Universal Zero Trust Network Access (ZTNA)

Universal Zero Trust Network Access (ZTNA) allows organizations to create a single access policy to enterprise resources based on risk and least privilege principles, and enforce it on all users regardless of location – in the office, at home or remote.

Single, Risk-based ZTNA Policy Everywhere

Cato’s Universal ZTNA uses a single risk-based policy to control user access to sensitive data using identity and a variety of access context attributes including device security posture, user geography, application risk, and compliance ratings. Cato consistently enforces ZTNA policies across its global cloud service and all users regardless of their location – office, home, or remote.

Continuous Device Posture Evaluation

Cato evaluates connected device posture, including operating system and patches, anti-virus, disk encryption, device firewall, geographic location, and device certificate at connection and throughout the session. If a posture check fails, Cato can terminate the user’s connection entirely or block access to specific resources until the device becomes compliant. Continuous device posture evaluation strengthens the security posture of organizations by ensuring devices meet a minimum set of requirements, reducing the risk of data breaches from compromised endpoints.

Application Optimization for Consistent User Experience

Remote users often complain about application performance degradation, impacting their productivity. This is typically a result of an unreliable internet connection and traffic backhauling to a central location for security inspection.

The Cato SASE Cloud Platform includes a global private backbone that features robust optimization and QoS capabilities, targeted to deliver optimized access to cloud and on-premises resources from anywhere. With Cato, remote users connected to The Cato SASE Cloud Platform enjoy the same optimized application access as users at office locations, ensuring optimal user experience and maximum productivity, without security compromises.

Clientless Application Access for 3rd-parties and BYOD

Cato natively supports browser-based clientless access to private applications for users who can’t use the Cato Client. Admins can easily publish applications to a web portal, create access policies, and enable instant secure application access for any user. Cato’s clientless access requires minimal setup and can be deployed with secure authentication from an external SSO and MFA provider of your choice or using Cato’s user database.

Full Remote Access Visibility and Control

Cato provides administrators and auditors a dedicated dashboard to monitor remote user connectivity and activity. The dashboard shows currently connected users, their location, their source device and posture, and their application usage analytics. One-click filtering allows further per-user analysis, for related networking, access, and security events which can support the creation of new access policies.

Corporate, BYOD, and Wide OS Support for Every Use Case

Cato Universal ZTNA client supports Windows, MacOS, iOS, Android, and Linux for maximum coverage, regardless if the device is corporate-owned or BYOD. To help admins seamlessly migrate from their legacy VPN to the Cato Universal ZTNA, central deployment via common Mobile Device Management (MDM) is supported. A self-service portal for user provisioning is available for external contractors and enterprises who do not use MDMs.

Continuous Threat Prevention and Data Protection

Cato continuously evaluates all user traffic for threat prevention and data protection. Cato’s Single Pass Cloud Engine (SPACE) inspects the user’s session traffic using multiple security engines including FWaaS, SWG, IPS, NGAM, CASB, DLP, RBI, and more. Malicious traffic and unauthorized access to sensitive data are identified, audited, and blocked. Cato helps enterprises address remote access, threat prevention, and data protection requirements using a single platform, avoiding complex routing and integration projects often needed to support remote access cases.

Zero Trust Network Access Video Demo

Cato’s SASE platform offers full-mesh connectivity for all users and locations connected to the service. Granular, context-aware policies are defined in the WAN firewall rules. By default, users can only access explicitly permitted resources, with clientless access options and comprehensive visibility and event tracking.

真正 SASE 平台的策略性優勢

Cato 平台以真正雲端原生的 SASE 平台為基礎設計,無論是現有還是未來的安全功能,都充分利用其全球分佈、大規模擴展能力、卓越的韌性、自主生命週期管理以及一致的管理模式。

一致的政策執行

Cato 將所有安全功能延伸至全球,從大型數據中心到單一用戶裝置,全面實現一致的政策執行。

具擴展性且高韌性的保護

Cato 可擴展至檢查多 Gbps 的流量,包括完整的 TLS 解密及所有安全功能,並具備自動復原能力,能在系統元件故障時確保安全保護不中斷。

自主生命週期管理

Cato 確保 SASE cloud 平台始終保持最優化的安全狀態、99.999% 的服務可用性,以及低延遲的安全處理,全面覆蓋所有用戶和據點,且無需客戶額外操作。

單一視窗管理

Cato提供的統一管理平台,讓貴機構可以穩定而可靠地管理所有安全及網絡功能,包括配置、分析、故障排除以及事件檢測與回應。統一管理模式讓 IT 團隊和企業能更輕鬆地採用新功能。

「我們在 Cato 上進行了攻防模擬測試,結果顯示感染率和橫向移動明顯降低,而偵測率則大幅提升。這些因素是信任 Cato 安全性的關鍵所在。」

試試 Cato 吧

IT 團隊一直期待的解決方案。

準備好被驚艷了嗎!