Cato Networks unveils world’s first SASE-based XDR solution
Press Release by Cato Networks Wed 31 Jan 2024
Cato Networks, a leader in Secure Access Service Edge (SASE) technology, has expanded its Cato SASE Cloud platform to include threat detection and incident response with the launch of Cato XDR.
This solution, now available, marks the world’s first SASE-based Extended Detection and Response (XDR), addressing the challenges of prolonged deployment times and limited data quality associated with traditional XDR solutions.
Shlomo Kramer, CEO and Co-founder of Cato Networks, said: “Today, we extend our one-of-a-kind SASE platform beyond threat prevention and into threat detection and response. Only Cato and our simple, automated, and elegant platform can streamline security this way.”
Enhancing SASE with Cato XDR and EPP
In addition to Cato XDR, Cato introduced Cato EPP, the first SASE-managed Endpoint Protection Platform (EPP/EDR). This broadens the original scope of SASE to encompass threat prevention, data protection, threat detection, incident response, and endpoint protection.
This expansion maintains the architectural integrity of the original SASE definition while addressing the needs of high-density, accelerated computing applications.
Nick Hidalgo, Vice President of IT and Infrastructure at Redner’s Markets, said: “The Cato platform gave us better visibility, saved time on incident response, resolved application issues, and improved network performance ten-fold.”
Revolutionising Cybersecurity with SASE
Cato XDR leverages the Cato SASE Cloud platform, offering a unified solution for enterprises to connect, secure, and manage their global networks.
Unlike disparate point solutions, this integrated approach ensures instant scalability, availability, and convergence, streamlining security operations and reducing the operational overhead for enterprises.
Art Nichols, CTO of Windstream Enterprise, a Cato partner, said: “The innovative integration of these capabilities brings together advanced threat detection, response capabilities, and endpoint security within a unified, cloud-native architecture—revolutionising the way enterprises protect their networks and data against increasingly sophisticated cyber threats.”
The flood of security alerts triggered by network sensors, such as firewalls and IPS, complicates threat identification. In 2023, enterprises required 204 days on average to identify breaches. XDR tools help security analysts close this gap by ingesting, correlating, and contextualising threat intelligence information with the data from native and third-party sensors.
However, legacy XDR tools suffer from numerous problems relating to data quality. Sensor deployment extends the time-to-value as IT must not only install the sensors but also develop a baseline of specific organisational activity for accurate assessments. Data quality is also compromised when importing and normalising third-party sensor data, complicating threat identification and incident response.
Security analysts can waste time sorting through incident stories to identify the ones most critical for immediate remediation. Once determined, incident remediation is often hampered by missing information, requiring analysts to master and switch between disparate tools. In 2023, average breach containment required more than two months.