Cato Networks yesterday announced the release of Cato CASB, the first Cloud Access Security Broker (CASB) to help companies with visibility and managing cloud application data risk. This new offering “addresses a critical visibility and control gap created by cloud migration but must be converged into a broad SASE platform to be truly effective across the business,” said Shlomo Kramer, co-founder and CEO of Cato Networks. Cato’s CASB integrates into the company’s SPACE engine, allowing it to leverage the global footprint, rich context, cloud scalability, and self-healing and self-maintenance underpinning the Cato SASE Cloud.
Along with Cato CASB, Cato brings the benefits of a true SASE platform to the challenge of managing cloud application risk. Typical CASB offerings typically waste valuable time on the planning and deployment stages. Cato’s CASB, on the other hand, is instantly available and easily deployable within an organisation. Companies will immediately have full visibility into and control of their cloud applications.
In addition, Cato CASB taps the full power of Cato’s multi-layer threat defense. Cloud-based file access is inspected by Cato advanced anti-malware and IPS engines. Access control to locations and resources are limited through Cato NGFW and SWG. With legacy CASB, all of those components would be additional, requiring integration and deployment.  
The Four Steps to Managing Cloud Application Risk
With this new launch, Cato addresses all four stages for managing cloud application data risk — visibility, assessment, enforcement, and protection. It’s doing so by introducing a new Shadow IT dashboard that provides full insight into aggregate SaaS usage, including number of total and high-risk applications, list of the highest risk applications, number of users accessing them, as well as distribution by risk.
Along with this, Cato has built a unique Application Credibility Engine (ACE) which automates data collection from several sources to enable a quick and accurate assessment of each application. Three vectors are aggregated together for a comprehensive analysis – general company information, compliance features, and security capabilities.  
Having discovered unauthorized applications on their networks and been able to assess their risk, IT leaders must now decide how they want to respond. With Cato CASB, they gain fine-grained access over the application. The rules allow them to define the matching criteria, the specified action to be taken in case the rule applies, the associated severity level, and whether an alert or event should be generated.
Finally, the last stage is ensuring the protection of SaaS usage. Cato’s SASE achieves this through the convergence of its security tools. All SaaS traffic is processed by multiple security tools — NGFW, SWG, IPS, and NGAM. Together, these tools provide comprehensive protection from a wide array of threats. 
The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY
Follow Us
© 2015 – 2019 IT Security Guru – Website Managed by Calm Logic
© 2015 – 2019 IT Security Guru – Website Managed by Calm Logic
This site uses functional cookies and external scripts to improve your experience.
Privacy settings
Privacy Settings / PENDING
This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.
NOTE: These settings will only apply to the browser and device you are currently using.
GDPR Compliance


You May Also Like

Don’t get held to ransom – cause, prevention, recovery

Ransomware is one of the top earners of the dark economy, lining the coffers…

Managing chaos: How 9/11 and the pandemic changed the way organisations understand critical events

Most careers might take an unexpected turn from time to time but very few people see the path of their entire professional existence re-wired, without warning, in a single…

A lack of diversity in cybersecurity puts organisations at risk

One week later and International Women’s Day is still fresh in our…