|
By Christopher Rudolph
It’s becoming all too common these days: ransomware hitting another organization. However, most people don’t know exactly what happens when ransomware is found and what must be addressed. What makes it even more challenging for healthcare is that the data that can be stolen, like personal health information, is much more valuable than credit card numbers.
|
By Dolev Moshe Attiya
In a world where dozens of CVEs are released every day, there are vulnerabilities, and there are vulnerabilities. The latest Microsoft Windows LDAP (Lightweight Directory Access Protocol) vulnerabilities, which were coined not once but twice (“LDAPBleed” and “LDAPNightmare”), clearly belong to the shortlist of new and dangerous CVEs.
|
By Philip Walley
Enterprises expanding their operations often face the challenge of also ensuring seamless and secure connectivity in China, a critical market with unique regulatory and network challenges. Businesses entering this vast market often face three primary obstacles: These challenges can hinder productivity, stall digital transformation, and overwhelm IT teams. The question is clear: how can enterprises achieve secure, seamless, and compliant connectivity in this complex digital environment?
The WAN landscape is evolving at a rapid pace, driven by demands of cloud, mobility, and globalization. MPLS (Multiprotocol Label Switching), a legacy transport technology, once the gold standard, now struggles to meet modern business requirements.
|
By Sangita Patel
In today’s rapidly evolving digital landscape, IT leaders are under constant pressure to deliver outcomes that align directly with business value. Gone are the days when technology decisions were made in isolation. Today, every IT investment must contribute to operational efficiency, cost savings, security, and scalability—all while empowering the business to innovate and grow.
|
By Eyal Webber Zvik
In today’s competitive job market, employees are increasingly seeking a sense of purpose and belonging in their work environments. As McKinsey reports, purpose has become a pivotal factor in employee retention. IT leaders who fail to connect their teams’ day-to-day tasks to a broader mission risk losing top talent to organizations that do.
|
By Elad Menahem
Recently, Google made headlines with the announcement of its new quantum chip, Willow, marking another step forward in the fascinating world of quantum computing. The technology promises to solve problems that are currently intractable for classical computers, fueling excitement—and a fair bit of concern—about its implications for cryptography, particularly the widely used RSA encryption.
|
By Zohar Buber
Modern ransomware attacks have evolved beyond simple encryption to deploy sophisticated double extortion tactics. Threat actors now systematically exfiltrate sensitive data before encrypting systems, ensuring leverage even when victims have robust data backups. Some ransomware gangs have even abandoned encryption altogether, recognizing that the threat of data exposure often proves more compelling for ransom payment.
|
By Adam Fershtman
When an enterprise looks for a network security provider, whether implementing a SASE solution or not, one of its pillar requirements is complete visibility of the assets it holds, which provides the ability to manage its devices. Identifying devices in a network, commonly known as device fingerprinting, provides an enterprise with the ability to control their inventory, which could be a challenging task for companies spread across multiple sites, countries, hybrid datacenters or continents.
|
By John Joyal
Today, Cato Networks introduced Cato IoT/OT Security, the industry’s first SASE-native IoT/OT security solution. Cato IoT/OT Security extends SASE-based protection into IoT/OT environments, improving visibility and security while reducing complexity. Cato IoT/OT Security is a native feature in the Cato SASE Cloud Platform. It allows enterprises to instantly activate the new solution with a click of a button. No additional hardware or software needs to be installed or configured.
|
By Cato Networks
Experience how Cato Networks' revolutionary Safe TLS Inspection eliminates the complexity of inspecting encrypted traffic without impacting performance or user experience. In this demo, see how Cato’s data-driven, automated approach selectively inspects only safe-to-inspect traffic, enabling organizations to uncover hidden threats, prevent data leaks, and fully leverage advanced security features like CASB and DLP. Discover how simple it is to activate this game-changing feature, unleashing the full potential of the Cato SASE Cloud with just a few clicks.
|
By Cato Networks
China is a vital market for global enterprises but often poses connectivity challenges due to strict regulations, unpredictable network performance, and complex compliance requirements. But what if you could turn these challenges into opportunities? Join Philip Walley as he introduces Cato SASE, the ultimate solution for seamless, secure, and high-performance global connectivity to and from China.
|
By Cato Networks
What do motorsport and cybersecurity have in common? Friedemann Kurz, Head of Porsche Motorsport IT, and Etay Maor, Chief Security Strategist at Cato Networks and Founding Member of Cato CTRL, discuss how both rely on teamwork and data to drive success.
|
By Cato Networks
Managing IoT/OT devices can be challenging, but Cato IoT/OT Security simplifies everything. In this demo, see how Cato's SASE platform enables real-time device discovery, granular visibility, and advanced threat prevention. Watch as malicious IoT activity is detected and blocked seamlessly—no extra products or complex setups required!
|
By Cato Networks
Discover how Cato Networks revolutionizes IoT/OT security with its SASE Cloud platform. Watch this demo to see how we ensure seamless visibility, precise policy enforcement, and real-time threat prevention for your enterprise, all while simplifying security management and enhancing operational continuity.
