Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Similar documents
Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.

Cato Networks. Network Security as a Service

How to Re-evaluateYour MPLS Service Provider

Switching Firewall Vendors? Drop the Box!

Network. Arcstar Universal One

Transform your network and your customer experience. Introducing SD-WAN Concierge

90 % of WAN decision makers cite their

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Transform your network and your customer experience. Introducing SD-WAN Concierge

MPLS, SD-WAN, and the Promise of SD-WAN as a Service

SERVICE DESCRIPTION SD-WAN. from NTT Communications

Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

NETWORK AND SD-VPN. Meshing legacy and Cloud Service Providers

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

INNOVATIVE SD-WAN TECHNOLOGY

Seceon s Open Threat Management software

Simplifying the Branch Network

Business Strategy Theatre

Features. HDX WAN optimization. QoS

Data center interconnect for the enterprise hybrid cloud

PROTECT WORKLOADS IN THE HYBRID CLOUD

Total Threat Protection. Whitepaper

Mitigating Branch Office Risks with SD-WAN

Benefits of SD-WAN to the Distributed Enterprise

Deliver Office 365 Without Compromise

Innovative Solutions. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Solutions. Technology Brief

SteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

Unity EdgeConnect SP SD-WAN Solution

Future of the Enterprise WAN: Too Complex to Ignore?

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH

SteelConnect. The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

Converged World. Martin Capurro

AKAMAI CLOUD SECURITY SOLUTIONS

Ensuring a Consistent Security Perimeter with CloudGenix AppFabric

SteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

SONICWALL SECURITY HEALTH CHECK SERVICE

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Reaping the Full Benefits of a Hybrid Network

SONICWALL SECURITY HEALTH CHECK SERVICE

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

WHITE PAPER ARUBA SD-BRANCH OVERVIEW

Future-ready security for small and mid-size enterprises

SONICWALL SECURITY HEALTH CHECK PSO 2017

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Simplifying WAN Architecture

VMware vcloud Networking and Security Overview

SD-WAN Transform Your Agency

Verizon Software Defined Perimeter (SDP).

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN

Takes 3-6 Months to Deploy. MPLS connections take 3-6 months to be up and running in some remote locations. Incurs Significantly High Costs

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

AWS Reference Design Document

Optimizing your network for the cloud-first world

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

Why the Cloud is the Network

Cisco ASA Next-Generation Firewall Services

Connectivity to Cloud-First Applications

Transforming the Cisco WAN with Network Intelligence

BUILDING A NEXT-GENERATION FIREWALL

Delivering the Wireless Software-Defined Branch

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

Meraki MX Family Cloud Managed Security Appliances

Meraki MX Family Cloud Managed Security Appliances

Imperva Incapsula Product Overview

The Top 6 WAF Essentials to Achieve Application Security Efficacy

MODERNIZE INFRASTRUCTURE

Edge for All Business

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN

SD-WAN. The CIO s guide to. Why it s time for a new kind of network

Sichere Applikations- dienste

How SD-WAN Makes UC Apps Dance. The Leader in Failsafe SD-WANs. May 17, Top 10 Coolest SDN Technologies

Secure Extensible Network. Solution and Technology Introduction

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Securing Your Most Sensitive Data

Extending Enterprise Security to Multicloud and Public Cloud

Extending Enterprise Security to Public and Hybrid Clouds

MyCloud Computing Business computing in the cloud, ready to go in minutes

Best Practices for Extending the WAN into AWS (IaaS) with SD-WAN

Application-Aware Network INTRODUCTION: IT CHANGES EVOLVE THE NETWORK. By Zeus Kerravala -

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

The Top 10 Reasons to Replace Your Branch Router with SD-WAN. An ebook presented by Silver Peak Systems

WHITEPAPER. How to secure your Post-perimeter world

Hybrid Network present & future

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Comprehensive Database Security

Versa Software-Defined Solutions for Service Providers

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Voice of the Customer First American Title SD-WAN Transformation

Kaspersky Managed Service Providers Program

The Why, What, and How of Cisco Tetration

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Transcription:

Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN

Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The rise of cloud applications and mobile workforces is changing the shape of business and legacy network traffic patterns. The Wide Area Network (WAN) and network security appliances were built to connect and secure static and physical locations, not today s fluid mobile-first and cloud-centric networks. Cato Networks: Software-defined and Cloud-based Secure Enterprise Network Cato provides organizations with an integrated network and security platform that is designed for the modern enterprise s needs. The network is broken: The fragmentation of the network makes it increasingly difficult to manage, optimize and secure. One Security A full suite of cloud-based network security services built directly into the network and protecting all traffic. One Network Cato reestablishes the enterprise network perimeter in the cloud, connects all enterprise resources and carries WAN and Internet traffic. Network security can t keep up: Network security must scale, evolve and adapt - fast. The need to upgrade embedded security software creates an exposure given the velocity and sophistication of cyber attacks. One Policy Cato enforces a unified policy for all traffic and across all users, locations and applications. Building and sustaining a secure network is too expensive: The cost of MPLS backhaul, distributed appliances, and the need to securely connect mobile users and Cloud infrastructure pressures IT resources and budget. Physical Data Center Remote Location Cloud Data Center Mobile Users

