Extended Detection and Response (XDR)

Cato XDR is the industry’s first SASE-based detection and response solution empowering security teams with granular and efficient threat investigation and remediation tools. Cato XDR’s AI and ML algorithms help identify threats in massive data lake, and surface them in a manageable way for analysis and resolution within the Cato Management Application.

XDR Stories Workbench - Threat Prevention Story XDR Stories Workbench - Threat Hunting Stories XDR Stories Workbench - Anomaly Story XDR Stories Workbench - Generative AI and MITRE ATT&CK Tagging XDR Stories Workbench - Endpoint Protection XDR Stories Workbench - 3rd Party EDR Integration Single Console for Threat Detection, Investigation and Response (TDIR) Broadest Range of Native Sensors Reduce False Positives with Cloud-Scale Threat Intelligence

Cato XDR Capabilities

See Through the Alert Fatigue of Threat Prevention Engines

Cato XDR aggregates block events generated by Cato real-time security engines, and groups them into a single Threat Prevention incident. These incidents help security teams to overcome alert fatigue, promptly detect a compromised device and take appropriate containment and remediation actions.

XDR Stories Workbench - Threat Prevention Story

Detect and Remediate Evasive Security Threats

Cato XDR Threat Hunting incidents are created by Cato’s AI/ML engines. The threat hunting engine continuously scan the data lake for anomalous indicators of resident threats that were not blocked by the prevention layers. The Threat Hunting engine groups the various signals into a single incident for further investigation by the security analysts. In addition, ML algorithms suggest a risk score to each incident to help security teams prioritize threat investigation.

XDR Stories Workbench - Threat Hunting Stories

Investigate Suspicious User Activity with Anomaly Detection

Cato XDR integrates End-User Behavioral Analytics (EUBA) capabilities to identify unusual behavior that may indicate a malicious intent. Anomaly detection AI/ML engines compare user’s network activity with a precalculated baseline, and alert on suspicious deviations through the creation of Anomaly Detection incidents. Security teams are presented with detailed information and insights to efficiently investigate and determine if the reported incident is malicious or benign, and take action accordingly.

XDR Stories Workbench - Anomaly Story

Speed-up Incident Investigation with Gen-AI and MITRE ATT&CK mapping

Cato XDR uses multiple AI technologies to enable efficient operations of security teams. Generative-AI is used in the Cato XDR incident ‘storyteller’, which seamlessly strings the data points of an incident to a threat narrative, crafting an easy-to-understand and simple-to-communicate summary.
To further assist in the threat and risk analysis, Cato XDR incidents map into specific MITRE ATT&CK TTPs (Tactics Techniques and Procedures), helping security teams accurately understand the attacker’s progress in the attack kill chain.

XDR Stories Workbench - Generative AI and MITRE ATT&CK Tagging

End-to-End Visibility and Control Delivers Fast Remediation

A common challenge with XDR solutions is that remediation actions are executed over disparate platforms.
Cato XDR is a native capability of the Cato SASE Cloud Platform, enabling security teams to remediate active threats all within the same solution. Firewall rules for endpoint and attack containment can be set in minutes, blocking malicious traffic to and from the internet, and preventing further malware distribution across the WAN. EPP scan can be triggered immediately, proactively cleaning endpoints that may be infected and compromised – all from one, single management application.

XDR Stories Workbench - Endpoint Protection

An Open XDR Powered by Highly-Trained and Proven AI/ML

Cato XDR is an open XDR solution that collects, into a single data lake, raw data from native sensors of the Cato SASE Cloud Platform enriched with events from external sensors such as 3rd party EDR solutions. Cato XDR uses advance AI and ML algorithms for threat hunting and anomaly detection. The algorithms are developed by ex-military security and data analysts, trained on petabytes of data and trillions of events, and already proven across tens of thousands of confirmed security incidents. Cato XDR enables SOC teams to cut threat dwell time and rapidly remediate security incidents.