|
By Cato Networks
Managing firewall rules for IoT/OT devices can be complex—but not with Cato Networks. This video demonstrates how to create precise access rules for IoT/OT devices, like blocking Siemens PLC devices, using Cato's flexible, native SASE platform capabilities. Learn how Cato ensures secure, seamless operations. Visit our website for more info!
|
By Cato Networks
You may have heard of tools like ChatGPT and CoPilot, but do you know the difference between machine learning and generative AI? Join Robin Johns as he starts to explore the basic concepts of AI/ML, and how Cato Networks leverages this technology to help protect our customers.
|
By Cato Networks
Gamuda Berhad built what CNN described as one of the top 10 world’s greatest tunnels. Now learn how Gamuda transformed its IT operations and improved its security posture by moving to SASE.
|
By Cato Networks
When you put a cloud network in between your users and applications you can achieve bidirectional QoS. Of course, it helps to have a network edge service/appliance delivered by the same Cloud.
|
By Cato Networks
How can our partners simplify delivery of SASE to their customers? We’re not leaving you to figure that out alone. MSASE (Managed SASE) was designed to make SASE delivery easier and better. Cato’s Sr. Director of Product Marketing, Sangita Patel, explains the idea behind our new offering.
|
By Cato Networks
Organizations require an understanding of the positive ROI implications of security transformation with a holistic, cloud-delivered security architecture. A well-formed security transformation strategy provides an objective cost analysis of potential savings gained by retiring traditional security tools. Understanding how a single converged software stack provides both a financial ROI and a technical ROI will help organizations uncover hidden savings to be gained with their transformation projects.
|
By Cato Networks
When exploring a revolutionary architecture like SASE, it helps to have specific, relatable examples. SASE overlaps both networking and security spaces, sometimes making it difficult to see the whole picture. In this new eBook, we explore what SASE looks like for 5 different industry verticals: Retail & Hospitality, Manufacturing, Credit Unions, Health & Pharmaceuticals and Technology. Many of the benefits of SASE can provide value to any organization, so even if your specific vertical isn't covered, you should take a look!
|
By Cato Networks
While organizations realize they must deploy zero trust, knowing where to begin and how to deploy has become an impediment for many. The Cybersecurity and Infrastructure Agency (CISA) is one of several zero-trust maturity models that provide organizations with a measurable path to zero trust. The Cato SSE 360 architecture is a secure platform that helps facilitate Zero Trust maturity while delivering complete 360-degree protection for users, applications and data. This white paper will discuss how Cato SSE 360 can help facilitate Zero Trust Maturity.
|
By Cato Networks
Before SASE, network and network security services were delivered through multiple point solutions, including legacy appliances. These legacy appliances operated in silos and required countless IT resources and attention to deploy, manage, maintain, and replace. Today, some enterprises are still trapped using these legacy appliances, despite their shortcomings. In the parallel, modern world, SASE offers a single cloud-native network and security service for all networking and security needs.
|
By Cato Networks
Migrating a branch firewall to cloud? Pretty straightforward.... But enterprise security teams often find it challenging when contemplating moving the datacenter FW to the cloud. Unlike the branch firewall or UTM, the datacenter FW is responsible for providing visibility and control over inbound and outbound internet traffic, WAN traffic, vLAN traffic, and more. In this whitepaper, understand all the challenges that come with migrating your datacenter FW to the cloud, in addition to.
|
By Cato Networks
Your SSE project is right around the corner. Our helpful SSE RFP template allows you to meet both current and future security threats while ensuring that your key business objectives are met. Our template, divided into four sections, provides key questions to incorporate into your SSE RFP. This RFP template will allow you to easily identify.
- January 2025 (4)
- December 2024 (15)
- November 2024 (6)
- October 2024 (9)
- September 2024 (7)
- August 2024 (5)
- July 2024 (15)
- June 2024 (10)
- May 2024 (5)
- April 2024 (6)
- March 2024 (5)
- February 2024 (11)
- January 2024 (11)
- December 2023 (5)
- November 2023 (8)
- October 2023 (8)
- September 2023 (12)
- August 2023 (15)
- July 2023 (13)
- June 2023 (9)
- May 2023 (14)
- April 2023 (14)
- March 2023 (14)
Cato enables customers to gradually transform their networking and security infrastructure for the digital business. You can address one or more of the use cases below at your own pace. No matter where you start, Cato will support you throughout your journey.
Cato SASE Cloud with SSE 360 provides a global converged cloud-native service that securely and optimally connects all branches, datacenters, people, and clouds. Cato can be gradually deployed to replace or augment legacy network services and security point solutions.
Cato SASE Cloud:
- Converged: Cato converges SD-WAN and network security capabilities into a single pass architecture.
- Cloud-native: Cato is built from the ground up as an elastic, resilient, and scalable cloud service.
- Global: Cato is available across 75+ global PoPs to support any business location or user.
- All edges: Cato secures and optimizes traffic from all users, locations, clouds, and applications.
SASE, SSE, ZTNA, SD-WAN: Your journey, your way.