Cato Cloud The Cato Cloud is the new enterprise network Integrated Software Stack perimeter, implemented as a tightly integrated network and security software stack. It connects all branch offices, mobile users, physical and cloud data centers to provide secure WAN and internet connectivity everywhere. Security Next Generation Firewall VPN Secure Web Gateway Security Services Advanced Threat Prevention Secure Cloud and Mobile Access Network Forensics Agile and Elastic Network Security Cato has developed a next generation firewall directly built into the network fabric that enforces corporate wide security policy on all traffic. Cato is extending its security capabilities to control access to Cloud resources and stop malware infection and data extrusion. Network Network Services Routing Encryption Optimization Reliability Accelerated, Encrypted and Optimized Network Traffic routing, DNS, DHCP and encryption is handled by Cato Cloud. Optimal routing between PoPs is ensured by handling traffic end-to-end which minimizes hops and latency. Multiple optimizations including dynamic path selection, forward error correction and transparent proxy are applied to all traffic. Secure Tunneling Options to the Cato Cloud A Global, SLA-backed Backbone Management, Scalability and Adaptability Existing Firewall: IPSEC tunnel for WAN and/or internet traffic Cato Socket: A zero touch tunneling device for a physical location Cato vsocket: Virtual gateway for Amazon AWS and Microsoft Azure Cato Client: A software agent for laptops, tablets and mobile devices Cato runs on top of a global network of physical points-ofpresence (PoPs) connected to multiple tier-1, SLA-backed carriers with multi-gigabit links. The PoPs are designed for redundancy and high availability within and across instances. Cato seamlessly scales and rapidly evolves to introduce new features and adapt to emerging threats. Network usage, security events and policy configuration are done through a cloud-based management application.

Cato Security Services Cato Cloud Network Next Generation Firewall/VPN Advanced Threat Prevention Routing Reliability Secure Internet Access from Anywhere: Eliminates traffic backhaul with direct internet access from any location Simple Mesh: Uses simple rules to connect any-to-any location High Performance and Elastic: Secures traffic at multi-gigabit speeds with no capacity upgrades Application Awareness: Identifies network access to on-premise and Cloud applications regardless of port, protocol, SSL User Awareness: Identifies users, groups, and locations regardless of IP address Unified, Granular Security Policy: Controls access to applications, servers and network resources Anti-malware: Scans HTTP and HTTPS for malicious files and stop endpoint infections Secure Cloud and Mobile Access Enforce access control policies on mobile access to internal and cloud resources Seamlessly extend security policies to cloud infrastructure Network Forensics Detailed reporting and monitoring of real-time and historical network activity Collection and delivery of full network and security events logs for external analysis Optimal Routing: SLA-backed routing between PoPs Proprietary Protocol: Better than BGP, considers distance, packet loss, jitter and more Encryption Secure Last Mile: SLA-backed global VPN access to the nearest PoP Secure Backbone: Encrypted last mile and inter-pop communication Active/Active: Uses 2 ISP links (MPLS, ADSL, Cable, 4G/LTE) for maximum availability Forward Error Correction (FEC): Minimizes impact of packet loss Optimization Dynamic Path Selection: Routes traffic between T-1 carriers based on real-time behavior Fast DNS: Caching and fast queries Transparent TCP Proxy: Fast-Ack, window management and fast retransmit Policy-based Routing: Dynamically allocate application traffic to appropriate link based on link quality Secure Web Gateway Dynamic Site Categorization: Includes a URL database with broad site classification by category including phishing, malware delivery, botnets and other malicious sites Enforce Web Access Policies: Enforces a corporate policy for web usage Block, Prompt or Track User Access: Reduces legal or security exposure from risky web usage Cato Management Application Cato NOC/SOC teams, managed service providers and customers IT staff can: Monitor the Network in Real Time: Including topology, connected devices and network usage statistics Enforce Network Usage and Security Policies: By business requirements and across all enterprise resources Audit, Monitor and Alert on Events: Monitor and alert on security events and network usage with full audit of all changes to the system configuration and policies