XDR Stories Workbench - 3rd Party EDR Integration

Single Console for Threat Detection, Investigation and Response (TDIR)

Cato XDR provides SOC teams with a single console to manage the entire incident life cycle. The XDR dashboard inside Cato Management Application (CMA) presents all the incidents, their status, and their ML-calculated risk and priority. Individual incident investigation is one click away, with a common structure of data presentation for further analysis, enriched by AI-powered insights and recommendations. Remediation is done through the same interface, helping SOC teams to avoid switching between management consoles, improving efficiency, and reducing human error potential.

Single Console for Threat Detection, Investigation and Response (TDIR)

Industry’s Broadest Range of Native Sensors Delivers Better Detection and Faster Response

Cato XDR uses the security capabilities of the Cato SASE Cloud Platform as its’ native sensors. Data from the Cato NGFW, SWG, IPS, NGAM, DNS Security, CASB, DLP and RBI is stored in the Cato data lake, serving as a high-quality input to Cato XDR. As native sensor’s data is not reduced at the source, the Cato XDR AI/ML algorithms are significantly less likely to miss critical signals than AI/ML processing data from external sources. SOC teams benefit from unparalleled level of incident accuracy and data richness for investigation.

Broadest Range of Native Sensors

Improve Efficacy and Reduce False Positives with ML-powered, Cloud-scale Threat Intelligence

Cato XDR is enriched by more than 250 threat intelligent sources, yielding over 5 million records of valid IoCs. Cato uses a purpose-built cloud-scale ML platform to ingest threat intelligence feeds from hundreds of sources, process and examine each IoC record in them, and maintain an accurate and up-to-date blacklist and whitelist – without human involvement.
Cato empowers security teams with up-to-date threat intelligence data for efficient operation with near-zero false positives.

Reduce False Positives with Cloud-Scale Threat Intelligence

Extended Detection and Response Video Demo

Cato XDR is a SASE-based detection and response solution empowering security teams with efficient threat investigation and remediation. AI algorithms help identify threat indicators in a massive data lake, surfacing them for manageable analysis and resolution within the single console.

진정한 SASE 플랫폼의 전략적 이점

처음부터 끝까지 진정한 클라우드 네이티브 SASE 플랫폼으로 설계된 Cato의 모든 보안 기능은 현재 Cato 플랫폼의 글로벌 배포, 대규모 확장성, 높은 복원력, 자율적 수명주기 관리, 일관된 관리 모델을 활용하고 있으며 미래에도 그러할 것입니다.

 

일관된 적챙 적용

Cato는 모든 보안 기능을 전 세계적으로 확장하여 대규모 데이터 센터에서 단일 사용자 장치에 이르기까지 모든 곳에서 모든 사람에게 일관된 정책을 시행합니다.

 

확장 가능하고 복원력이 뛰어난 보안

Cato는 전체 TLS 복호화 및 모든 보안 기능을 통해 다중 기가 트래픽 스트림을 검사하도록 확장하고 서비스 구성 요소 오류를 자동으로 복구하여 지속적인 보안을 보장합니다.

 

자율적 수명주기 관리

Cato는 SASE 클라우드 플랫폼이 고객의 개입 없이 모든 사용자와 위치에 대해 최적의 보안 상태, 99.999% 서비스 가용성, 보안 처리 시 짧은 대기 시간을 유지하도록 보장합니다.

 

단일 창

Cato는 구성, 분석, 문제 해결, 사고 감지 및 대응을 비롯한 모든 보안 및 네트워크 기능을 일관적으로 관리할 수 있는 단일 창을 제공합니다. 이 통합 관리 모델을 통해 IT와 비지니스는 새로운 기능을 쉽게 채택할 수 있습니다.

 

“Cato에서 침해 및 공격 시뮬레이터를 실행한 결과 감염률과 내부망 이동은 감소했지만 감지율은 급증했습니다. 이것이 Cato 보안을 신뢰할 수 있는 가장 큰 이유입니다.”

Cato 체험하기

IT 팀이 바라던 솔루션입니다.

기대해주세요!