Cato Intrusion Prevention System (IPS)

Cato IPS provides organizations with real-time protection against advanced threats and attacks that utilize known and unknown exploits. IPS protection applies to all traffic including Internet, WAN, and Cloud, preventing ransomware delivery and propagation and data theft.

Security Threats Dashboard IPS Management Page IPS Management Page IPS Management Configuration Geo Restriction Management Page Advanced Heuristics AI-managed TI

Cato IPS Capabilities

Phishing & Malware Protection with Real-Time AI/ML

Attackers often use techniques like Domain Squatting and Domain Generation Algorithms (DGAs) to evade reputation-based prevention tools. Cato’s IPS integrates complex AI/ML models in its real-time inspection engine to detect Domain Squatting and DGAs. Threats are identified using deep learning models and correlation of data points such as domain popularity, age, letter patterns and more. Brand impersonation is detected through analysis of webpage components such as favicon, images, and text.
Moving tools that were previously available only in post-mortem analysis into real-time prevention dramatically improves prevention efficacy and the enterprise security posture.

Security Threats Dashboard

Prevention of Ransomware Delivery, C&C and Propagation

A successful ransomware attack requires delivery of the ransomware, command and control (C&C) communication with the attacker, and propagation across the network for maximal impact.
Cato IPS has full visibility to both Internet and WAN traffic. It prevents malware delivery and C&C communication by blocking malicious files download, and access to domains and IP addresses associated with ransomware and malicious activity. Propagation across the WAN is prevented by detection and blocking of lateral movement patterns and indicators.
The comprehensive visibility of Cato IPS provides not just a reduction in ransomware exposure, but also minimizes the potential impact of a ransomware attack.

IPS Management Page

Rapid and Seamless Mitigation of Emerging Threats

Enterprises often struggle with the process, resources and time it takes to protect their networks from emerging CVEs. Cato IPS provides virtual patching to rapidly secure our customers’ networks when mitigation time is critical. Cato dedicated team of experts build, test and deploy new IPS rules in record time to quickly adapt to new CVEs without requiring any customer involvement. This “virtual patching” provides enterprises with the assurance that they are protected from high-risk emerging threats while they are updating and patching their impacted systems.

IPS Management Page

Cloud-scale Traffic Inspection

Leveraging the power of cloud-native architecture, Cato delivers an elastic and scalable IPS, allowing organizations to inspect all traffic, including TLS-encrypted traffic. Massive cloud compute resources eliminate the need to fine-tune signature sets or limit traffic sent to the IPS. All locations and users, including cloud infrastructure, branch locations, and remote users are protected with Cato’s IPS, eliminating the need to scale and upgrade FW/IPS appliances. With Cato, organizations no longer end up with an IPS that is only inspecting some traffic or use a limited set of signatures due to resource constraints.

IPS Management Configuration

Geo-Fencing for Attack Surface Reduction

One of the simplest methods of reducing your organization’s attack surface is to block countries that your organization has no business need to interact with. Cato’s IPS allows you to quickly block traffic of specific geographies (inbound, outbound, or both) with a single global policy that applies to all users and locations.

Geo Restriction Management Page

Purpose-built Heuristics Language Leverages SASE Convergence

Cato IPS uses heuristics to identify threats and attacks in real time. Heuristics are comprised of a set of conditions examined against real network traffic.
A part of Cato’s Single Pass Cloud Engine (SPACE), Cato IPS has visibility to data standalone IPS solutions cant consider including URL classification, app id, target risk score, target popularity, device fingerprint, user authentication, and more.
With a purpose-built heuristics language that is designed to leverage true SASE convergence, enterprises benefit from a robust prevention of threats in real-time.

Advanced Heuristics

Automated AI-Managed Threat Intelligence

Up-to-date threat intelligence is key to IPS efficacy against malware, phishing, and command and control (C&C) sites, and reduced friction caused by false positives. Cato IPS uses a purpose-built AI-based reputation system that autonomously aggregates and scores information from 250+ threat intelligence feeds. The system continuously maps and clears overlaps between feeds, measures threat records quality and relevancy, and simulates potential impact on real traffic. An updated and aggregated blacklist is automatically published to all Cato PoPs, ensuring up-to-date protection with near zero false positives and no customer involvement.

AI-managed TI

Cato Intrusion Prevention System Demo Video

Cato’s IPS provides protection for all locations and mobile users with a comprehensive set of signatures and no customer fine-tuning required. Additionally, organizations can leverage Cato IPS to increase their security posture by blocking newly registered domains, alerting on suspicious activity and through the use of a custom geo-restriction policy.

Ventajas estratégicas de una verdadera plataforma SASE

Diseñado desde cero como una verdadera plataforma SASE nativa en la nube, todas las funciones de seguridad de Cato (tanto actuales como futuras) sacan el máximo partido de la distribución global, de la enorme capacidad de redimensión, de una resiliencia avanzada, de la gestión autónoma de ciclos vitales y del modelo de gestión constante de la plataforma de Cato.

 

Cumplimento uniforme de políticas

Cato extiende todas las funciones de seguridad al plano global para ofrecer un cumplimiento coherente de políticas en todas partes y para todo el mundo, desde en los centros de datos más grandes hasta en los dispositivos de un solo usuario.

 

Protección resistente y redimensionable

Cato puede agrandarse para inspeccionar flujos de tráfico de varios gigas (contando con descifrado TLS completo y abarcando a todas las funciones de seguridad) y puede recuperarse automáticamente de fallos de componentes de servicios para garantizar que la protección de seguridad sea continua.

 

Gestión autónoma de los ciclos de vida

Cato asegura que la plataforma en la nube SASE mantiene una postura de seguridad óptima, una disponibilidad del servicio del 99,999 % y un procesamiento de seguridad de baja latencia para todos los usuarios y ubicaciones sin que el cliente deba intervenir.

 

Panel único

Cato ofrece un panel de control único para gestionar de forma unificada todas las funciones de seguridad y redes, incluyendo la configuración, el análisis, la resolución de problemas y la detección de incidentes y la respuesta ante los mismos. Este modelo de gestión unificada facilita la adopción de nuevas facilidades por parte de TI y de las empresas.

 

«Ejecutamos un simulador de filtraciones y ataques. Los índices de infección y los movimientos laterales cayeron en picado a la vez que los índices de detección subieron. Esos fueron factores clave por los que confiamos en la seguridad de Cato».

Prueba Cato

La solución que los equipos de TI han estado esperando.

¡Prepárate para que te sorprendan!