Use Cases Appliance Elimination Secure and Optimized SD-WAN Costly and Complex Appliance Sprawl? Branch Footprint Reduction Cato eliminates dedicated branch office network security appliances. Cato protects all connected locations and seamlessly scales to secure all traffic, without the need for unplanned hardware upgrades and resource-intensive software patches. Cato delivers continuous, up-to-date protection without any customer involvement. Expensive MPLS Links with Limited Capacity? Enterprises are dependent on high cost and bandwidthconstrained MPLS links. They are looking to augment MPLS-based WAN connectivity with affordable, highcapacity internet links. Augment or Replace MPLS Links Cato enables organizations to offload MPLS traffic, specifically internet-bound traffic to the Cato Cloud. Cato uniquely provides built-in network security for direct secure internet access, SLA-backed WAN for MPLS replacement and secure connectivity for Cloud infrastructure and mobile users. Traditional networks require multiple, dedicated appliances at each location to provide wide area networking (WAN) and security services. Distributed appliances require ongoing management, updates, upgrades and capacity planning to maintain the environment. Direct Internet Access SLA-backed, Affordable WAN Appliance Sprawl or Traffic Backhaul? Securing internet access in the branch office is a tough choice between deploying expensive distributed security appliances or backhauling internet traffic that overloads MPLS links and impacts the user experience. No Appliances and No Backhaul Cato connects all branch offices and remote locations to the Cato Cloud, providing enterprise-grade network security for any location without the need for dedicated appliances or traffic backhauling. Bad Response Time from Remote Locations? High network latency can have a serious impact on productivity and the user experience in remote locations. Enterprises need to make a tough trade-off between an affordable, but high-latency, internet-based network or an expensive SLA-backed MPLS network. SLA-backed, Affordable, Low-latency WAN Cato leverages cloud scalability, software-defined networking and smart utilization of a multi-carrier backbone to deliver a high-performance, SLA-backed global WAN, at an affordable price.

Use Cases 36 Sites, Global Manufacturer Network Hybrid Cloud Network Integration Point Solutions for Physical and Cloud Data Centers Connectivity and Security? Migrating parts of a data center to the cloud can fragment access controls and security policies. This separation complicates policy management and obscures overall visibility. Unified Connectivity and Security Across Physical and Cloud Data Centers Cato provides simple integration of physical and cloud data center. It seamlessly extends corporate access control and security policies to cloud infrastructures, enabling unified management of both physical and cloud-based resources. Unified Policy Admin Mobile Workforce, Secure Cloud Access No Visibility and Control for Mobile Access to the Cloud? Mobile users, especially those using personal devices for work, can connect directly to the web, which bypasses most corporate network security policies. Alternatively, forcing users through a specific network location, such as a data center firewall, impacts performance and the user experience often leading to non-compliance. Secure and Optimize Mobile Cloud Access, Everywhere Cato connects every mobile user to the Cato Cloud and provides secure and optimized access to enterprise resources in physical and cloud data center, cloud applications and internet sites. With compatible cloud applications, it is possible to restrict access to the Cato Cloud IP range, so stolen credentials cannot be used to access enterprise data in the cloud. Global WAN including branch locations and cloud data centers, using the Cato Cloud.

Cato s Capabilities Capability Features Benefit Capability Features Benefit Affordable, Optimized Global Access to Corporate Data Global network of Points of Presence (PoPs) Encrypted, SLA-backed and optimized backbone MPLS-like network backbone at a fraction of the cost Improved user experience and productivity Enterprise-wide Security Policy Enforce a unified security policy across all mobile users, branches, physical and cloud data centers and applications (on-premise and in the cloud) Better control over enterprise access with fewer point solutions policies Flexible and Resilient SD-WAN Enterprise-grade Security Services Easily and securely connect branches, users and data centers Cato Socket supports multiple ISP connections (active/passive, active/ active) including MPLS, ADSL, Cable, 4G/LTE Forward Error Correction: reduce last mile packet loss Multiple Cato Cloud connectivity options through existing equipment, self-service provisioning Next Generation Firewall VPN Secure Web Gateway Advanced Threat Prevention Enhanced WAN availability and access Simplify on boarding of new users, offices, M&A assets Better security posture No capacity constraints No more patching Cloud Applications Access Control Cloud Data center Network Integration Cato Central Management Console Restrict access to cloud apps to Cato Networks IP Range Connect and secure access to cloud data centers and servers Full visibility of network topology and usage by user, location and application Easy configure access control and security policy for all assets Centralized view of network and security events Reduce risk of unauthorized access due to credentials theft One cloud data centers and servers policy controlling access to both physical and cloud data centers Reduces the need to use multiple interfaces Enhanced ability to troubleshoot network performance problems Manage a distributed network from a single pane of a glass. Secure Cloud and Mobile Access Network Forensics 24X7 Cato SOC/NOC Cato s experts continuously monitor global backbone for optimal service Augment your IT team s resources and expertise Elastic, Scalable and Agile Network Security Network security capacity seamlessly scales in the cloud and Cato Security Services are transparently updated with new features and countermeasures against emerging threats No hardware purchases and upgrades

About Cato Networks Cato Networks provides organizations with a software-defined and cloudbased secure enterprise network. Cato delivers an integrated networking and security platform that securely connects all enterprise locations, people and data. The Cato Cloud reduces MPLS connectivity costs, eliminates branch appliances, provides direct, secure internet access everywhere, and seamlessly integrates mobile users and cloud infrastructures to the enterprise network. Based in Tel Aviv, Israel, Cato Networks was founded in 2015 by cybersecurity luminary Shlomo Kramer, who previously cofounded Check Point Software Technologies and Imperva, and Gur Shatz, who previously cofounded Incapsula. Network+Security is Simple Again For more information: www.catonetworks.com @CatoNetworks All rights reserved Cato Networks 2016