Cato Cloud Secures SD-WAN with Threat Hunting System

June 04, 2018

By Maurice Nagle, Web Editor

The next generation of networking solutions is here. SD-WAN is fueling this phase of digital transformation, supporting a SaaSy reality and offering businesses a reliable, flexible and high performing path to the cloud. But what about security?

Cato introduced the Cato Threat Hunting System (CTHS), which is built into the Cato Cloud and utilizes rich traffic context, network and endpoint to reduce down time via proactively pegging threats.  Cato touts CTHS as the first threat hunting system that does not force a company to deploy pricey and dedicated data collection infrastructure.

“As an industry, our ability to detect threats has been significantly hampered by the complexity of collecting granular, relevant data over time and applying the right analytics and people to interpret that data,” says Gur Shatz, co-founder and CTO of Cato Networks. “Virtual cloud networks, such as Cato Cloud, enable effortless access to such data, empowering our proprietary software and world-class SOC to hunt for threats on customer networks.”

In specific, CTHS boasts full access to Internet and WAN traffic, enabling true real time access to every IP, session and flow. CTHS promises proper identification. When leveraging the Cato Security Operations Center (SOC), users receive notifications of impacted devices and threats. The Cato SOC will deploy policies to stop the treat dead in its tracks, and repair affected devices. Via data aggregation and machine learning algorithms, the CTHS is able to mine network context across a number of enterprise networks.

“The network, threat and application data available through the Cato Cloud is an analyst goldmine”, says Elad Menahem, head of security research at Cato Networks, “Using CTHS and its machine learning algorithms trained with data from hundreds of enterprise networks, we’ve been able to focus on the few security events that matter and identify malware infections in minutes.“

There are a lot of SD-WANs out there, each promising exceptional performance and the support of the cloud era, but security is where we witness some serious separation from the pack.

What’s in your WAN?

Edited by Maurice Nagle