ƒไปถๆ•…้šœๆ™‚็ขบไฟๅฎ‰ๅ…จไฟ่ญทไธไธญๆ–ทใ€‚

่‡ชไธป็”Ÿๅ‘ฝ้€ฑๆœŸ็ฎก็†

Cato ็ขบไฟ SASE cloud ๅนณๅฐๅง‹็ต‚ไฟๆŒๆœ€ๅ„ชๅŒ–็š„ๅฎ‰ๅ…จ็‹€ๆ…‹ใ€99.999% ็š„ๆœๅ‹™ๅฏ็”จๆ€ง๏ผŒไปฅๅŠไฝŽๅปถ้ฒ็š„ๅฎ‰ๅ…จ่™•็†๏ผŒๅ…จ้ข่ฆ†่“‹ๆ‰€ๆœ‰็”จๆˆถๅ’Œๆ“š้ปž๏ผŒไธ”็„ก้œ€ๅฎขๆˆถ้กๅค–ๆ“ไฝœใ€‚

ๅ–ฎไธ€่ฆ–็ช—็ฎก็†

Catoๆไพ›็š„็ตฑไธ€็ฎก็†ๅนณๅฐ๏ผŒ่ฎ“่ฒดๆฉŸๆง‹ๅฏไปฅ็ฉฉๅฎš่€Œๅฏ้ ๅœฐ็ฎก็†ๆ‰€ๆœ‰ๅฎ‰ๅ…จๅŠ็ถฒ็ตกๅŠŸ่ƒฝ๏ผŒๅŒ…ๆ‹ฌ้…็ฝฎใ€ๅˆ†ๆžใ€ๆ•…้šœๆŽ’้™คไปฅๅŠไบ‹ไปถๆชขๆธฌ่ˆ‡ๅ›žๆ‡‰ใ€‚็ตฑไธ€็ฎก็†ๆจกๅผ่ฎ“ IT ๅœ˜้šŠๅ’Œไผๆฅญ่ƒฝๆ›ด่ผ•้ฌ†ๅœฐๆŽก็”จๆ–ฐๅŠŸ่ƒฝใ€‚

ใ€Œๆˆ‘ๅ€‘ๅœจ Cato ไธŠ้€ฒ่กŒไบ†ๆ”ป้˜ฒๆจกๆ“ฌๆธฌ่ฉฆ๏ผŒ็ตๆžœ้กฏ็คบๆ„ŸๆŸ“็އๅ’Œๆฉซๅ‘็งปๅ‹•ๆ˜Ž้กฏ้™ไฝŽ๏ผŒ่€Œๅตๆธฌ็އๅ‰‡ๅคงๅน…ๆๅ‡ใ€‚้€™ไบ›ๅ› ็ด ๆ˜ฏไฟกไปป Cato ๅฎ‰ๅ…จๆ€ง็š„้—œ้ตๆ‰€ๅœจใ€‚ใ€

่ฉฆ่ฉฆ Cato ๅง

IT ๅœ˜้šŠไธ€็›ดๆœŸๅพ…็š„่งฃๆฑบๆ–นๆกˆใ€‚

ๆบ–ๅ‚™ๅฅฝ่ขซ้ฉš่‰ทไบ†ๅ—Ž๏ผ