Cato Networks delivers instant visibility and control of cloud application data risk

Shlomo Kramer of Cato Networks

London, UK. 1February, 2022 — Cato Networks, provider of the SASE platform, introduced Cato CASB, the Cloud Access Security Broker (CASB) to deliver actionable value in under 60 minutes. Along with the Cloud Application Catalogue launched last month, Cato provides the quick to deliver and easy to run solution for managing cloud application data risk.

“CASB addresses a critical visibility and control gap created by cloud migration but must be converged into a broad SASE platform to be truly effective across the business,” says Shlomo Kramer, co-founder and CEO of Cato Networks, “We’ve done just that with Cato CASB. By building Cato CASB into the Cato SPACE engine, it can leverage the global footprint, rich context, cloud scalability, and self-healing and self-maintenance underpinning the Cato SASE Cloud. Cato CASB is just the latest example of high impact, high value capabilities that are effortless to deploy and use.”

SASE: The Cato difference

With Cato CASB, Cato brings the benefits of a true SASE platform to the challenge of managing cloud application risk. Legacy, stand-alone CASB solutions require extensive planning and deployment times that can take several months. By contrast, Cato CASB is instantly available offering full visibility and control of cloud application access immediately.

As part of Cato SASE Cloud, Cato CASB is available worldwide from 70+ locations for every site or user accessing any cloud application. This broad footprint enables optimised enforcement of corporate policies on all cloud access without introducing high latency, even when accessing cloud applications across geographical regions. Legacy CASB solutions coverage vary by location or available capabilities.

And Cato CASB taps the full power of Cato’s multi-layer threat defence. Cloud-based file access is inspected by Cato advanced anti-malware and IPS engines. Access control to locations and resources are limited through Cato NGFW and SWG. With legacy CASB, all of those components would be additional, requiring integration and deployment.

The four steps to managing cloud application risk

More specifically, with the announcement, Cato addresses all four stages for managing cloud application data risk, visibility, assessment, enforcement, and protection.

Visibility: The new shadow IT dashboard

Cato is introducing a new Shadow IT dashboard that provides a bird’s eye view of aggregate SaaS usage including number of total and high-risk applications, list of the highest risk applications, number of users accessing them, as well as distribution by risk.

Assessment: The Cato application credibility engine (ACE)

Having identified unauthorised applications, IT leaders must assess their risk before deciding if they should be blocked, controlled, or allowed. Cato has built a unique Application Credibility Engine (ACE) which automates data collection from several sources to enable a quick and accurate assessment of each application. Three vectors are aggregated together for a comprehensive analysis, general company information, compliance features, and security capabilities.

Machine learning algorithms operating against Cato’s massive data lake of flow metadata analysing the actual features applications exhibit on the network. Currently, Cato regulatory compliance verification includes HIPAA, PCI, and SOC 1-3. Security feature verification includes MFA, encryption of data at rest, and SSO.

Enforcement: Cato CASB rules define access policies

Having discovered unauthorised applications on their networks and been able to assess their risk, IT leaders must now decide how they want to respond. With Cato CASB, they gain fine-grained access over the application. The rules allow them to define the matching criteria, the specified action to be taken in case the rule applies, the associated severity level, and whether an alert or event should be generated.

Protection: Cato detects and blocks threats and breaches

The last stage is ensuring the protection of SaaS usage. Cato’s SASE achieves this through the convergence of its security tools. All SaaS traffic is processed by multiple security tools, NGFW, SWG, IPS, and NGAM. Together, these tools provide comprehensive protection from a wide array of threats.

Click to learn more about Cato CASB and the rest of the Cato SASE Cloud.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

Workz debuts unrestricted IoT device management

Posted on: May 3, 2024

Workz, a cloud-based eSIM vendor, has launched its new remote device management solution designed for the Internet of Things (IoT) industry. The platform eliminates the restrictions associated with traditional technologies

Read more

Itron improves Temetra platform for water utilities in Australia and New Zealand

Posted on: May 2, 2024

Itron expands the capabilities of its Temetra platform in Australia and New Zealand to include NB-IoT communications, enabling digital transformation for water utilities. Temetra’s comprehensive offering includes metre data processing,

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into

Read more